Method of preventing fraudulent use of a security module
First Claim
1. A method of preventing fraudulent use of a security module in a device, the method being automatically performed by the security module, the method comprising:
- retrieving a device identifier of the device from the device;
checking whether negative allowance information is stored in the security module for the retrieved device identifier;
checking whether positive allowance information is stored in the security module for the retrieved device identifier;
when neither negative allowance information nor positive allowance information are stored in the security module for the retrieved device identifier, transmitting a security module identifier of the security module and said retrieved device identifier to a server, wherein said server contains information on what security module identity is allowed to operate with what device identity;
receiving a response from said server regarding whether the security module is allowed to operate with the identified device; and
storing negative allowance information in the security module for the retrieved device identifier, if the security module is not allowed to operate with the identified device according to the server response.
2 Assignments
0 Petitions
Accused Products
Abstract
A method includes preventing fraudulent use of a security module in a device, and the security module is designed to perform the following steps of: retrieving a device identifier of the device from the device; checking whether negative allowance information is stored in the security module for the retrieved device identifier and transmit a security module identifier of the security module and the retrieved device identifier to a server; and receiving a response from the server regarding whether the security module is allowed to operate with the identified device and store negative allowance information in the security module for the retrieved device identifier, if the security module is not allowed to operate with the identified device according to the server response. A security module may execute the method, and a system may include the device and the server.
-
Citations
11 Claims
-
1. A method of preventing fraudulent use of a security module in a device, the method being automatically performed by the security module, the method comprising:
-
retrieving a device identifier of the device from the device; checking whether negative allowance information is stored in the security module for the retrieved device identifier; checking whether positive allowance information is stored in the security module for the retrieved device identifier; when neither negative allowance information nor positive allowance information are stored in the security module for the retrieved device identifier, transmitting a security module identifier of the security module and said retrieved device identifier to a server, wherein said server contains information on what security module identity is allowed to operate with what device identity; receiving a response from said server regarding whether the security module is allowed to operate with the identified device; and storing negative allowance information in the security module for the retrieved device identifier, if the security module is not allowed to operate with the identified device according to the server response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification