×

Secure provisioning in an untrusted environment

  • US 9,100,189 B2
  • Filed: 08/21/2013
  • Issued: 08/04/2015
  • Est. Priority Date: 08/31/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a first entity, a second entity, and a third entity, the method comprising:

  • embedding, by the first entity, one or more secret values in first and second electronic circuits, wherein each of the first and second electronic circuits includes private key derivation logic, public key derivation logic, and secure boot code;

    generating, by the second entity, a code signing public key, a code signing private key, and a trust anchor derived from the code signing public key;

    embedding, by the second entity, the trust anchor in the first electronic circuit;

    activating, by the second entity, the secure boot code, wherein the secure boot code causes the private key derivation logic of the first electronic circuit to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, causes the public key derivation logic of the first electronic circuit to generate a message signing public key that corresponds to the message signing private key, and stores the message signing private key in the first electronic circuit;

    signing, by the second entity, provisioning code using the code signing private key, resulting in signed provisioning code that includes the provisioning code and a signature;

    sending, by the second entity, the code signing public key, the trust anchor, and the signed provisioning code to the third entity;

    embedding, by the third entity, the trust anchor in the second electronic circuit;

    activating, by the third entity, the secure boot code in the second electronic circuit, wherein the secure boot code causes the private key derivation logic of the second electronic circuit to generate a message signing private key that is the same as the message signing private key generated by the first electronic circuit using a combination of the trust anchor and the one or more embedded secret values, stores the message signing private key in a protected register of the second electronic circuit, derives a value from the code signing public key, and compares the value derived from the code signing public key with the trust anchor embedded in the second electronic circuit, verifies the signature of the signed provisioning code using the code signing public key, and when the signature of the signed provisioning code is verified, launches the provisioning code on the second electronic circuit;

    receiving, by the provisioning code, a challenge message from the second entity;

    preparing, by the provisioning code, a signed response message that includes a concatenated message signed using the message signing private key, wherein the concatenated message includes the challenge message concatenated with a unique identifier of the second electronic circuit;

    sending, by the provisioning code, the signed response message to the second entity;

    determining, by the second entity, whether the unique identifier matches any previously-stored unique identifiers maintained by a first computer system in a log of electronic circuits that have been previously provisioned;

    when the unique identifier does not match a unique identifier in the log, receiving, by the second electronic circuit over a secure channel between the second entity and the second electronic circuit, sensitive provisioning information from the second entity;

    when the unique identifier matches a unique identifier in the log, the second entity refraining from providing the sensitive provisioning information to the second electronic circuit; and

    when the sensitive provisioning information is received, storing the sensitive provisioning information on the second electronic circuit.

View all claims
  • 27 Assignments
Timeline View
Assignment View
    ×
    ×