System and method for product registration
First Claim
Patent Images
1. A system for providing a cryptographic key to an electronic device during manufacturing of the electronic device, the system comprising:
- a controller external in a remote location to the electronic device;
a first server external to the electronic device and the controller; and
at least a second server external to the electronic device and the controller;
wherein the controller is configured to;
divide the cryptographic key into a plurality of portions, all of which are required for use of the cryptographic key and to be added to the electronic device, and wherein the electronic device is operable after all portions from the plurality of portions of the cryptographic key have been added to the electronic device;
in response to receiving a provisioning request generated by the first server, send a provisioning response to the first server, wherein the provisioning request comprises identifying information of a module in the first server, wherein the identifying information comprises a unique identifier of the module in the first server, and wherein the unique identifier identifies that module during distribution of the first subset of portions from the plurality of portions of the cryptographic key;
distribute a first subset of portions from the plurality of portions of the cryptographic key to the first server and a second subset of portions from the plurality of portions of the cryptographic key to the second server; and
receive, from each of the first server and the second server, a log report indicative of addition of the first subset of portions from the plurality of portions of the cryptographic key and the second subset of portions from the plurality of portions of the cryptographic key, respectively, to the electronic device; and
wherein the first server is configured to authorize the first subset of portions form the plurality of portions to be added to the electronic device,and wherein the second server is configured to authorize the second subset of portions to be added to the electronic device.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling a production process for producing a product is provided in which overproduction may be inhibited by introducing a separation of duties within a production process. Typically a producer will contract out the various stages of a production process to multiple contractors. In general, separation of duties involves purposefully separating production stages, for silicon chips or other products, so that the end product has been handled or “touched”, by each subcontractor, in order for the end product to be fully functional.
-
Citations
48 Claims
-
1. A system for providing a cryptographic key to an electronic device during manufacturing of the electronic device, the system comprising:
-
a controller external in a remote location to the electronic device;
a first server external to the electronic device and the controller; and
at least a second server external to the electronic device and the controller;
wherein the controller is configured to;divide the cryptographic key into a plurality of portions, all of which are required for use of the cryptographic key and to be added to the electronic device, and wherein the electronic device is operable after all portions from the plurality of portions of the cryptographic key have been added to the electronic device; in response to receiving a provisioning request generated by the first server, send a provisioning response to the first server, wherein the provisioning request comprises identifying information of a module in the first server, wherein the identifying information comprises a unique identifier of the module in the first server, and wherein the unique identifier identifies that module during distribution of the first subset of portions from the plurality of portions of the cryptographic key; distribute a first subset of portions from the plurality of portions of the cryptographic key to the first server and a second subset of portions from the plurality of portions of the cryptographic key to the second server; and receive, from each of the first server and the second server, a log report indicative of addition of the first subset of portions from the plurality of portions of the cryptographic key and the second subset of portions from the plurality of portions of the cryptographic key, respectively, to the electronic device; and wherein the first server is configured to authorize the first subset of portions form the plurality of portions to be added to the electronic device, and wherein the second server is configured to authorize the second subset of portions to be added to the electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A controller configured to provide a cryptographic key, in a plurality of portions, to a plurality of servers, wherein the controller is external in a remote location to an electronic device and at least a first server of the plurality of servers, the controller comprising:
-
a non-transitory memory; and a processor coupled to the non-transitory memory, the processor configured to; divide the cryptographic key into the plurality of portions, all of which are required for use of the cryptographic key by the electronic device and all of which are to be added to the electronic device, and wherein the electronic device is operable after all portions from the plurality of portions of the cryptographic key have been added to the electronic device; in response to receiving a provisioning request that is generated by the first server of the plurality servers, send a provisioning response to the first server, wherein the provisioning request comprises identifying information of a module in the first server, wherein the identifying information comprises a unique identifier of the module in the first server, and wherein the unique identifier identifies that module during distribution of the first subset of portions from the plurality of portions of the cryptographic key; distribute a first subset of portions from the plurality of portions of the cryptographic key to the first server and a second subset of portions from the plurality of portions of the cryptographic key to at least a second server of the plurality of servers; and receive, from each of first server and the second server, a log report indicative of addition of the first subset of portions from the plurality of portions of the cryptographic key and the second subset of portions from the plurality of portions of the cryptographic key, respectively, to the electronic device, wherein the first server is configured to authorize the first subset of portions form the plurality of portions to be added to the electronic device, and wherein the second server is configured to authorize the second subset of portions to be added to the electronic device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for a controller to provide a cryptographic key, in a plurality of portions, to a plurality of servers, wherein the controller is external in a remote location to an electronic device and at least a first server of the plurality of servers, the method comprising:
-
dividing the cryptographic key into the plurality of portions, all of which are required for use of the cryptographic key and to be added to the electronic device, and wherein the electronic device is operable after all portions from the plurality of portions of the cryptographic key have been added to the electronic device; in response to receiving a provisioning request that is generated by the first server of the plurality servers, sending a provisioning response to the first server, wherein the provisioning request comprises identifying information of a module in the first server, wherein the identifying information comprises a unique identifier of the module in the first server, and wherein the unique identifier identifies that module during distribution of the first subset of portions from the plurality of portions of the cryptographic key; distributing a first subset of portions from the plurality of portions of the cryptographic key to first server and a second subset of portions from the plurality of portions of the cryptographic key to at least a second server of the plurality of servers; receiving, from each of first server and the second server, a log report indicative of addition of the first subset of portions from the plurality of portions of the cryptographic key and the second subset of portions from the plurality of portions of the cryptographic key, respectively, to the electronic device, wherein the first server is configured to authorize the first subset of portions form the plurality of portions to be added to the electronic device, and wherein the second server is configured to authorize the second subset of portions to be added to the electronic device. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A non-transitory computer readable storage medium comprising instructions to provide a cryptographic key, in a plurality of portions, to a plurality of servers, wherein the instructions when executed by one or more processors of a computing device external in a remote location to an electronic device and a first server of the plurality of servers, cause the one or more processors to perform operations comprising:
-
dividing the cryptographic key into the plurality of portions, all of which are required for use of the cryptographic key and to be added to, and wherein the electronic device is operable after all portions from the plurality of portions of the cryptographic key have been added to the electronic device; in response to receiving a provisioning request that is generated by the first server of the plurality servers, sending a provisioning response to the first server, wherein the provisioning request comprises identifying information of a module in the first server, wherein the identifying information comprises a unique identifier of the module in the first server, and wherein the unique identifier identifies that module during distribution of the first subset of portions from the plurality of portions of the cryptographic key; distributing a first subset of portions from the plurality of portions of the cryptographic key to the first server and a second subset of portions from the plurality of portions of the cryptographic key to at least a second server of the plurality of servers; and receiving, from each of first server and the second server, a log report indicative of addition of the first subset of portions from the plurality of portions of the cryptographic key and the second subset of portions from the plurality of portions of the cryptographic key, respectively, to the electronic device, wherein the first server is configured to authorize the first subset of portions form the plurality of portions to be added to the electronic device, and wherein the second server is configured to authorize the second subset of portions to be added to the electronic device. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
Specification