MANAGING APPLICATIONS RELATED TO SECURE MODULES
First Claim
Patent Images
1. An apparatus capable of hosting a secure module, the apparatus comprising:
- a memory configured to store secure module related applications; and
a processing module configured to check whether an application is a secure module related application, whereinin case an application chosen or activated by a user of the apparatus is a secure module related application, the processing module is configured to restrict user rights concerning that application.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus capable of hosting a secure module. The hosting apparatus is configured to provide connectivity to the secure module, and comprises a memory for storing secure module related applications. A processing module is configured to check whether an application chosen or activated by the user of the apparatus is a secure module related application. In case the chosen or activated application is a secure module related application, the processing module is 101 configured to restrict user rights concerning the application.
72 Citations
19 Claims
-
1. An apparatus capable of hosting a secure module, the apparatus comprising:
-
a memory configured to store secure module related applications; and a processing module configured to check whether an application is a secure module related application, wherein in case an application chosen or activated by a user of the apparatus is a secure module related application, the processing module is configured to restrict user rights concerning that application. - View Dependent Claims (2, 3, 4, 5, 19)
-
-
6. A secure module capable to be hosted by a hosting apparatus, the secure module comprising:
-
a processing unit for installing a secure module application into the secure module, and a memory for storing an indication about a compatible counterpart application which is needed in the hosting apparatus, wherein the processing unit is configured to communicate said indication to the hosting apparatus, the indication causing the hosting apparatus to restrict user rights concerning said counterpart apparatus.
-
-
7. A method, comprising:
-
checking by an apparatus capable of hosting a secure module whether an application is a secure module related application; and in case an application chosen or activated by a user of the apparatus is a secure module related application, restricting user rights concerning that application. - View Dependent Claims (8, 9, 11, 12)
-
-
10. A method according to claim wherein the method comprises restricting user rights by applying security measure(s), deletion protection, or installation or update restriction(s).
-
13-14. -14. (canceled)
-
15. A computer program product comprising computer executable program code stored in a computer readable storage medium, the computer executable program code comprising;
-
code for storing secure module related applications; code for checking whether an application is a secure module related application; and code for restricting user rights concerning that application in case an application chosen or activated by a user of the apparatus is a secure module related application. - View Dependent Claims (16, 17, 18)
-
Specification