Secure Customer Key Injection for Build-to-Stock Systems

Number of patents in Portfolio can not be more than 2000

United States of America Patent

SERIAL NO

15144048

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Techniques for manufacturing cryptographically-enabled network endpoints are described herein. In an example, an endpoint is provisioned with keys, which may include a revocation key, a command key, a recovery key and other cryptographic information. A buyer of the endpoint may send one or more keys to the manufacturer, and request that a handover package be sent by the manufacturer to the buyer. The manufacturer sends the handover package, which may include cryptographic information appropriately signed by the manufacturer. Upon receipt, the handover package is cryptographically processed by the buyer and portions are included in a takeover package sent to the endpoint. The endpoint may replace operational keys within the endpoint and switch its operation from use of manufacturer-produced credentials to use of buyer-produced credentials. Accordingly, the endpoint is provisioned for secure operation by the owner in an advanced metering infrastructure (AMI) or Internet of Things environment.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddress
ITRON INC2111 N MOLTER ROAD LIBERTY LAKE WA 99019

International Classification(s)

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Kanungo, Rajesh San Jose, US 30 869

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation