Secure Desktop Provisioner - Secure Provisioning

Secure Desktop Provisioner

Secure provisioning at your desk!

Secure Desktop Provisioner enables developers, who have defined their key infrastructure during development, to dynamically generate keys and “provision” these securely into the device together with programming a cryptographically secured image of the application.

Provisioning is the act of injecting unique characteristics to every device being produced, whether at the chip, board or system level. This unique cryptographic identity, similar to a birth certificate, enables every programmed device to be identified and acted upon, whether this is to provide authentication, or to enable updates to be targeted to a single device, or a group. The provisioning is often implemented alongside secure programming, ensuring that as much information as possible is protected.

Secure provisioning enabling Security from Inception

Security orientated development is traditionally challenging as there is a need to manage high-value code and secrets, including keys, along the complete supply chain from development through to production. 

The Security from Inception Suite enables developers to make the first critical step by building security into their designs ready for production. Secure Desktop Provisioner has now been added as a critical component of the Security from Inception Suite. For the first time, it is now possible to take the second step of securely transferring those designs to a production environment to produce prototypes and first articles that fully implement the designed security features. In C-Trust, development keys are replaced by secure production keys, during the creation of a final, secure production package. The Secure Desktop Provisioner imports these production packages.

 

Supported devices

In order to leverage different security and development needs, our security tools offer support for a range of devices, and more will be added.

Devices enabling foundation security all have a minimum memory of 256K or more (512K to 1M), JTAG disable is available, and so is are memory protection unit (MPU) features of different levels and functionality. The following devices are currently supported:

STMicroelectronics NXP
STM32F405
STM32F407
STM32F412
STM32F429
STM32F475
STM32L4R
STM32L4S5
STM32F777
Kinetis K24
Kinetis K6x
Kinetis K70

Best-in-class secure devices includes an inbuilt hardware crypto unit and memory protection features and/or hardware-based security and Arm® TrustZone®. The following are currently supported:

STMicroelectronics Renesas Microchip NXP
STM32H7
STM32H7A
STM32L5
RX65N SAML11 LPC55S6x
Demo of Secure Desktop Provisioner

In this short video, you get a brief look at how Secure Desktop Provisioner works together with IAR Embedded Workbench and C-Trust.

extends unique security offering

“For the first time, a security solution that encompasses both development and production is available. With the Secure Desktop Provisioner we deliver secure provisioning to the desk of developers globally. This provides them with the right tools to develop applications with security properly integrated and enable a secure framework for initial production.”

- Haydn Povey, CEO of Secure Thingz

Watch this recorded webinar to learn more!

© IAR Systems 1995-2020 - All rights reserved.

We use cookies on this website to provide you with a better experience. You need to accept cookies to continue using this site. Cookies