Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for executing commands, intelligent card and mobile terminal

A mobile terminal and command execution technology, applied in the protection of internal/peripheral computer components, digital data authentication, etc., can solve problems such as unusable, USBKey and data card loss, waste of PC port resources, etc., to achieve high practicability and energy saving The effect of excellent resources

Inactive Publication Date: 2013-04-03
ZTE CORP
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method, a device, a smart card and a mobile terminal for executing commands, so as to at least solve the problem of occupying two USB ports and wasting the port resources of the PC in the related art, and the separate USB Key and data card may cause loss, wherein Either one is missing, causing the other to be unusable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for executing commands, intelligent card and mobile terminal
  • Method and device for executing commands, intelligent card and mobile terminal
  • Method and device for executing commands, intelligent card and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Based on the problem that the USB Key and the data card are usually separated in the related art and need to occupy two USB sockets, this embodiment implants the encryption and decryption functions of the existing USB Key into the SIM card, that is, the encryption and decryption process is performed by the SIM card. Finish. As a bridge between the USB Key function operation interface and the SIM card, the data card is responsible for analyzing and transmitting encrypted and decrypted data.

[0047] The modules involved in this embodiment include: a SIM card, a data card driver module, a data card Application Protocol Data Unit (Application Protocol Data Unit, APDU for short) processing module, and a user operation interface. The method provided in this embodiment includes the following processes.

[0048] The user operates on the USB Key PC operation interface and issues related commands, such as encryption, decryption, and key pair generation.

[0049] The data card ...

Embodiment 2

[0053] This embodiment relates to a system with a USB Key function and a method for implementing an interaction process based on the system. In this embodiment, the operation requirements of the user interface are analyzed by the data card side driver module, and the software module inside the data card is converted into an APDU string that can be recognized by the corresponding SIM card, and the APDU command is sent to the SIM card, and the process is performed inside the SIM card. Encryption and decryption of data, and return the execution result. Through the cooperative use of the SIM card and the data card, it has a USB Key function.

[0054] A SIM card is a smart card containing a large-scale integrated circuit, which is used to register user identification data and information. APDU is an instruction for interaction between the terminal and the SIM card. In order to enable the SIM card to have the USB Key function, it is first necessary to create a new application insi...

Embodiment 3

[0075] Combining the data card and USB Key into one has gradually become the customization requirement of this part of users. The integrated mobile terminal provided by this embodiment can save the USB interface of the PC, and the encryption and decryption functions of the USB Key can be completed inside the SIM card, and only the internal software of the SIM card needs to be modified when designing the SIM card. In this way, the hardware cost of the original USBKey can be saved; the SIM card itself has a PIN1, PIN2 code protection mechanism, which further enhances the security of USB Key-related operations; It provides security support and can also be applied to other scenarios that require the use of USB Keys, thereby bringing more convenient, secure and efficient services to users.

[0076] The system architecture of this embodiment can be as follows Figure 5 As shown, the execution process can be as follows Figure 7 As shown, the flow shows the specific implementation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for executing commands, an intelligent card and a mobile terminal. The method comprises the following steps of: receiving the commands by the intelligent card of the mobile terminal, wherein the commands need to be executed by means of a universal serial bus key (USB Key), and the USB Key is stored in the intelligent card; executing operations which respectively correspond to the command by the intelligent card. Through applying the method and device for executing the commands, the intelligent card and the mobile terminal disclosed by the invention, the problems that USB port resources of a personal computer (PC) are wasted due to the fact that two USB ports are occupied, and the independent USB Key and a data card can be possibly missed, and if any one of the USB Key and the data card is missed, the other one cannot be used in the prior art are solved, and further, interactive operations can be performed on the intelligent card and the data card in the same device, and therefore, the USB port resources of the PC are saved. The invention is higher in practical applicability.

Description

technical field [0001] The invention relates to smart cards and the field of smart card security, in particular to a method and device for executing commands, a smart card and a mobile terminal. Background technique [0002] With the development and maturity of the third-generation mobile communication technology and widespread commercial use, wireless data cards have been widely used in various industries. Banking systems in some areas have also customized wireless data cards for commercial use. Because banking systems have high security requirements, USB Keys are also required on personal computers (PCs) that use data cards. This will take up two USB ports. [0003] In the related art, occupying two USB ports wastes the port resources of the PC, and the separate USB Key and data card may cause a loss problem. If any one of them is lost, the other will become unusable. Contents of the invention [0004] The present invention provides a method, a device, a smart card and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/77
CPCG06F21/34
Inventor 缪海翔杨柯尚江峰
Owner ZTE CORP
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More