Micron Technology, Inc.
Verification of identity using a secret key

Last updated:

Abstract:

A method includes receiving, by a computing device, a message from a host device. In response to receiving the message, the computing device generates an identifier, a certificate, and a key. The identifier is associated with an identity of the computing device, and the certificate is generated using the message. The computing device sends the identifier, the certificate, and the key to the host device. The host device verifies the identity of the computing device using the identifier, the certificate, and the key.

Status:
Grant
Type:

Utility

Filling date:

25 Mar 2019

Issue date:

3 May 2022