Intel® Secure Device Onboard

Leverage a hardware-based identity to enable simple and trusted automatic IoT device onboarding using device management services.

Request Access

Get Started

Why Is Approval Required?

Securely Connect with Zero-Touch Automation

Replace manual provisioning that can take 30 minutes per device with a dynamic IoT platform discovery method that provides rapid, safeguarded onboarding at scale.

Enable Trusted & Protected Devices

Leverage the Intel® Enhanced Privacy ID (Intel® EPID) to trusted devices from malicious interference during the manufacturing, distribution, integration, and provisioning processes.

Ecosystem Enablement Tools for Scale

Use our toolkits and APIs to rapidly integrate with device manufacturing, procurement, and inventory systems.

Solutions Overview & Implementation Steps

MANUFACTURING

1. Use a manufacturer workstation to run the device initialization software package.
2. Connect a platform enabled with Intel EPID to the manufacturer workstation.
3. Ship devices and send manifests containing security credentials to your supply chain.

DISTRIBUTION

1. Receive devices and security ledgers from the ODM or OEM.
2. Exchange and verify credentials.
3. Ship devices and send security ledgers to customers.

SYSTEMS INTEGRATION

1. Prepare the base image for the device.
2. Exchange and verify credentials.
3. Upload the customer's security credentials to the cloud management platform.

DEVICE MANAGEMENT

1. Enable the transfer of ownership protocol services.
2. Integrate data import requirements into the device management platform.
3. Import security credentials from the customer or system integrator.

INSTALLATION

1. Power on the devices and connect them to the internet.
2. Log on to the management console.
3. Verify that the devices are successfully onboarded.

Protect the Supply Chain with Credentials

An IoT device risks being breached by malicious entities (such as malware) unless a life cycle security model is enacted. You can now access a set of APIs that integrate supply chain security into your inventory management and enterprise resource planning (ERP) workflows.

Here's how it works:

  • Devices are built with device credentials.
  • Manufacturers sell devices and send their security credentials to distributors.
  • Distributors sell devices to solution providers after signing public keys from system integrator during the ordering process.
  • System integrators sign public keys from customers during the ordering process.
  • Manifests allow manufacturers to safely extend device ownership (while it is still boxed) via PKI-based key exchanges and signatures.

Ecosystem

Intel® Secure Device Onboard works with a growing ecosystem of silicon providers, manufacturers, and IoT platforms.

SILICON PROVIDERS (WITH INTEL EPID)

ODM, OEM, & DISTRIBUTORS

IOT PLATFORMS

Contact us if you are an ODM or OEM who is interested in joining our partner program or enabling this solution for your customers.