Embedding keys in hardware
First Claim
1. A computer-implemented method comprising:
- providing, to a device provider by an adopter that is separate from the device provider, encrypted keys, each of the encrypted keys to be included by the device provider in a corresponding device provided by the device provider;
receiving, by the adopter and from a user system that includes a device provided by the device provider and that includes one of the encrypted keys, information specifying the encrypted key and that is based on a unique identifier of the device;
validating, by the adopter, the information received from the user system, and in response to validating the information;
selecting a decryption key based on the information received from the user system that is configured to decrypt the encrypted key specified by the information received from the user system; and
providing the decryption key to the user system that includes the device.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for embedding keys in hardware. One of the methods includes providing, to a device provider, one or more encrypted keys, each of the encrypted keys to be included in a corresponding device provided by the device provider. A user system that includes a device that includes one of the encrypted keys receives information specifying the encrypted key. The information received from the user system is validated. A decryption key is selected based on the information received from the user system that is configured to decrypt the encrypted key specified by the information received from the user system. The decryption key is provided to the user system that includes the device.
14 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
providing, to a device provider by an adopter that is separate from the device provider, encrypted keys, each of the encrypted keys to be included by the device provider in a corresponding device provided by the device provider; receiving, by the adopter and from a user system that includes a device provided by the device provider and that includes one of the encrypted keys, information specifying the encrypted key and that is based on a unique identifier of the device; validating, by the adopter, the information received from the user system, and in response to validating the information; selecting a decryption key based on the information received from the user system that is configured to decrypt the encrypted key specified by the information received from the user system; and providing the decryption key to the user system that includes the device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a data store storing encrypted keys provided to a device provider by an adopter, each of the encrypted keys included, by the device provider, in a corresponding device provided by the device provider, the data store also storing information specifying the encrypted key for each device based on a unique identifier of the device; an encrypted key manager comprising instructions executable by a processing system that includes one or more computers and upon such execution cause the processing system to perform operations comprising; receiving, by the adopter and from a user system that includes a device provided by the device provider and that includes one of the encrypted keys, information specifying the encrypted key that is based on a unique hardware identifier of the device; validating the encrypted key specified by the information received from the user system, and in response to validating the encrypted key; selecting a decryption key based on the information received from the user device that is configured to decrypt the encrypted key specified by the information received from the user device; and providing the decryption key to the user system that includes the device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product, encoded on one or more non-transitory computer storage media, comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
-
providing, to a device provider by an adopter that is separate from the device provider, encrypted keys, each of the encrypted keys to be included by the device provider in a corresponding device provided by the device provider; receiving, by the adopter and from a user system that includes a device provided by the device provider and that includes one of the encrypted keys, information specifying the encrypted key and that is based on a unique identifier of the device; validating, by the adopter, the information received from the user system, and in response to validating the information; selecting a decryption key based on the information received from the user system that is configured to decrypt the encrypted key specified by the information received from the user system; and providing the decryption key to the user system that includes the device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification