As a cost-effective factory provisioning system, Certicom KeyInject™ protects against the growing device cloning threat from third party contract manufacturers. It is a core component of the Certicom Trusted Infrastructure™ and focuses in controlling and reporting on the volume of keyed devices at manufacture time. This helps protect a company's investment from black market device threats and complements conditional access and DRM systems.
Using industry-standard protocols and techniques based on ECC and AES, Certicom KeyInject™ makes it possible to track contract manufacturer production of devices by controlling access to keying information. It then allows producers to monitor the use of this information through automated metering, with results reported back to authorized overseers.
Anti-cloning That’s Powerful and Proven
Through hardware-based protection of internal and third-party keys.
Factory Provisioning That’s Cost-effective
By automating key-injection before devices reach their users for a more secure, more economical process.
DRM and Conditional Access Support
Using a customizable interface that integrates easily with existing manufacturing systems.
Conditional Access and DRM Support
By transporting and injecting keys and certificates within conditional access and DRM schemes such as HDCP, CPRM and others.