Systems and methods for automatic secret generation and distribution for secure systems
First Claim
Patent Images
1. A method for automatic secret generation and distribution for secure systems, the method being implemented by an authentication program on a network authenticator, the method comprising:
- establishing a secure communication channel with an embedded device;
receiving security credentials from the embedded device;
receiving from the embedded device via the secure communication channel either a secret for the embedded device or a request to generate the secret for the embedded device; and
registering the secret for the embedded device.
3 Assignments
0 Petitions
Accused Products
Abstract
An authentication program on a network authenticator establishes a secure communication channel with an embedded device. The authentication program receives security credentials from an embedded device. The authentication program receives from the embedded device via the secure communication channel either a secret for the embedded device or a request to generate the secret for the embedded device. The authentication program registers the secret for the embedded device.
-
Citations
22 Claims
-
1. A method for automatic secret generation and distribution for secure systems, the method being implemented by an authentication program on a network authenticator, the method comprising:
-
establishing a secure communication channel with an embedded device;
receiving security credentials from the embedded device;
receiving from the embedded device via the secure communication channel either a secret for the embedded device or a request to generate the secret for the embedded device; and
registering the secret for the embedded device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A network authenticator that is configured to implement a method for automatic secret generation and distribution for secure systems, the network authenticator comprising:
-
a processor;
memory in electronic communication with the processor;
instructions stored in the memory, the instructions being executable to implement a method comprising;
establishing a secure communication channel with an embedded device;
receiving security credentials from the embedded device;
receiving from the embedded device via the secure communication channel either a secret for the embedded device or a request to generate the secret for the embedded device; and
registering the secret for the embedded device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable medium comprising executable instructions for implementing a method for automatic secret generation and distribution for secure systems, the method being implemented by an authentication program on a network authenticator, the method comprising:
-
establishing a secure communication channel with an embedded device;
receiving security credentials from the embedded device;
receiving from the embedded device via the secure communication channel either a secret for the embedded device or a request to generate the secret for the embedded device; and
registering the secret for the embedded device. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification