Dell products l.p. (20240129736). MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING simplified abstract
Contents
- 1 MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING
Organization Name
Inventor(s)
Ching-Yun Chao of Austin TX (US)
MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240129736 titled 'MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING
Simplified Explanation
The abstract describes a system that can set an owner authorization cryptographic key on a device, validate the key, and provision the device accordingly.
- The system can access the device's API to set an owner authorization cryptographic key.
- The system can receive a request from the device for an identifier of the device onboarding service.
- The system can validate the possession of the owner authorization cryptographic key and send the identifier to the device.
- The system can provision the device based on the identifier and the possession of the key.
- The system can permit the device to access a device management service via a firewall.
Potential Applications
This technology can be applied in secure device onboarding processes, IoT device management, and access control systems.
Problems Solved
This technology solves the problem of securely provisioning devices with owner authorization cryptographic keys and managing access to device management services.
Benefits
The benefits of this technology include enhanced security for device onboarding, streamlined provisioning processes, and improved access control mechanisms.
Potential Commercial Applications
A potential commercial application of this technology could be in the development of secure IoT platforms for smart homes, industrial automation, and healthcare devices.
Possible Prior Art
One possible prior art for this technology could be existing device provisioning systems that use cryptographic keys for authentication and authorization.
Unanswered Questions
How does the system handle the revocation of owner authorization cryptographic keys?
The abstract does not mention how the system deals with the revocation of keys once they have been set on a device.
What encryption algorithms are used for the owner authorization cryptographic keys?
The abstract does not specify the encryption algorithms or methods used for generating and managing the owner authorization cryptographic keys.
Original Abstract Submitted
a system can access an application programming interface of a device to set an owner authorization cryptographic key on the device. the system can receive, at a device discovery service, a first request from the device for an identifier of the device onboarding service, wherein the first request comprises an indication of possessing the owner authorization cryptographic key. the system can, in response to validating the indication of the owner authorization cryptographic key, send, by the device discovery service, the identifier of the device onboarding service to the device. the system can, in response to receiving, at the device onboarding service, a second request from the device that is based on the identifier of the device onboarding service and demonstrates possession of the owner authorization cryptographic key, provision the device by the device onboarding service. the system can, permit, via the firewall, the device to access a device management service.