Systems, methods, and computer program products for managing data re-installation
First Claim
Patent Images
1. A system to manage data re-installation, comprising:
- a memory;
a processor communicatively coupled to the memory, the processor being operable to execute computer-executable program instructions stored in the memory to cause the system to;
receive, by a central trusted service manager (central TSM) from a particular one of a plurality of service provider trusted service managers (service provider TSMs) over a network, a re-install request to re-install data at least partially installed on a secure element of a user computing device;
re-install, by the central TSM over the network, the data on the secure element of the user computing device, wherein the re-installed data comprises an uninstantiated service;
instantiate, by the central TSM over the network, the reinstalled data to create an instantiated service accessible by the particular one of the service provider TSMs;
extradite, by the central TSM, the instantiated data comprising the instantiated service on the secure element into a security domain on the secure element of the user computing device, the security domain comprising data that are accessible by the particular one of the service provider TSMs over the network; and
activate, by the central TSM over the network, the instantiated data comprising the instantiated service that has been extradited to the security domain on the secure element of the user computing device so that the data comprising the instantiated service is usable by the user computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer program products are provided for managing data re-installation including service re-installation. A re-installation procedure re-installs and optionally activates data at least partially installed on a secure element without intervention middleware to repair a personalization procedure failure. Thus, personalization data on a secure element (SE) may be comprehensively managed by interfacing between one of a plurality of service provider (SP) trusted service managers (TSM) and a central trusted service manager (central TSM). The processing time required to manage the re-installation procedure is minimized.
119 Citations
29 Claims
-
1. A system to manage data re-installation, comprising:
-
a memory; a processor communicatively coupled to the memory, the processor being operable to execute computer-executable program instructions stored in the memory to cause the system to; receive, by a central trusted service manager (central TSM) from a particular one of a plurality of service provider trusted service managers (service provider TSMs) over a network, a re-install request to re-install data at least partially installed on a secure element of a user computing device; re-install, by the central TSM over the network, the data on the secure element of the user computing device, wherein the re-installed data comprises an uninstantiated service; instantiate, by the central TSM over the network, the reinstalled data to create an instantiated service accessible by the particular one of the service provider TSMs; extradite, by the central TSM, the instantiated data comprising the instantiated service on the secure element into a security domain on the secure element of the user computing device, the security domain comprising data that are accessible by the particular one of the service provider TSMs over the network; and activate, by the central TSM over the network, the instantiated data comprising the instantiated service that has been extradited to the security domain on the secure element of the user computing device so that the data comprising the instantiated service is usable by the user computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method to manage data re-installation, comprising:
-
receiving, using one or more computing devices associated with a central trusted service manager (central TSM) from a particular one of a plurality of service provider (SP) trusted service managers (TSM) over a network, a re-install request to re-install data at least partially installed on a secure element of a user computing device; re-installing, over the network and using the one or more computing devices, the data on the secure element of the user computing device, wherein the re-installed data comprises an uninstantiated service; instantiating, using the one or more computing devices, over the network, the reinstalled data to create an instantiated service accessible by the particular one of the service provider TSMs; extraditing, using the one or more computing devices, the instantiated data comprising the instantiated service on the secure element into a security domain on the secure element of the user computing device, the security domain comprising data that are accessible by the particular one of the plurality of service provider trusted service managers over the network; and activating, over the network, using the one or more computing devices, the data re-installed on the secure element of the user computing device so that the data is usable by the user computing device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product comprising a non-transitory computer-readable medium having computer-executable program instructions embodied thereon that when executed by a computer cause the computer to
receive, by a central trusted service manager (central TSM) from a particular one of a plurality of service provider (SP) trusted service managers (TSMs) over a network, a re-install request to re-install a data at least partially installed on a secure element of a user computing device; -
re-install, by the central TSM over the network, the data on the secure element of the user computing device, wherein the reinstalled data comprises an uninstantiated service; instantiate, by the central TSM over the network, the reinstalled data to create an instantiated service accessible by the particular one of the service provider TSMs; extradite, by the central TSM, the data re-installed on the secure element into a security domain on the secure element of the user computing device, the security domain comprising data that are accessible by the particular one of the plurality of service provider trusted service managers; and activate, by the central TSM over the network, the data re-installed on the secure element of the user computing device so that the data is usable by the user computing device. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification