Secure Device Provisioning


"Provisioning solution is expected to have the largest market share and dominate the IoT IAM market from 2016 to 2021, as more and more companies are adopting provisioning solutions to manage and control the identities and accesses of IoT applications and network resources." - Marketsandmarkets, 2017.

The process of introducing and onboarding devices into an IoT application must be securely controlled while meeting the specific requirements of each IoT environment.

Device Authority’s patented device key generation and registration controls provide a highly secure, policy-driven trust anchor for onboarding and provisioning devices. 

Our solution provides several customer-definable alternatives for device registration models, including our automated “headless” device registration which enables secure, “phone home” provisioning of remote devices at scale - without manual intervention, physical control, or system access to target devices. 

Our patented dynamic device key generation process provides definitive hardware-level device identification while producing unique, one-time use authentication and encryption keys for each communication session. This device-based trust anchor forms a security foundation for the critical functions operating across the IoT environment.

Increasingly, our technology is helping to solve key business issues, by providing revenue leakage protection. The ability to count the number of devices being deployed is critical, and our KeyScaler platform can solve this.

Device Authority is also involved in Intel’s zero touch onboarding industry pilot program, where "headless" devices can be powered on to locate and automatically onboard to IoT management platforms. In this model, Device Authority will receive the anonymous device registration & Intel EPID hardware identity and begin to manage the operational authentication lifecycle for the device. Together this forms a continuous hardware enforced trust anchor from activation to operation.

The combination of EPID hardware identity and Device Authority dynamic key technologies provide ongoing end-to-end operational security for IoT devices, enabling policy-driven access control and data protection for IoT applications and services.