Information may be securely transferred from a first device to a second
device over an open network by transferring software to the first device
and executing the software. Data representing the information is entered
at the first device and transferred to the second device. The second
device uses the data to determine the information.