Micron Technology, Inc.
Management of Identifications of an Endpoint having a Memory Device Secured for Reliable Identity Validation

Last updated:

Abstract:

A server system stores data associating a secret of the memory device configured in an endpoint, a first identification, and device information of the endpoint. After receiving a request to bind a second identification to the endpoint, the server system can tie identity data of the endpoint to the second identification. For example, after receiving a validation request containing identity data generated by the memory device, the server system can verify a verification code in the identity data based at least in part on the secret of the memory device. The verification code is generated from a message presented in the identity data and a cryptographic key derived at least in part from the secret. Based on validating the identity data, the server system can provide a validation response to indicate that the identity data is generated by the endpoint having the second identification.

Status:
Application
Type:

Utility

Filling date:

24 Sep 2021

Issue date:

28 Apr 2022