System and method for zero touch provisioning of IoT devices
11595217 · 2023-02-28
Assignee
Inventors
- Srinivas Kumar (Cupertino, CA)
- Atul Gupta (Sunnyvale, CA)
- Shreya Uchil (Millbrae, CA, US)
- Ruslan Ulanov (Dublin, CA, US)
- Srikesh Amrutur Srinivas (Cupertino, CA, US)
Cpc classification
H04L9/0891
ELECTRICITY
H04L9/3263
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
Abstract
For zero-touch provisioning of devices at scale using device configuration templates by device type, a secure element, a provisioning wizard, a provisioning client, an enrollment client, an update client, an enrollment service, an update publisher service, signing and encryption certificates, a method including generating device configuration templates for enrollment and update by device type, sending device configuration templates signed with a device owner signing certificate, and a device owner encryption certificate to the device manufacturer, generating a device configuration for a device based on the device configuration templates using a secure element on the device for immutable device identity, an extended configuration for the device, signing the device configuration with a device manufacturer signing certificate and a secure element signing certificate, encrypting the doubly signed device configuration with an owner encryption certificate, configuring bootstrap metadata, and configuring the device provisioning client to autostart at power-on for device enrollment and update.
Claims
1. A method for zero touch provisioning of network connected devices using a secure element, a provisioning client, an enrollment client and an update client on a device, and an enrollment service and an update publisher service on a device management service, the method comprising: powering on the device, by a field operator, with the device configured to autostart the provisioning client; executing, at power-on by the provisioning client, the enrollment client on the device; generating, by the enrollment client, an asymmetric public-private keypair based on a device enrollment configuration using the secure element; sending, by the enrollment client to the enrollment service, a certificate signing request for a public key of the generated asymmetric public-private keypair that includes at least an encryption certificate of the secure element; issuing, by the enrollment service, a device certificate encrypted with a symmetric key protected with the encryption certificate of the secure element; unwrapping, by the secure element, the wrapped symmetric key; extracting, by the enrollment client, the device certificate using the unwrapped symmetric key for decryption to generate a decrypted device certificate; storing, by the enrollment client, the decrypted device certificate at power on; executing, at power-on by the provisioning client, the update client on the device; sending, by the update client to the update publisher service, a request for an update package with device attributes and the device certificate based on a device update configuration; sending, by the update publisher service to the update client, an update package, signed at least with an update publisher certificate and encrypted with an encryption key that is wrapped with the public key associated with the device certificate; unwrapping, by the secure element, the encryption key using a private key associated with the device certificate; decrypting, by the update client, the update package using the unwrapped encryption key; verifying, by the update client, the decrypted update package using the update publisher certificate; and applying, by the update client, the verified update package on the device to update the device at power on.
2. A method of claim 1, wherein the certificate signing request may further be signed with a platform signing certificate issued by the secure element.
3. A method of claim 1, wherein the update client may further send a list of updates packages applied on the device to the update publisher service, and query the update publisher service for a list of additional update packages to be applied on the device.
4. A method of claim 1, wherein the device enrollment configuration may include a schedule for periodic certificate renewal requests by the enrollment client for zero-touch lifecycle management of device certificates.
5. A method of claim 1, wherein the device enrollment configuration may include a tenant label to associate the device to a tenant in a multi-tenant configuration of the device management service.
6. A method of claim 1, wherein the device enrollment configuration may include a tenant label to associate the device to a certificate authority of a tenant in a multi-tenant configuration of the device management service.
7. A method of claim 1, wherein the device update configuration may include a schedule for periodic update requests by the update client for zero-touch lifecycle management of device updates.
8. A method of claim 1, wherein the update package may further be signed with an update provider signing certificate associated with the device management service.
9. A non-transitory computer readable medium for zero touch provisioning of network connected devices using a secure element, a provisioning client, an enrollment client and an update client on a device, and an enrollment service and an update publisher service on a device management service, the non-transitory computer readable medium storing computer executable instructions that, when loaded into computer memory and executed by a processor of the device, cause the device to: power on the device, by a field operator, with the device configured to autostart the provisioning client; execute, at power-on by the provisioning client, the enrollment client on the device; generate, by the enrollment client, an asymmetric public-private keypair based on a device enrollment configuration using a secure element; send, by the enrollment client to the enrollment service, a certificate signing request for a public key of the generated asymmetric public-privatge keypair that includes at least an encryption certificate of the secure element; issue, by the enrollment service, a device certificate encrypted with a symmetric key protected with the encryption certificate of the secure element; unwrap, by the secure element, the symmetric key; extract, by the enrollment client, the device certificate using the unwrapped symmetric key for decryption to generate a decrypted device certificate; store, by the enrollment client, the decrypted device certificate at power on; execute, at power-on by the provisioning client, the update client on the device; send, by the update client to the update publisher service, a request for an update package with device attributes and the device certificate based on a device update configuration; send, by the update publisher service to the update client, an update package, signed at least with an update publisher certificate and encrypted with an encryption key that is wrapped with the public key associated with the device certificate; unwrap, by the secure element, the encryption key using a private key associated with the device certificate; decrypt, by the update client, the update package using the unwrapped encryption key; verify, by the update client, the decrypted update package using the update publisher certificate; and apply, by the update client, the verified update package on the device to update the device at power on.
10. The non-transitory computer readable medium of claim 9, wherein the certificate signing request may further be signed with a platform signing certificate issued by the secure element.
11. The non-transitory computer readable medium of claim 9, wherein the update client may further send a list of updates packages applied on the device to the update publisher service, and query the update publisher service for a list of additional update packages to be applied on the device.
12. The non-transitory computer readable medium of claim 9, wherein the device enrollment configuration may include a schedule for periodic certificate renewal requests by the enrollment client for zero-touch lifecycle management of device certificates.
13. The non-transitory computer readable medium of claim 9, wherein the device enrollment configuration may include a tenant label to associate the device to a tenant in a multi-tenant configuration of the device management service.
14. The non-transitory computer readable medium of claim 9, wherein the device enrollment configuration may include a tenant label to associate the device to a certificate authority of a tenant in a multi-tenant configuration of the device management service.
15. The non-transitory computer readable medium of claim 9, wherein the device update configuration may include a schedule for periodic update requests by the update client for zero-touch lifecycle management of device updates.
16. The non-transitory computer readable medium of claim 9, wherein the update package may further be signed with an update provider signing certificate associated with the device management service.
17. A computing device for zero touch provisioning of network connected devices using a secure element, a provisioning client, an enrollment client and an update client on the computing device, and an enrollment service and an update publisher service on a device management service, the computing device comprising: a memory circuit storing computer executable instructions; and a processing device, wherein execution of the computer executable instructions by the processing device, causes the processing device to: power on the computing device, by a field operator, with the computing device configured to autostart the provisioning client; execute, at power-on by the provisioning client, the enrollment client on the computing device; generate, by the enrollment client, an asymmetric public-private keypair based on a device enrollment configuration using a secure element; send, by the enrollment client to the enrollment service, a certificate signing request a public key of the generated asymmetric public-private keypair that includes at least an encryption certificate of the secure element; issue, by the enrollment service, a device certificate encrypted with a symmetric key protected with the encryption certificate of the secure element; unwrap, by the secure element, the symmetric key; extract, by the enrollment client, the device certificate using the unwrapped symmetric key for decryption to generate a decrypted device certificate; store, by the enrollment client, the decrypted device certificate at power on; execute, at power-on by the provisioning client, the update client on the computing device; send, by the update client to the update publisher service, a request for an update package with device attributes and the device certificate based on a device update configuration; send, by the update publisher service to the update client, an update package, signed at least with an update publisher certificate and encrypted with an encryption key that is wrapped with the public key associated with the device certificate; unwrap, by the secure element on the computing device, the wrapped encryption key using the private key associated with the device certificate; decrypt, by the device update client, the received update package using the unwrapped encryption key; verify, by the device update client, the decrypted update package using the update publisher signing certificate; and apply, by the device update client, the verified update package on the computing device to update the computing device at power on.
18. The computing device of claim 17, wherein the certificate signing request may further be signed with a platform signing certificate issued by the secure element.
19. The computing device of claim 17, wherein the update client may further send a list of updates packages applied on the computing device to the update publisher service, and query the update publisher service for a list of additional update packages to be applied on the computing device.
20. The computing device of claim 17, wherein the update package may further be signed with an update provider signing certificate associated with the device management service.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The disclosure is best understood from the following detailed description when read in connection with the accompanying drawings. According to common practice, various features/elements of the drawings may not be drawn to scale. Common numerical references represent like features/elements. The following figures are included in the drawings:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12) Further areas of applicability of the present disclosure will become apparent from the detailed description provided hereinafter. It should be understood that the detailed description of exemplary embodiments are intended for illustration purposes only and are, therefore, not intended to necessarily limit the scope of the disclosure.
DETAILED DESCRIPTION
(13) Although the disclosure is illustrated and described herein with reference to specific embodiments, the disclosure is not intended to be limited to the details shown herein. Rather, various modifications may be made in the details within the scope and range of equivalents of the claims and without departing from the scope of the disclosure.
(14) The secure element may be a hardware (for example, a trusted platform module (TPM), Intel® EPID, Arm® TrustZone), firmware, or software based root of trust. The secure element may be implemented as an application root of trust service in a trusted memory enclave.
(15) The device enrollment configuration template may comprise of at least a device enrollment service network address (for example a uniform resource locator (URL), an IP address and a port number), a device authentication profile (a local database or Lightweight Directory Access Protocol (LDAP) account on the enrollment service, and an encoded password), and a label for tenant and certificate authority attribution.
(16) The device unique subject identifier (or common name) for device enrollment operations may be based on an immutable device identifier provided by a secure element.
(17) The device update configuration may comprise of at least an operation mode (such as, for example, network connected, on demand, air gapped), device update publisher server network address (for example a uniform resource locator (URL), an IP address and a port number), a key store, a trust store, device keys and certificates, update publisher signing certificates, update provider signing certificates, a plurality of issuer signing certificates, device properties, platform properties, update client settings, a schedule for update requests, and a device signing certificate.
(18) The device configuration template may comprise of at least the device type attributes (such as for example, device properties and platform properties), the update publisher service network address (for example a uniform resource locator (URL), an IP address and a port number), the key store and trust store location for keys and certificates.
(19) The extended configuration may comprise of device unique properties (for example a device serial number, a network interface MAC address, etc.) and/or group properties (for example, a functional subsystem, a VLAN identifier, a mission code, etc.).
(20) The device configuration for a device may comprise of at least a device enrollment configuration that may be stored at a designated location on the device, and a device update configuration that may be stored at a designated location on the device.
(21) Referring to
(22) In one exemplary embodiment of the proposed method, the device owner (administrator) 102 may use a client application 114 with service APIs (124) to export the enrollment configuration template by device account at step 148 from the enrollment service 118.
(23) In one exemplary embodiment of the proposed method, the device owner (administrator) 102 may use a client application 114 with service APIs (126) to export the update configuration template by device type at step 146 from the update publisher service 118.
(24) Referring to
(25) Referring to
(26) Referring to
(27) In one exemplary embodiment of the proposed method, the extended configuration may be provided via a dynamic plugin module and exported APIs (not shown in
(28) In one exemplary embodiment of the proposed method, the bootstrap metadata 330 may comprise of a device authentication profile (a local database account or a Lightweight Directory Access Protocol (LDAP) account on a directory service (not shown in
(29) Referring to
(30) Referring to
(31) Referring to
(32) Referring to
(33) Referring to
(34) Referring to
(35) In one exemplary embodiment of the proposed method, the update publisher and update provider signing certificates may be explicitly loaded into the trust store on device 108.
(36) In one exemplary embodiment of the proposed method, at step 620 the device publisher service 122 may fetch from an update provider service 618 an update package signed with an update provider signing key, co-sign the update package with an update publisher signing key and associate the doubly signed update package for a device type.
(37) In one exemplary embodiment of the proposed method, the device update client 208 may send a list of updates packages applied on device 108 to the update publisher service 122, and query the update publisher service 122 for a list of additional update packages to be applied on device 108.
(38) In yet another exemplary embodiment of the proposed method, the update publisher service 122 may provide a replacement update package for an applied update package on device 108 for zero-touch patch management.
(39) Referring to
(40) Referring to
(41) Referring to
(42)
(43) If programmable logic is used, such logic may execute on a commercially available processing platform or a special purpose device. One of ordinary skill in the art may appreciate that embodiments of the disclosed subject matter can be practiced with various computer system configurations, including multi-core multiprocessor systems, minicomputers, mainframe computers, computers linked or clustered with distributed functions, as well as pervasive or miniature computers that may be embedded into virtually any device.
(44) For instance, at least one processor device and a memory may be used to implement the above-described embodiments. A processor device may be a single processor, a plurality of processors, or combinations thereof. Processor devices may have one or more processor “cores.”
(45) Various embodiments of the disclosure are described in terms of this example computer system 1000. After reading this description, it will become apparent to a person skilled in the relevant art how to implement the disclosure using other computer systems and/or computer architectures. Although operations may be described as a sequential process, some of the operations may in fact be performed in parallel, concurrently, and/or in a distributed environment, and with program code stored locally or remotely for access by single or multi-processor machines. In addition, in some embodiments the order of operations may be rearranged without departing from the spirit of the disclosed subject matter.
(46) Processor device 1002 may be a special purpose or a general-purpose processor device. As will be appreciated by persons skilled in the relevant art, processor device 1002 may also be a single processor in a multi-core/multiprocessor system, such system operating alone, or in a cluster of computing devices operating in a cluster or server farm. Processor device 1002 is connected to a communication infrastructure 1026, for example, a bus, message queue, network, or multi-core message-passing scheme.
(47) The computer system 1000 also includes a main memory 1004, for example, random access memory (RAM) or flash memory, and may include a secondary memory 1006. Secondary memory 1006 may include, for example, a hard disk drive 1008, removable storage drive 1010. Removable storage drive 1010 may be a floppy disk drive, a magnetic tape drive, an optical disk drive, a flash memory, or the like.
(48) The removable storage drive 1012 reads from and/or writes to a removable storage unit 1012 in a well-known manner. Removable storage unit 1012 may be a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by removable storage drive 1010. As will be appreciated by persons skilled in the relevant art, removable storage unit 1012 includes a non-transitory computer usable storage medium having stored therein computer software and/or data.
(49) In alternative implementations, secondary memory 1006 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 1000. Such means may include, for example, a removable storage unit 1016 and an interface 1014. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, and other removable storage units 1016 and interfaces 1014 which allow software and data to be transferred from the removable storage unit 1016 to computer system 1000.
(50) The computer system 1000 may also include a communications interface 1418. Communications interface 1018 allows software and data to be transferred between computer system 1000 and external devices. Communications interface 1018 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, or the like. Software and data transferred via communications interface 1018 may be in the form of signals, which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 1018. These signals may be provided to communications interface 1018 via a communications path 1020. Communications path 1020 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link or other communications channels.
(51) The computer system 1000 may also include a computer display 1024 and a display interface 1022. According to embodiments, the display used to display the GUIs and dashboards shown in
(52) In this document, the terms “computer program medium,” “non-transitory computer readable medium,” and “computer usable medium” are used to generally refer to media such as removable storage unit 1012, removable storage unit 1016, and a hard disk installed in hard disk drive 1008. Signals carried over communications path 1020 can also embody the logic described herein. Computer program medium and computer usable medium can also refer to memories, such as main memory 1004 and secondary memory 1006, which can be memory semiconductors (e.g., DRAMs, etc.). These computer program products are means for providing software to computer system 1000.
(53) Computer programs (also called computer control logic) are stored in main memory 1004 and/or secondary memory 1006. Computer programs may also be received via communications interface 1018. Such computer programs, when executed, enable computer system 1000 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor device 1002 to implement the processes of the present disclosure, such as the stages in the methods illustrated by the flowcharts in
(54) Embodiments of the disclosure also may be directed to computer program products comprising software stored on any computer useable medium. Such software, when executed in one or more data processing device, causes a data processing device(s) to operate as described herein. Embodiments of the disclosure employ any computer useable or readable medium. Examples of computer useable mediums include, but are not limited to, primary storage devices (e.g., any type of random access memory, etc.), secondary storage devices (e.g., hard drives, floppy disks, CD ROMS, ZIP disks, tapes, magnetic storage devices, and optical storage devices, MEMS, nanotechnological storage device, etc.), and communication mediums (e.g., wired and wireless communications networks, local area networks, wide area networks, intranets, etc.).
CONCLUSION
(55) It is to be appreciated that the Detailed Description section, and not the Summary and Abstract sections, is intended to be used to interpret the claims. The Summary and Abstract sections may set forth one or more but not all exemplary embodiments of the present disclosure as contemplated by the inventor(s), and thus, are not intended to limit the present disclosure and the appended claims in any way.
(56) Embodiments of the present disclosure have been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed.
(57) The foregoing description of the specific embodiments will so fully reveal the general nature of the disclosure that others can, by applying knowledge within the skill of the art, readily modify and/or adapt for various applications such specific embodiments, without undue experimentation, without departing from the general concept of the present disclosure. Therefore, such adaptations and modifications are intended to be within the meaning and range of equivalents of the disclosed embodiments, based on the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by the skilled artisan in light of the teachings and guidance. Reference to an element in the singular is not intended to mean “one and only one” unless explicitly so stated, but rather “one or more.” Moreover, where a phrase similar to “at least one of A, B, or C” is used in the claims, it is intended that the phrase be interpreted to mean that A alone may be present in an embodiment, B alone may be present in an embodiment, C alone may be present in an embodiment, or that any combination of the elements A, B and C may be present in a single embodiment; for example, A and B, A and C, B and C, or A and B and C. No claim element herein is to be construed under the provisions of 35 U.S.C. 112(f) unless the element is expressly recited using the phrase “means for.” As used herein, the terms “comprises,” “comprising,” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
(58) Although the present disclosure is illustrated and described herein with reference to specific embodiments, the disclosure is not intended to be limited to the details shown. Rather, various modifications may be made in the details within the scope and range equivalents of the claims and without departing from the disclosure.