摘要 |
A method to fight against cloning attacks is disclosed. In an initialization phase, the user unit sends to the server a request comprising a unique identifier of the user unit, check data, an initial payload key and a request instruction encrypted with a payload key retrieved from a memory of the user unit. Each time the server receives a request; the request instruction is decrypted by a payload key retrieved from a memory according to the unique identifier of the user unit. The server then generates a derivation key to be used by the user unit to compute a new payload key and checks in the next incoming request from the same user unit if the payload key is an expected one. The server detects cloning attacks thanks to a status parameter at decryption of the request instruction with the expected payload key.
|