18046646. MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING

Organization Name

Dell Products L.P.

Inventor(s)

Ching-Yun Chao of Austin TX (US)

MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING - A simplified explanation of the abstract

This abstract first appeared for US patent application 18046646 titled 'MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING

Simplified Explanation

The abstract describes a system that can set an owner authorization cryptographic key on a device, validate the key, and provision the device accordingly.

  • The system can access the device's API to set an owner authorization cryptographic key.
  • The system receives a request from the device for an identifier of the device onboarding service.
  • The system sends the identifier to the device after validating the key.
  • The device onboarding service provisions the device based on the identifier and key.
  • The device is permitted to access a device management service via the firewall.

Potential Applications

This technology could be applied in the fields of IoT (Internet of Things) devices, home automation systems, and secure access control systems.

Problems Solved

This technology solves the problem of securely authorizing and provisioning devices, ensuring that only authorized users can access and manage the devices.

Benefits

The benefits of this technology include enhanced security, streamlined device onboarding processes, and improved management of connected devices.

Potential Commercial Applications

Potential commercial applications of this technology include smart home devices, industrial IoT systems, and enterprise network security solutions.

Possible Prior Art

One possible prior art for this technology could be existing device provisioning and authorization systems used in IoT and network security applications.

Unanswered Questions

How does this technology handle device authentication in case the owner authorization cryptographic key is compromised?

The system should have a mechanism in place to revoke and replace the compromised key to maintain the security of the device.

Can this technology be integrated with existing device management platforms and services?

It would be important to explore how easily this system can be integrated with popular device management platforms to ensure compatibility and ease of use for users.


Original Abstract Submitted

A system can access an application programming interface of a device to set an owner authorization cryptographic key on the device. The system can receive, at a device discovery service, a first request from the device for an identifier of the device onboarding service, wherein the first request comprises an indication of possessing the owner authorization cryptographic key. The system can, in response to validating the indication of the owner authorization cryptographic key, send, by the device discovery service, the identifier of the device onboarding service to the device. The system can, in response to receiving, at the device onboarding service, a second request from the device that is based on the identifier of the device onboarding service and demonstrates possession of the owner authorization cryptographic key, provision the device by the device onboarding service. The system can, permit, via the firewall, the device to access a device management service.