SAKEM allows the use of any distribution channel; it avoids special material handling procedures.
In many electronic identification schemes, a key contained in a security device has to be delivered to the proper person. Also, the issuing organization must register the security device, which means to establish and to record the the association of a specific key value to a specific person, with confidence that the key has not been compromized by the time the association is established and recorded.
With the SAKEM procedure, the security device is sent uninitialized to the end-user. Because there is no security implication in temporary possession of an uninitialized security device, any distribution channel can be used.
With most other processes for security device distribution and registration, the security device receives the key before being delivered to the legitimate user. This means that special handling procedures (for "key injection") must be performed somewhere along the physical goods distribution chain (sometimes by the manufacturer, sometimes by an accredited distributor or installation specialist, sometimes by the issuing organization itself). The SAKEM procedure avoids these special handling procedures.