Method, apparatus and computer program to transition a user device security module to an unlocked lifecycle state and to a locked lifecycle state
First Claim
Patent Images
1. A method comprising:
- receiving a request for a secure module to enter an unlocked lifecycle state;
requesting confirmation to enter the unlocked lifecycle state;
if the request is confirmed, transitioning the secure module from a current lifecycle state to the unlocked lifecycle state; and
subsequently transitioning the secure module from the unlocked lifecycle state to a locked lifecycle state;
where transitioning to the locked lifecycle state from the unlocked lifecycle state comprises requesting a user associated with the secure module to confirm the transition to the locked lifecycle state, andwhere the user confirms the transition to the locked lifecycle state via a user interface of a device in which the secure module is contained;
where transitioning the secure module from the unlocked lifecycle state to the locked lifecycle state comprises, in one instance, returning management responsibility for the secure module to an entity that had management responsibility for the secure module prior to the unlocked life cycle state being entered.
3 Assignments
0 Petitions
Accused Products
Abstract
A method, computer program, apparatus and a secure module are described. By example, in the method there are steps of receiving a request from a first entity for a secure module to enter an unlock lifecycle state; requesting confirmation to enter the unlock lifecycle state; and if the request is confirmed, transitioning the secure module from a current lifecycle state to the unlock lifecycle state.
19 Citations
18 Claims
-
1. A method comprising:
-
receiving a request for a secure module to enter an unlocked lifecycle state; requesting confirmation to enter the unlocked lifecycle state; if the request is confirmed, transitioning the secure module from a current lifecycle state to the unlocked lifecycle state; and subsequently transitioning the secure module from the unlocked lifecycle state to a locked lifecycle state; where transitioning to the locked lifecycle state from the unlocked lifecycle state comprises requesting a user associated with the secure module to confirm the transition to the locked lifecycle state, and where the user confirms the transition to the locked lifecycle state via a user interface of a device in which the secure module is contained; where transitioning the secure module from the unlocked lifecycle state to the locked lifecycle state comprises, in one instance, returning management responsibility for the secure module to an entity that had management responsibility for the secure module prior to the unlocked life cycle state being entered. - View Dependent Claims (2, 3, 4, 5, 6, 7, 16)
-
-
8. A non-transitory computer-readable medium that contains software program instructions, where execution of the software program instructions by at least one data processor results in performance of operations that comprise:
-
receiving a request for a secure module to enter an unlocked lifecycle state; requesting confirmation to enter the unlocked lifecycle state; if the request is confirmed, transitioning the secure module from a current lifecycle state to the unlocked lifecycle state; and subsequently transitioning the secure module from the unlocked lifecycle state to a locked lifecycle state; where transitioning to the locked lifecycle state from the unlocked lifecycle state comprises requesting a user associated with the secure module to confirm the transition to the locked lifecycle state, and where the user confirms the transition to the locked lifecycle state via a user interface of a device in which the secure module is contained; where transitioning the secure module from the unlocked lifecycle state to the locked lifecycle state comprises, in one instance, returning management responsibility for the secure module to an entity that had management responsibility for the secure module prior to the unlocked life cycle state being entered. - View Dependent Claims (9, 10, 11, 17)
-
-
12. An apparatus comprising a secure module, a user interface, a processor and a memory including computer program code, the memory and computer program code being configured, with the processor, to cause the apparatus at least to receive a request for the secure module to enter an unlocked lifecycle state;
- to request confirmation to enter the unlocked lifecycle state;
if the request is confirmed, to transition the secure module from a current lifecycle state to the unlocked lifecycle state; and
to subsequently transition the secure module from the unlocked lifecycle state to a locked lifecycle state;where transitioning to the locked lifecycle state from the unlocked lifecycle state comprises requesting a user associated with the secure module to confirm the transition to the locked lifecycle state, and where the user confirms the transition to the locked lifecycle state via the user interface of the apparatus that comprises the secure module, where transitioning the secure module from the unlocked lifecycle state to the locked lifecycle state comprises, in one instance, returning management responsibility for the secure module to an entity that had management responsibility for the secure module prior to the unlocked life cycle state being entered. - View Dependent Claims (13, 14, 15, 18)
- to request confirmation to enter the unlocked lifecycle state;
Specification