Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and terminal for opening a card

A terminal and terminal-supported technology, applied in wireless communication, network data management, electrical components, etc., can solve the problems of ID card information leakage, increase the operator's ID card information workload, and spend user time.

Active Publication Date: 2021-03-09
CHINA MOBILE COMM LTD RES INST +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] According to the country's requirement for real-name registration of mobile phone users, operators must verify the user's identity information before opening an account when selling a card. The current method of opening a real-name SIM card account has certain defects: some schemes will increase the operator's identity. The workload of the ID card information, and it takes a lot of time for the user; and some solutions will have the problem of ID card information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and terminal for opening a card
  • A method and terminal for opening a card
  • A method and terminal for opening a card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] The method for opening a card in the embodiment of the present invention is applied to a terminal. The terminal supports REE and TEE. Wherein, the TEE provides an isolated execution environment, has an independent execution space, and can be implemented by using ARM Trustzone-based hardware isolation technology.

[0061] REE provides common operating system operation, and TEE provides secure operating system operation. The secure operating system controls the acquisition unit of the terminal (such as NFC module and camera, etc.) to collect user authentication information and perform card writing operations. Wherein, the collected user authentication information includes at least user identity information and biological information.

[0062] Here, the common operating system refers to an open operating system, such as Linux or Andriod.

[0063] figure 1 It is a schematic flowchart of a method for opening a card according to Embodiment 1 of the present invention. like...

Embodiment 2

[0094] In order to implement the method in the embodiment of the present invention, this embodiment provides a terminal, such as figure 2 As shown, the terminal includes:

[0095] The first operation unit 21 is used to control the collection unit of the terminal in the TEE to collect user authentication information corresponding to a blank SIM card; the user authentication information includes at least: the user identity information and biological information; through the The transmission channel between the REE and the TEE transmits the collected user authentication information to the REE; and in the TEE, performs a card writing operation on the SIM card according to the card data;

[0096] The second operation unit 22 is configured to send the collected user authentication information to the server in the REE for authentication; and after successful authentication, receive the card of the SIM card sent by the server in the REE Data: transmit the card data to the TEE throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for opening a card, which is applied to a terminal. The terminal supports a Rich Execution Environment (REE) and a Trusted Execution Environment (TEE), including: controlling the collection unit of the terminal in the TEE to collect a blank SIM The user authentication information corresponding to the card; the user authentication information includes at least: the user identity information and biological information; the collected user authentication information is transmitted to the REE through the transmission channel between the REE and the TEE; In the REE, the collected user authentication information is sent to the server for authentication; after the authentication is successful, the card data of the SIM card sent by the server is received in the REE; the card data is transmitted through the transmission channel Transfer to the TEE; in the TEE, perform card writing operation on the SIM card according to the card data. The invention also discloses a terminal at the same time.

Description

technical field [0001] The invention relates to trusted application technology, in particular to a card opening method and a terminal. Background technique [0002] According to the country's requirement for real-name registration of mobile phone users, operators must verify the user's identity information before opening an account when selling a card. The current method of opening a real-name SIM card account has certain defects: some schemes will increase the operator's identity. The workload of the ID card information, and it takes a lot of time for the user; and some solutions will have the problem of ID card information leakage. Contents of the invention [0003] In order to solve the existing technical problems, the embodiments of the present invention provide a card opening method and a terminal. [0004] The technical scheme of the embodiment of the present invention is realized like this: [0005] An embodiment of the present invention provides a method for open...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/24H04W8/26H04W12/06
CPCH04W8/24H04W8/265H04W12/06
Inventor 刘扬
Owner CHINA MOBILE COMM LTD RES INST