Key transformation unit for a tamper resistant module
First Claim
1. A method for securely transporting a software application onto a tamper resistant module (TRM) by using an individualized key set for said TRM, said method comprising the steps of:
- storing a key pair unique to said TRM in a memory located on said TRM, said key pair comprising a TRM public key and a TRM private key;
retrieving said TRM public key from said TRM;
encrypting at least a portion of said software application using said TRM public key;
transmitting said portion of said software application to said TRM; and
decrypting said portion of said software application using said TRM private key to recover said portion of said software application.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
160 Citations
11 Claims
-
1. A method for securely transporting a software application onto a tamper resistant module (TRM) by using an individualized key set for said TRM, said method comprising the steps of:
-
storing a key pair unique to said TRM in a memory located on said TRM, said key pair comprising a TRM public key and a TRM private key; retrieving said TRM public key from said TRM; encrypting at least a portion of said software application using said TRM public key; transmitting said portion of said software application to said TRM; and decrypting said portion of said software application using said TRM private key to recover said portion of said software application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for securely transporting data onto a tamper resistant module (TRM) by using an individualized key set for the TRM, the method comprising the steps of:
-
providing a certification authority (CA) with a CA private key and a CA public key; storing a TRM private key and a TRM public key which form said individualized key set for said TRM, in a memory located on said TRM; encrypting said TRM public key with said first CA private key to form a public key certificate; storing said public key certificate on said TRM; retrieving said stored public key certificate from said TRM; verifying said public key certificate with said CA public key to ensure that said public key certificate is valid; encrypting at least a portion of said data using said TRM public key; transporting said portion of said data to said TRM; and decrypting said portion of said data using said TRM private key to retrieve said data. - View Dependent Claims (9)
-
-
10. A method for securely transporting a software application onto a personal computer (PC) having at least one multiple application tamper resistant module (TRM), by using a key set individualized for each PC and TRM combination (PC/TRM), said method comprising the steps of:
-
storing a key pair unique to each said PC/TRM in a memory located on said PC/TRM, said key pair comprising a PC/TRM public key and a PC/TRM private key; retrieving said PC/TRM public key from said PC/TRM; encrypting a portion of said software application using said PC/TRM public key; transmitting said portion of said software application to said PC/TRM; and decrypting said portion of said software application using said PC/TRM private key to recover said portion of said software application.
-
-
11. A method for securely transporting data onto a personal computer (PC) having at least one multiple application tamper resistant module (TRM), each combination of PC and TRM being referred to as a PC/TRM, by using an individualized key set for each PC/TRM, the method comprising the steps of:
-
providing a certification authority (CA) with a CA private key and a CA public key; storing a PC/TRM private key and a PC/TRM public key, which form said individualized key set for said PC/TRM, in a memory located on said PC/TRM; encrypting said PC/TRM public key with said first CA private key to form a public key certificate; storing said public key certificate on said PC/TRM; retrieving said stored public key certificate from said PC/TRM; verifying said public key certificate with said CA public key to ensure that said public key certificate is valid; encrypting at least a portion of said data using said PC/TRM public key; transporting said portion of said data to said PC/TRM; and decrypting said portion of said data using said PC/TRM private key to retrieve said data.
-
Specification