SlideShare a Scribd company logo
1 of 18
Download to read offline
Identity Based Lifecycle Management for a
Trusted IoT Supply Chain
IoT Device Security Summit
October 30th, 2018
Tom Katsioulas
Unrestricted © 2018 - New Ventures Group of Mentor, a Siemens Business Realize Innovation
Page 2
Smart-Connected Product Supplier Economics
*Source: Harvard Business Review
• No traceability or configurability
• High OPEX, low differentiation
Old Supplier Product Variants
Supply Chain & Field Use
Established Connected Devices Evolving Connected Devices Emerging Connected Devices
• Better visibility on product field use
• Remote lifecycle management
• Reduced support costs and RMAs
• Lower OPEX, higher differentiation
• New services and business models
• Trust, security and safety issues
Smart
Connected
Supplier*
Managed Products
Field Usage Analytics
Managed
Device Lifecycle
Page 3
Device Lifecycle Security & Trust in Digital Supply Chain
Can we trust a system and its parts from multiple suppliers in the supply chain?
Gray MarketOverproduction Counterfeits Hacks/MalwareTrojans/Clones DDoS AttacksReverse Eng. Tampered Dev.
System TestCard TestFinal Test Self TestProbe TestFunctional Test
Wafer Chip PCB Device End ProductIC Design
ECU
OnboardingKey Injection
CM (EMS)OEMOSATFoundry Field UseDistributorChip Maker Merchant
Page 4
Classic Hacks Traced to Supply Chain Issues
The roots of security issues lie in the structure of the electronics industry at large
HW + SW from XiongMai exploited to
create the massive Mirai botnet
The Big Hack  Supermicro
Bloomberg animation showing the alleged malicious component in the Supermicro
server motherboards positioned between the SOIC-16 SPI flash chip and the BMC.
Mirai botnet  Xiongmai
Page 5
Design
Tape-Out
Manufacturing
Package & Test
Provisioning
Assembly
Distribution Channels
Lack of Traceability from Chip to Cloud
Untrusted Supply Chain
Impossible to trace the chain of business liability when a security beach occurs
Apps
Updates
RMA Debug
Recycling
Hardware
Upgrades
Device
Control
Analytics
Onboarding
Firmware
Updates
Lifecycle
Management
Untrusted Field Use
Page 6
Charter of Trust and the Digital Supply Chain
Trusted identity and provenance are key for accountability* in the supply chain
www.charter-of-trust.com
*Source IDC: European IoT Security Why the IoT Supply Chain of Trust Matters
Authentication
Identity
Provenance
Accountability*
OCM
ODM
OEM
Page 7
Identity-based Lifecycle Management
System DesignIC Design Fab - OSAT Distribution Assembly Delivery OperatingOnboarding Recycling
• Establish Accountability &Trust
• Enable Identity-driven Services
• Improve Quality, Security, Safety
Configurability - ProvisioningTraceability - Monitoring
• Enable Onboarding & Personalization
• Provide OTA Updates & Manage RMAs
• Drive Higher Value Business Models
Field Use: Applications & ServicesSemiconductor Supply Chain Device Supply Chain
ECU
Identity Provenance
OCM - Chip ODM - Device OEM - System
ODMs - OEMs OperatorsIC Suppliers
Trusted Infrastructure
& Partnerships Needed
Page 8
Identity is Key for Enabling Chain of Trust
Inborn identity coupled with traceability infrastructure and trusted value chain
TPM Identity
*Trusted Platform Module
• Simple PCB Device ID
• BOM Cost (Extra ASIC)
• IC can be compromised
• No Chip Traceability
Inserted Identity
*Fused or Injected Secret
• ID Embedded in Chip
• Trusted Execution Env
• Can be tampered/cloned
• No Parts Traceability
Inborn Identity
*No Secret at Rest (power-off)
• ID from Mfg process
• TEE and Secure Enclave
• Physically Unclonable
• PCB Can Be Hacked
Unified Identity
*ID linked to Ownership (PO)
• Derived ID from all ICs
• ID factoring BOM in PCB
• Certified Device & Parts
• Trusted Suppliers Links
PCB Layout
IC Enrollment &
Trusted Device
Onboarding
ODMs - OEMs
Operators
IC Suppliers
+ Trusted Partners
Page 9
Identity Enables a Trusted IoT Value Chain
Ecosystem Enablement
Authentication, Provisioning, …
Connectivity, & Device Management
Firmware, Protocols, Applications,…
Data & Lifecycle Management
Field Operations & Services
Supply Chain Configurability (Provisioning)
Client
Embedded Systems
Identity Trusted Server
AuthenticationEnrollment
Trusted Device
Onboarding
Late Binding
& Key Mgmt.
Supply Chain Traceability (Distributed Trust Exchange)
RTOS
Page 10
Trusted Server
Identity Enables Trusted Lifecycle Services
System DesignIC Design Fab - OSAT Distribution Assembly Delivery
Apps
Updates
RMA
Debug
Hardware
Upgrades
Device
Control
Analytics
Firmware
Updates
OperatingOnboarding Recycling
Services
• Chip Authentication
• Chip Feature Provisioning
• Chip Authenticity Certification
• Key injection (Untrusted Facility)
• Firmware Injection (Untrusted Facility)
• Generic Data Injection / Extraction
• Identity-driven Device Onboarding
• OTA Firmware and App Updates
• RMA Debug (incl. IC Access Grant)
Chip ID Device ID Equipment ID
IoT Platforms
Cloud
Services
ODMs - OEMs OperatorsIC Suppliers
Traceability - Monitoring
Configurability - Provisioning
Enrollment
Page 11
Use Cases - Key & Feature Provisioning
One SKU product supporting many
standards provisioned on delivery
Multi Market Product
 Product performance can be increased
 Battery life can be extended (ala Tesla)
 RMAs can be diagnosed even inside chip
 Compromised systems can be disabled
 Ease adoption of new products/services
 Reduce recalls with in-field diagnostics
 Enable Hardware-as-a-Service business
 Deactivate stolen/unauthorized products
Offer differing charging speeds,
distance and tracking service
Electric Bike
Offer differing ranges (higher
power GPS) & contract duration
Pet Tracker
Remote
Provisioning
Value
Courtesy of GLOBALFOUNRIES and Siemens-Mentor
Page 12
Example - Automotive Supply Chain Challenges
• 7,000 semiconductor ICs on a premium car
• 1ppm failure rate = 7 failures for 1,000 cars
• 4,000 cars build per day = 1 failure per hour*
• Production failures plus electronics failures
Quality & Reliability Security & Safety
Securing Edge to Cloud Connectivity
• Many publicized hacks, millions of recalls
• Vulnerabilities from 100s of ECUs per car
• Gray market, clones, or counterfeit ICs
• Gb of data / day / car can be compromised
• Supply Chain Security
- Authorized Distributors
- Continuity of Supply
• Counterfeit Chips in
- ECUs & ABS Systems
- Airbag& Cruise control
• Over the Air Updates
- Firmware Changes
- Keys and Certificates
Source: Automotive Megatrends, Challenges and Solutions , SEMICON Europa 2015, Dresden
Page 13
Root cause on supply chain intrusions or system RMAs take months to detect and fix
IC Supplier
IC Design
Chip IDs Test Logs
CM (EMS)OEM/ODMOSATFoundry Field UseDistributor
Traceability +
Authenticity?
Example - Automotive Supply Chain Quality & Trust Issues
Parts Tests
Wafer 1 Wafer 2
Field Performance
System TestPCB TestFinal Test Self TestKey InjectionProbe Test
Gray MarketsOverproduction Counterfeits Hacks/MalwareIP Theft DDoS AttacksReverse Engineering
Page 14
Traceability
Supply Chain Analytics
Configurability
Provisioning and Updates
IC Design
• Engineering • Operations • Production • Procurement • Accounting
Chain of Custody
Distributed Ledger
Supply Chain Monitoring and Certification
Chip IDs Test Logs
System TestPCB TestFinal Test Self TestKey Injection
CM (EMS)OEM/ODMOSATFoundry Field UseDistributor
Traceability +
Authenticity?
Trusted
Protocol
Example - Automotive Supply Chain End-to-End Solution
Parts Tests
Wafer 1 Wafer 2
Field Performance
Predict Field Performance
Trace where issue occurred
Probe Test
Ops SKU Db Test Logs Test Logs BOM + Test IoT PlatformsOps SKU DbInject Logs
IC Supplier
Trusted
Services
Enrollment
Page 15
The Digital Thread and Digital Twin
The Digital Thread ties all of your data together,
from requirements through design all the way
to manufacturing and the field. We start with
this, as an enabler for the Digital Twin
The Digital Twin allows us to simulate the entire
supply chain, from requirements collection and
design to factory layout, capacity, scheduling,
processing, manufacturing and the field.
Page 16
Use Cases - Supply Chain Traceability
Why Did the Part Fail? Which IP Contributed to Failure?
Pre-Launch ATE Production ATE
Why Production ATE did not work as expected? Can we use ML* Process/Defect Characterization?
*ML: Machine Learning
Page 17
Economic Incentive for Trusted IoT Supply Chain
Value
Chip suppliers ODMs/OEMs App/Service Providers
• Reduce Production Cost
• Track/Provision SKUs in Field
• Prevent IP Theft and Clones
Enroll - Monitor - Provision
• Bind Apps to Chip Root of Trust
• Authenticate Device, not User
• Secure Content and Payments
Safeguard Users, Applications, Data
• Automate Device Onboarding
• Track/Update Devices in Field
• Enable Remote Debug & PLM
Monitor - Provision - Personalize
Configurability  Higher Value Business ModelsTraceability  Higher Trust, Quality, Safety
Hardware
as a Service
Page 18
Summary - Trusted Alliances in the IoT Value Chain
• IDMs and Pure Foundries
• Chip/OEM/ODM Suppliers
• Contract Manufacturers
• Chip & Device Distributors
• End Application Providers
• Operators & Service Providers
Trust will evolve through “round and round we go” business relationships
Circle of Trust

More Related Content

What's hot

Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Unanet
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuArm
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Keith Harris
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Keith Harris
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti
 
Developing functional safety systems with arm architecture solutions stroud
Developing functional safety systems with arm architecture solutions   stroudDeveloping functional safety systems with arm architecture solutions   stroud
Developing functional safety systems with arm architecture solutions stroudArm
 
Security Considerations on Hybrid Cloud
Security Considerations on Hybrid CloudSecurity Considerations on Hybrid Cloud
Security Considerations on Hybrid Clouddavsor1
 
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsKeith Harris
 
So you think developing an SoC needs to be complex or expensive?
So you think developing an SoC needs to be complex or expensive?So you think developing an SoC needs to be complex or expensive?
So you think developing an SoC needs to be complex or expensive?Arm
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune SystemJustin Hayward
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 

What's hot (14)

Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
Developing functional safety systems with arm architecture solutions stroud
Developing functional safety systems with arm architecture solutions   stroudDeveloping functional safety systems with arm architecture solutions   stroud
Developing functional safety systems with arm architecture solutions stroud
 
Security Considerations on Hybrid Cloud
Security Considerations on Hybrid CloudSecurity Considerations on Hybrid Cloud
Security Considerations on Hybrid Cloud
 
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
 
So you think developing an SoC needs to be complex or expensive?
So you think developing an SoC needs to be complex or expensive?So you think developing an SoC needs to be complex or expensive?
So you think developing an SoC needs to be complex or expensive?
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 

Similar to Identity-Based Lifecycle Management for a Trusted IoT Supply Chain

Pistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance European Conference 2015 - Stuart Robertson / ExostarPistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance European Conference 2015 - Stuart Robertson / ExostarPistoia Alliance
 
Securing your supply chain from counterfeit parts through real time electroni...
Securing your supply chain from counterfeit parts through real time electroni...Securing your supply chain from counterfeit parts through real time electroni...
Securing your supply chain from counterfeit parts through real time electroni...OptimalPlus
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
 
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...Edge AI and Vision Alliance
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Eurotech
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIMJT IoT
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Javaterrencebarr
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain
 
ConnectM Corporate Overview (jan 2014)
ConnectM Corporate Overview (jan 2014)ConnectM Corporate Overview (jan 2014)
ConnectM Corporate Overview (jan 2014)Abhijay Sisodia
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...NetworkCollaborators
 
Controls-Con 2019 | Business Track
Controls-Con 2019 | Business TrackControls-Con 2019 | Business Track
Controls-Con 2019 | Business TrackCochrane_Supply
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 parisMarcel Hartgerink
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Eurotech
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of ViewCisco Canada
 

Similar to Identity-Based Lifecycle Management for a Trusted IoT Supply Chain (20)

Pistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance European Conference 2015 - Stuart Robertson / ExostarPistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
 
Securing your supply chain from counterfeit parts through real time electroni...
Securing your supply chain from counterfeit parts through real time electroni...Securing your supply chain from counterfeit parts through real time electroni...
Securing your supply chain from counterfeit parts through real time electroni...
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
ConnectM Corporate Overview (jan 2014)
ConnectM Corporate Overview (jan 2014)ConnectM Corporate Overview (jan 2014)
ConnectM Corporate Overview (jan 2014)
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
 
Controls-Con 2019 | Business Track
Controls-Con 2019 | Business TrackControls-Con 2019 | Business Track
Controls-Con 2019 | Business Track
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 paris
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
 

Recently uploaded

GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024AHOhOops1
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxDineshKumar4165
 
BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024AHOhOops1
 
Not Sure About VW EGR Valve Health Look For These Symptoms
Not Sure About VW EGR Valve Health Look For These SymptomsNot Sure About VW EGR Valve Health Look For These Symptoms
Not Sure About VW EGR Valve Health Look For These SymptomsFifth Gear Automotive
 
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样gfghbihg
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHot Call Girls In Sector 58 (Noida)
 
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptUNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptDineshKumar4165
 
John Deere 300 3029 4039 4045 6059 6068 Engine Operation and Service Manual
John Deere 300 3029 4039 4045 6059 6068 Engine Operation and Service ManualJohn Deere 300 3029 4039 4045 6059 6068 Engine Operation and Service Manual
John Deere 300 3029 4039 4045 6059 6068 Engine Operation and Service ManualExcavator
 
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls  Size E6 (O525547819) Call Girls In DubaiDubai Call Girls  Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubaikojalkojal131
 
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607dollysharma2066
 
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERUNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERDineshKumar4165
 
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一fjjwgk
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...shivangimorya083
 
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一fhhkjh
 
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERUNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERunosafeads
 
Call Girls in Karachi | +923081633338 | Karachi Call Girls
Call Girls in Karachi  | +923081633338 | Karachi Call GirlsCall Girls in Karachi  | +923081633338 | Karachi Call Girls
Call Girls in Karachi | +923081633338 | Karachi Call GirlsAyesha Khan
 
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂Hot Call Girls In Sector 58 (Noida)
 
call girls in G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一ypfy7p5ld
 
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
 
BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024
 
Not Sure About VW EGR Valve Health Look For These Symptoms
Not Sure About VW EGR Valve Health Look For These SymptomsNot Sure About VW EGR Valve Health Look For These Symptoms
Not Sure About VW EGR Valve Health Look For These Symptoms
 
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Rice毕业证)莱斯大学毕业证成绩单修改留信学历认证原版一模一样
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
 
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptUNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
 
John Deere 300 3029 4039 4045 6059 6068 Engine Operation and Service Manual
John Deere 300 3029 4039 4045 6059 6068 Engine Operation and Service ManualJohn Deere 300 3029 4039 4045 6059 6068 Engine Operation and Service Manual
John Deere 300 3029 4039 4045 6059 6068 Engine Operation and Service Manual
 
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls  Size E6 (O525547819) Call Girls In DubaiDubai Call Girls  Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
 
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
 
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERUNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
 
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
 
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
 
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERUNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
 
Call Girls in Karachi | +923081633338 | Karachi Call Girls
Call Girls in Karachi  | +923081633338 | Karachi Call GirlsCall Girls in Karachi  | +923081633338 | Karachi Call Girls
Call Girls in Karachi | +923081633338 | Karachi Call Girls
 
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
 
call girls in G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in G.T.B. Nagar (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
 
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Identity-Based Lifecycle Management for a Trusted IoT Supply Chain

  • 1. Identity Based Lifecycle Management for a Trusted IoT Supply Chain IoT Device Security Summit October 30th, 2018 Tom Katsioulas Unrestricted © 2018 - New Ventures Group of Mentor, a Siemens Business Realize Innovation
  • 2. Page 2 Smart-Connected Product Supplier Economics *Source: Harvard Business Review • No traceability or configurability • High OPEX, low differentiation Old Supplier Product Variants Supply Chain & Field Use Established Connected Devices Evolving Connected Devices Emerging Connected Devices • Better visibility on product field use • Remote lifecycle management • Reduced support costs and RMAs • Lower OPEX, higher differentiation • New services and business models • Trust, security and safety issues Smart Connected Supplier* Managed Products Field Usage Analytics Managed Device Lifecycle
  • 3. Page 3 Device Lifecycle Security & Trust in Digital Supply Chain Can we trust a system and its parts from multiple suppliers in the supply chain? Gray MarketOverproduction Counterfeits Hacks/MalwareTrojans/Clones DDoS AttacksReverse Eng. Tampered Dev. System TestCard TestFinal Test Self TestProbe TestFunctional Test Wafer Chip PCB Device End ProductIC Design ECU OnboardingKey Injection CM (EMS)OEMOSATFoundry Field UseDistributorChip Maker Merchant
  • 4. Page 4 Classic Hacks Traced to Supply Chain Issues The roots of security issues lie in the structure of the electronics industry at large HW + SW from XiongMai exploited to create the massive Mirai botnet The Big Hack  Supermicro Bloomberg animation showing the alleged malicious component in the Supermicro server motherboards positioned between the SOIC-16 SPI flash chip and the BMC. Mirai botnet  Xiongmai
  • 5. Page 5 Design Tape-Out Manufacturing Package & Test Provisioning Assembly Distribution Channels Lack of Traceability from Chip to Cloud Untrusted Supply Chain Impossible to trace the chain of business liability when a security beach occurs Apps Updates RMA Debug Recycling Hardware Upgrades Device Control Analytics Onboarding Firmware Updates Lifecycle Management Untrusted Field Use
  • 6. Page 6 Charter of Trust and the Digital Supply Chain Trusted identity and provenance are key for accountability* in the supply chain www.charter-of-trust.com *Source IDC: European IoT Security Why the IoT Supply Chain of Trust Matters Authentication Identity Provenance Accountability* OCM ODM OEM
  • 7. Page 7 Identity-based Lifecycle Management System DesignIC Design Fab - OSAT Distribution Assembly Delivery OperatingOnboarding Recycling • Establish Accountability &Trust • Enable Identity-driven Services • Improve Quality, Security, Safety Configurability - ProvisioningTraceability - Monitoring • Enable Onboarding & Personalization • Provide OTA Updates & Manage RMAs • Drive Higher Value Business Models Field Use: Applications & ServicesSemiconductor Supply Chain Device Supply Chain ECU Identity Provenance OCM - Chip ODM - Device OEM - System ODMs - OEMs OperatorsIC Suppliers Trusted Infrastructure & Partnerships Needed
  • 8. Page 8 Identity is Key for Enabling Chain of Trust Inborn identity coupled with traceability infrastructure and trusted value chain TPM Identity *Trusted Platform Module • Simple PCB Device ID • BOM Cost (Extra ASIC) • IC can be compromised • No Chip Traceability Inserted Identity *Fused or Injected Secret • ID Embedded in Chip • Trusted Execution Env • Can be tampered/cloned • No Parts Traceability Inborn Identity *No Secret at Rest (power-off) • ID from Mfg process • TEE and Secure Enclave • Physically Unclonable • PCB Can Be Hacked Unified Identity *ID linked to Ownership (PO) • Derived ID from all ICs • ID factoring BOM in PCB • Certified Device & Parts • Trusted Suppliers Links PCB Layout IC Enrollment & Trusted Device Onboarding ODMs - OEMs Operators IC Suppliers + Trusted Partners
  • 9. Page 9 Identity Enables a Trusted IoT Value Chain Ecosystem Enablement Authentication, Provisioning, … Connectivity, & Device Management Firmware, Protocols, Applications,… Data & Lifecycle Management Field Operations & Services Supply Chain Configurability (Provisioning) Client Embedded Systems Identity Trusted Server AuthenticationEnrollment Trusted Device Onboarding Late Binding & Key Mgmt. Supply Chain Traceability (Distributed Trust Exchange) RTOS
  • 10. Page 10 Trusted Server Identity Enables Trusted Lifecycle Services System DesignIC Design Fab - OSAT Distribution Assembly Delivery Apps Updates RMA Debug Hardware Upgrades Device Control Analytics Firmware Updates OperatingOnboarding Recycling Services • Chip Authentication • Chip Feature Provisioning • Chip Authenticity Certification • Key injection (Untrusted Facility) • Firmware Injection (Untrusted Facility) • Generic Data Injection / Extraction • Identity-driven Device Onboarding • OTA Firmware and App Updates • RMA Debug (incl. IC Access Grant) Chip ID Device ID Equipment ID IoT Platforms Cloud Services ODMs - OEMs OperatorsIC Suppliers Traceability - Monitoring Configurability - Provisioning Enrollment
  • 11. Page 11 Use Cases - Key & Feature Provisioning One SKU product supporting many standards provisioned on delivery Multi Market Product  Product performance can be increased  Battery life can be extended (ala Tesla)  RMAs can be diagnosed even inside chip  Compromised systems can be disabled  Ease adoption of new products/services  Reduce recalls with in-field diagnostics  Enable Hardware-as-a-Service business  Deactivate stolen/unauthorized products Offer differing charging speeds, distance and tracking service Electric Bike Offer differing ranges (higher power GPS) & contract duration Pet Tracker Remote Provisioning Value Courtesy of GLOBALFOUNRIES and Siemens-Mentor
  • 12. Page 12 Example - Automotive Supply Chain Challenges • 7,000 semiconductor ICs on a premium car • 1ppm failure rate = 7 failures for 1,000 cars • 4,000 cars build per day = 1 failure per hour* • Production failures plus electronics failures Quality & Reliability Security & Safety Securing Edge to Cloud Connectivity • Many publicized hacks, millions of recalls • Vulnerabilities from 100s of ECUs per car • Gray market, clones, or counterfeit ICs • Gb of data / day / car can be compromised • Supply Chain Security - Authorized Distributors - Continuity of Supply • Counterfeit Chips in - ECUs & ABS Systems - Airbag& Cruise control • Over the Air Updates - Firmware Changes - Keys and Certificates Source: Automotive Megatrends, Challenges and Solutions , SEMICON Europa 2015, Dresden
  • 13. Page 13 Root cause on supply chain intrusions or system RMAs take months to detect and fix IC Supplier IC Design Chip IDs Test Logs CM (EMS)OEM/ODMOSATFoundry Field UseDistributor Traceability + Authenticity? Example - Automotive Supply Chain Quality & Trust Issues Parts Tests Wafer 1 Wafer 2 Field Performance System TestPCB TestFinal Test Self TestKey InjectionProbe Test Gray MarketsOverproduction Counterfeits Hacks/MalwareIP Theft DDoS AttacksReverse Engineering
  • 14. Page 14 Traceability Supply Chain Analytics Configurability Provisioning and Updates IC Design • Engineering • Operations • Production • Procurement • Accounting Chain of Custody Distributed Ledger Supply Chain Monitoring and Certification Chip IDs Test Logs System TestPCB TestFinal Test Self TestKey Injection CM (EMS)OEM/ODMOSATFoundry Field UseDistributor Traceability + Authenticity? Trusted Protocol Example - Automotive Supply Chain End-to-End Solution Parts Tests Wafer 1 Wafer 2 Field Performance Predict Field Performance Trace where issue occurred Probe Test Ops SKU Db Test Logs Test Logs BOM + Test IoT PlatformsOps SKU DbInject Logs IC Supplier Trusted Services Enrollment
  • 15. Page 15 The Digital Thread and Digital Twin The Digital Thread ties all of your data together, from requirements through design all the way to manufacturing and the field. We start with this, as an enabler for the Digital Twin The Digital Twin allows us to simulate the entire supply chain, from requirements collection and design to factory layout, capacity, scheduling, processing, manufacturing and the field.
  • 16. Page 16 Use Cases - Supply Chain Traceability Why Did the Part Fail? Which IP Contributed to Failure? Pre-Launch ATE Production ATE Why Production ATE did not work as expected? Can we use ML* Process/Defect Characterization? *ML: Machine Learning
  • 17. Page 17 Economic Incentive for Trusted IoT Supply Chain Value Chip suppliers ODMs/OEMs App/Service Providers • Reduce Production Cost • Track/Provision SKUs in Field • Prevent IP Theft and Clones Enroll - Monitor - Provision • Bind Apps to Chip Root of Trust • Authenticate Device, not User • Secure Content and Payments Safeguard Users, Applications, Data • Automate Device Onboarding • Track/Update Devices in Field • Enable Remote Debug & PLM Monitor - Provision - Personalize Configurability  Higher Value Business ModelsTraceability  Higher Trust, Quality, Safety Hardware as a Service
  • 18. Page 18 Summary - Trusted Alliances in the IoT Value Chain • IDMs and Pure Foundries • Chip/OEM/ODM Suppliers • Contract Manufacturers • Chip & Device Distributors • End Application Providers • Operators & Service Providers Trust will evolve through “round and round we go” business relationships Circle of Trust