Anthony Walters - Richmond Hill, CA Brian Neill - Burlington, CA Tony Rosati - Ottawa, CA Ashok Vadekar - Rockwood, CA Daniel O'Loughlin - Aptos CA, US
International Classification:
H04L 9/30 G06F 17/14 G06Q 10/00
US Classification:
380277000, 705001000, 708400000
Abstract:
A system and method for controlling a production process for producing a product is provided in which overproduction may be inhibited by introducing a separation of duties within a production process. Typically a producer will contract out the various stages of a production process to multiple contractors. In general, separation of duties involves purposefully separating production stages, for silicon chips or other products, so that the end product has been handled or “touched”, by each subcontractor, in order for the end product to be fully functional.
System And Method For Controlling Features On A Device
Michael Daskalopoulos - San Francisco CA, US Ashok Vadekar - Rockwood, CA David Wong - Mississauga, CA William Lattin - Los Altos CA, US Daniel O'Loughlin - Aptos CA, US David R. Sequino - Landsdowne VA, US
International Classification:
H04L 9/32 G06F 12/14 H04L 29/06 H04L 9/30
US Classification:
713176, 713190, 380259, 713150, 380 30
Abstract:
Trust between entities participating in an upgrade or enablement/disablement process is established and, to facilitate this remotely and securely, a highly tamper resistant point of trust in the system that is being produced is used. This point of trust enables a more efficient distribution system to be used. Through either a provisioning process or at later stages, i.e. subsequent to installation, manufacture, assembly, sale, etc.; the point of trust embodied as a feature controller on the device or system being modified is given a feature set (or updated feature set) that, when validated, is used to enable or disable entire features or to activate portions of the feature.
Daniel O'Loughlin - Aptos CA, US Keelan Smith - Toronto, CA Jay Scott Fuller - Scotts Valley CA, US Joseph Ku - San Jose CA, US William Lattin - Los Altos CA, US Marinus Struik - Toronto, CA Yuri Poeluev - Waterloo, CA Martthew J. Campagna - Ridgefield CT, US Thomas Stiemerling - Mississauga, CA
Assignee:
CERTICOM CORP. - Mississauga ON
International Classification:
G06F 12/14
US Classification:
713189
Abstract:
An asset management system is provided, which includes a hardware module operating as an asset control core. The asset control core generally includes a small hardware core embedded in a target system on chip that establishes a hardware-based point of trust on the silicon die. The asset control core can be used as a root of trust on a consumer device by having features that make it difficult to tamper with. The asset control core is able to generate a unique identifier for one device and participate in the tracking and provisioning of the device through a secure communication channel with an appliance. The appliance generally includes a secure module that caches and distributes provisioning data to one of many agents that connect to the asset control core, e.g. on a manufacturing line or in an after-market programming session.
System And Method For Controlling Features On A Device
Michael Daskalopoulos - San Francisco CA, US Ashok Vadekar - Rockwood, CA David Wong - Mississauga, CA William Lattin - Los Altos CA, US Daniel O'Loughlin - Aptos CA, US David R. Sequino - Lansdowne VA, US
Assignee:
CERTICOM CORP. - Mississauga
International Classification:
H04L 9/00
US Classification:
380255
Abstract:
Trust between entities participating in an upgrade or enablement/disablement process is established and, to facilitate this remotely and securely, a highly tamper resistant point of trust in the system that is being produced is used. This point of trust enables a more efficient distribution system to be used. Through either a provisioning process or at later stages, i.e. subsequent to installation, manufacture, assembly, sale, etc.; the point of trust embodied as a feature controller on the device or system being modified is given a feature set (or updated feature set) that, when validated, is used to enable or disable entire features or to activate portions of the feature.
Methods And Apparatus For Use In Transferring An Assignment Of A Secure Chio Subscription Managers
Jean-Philippe Paul Cormier - Ottawa, CA David Philip Hole - Southhampton, GB Nicholas James Russell - Newbury, GB Daniel Francis O'Loughlin - Aptos CA, US
Assignee:
CERTICOM CORPORATION - MIssissauga RESEARCH IN MOTION LIMITED - Waterloo
International Classification:
H04W 88/02
US Classification:
455558
Abstract:
Techniques for use in transferring an assignment of a secure chip of a wireless device from a current subscription manager (SM) of a current mobile network operator (MNO) to a new SM of a new MNO are described. In one illustrative example, the current SM receives a request for transferring the assignment and produces transfer permission data in response. The transfer permission data includes an identifier of the secure chip, an identifier of the current SM, and a digital signature of the current SM. The current SM then sends to the secure chip a transfer permission message which includes the transfer permission data. The transfer permission data indicates a permission for the secure chip to transfer the assignment from the current SM to the new SM. Additional techniques are performed by the secure chip, and the new SM, as described.
- San Jose CA, US Benjamin Che-Ming Jun - Burlingame CA, US Paul C. Kocher - San Francisco CA, US Daniel O'Loughlin - Aptos CA, US Denis Alexandrovich Pochuev - Lafayette CA, US
The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a first command to create a Module and executes a Module Template to generate the Module in response to the first command. The RA device receives a second command to create a deployment authorization message. The Module and the deployment authorization message are deployed to an Appliance device. A set of instructions of the Module, when permitted by the deployment authorization message and executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device.
- Sunnyvale CA, US Benjamin Che-Ming Jun - Burlingame CA, US Paul C. Kocher - San Francisco CA, US Daniel O'Loughlin - Aptos CA, US Denis Alexandrovich Pochuev - San Francisco CA, US
The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a first command to create a Module and executes a Module Template to generate the Module in response to the first command. The RA device receives a second command to create a deployment authorization message. The Module and the deployment authorization message are deployed to an Appliance device. A set of instructions of the Module, when permitted by the deployment authorization message and executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device.
Modules To Securely Provision An Asset To A Target Device
- Sunnyvale CA, US Benjamin Che-Ming Jun - Burlingame CA, US Paul C. Kocher - San Francisco CA, US Daniel O'Loughlin - Aptos CA, US Denis Alexandrovich Pochuev - San Francisco CA, US
The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a first command to create a Module and executes a Module Template to generate the Module in response to the first command The RA device receives a second command to create a deployment authorization message. The Module and the deployment authorization message are deployed to an Appliance device. A set of instructions of the Module, when permitted by the deployment authorization message and executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device.