SAKEM is made for bottom line efficiencies, with low unit cost per new customer.
The quest for operating cost efficiencies in a high security application environment motivated the SAKEM procedure invention.
If a security scheme relies on a physical object (a security device) as an electronic identification means, a need for distribution arises. With the SAKEM procedure, the security device is left in an uninitialized state until its delivery to a potential client and the client registration. The device is therefore anonymous and useless if it falls into wrong hands (as a case in point, the GSM mobile telephony client registration process uses anonymous but partly initialized security devices which were found vulnerable in the case of temporary possession by a fraudor, according to a security alert posted by the Smartcard Developer Association, Pleasant Hill, CA).
So, the direct cost reductions come from the use of the most efficient distribution mechanism in a given situation, irrespective of security concerns (e.g. selection of a courrier service without consideration of trust).
When the security scheme is based on client-side software for which a security initialization is needed, the SAKEM procedure allows any software distribution method to be used, again because the initialization does not occur until the client decides to register.
So, the most efficient software distribution mechanisms can be used for software distribution, while maintaining the highest level of security allowed by software-based security solutions.
Any process for new client enrolment in a high security environment needs some human intervention (otherwise, the process is deemed to rely on client enrolment done by a third party, e.g. a credit card company or a certification authority, CA, and this third party needed human intervention for initial client enrolment). The human intervention is broken down in one or more of the following tasks:
With the SAKEM procedure, every required manual task from the above list can be consolidated into a single activity (the verification of applicant's identity). It makes the activity more complete and meaningful to the worker, and saves operating costs in many ways: