Method for the secure distribution of security modules
First Claim
1. A method for the distributing security modules in a secure manner from a manufacturing location via a distribution location to a user location, comprising the steps:
- a) generating and storing an electronic key in a security module at the manufacturing location;
b) transmitting the electronic key together with the security module to the distribution location, with the electronic key being visible in externally readable form at said security module;
c) generating an identification code allocated to the electronic key at the distribution location and transmitting the identification code from the distribution location to a central data bank and storing the identification code at the central data bank, and after generating the identification code, making the electronic key in externally readable form unreadable at the distribution location and shipping the security module from the distribution location with the identification code in externally readable form;
d) using the security module at the user location, and generating a verification code from the identification code and the electronic key stored in the security module;
e) at a service center, verifying that the verification code, and the identification code and the electronic key obtained from the central data bank, belong together; and
f) upon verification by the service center, registering said security module for use at said user location.
1 Assignment
0 Petitions
Accused Products
Abstract
In a method and a distribution system for the secure distribution of security modules, particularly for postage meter machines, for protecting against manipulation of security modules, only devices with security modules whose keys have not been comprised can be placed in operation by the customer under all circumstances, i.e. even when the cryptographic initialization at the production location has been comprehensively undermined. The generation and checking of markings, potentially in combination with certificates proceeds with a first marking of the shipping packaging of the security module ensuing at the manufacturing location after a first cryptographic initialization. The first marking is preferably a public key printed on a first label. A second marking ensues at the entry point remote from the manufacturing location upon registration of the packaging and enables an identification upon later registration of the device, triggered by the user located at the use location, before the loading of requested data into the postage meter machine.
-
Citations
36 Claims
-
1. A method for the distributing security modules in a secure manner from a manufacturing location via a distribution location to a user location, comprising the steps:
-
a) generating and storing an electronic key in a security module at the manufacturing location;
b) transmitting the electronic key together with the security module to the distribution location, with the electronic key being visible in externally readable form at said security module;
c) generating an identification code allocated to the electronic key at the distribution location and transmitting the identification code from the distribution location to a central data bank and storing the identification code at the central data bank, and after generating the identification code, making the electronic key in externally readable form unreadable at the distribution location and shipping the security module from the distribution location with the identification code in externally readable form;
d) using the security module at the user location, and generating a verification code from the identification code and the electronic key stored in the security module;
e) at a service center, verifying that the verification code, and the identification code and the electronic key obtained from the central data bank, belong together; and
f) upon verification by the service center, registering said security module for use at said user location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method for the distributing security modules in a secure manner from a manufacturing location via a distribution location to a user location, comprising the steps:
-
a) generating and storing an electronic key in a security module at the manufacturing location;
b) transmitting the electronic key together with the security module to the distribution location, with the electronic key being visible in externally readable form at said security module;
c) generating an identification code allocated to the electronic key at the distribution location and storing the identification code in said security module, after generating the identification code, making the electronic key in externally readable form unreadable at the distribution location and shipping the security module from the distribution location with the identification code in externally readable form;
d) using the security module at the user location, and generating a verification code from the identification code and the electronic key stored in the security module;
e) at a service center, verifying that the verification code, and the identification code and the electronic key obtained from the security module, belong together; and
f) upon verification by the service center, registering said security module for use at said user location.
-
-
33. A method for the distributing security modules in a secure manner from a manufacturing location via a distribution location to a user location, comprising the steps:
-
a) generating and storing an electronic key in a security module at the manufacturing location;
b) making the electronic key available via a network;
c) transmitting the electronic key together with the security module to the distribution location, with the electronic key being visible in externally readable form at said security module;
d) generating an identification code allocated to the electronic key at the distribution location and making the identification code available via said network, after generating the identification code, making the electronic key in externally readable form unreadable at the distribution location and shipping the security module from the distribution location with the identification code in externally readable form;
e) using the security module at the user location, and generating a verification code from the identification code and the electronic key stored in the security module;
f) at a service center, verifying that the verification code, and the identification code and the electronic key obtained from the network, belong together; and
g) upon verification by the service center, registering said security module for use at said user location. - View Dependent Claims (35, 36)
-
-
34. A distribution system for distributing security modules in a secure manner, comprising:
-
a manufacturing center for generating and storing at least one electronic key in a security module and for storing said electronic key in a central data bank and for shipping the electronic key together with the security module with the electronic key in externally readable form;
a distribution center which receives the security module from the manufacturing center, for generating an identification code allocated to the electronic key and for storing the identification code at the central data bank, and, after generating the identification code, for making the electronic key in externally readable form unreadable, and for shipping the identification code in externally readable form together with the security module;
a user device supplied with said security module that is placed in operation after receiving the security module, and wherein said security module generates a verification code from the identification code and the electronic key; and
a service center for verifying affiliation of said verification code, said identification code and said electronic key after obtaining said electronic key from said central data bank, and for registering said security module upon successful verification.
-
Specification