Safe deactivation method and system for embedded intelligent card, and card management server for safe deactivation of embedded intelligent card

An embedded smart card and deactivation technology, applied in the field of the Internet of Things, can solve the hidden dangers of malicious attacks on embedded smart cards, and achieve the effect of avoiding terminal data transmission failure and ensuring security

Active Publication Date: 2016-04-20
CHINA TELECOM CORP LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] A technical problem to be solved by the embodiment of the present invention is: the embedded smart card may be maliciously attacked during the deactivation process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe deactivation method and system for embedded intelligent card, and card management server for safe deactivation of embedded intelligent card
  • Safe deactivation method and system for embedded intelligent card, and card management server for safe deactivation of embedded intelligent card
  • Safe deactivation method and system for embedded intelligent card, and card management server for safe deactivation of embedded intelligent card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] In order to solve the potential safety hazard of the embedded smart card being maliciously attacked during the deactivation process, the present invention proposes a safe deactivation scheme for the embedded smart card.

[0029] figure 1 It is a schematic flowchart of an embodiment of the met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe deactivation method and system for an embedded intelligent card, and a card management server for safe deactivation of an embedded intelligent card. The safe deactivation method for an embedded intelligent card comprises the steps that: after interactive authentication between a card management server and an embedded intelligent card succeeds, the card management server sends a deactivation command to the embedded intelligent card and receives a deactivation operation result returned from the embedded intelligent card, and updates the state information, of the embedded intelligent card, recorded by the server according to the deactivation operation result. The deactivation process is performed after the legal identities of two parties are determined through interactive authentication between the card management server and the embedded intelligent card, so that the safety for deactivation of the embedded intelligent card can be guaranteed and failure, for terminal data transmission, caused by a malicious deactivation command can be avoided.

Description

technical field [0001] The invention relates to the field of the Internet of Things, in particular to a method, system and card management server for safely deactivating an embedded smart card. Background technique [0002] The Internet of Things is called the third wave of the world's information industry after computers and the Internet, and represents the development direction of the next generation of information technology. M2M ((Machine-To-Machine, machine-to-machine) applications are the foundation of the Internet of Things. Due to the large difference between the application characteristics of M2M and the application characteristics of the personal communication field, the traditional pluggable SIM (Subscriber Identity Module, customer identification module or smart card) Cards can no longer meet the needs of M2M applications. Embedded SIM cards (embeddedSIM, eSIM) have gradually become an authentication tool for terminals in M2M applications to access operator netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 李慧芳陈平辉
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products