Home > Security IP > Provisioning and Key Management > Secure Device Provisioning
Security
Protect your device secrets throughout the manufacturing process. We revolutionize secure provisioning by offering the simplest secure way of injecting secret identity data to a device.
How Secure Device Provisioning works
Secure Device Provisioning (formerly from Inside Secure) ensures that secrets are not exposed or manipulated when provisioned at manufacturing time, and the innovative code protection and whitebox technology ensures that these secrets remain protected for the rest of the device’s lifetime. The solution doesn’t require any hardware security resource available on the device, however if available, it can be easily adapted to variety of common hardware and software architectures.
With the Secure Device Provisioning solution, device makers can also remotely monitor the manufacturing process and even control it,without setting foot at the manufacturing site. It simplifies provisioning and make it affordable to all device makers.The client environment can be further secured through the application of secure boot, code protection and whitebox technologies.
Features & Benefits
- Cost effectiveto meet your budgetary needs (light configuration, low maintenance)
- Flexible provisioningto meet your device specific needs (single or two-stage provisioning)
- Over425 millions devicesprovisioned successfully
- Over75 licensed customers, from chipset makers and OEMs, to service providers
- The world’s firstindependent provisioning service
The CryptoManager Root of Trust
Built around a custom RISC-V CPU, the Rambus CryptoManager Root of Trust (CMRT) is at the forefront of a new category of programmable hardware-based security cores. Siloed from the primary processor, it is designed to securely run sensitive code, processes and algorithms. More specifically, the CMRT provides the primary processor with a full suite of security services, such as secure boot and runtime integrity, remote attestation and broad crypto acceleration for symmetric and asymmetric algorithms.
Resources
Videos