METHOD FOR A SECURED BACKUP AND RESTORE OF CONFIGURATION DATA OF AN END-USER DEVICE, AND DEVICE USING THE METHOD
First Claim
1. Method for a backup and restore of configuration data of an end-user device, comprising the steps ofencrypting the configuration data by using symmetric-key encryption with a symmetrical key,signing the encrypted configuration data with a device private key of an asymmetric key encryption system,sending the encrypted and signed configuration data to a personal computer of a user of the end-user device and/or to a storage location of a service provider network for storage, andrestoring of configuration data of the end-user device by using a first or a second public key for validating signed configuration data provided by the service provider network or for validating signed configuration data stored on the personal computer.
2 Assignments
0 Petitions
Accused Products
Abstract
The method for a backup and restore of configuration data of an end-user device comprises the steps: encrypting the configuration data by using symmetric-key encryption with a symmetrical key, signing the encrypted configuration data with a device private key, and sending the encrypted and signed configuration data to a personal computer of a user of the end-user device, and/or to a storage location of a service provider network, for storage. For restoring of configuration data intended for use within the end-user device, a first or a second public key of an asymmetric key encryption system is used for validating signed configuration data provided by the service provider network or for validating signed configuration data stored on the personal computer of the user.
-
Citations
16 Claims
-
1. Method for a backup and restore of configuration data of an end-user device, comprising the steps of
encrypting the configuration data by using symmetric-key encryption with a symmetrical key, signing the encrypted configuration data with a device private key of an asymmetric key encryption system, sending the encrypted and signed configuration data to a personal computer of a user of the end-user device and/or to a storage location of a service provider network for storage, and restoring of configuration data of the end-user device by using a first or a second public key for validating signed configuration data provided by the service provider network or for validating signed configuration data stored on the personal computer.
- 9. Method according to claim 9, wherein the end-user device is a customer-premises equipment device and the service provider network is a network service provider network.
-
12. End-user device, comprising
a memory including configuration data, a symmetric key for encrypting the configuration data, a private key of an asymmetric key encryption system for signing the encrypted configuration data, and at least a first public key of the asymmetric key encryption system for validating signed configuration data for restoring of the configuration data.
Specification