Micron Technology, Inc.
AUTHENTICATING A DEVICE USING A REMOTE HOST
Last updated:
Abstract:
Methods, systems, and devices for authenticating a device using a remote host are described. In some systems, a management server may identify a software update for a device and transmit a notification that the software update is sent to the device. In some cases, the system may also include a field server. The field server may receive the notification and set a flag, in a memory, that indicates an association between the device and the software update. The field server may receive, from the device, a connection request that includes a certificate associated with a key for authenticating the device and accept the key as valid based on the flag indicating the update to the software.
Status:
Application
Type:
Utility
Filling date:
21 Apr 2022
Issue date:
4 Aug 2022