×

Binding a device to a provider

  • US 8,073,442 B2
  • Filed: 10/05/2005
  • Issued: 12/06/2011
  • Est. Priority Date: 10/05/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for configuring and provisioning a computer for metered operation, the computer comprising a main processor and memory, and a hardware security module comprising a cryptographic unit, a processor, and a tamper resistant memory, the method comprising:

  • providing the computer with first and second components that are associated with first and second service providers, respectively;

    causing the computer to receive from a scheme owner at least a portion of a unique program identifier that represents the first and second components of the computer;

    causing a scheme owner to receive a request for a registration document for the computer, the request comprising a full unique program identifier and a hardware identifier, the hardware identifier associated with the computer for uniquely identifying the computer, including the first and second components thereof, within a domain;

    receiving the registration document from the scheme owner at the computer, the registration document digitally signed and includes the hardware identifier and a complete version of the unique program identifier, the registration being verified by the cryptographic unit and in response providing an amount of time according to which the hardware security module meters use of the first or second hardware components;

    causing a provisioning request to be sent from the computer to the scheme owner;

    preparing a provisioning instruction that is digitally signed and comprises the unique program identifier and the hardware identifier for use in qualifying the provisioning instruction;

    providing the provisioning instruction to the computer for configuring the computer according to the provisioning instruction, the hardware security module verifying the provisioning instruction and in response enabling permanent access to the first or second component;

    wherein the unique program identifier allows (i) the first service provider to maintain the contribution of the first component to the computer without accessing the second component and allows (ii) the second service provider to maintain the contribution of the second component to the computer without accessing the first component;

    wherein the first and second components both comprise a peripheral device physically connected to a port of the computer or a computer program stored within a memory of the computer; and

    wherein the tamper resistant memory stores the unique program identifier and hardware identifier, the computer being capable of gaining access to the tamper resistant memory only upon cryptographic authorization by the cryptographic unit.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×