Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
First Claim
1. A method to interface between one of a plurality of service provider computing systems and one of a plurality of secure elements, comprising:
- receiving, by a trusted service manager computing system and from a service provider computing system, a request to activate a service;
transmitting, by the trusted service manager computing system and to a management portion of a secure element, a request to create a security domain on the secure element that corresponds to the service provider, the management portion of the secure element storing one or more uninstantiated applications available to be extradited to two or more security domains the secure element and instantiated for two or more service providers in the two or more security domains of the secure element;
transmitting, by the trusted service manager computing system and to the management portion of the secure element, a request to extradite an instance of an uninstantiated application associated with the service to the security domain on the secure element associated with the service provider computing system; and
transmitting, by the trusted service manager computing system and to the service provider computing system, a response comprising an indication whether the request to activate the service was successfully processed.
3 Assignments
0 Petitions
Accused Products
Abstract
System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM) and one of a plurality of secure elements (SE). A first request to renew a service is received from an SP system over a communications network. The first request includes a service qualifier associated with the service. A secure element corresponding to the service qualifier is determined. A second request to delete data associated with the service qualifier from the secure element is transmitted to the secure element. A third request to install an application on the secure element is transmitted to the secure element. A fourth request to activate the application on the secure element is transmitted to the secure element.
-
Citations
18 Claims
-
1. A method to interface between one of a plurality of service provider computing systems and one of a plurality of secure elements, comprising:
-
receiving, by a trusted service manager computing system and from a service provider computing system, a request to activate a service; transmitting, by the trusted service manager computing system and to a management portion of a secure element, a request to create a security domain on the secure element that corresponds to the service provider, the management portion of the secure element storing one or more uninstantiated applications available to be extradited to two or more security domains the secure element and instantiated for two or more service providers in the two or more security domains of the secure element; transmitting, by the trusted service manager computing system and to the management portion of the secure element, a request to extradite an instance of an uninstantiated application associated with the service to the security domain on the secure element associated with the service provider computing system; and transmitting, by the trusted service manager computing system and to the service provider computing system, a response comprising an indication whether the request to activate the service was successfully processed. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product, comprising:
a non-transitory computer-readable medium having computer-readable program instructions embodied therein that when executed by a computer cause the computer to interface between one of a plurality of service provider computing systems and one of a plurality of secure elements, the computer-readable program instructions comprising; computer-readable program instructions to receive, by a trusted service manager computing system and from a service provider computing system, a request to activate a service; computer-readable program instructions to transmit, by the trusted service manager computing system and to a management portion of a secure element, a request to create a security domain on the secure element that corresponds to the service provider, the management portion of the secure element storing one or more uninstantiated applications available to be extradited to two or more security domains the secure element and instantiated for two or more service providers in the two or more security domains of the secure element; computer-readable program instructions to transmit, by the trusted service manager computing system and to the management portion of the secure element, a request to extradite an instance of an uninstantiated application associated with the service to the security domain on the secure element associated with the service provider computing system; and computer-readable program instructions to transmit, by the trusted service manager computing system and to the service provider computing system, a response comprising an indication whether the request to activate the service was successfully processed. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A system to interface between one of a plurality of service provider computing systems and one of a plurality of secure elements, comprising:
a trusted service manager comprising at least one memory and a processor communicatively coupled to the at least one memory, wherein the processor executes application code instructions that are stored in the at least one memory to cause the system to; receive, from a service provider computing system, a request to activate a service; transmit, to a management portion of a secure element, a request to create a security domain on the secure element that corresponds to the service provider, the management portion of the secure element storing one or more uninstantiated applications available to be extradited to two or more security domains the secure element and instantiated for two or more service providers in the two or more security domains of the secure element; transmit, to the management portion of the secure element, a request to extradite an instance of an uninstantiated application associated with the service to the security domain on the secure element associated with the service provider computing system; and transmit, to the service provider computing system, a response comprising an indication whether the request to activate the service was successfully processed. - View Dependent Claims (14, 15, 16, 17, 18)
Specification