Secure Configuration of a Computing Device
First Claim
1. A method of securely configuring a computing device, the method comprising:
- receiving a configuration indication into the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a digest of the configuration file and encrypting the digest, the configuration file including a unique identifier associated with the computing device;
verifying that the received configuration indication is authentic including;
generating a digest of the configuration file;
decrypting the received encrypted digest; and
comparing the generated digest with the decrypted digest;
operating or interoperating with the computing device in accordance with the received configuration file when the generated digest and the decrypted digest match; and
operating or interoperating with the computing device in accordance with another configuration file of the computing device when the generated digest and the received decrypted digest do not match.
0 Assignments
0 Petitions
Accused Products
Abstract
In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. The configuration indication and digital signature may be provided from the computing device to the service, and the service may interoperate with the computing device in accordance with the configuration indication and the digital signature. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
-
Citations
21 Claims
-
1. A method of securely configuring a computing device, the method comprising:
-
receiving a configuration indication into the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a digest of the configuration file and encrypting the digest, the configuration file including a unique identifier associated with the computing device; verifying that the received configuration indication is authentic including; generating a digest of the configuration file; decrypting the received encrypted digest; and comparing the generated digest with the decrypted digest; operating or interoperating with the computing device in accordance with the received configuration file when the generated digest and the decrypted digest match; and operating or interoperating with the computing device in accordance with another configuration file of the computing device when the generated digest and the received decrypted digest do not match. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer readable medium including at least computer program code stored therein for securely configuring a computing device, the computer readable medium comprising:
-
computer program code for receiving a configuration indication at the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a digest of the configuration file and encrypting the digest, the configuration file including a unique identifier associated with the computing device; computer program code for verifying that the received configuration indication is authentic, the verifying including at least generating a digest of the configuration file, decrypting the received encrypted digest, and comparing the generated digest with the decrypted digest; computer program code for causing the computing device to operate in accordance with the received configuration file when the generated digest and the decrypted digest match; and computer program code for causing the computing device to operate in accordance with another configuration file of the computing device when the generated digest and the received decrypted digest do not match.
-
Specification