Methods and apparatus for restoration of an anti-theft platform
First Claim
Patent Images
1. A method for accessing a platform with an anti-theft mechanism, comprising:
- requesting authorization to access a standby state by sending a platform public key to a server;
receiving a server public key;
receiving an encrypted and signed anti-theft permit;
sending a rendezvous message to the server;
receiving an encrypted and signed anti-theft standby transition message from the server;
validating the anti-theft standby transition message;
sending a cryptographically signed acknowledgment to the server;
transitioning from an active state to a stolen state in response to a trigger indicating that the platform has been stolen, wherein the platform (i) permits access to hardware resources and software resources while in the active state and (ii) restricts access to hardware resources and software resources while in the stolen state; and
transitioning from the stolen state to the standby state on the platform in response to validating the anti-theft standby transition message, wherein the platform permits access to the hardware resources and the software resources before expiration of a timer of the platform while in the standby state.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed.
-
Citations
15 Claims
-
1. A method for accessing a platform with an anti-theft mechanism, comprising:
-
requesting authorization to access a standby state by sending a platform public key to a server; receiving a server public key; receiving an encrypted and signed anti-theft permit; sending a rendezvous message to the server; receiving an encrypted and signed anti-theft standby transition message from the server; validating the anti-theft standby transition message; sending a cryptographically signed acknowledgment to the server; transitioning from an active state to a stolen state in response to a trigger indicating that the platform has been stolen, wherein the platform (i) permits access to hardware resources and software resources while in the active state and (ii) restricts access to hardware resources and software resources while in the stolen state; and transitioning from the stolen state to the standby state on the platform in response to validating the anti-theft standby transition message, wherein the platform permits access to the hardware resources and the software resources before expiration of a timer of the platform while in the standby state. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for accessing a platform using a manageability engine, comprising:
-
requesting authorization to access a standby state by sending a platform public key to a server; receiving a server public key; receiving an encrypted and signed anti-theft permit; generating a nonce; generating a first standby token using the nonce and the platform public key; receiving a second standby token; authenticating the second standby token using the first standby token; transitioning from an active state to a stolen state in response to a trigger indicating that the platform has been stolen, wherein the platform (i) permits access to hardware resources and software resources while in the active state and (ii) restricts access to hardware resources and software resources while in the stolen state; and transitioning from the stolen state to the standby state to provide access to the platform in response to authenticating the second standby token, wherein the platform permits access to the hardware resources and the software resources before expiration of a timer of the platform while in the standby state. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory machine-readable storage medium that provides instructions, which when accessed, cause a machine to perform operations in a platform, comprising:
-
requesting authorization to access a standby state by sending a platform public key to a server; receiving a server public key; receiving an encrypted and signed anti-theft permit;
sending a rendezvous message to the server;receiving an encrypted and signed anti-theft standby transition message from the server; validating the anti-theft standby transition message; sending a cryptographically signed acknowledgment to the server; transitioning from an active state to a stolen state in response to a trigger indicating that the platform has been stolen, wherein the platform (i) permits access to hardware resources and software resources while in the active state and (ii) restricts access to hardware resources and software resources while in the stolen state; and transitioning from the stolen state to the standby state on the platform in response to validating the anti-theft standby transition message, wherein the platform permits access to the hardware resources and the software resources before expiration of a timer of the platform while in the standby state. - View Dependent Claims (12, 13, 14, 15)
-
Specification