Secure Identity Binding (SIB)
First Claim
1. A system comprising:
- a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and
a device to be identified by the tag, wherein;
the device is configured to communicate with the reader;
the device has access to a secure Tag ID; and
the device communicates a verification to the reader if the machine readable Tag ID communicated to the device from the reader matches the secure Tag ID.
2 Assignments
0 Petitions
Accused Products
Abstract
A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to communicate with the reader; the device has access to a secure Tag ID; and the device communicates a verification to the reader if the machine readable Tag ID communicated to the device from the reader matches the secure Tag ID. A method includes: reading a Tag ID from a tag attached to a device; communicating the Tag ID read from the tag to the device; comparing a secure Tag ID of the device to the Tag ID read from the tag; and responding with a “match” or “no-match” message from the device, according to which the device is either trusted or not trusted as being identified by the Tag ID. A method of verifying a trusted agent (TA) on a device includes: storing a digital signature of the TA in a secure vault of the device; and verifying the TA by verifying the digital signature of the TA each time the TA is used.
-
Citations
20 Claims
-
1. A system comprising:
-
a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, wherein; the device is configured to communicate with the reader; the device has access to a secure Tag ID; and the device communicates a verification to the reader if the machine readable Tag ID communicated to the device from the reader matches the secure Tag ID. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
reading a Tag ID from a tag that is attached to a device; communicating to the device the Tag ID that was read from the tag; comparing a secure Tag ID belonging to the device to the Tag ID read from the tag; and responding; with a “
match”
message from the device if the comparison finds a match, wherein the device is trusted as being identified by the Tag ID; andwith a “
no-match”
message from the device if the comparison does not find a match, wherein the device is not trusted as being identified by the Tag ID. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of verifying a trusted agent (TA) on a device, the method comprising:
-
storing a digital signature of the TA in a secure vault of the device; and verifying the TA by verifying the digital signature of the TA each time the TA is used. - View Dependent Claims (17, 18, 19, 20)
-
Specification