The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 15, 2019

Filed:

Nov. 09, 2016
Applicant:

Microsoft Technology Licensing, Llc, Redmond, WA (US);

Inventors:

Mark Fishel Novak, Newcastle, WA (US);

Nir Ben-Zvi, Bellevue, WA (US);

John Anthony Messec, Bellevue, WA (US);

Kinshumann, Redmond, WA (US);

Christopher McCarron, Hartford, CT (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 15/177 (2006.01); G06F 21/57 (2013.01); G06F 9/4401 (2018.01); G06F 9/455 (2018.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
G06F 21/575 (2013.01); G06F 9/4416 (2013.01); G06F 9/45558 (2013.01); H04L 63/0428 (2013.01); G06F 2009/4557 (2013.01); G06F 2009/45562 (2013.01); G06F 2221/034 (2013.01);
Abstract

Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further includes the target machine determining that it needs provisioning data to continue booting. The target machine contacts a secure infrastructure to obtain the provisioning data. The target machine provides an identity claim that can be verified by the secure infrastructure. As a result of the secure infrastructure verifying the identity claim, the target machine receives a request from the secure infrastructure to establish a key sealed to the target machine. The target machine provides the established key to the secure infrastructure. The target machine receives the provisioning data from the secure infrastructure. The provisioning data is encrypted to the established key. The target machine decrypts the encrypted provisioning data, and uses the provisioning data to finish booting.


Find Patent Forward Citations

Loading…