Secure domain join for computing devices
First Claim
Patent Images
1. A method comprising:
- acquiring security domain access credentials on a computing device by;
storing a persistent identity on the computing device, deriving data that includes the security domain access credentials from the persistent identity, and transferring the derived data to a security domain to allow the computing device to join the security domain.
1 Assignment
0 Petitions
Accused Products
Abstract
A technique is provided for acquiring security domain access credentials on a computing device. The security domain access credentials are acquired by storing a persistent identity on the computing device, and deriving data that includes the security domain access credentials from the persistent identity. The derived data is transferred to a security domain to allow the computing device to join the security domain.
190 Citations
44 Claims
-
1. A method comprising:
acquiring security domain access credentials on a computing device by;
storing a persistent identity on the computing device, deriving data that includes the security domain access credentials from the persistent identity, and transferring the derived data to a security domain to allow the computing device to join the security domain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A method comprising:
separating a secure and persistent identity that is associated with a computing device from an identity of an operating system executing on the computing device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
22. A method comprising:
-
receiving, from a computing device, data derived from a persistent identity on the computing device; and
sending to the computing device security domain access credentials based at least in part on the derived data. - View Dependent Claims (23, 24, 25)
-
-
26. A computer readable media having computer readable instructions that when executed by a processor cause the processor to:
separate a secure and persistent identity that is associated with a computing device from an identity of at least one operating system that would be executing on the computing device, wherein the separating occurs at least partially in a directory within the security domain. - View Dependent Claims (27)
-
28. An apparatus comprising:
a computing device acquiring security domain access credentials, wherein the computing device stores a persistent identity, further wherein the computing device derives data that includes the security domain access credentials from the persistent identity, further wherein the computing device transfers the derived data to a security domain that allows the computing device to join the security domain. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37)
-
38. A method comprising:
maintaining the identity of resources in a security domain wherein the identity of a computing device resource is separate from an identity associated with software-based resource, wherein a computing device resource is a separate member of the security domain from the software-based resource. - View Dependent Claims (39, 40, 41, 42, 43, 44)
Specification