Recording of a key in an integrated circuit
First Claim
1. A method for personalizing a plurality of electronic elements, by replacing in a non-volatile memory of each of the electronic elements in the plurality of electronic elements, a first secret key with a second secret key using a secure authentication module, said method comprising:
- generating by the secure authentication module, said second secret key after having restored the first secret key from an identifier of a current element being personalized; and
conditioning, by at least one processor of the secure authentication module, the provision of the second key to the current element to the reception of a message from an element other than the current element confirming the key replacement of at least one preceding element other than the current element.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and a system for personalizing electronic elements, by replacing, in a non-volatile memory of each of the electronic elements a first secret key with a second secret key, by a secure authentication module automatically generating the second key after having restored the first one from an identifier of the element being personalized, including conditioning, on the authentication module side, the provision of the second key to a current element to the reception of a message confirming the key replacement of at least one preceding element.
10 Citations
15 Claims
-
1. A method for personalizing a plurality of electronic elements, by replacing in a non-volatile memory of each of the electronic elements in the plurality of electronic elements, a first secret key with a second secret key using a secure authentication module, said method comprising:
-
generating by the secure authentication module, said second secret key after having restored the first secret key from an identifier of a current element being personalized; and conditioning, by at least one processor of the secure authentication module, the provision of the second key to the current element to the reception of a message from an element other than the current element confirming the key replacement of at least one preceding element other than the current element. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for personalizing electronic elements, by replacing in a non-volatile memory of each of the electronic elements, a first secret key with a second secret key, by means of a secure authentication module automatically generating said second key after having restored the first one from an identifier of the element being personalized, said method comprising:
-
conditioning, on the authentication module side, the provision of the second key to a current element to the reception of a message confirming the key replacement of at least one preceding element; wherein a module counter totalizes the number of successive confirmation messages not received for preceding elements and compares this number with a stored threshold to allow personalization of the current element, the counter being reset each time a current element confirms the replacement of its key.
-
-
7. A system for personalizing keys in smart cards, the system comprising:
at least one processor programmed to perform a method comprising; generating a second secret key after having restored a first secret key from an identifier of a current electronic element being personalized; and replacing, in a non-volatile memory of a current electronic element, the first secret key with the second secret key, wherein provision of the second secret key to the current electronic element is dependent on the reception of a message from an electronic element other than the current electronic element confirming the key replacement of at least one preceding element other than the current electronic element. - View Dependent Claims (8, 9, 10, 11)
-
12. An apparatus for personalizing electronic elements by replacing in a non-volatile memory of each of the electronic elements, a first secret key with a second secret key, the apparatus comprising at least one processor implemented at least partially in hardware, the apparatus being configured to:
-
automatically generate, using said at least one processor implemented at least partially in hardware, the second secret key after having restored the first secret key from an identifier of a current electronic element being personalized, wherein the provision of the second secret key to the current electronic element is conditioned on the reception of a message confirming the key replacement of at least one preceding electronic element other than the current electronic element; and wherein a module counter totalizes the number of successive confirmation messages not received for preceding electronic elements and compares this number with a stored threshold to allow personalization of the current electronic element, the counter being reset each time an electronic element confirms the replacement of its key. - View Dependent Claims (13, 14, 15)
-
Specification