×

Secure provisioning in an untrusted environment

  • US 9,100,174 B2
  • Filed: 03/20/2014
  • Issued: 08/04/2015
  • Est. Priority Date: 08/31/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method performed by a first entity, a second entity, and a third entity, the method comprising:

  • embedding, by the first entity, one or more secret values in first and second electronic circuits, wherein each of the first and second electronic circuits includes private key derivation logic, public key derivation logic, and secure boot code;

    generating, by the second entity, a code signing public key, a code signing private key, and a trust anchor derived from the code signing public key;

    embedding, by the second entity, the trust anchor in the first electronic circuit;

    activating, by the second entity, the secure boot code, wherein the secure boot code causes the private key derivation logic of the first electronic circuit to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, causes the public key derivation logic of the first electronic circuit to generate a message signing public key that corresponds to the message signing private key, and stores the message signing private key in the first electronic circuit;

    signing, by the second entity, provisioning code using the code signing private key, resulting in signed provisioning code that includes the provisioning code and a signature;

    sending, by the second entity, the code signing public key, the trust anchor, and the signed provisioning code to the third entity;

    embedding, by the third entity, the trust anchor in the second electronic circuit;

    activating, by the third entity, the secure boot code in the second electronic circuit, wherein the secure boot code causes the private key derivation logic of the second electronic circuit to generate a message signing private key that is the same as the message signing private key generated by the first electronic circuit using a combination of the trust anchor and the one or more embedded secret values, stores the message signing private key in the protected register of the second electronic circuit, derives a value from the code signing public key, and compares the value derived from the code signing public key with the trust anchor embedded in the second electronic circuit, verifies the signature of the signed provisioning code using the code signing public key, and when the signature of the signed provisioning code is verified, launches the provisioning code on the second electronic circuit;

    receiving, by the provisioning code, a challenge message from a first computer system associated with the second entity;

    preparing, by the provisioning code, a signed response message that includes the challenge message signed using the message signing private key;

    sending, by the second electronic circuit, the signed response message to the first computer system;

    receiving, by the second electronic circuit over a secure channel between the first computer system and the second electronic circuit, sensitive provisioning information from the first computer system; and

    storing the sensitive provisioning information on the second electronic circuit.

View all claims
  • 26 Assignments
Timeline View
Assignment View
    ×
    ×