×

Secure configuration of a computing device

  • US 8,214,648 B2
  • Filed: 09/09/2010
  • Issued: 07/03/2012
  • Est. Priority Date: 07/26/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method of securely configuring a computing device, the method comprising:

  • receiving a configuration indication into the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a digest of the configuration file and encrypting the digest, the configuration file including a unique identifier associated with the computing device;

    verifying, at the computing device, that the received configuration indication is authentic including;

    generating a digest of the configuration file;

    decrypting the received encrypted digest; and

    comparing the generated digest with the decrypted digest;

    operating or interoperating with the computing device in accordance with the received configuration file when the generated digest and the decrypted digest match; and

    operating or interoperating with the computing device in accordance with another configuration file of the computing device when the generated digest and the received decrypted digest do not match,wherein the received encrypted digest is encrypted using a private key of a public/private key pair;

    wherein the decrypting of the encrypted digest uses a public key of the public/private key pair, andwherein the verifying comprises comparing the unique identifier provided in the configuration file to a unique identifier previously assigned to the computing device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×