replace the old recovery key with the new key, and then simply reboot the laptop. if that doesnt work, repeat the whole process and wait for the system to be powered-off. try again as soon as it boots.
do not turn on the laptop and boot from the drive. to boot from the drive, power off the laptop and turn it back on. press f2 to enter the bios setup. in the boot sequence section, remove the boot from the secure-boot device and add the usb drive instead.
in order to protect their data, many organizations run bitlocker, which encrypts hard drives and computers. as a result, customers need to supply recovery keys to enter this encryption. changing the passwords, reinstalling windows or developing a workaround isnt always a real option, as customersdont want to give admin rights to random third parties. this leads to the scenario in which a customer might lose access to his/her encrypted files, thus losing his/her sensitive documents that cannot be recovered using standard means. specops key recovery can be configured to perform a system reset and boot you into the bios setup
when a machine is encrypted it stores the state of the bios/uefi settings. any changes to this state can cause the bitlocker recovery mode to kick in. this could be something as simple as choosing a different boot device at startup if not configured correctly based on the network requirements of yourorganization. e.g. if you normally boot from hard disk but need to boot from a cd/nic/usb for some reason.
for my research project, i needed to boot a computer with a bios password stored in a tpm chip. however, changing the bios password was too time-consuming and should not be done by end-users. also, i wanted a way to poweroff the computer and get a tpm reset that is secure and available in any kind of it environments. i found an article by the electronic frontier foundation describing a method to reset the tpm through bios.