Secure configuration of computing device
First Claim
1. A method of securely configuring a computing device, the method comprising:
- receiving a configuration indication into the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a first digest of the configuration file and encrypting the first digest, the configuration file including a unique identifier associated with the computing device;
verifying, at the computing device, that the received configuration indication is authentic, the verifying including;
generating a second digest of the received configuration file;
decrypting the received encrypted digest to produce a decrypted digest; and
comparing the second digest with the decrypted digest;
operating or interoperating with the computing device in accordance with the received configuration file when the second digest and the decrypted digest match, and with another configuration file when there is no match,wherein the configuration indication is a collection of data indicating a configuration for at least a plurality of operations of the computing device,the collection of data includes a collection of key/value pairs, andthe collection of key/value pairs is defined by a markup language.
0 Assignments
0 Petitions
Accused Products
Abstract
In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
-
Citations
18 Claims
-
1. A method of securely configuring a computing device, the method comprising:
-
receiving a configuration indication into the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a first digest of the configuration file and encrypting the first digest, the configuration file including a unique identifier associated with the computing device; verifying, at the computing device, that the received configuration indication is authentic, the verifying including; generating a second digest of the received configuration file; decrypting the received encrypted digest to produce a decrypted digest; and comparing the second digest with the decrypted digest; operating or interoperating with the computing device in accordance with the received configuration file when the second digest and the decrypted digest match, and with another configuration file when there is no match, wherein the configuration indication is a collection of data indicating a configuration for at least a plurality of operations of the computing device, the collection of data includes a collection of key/value pairs, and the collection of key/value pairs is defined by a markup language. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium including at least computer program code stored therein for securely configuring a computing device, the non-transitory computer readable medium comprising:
-
computer program code for receiving a configuration indication at the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a first digest of the configuration file and encrypting the first digest, the configuration file including a unique identifier associated with the computing device; computer program code for verifying that the received configuration indication is authentic, the verifying including at least generating a second digest of the received configuration file, decrypting the received encrypted digest to produce a decrypted digest, and comparing the second digest with the decrypted digest; computer program code for causing the computing device to operate in accordance with the received configuration file when the second digest and the decrypted digest match, and with another configuration file when there is no match, wherein the configuration indication is a collection of data indicating a configuration for at least a plurality of operations of the computing device, The collection of data includes a collection of key/value pairs, and the collection of key/value pairs is defined by a markup language. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
a memory; and a processor configured to retrieve and execute instructions from the memory to; receive a configuration indication into the computing device, the configuration indication including a configuration file and an encrypted digest of the configuration file, the encrypted digest being formed by producing a first digest of the configuration file and encrypting the first digest, the configuration file including a unique identifier associated with the computing device; verify, at the computing device, that the received configuration indication is authentic including, wherein to verify, the processor is further configured to; generate a second digest of the received configuration file; decrypt the received encrypted digest to produce a decrypted digest; and compare the second digest with the decrypted digest; operate or interoperate with the computing device in accordance with the received configuration file when the second digest and the decrypted digest match, and with another configuration file when there is no match, wherein the configuration indication is a collection of data indicating a configuration for at least a plurality of operations of the computing device, the collection of data includes a collection of key/value pairs, and the collection of key/value pairs is defined by a markup language. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification