SOLUTION BRIEF: SECURE SOFTWARE PROVISIONING

featuring EmSPARK™
Secure Software Provisioning—IP Theft Prevention with EmSPARK™ Security Suite
INTRODUCTION
THE PROBLEM—IP THEFT
OVERPRODUCTION OR COUNTERFEITING
To prevent overproduction, each device is authorized to install the firmware late in the installation process. This controls the number of firmware images. Alternatively, the following controls can be put in place:
- Control the number of devices that allow provisioning of real firmware at the factory.
- Forced connection to a remote server to authorize each firmware installation.
- Connect to a local device, which limits the number of installations.
PROTECT THE ROOT-OF-TRUST (RoT) PROVISIONED KEYS
Random keys for the RoT and unique device identification are generated during provisioning. Provisioning payloads are re-keyed. (This should be done on secured device.) Private keys are never to be extracted from a device.
EmSPARK™ provides the tools to secure firmware during product fulfillment. Multiple keys and certificates are injected securely, ensuring authenticated and protected firmware throughout the product delivery process. Advanced key management features allow for change of ownership and role delegation. The secure software provisioning process is outlined below.
- Lenovo’s ThinkEdge SE70 can be deployed in a variety of applications involving intelligent video analytics, supporting best-in-class AI models.
- Lenovo’s technology partners, producing industry-changing models for edge analytics, can be assured that their intellectual property is safe.
- Lenovo’s customers can deploy the ThinkEdge SE70 safely and securely in their application of choice, while implementing optimized AI models at the network edge.
HARDWARE VALIDATION:
Typically, initial hardware validation is performed prior to provisioning any secure payloads
PRE-PROVISIONING:
- At the beginning of this stage, flash memory is clear, and the processor (SoC) is untouched.
- A bootloader, or external tool, is configured to boot securely.
PROVISIONING PROCESS BEGINS:
- The system now reboots with the provisioning application.
- The provisioning application performs the following tasks:
- Decrypts payloads
- Generates a device key
- Generates a device certificate signing request
- Encrypts the payloads using a freshly generated diversified key
- Replaces the provisioning bootloader with the production bootloader
- Fuses are now set on the SoC.
TRANSITION TO PRODUCTION:
- Flash now contains the production bootloader, EmSPARK™’s CoreTEE™, and supporting files such as Linux file systems and U-Boot.
- The secure boot process is initialized to authenticate and install the production applications. For more details, see the Secure Boot Solutions Brief.
*Photo Credit: Header Image provided by Louis Reed on Unsplash.
EmSPARK™ provides the tools to secure firmware during product fulfillment.