SECURELY PROVISIONING A TARGET DEVICE

Hamburg Michael, Jun Benjamin Che-Ming,Kocher Paul C, O'loughlin Daniel, Pochuev Denis Alexandrovich

user-5f8cf9244c775ec6fa691c99(2020)

引用 78|浏览39
暂无评分
摘要
The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a first command to create a Module and executes a Module Template to generate the Module in response to the first command. The RA device receives a second command to create a deployment authorization message. The Module and the deployment authorization message are deployed to an Appliance device. A set of instructions of the Module, when permitted by the deployment authorization message and executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device.
更多
查看译文
关键词
Software deployment,Cryptography,Computer network,Provisioning,Computer science,Authorization
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要