US 12,149,517 B2
Management of identifications of an endpoint having a memory device secured for reliable identity validation
Jeffrey Charles Shiner, Richardson, TX (US); Lance W. Dover, Fair Oaks, CA (US); and Olivier Duval, Pacifica, CA (US)
Assigned to Micron Technology, Inc., Boise, ID (US)
Filed by Micron Technology, Inc., Boise, ID (US)
Filed on Sep. 24, 2021, as Appl. No. 17/485,237.
Claims priority of provisional application 63/156,247, filed on Mar. 3, 2021.
Claims priority of provisional application 63/105,820, filed on Oct. 26, 2020.
Prior Publication US 2022/0131848 A1, Apr. 28, 2022
Int. Cl. H04L 9/40 (2022.01); G06F 21/72 (2013.01); H04L 9/08 (2006.01); H04W 12/48 (2021.01)
CPC H04L 63/08 (2013.01) [G06F 21/72 (2013.01); H04L 9/0866 (2013.01); H04L 63/123 (2013.01); H04W 12/48 (2021.01)] 19 Claims
OG exemplary drawing
 
1. A method, comprising:
storing, in a server system, data associating a secret of a memory device configured in an endpoint, a first identification, and device information of the endpoint;
receiving, in the server system, a request to bind a second identification to the endpoint identified by the first identification;
receiving, in the server system, a validation request containing identity data generated by the memory device, the identity data including a verification code generated from a message presented in the identity data and a cryptographic key derived at least in part from the secret;
verifying, by the server system, validity of the identity data based at least in part on the secret of the memory device and a portion of content stored in the memory device;
providing, by the server system in response to a determination that the identity data is valid, a validation response for the validation request, the validation response configured to indicate that the identity data is generated by the endpoint having the second identification;
generating, by the server system in response to the request to bind the second identification to the endpoint, a verification code for a command; and
causing the memory device to execute the command in view of the verification code;
wherein the message presented in the identity data contains the second identification.