Review Article
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Table 4
Entity requirements.
| | OEM | SP | UD | TRK |
| Initiate communication | | | | | Acknowledge communication | | | | |
| Generation of keypairs | | | | | Signature generation | | | | | Signature verification | | | | |
| Datamanagement for suppliers | | | | | Datamanagement for user devices | | | | | Datamanagement for service points | | | | | Datamanagement for TRKs | | | | |
| Secure storage for delegated trust | | | | |
| Knowledge of OEM's public key | | | | |
|
|