US 12,267,675 B2
Secondary device enrollment validation
Matthew Vlasach, Larkspur, CA (US)
Assigned to JAMF Software, LLC, Minneapolis, MN (US)
Filed by JAMF Software, LLC, Minneapolis, MN (US)
Filed on Mar. 20, 2023, as Appl. No. 18/186,726.
Prior Publication US 2024/0323017 A1, Sep. 26, 2024
Int. Cl. H04W 12/06 (2021.01); G06F 21/44 (2013.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04W 12/06 (2013.01) [G06F 21/44 (2013.01); H04L 9/0825 (2013.01); H04L 9/3213 (2013.01); H04L 9/3271 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for enrollment validation of a secondary device, the computer-implemented method comprising:
responsive to receiving a verification that organization credentials associated with an organization owned device is authenticated, requesting the organization owned device to create a security token, wherein the security token comprises a private key and a public key;
receiving, subsequent to the organization owned device initiating creation of the security token, the public key from the organization owned device;
associating the public key with a User Principle Name associated with a user of the organization owned device;
responsive to detecting an enrollment request from the secondary device, requesting the organization credentials from the secondary device;
requesting, in response to the organization credentials from the secondary device being authenticated, a challenge response from the secondary device;
receiving the challenge response from the secondary device, wherein the challenge response is cryptographically signed by the secondary device with the private key, wherein the private key was transferred to the secondary device via the organization owned device;
determining, with the public key, whether the challenge response is valid; and
validating, based on determining the challenge response is valid, enrollment of the secondary device.