17847024. PROOF OF POSSESSION OF PRIVATE KEYS FOR REMOTE DEVICES simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

PROOF OF POSSESSION OF PRIVATE KEYS FOR REMOTE DEVICES

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Andres Felipe Borja Jaramillo of Shoreline WA (US)

Jeremy Joseph Corley of Clyde Hill WA (US)

Tolga Acar of Sammamish WA (US)

Prashant Dewan of Portland OR (US)

PROOF OF POSSESSION OF PRIVATE KEYS FOR REMOTE DEVICES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17847024 titled 'PROOF OF POSSESSION OF PRIVATE KEYS FOR REMOTE DEVICES

Simplified Explanation

Abstract: This patent application describes a method for validating proof of possession (POP) of a private key by a device. The process involves generating a provisioning package for a device catalog, which includes a POP challenge. When a device activation request is received, the computer system validates the POP by cryptographically verifying the signature using the public key, device identifier, and POP challenge. If the POP is valid, a trust relationship is established with the device by registering its public key and device identifier into the device catalog.

Explanation:

  • The patent application describes a method for validating proof of possession (POP) of a private key by a device.
  • A computer system generates a provisioning package for a device catalog, which includes a POP challenge.
  • When a device activation request is received, the computer system validates the POP by verifying the signature using the public key, device identifier, and POP challenge.
  • If the POP is valid, a trust relationship is established with the device by registering its public key and device identifier into the device catalog.

Potential Applications:

  • Secure device activation and registration processes.
  • Internet of Things (IoT) device management and authentication.
  • Secure communication between devices and computer systems.
  • Protection against unauthorized access and tampering.

Problems Solved:

  • Ensures that only devices with valid private keys can be activated and registered.
  • Prevents unauthorized devices from gaining access to a computer system or network.
  • Provides a secure method for verifying the authenticity of devices during the activation process.

Benefits:

  • Enhanced security and protection against unauthorized access.
  • Simplified device activation and registration processes.
  • Efficient management of device catalogs.
  • Scalable solution for large-scale device deployments.


Original Abstract Submitted

Validating proof of possession (POP) of a private key by a device. A computer system generates a provisioning package for a device catalog. The provisioning package including a POP challenge. After generating the provisioning package, the computer system receives a device activation request for a device. The device activation request includes a public key, a device identifier, and a signature. The computer system validates POP of a private key corresponding to the public key, including using the public key, the device identifier, and the POP challenge to cryptographically verify the signature. The computer system establishes a trust relationship with the device, including registering the public key and the device identifier into the device catalog.