Modern cryptography calls for using a strong publicly available algorithm which is vetted by the crypto-community, while protecting a secret (or private key) from exposure. OEMs that use secure authentication in their end application must ensure that the secret or private key is programmed prior to the equipment being sold to the end customer, and that it’s not exposed at any point in the supply chain.
The following options are available for programming the secret/private key of our secure authenticators.
We offer a pre-programming service, which ensures that your authentication devices ship from our factory securely programmed and ready to use. Thus, the secret/private key, user memory, and all other device settings are programmed before the secure authenticator leaves our factory. We go to great lengths to ensure the protection of your data. Our secure process for transferring your data to our factory includes an encrypted file transfer of device settings from your computer to our server. You can be assured that the secret or private key is not compromised during manufacturing or at any point in the supply chain.
Our factory pre-programming service has the following terms:
Steps for using our secure factory pre-programming service