Secure identity binding (SIB)
First Claim
1. A system comprising:
- a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and
a device identified by the tag via the machine readable Tag ID of the tag, wherein;
the device is configured to communicate with the reader;
the device has access to a secure Tag ID;
the device receives a reported Tag ID communicated from the reader when the reader reads the tag; and
the device communicates a verification to the reader in response to a request from the reader for a Tag ID if the reported Tag ID communicated to the device from the reader matches the secure Tag ID.
2 Assignments
0 Petitions
Accused Products
Abstract
A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to communicate with the reader; the device has access to a secure Tag ID; and the device communicates a verification to the reader if the machine readable Tag ID communicated to the device from the reader matches the secure Tag ID. A method includes: reading a Tag ID from a tag attached to a device; communicating the Tag ID read from the tag to the device; comparing a secure Tag ID of the device to the Tag ID read from the tag; and responding with a “match” or “no-match” message from the device, according to which the device is either trusted or not trusted as being identified by the Tag ID. A method of verifying a trusted agent (TA) on a device includes: storing a digital signature of the TA in a secure vault of the device; and verifying the TA by verifying the digital signature of the TA each time the TA is used.
-
Citations
20 Claims
-
1. A system comprising:
-
a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device identified by the tag via the machine readable Tag ID of the tag, wherein; the device is configured to communicate with the reader; the device has access to a secure Tag ID; the device receives a reported Tag ID communicated from the reader when the reader reads the tag; and the device communicates a verification to the reader in response to a request from the reader for a Tag ID if the reported Tag ID communicated to the device from the reader matches the secure Tag ID. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
providing a machine-readable Tag ID in a tag that identifies a device via the machine readable Tag ID of the tag; receiving, by the device, a communication including a reported Tag ID that was read from the tag; comparing a secure Tag ID belonging to the device to the reported Tag ID that was read from the tag; and responding to the communication; with a “
match”
message from the device if the comparison finds a match between the reported Tag ID and the secure Tag ID, wherein the device is trusted as being identified by the Tag ID that was read from the tag; andwith a “
no-match”
message from the device if the comparison does not find a match between the reported Tag ID and the secure Tag ID, wherein the device is not trusted as being identified by the Tag ID that was read from the tag. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of verifying a trusted agent (TA) on a device, the method comprising:
-
storing a digital signature of the TA in a secure vault of the device; and verifying the TA by verifying the digital signature of the TA each time the TA is used to verify that the device is identified by a tag in response to a request from a reader device, the request being subsequent to the reader device reading a Tag ID from the tag and wherein; the reader device communicates, in the request, a reported Tag ID to the TA; and the TA verifies that the device is identified by the tag if the reported Tag ID matches a secure Tag ID. - View Dependent Claims (17, 18, 19, 20)
-
Specification