Review Article
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Algorithm 3
Direct flashing protocol (with online connection to OEM).
Requirements | (i) UD has knowledge of VKOEM | (ii) OEM has ensured, that the legal owner OWN of UD has commissioned the flashing procedure | Protocol | Step 1: For a new TRKnew to be flashed OEM reads out the respective certified | verification key and verifies that VKTRKM is in | the internal database of trusted transponder manufacturers. | Step 2: OEM contacts UD and is authenticated using a PKC authentication protocol. | UD sends to OEM. | Step 3: OEM verifies that | Step 4: OEM sends to UD. | Step 5: UD verifies that . | Step 6: UD verifies that . Then the new transponder can be activated. | The protocol is completed by sending a DONE-message to OEM. |
|