US 12,476,955 B2
Security key integrity verification using inventory certificates
Mukund P. Khatri, Austin, TX (US); Senthilkumar Ponnuswamy, San Jose, CA (US); Marshal F. Savage, Austin, TX (US); and Eugene David Cho, Austin, TX (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 26, 2022, as Appl. No. 17/973,784.
Prior Publication US 2024/0146714 A1, May 2, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0823 (2013.01) [H04L 63/061 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving a user request to perform at least one action related to at least one processing device comprising a processor coupled to a memory;
obtaining an inventory certificate associated with the at least one processing device, wherein the inventory certificate comprises a security key identifier of at least one security key of the at least one processing device, wherein the inventory certificate comprises a component class sequence that identifies a component type of the at least one security key and a comparison flag indicating whether the at least one security key needs to be present for a validation of the at least one processing device;
extracting, based at least in part on a value of the comparison flag, a security key identifier from a security key corresponding to the at least one processing device;
validating the security key by comparing the extracted security key identifier to the security key identifier in the inventory certificate; and
authorizing a performance of the at least one action based at least in part on a result of the comparison;
wherein the method is performed by the at least one processing device.