摘要 |
A method is intended for transforming a secure electronic device (CH), associated to a first identifier and having a sensitive mode disabled after production, for a new sensitive use. This method comprises the steps of: (i) externally computing a cipher of the first identifier with a predetermined function fed with this first identifier and a predetermined secret key, (ii) transforming an accessible metal layer (ML) of the electronic device (CH) to form an activation pattern (AS) representing this externally computed cipher of the first identifier, (iii) getting a value representative of this activation pattern into the electronic device (CH), (iv) computing a second identifier with this transformed electronic device (CH) by feeding a reverse function of the predetermined function with this value and this secret key, to trigger a comeback to the sensitive mode if this second identifier is equal to the first identifier. |