Review Article
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Algorithm 4
Initialization step for mediated key flashing.
Requirements | (i) OEM has knowledge of VKSP and VKTRKM | Protocol | Step I.1: SPE presents his credential CREDSPE and SP authenticates SPE. After that SP | is activated and communication to OEM is enabled. | Step I.2: SP creates a new key pair and sends its ID together with the created | verification key as a signed request for a trust credential to OEM. | Step I.3: OEM verifies that SP and the respective verification key VKSP is | listed in the internal database of trusted mediators and that . | In this case OEM creates a trust delegation credential bound to SP | with timestamp and number of granted transactions and sends it to SP. | Step I.4: SP receives and stores it in the trusted storage. | This step completes the trust delegation for flashing. | Step II.1: For a number of TRKnew to be flashed, SP reads out the respective certified | verification keys and sends to OEM. | Step II.2: OEM verifies that VKSP and VKTRKM are in the internal | database of trusted peers and that and | . Afterwards OEM creates | and sends it to SP. | Step II.3: SP receives and stores it in the trusted storage. | This step completes the activation of the transponder TRKnew for flashing over SP. |
|