http://www.w3.org/ns/prov#value | - Alternatively, a third party may produce an enabling key block (EKB) that can be used by both devices A and B, and may transmit an authentication key Kab encrypted using the produced enabling key block (EKB) to the devices A and B. FIGS. 13 and 14 show examples of processes of transmitting a common authentication key Kake to a plurality of devices by means of the technique using an enabling key bl
|