US 12,231,582 B2
Method for attestation of an electronic component on a circuit board
Kenneth William Junk, Marshalltown, IA (US)
Assigned to GM Global Technology Operations LLC, Detroit, MI (US)
Filed by GM GLOBAL TECHNOLOGY OPERATIONS LLC, Detroit, MI (US)
Filed on Jun. 3, 2022, as Appl. No. 17/832,109.
Prior Publication US 2023/0396447 A1, Dec. 7, 2023
Int. Cl. H04L 9/32 (2006.01); G06F 21/81 (2013.01)
CPC H04L 9/3252 (2013.01) [G06F 21/81 (2013.01); H04L 9/3239 (2013.01); H04L 9/3271 (2013.01); H04L 2209/84 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for attestation of a plurality of electronic components, comprising:
operating a system including:
the plurality of electronic components configured for electronic communication with each other, wherein a first electronic component of the plurality of electronic components provides one of plug-in hardware, configurable hardware, updatable software, configurable software, updatable firmware, configurable firmware, or updatable ownership information to the system; and
connecting the plurality of electronic components to a central compute unit including a circuit board;
utilizing a second electronic component of the plurality of electronic components to perform the attestation upon the first electronic component using asymmetric key cryptography to verify authenticity of the first electronic component, wherein the second electronic component is attached to the circuit board;
defining the second electronic component as a trusted device acting as a verifier;
defining the electronic component as an attester under verification;
when using the asymmetric key cryptography successfully verifies the authenticity of the first electronic component:
selectively enabling one of a power connection or a data connection to the first electronic component; and
communicating between the first electronic component and a remainder of the plurality of electronic components to achieve tangible functions that may be provided by the plurality of electronic components; and
when using the asymmetric key cryptography fails to successfully verify the authenticity of the first electronic component, selectively withholding one of the power connection or the data connection to the first electronic component.