US 12,250,319 B2
ASIC identity auto-provisioning
Chirag K. Shroff, Cary, NC (US)
Assigned to CISCO TECHNOLOGY, INC., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Mar. 2, 2023, as Appl. No. 18/177,278.
Prior Publication US 2024/0297793 A1, Sep. 5, 2024
Int. Cl. H04L 9/40 (2022.01); H04L 9/08 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/3236 (2013.01) [H04L 9/0869 (2013.01); H04L 9/30 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system, comprising:
one or more processors;
a hardware component comprising:
at least one electronic fuse configured to store a hash of a data package;
a memory configured to store the data package, wherein the data package comprises a field indicating the hash, wherein the at least one electronic fuse is configured to provide the hash to the memory; and
one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components of the system to perform operations comprising:
performing a verification process to determine whether the hardware component is authorized to run on the system, wherein performing the verification process comprises:
transmitting a random value (K) to the hardware component to prompt the hardware component to sign a response;
receiving a signed response containing the random value (K) from the hardware component;
receiving the data package from the hardware component, wherein the data package comprises a first serial number associated with the hardware component and a first system number associated with the system; and
decrypting the signed response to verify a value of the random value (K).