Micron Technology, Inc.
Security descriptor generation
Last updated:
Abstract:
Methods, systems, and devices for security descriptor generation are described. An end device may be authenticated based on a certificate and a device key based on a security descriptor. The security descriptor may be generated based on publicly-available information such as time of day information, geographical information, or a default set of information. The security descriptor may be used for generation of a certificate accessible by a server used for authenticating the device and also may be used by an end device to generate a device key for verification by the server authenticating the device.
Status:
Grant
Type:
Utility
Filling date:
26 Aug 2019
Issue date:
16 Aug 2022