Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety unit management method and terminal

A security unit and terminal technology, applied in the direction of security devices, electrical components, data processing applications, etc., can solve the problem of not being able to satisfy the issuer of the security unit

Active Publication Date: 2015-03-25
HUAWEI DEVICE CO LTD
View PDF4 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the technical scheme of multi-security units working together is adopted, such a situation will inevitably occur, that is, the multi-security units working together are on an equal footing with each other, and the issuer of the security unit (such as a mobile communication operator) hopes that the terminal will only run its own security unit. The plan to issue security units fell through, so the demands of each security unit issuer could not be met

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety unit management method and terminal
  • Safety unit management method and terminal
  • Safety unit management method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0144] see Figure 9 , Figure 9 It is a schematic flowchart of a security unit management method provided by an embodiment of the present invention. The method provided by the embodiment of the present invention is applied to a terminal including at least two security unit interfaces, and the method includes:

[0145] S201. When a first security unit is accessed in the security unit interface, acquire identification information of the accessed first security unit;

[0146] Specifically, the terminal may include at least two security unit interfaces. After the security unit interface accesses the first security unit, the identification information of the first security unit is acquired. Optionally, the identification information of the first security unit may be owner identification information of the first security unit, and the owner identification information is used to identify the issuer of the security unit. For example, the first security unit may use the issuer ID ...

Embodiment 2

[0166] In an embodiment of the present invention, when a first security unit is accessed in the security unit interface of the terminal, the terminal can obtain the identification information of the first security unit through a management entity (Managing Entity, ME) , and further match the identification information of the first security unit with the preset identification information of the exclusive security unit, that is, the terminal can realize the identification and management of the exclusive security unit through the management entity. As mentioned in the background art, ME is defined in the Global Platform Multi-Security Unit Management Solution Requirements Document, a logical entity used to manage multiple security units existing on the same terminal, which can be realized by software or hardware. For example, the management entity may be a software entity located on an NFC controller or a processor (Device Host, DH), and is used to manage multiple security units o...

Embodiment 3

[0183] In one embodiment of the present invention, the terminal can detect whether the first security unit is an exclusive security unit based on a security unit discovery mechanism of the NFC Forum NCI Spec (NFC Controller Interface specification), and the NFC Forum NCI Spec is an NFC One of the core standards formulated by the Forum organization. In the mobile payment architecture of the terminal, in order to correctly configure the routing information of the NFC controller, the processor needs to obtain the configuration information of each security unit connected to the NFC controller, and the configuration information includes the issuer description information of the security unit . The issuer description information is a description of the issuer of the security unit, such as the operator of the security unit, the person who manages the security unit, etc. This information can be used to indicate whether the security unit belongs to a specific operator. After obtaining...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a safety unit management method and a terminal. The method and the terminal relate to the field of mobile payment. The method comprises the following steps: when a first safety unit is accessed to the interface of the safety unit, the identification information of the accessed first safety unit is obtained; preset identification information is obtained and used for identifying an exclusive safety unit; the identification information of the first safety unit and the preset identification information are matched; when the identification information of the first safety unit and the preset identification information are matchable, the first safety unit is set to be in the normal operation state, and other safety units accessed to the terminal are in the abnormal operation state. The embodiment of the invention allows the terminal to support an exclusive safety unit management mode, meets the requirements that exclusive safety unit issuers grasp a terminal safety unit control right, and improves supporting efficiency of mobile payment.

Description

technical field [0001] The invention relates to the field of mobile payment, in particular to a management method and terminal of a security unit. Background technique [0002] With the rapid development of mobile communication electronic technology, especially the rapid development of smart phone technology, smart phones have gradually become popular. At the same time, various existing business models have also put forward new demands for fast, convenient and safe payment methods. In such a general background, in order to meet the increasingly diversified, convenient and secure payment requirements, NFC (Near Field Communication, near field communication technology) has become a technology supported by more and more mobile terminals. [0003] The existing NFC mobile payment system mainly includes three types of entities: one is the terminal CPU (also known as Device Host, terminal host), which is responsible for configuring and managing the NFC controller (NFC Controller N...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/32G06Q20/04G06Q20/38H04W4/80
CPCG06Q20/04G06Q20/3278G06Q20/382H04L63/20H04W4/80H04W12/082H04B5/72H04L41/00G06Q20/3227H04L63/0492
Inventor 李国庆常新苗
Owner HUAWEI DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products