Secure installation activation
First Claim
1. A method for providing credentials to a computational component in a distributed processing network, comprising:
- generating a plurality of crypto-tokens, each crypto-token comprising a unique identifier and a public/private key pair and being configured for operative engagement with a selected computational component, whereby the selected computational component and a selected crypto-token can electrically communicate with one another;
receiving a unique identifier for the selected crypto-token; and
based on (i) a digital certificate comprising the public key and unique identifier and (ii) the private key in the selected crypto-token, establishing a secured communication session with the selected computational component to which the selected crypto-token is engaged, wherein any of the plurality of crypto-tokens are interchangeable such that any of the crypto-tokens may be engaged with the selected computational component to effect the establishing step, wherein, in the generating step, each crypto-token is not associated with a specific computational component and/or user, and wherein the unique identifier is received out-of-band from the digital certificate.
24 Assignments
0 Petitions
Accused Products
Abstract
A system 100 for providing credentials to a computational component in a distributed processing network is provided. The system 100 includes: (a) a plurality of crypto-tokens 150a-n, each crypto-token 150a-n comprising a unique identifier, optionally a digital certificate comprising a unique public key and the unique identifier, and a private key corresponding to the public key; (b) a provisioning system 100 comprising a certificate authority 104 operable to generate the plurality of crypto-tokens 150a-n; and (c) a computational component 128 comprising a drive operable to receive and communicate with a selected crypto-token 150. The computational component 128 uses the digital certificate and private key in any of the crypto-tokens 150a-n to establish a secured communication session with the provisioning system 100. Before the establishing operation, any of the plurality of crypto-tokens 150a-n can be engaged with the computational component 128 to establish the secure communication session.
316 Citations
32 Claims
-
1. A method for providing credentials to a computational component in a distributed processing network, comprising:
-
generating a plurality of crypto-tokens, each crypto-token comprising a unique identifier and a public/private key pair and being configured for operative engagement with a selected computational component, whereby the selected computational component and a selected crypto-token can electrically communicate with one another; receiving a unique identifier for the selected crypto-token; and based on (i) a digital certificate comprising the public key and unique identifier and (ii) the private key in the selected crypto-token, establishing a secured communication session with the selected computational component to which the selected crypto-token is engaged, wherein any of the plurality of crypto-tokens are interchangeable such that any of the crypto-tokens may be engaged with the selected computational component to effect the establishing step, wherein, in the generating step, each crypto-token is not associated with a specific computational component and/or user, and wherein the unique identifier is received out-of-band from the digital certificate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer readable medium encoded with processor-executable instructions to perform the steps:
-
generating a plurality of crypto-tokens, each crypto-token comprising a unique identifier and a public/private key pair and being configured for operative engagement with a selected computational component, whereby the selected computational component and a selected crypto-token can electrically communicate with one another; receiving a unique identifier for the selected crypto-token; and based on (i) a digital certificate comprising the public key and unique identifier and (ii) the private key in the selected crypto-token, establishing a secured communication session with the selected computational component to which the selected crypto-token is engaged, wherein the crypto-tokens are interchangeable such that any of the plurality of crypto-tokens may be engaged with the selected computational component to effect the establishing step, wherein, in the generating step, each crypto-token is not associated with a specific computational component and/or user, and wherein the unique identifier is received out-of-band from the digital certificate. - View Dependent Claims (16)
-
-
17. A system for providing credentials to a selected computational component in a distributed processing network, comprising:
-
a plurality of crypto-tokens, each crypto-token comprising a unique identifier and a public/private key pair and being configured for operative engagement with a selected computational component; a provisioning system operable to generate the plurality of crypto-tokens; and the selected computational component comprising a reader operable to receive and communicate electrically with a selected crypto-token, the selected computational component being operable to use (i) a digital certificate, comprising the unique identifier and the public key and (ii) the private key in the selected crypto-token to establish a secured communication session with the provisioning system, wherein each of the plurality of crypto-tokens are interchangeable to effect establishment of secured communication session with the selected computational component, whereby any of the plurality of crypto-tokens may be engaged with the selected computational component to perform the establishing operation, wherein each crypto-token is not associated with a specific computational component and/or user, and wherein the unique identifier is received out-of-band from the digital certificate. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A crypto-token comprising:
-
(a) a memory comprising a unique crypto-token identifier, a digital certificate comprising a unique public key and the unique identifier, and a private key; and (b) a processor operable to; (i) provide the digital certificate to a first computational component operatively engaged with the crypto-token, and (ii) to encrypt plain text and decrypt cipher text using the private key, the plain text and cipher text being received from the first computational component, wherein, at a time of providing to a user, the digital certificate is not specifically associated with the first computational component and/or user, and whereby the crypto-token may be operatively engaged with a second computational component, and the processor in the second computational component remains operable to perform operations (i) and (ii) for the second computational component, and wherein the digital certificate does not include an identifier uniquely associated with the first and second computational components and wherein a unique identifier is provided to the first computational component out-of-band from the digital certificate. - View Dependent Claims (32)
-
Specification