Micron Technology, Inc.
AUTHENTICATING A DEVICE USING A REMOTE HOST

Last updated:

Abstract:

Methods, systems, and devices for authenticating a device using a remote host are described. In some systems, a management server may identify a software update for a device and transmit a notification that the software update is sent to the device. In some cases, the system may also include a field server. The field server may receive the notification and set a flag, in a memory, that indicates an association between the device and the software update. The field server may receive, from the device, a connection request that includes a certificate associated with a key for authenticating the device and accept the key as valid based on the flag indicating the update to the software.

Status:
Application
Type:

Utility

Filling date:

21 Apr 2022

Issue date:

4 Aug 2022