SlideShare a Scribd company logo
1
restricted
Liam Cheng
April 2024
Simplified FDO manufacturing flow
with TPMs
2
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
Infineon is a global leader in power systems and IoT
2
Market position
Automotive
#1
TechInsights,
March 2023
1 As of 30 September 2023
Power
#1
Omdia,
September 2023
Security
#1
ABI Research,
October 2023
employees1
~58,600
in automotive, power management,
energy efficient technologies and IoT
Global leader
3
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
We build trust in a connected world
Security controller
Security controller,
sofware & host
software
Security controller,
software & host
software
OPTIGA
TPM
OPTIGA TPM
OPTIGA Trust
eSIM
V2X
Security controller &
software
OPTIGA
Authenticate
Seamless secured transactions Verifying identities
Securing the IoT Fighting Counterfeits
4
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
The Trusted Platform Module (TPM)
“The safe for your platform”
› Reduced implementation costs
› Minimized integration risk
› Proven security
› Tamper-resistant hardware
› Key and authentication protect
› Used in computing for over 20 years
› Widely adopted by new use cases
› Security of hardware and software
independently evaluated
Security chip standardized by
Trusted Computing Group
(TCG)
Widely used in board
applications
Designed to resist logical and
physical attacks
Certified by third-party
(Common Criteria/ FIPS)
TPM
“The for
your platform"

Recommended for you

UNSPresentation
UNSPresentationUNSPresentation
UNSPresentation

Unisight Digital Technologies is a leading developer of digital video surveillance software. It prioritizes client needs and offers versatile solutions using the H.264 codec for high video quality at low storage rates. Unisight has developed standard, professional, and enterprise software versions on a stable platform to provide limitless configuration options, including a global monitoring solution with remote access capabilities. The company's solutions are open, scalable systems that are compatible with multiple device types and provide features such as map integration and mobile client support.

Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value

Sierra Wireless presentation from M2M Forum April 2015 covering: - Key learnings and recommendations from IoT projects - Tips on how to simplify IoT implementations and securing business value - Customer references

device managementiotconnectivity
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische Wiegesysteme

The document discusses lift truck impact monitoring systems. It introduces the Defender IM series, which provides more than just impact recognition by promoting accountability, safety awareness, and productivity. The system ensures individual accountability, creates a best practice safety culture, and provides tools to avoid investigative situations and ensure compliance with OSHA regulations. It is a modular system that allows users to select only the needed options and add more over time.

jurcatedzeljko
5
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
Laptop Server Network Interface Card Switches Firewall
5G access point
Storage area network Enterprise router
Google Mesh Router Surveillance Camera EV Charging Station Printer
IoT gateway Wireless Access point
Fleet management
Existing products with OPTIGA TPM 2.0
6
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
‒ TPM, a hardware module that provides secure
credential storage and trusted implementations of
cryptography, combines well with FDO.
‒ TPMs can store credentials for FDO securely, and it
provides the basic asymmetric cryptography for
FDO’s authentication.
‒ FDO, in turn, can work with TPMs to provision
application keys and certificates into TPM, allowing
customers to have private key materials with chains
of trust matching their organizational requirements.
‒ TPMs can potentially also be used to store FDO
factory credentials, allowing devices to adopt FDO
without a change to the manufacturing line.
TPM and FDO
https://fidoalliance.org/wp-content/uploads/2022/12/IoT-Application-
Provisioning-for-Security-Using-FDO-and-TPM-White-Paper.pdf
7
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
Specification for FDO credential storage in a TPM
https://fidoalliance.org/specs/FDO/securing-fdo-in-tpm-v1.0-rd-20231010/securing-fdo-in-tpm-v1.0-rd-20231010.pdf
8
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
How FDO works
Device Manufacturer
3
Load Ownership
Voucher (OV) to
Cloud
Device in box shipped
to installation location
1
Ownership
Voucher (OV)
FDO
Manufacturing
tool
FDO Client, Credentials
path to RV server
a. FDO agent & FDO credentials
places in device.
b. Ownership Voucher (OV)
created
8
7
a. Mutual authentication
takes place
b. Secure channel is
established
c. Onboarding takes place
using FSIM’s
Device given network
connectivity and powers up
Target Cloud
🡨
Application
Data
/
Control
🡨
Cloud Managed,
Device data flows
FDO owner
5
Device contacts RV
and is re-directed to
Cloud
6
Rendezvous
server (RV)
4
Register OV
with
Rendezvous
Server
FDO Client &
credentials
2
Onboarding
Data
🡨

Recommended for you

Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender

The document discusses Defender vehicle management systems that monitor lift truck impacts and provide tools to promote safety, accountability, and productivity. The Defender systems go beyond just impact recognition by ensuring individual accountability, creating a best practice safety culture, and providing tools to avoid investigative situations and ensure compliance with OSHA regulations. The Defender IM2 and IM3 systems offer different data communication platforms, including USB extraction, LAN webpage access, and email notifications, to provide fleet data and impact reports for fleets of all sizes.

skidweighivdtted
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...

This document summarizes a presentation given by Sierra Wireless on their mangOH open source hardware platform, AirVantage IoT cloud platform, and a demo connecting a sensor to the cloud using these technologies. The presentation introduced mangOH as a flexible open source hardware solution for prototyping IoT devices, AirVantage as an end-to-end cloud platform for managing devices and applications, and demonstrated a simple sensor-to-cloud application using mangOH, AirVantage and IBM Bluemix. Representatives from Sierra Wireless discussed their solutions for building the Internet of Things.

developeranalyticscloud
Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensed

In the past, the need to protect the software on industrial controllers used to come as an afterthought, but no longer: Software protection has long since become a top priority for the people in charge of keeping industrial and mechanical engineering enterprises safe and secure. And this goes beyond the critical infrastructures that regulators already had in their sights. The momentum for more security now comes from the market itself, with ever louder calls to safeguard industrial networks against attacks e.g. by complying with the international IEC 62443 standards. A look at the news shows that this is happening not a moment too soon: Cyberattacks against businesses and industrial installations are a constant threat, and the ability to protect the invaluable intellectual property invested in or handled by the software has become a game changer. On top of pure security concerns, companies will want to control access to their systems or software e.g. for certified service technicians or as a goods means to monetize a device’s add-on features and functions. Users can purchase the licenses they need from the flexible choice of licensing models they are offered, which can include popular options like time-based (subscriptions) or usage-based (pay-per-use) licenses. They allow providers to tailor their licensing models perfectly to match the local market’s needs without having to go back to doctoring their software. CODESYS seized upon these trends at a very early stage. The leading hardware-independent IEC 61131-3 programming system used to create controller applications under Windows is equipped with Wibu-Systems’ CodeMeter technology – the perfect toolkit for putting in place just the right protection, authentication, and licensing solutions.

codesysindustrial controllersoftware protection
9
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
Standard TPM programming model
2. Distributor
1. TPMs shipped to OEM
1. OEM
1. Orders FDO TPMs from
Distributor
4. OEM
1. Creates OV with
manufacturing tool
2. Programs TPM and sends
OV to End User
3. Assembles Device with
TPM
4. Ships Device to installer
e.g. SI, end user etc.
3. End User
1. Orders FDO enabled
Devices
2. Provides their public key
to OEM
6. Installer
1. Installs devices
2. Runs FDO
3. Device onboards to End
User platform
5. End User
1. Registers OV with target
platform/RV server.
10
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
Pre-programmed TPM concept
• To simplify the OEM manufacturing flow, Infineon in conjunction with Avnet have
created a pre-programmed TPM concept for FDO.
• In this approach, Avnet would pre-program the TPMs with FDO credentials and
then ship the TPM to the OEM for installation.
• The Ownership Voucher (OV) can be stored in the TPM or can be sent as a
database file to the OEM
TPM
FDO credential
Ownership
Voucher
ODM board or final device
Pre-programmed TPMs
shipped to ODM or
OEM
TPM
FDO
credential
Ownership
Voucher
TPMs
Pre-programmed by
Avnet
OS with FDO
Client
OV is extracted, signed
and shipped
Avnet TPM personalization services
● The OPTIGATM TPM is a turnkey security solution
● Avnet offers an industry first custom programming service for security devices.
● This personalization service makes it easier for customers to integrate embedded
custom security into their products independent of their security experience or volumes.
12
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
TPM flow using embedded OV approach
2. Distributor
1. OV created and signed
with OEM key
2. TPM configured and
shipped to OEM with
embedded OV
1. OEM
1. Orders FDO enabled
TPMs from Distributor
2. Provides their public key
to Distributor
4. OEM
1. Extracts OV from TPM
2. Signs OV with End User
key and sends OV to End
User
3. Assembles Device
4. Ships Device to installer
e.g. SI, end user etc.
3. End User
1. Orders FDO enabled
Devices
2. Provides their public key
to OEM
6. Installer
1. Installs devices
2. Runs FDO
3. Device onboards to End
User platform
5. End User
1. Registers OV with target
platform/RV server.

Recommended for you

FTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxFTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptx

Fortinet provides network security solutions including next-generation firewalls, SD-WAN, zero trust network access, cloud security, and security services. Their solutions are delivered through a variety of appliances, virtual machines, cloud and software offerings. Fortinet also offers security management, analytics, automation and professional services to help customers deploy and manage their network security environments.

OPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge DevicesOPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge Devices

Utthunga kicked off a webinar series “OPC UA Inside Out”. Our 3rd webinar of the webinar series titled “Edge Devices” was conducted on May 28th, 2020 at 4:00 PM IST. Our in-house OPC expert Mr. Chatrapathi GV and #IIoT expert Mr. Rushendra Babu were the presenters. The webinar helped in understanding the crucial role of edge devices in IIoT and the benefits of using #OPCUA in edge devices. The following points were covered in the 60 minutes of the #webinar: 1. Importance of OPC in IIoT & Industry 4.0 transformation 2. Understand Edge, Fog and Cloud Concepts with respect to a. Protocols b. Data flow c. Data processing 3. Gain an understanding of unified communication with OPC UA 4. Security aspects of OPC UA 5. Typical use cases and application You can view the webinar recording by clicking on the link https://www.youtube.com/c/Utthunga Please feel free to share these links with your colleagues who may be interested. If you have any queries or require more information regarding the topic or wish to know more about Utthunga you can mail us at contact@utthunga.com or visit our website https://utthunga.com/ Utthunga for OPC © 2020 Utthunga Technologies

iiotopc securityopc ua
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.

CDI manufactured a standards based encryptor for the financial industry that has been shipped worldwide since 1980. This industry gradually changed focus to the internet, although some of this equipment is still in use.

out of band securitynetwork securityout of band management
13
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
TPM flow using OV database
2. Distributor
1. OV created and signed
with OEM key
2. TPM configured and
shipped to OEM
3. OVs signed and sent as a
database to OEM
1. OEM
1. Orders FDO enabled
TPMs from Distributor
2. Provides their public key
to Distributor
4. OEM
1. OV taken from database
2. Signs OVs with End User
key and sends OVs to
End User
3. Assembles Device
4. Ships Device to installer
e.g. SI, end user etc.
3. End User
1. Orders FDO enabled
Devices
2. Provides their public key
to OEM
6. Installer
1. Installs devices
2. Runs FDO
3. Device onboards to End
User platform
5. End User
1. Registers OV with target
platform/RV server.
14
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
Advantages of pre-programmed TPM
● Simplifies flow for OEMs
○ No need to sign OV in ‘real-time’ on production line
■ OVs are extracted and then can be signed off line
○ OEM does not need to integrate and run manufacturing tool as part of their manufacturing flow
○ Approach works well for low and higher volumes
● Supports non-embedded OV model
○ Distributor can send a database of signed OVs to the OEM which can then be signed over to
End User off line.
15
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
Summary
● OPTIGATM TPMs are a highly effective and secure way of storing FDO
credentials
● Infineon and Avnet have created a pre-programmed TPM concept for FDO
that they believe can simplify FDO adoption.
● OEM/ODM feedback on the concept is greatly welcomed
● A specification for TPM use with FDO, co-written by Infineon, is available on
the FIDO Alliance website.
○ https://fidoalliance.org/specs/FDO/securing-fdo-in-tpm-v1.0-rd-20231010/securing-fdo-in-tpm-
v1.0-rd-20231010.pdf
16
Copyright © Infineon Technologies AG 2024. All rights reserved.
restricted
04.2024
Infineon Security Partner Network (ISPN)

Recommended for you

Gadgeon profile
Gadgeon profileGadgeon profile
Gadgeon profile

Gadgeon Systems presents their business proposition for product engineering services in Internet of Things (IoT). They have expertise in system architecture, hardware development, embedded firmware, Linux and networking, wireless technologies, cloud/server applications, and mobile app development. Gadgeon consists of 90 team members split between hardware and software and has two business units - one focused on embedded systems for IoT and another on home automation. They aim to provide end-to-end IoT solutions and services to clients.

Profinet network design webinar - Peter Thomas may 2020 - v1.0
Profinet network design webinar - Peter Thomas   may 2020 - v1.0Profinet network design webinar - Peter Thomas   may 2020 - v1.0
Profinet network design webinar - Peter Thomas may 2020 - v1.0

Particularly relevant to people responsible for the design of PROFINET networks, highlighting the common errors and assumptions made that could make on-going support of the network rather difficult.

profinetprofinet system design
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.

Koichi Moriyama of NTT DOCOMO gave a presentation on the company's deployment of FIDO standards for strong authentication. NTT DOCOMO launched FIDO-enabled authentication using biometric sensors on devices for logging into d ACCOUNT and making carrier billing payments in 2015. They have continued expanding FIDO support to more devices and services. The presentation covered NTT DOCOMO's motivation, deployment overview, integration of FIDO standards, and the security and architecture of their FIDO implementation.

authentication trendstwo-factor authenticationauthentication
17

More Related Content

Similar to Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf

Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
FIDO Alliance
 
HKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: IntroductionHKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: Introduction
Linaro
 
UNSPresentation
UNSPresentationUNSPresentation
UNSPresentation
John Tellis
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
Dan Mårtensson
 
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische Wiegesysteme
ZeljkoJurca
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender
Ted Jurca
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM France Lab
 
Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensed
team-WIBU
 
FTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxFTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptx
RicardoAndino9
 
OPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge DevicesOPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge Devices
Sadatulla Zishan
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
Communication Devices Inc
 
Gadgeon profile
Gadgeon profileGadgeon profile
Gadgeon profile
SREERAJ NAIR
 
Profinet network design webinar - Peter Thomas may 2020 - v1.0
Profinet network design webinar - Peter Thomas   may 2020 - v1.0Profinet network design webinar - Peter Thomas   may 2020 - v1.0
Profinet network design webinar - Peter Thomas may 2020 - v1.0
PROFIBUS and PROFINET InternationaI - PI UK
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
FIDO Alliance
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
LINE Corporation
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
team-WIBU
 
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010
Alvaro Roldan Peral
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
Satya Harish
 

Similar to Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf (20)

Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
HKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: IntroductionHKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: Introduction
 
UNSPresentation
UNSPresentationUNSPresentation
UNSPresentation
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische Wiegesysteme
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
 
Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensed
 
FTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxFTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptx
 
OPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge DevicesOPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge Devices
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 
Gadgeon profile
Gadgeon profileGadgeon profile
Gadgeon profile
 
Profinet network design webinar - Peter Thomas may 2020 - v1.0
Profinet network design webinar - Peter Thomas   may 2020 - v1.0Profinet network design webinar - Peter Thomas   may 2020 - v1.0
Profinet network design webinar - Peter Thomas may 2020 - v1.0
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 

More from FIDO Alliance

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdfFIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdfFIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdfFIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdfFIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdfFIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
FIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
FIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
FIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
FIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
FIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
FIDO Alliance
 

More from FIDO Alliance (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdfFIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
 
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdfFIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdfFIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdf
 
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdfFIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdfFIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

Recently uploaded

How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 

Recently uploaded (20)

How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 

Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf

  • 1. 1 restricted Liam Cheng April 2024 Simplified FDO manufacturing flow with TPMs
  • 2. 2 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 Infineon is a global leader in power systems and IoT 2 Market position Automotive #1 TechInsights, March 2023 1 As of 30 September 2023 Power #1 Omdia, September 2023 Security #1 ABI Research, October 2023 employees1 ~58,600 in automotive, power management, energy efficient technologies and IoT Global leader
  • 3. 3 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 We build trust in a connected world Security controller Security controller, sofware & host software Security controller, software & host software OPTIGA TPM OPTIGA TPM OPTIGA Trust eSIM V2X Security controller & software OPTIGA Authenticate Seamless secured transactions Verifying identities Securing the IoT Fighting Counterfeits
  • 4. 4 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 The Trusted Platform Module (TPM) “The safe for your platform” › Reduced implementation costs › Minimized integration risk › Proven security › Tamper-resistant hardware › Key and authentication protect › Used in computing for over 20 years › Widely adopted by new use cases › Security of hardware and software independently evaluated Security chip standardized by Trusted Computing Group (TCG) Widely used in board applications Designed to resist logical and physical attacks Certified by third-party (Common Criteria/ FIPS) TPM “The for your platform"
  • 5. 5 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 Laptop Server Network Interface Card Switches Firewall 5G access point Storage area network Enterprise router Google Mesh Router Surveillance Camera EV Charging Station Printer IoT gateway Wireless Access point Fleet management Existing products with OPTIGA TPM 2.0
  • 6. 6 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 ‒ TPM, a hardware module that provides secure credential storage and trusted implementations of cryptography, combines well with FDO. ‒ TPMs can store credentials for FDO securely, and it provides the basic asymmetric cryptography for FDO’s authentication. ‒ FDO, in turn, can work with TPMs to provision application keys and certificates into TPM, allowing customers to have private key materials with chains of trust matching their organizational requirements. ‒ TPMs can potentially also be used to store FDO factory credentials, allowing devices to adopt FDO without a change to the manufacturing line. TPM and FDO https://fidoalliance.org/wp-content/uploads/2022/12/IoT-Application- Provisioning-for-Security-Using-FDO-and-TPM-White-Paper.pdf
  • 7. 7 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 Specification for FDO credential storage in a TPM https://fidoalliance.org/specs/FDO/securing-fdo-in-tpm-v1.0-rd-20231010/securing-fdo-in-tpm-v1.0-rd-20231010.pdf
  • 8. 8 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 How FDO works Device Manufacturer 3 Load Ownership Voucher (OV) to Cloud Device in box shipped to installation location 1 Ownership Voucher (OV) FDO Manufacturing tool FDO Client, Credentials path to RV server a. FDO agent & FDO credentials places in device. b. Ownership Voucher (OV) created 8 7 a. Mutual authentication takes place b. Secure channel is established c. Onboarding takes place using FSIM’s Device given network connectivity and powers up Target Cloud 🡨 Application Data / Control 🡨 Cloud Managed, Device data flows FDO owner 5 Device contacts RV and is re-directed to Cloud 6 Rendezvous server (RV) 4 Register OV with Rendezvous Server FDO Client & credentials 2 Onboarding Data 🡨
  • 9. 9 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 Standard TPM programming model 2. Distributor 1. TPMs shipped to OEM 1. OEM 1. Orders FDO TPMs from Distributor 4. OEM 1. Creates OV with manufacturing tool 2. Programs TPM and sends OV to End User 3. Assembles Device with TPM 4. Ships Device to installer e.g. SI, end user etc. 3. End User 1. Orders FDO enabled Devices 2. Provides their public key to OEM 6. Installer 1. Installs devices 2. Runs FDO 3. Device onboards to End User platform 5. End User 1. Registers OV with target platform/RV server.
  • 10. 10 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 Pre-programmed TPM concept • To simplify the OEM manufacturing flow, Infineon in conjunction with Avnet have created a pre-programmed TPM concept for FDO. • In this approach, Avnet would pre-program the TPMs with FDO credentials and then ship the TPM to the OEM for installation. • The Ownership Voucher (OV) can be stored in the TPM or can be sent as a database file to the OEM TPM FDO credential Ownership Voucher ODM board or final device Pre-programmed TPMs shipped to ODM or OEM TPM FDO credential Ownership Voucher TPMs Pre-programmed by Avnet OS with FDO Client OV is extracted, signed and shipped
  • 11. Avnet TPM personalization services ● The OPTIGATM TPM is a turnkey security solution ● Avnet offers an industry first custom programming service for security devices. ● This personalization service makes it easier for customers to integrate embedded custom security into their products independent of their security experience or volumes.
  • 12. 12 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 TPM flow using embedded OV approach 2. Distributor 1. OV created and signed with OEM key 2. TPM configured and shipped to OEM with embedded OV 1. OEM 1. Orders FDO enabled TPMs from Distributor 2. Provides their public key to Distributor 4. OEM 1. Extracts OV from TPM 2. Signs OV with End User key and sends OV to End User 3. Assembles Device 4. Ships Device to installer e.g. SI, end user etc. 3. End User 1. Orders FDO enabled Devices 2. Provides their public key to OEM 6. Installer 1. Installs devices 2. Runs FDO 3. Device onboards to End User platform 5. End User 1. Registers OV with target platform/RV server.
  • 13. 13 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 TPM flow using OV database 2. Distributor 1. OV created and signed with OEM key 2. TPM configured and shipped to OEM 3. OVs signed and sent as a database to OEM 1. OEM 1. Orders FDO enabled TPMs from Distributor 2. Provides their public key to Distributor 4. OEM 1. OV taken from database 2. Signs OVs with End User key and sends OVs to End User 3. Assembles Device 4. Ships Device to installer e.g. SI, end user etc. 3. End User 1. Orders FDO enabled Devices 2. Provides their public key to OEM 6. Installer 1. Installs devices 2. Runs FDO 3. Device onboards to End User platform 5. End User 1. Registers OV with target platform/RV server.
  • 14. 14 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 Advantages of pre-programmed TPM ● Simplifies flow for OEMs ○ No need to sign OV in ‘real-time’ on production line ■ OVs are extracted and then can be signed off line ○ OEM does not need to integrate and run manufacturing tool as part of their manufacturing flow ○ Approach works well for low and higher volumes ● Supports non-embedded OV model ○ Distributor can send a database of signed OVs to the OEM which can then be signed over to End User off line.
  • 15. 15 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 Summary ● OPTIGATM TPMs are a highly effective and secure way of storing FDO credentials ● Infineon and Avnet have created a pre-programmed TPM concept for FDO that they believe can simplify FDO adoption. ● OEM/ODM feedback on the concept is greatly welcomed ● A specification for TPM use with FDO, co-written by Infineon, is available on the FIDO Alliance website. ○ https://fidoalliance.org/specs/FDO/securing-fdo-in-tpm-v1.0-rd-20231010/securing-fdo-in-tpm- v1.0-rd-20231010.pdf
  • 16. 16 Copyright © Infineon Technologies AG 2024. All rights reserved. restricted 04.2024 Infineon Security Partner Network (ISPN)
  • 17. 17