Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

A symmetric key will be used for both encryption and decryption, generated by the controller module. The configuration blob will also contain a symmetric key attribute.  The symmetric key will be used to encrypt the sensitive information inside the configuration payload. Controller will use the device certificate to encrypt a symmetric key, inside the configuration payload. The agents while invoking the decrption API for the sensitive information, will also pass the encrypted symmetric key. The symmetric key will be decrypted using the on-chip TPM module, using device private key stored inside TPM module. The decrypted symmetric key will be used, in turn,  will be used to decrypt the sensitive information.

...