UICC application setting information management method, system and terminal

An information management and terminal technology, applied in the field of communication, can solve the problem of unable to control the behavior of UICC application settings, and achieve the effect of reducing the possibility of damage and improving security

Active Publication Date: 2020-11-06
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims to solve at least one of the technical problems existing in the prior art, and proposes a UICC application setting information management method, system and terminal to solve the inability to control the setting behavior of the UICC application existing in the prior art The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • UICC application setting information management method, system and terminal
  • UICC application setting information management method, system and terminal
  • UICC application setting information management method, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 2 It is a flow chart of a UICC application setting information management method provided in Embodiment 1 of the present invention, the method is based on figure 1 The implementation of terminal 1 in the implementation, through the method provided by this implementation, the UICC can participate in the management and control of the user's setting behavior of each UICC application, thereby improving the security of the necessary UICC application, and then protecting the user's rights and interests.

[0038] Such as figure 2 As shown, the method includes:

[0039] Step S101, receiving an application setting request sent by a user, where the application setting request includes an identifier of a target application.

[0040] Step S102. Determine the target security level of the target application based on the identifier of the target application.

[0041] Step S103 , when the category to which the target security level belongs requires UICC participation in man...

Embodiment 2

[0044] image 3 A flow chart of a UICC application setting information management method provided in Embodiment 2 of the present invention, as shown in image 3 As shown, the method includes:

[0045] Step S201, receiving an application setting request sent by a user, where the application setting request includes an identifier of a target application.

[0046]When the user needs to set the application on the UICC, the setting operation is performed on the terminal application of the terminal to send an application setting request to the terminal. The application setting request includes the identification of the target application, and the target application refers to the application that the user wants to set , preferably, in this embodiment, the setting performed by the user refers to the default setting of the application on the UICC, that is, setting a certain application as the default calling application for executing a certain service, so as to reduce the daily operat...

Embodiment 3

[0078] Figure 4 A schematic structural diagram of a terminal provided by the present invention, the terminal is used to implement the UICC application setting information management method provided by the present invention, such as Figure 4 As shown, the terminal includes: a receiving module 11 , a determining module 12 and an instruction generating module 13 .

[0079] Wherein, the receiving module 11 is used to receive the application setting request sent by the user, and the application setting request includes the identification of the target application; the determining module 12 is used to determine the target security level of the target application based on the identification of the target application; the instruction generating module 13 is used to respond When the category to which the target security level belongs requires UICC to participate in management, a management instruction corresponding to the target security level is generated, and the management instruc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a UICC application setting information management method comprising the steps of receiving an application setting request sent by a user wherein the application setting requestcomprises an identifier of a target application; determining a target security level of the target application based on the identifier of the target application; and sending a management instruction corresponding to the target security level to the UICC in response to the fact that the category to which the target security level belongs requires the UICC to participate in management, so that the UICC manages the setting information of the target application according to the management instruction. The invention further provides a UICC application setting information management system and a terminal. The invention relates to the technical field of communication.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a UICC application setting information management method, system and terminal. Background technique [0002] Universal Integrated Circuit Card (UICC for short) is a universal smart card platform on which various applications such as USIM cards, bank cards and ticketing cards can reside. Among them, USIM (Universal Subscriber Identity Module, Universal Subscriber Identity Module) The card is the continuation and progress of the SIM card, which is used to store user identity information and personal data to ensure the security of access to mobile network services. The UICC is installed in the smart terminal, and the smart terminal can manage various applications residing on the UICC through the terminal application. For example, the user can use the terminal application to set the default application among similar applications (for example, the most frequently One a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/18H04W12/00
CPCH04W8/183
Inventor 刘煜
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products