MANAGING APPLICATIONS RELATED TO SECURE MODULES

A technique comprising: determining by an apparatus capable of hosting a secure module whether a stored application chosen or activated by a user of the apparatus is a counterpart application for an application residing in the secure module hosted by the apparatus, wherein the secure module is conne...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: SAARISALO, Mikko
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A technique comprising: determining by an apparatus capable of hosting a secure module whether a stored application chosen or activated by a user of the apparatus is a counterpart application for an application residing in the secure module hosted by the apparatus, wherein the secure module is connected to a near field communication module allowing the application residing in the secure module to communicate with an external device using near field communication and wherein the counterpart application is configured to allow a user to interact with the corresponding application residing in the secure module; and upon determination that the application chosen or activated by the user of the apparatus is a counterpart application for an application residing in the secure module hosted by the apparatus, restricting user rights concerning said counterpart application.