Review Article
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Algorithm 3
Direct flashing protocol (with online connection to OEM).
| Requirements | | (i) UD has knowledge of VKOEM | | (ii) OEM has ensured, that the legal owner OWN of UD has commissioned the flashing procedure | | Protocol | | Step 1: For a new TRKnew to be flashed OEM reads out the respective certified | | verification key and verifies that VKTRKM is in | | the internal database of trusted transponder manufacturers. | | Step 2: OEM contacts UD and is authenticated using a PKC authentication protocol. | | UD sends to OEM. | | Step 3: OEM verifies that | | Step 4: OEM sends to UD. | | Step 5: UD verifies that . | | Step 6: UD verifies that . Then the new transponder can be activated. | | The protocol is completed by sending a DONE-message to OEM. |
|