Anti-cloning Protection for Conditional Access and DRM Systems

As a cost-effective factory provisioning system, Certicom KeyInject™ protects against the growing device cloning threat from third party contract manufacturers. It is a core component of the Certicom Trusted Infrastructure™ and focuses in controlling and reporting on the volume of keyed devices at manufacture time. This helps protect a company's investment from black market device threats and complements conditional access and DRM systems.

What it Does

Using industry-standard protocols and techniques based on ECC and AES, Certicom KeyInject™ makes it possible to track contract manufacturer production of devices by controlling access to keying information. It then allows producers to monitor the use of this information through automated metering, with results reported back to authorized overseers.

Benefits

Anti-cloning That’s Powerful and Proven
Through hardware-based protection of internal and third-party keys.

Factory Provisioning That’s Cost-effective
By automating key-injection before devices reach their users for a more secure, more economical process.

DRM and Conditional Access Support
Using a customizable interface that integrates easily with existing manufacturing systems.

Conditional Access and DRM Support
By transporting and injecting keys and certificates within conditional access and DRM schemes such as HDCP, CPRM and others.

Certicom KeyInject™ Modules

  • Certicom KeyInject™ Controller - trusted key management and reporting system for producer site
  • Certicom KeyInject™ Appliance - trusted key injection and metering for manufacturer site
  • Key Source - custom key generator/third-party key loader
  • Customization Services - interface to manufacturing-line equipment