Methods and apparati for securely loading one or more computer software
applications onto a tamper resistant module (TRM) (107) and for securely
deleting one or more applications from the TRM. An embodiment of the
invention comprises a method for determining, based at least upon an
encrypted personalization data block, whether a TRM (107) is part of a
qualified set of TRM's to accept loading of an application. Thereafter,
the method provides for loading the application onto the TRM (107) only
after the first step determines that the TRM (107) is qualified to accept
the loading of the application. Another embodiment comprises a method for
determining, based at least upon an encrypted personalization data block,
whether a TRM (107) is part of a qualified set of TRM's to accept
deleting of an application. Thereafter, the method provides for deleting
the application from the TRM (107) only when the first step determines
that the TRM (107) is qualified to accept the deleting of the
application.