Secure manufacturing management includes key generation and certification

January 26, 2017 // By Graham Prophet
Device Lifecycle Management (DLM) Managed Service is offered as a means to simplify manufacturing cryptographic IoT devices requiring digitally signed software, zero-exposure key generation, certificate authority, and automotive vehicle-to-vehicle certificate generation.

The service is presented by Integrity Security Services (ISS), a Green Hills Software company, to eliminate the overhead of developing and supporting internal PKI systems for secure delivery of digital trust assets to partners and suppliers across global supply chains.

 

The DLM Managed Service offers IoT device manufacturers with a dedicated hosted solution to manage all digital trust assets, including digitally signed software, keys, and certificates – for one or many products incorporating FIPS 140-2, Level 3 protection to the manufacturing floor. All hardware, software, and services are included, with the aim of aiding internal resources to focus on developing high-value features without sacrificing security.

 

The service is compatible with leading secure microprocessors and controllers, including Texas Instruments, Infineon, ST Micro, NXP/Freescale, and Renesas. DLM provides high assurance protection of root keys and formats signed software to leverage hardware security modules and ROM-based secure boot operations. The DLM x.509 certificate authority and automotive V2X/C2X certificate managed services use the encrypted network to perform cryptographic operations at remote manufacturing locations to best meet business needs.

 

“The rapid pace to deliver new secure products becomes more complicated when addressing the many partners and suppliers within an organization,” says David Sequino, vice president and general manager of INTEGRITY Security Services. “Organizations must support uninterrupted manufacturing by sharing critical trust assets without the risk of compromise on external networks. The DLM Managed Service protects critical device data from untrusted networks until metered to the device. The ISS team provides the expertise needed at lower risk and cost.”

 

Integrity Security Services; www.ghs.com/iss