Unlock instant, AI-driven research and patent intelligence for your innovation.

A security interaction method and device between terminals

An interaction method and technology of an interaction device, which are applied in the field of secure interaction methods and devices for terminals

Active Publication Date: 2020-05-08
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no solution for how to safely interact between the master terminal and the slave terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security interaction method and device between terminals
  • A security interaction method and device between terminals
  • A security interaction method and device between terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0208] The embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0209] In the embodiment of the present application, the slave terminal may be a mobile phone, a wearable terminal, a computer, a tablet computer, a personal digital assistant (English: personal digital assistant, abbreviated: PDA), a mobile Internet terminal (English: mobileInternet device, abbreviated: MID) , Internet Protocol (English: Internet Protocol, abbreviation: IP) telephone, network printer and e-book reader (English: e-book reader), etc.

[0210] Correspondingly, the main terminal can be a mobile phone, a wearable terminal, a computer, a tablet computer, a personal digital assistant, a mobile Internet terminal, an Internet protocol phone, a network printer, an e-book reader, and the like.

[0211] The eUICC is integrated in the terminal, and the profile in the eUICC is downloaded and managed through the LPA (local profile assistant) i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and device for secure interaction between terminals, including: a slave terminal equipped with an eUICC indicates or indirectly indicates an Https URL containing security information to a master terminal, so that the master terminal initiates the establishment of a local TLS connection according to the Https URL; The slave terminal receives the Http request sent by the master terminal through the local TLS connection, and if the slave terminal determines that the Http request contains the security information, it completes the establishment of the Https session; the slave terminal receives the Http request sent by the master terminal through the An operation instruction to the eUICC sent by the Https session.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a method and device for safe interaction between terminals. Background technique [0002] eUICC (embedded Universal Integrated Circuit Card, embedded Universal Integrated Circuit Card) is a third-generation telecom smart card that can support remote configuration and management of operator data. Because the eUICC is generally integrated in the terminal, some terminals cannot directly perform operations such as downloading and activating the configuration file (profile) in the eUICC due to their own capability limitations. For example, an integrated eUICC terminal (hereinafter referred to as a slave terminal) with a limited UI (user interface) and no initial cellular network access capability needs to use the master terminal to access the network, and the master terminal provides the UI to complete the profile download , activation and other operations. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/18
CPCH04W8/205H04W84/18H04W4/80H04L63/0869H04W12/43H04W12/50H04W12/06H04W8/18H04W12/04
Inventor 程紫尧龙水平
Owner HUAWEI TECH CO LTD