18183310. METHOD FOR POST-QUANTUM SECURE IN-THE-FIELD TRUST PROVISIONING simplified abstract (NXP B.V.)
Contents
METHOD FOR POST-QUANTUM SECURE IN-THE-FIELD TRUST PROVISIONING
Organization Name
Inventor(s)
Christine Van Vredendaal of Veldhoven (NL)
Björn Fay of Brande-Hörnerkirchen (DE)
METHOD FOR POST-QUANTUM SECURE IN-THE-FIELD TRUST PROVISIONING - A simplified explanation of the abstract
This abstract first appeared for US patent application 18183310 titled 'METHOD FOR POST-QUANTUM SECURE IN-THE-FIELD TRUST PROVISIONING
Simplified Explanation: The patent application describes a method for provisioning a group of IC devices, involving storing keys in one device, installing software, signing the software, and provisioning the other devices with cryptographic assets.
Key Features and Innovation:
- Provisioning a plurality of IC devices efficiently and securely.
- Storing keys and a public key in one device for reprovisioning purposes.
- Installing and signing provisioning software using cryptographic keys.
- Providing cryptographic assets to the remaining IC devices for secure provisioning.
- Reserving space in the devices for reprovisioning with updated assets.
Potential Applications: This technology can be applied in industries that require secure provisioning of IC devices, such as IoT, telecommunications, and cybersecurity.
Problems Solved: The method addresses the challenges of securely provisioning multiple IC devices with cryptographic assets and ensuring reprovisioning capabilities for future updates.
Benefits:
- Enhanced security in provisioning IC devices.
- Efficient management of cryptographic assets.
- Simplified process for reprovisioning devices with updated assets.
- Scalable solution for provisioning a large number of devices.
Commercial Applications: The technology can be utilized by manufacturers of IC devices, IoT companies, and cybersecurity firms to streamline the provisioning process, enhance security, and improve overall device management.
Questions about Provisioning IC Devices: 1. How does the method ensure the security of cryptographic assets during provisioning? 2. What are the potential challenges in reprovisioning IC devices with updated cryptographic assets?
Frequently Updated Research: Stay updated on advancements in cryptographic key management, secure provisioning methods, and IoT device security protocols to enhance the efficiency and security of the provisioning process.
Original Abstract Submitted
A method for provisioning a plurality of IC devices, the method including: providing, by a first entity, the plurality of IC devices; storing, by the first entity, in one of the plurality of IC devices used as a provisioning device, one or more keys, and a public key, wherein the one or more keys include a reprovisioning key for reprovisioning the remaining IC devices; installing, by the first entity, provisioning software in the provisioning device; signing, by the first entity, provisioning software using a private key, the private key corresponding to the public key; provisioning the remaining IC devices by the provisioning device including providing cryptographic assets to the remaining IC devices, wherein the cryptographic assets include cryptographic code and keys; and reserving space in the remaining IC devices for reprovisioning the remaining IC devices with updated cryptographic assets.