Dell products l.p. (20240129736). MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING simplified abstract

From WikiPatents
Revision as of 02:33, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING

Organization Name

dell products l.p.

Inventor(s)

Ching-Yun Chao of Austin TX (US)

MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240129736 titled 'MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDING

Simplified Explanation

The abstract describes a system that can set an owner authorization cryptographic key on a device, validate the key, and provision the device accordingly.

  • The system can access the device's API to set an owner authorization cryptographic key.
  • The system can receive a request from the device for an identifier of the device onboarding service.
  • The system can validate the possession of the owner authorization cryptographic key and send the identifier to the device.
  • The system can provision the device based on the identifier and the possession of the key.
  • The system can permit the device to access a device management service via a firewall.

Potential Applications

This technology can be applied in secure device onboarding processes, IoT device management, and access control systems.

Problems Solved

This technology solves the problem of securely provisioning devices with owner authorization cryptographic keys and managing access to device management services.

Benefits

The benefits of this technology include enhanced security for device onboarding, streamlined provisioning processes, and improved access control mechanisms.

Potential Commercial Applications

A potential commercial application of this technology could be in the development of secure IoT platforms for smart homes, industrial automation, and healthcare devices.

Possible Prior Art

One possible prior art for this technology could be existing device provisioning systems that use cryptographic keys for authentication and authorization.

Unanswered Questions

How does the system handle the revocation of owner authorization cryptographic keys?

The abstract does not mention how the system deals with the revocation of keys once they have been set on a device.

What encryption algorithms are used for the owner authorization cryptographic keys?

The abstract does not specify the encryption algorithms or methods used for generating and managing the owner authorization cryptographic keys.


Original Abstract Submitted

a system can access an application programming interface of a device to set an owner authorization cryptographic key on the device. the system can receive, at a device discovery service, a first request from the device for an identifier of the device onboarding service, wherein the first request comprises an indication of possessing the owner authorization cryptographic key. the system can, in response to validating the indication of the owner authorization cryptographic key, send, by the device discovery service, the identifier of the device onboarding service to the device. the system can, in response to receiving, at the device onboarding service, a second request from the device that is based on the identifier of the device onboarding service and demonstrates possession of the owner authorization cryptographic key, provision the device by the device onboarding service. the system can, permit, via the firewall, the device to access a device management service.