After a NetKey/ IDKey has been produced, the secret keys can only be used for cryptographic operations inside the TCOS chip. The use of secret keys is protected by a PIN, i.e., only authorized users can use secret keys.