Unlock instant, AI-driven research and patent intelligence for your innovation.

A security interaction method and device

An interaction method and technology of an interaction device, applied in the field of security interaction methods and devices, capable of solving the security risks of SIM cards and mobile terminals, etc.

Active Publication Date: 2019-12-17
BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of potential safety hazards in the interaction between the SIM card and the mobile terminal in the prior art, the present invention provides a method and device for safe interaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security interaction method and device
  • A security interaction method and device
  • A security interaction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] see figure 1 , which is a flowchart of a secure interaction method provided in Embodiment 1 of the present application.

[0051] The secure interaction method provided in this embodiment is applied to a mobile terminal.

[0052] This method can be implemented through the following steps S101-S103.

[0053] S101: Respond to the security interaction request sent by the SIM card, and enable the security interaction mode of the display interface.

[0054] The security interaction request in this embodiment is used to request to enable the security interaction mode on the SIM card menu interface displayed on the display interface of the current display screen, so that the content on the SIM card menu interface displayed on the display interface of the current display screen does not It will be interrupted by other applications and will not be maliciously attacked.

[0055] This embodiment does not specifically limit the specific form of the security interaction request, a...

Embodiment 2

[0084] The first embodiment above introduces a security interaction method applied to a mobile terminal. The present application also provides a security interaction method applied to the SIM card. Specifically, the method can be implemented by an Applet in the SIM card. Applet is an application program written in the Java programming language, and the Applet can interact with the mobile terminal.

[0085] The method includes:

[0086] Send a security interaction request to the mobile terminal, the security interaction request is used to make the display interface of the mobile terminal in a security interaction mode, and the security interaction mode is when the user interacts with the SIM card menu interface displayed on the display interface During the interaction process, the mobile terminal monitors the operation instructions of the display interface. If the operation instructions are the first preset operation instructions, the first preset operation instructions do no...

Embodiment 3

[0095] Based on the secure interaction methods provided in the first and second embodiments above, the method will be introduced below in combination with specific scenarios.

[0096] In this scenario, the secure interaction method provided in Embodiment 1 can be implemented by the SIM Tool Kit-Secure Display Driver (SIM Tool Kit-Secure Display Driver, STK-SDD) and the STK menu application in the mobile terminal.

[0097] Among them, STK is a SIM card smart toolkit, and STK includes a series of interaction instructions between the mobile terminal and the SIM card, and the mobile terminal can interact with the SIM card by executing the interaction instructions in the STK. The user can complete the interaction between the mobile terminal and the SIM card by performing corresponding operations on the displayed information on the mobile terminal. STK-SDD is a secure display driver, which can ensure the security of the interaction between the SIM card and the mobile terminal.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a safe interaction method and device for a mobile terminal. The method comprises the following steps: the mobile terminal activates a safe interaction mode ofa display interface after receiving a safe interaction request sent by a SIM card; in the safe interaction mode, the mobile terminal monitors operation commands for the display interface; and if anyoperation command for the display interface does not involve interaction operation between a user and a SIM card menu interface, and is a first preset operation command, the mobile terminal forbids execution of the operation command. That is to say, when the SIM card menu interface is displayed on a display screen of the mobile terminal, the mobile terminal can execute the interaction operation between the user and the SIM card menu interface, and forbids the execution of all the first preset operation commands that do not involve the interaction operation between the user and the SIM card menu interface, so that high safety of interaction between the SIM card and the mobile terminal is ensured.

Description

technical field [0001] The present application relates to the field of information security, in particular to a secure interaction method and device. Background technique [0002] SIM card is the abbreviation of Subscriber Identification Module (Subscriber Identification Module), also known as subscriber identification card, which belongs to a kind of smart card (Smart Card). Identity authentication, etc. With the development of technology, the SIM card can communicate with the mobile terminal to help the business party (such as China Unicom, bus group, bank, etc.) installed on the mobile terminal to realize certain functions, such as payment function, bus card swiping function , security authentication function, etc. For some fields that require high security, such as financial transactions, office authorization, home door locks, etc., how to ensure the security of the interaction between the SIM card and the mobile terminal is a technical problem that needs to be solved ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/60H04W8/18H04M1/725
CPCH04W8/183H04W4/60H04M1/72463H04M1/72469H04M1/72484
Inventor 侯高鹏
Owner BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN