Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Table 4

Entity requirements.

OEM SP UDTRK

Initiate communication
Acknowledge communication

Generation of keypairs
Signature generation
Signature verification

Datamanagement for suppliers
Datamanagement for user devices
Datamanagement for service points
Datamanagement for TRKs

Secure storage for delegated trust

Knowledge of OEM's public key