Secure provisioning of a portable device using a representation of a key
First Claim
1. A system for provisioning devices for secure communication comprising:
- a local device behind a firewall, the local device previously provisioned to communicate with a secure server via a secure network and configured to;
receive a representation of a key associated with a user, the key configured to allow a portable device located outside the firewall to communicate with a secure server located behind the firewall via a secure network; and
present, by the local device behind the firewall, the representation of the key to a user of the portable device outside the firewall using one or more output methods, wherein the presented representation of the key can be decoded using one or more data capture components.
0 Assignments
0 Petitions
Accused Products
Abstract
A portable device initially accesses a secure server and requests a certificate. The secure server generates a random key and encodes the generated key to generate a representation of the key, such as a two-dimensional bar code or an audio signal, and communicated to a local device, such as a laptop or desktop computer, using a web interface. The local device is used to present the representation of the key to a mobile device. The mobile device then captures the representation of the key from the local device, for example using an image capture device or audio capture device, and extracts the key by decoding the representation of the key. The key is then stored by the mobile device and used to securely communicate with the secure server without manually entering the key.
7 Citations
20 Claims
-
1. A system for provisioning devices for secure communication comprising:
a local device behind a firewall, the local device previously provisioned to communicate with a secure server via a secure network and configured to; receive a representation of a key associated with a user, the key configured to allow a portable device located outside the firewall to communicate with a secure server located behind the firewall via a secure network; and present, by the local device behind the firewall, the representation of the key to a user of the portable device outside the firewall using one or more output methods, wherein the presented representation of the key can be decoded using one or more data capture components. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method for provisioning a portable device for communication using a secure network, the method comprising:
-
receiving, at a local device behind a firewall, a representation of a key associated with a user, the key configured to allow a portable device located outside the firewall to communicate with a secure server located behind the firewall via a secure network, the local device previously provisioned to communicate with a secure server via a secure network; and presenting, by the local device behind the firewall, the representation of the key to a user of the portable device outside the firewall using one or more output methods, wherein the presented representation of the key can be decoded using one or more data capture components. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for provisioning a portable device for communication using a secure network comprising:
-
capturing, by the portable device, a representation of a key presented by one or more output methods on a local device, the local device previously provisioned for communication using the secure network, the local device located behind a firewall and the portable device located outside the firewall; decoding, by the portable device, the representation of the key using one or more data capture components to extract the key; storing the extracted key; and establishing a connection to the secure network using the extracted key. - View Dependent Claims (18, 19, 20)
-
Specification