AUTOMATING INTERNET OF THINGS SECURITY PROVISIONING
First Claim
1. A computer-implemented method for establishing trust in a device when provisioning the device, the method comprising:
- receiving a provisioning request associated with the device;
determining a verification item based on the provisioning request;
determining, via a processor, that one or more provisioning operations are authorized based on the verification item; and
performing the one or more provisioning operations to establish a verifiable identification for the device.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a security provisioning service automatically establishes trust in a device. Upon receiving a provisioning request, a security provisioning service identifies a verification item that is associated with the provisioning request. The security provisioning service performs one or more verification operations based on the provisioning request to determine whether the provisioning request is authorized. If the provisioning request is authorized, then the provisioning service establishes a verifiable identification for the device that is assured by the secure provisioning service and then executes the provisioning request. By automatically performing the verification operations to establish trust in the device, the provisioning service eliminates manual identification assurance operations that are performed as part of a conventional security provisioning process. Reducing the time and effort required to perform security provisioning increases the number of devices likely to implement security processes that increase the overall security of interacting using the Internet.
150 Citations
20 Claims
-
1. A computer-implemented method for establishing trust in a device when provisioning the device, the method comprising:
-
receiving a provisioning request associated with the device; determining a verification item based on the provisioning request; determining, via a processor, that one or more provisioning operations are authorized based on the verification item; and performing the one or more provisioning operations to establish a verifiable identification for the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable storage medium including instructions that, when executed by a processor, cause the processor to perform the steps of:
-
determining distinguishing information associated with a first device in response to a first provisioning request; selecting at least one authorization template included in a template database based on the distinguishing information; and generating a first authorization credential for the first device based on the at least one authorization template. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a memory storing a provisioning engine; and a processor that is coupled to the memory and, when executing the provisioning engine, is configured to; receive a provisioning request associated with a device; determine a verification item based on the provisioning request; determine that one or more provisioning operations are authorized based on the verification item; perform the one or more provisioning operations to generate a provisioning item; and sign the provisioning item to generate a signed provisioning item. - View Dependent Claims (18, 19, 20)
-
Specification