US 11,853,438 B2
Providing cryptographically secure post-secrets-provisioning services
Christopher Paul Gorog, Pueblo, CO (US)
Assigned to BLOCKFRAME, INC., Colorado Springs, CO (US)
Filed by BlockFrame, Inc., Colorado Springs, CO (US)
Filed on Sep. 29, 2021, as Appl. No. 17/488,655.
Claims priority of provisional application 63/086,904, filed on Oct. 2, 2020.
Claims priority of provisional application 63/086,925, filed on Oct. 2, 2020.
Claims priority of provisional application 63/086,926, filed on Oct. 2, 2020.
Claims priority of provisional application 63/086,928, filed on Oct. 2, 2020.
Claims priority of provisional application 63/123,067, filed on Dec. 9, 2020.
Prior Publication US 2022/0108028 A1, Apr. 7, 2022
Int. Cl. G06F 21/60 (2013.01); H04L 9/08 (2006.01); G06F 21/62 (2013.01); G06Q 10/08 (2023.01); G06Q 10/087 (2023.01); G06Q 10/0835 (2023.01); H04L 9/40 (2022.01); G06F 16/23 (2019.01); G06Q 20/38 (2012.01); G06Q 20/40 (2012.01)
CPC G06F 21/602 (2013.01) [G06F 16/2379 (2019.01); G06F 21/604 (2013.01); G06F 21/6209 (2013.01); G06Q 10/087 (2013.01); G06Q 10/0835 (2013.01); G06Q 20/389 (2013.01); G06Q 20/401 (2013.01); H04L 9/085 (2013.01); H04L 9/0827 (2013.01); H04L 9/0861 (2013.01); H04L 9/0877 (2013.01); H04L 63/0442 (2013.01); H04L 63/0823 (2013.01); H04L 63/0838 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A system comprising:
a memory; and
a processor, operatively coupled to the memory, to perform operations comprising:
receiving a request to provide a post-secrets-provisioning service with respect to a device having a supply chain state corresponding to a supply chain associated with the device, wherein the supply chain state is one of: a manufacturing provisioning state corresponding to a manufacturing stage of the supply chain, a vendor provisioning state corresponding to a vendor stage of the supply chain, a network provisioning state corresponding to a network stage of the supply chain, or an operational state corresponding to an operational stage of the supply chain;
in response to receiving the request, determining whether to authorize the request based on a proof of ownership of the device;
in response to authorizing the request, obtaining a set of secrets data corresponding to the supply chain state of the device; and
emulating, by utilizing the set of secrets data, the device having the supply chain state to provide the post-secrets-provisioning service.