Micron Technology, Inc.
Security descriptor generation

Last updated:

Abstract:

Methods, systems, and devices for security descriptor generation are described. An end device may be authenticated based on a certificate and a device key based on a security descriptor. The security descriptor may be generated based on publicly-available information such as time of day information, geographical information, or a default set of information. The security descriptor may be used for generation of a certificate accessible by a server used for authenticating the device and also may be used by an end device to generate a device key for verification by the server authenticating the device.

Status:
Grant
Type:

Utility

Filling date:

26 Aug 2019

Issue date:

16 Aug 2022