Method for carrying out security management on security element and communication system

A security unit and security management technology, applied in wireless communications, security devices, electrical components, etc., can solve problems such as high error probability, sneak traffic, and inability to achieve smooth user experience, reducing network communication and ensuring security. Effect

Inactive Publication Date: 2016-11-09
SHENZHEN XUEQIU SCI & TECH
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are also disadvantages, that is, it is necessary to communicate with the trusted service management server 10 in real time, and its error probability will be relatively high for terminal equipment whose network environment is not good enough, and may als

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out security management on security element and communication system
  • Method for carrying out security management on security element and communication system
  • Method for carrying out security management on security element and communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Introduced below are some of the various embodiments of the invention, intended to provide a basic understanding of the invention. It is not intended to identify key or critical elements of the invention or to delineate the scope of protection.

[0032] The purpose of the present invention is to solve the problem that the content management of the security unit must be connected to the Internet in real time. The present invention can realize that the user only needs to connect to the network once to perform unlimited content management operations on the terminal device on the basis of ensuring security. This can reduce network communication with the trusted server management server, and there is no need for the trusted service management server to issue specific content management instructions except for necessary state synchronization.

[0033] figure 2 A communication system for content management of a security unit of the present invention is illustrated.

[0034]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for carrying out security management on a security element and a communication system realized by employing the method. The method comprises the steps of loading a trusted application in a terminal device; establishing a security channel between the trusted application and a trusted service manager server; issuing a management key to the trusted application by the trusted service manager server through the security channel, and storing the management key by the trusted application; issuing a management instruction to the trusted application by the trusted service manager server through the security channel, and storing the management instruction by the trusted application; and carrying out content management on the security element by the trusted application based on the management key and the management instruction. According to the method and the system, on the basis of ensuring the data security, the networking times is reduced, and the performance efficiency of a take is improved.

Description

technical field [0001] The invention relates to mobile communication technology, in particular to a method and a communication system for safety management of a safety unit. Background technique [0002] With the development of mobile communication technology, more and more applications can be integrated on the terminal. In order to implement these applications, the terminal sets some sensitive information, such as user information, in the security element (Se, SecurityElement) of the terminal. When sensitive information needs to be used, the application software of the terminal accesses the user information in the security element. The user information set in the security unit includes, for example, the user's personal information and account information. When accessing the security unit, any application software on the terminal can pass the application programming interface (OS) on the terminal operating system (OS, Operation System) API, Application Programming Interfa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W12/0431H04W12/069
CPCH04W12/04H04W12/06
Inventor 姜波韩医徽方琍李川川王巨张海洋章勇
Owner SHENZHEN XUEQIU SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products