Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
First Claim
1. A system for interfacing between service providers and secure memories, comprising:
- a mobile computing device, the mobile computing device comprising at least one secure storage;
a service provider computing device; and
one or more computing devices interfacing between the mobile computing device and the service provider computing device, the one or more computing device comprising at least one memory, and a processor communicatively coupled to the at least one memory, wherein the processor executed application code instructions that are stored in the at least one memory to cause the one or more computing device to;
receive, from a service provider computing device, a first request comprising a computing device identifier that corresponds to the mobile computing device;
query the at least one memory for a secure storage identifier that corresponds to the computing device identifier;
transmit the secure storage identifier to the service provider computing device;
receive, from the service provider computing device, a second request based at least in part on the secure storage identifier; and
transmit a third request to a secure storage of the mobile computing device that corresponds to the secure storage identifier, the third request based on the second request received from the service provider computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
System, methods, and computer program products are provided for interfacing between one of a plurality of service provider (SP) trusted service managers (TSM) and one of a plurality of secure elements (SE). A first request including a mobile subscription identifier (MSI) is received from an SP TSM over a communications network. At least one memory is queried for SE data including an SE identifier corresponding to the MSI. The SE data is transmitted to the SP TSM over the communications network. A second request based on the SE data is received from the SP TSM over the communications network. A third request, based on the second request, is transmitted, over a mobile network, to an SE corresponding to the SE data. The mobile network is selected from multiple mobile networks, and is determined based on the SE data queried from the memory.
214 Citations
24 Claims
-
1. A system for interfacing between service providers and secure memories, comprising:
-
a mobile computing device, the mobile computing device comprising at least one secure storage; a service provider computing device; and one or more computing devices interfacing between the mobile computing device and the service provider computing device, the one or more computing device comprising at least one memory, and a processor communicatively coupled to the at least one memory, wherein the processor executed application code instructions that are stored in the at least one memory to cause the one or more computing device to; receive, from a service provider computing device, a first request comprising a computing device identifier that corresponds to the mobile computing device; query the at least one memory for a secure storage identifier that corresponds to the computing device identifier; transmit the secure storage identifier to the service provider computing device; receive, from the service provider computing device, a second request based at least in part on the secure storage identifier; and transmit a third request to a secure storage of the mobile computing device that corresponds to the secure storage identifier, the third request based on the second request received from the service provider computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method to interface between service providers and secure storages, comprising:
-
receiving, by one or more computing devices and from a service provider, a first request comprising a computing device identifier that corresponds to a mobile computing device; querying, by the one or more computing devices, at least one memory for a secure storage identifier that corresponds to the computing device identifier; transmitting, by the one or more computing devices, the secure storage identifier to the service provider; receiving, by the one or more computing devices and from the service provider, a second request based at least in part on the secure storage identifier; and transmitting, by the one or more computing devices, a third request to a secure storage of the mobile computing device that corresponds to the secure storage identifier, the third request based on the second request received from the service provider. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product, comprising:
a non-transitory computer-readable medium having computer-executable program instructions embodied therein that when executed by a computer cause the computer to interface between service providers and secure storages, the computer-executable program instructions comprising; computer-executable program instructions to receive, from a service provider, a first request comprising a computing device identifier that corresponds to a mobile computing device; computer-executable program instructions to query at least one memory for a secure storage identifier that corresponds to the computing device identifier; computer-executable program instructions to transmit the secure storage identifier to the service provider; computer-executable program instructions to receive, from the service provider, a second request based at least in part on the secure storage identifier; and computer-executable program instructions to transmit a third request to a secure storage of the mobile computing device corresponding to the secure storage identifier, the third request based on the second request received from the service provider. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
Specification