Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Algorithm 3

Direct flashing protocol (with online connection to OEM).
Requirements
(i) UD has knowledge of VKOEM
(ii) OEM has ensured, that the legal owner OWN of UD has commissioned the flashing procedure
Protocol
Step  1: For a new TRKnew to be flashed OEM reads out the respective certified
   verification key and verifies that VKTRKM is in
   the internal database of trusted transponder manufacturers.
Step  2: OEM contacts UD and is authenticated using a PKC authentication protocol.
   UD sends to OEM.
Step  3: OEM verifies that
Step  4: OEM sends to UD.
Step  5: UD verifies that .
Step  6: UD verifies that . Then the new transponder can be activated.
   The protocol is completed by sending a DONE-message to OEM.