Micron Technology, Inc.
Verification of identity using a secret key
Last updated:
Abstract:
A method includes receiving, by a computing device, a message from a host device. In response to receiving the message, the computing device generates an identifier, a certificate, and a key. The identifier is associated with an identity of the computing device, and the certificate is generated using the message. The computing device sends the identifier, the certificate, and the key to the host device. The host device verifies the identity of the computing device using the identifier, the certificate, and the key.
Status:
Grant
Type:
Utility
Filling date:
25 Mar 2019
Issue date:
3 May 2022