Re: Offshore firmware management

Liste des GroupesRevenir à e design 
Sujet : Re: Offshore firmware management
De : blockedofcourse (at) *nospam* foo.invalid (Don Y)
Groupes : sci.electronics.design
Date : 26. May 2024, 18:42:54
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <v2voqr$3fs2u$1@dont-email.me>
References : 1 2 3 4 5 6
User-Agent : Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2
On 5/26/2024 9:01 AM, Joe Gwinn wrote:
Hardware "unit" costs are reasonably insignificant; they are designed to be
easy/inexpensive to produce.  No precision components, manufacturing
tolerances, etc.  If you are committed to "copying at scale", then there
is little standing in your way (i.e., molds, boards, packaging, etc.
are just "costs of doing business")
>
*ALL* of the value lies in the software.
>
[good summary, but big snip]
 It sound like you really have only one kind of possible solution.
 First, as Phil H suggests, do not provide the firmware to the contract
manufacturer at all, instead install it back home.
That's been SOP for many decades, now.  The "manufacturer" is given
an "image" that contains manufacturing diagnostics.  This, coupled with
an explanation for what is being tested (and how) -- along with
schematics -- lets them troubleshoot and validate units before
acceptance.  (silly to try to "hide" schematics as the gerbers and
stuffing list already tell *that* story)
You support ISP and then just "reprogram" the image later, at YOUR
facility.  This gives you control of the image as well as JIT to
bind an image to *a* delivery (important if you want to customize
the product for specific customers and don't want to have to commit
to keeping a specific number of each variant "in stock", risking
overestimating some demands and underestimating others)
But, there's a fair bit of "cost" to performing these operations.
For a DM+DL of $10-20, that can represent a big piece of the "cost".
(EASY to ignore if DM+DL is $100-1000!)

Now "install" can mean a number of things.  If you just install a
common firmware image, that contract manufacturer can simply buy a
copy in the US, and reverse engineer it, so that isn't going to work
for very long.
Exactly.  You have to rely on "secure" storage to keep it hidden.

If the hardware has a unique and large hardware serial number (there
are chips that do this), the installed firmware can be adjusted to
know its target serial number, and refuse to work anywhere else.  This
is done with a crypto checksum scheme of some kind, complicating and
delaying reverse engineering.
Yes.  If you further tie that SN to an "activation" procedure, then
only the first unit bearing a particular SN can ever see use.  if the
"SN-space" is sparse, an adversary has to rely on finding a valid
SN to copy.  But, only AT MOST the first of those copies will ever see
an activation.
E.g., a TRULY counterfeit iPhone can only replace exactly one legitimate
iPhone as Apple controls which ones "work" and which WON'T -- based on
its own mechanisms (imagine what it would be like trying to argue
with Apple that YOUR iphone is genuine and any other previous
activation was the counterfeit??)
Activation can further be tied to sales records so those counterfeit
"sales" are never recognized (by the legitimate vendor).
[This also has an obvious tie-in for upgrades; even if you manage
to get a hold of an upgrade image, the device doesn't have to
accept it -- unless you further modify the images involved to
avoid any such dependencies.  (But, one should eschew upgrades,
on principle, as they increase the cost to the user)]

Next stronger is to also require the product to contact the mother
ship to complete the serial number.
Yes, as above.  Note that the image installed can also VARY with the SN.
The SN disclosed to the "mothership" (activation server) can be a
one-way hash of the real SN so an MITM can't do anything with that
observation.

How far to go is an economic decision - all you need to do is to make
cloning your product economically pointless.  It is not necessary for
the locking scheme to be bulletproof.
There are lots of similar schemes but all come with some "labor" cost.
You're outsourcing the manufacture, presumably, to minimize costs...
The economic aspect is always the kicker.  With high product costs,
its easy to add a significant effort/cost to protect a design.
But, when things get "dirt cheap", everything you add SOLELY to
protect your IP is pure overhead; it adds no VALUE to your product!
It's akin to throwing money at lawyers to try to get injunctions
against adversaries (the product doesn't IMPROVE as a result of
those actions.  and, you're attention has been diverted from
adding new functionality to *defending* your existing design)

Date Sujet#  Auteur
26 May 24 * Offshore firmware management12Don Y
26 May 24 +* Re: Offshore firmware management9Joe Gwinn
26 May 24 i`* Re: Offshore firmware management8Don Y
26 May 24 i +- Re: Offshore firmware management1Don Y
26 May 24 i +- Re: Offshore firmware management1Phil Hobbs
26 May 24 i `* Re: Offshore firmware management5Joe Gwinn
26 May 24 i  `* Re: Offshore firmware management4Don Y
26 May 24 i   `* Re: Offshore firmware management3Joe Gwinn
26 May 24 i    `* Re: Offshore firmware management2Don Y
26 May 24 i     `- Re: Offshore firmware management1Don Y
26 May 24 +- Re: Offshore firmware management1john larkin
26 May 24 `- Re: Offshore firmware management1Phil Hobbs

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal