Secure provisioning in an untrusted environment
First Claim
1. A method performed by a first entity, a second entity, and a third entity, the method comprising:
- embedding, by the first entity, one or more secret values in first and second electronic circuits, wherein each of the first and second electronic circuits includes private key derivation logic, public key derivation logic, and secure boot code;
generating, by the second entity, a code signing public key, a code signing private key, and a trust anchor derived from the code signing public key;
embedding, by the second entity, the trust anchor in the first electronic circuit;
activating, by the second entity, the secure boot code, wherein the secure boot code causes the private key derivation logic of the first electronic circuit to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, causes the public key derivation logic of the first electronic circuit to generate a message signing public key that corresponds to the message signing private key, and stores the message signing private key in the first electronic circuit;
signing, by the second entity, provisioning code using the code signing private key, resulting in signed provisioning code that includes the provisioning code and a signature;
sending, by the second entity, the code signing public key, the trust anchor, and the signed provisioning code to the third entity;
embedding, by the third entity, the trust anchor in the second electronic circuit;
activating, by the third entity, the secure boot code in the second electronic circuit, wherein the secure boot code causes the private key derivation logic of the second electronic circuit to generate a message signing private key that is the same as the message signing private key generated by the first electronic circuit using a combination of the trust anchor and the one or more embedded secret values, stores the message signing private key in a protected register of the second electronic circuit, derives a value from the code signing public key, and compares the value derived from the code signing public key with the trust anchor embedded in the second electronic circuit, verifies the signature of the signed provisioning code using the code signing public key, and when the signature of the signed provisioning code is verified, launches the provisioning code on the second electronic circuit;
receiving, by the provisioning code, a challenge message from the second entity;
preparing, by the provisioning code, a signed response message that includes a concatenated message signed using the message signing private key, wherein the concatenated message includes the challenge message concatenated with a unique identifier of the second electronic circuit;
sending, by the provisioning code, the signed response message to the second entity;
determining, by the second entity, whether the unique identifier matches any previously-stored unique identifiers maintained by a first computer system in a log of electronic circuits that have been previously provisioned;
when the unique identifier does not match a unique identifier in the log, receiving, by the second electronic circuit over a secure channel between the second entity and the second electronic circuit, sensitive provisioning information from the second entity;
when the unique identifier matches a unique identifier in the log, the second entity refraining from providing the sensitive provisioning information to the second electronic circuit; and
when the sensitive provisioning information is received, storing the sensitive provisioning information on the second electronic circuit.
27 Assignments
0 Petitions
Accused Products
Abstract
Embodiments include methods for securely provisioning copies of an electronic circuit. A first entity embeds one or more secret values into copies of the circuit. A second entity: 1) embeds a trust anchor in a first copy of the circuit; 2) causes the circuit to generate a message signing key pair using the trust anchor and the embedded secret value(s); 3) signs provisioning code using a code signing private key; and 4) sends a corresponding code signing public key, the trust anchor, and the signed provisioning code to a third entity. The third entity embeds the trust anchor in a second copy of the circuit and causes the circuit to: 1) generate the message signing private key; 2) verify the signature of the signed provisioning code using the code signing public key; and 3) launch the provisioning code on the circuit.
32 Citations
20 Claims
-
1. A method performed by a first entity, a second entity, and a third entity, the method comprising:
-
embedding, by the first entity, one or more secret values in first and second electronic circuits, wherein each of the first and second electronic circuits includes private key derivation logic, public key derivation logic, and secure boot code; generating, by the second entity, a code signing public key, a code signing private key, and a trust anchor derived from the code signing public key; embedding, by the second entity, the trust anchor in the first electronic circuit; activating, by the second entity, the secure boot code, wherein the secure boot code causes the private key derivation logic of the first electronic circuit to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, causes the public key derivation logic of the first electronic circuit to generate a message signing public key that corresponds to the message signing private key, and stores the message signing private key in the first electronic circuit; signing, by the second entity, provisioning code using the code signing private key, resulting in signed provisioning code that includes the provisioning code and a signature; sending, by the second entity, the code signing public key, the trust anchor, and the signed provisioning code to the third entity; embedding, by the third entity, the trust anchor in the second electronic circuit; activating, by the third entity, the secure boot code in the second electronic circuit, wherein the secure boot code causes the private key derivation logic of the second electronic circuit to generate a message signing private key that is the same as the message signing private key generated by the first electronic circuit using a combination of the trust anchor and the one or more embedded secret values, stores the message signing private key in a protected register of the second electronic circuit, derives a value from the code signing public key, and compares the value derived from the code signing public key with the trust anchor embedded in the second electronic circuit, verifies the signature of the signed provisioning code using the code signing public key, and when the signature of the signed provisioning code is verified, launches the provisioning code on the second electronic circuit; receiving, by the provisioning code, a challenge message from the second entity; preparing, by the provisioning code, a signed response message that includes a concatenated message signed using the message signing private key, wherein the concatenated message includes the challenge message concatenated with a unique identifier of the second electronic circuit; sending, by the provisioning code, the signed response message to the second entity; determining, by the second entity, whether the unique identifier matches any previously-stored unique identifiers maintained by a first computer system in a log of electronic circuits that have been previously provisioned; when the unique identifier does not match a unique identifier in the log, receiving, by the second electronic circuit over a secure channel between the second entity and the second electronic circuit, sensitive provisioning information from the second entity; when the unique identifier matches a unique identifier in the log, the second entity refraining from providing the sensitive provisioning information to the second electronic circuit; and when the sensitive provisioning information is received, storing the sensitive provisioning information on the second electronic circuit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method performed by a first entity, a second entity, and a third entity, the method comprising:
-
embedding, by the first entity, one or more secret values in first and second electronic circuits, wherein each of the first and second electronic circuits includes private key derivation logic, public key derivation logic, and secure boot code; generating, by the second entity, a code signing public key, a code signing private key, and a trust anchor derived from the code signing public key; embedding, by the second entity, the trust anchor in the first electronic circuit; activating, by the second entity, the secure boot code, wherein the secure boot code causes the private key derivation logic of the first electronic circuit to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, causes the public key derivation logic of the first electronic circuit to generate a message signing public key that corresponds to the message signing private key, and stores the message signing private key in the first electronic circuit; signing, by the second entity, provisioning code using the code signing private key, resulting in signed provisioning code that includes the provisioning code and a signature; sending, by the second entity, the code signing public key, the trust anchor, and the signed provisioning code to the third entity; embedding, by the third entity, the trust anchor in the second electronic circuit; activating, by the third entity, the secure boot code in the second electronic circuit, wherein the secure boot code causes the private key derivation logic of the second electronic circuit to generate a message signing private key that is the same as the message signing private key generated by the first electronic circuit using a combination of the trust anchor and the one or more embedded secret values, stores the message signing private key in a protected register of the second electronic circuit, derives a value from the code signing public key, and compares the value derived from the code signing public key with the trust anchor embedded in the second electronic circuit, verifies the signature of the signed provisioning code using the code signing public key, and when the signature of the signed provisioning code is verified, launches the provisioning code on the second electronic circuit; receiving, by the provisioning code, a challenge message from the second entity; preparing, by the provisioning code, a signed response message that includes the challenge message signed using the message signing private key; sending, by the provisioning code, the signed response message to the second entity; determining, by the second entity, whether a maximum number of electronic circuits have been previously provisioned; when the maximum number of electronic circuits have been previously provisioned, the second entity refraining from providing the sensitive provisioning information to the second electronic circuit; when the maximum number of electronic circuits have not been previously provisioned, receiving, by the second electronic circuit over a secure channel between the second entity and the second electronic circuit, sensitive provisioning information from the second entity; and when the sensitive provisioning information is received, storing the sensitive provisioning information on the second electronic circuit.
-
-
10. A method performed by a first entity and a first computer system associated with the first entity, the method comprising the steps of:
-
generating a code signing public key and a code signing private key; generating a trust anchor based on the code signing public key; signing provisioning code using the code signing private key, resulting in signed provisioning code that includes the provisioning code and a signature; embedding the trust anchor in a first electronic circuit, wherein the first electronic circuit includes private key derivation logic, public key derivation logic, secure boot code, and one or more embedded secret values; activating the secure boot code, wherein the secure boot code causes the private key derivation logic to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, causes the public key derivation logic of the first electronic circuit to generate a message signing public key that corresponds to the message signing private key, and stores the message signing private key in the first electronic circuit; sending a challenge message to a second electronic circuit that is connected to a second computer system associated with a second entity; receiving, from a second electronic circuit, a signed response message generated by the second electronic circuit, wherein the signed response message includes a concatenated message signed using a message signing private key that was generated using the trust anchor and the one or more embedded secret values, which also are stored in the second electronic circuit, wherein the concatenated message includes the challenge message concatenated with a unique identifier of the second electronic circuit, and wherein the message signing private key used by the second electronic circuit is the same as the message signing private key generated by the first electronic circuit; verifying, by the first computer system, the signed response message using a message signing public key that was derived from the message signing private key; determining, by the first computer system, whether the unique identifier matches any previously-stored unique identifiers maintained by the first computer system in a log of electronic circuits that have been previously provisioned; and when the unique identifier matches a unique identifier in the log, the first computer system refraining from downloading sensitive provisioning information to the second electronic circuit. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method performed by a first entity and a first computer system associated with the first entity, the method comprising the steps of:
-
generating a code signing public key and a code signing private key; generating a trust anchor based on the code signing public key; signing provisioning code using the code signing private key, resulting in signed provisioning code that includes the provisioning code and a signature; embedding the trust anchor in a first electronic circuit, wherein the first electronic circuit includes private key derivation logic, public key derivation logic, secure boot code, and one or more embedded secret values; activating the secure boot code, wherein the secure boot code causes the private key derivation logic to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, causes the public key derivation logic of the first electronic circuit to generate a message signing public key that corresponds to the message signing private key, and stores the message signing private key in the first electronic circuit; sending a challenge message to a second electronic circuit that is connected to a second computer system associated with a second entity; receiving, from a second electronic circuit, a signed response message generated by the second electronic circuit, wherein the signed response message was generated using a message signing private key that was generated using the trust anchor and the one or more embedded secret values, which also are stored in the second electronic circuit, wherein the message signing private key used by the second electronic circuit is the same as the message signing private key generated by the first electronic circuit; verifying, by the first computer system, the signed response message using a message signing public key that was derived from the message signing private key; determining, by the first computer system, whether a maximum number of electronic circuits have been previously provisioned; and when the maximum number of electronic circuits have been previously provisioned, the first computer system refraining from downloading sensitive provisioning information to the second electronic circuit.
-
-
16. A method performed by a first entity and a first computer system associated with the first entity, the method comprising the steps of:
-
receiving, from a second entity, a code signing public key, a trust anchor derived from the code signing public key, and signed provisioning code that includes provisioning code and a signature; embedding the trust anchor in a first electronic circuit that includes private key derivation logic, public key derivation logic, secure boot code, and one or more embedded secret values; activating the secure boot code, wherein the secure boot code causes the private key derivation logic to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, stores the message signing private key in the first electronic circuit, derives a value from the code signing public key, compares the value derived from the code signing public key with the trust anchor embedded in the electronic circuit, and verifies the signature of the signed provisioning code using the code signing public key; receiving a challenge message from a second computer system associated with a second entity, wherein the second computer system has a message signing public key that was generated by a second electronic circuit, wherein the message signing public key was generated by the second electronic circuit using a message signing private key that was generated using the trust anchor and the one or more embedded secret values, which also are stored in the second electronic circuit, wherein the message signing private key used by the second electronic circuit is the same as the message signing private key generated by the first electronic circuit; preparing, by the provisioning code, a signed response message that includes a concatenated message signed using the message signing private key, wherein the concatenated message includes the challenge message concatenated with a unique identifier of the first electronic circuit; sending the signed response message to the second computer system; receiving, by the first electronic circuit, sensitive provisioning information from the second computer system when the second computer system is able to verify the signed response message using the message signing public key, and the second computer system is able to determine that the unique identifier does not match any previously-stored unique identifiers maintained by a second computer system in a log of electronic circuits that have been previously provisioned; and storing the sensitive provisioning information on the first electronic circuit. - View Dependent Claims (17, 18, 19)
-
-
20. A method performed by a first entity and a first computer system associated with the first entity, the method comprising the steps of:
-
receiving, from a second entity, a code signing public key, a trust anchor derived from the code signing public key, and signed provisioning code that includes provisioning code and a signature; embedding the trust anchor in a first electronic circuit that includes private key derivation logic, public key derivation logic, secure boot code, and one or more embedded secret values; activating the secure boot code, wherein the secure boot code causes the private key derivation logic to generate a message signing private key using a combination of the trust anchor and the one or more embedded secret values, stores the message signing private key in the first electronic circuit, derives a value from the code signing public key, compares the value derived from the code signing public key with the trust anchor embedded in the electronic circuit, and verifies the signature of the signed provisioning code using the code signing public key; receiving a challenge message from a second computer system associated with a second entity, wherein the second computer system has a message signing public key that was generated by a second electronic circuit, wherein the message signing public key was generated by the second electronic circuit using a message signing private key that was generated using the trust anchor and the one or more embedded secret values, which also are stored in the second electronic circuit, wherein the message signing private key used by the second electronic circuit is the same as the message signing private key generated by the first electronic circuit; preparing, by the provisioning code, a signed response message that includes the challenge message signed using the message signing private key; sending the signed response message to the second computer system; receiving, by the first electronic circuit, sensitive provisioning information from the second computer system when the second computer system is able to verify the signed response message using the message signing public key, and the second computer system is able to determine that a maximum number of electronic circuits have not been previously provisioned; and storing the sensitive provisioning information on the first electronic circuit.
-
Specification