Unlock instant, AI-driven research and patent intelligence for your innovation.

Application downloading method, secure element, and terminal

A terminal and security domain technology, applied in the field of communication, can solve the problems of repeated work by users, reduced processing efficiency, isolation of users and service providers, etc., to achieve the effect of reducing links and improving work efficiency

Active Publication Date: 2017-06-23
CHINA MOBILE COMM GRP CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the above process, since the SE is controlled by the SE issuer, and there are a large number of SE issuers, it is easy to cause isolation between users and service providers, resulting in fragmentation of users and duplication of application releases by service providers work, reducing processing efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application downloading method, secure element, and terminal
  • Application downloading method, secure element, and terminal
  • Application downloading method, secure element, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0111] An embodiment of the present invention provides an application downloading method, which is applied in SE.

[0112] image 3 It is a schematic diagram of an implementation flow of an application downloading method according to Embodiment 1 of the present invention. Such as image 3 As shown, the method includes the following steps:

[0113] Step 301: receiving an application download instruction from the SP TSM;

[0114] Here, in an embodiment, when receiving the SP TSM application download instruction, the method may also include:

[0115]The SE receives the download request sent by the terminal;

[0116] Analyzing the download request to obtain first information; the first information includes second information and third information; the second information represents an application download instruction from the SP TSM; the third information represents the first The TOKEN signature data corresponding to the second information.

[0117] Wherein, before the downlo...

Embodiment 2

[0144] An embodiment of the present invention provides an application downloading method, which is applied to a terminal.

[0145] Figure 4 It is a schematic diagram of the implementation flow of the application downloading method in Embodiment 2 of the present invention. Such as Figure 4 As shown, the method includes the following steps:

[0146] Step 401: Receive a first operation; the first operation is used to trigger application download;

[0147] Here, the first operation is an operation of the user, requesting application download.

[0148] Step 402: Obtain a corresponding application download instruction from the SP TSM according to the first operation;

[0149] Specifically, send an application download request to the SP TSM;

[0150] After receiving the request, the SP TSM generates an application download command and sends it to the terminal.

[0151] Wherein, the application download instruction generated by the SP TSM is an instruction after MAC calculatio...

Embodiment 3

[0175] In order to implement the method in Embodiment 1 of the present invention, this embodiment provides an SE, such as Figure 5 As shown, the SE includes: a first receiving unit 51, a first verification unit 52, and a download unit 53; wherein,

[0176] The first receiving unit 51 is configured to receive an application download instruction from the SP TSM;

[0177] The first verification unit 52 is configured to use a first security domain key to verify the application download instruction; the first security domain key is a master security domain key generated by the SE itself;

[0178] The download unit 53 is configured to execute the application download instruction to download the corresponding application after the verification is passed.

[0179] Wherein, in an embodiment, the SE may also include: an analysis unit and a second verification unit; wherein,

[0180] The first receiving unit 51 is configured to receive a download request sent by a terminal;

[0181] Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application downloading method. The method includes: a secure element (SE) receives an application downloading instruction from a SP TSM; verifying the application downloading instruction by employing a first security domain key, wherein the first security domain key is a main security domain key generated by the SE; and executing the application downloading instruction after the passing of the verification, and downloading a corresponding application. The invention also discloses a SE and a terminal.

Description

technical field [0001] The present invention relates to security technology in the communication field, in particular to an application download method, a secure element (SE, Secure Element) and a terminal. Background technique [0002] With the continuous development of mobile Internet services and payment technologies, various smart terminals with SE functions continue to emerge, such as near field communication (NFC, Near Field Communication) full terminals, embedded SE (eSE, embedded SE) mobile phones (with Apple mobile phone), NFC single-wire protocol (NFC-SWP, NFC-Single Wire Protocol) mobile phone, Google host-based card simulation (HCE, Host-based Card Emulation) device, NFC-secure digital card (NFC-SD, NFC -SecureDigital) equipment, NFC full card equipment, secure operating environment (TEE, Trust Execute Environment) terminal, tablet (Pad) with SE, smart bracelet, other various wearable devices, etc. Service providers (SP) such as banks and bus companies can dynam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/20H04W12/06H04L29/08
CPCH04L67/34H04W8/205H04W12/06
Inventor 陆鸣王萍
Owner CHINA MOBILE COMM GRP CO LTD