The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 11, 2022

Filed:

Apr. 21, 2020
Applicant:

Microsoft Technology Licensing, Llc, Redmond, WA (US);

Inventors:

Ravi Kiran Chivukula, Saratoga, CA (US);

Robert D. Young, Kirkland, WA (US);

Nathan C. Sherman, Bellevue, WA (US);

Chirag Shah, San Jose, CA (US);

Brandon Records, Issaquah, WA (US);

Astha Keshan, San Jose, CA (US);

Eric Kotz, Seattle, WA (US);

M. Nashaat Soliman, Redmond, WA (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/60 (2013.01); G06F 21/44 (2013.01); H04L 9/32 (2006.01); H04L 9/30 (2006.01);
U.S. Cl.
CPC ...
G06F 21/604 (2013.01); G06F 21/44 (2013.01); H04L 9/30 (2013.01); H04L 9/3226 (2013.01); H04L 9/3247 (2013.01); H04L 9/3268 (2013.01);
Abstract

An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.


Find Patent Forward Citations

Loading…