×

Secure configuration of computing device

  • US 8,631,241 B2
  • Filed: 06/22/2012
  • Issued: 01/14/2014
  • Est. Priority Date: 07/26/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method of securely configuring a computing device, the method comprising:

  • receiving a configuration indication into the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a first digest of the configuration file and encrypting the first digest, the configuration file including a unique identifier associated with the computing device;

    verifying, at the computing device, that the received configuration indication is authentic, the verifying including;

    generating a second digest of the received configuration file;

    decrypting the received encrypted digest to produce a decrypted digest; and

    comparing the second digest with the decrypted digest;

    operating or interoperating with the computing device in accordance with the received configuration file when the second digest and the decrypted digest match, and with another configuration file when there is no match,wherein the configuration indication is a collection of data indicating a configuration for at least a plurality of operations of the computing device,the collection of data includes a collection of key/value pairs, andthe collection of key/value pairs is defined by a markup language.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×