Security Icon

Security

CryptoManager Infrastructure

The Rambus CryptoManager Infrastructure is a secure supply chain solution for semiconductor and device manufacturers, enabling secure provisioning, key insertion, and cloud key management. Designed to seamlessly integrate into existing manufacturing flows with minimal interruption, CryptoManager Infrastructure currently secures over 1.8 billion devices per year (and counting).

How CryptoManager Infrastructure works

CryptoManager Infrastructure enables the secure provisioning of cryptographic keys and other sensitive data throughout a distributed supply chain, including both captive and 3rd party (untrusted) manufacturing locations. CryptoManager’s secure provisioning and configuration capabilities cover a broad range of secure operations, including key delivery and programming, protection of debug and other sensitive ports, and feature configuration for chips and devices. The CryptoManager Infrastructure can be used to provision device specific information to any on-chip secure enclave, including the Rambus family of CryptoManager Root of Trust cores.

How CryptoManager Infrastructure works

Security starts in the CryptoManager Control Center. It enables simple and intuitive administration for secure provisioning of high value keys and data into semiconductor devices. Removing the human element out of key injection, secret cryptographic keys are protected end-to-end and injected automatically, enabling manufacturing integrity and security. As the keys are only known to the semiconductor OEM (and not other within the supply chain), they can be guaranteed secure.

Those cryptographic keys are the foundation of device security: device authentication, attestation, and unique identification.  Using the Rambus Key Management Service, device OEMs can enable cloud-based key management services leveraging those securely provisioned keys to enable supply chain integrity, and for device and data security for connected hardware.  Those OEMs can guarantee that their products only contain ‘known-authentic’ components at any point, anywhere, in their product’s lifecycle. Those keys can be leveraged to provide an immutable device ID, enable secure FOTA, and provide a business model of “key management as a service”.

CryptoManager Infrastructure is a foundational product in any secure supply chain ecosystem.

Solution Offerings

  • Cluster support for high availability and scalability
  • Dynamic SKU management
  • Ability to provision secure data to any secure IP core or chipset
  • Comprehensive system monitors and alerts
  • Secure browser-based management console
  • Business continuity/disaster recovery
  • Meets manufacturing critical performance requirements
  • Advanced key and data management
  • Verify manufacturing volumes, yields, and configurations
  • Monitor production status, availability, and inventory levels
  • Protect against cloning, reverse engineering, counterfeiting, and overbuilding
  • Secure offline Root Authority for managing system permissions and authorizations
  • Provision cryptographic information securely in untrusted environments
  • Advanced encrypted key and data storage
  • Two-factor user authentication

CryptoManager Infrastructure Equipment

  • Root Authority (optional)
  • Server (Cluster)
  • Appliance (Cluster)
 

CryptoManager Control Center

Full Documentation

  • Root Authority Guide
  • Service Guide
  • Appliance Guide
  • Admin Console API Guide
 

Support

  • 24×7 Infrastructure Support
  • Software Maintenance
CryptoManager Control CenterThe CryptoManager Control Center is a security control system that works in conjunction with an off-line Root Authority. It manages the distribution of data assets with the appropriate authorizations to connected CryptoManager Appliances. It includes an easy-to-use Administration Console for operators to centrally manage the Infrastructure across multiple manufacturing sites.
CryptoManager ApplianceThe Appliance is a tamper-resistant, rack-mounted server, deployed in high-volume manufacturing facilities or cloud services data centers, that provides local security and handles the distribution and programming of secret keys and device configuration data. It also delivers secure production logs and system health data to the Control Center. The appliance is designed to integrate with existing test equipment.
Key Management ServiceA cloud-based key management service which can be leveraged by both semiconductor and device OEMs. The service enables those parties to secure connect to devices anywhere in the field, allowing the OEM to enable a number of functions, including immutable device ID, secure FOTA, and “key material as a service” business models.
Protecting Safety, Revenue and Brand: Combating Counterfeit Semiconductors in the Automotive Supply Chain cover

Protecting Safety, Revenue and Brand: Combating Counterfeit Semiconductors in the Automotive Supply Chain

The counterfeit market for semiconductors is real, sizable and growing. Industry analysts peg the current market for fake semiconductors at $75B. Counterfeit chips pose great risk to driver comfort and safety, to say nothing of the severe negative consequences they present to automaker revenues and brand. The good news is there are immediate and cost-effective measures available to secure the semiconductor supply chain and stop counterfeiters in their tracks.
Download White Paper

Use Cases

Security Icon

Personalization

Large OEM customers requesting personalization, customer specific data preparation and feature customization of standard parts challenge the chipmakers ability to minimize inventory overhead and improve operating efficiencies.

Security Icon

Secure Key Provisioning

With mobile devices housing more and more sensitive data that is utilized in a wide variety of applications, chip and device companies must meet the complex security requirements for each potential use case or capability.
Security Icon

Debug Access Control

The CryptoManager solution provides a method for chip and device companies to authenticate the device and authorize the provisioning of the debug enable/disable operation for each device.

Related Markets & Applications

FREE Webinar: Secure Silicon IP Series: Complexity vs. Security