Secure provisioning at your desk
Secure Desktop Provisioner delivers secure provisioning at the desk, enabling simplified production for devices which do not require a fully automated production line. The product enables you, who have defined your company’s key infrastructure during development, to dynamically generate keys and provision these securely into the device alongside a cryptographically secured image of the application.
Provisioning provides unique characteristics to every device being produced, whether at the chip, board or system level. This enables every programmed device to be identified and acted upon, whether this is to provide authentication, or to enable updates to be targeted to a single device, or a group. The provisioning is often implemented alongside secure programming, ensuring as much information as possible is protected.
Security orientated development is traditionally challenging as there is a need to manage high-value code and secrets, including keys, along the complete supply chain from development through to production.
The Security from Inception Suite enables developers to make the first critical step by building security into their designs ready for production. Secure Desktop Provisioner has now been added as a critical component of the Security from Inception Suite. For the first time, it is now possible to take the second step of securely transferring those designs to a production environment to produce prototypes and first articles that fully implement the designed security features. In C-Trust, development keys are replaced by secure production keys, during the creation of a final, secure production package. The Secure Desktop Provisioner imports these production packages.
In order to leverage different security and development needs, our security tools offer support for a range of devices, and more will be added. See all supported devices