Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Algorithm 5

Indirect flashing protocol over a trusted mediator (no online connection to OEM).
Requirements
  (i) The initialization protocol has been completed successfully.
  (ii) UD has knowledge of VKOEM.
   (iii) SP has a valid trust key pair and has not reached the maximum quota of
    allowed flashing procedures.
Protocol
Step  1: SP contacts UD and sends to UD.
Step  2: UD verifies
   and sends back as an acknowledge.
Step  3: OWN authorizes the start of a key flashing procedure by presenting
   a valid TRKorig. UD authenticates TRKorig using the internally
   stored and a PKC authentication protocol.
Step  4: SP sends the certified new key package to UD.
Step  5: UD verifies that and
    . Then the new transponder TRKnew can be
    activated: . The protocol is completed by sending a DONE-message to SP.