Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).

 
Web www.patentalert.com

< Method and system for key management in voice over internet protocol

< System and method for generating a non-repudiatable record of a data stream

> Method of encrypting and transmitting data and system for transmitting encrypted data

> Key transformation unit for a tamper resistant module

~ 00611