A security interaction method and device
An interaction method and technology of an interaction device, applied in the field of security interaction methods and devices, capable of solving the security risks of SIM cards and mobile terminals, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] see figure 1 , which is a flowchart of a secure interaction method provided in Embodiment 1 of the present application.
[0051] The secure interaction method provided in this embodiment is applied to a mobile terminal.
[0052] This method can be implemented through the following steps S101-S103.
[0053] S101: Respond to the security interaction request sent by the SIM card, and enable the security interaction mode of the display interface.
[0054] The security interaction request in this embodiment is used to request to enable the security interaction mode on the SIM card menu interface displayed on the display interface of the current display screen, so that the content on the SIM card menu interface displayed on the display interface of the current display screen does not It will be interrupted by other applications and will not be maliciously attacked.
[0055] This embodiment does not specifically limit the specific form of the security interaction request, a...
Embodiment 2
[0084] The first embodiment above introduces a security interaction method applied to a mobile terminal. The present application also provides a security interaction method applied to the SIM card. Specifically, the method can be implemented by an Applet in the SIM card. Applet is an application program written in the Java programming language, and the Applet can interact with the mobile terminal.
[0085] The method includes:
[0086] Send a security interaction request to the mobile terminal, the security interaction request is used to make the display interface of the mobile terminal in a security interaction mode, and the security interaction mode is when the user interacts with the SIM card menu interface displayed on the display interface During the interaction process, the mobile terminal monitors the operation instructions of the display interface. If the operation instructions are the first preset operation instructions, the first preset operation instructions do no...
Embodiment 3
[0095] Based on the secure interaction methods provided in the first and second embodiments above, the method will be introduced below in combination with specific scenarios.
[0096] In this scenario, the secure interaction method provided in Embodiment 1 can be implemented by the SIM Tool Kit-Secure Display Driver (SIM Tool Kit-Secure Display Driver, STK-SDD) and the STK menu application in the mobile terminal.
[0097] Among them, STK is a SIM card smart toolkit, and STK includes a series of interaction instructions between the mobile terminal and the SIM card, and the mobile terminal can interact with the SIM card by executing the interaction instructions in the STK. The user can complete the interaction between the mobile terminal and the SIM card by performing corresponding operations on the displayed information on the mobile terminal. STK-SDD is a secure display driver, which can ensure the security of the interaction between the SIM card and the mobile terminal.
[0...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


