Security IP icon

Security

Secure Device Provisioning

Protect your device secrets throughout the manufacturing process. We revolutionize secure provisioning by offering the simplest secure way of injecting secret identity data to a device.

How Secure Device Provisioning works

Secure Device Provisioning (formerly from Inside Secure) ensures that secrets are not exposed or manipulated when provisioned at manufacturing time, and the innovative code protection and whitebox technology ensures that these secrets remain protected for the rest of the device’s lifetime. The solution doesn’t require any hardware security resource available on the device, however if available, it can be easily adapted to variety of common hardware and software architectures.

With the Secure Device Provisioning solution, device makers can also remotely monitor the manufacturing process and even control it, without setting foot at the manufacturing site. It simplifies provisioning and make it affordable to all device makers. The client environment can be further secured through the application of secure boot, code protection and whitebox technologies.

Secure Device Provisioning Diagram
Secure Device Provisioning Platform

Features & Benefits

  • Cost effective to meet your budgetary needs (light configuration, low maintenance)
  • Flexible provisioning to meet your device specific needs (single or two-stage provisioning)
  • Over 425 millions devices provisioned successfully
  • Over 75 licensed customers, from chipset makers and OEMs, to service providers
  • The world’s first independent provisioning service
CryptoManager Root of Trust Cover

The CryptoManager Root of Trust

Built around a custom RISC-V CPU, the Rambus CryptoManager Root of Trust (CMRT) is at the forefront of a new category of programmable hardware-based security cores. Siloed from the primary processor, it is designed to securely run sensitive code, processes and algorithms. More specifically, the CMRT provides the primary processor with a full suite of security services, such as secure boot and runtime integrity, remote attestation and broad crypto acceleration for symmetric and asymmetric algorithms.