Method and device for executing commands, intelligent card and mobile terminal

A mobile terminal and command execution technology, applied in the protection of internal/peripheral computer components, digital data authentication, etc., can solve problems such as unusable, USBKey and data card loss, waste of PC port resources, etc., to achieve high practicability and energy saving The effect of excellent resources

Inactive Publication Date: 2013-04-03
ZTE CORP
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method, a device, a smart card and a mobile terminal for executing commands, so as to at least solve the problem of occupying two USB ports

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for executing commands, intelligent card and mobile terminal
  • Method and device for executing commands, intelligent card and mobile terminal
  • Method and device for executing commands, intelligent card and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] Preferred Embodiment 1

[0046] Based on the problem that the USB Key and the data card are usually separated in the related art and need to occupy two USB sockets, this embodiment implants the encryption and decryption functions of the existing USB Key into the SIM card, that is, the encryption and decryption process is performed inside the SIM card. Finish. As a bridge between the USB Key function operation interface and the SIM card, the data card is responsible for parsing and transmitting encrypted and decrypted data.

[0047] The modules involved in this embodiment include: a SIM card, a data card driver module, a data card application protocol data unit (Application Protocol Data Unit, APDU for short) processing module, and a user operation interface. The method provided in this embodiment includes the following processes.

[0048] Users operate on the USB Key PC operation interface and issue relevant commands, such as: encryption, decryption, and key pair gene...

Example Embodiment

[0052] Preferred Embodiment 2

[0053] This embodiment relates to a system with a USB Key function and a method for implementing an interaction process based on the system. In this embodiment, the operation requirements of the user interface are analyzed by the driver module on the data card side, and the software module inside the data card is converted into an APDU string that can be recognized by the corresponding SIM card, and the APDU command is sent to the SIM card, and the process is carried out inside the SIM card. Data encryption and decryption operations, and return the execution result. In this way, the SIM card and the data card are used together, so that it has the function of USB Key.

[0054] A SIM card is a smart card containing a large-scale integrated circuit, which is used to register user identification data and information. APDU is an instruction for the interaction between the terminal and the SIM card. In order to enable the SIM card to have the USB K...

Example Embodiment

[0074] Preferred Embodiment Three

[0075] Combining the data card and the USB Key into one has gradually become the customized demand of these users. In the integrated mobile terminal provided by this embodiment, in addition to saving the USB interface of the PC, the encryption and decryption functions of the USB Key can be completed inside the SIM card, and it is only necessary to modify the internal software of the SIM card when designing the SIM card. This can save the hardware cost of the original USBKey; the SIM card itself has a PIN1, PIN2 code protection mechanism, which further enhances the security of USB Key-related operations; this SIM card is used in conjunction with a data card, not only for the banking system. It provides security support, and can also be applied to other scenarios that require the use of USB Key, thus bringing more convenient, safe and efficient services to users.

[0076] The system architecture of this embodiment may be as follows Figure 5...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for executing commands, an intelligent card and a mobile terminal. The method comprises the following steps of: receiving the commands by the intelligent card of the mobile terminal, wherein the commands need to be executed by means of a universal serial bus key (USB Key), and the USB Key is stored in the intelligent card; executing operations which respectively correspond to the command by the intelligent card. Through applying the method and device for executing the commands, the intelligent card and the mobile terminal disclosed by the invention, the problems that USB port resources of a personal computer (PC) are wasted due to the fact that two USB ports are occupied, and the independent USB Key and a data card can be possibly missed, and if any one of the USB Key and the data card is missed, the other one cannot be used in the prior art are solved, and further, interactive operations can be performed on the intelligent card and the data card in the same device, and therefore, the USB port resources of the PC are saved. The invention is higher in practical applicability.

Description

technical field [0001] The invention relates to smart cards and the field of smart card security, in particular to a method and device for executing commands, a smart card and a mobile terminal. Background technique [0002] With the development and maturity of the third-generation mobile communication technology and widespread commercial use, wireless data cards have been widely used in various industries. Banking systems in some areas have also customized wireless data cards for commercial use. Because banking systems have high security requirements, USB Keys are also required on personal computers (PCs) that use data cards. This will take up two USB ports. [0003] In the related art, occupying two USB ports wastes the port resources of the PC, and the separate USB Key and data card may cause a loss problem. If any one of them is lost, the other will become unusable. Contents of the invention [0004] The present invention provides a method, a device, a smart card and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/77
CPCG06F21/34
Inventor 缪海翔杨柯尚江峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products