Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and system and electronic equipment

A technology for access control and electronic equipment, applied in the field of communication, can solve the problems of limited LPA function and high difficulty in implementation, and achieve the effect of safe operation

Active Publication Date: 2018-06-29
CHINA MOBILE COMM LTD RES INST +1
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) When the LPA function is upgraded, the user needs to update the OS of the device;
[0006] (2) The operator needs to adapt the LPA of different terminal equipment, and the function of the LPA is limited;
[0007] (3) For LPA upgrade, the operator's system needs to be transformed, and the implementation is difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system and electronic equipment
  • Access control method and system and electronic equipment
  • Access control method and system and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] The access control method of the embodiment of the present invention is applied to electronic equipment, which may be: wearable equipment, mobile phone, Tablet, etc.; figure 2 As shown, the method includes the following steps:

[0071] Step 201: The LPA module located at the application layer of the electronic device receives the control instruction;

[0072] Here, the control instruction is used to instruct the eUICC to perform a control operation.

[0073] Wherein, in actual application, the control instruction may be a control instruction issued by the user when performing related operations on the ISD-P in the eUICC, for example, when performing operations such as activation / deactivation and deletion; the control instruction may also be When the user implements SM-DP+ or the service platform interacts with the eUICC through the electronic device (the LPA module). During the interaction, another example is: the control command sent by the user when the user implem...

Embodiment 2

[0099] In order to implement the method of the embodiment of the present invention, this embodiment provides an electronic device, which may be: a wearable device, a mobile phone, a Tablet, etc.; such as Figure 4 As shown, the electronic equipment includes:

[0100] The LPA module 41 located at the application layer of the electronic device is used to receive a control instruction; the control instruction is used to instruct the eUICC to perform a control operation; and in response to the control instruction, call the API of the OS module 42 to transfer the corresponding information or command sent to said eUICC;

[0101] The OS module 42 is configured to determine whether the LPA module has access to the eUICC based on access control rules when its own API is called, and when it is determined that the LPA module 41 has access to the eUICC, set The corresponding information or command is sent to the eUICC, so that the eUICC operates on the corresponding information or comman...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method. The method comprises the steps that a local path administration (LPA) module located on an electronic equipment layer receives a control instruction; the control instruction is used for indicating an embedded universal integrated circuit card (eUICC) to perform a control operation; the LPA module responds to the control instruction and calls an application program programmatic interface (API) of an operating system (OS) of electronic equipment so as to send the corresponding information or instruction to the eUICC; when the API of the OS is called, the OS judges whether the LPA module has the authority for accessing the eUICC or not on the basis of access control rules, and when it is determined that the LPA module has the authority for accessing the eUICC, the corresponding information or instruction is sent to the eUICC, and operation is performed by the eUICC for the corresponding information or instruction. The invention further discloses the electronic equipment and an access control system.

Description

technical field [0001] The invention relates to security technology in the communication field, in particular to an access control method, system and electronic equipment. Background technique [0002] The initial demand for embedded Universal Integrated Circuit Card (eUICC, embedded Universal Integrated Circuit Card) originated from the field of Internet of Things (especially the automotive industry) (that is, embedded customer identification module (eSIM, embedded Subscriber Identification Module) card), but as people With the development of demand, eUICC can also be applied in the personal field, such as in the wearable field; and the demand for eUICC has also become that the operator can dynamically download the card making file information (Profile) of the operator, and can switch between different profiles. [0003] At present, international organizations such as the Global System for Mobile Communications Association (GSMA) and the European Telecommunications Standard...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/77
CPCG06F21/77G06F2221/2141G06F21/6281H04W12/08H04W12/42H04W12/35
Inventor 乐祖晖朱本浩李征
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products