Safety unit management method and terminal

A security unit and terminal technology, applied in the direction of security devices, electrical components, data processing applications, etc., can solve the problem of not being able to satisfy the issuer of the security unit

Active Publication Date: 2015-03-25
HUAWEI DEVICE CO LTD
View PDF4 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the technical scheme of multi-security units working together is adopted, such a situation will inevitably occur, that is, the multi-security units working together are on an equal footing with each other, and the issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety unit management method and terminal
  • Safety unit management method and terminal
  • Safety unit management method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0143] Method embodiment one

[0144] See Picture 9 , Picture 9 This is a schematic flowchart of a security unit management method provided by an embodiment of the present invention. The method provided by the embodiment of the present invention is applied to a terminal including at least two security unit interfaces, and the method includes:

[0145] S201: When a first security unit is accessed in the security unit interface, obtain identification information of the accessed first security unit;

[0146] Specifically, the terminal may include at least two security unit interfaces. After the security unit interface accesses the first security unit, the identification information of the first security unit is acquired. Optionally, the identification information of the first security unit may be the owner identification information of the first security unit, and the owner identification information is used to identify the issuer of the security unit. For example, the first securi...

Example Embodiment

[0165] Method embodiment two

[0166] In an embodiment of the present invention, when the first security unit is accessed in the security unit interface of the terminal, the terminal may obtain the identification information of the first security unit through a managing entity (Managing Entity, ME) , And then match the identification information of the first security unit with the preset identification information of the exclusive security unit, that is, the terminal can realize the identification and management of the exclusive security unit through the management entity. In the background art, it has been mentioned that ME is defined in the requirements document of the Global Platform multi-security unit management solution. A logical entity used to manage multiple security units existing on the same terminal can be implemented by software or hardware. For example, the management entity may be a software entity located on an NFC controller or a processor (Device Host, DH) for m...

Example Embodiment

[0182] Method Example Three

[0183] In an embodiment of the present invention, the terminal may detect whether the first security unit is an exclusive security unit based on the security unit discovery mechanism of NFC Forum NCI Spec (NFC Controller Interface Specification), and the NFC Forum NCI Spec is NFC One of the core standards developed by the Forum organization. In the mobile payment architecture of the terminal, in order to correctly configure the NFC controller routing information, the processor needs to obtain the configuration information of each security unit connected to the NFC controller, and the configuration information contains the description of the issuer of the security unit . The issuer description information is a description of the issuer of the security unit, such as the operator of the security unit, the subject that manages the security unit, etc. The information can be used to indicate whether the security unit belongs to a specific operator. After...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a safety unit management method and a terminal. The method and the terminal relate to the field of mobile payment. The method comprises the following steps: when a first safety unit is accessed to the interface of the safety unit, the identification information of the accessed first safety unit is obtained; preset identification information is obtained and used for identifying an exclusive safety unit; the identification information of the first safety unit and the preset identification information are matched; when the identification information of the first safety unit and the preset identification information are matchable, the first safety unit is set to be in the normal operation state, and other safety units accessed to the terminal are in the abnormal operation state. The embodiment of the invention allows the terminal to support an exclusive safety unit management mode, meets the requirements that exclusive safety unit issuers grasp a terminal safety unit control right, and improves supporting efficiency of mobile payment.

Description

technical field [0001] The invention relates to the field of mobile payment, in particular to a management method and terminal of a security unit. Background technique [0002] With the rapid development of mobile communication electronic technology, especially the rapid development of smart phone technology, smart phones have gradually become popular. At the same time, various existing business models have also put forward new demands for fast, convenient and safe payment methods. In such a general background, in order to meet the increasingly diversified, convenient and secure payment requirements, NFC (Near Field Communication, near field communication technology) has become a technology supported by more and more mobile terminals. [0003] The existing NFC mobile payment system mainly includes three types of entities: one is the terminal CPU (also known as Device Host, terminal host), which is responsible for configuring and managing the NFC controller (NFC Controller N...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/32G06Q20/04G06Q20/38H04W4/80
CPCG06Q20/04G06Q20/3278G06Q20/382H04L63/20H04W4/80H04B5/0031H04W12/082H04L41/00G06Q20/3227H04L63/0492
Inventor 李国庆常新苗
Owner HUAWEI DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products