Key transformation unit for a tamper resistant module
First Claim
1. A method performed by a tamper resistant module (TRM) for processing an incoming transmission of a software application to said TRM by using an individualized key set for the TRM, the method comprising the steps of:
- receiving said incoming transmission, said incoming transmission comprising at least a portion of the software application encrypted with a TRM public key stored on said TRM, said TRM public key being part of said individualized key set;
retrieving a unique TRM private key for said TRM, said TRM private key being part of said individualized key set; and
decrypting said portion of said software application with said TRM private key to recover said portion of said software application.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key(190).
111 Citations
13 Claims
-
1. A method performed by a tamper resistant module (TRM) for processing an incoming transmission of a software application to said TRM by using an individualized key set for the TRM, the method comprising the steps of:
-
receiving said incoming transmission, said incoming transmission comprising at least a portion of the software application encrypted with a TRM public key stored on said TRM, said TRM public key being part of said individualized key set;
retrieving a unique TRM private key for said TRM, said TRM private key being part of said individualized key set; and
decrypting said portion of said software application with said TRM private key to recover said portion of said software application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. Apparatus located on a tamper resistant module (TRM) for processing an incoming transmission by using an individualized key set for said TRM, the apparatus comprising:
-
means for receiving said incoming transmission, said incoming transmission comprising at least a portion of a secure software application encrypted with a TRM public key, said TRM public key being also stored on said TRM, and said TRM public key forming part of said individualized key set;
means for retrieving a unique TRM private key for said TRM, said TRM private key being part of said individualized key set; and
means for decrypting said portion of said software application with said TRM private key to recover said portion of the software application. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method, performed by a personal computer (PC) having at least one multiple application tamper resistant module (TRM), each combination of PC and TRM being referred to as a PC/TRM, for processing an incoming transmission of a software application to a PC/TRM by using an individualized key set for the PC/TRM, the method comprising the steps of:
-
receiving said incoming transmission, said incoming transmission comprising at least a portion of the software application encrypted with a PC/TRM public key stored on said PC/TRM, said PC/TRM public key being part of said individualized key set;
retrieving a unique PC/TRM private key for said PC/TRM, said PC/TRM private key being part of said individualized key set; and
decrypting said portion of said software application with said PC/TRM private key to recover said portion of said software application.
-
-
13. Apparatus located on a personal computer (PC) having at least one multiple application tamper resistant module (TRM), each combination of PC and TRM being referred to as a PC/TRM, for processing an incoming transmission by using an individualized key set for a PC/TRM, the apparatus comprising:
-
means for receiving said incoming transmission, said incoming transmission comprising at least a portion of a secure software application encrypted with a PC/TRM public key, said PC/TRM public key being also stored on said PC/TRM, and said PC/TRM public key forming part of said individualized key set;
means for retrieving a unique PC/TRM private key for said PC/TRM, said PC/TRM private key being part of said individualized key set; and
means for decrypting said portion of said software application with said PC/TRM private key to recover said portion of said software application.
-
Specification