18177278. ASIC Identity Auto-Provisioning simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

ASIC Identity Auto-Provisioning

Organization Name

Cisco Technology, Inc.

Inventor(s)

Chirag K. Shroff of Cary NC (US)

ASIC Identity Auto-Provisioning - A simplified explanation of the abstract

This abstract first appeared for US patent application 18177278 titled 'ASIC Identity Auto-Provisioning

In one embodiment, a method to authenticate a hardware component, by a system, includes performing a verification process to determine whether the hardware component is authorized to run on the system. The hardware component comprises an electronic fuse storing a hash of a data package and a memory storing the data package, wherein the electronic fuse is configured to provide the hash to the memory. The verification process comprises transmitting a random value (K) to the hardware component to prompt the hardware component to sign a response. The verification process further comprises receiving a signed response containing the random value (K) and the data package, wherein the data package comprises a first serial number associated with the hardware component and a first system number associated with the system. The verification process further comprises decrypting the signed response to verify a value of the random value (K).

  • The method involves authenticating a hardware component by performing a verification process.
  • The hardware component includes an electronic fuse storing a hash of a data package and a memory storing the data package.
  • A random value (K) is transmitted to the hardware component to prompt it to sign a response.
  • The signed response contains the random value (K) and data package with serial and system numbers.
  • The verification process decrypts the signed response to verify the random value (K).

Potential Applications: This technology can be applied in secure hardware authentication systems, ensuring only authorized components can run on a system.

Problems Solved: This technology addresses the issue of unauthorized hardware components attempting to run on a system, enhancing system security.

Benefits: Enhanced system security, prevention of unauthorized hardware components from running on a system.

Commercial Applications: This technology can be utilized in industries where secure hardware authentication is crucial, such as in defense systems, financial institutions, and critical infrastructure.

Questions about Hardware Component Authentication: 1. How does the verification process ensure the hardware component is authorized to run on the system? 2. What are the potential implications of unauthorized hardware components running on a system?

Frequently Updated Research: Stay updated on advancements in hardware authentication technologies to ensure the most secure systems.


Original Abstract Submitted

In one embodiment, a method to authenticate a hardware component, by a system, includes performing a verification process to determine whether the hardware component is authorized to run on the system. The hardware component comprises an electronic fuse storing a hash of a data package and a memory storing the data package, wherein the electronic fuse is configured to provide the hash to the memory. The verification process comprises transmitting a random value (K) to the hardware component to prompt the hardware component to sign a response. The verification process further comprises receiving a signed response containing the random value (K) and the data package, wherein the data package comprises a first serial number associated with the hardware component and a first system number associated with the system. The verification process further comprises decrypting the signed response to verify a value of the random value (K).