CN107872786A - A kind of control method and smart card - Google Patents

A kind of control method and smart card Download PDF

Info

Publication number
CN107872786A
CN107872786A CN201610848245.9A CN201610848245A CN107872786A CN 107872786 A CN107872786 A CN 107872786A CN 201610848245 A CN201610848245 A CN 201610848245A CN 107872786 A CN107872786 A CN 107872786A
Authority
CN
China
Prior art keywords
terminal
information
smart card
imei
itself
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610848245.9A
Other languages
Chinese (zh)
Other versions
CN107872786B (en
Inventor
张颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201610848245.9A priority Critical patent/CN107872786B/en
Publication of CN107872786A publication Critical patent/CN107872786A/en
Application granted granted Critical
Publication of CN107872786B publication Critical patent/CN107872786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of control method, including:Smart card obtains the first information;The terminal that the first information includes first terminal configures(Terminal Profile)Value and international mobile equipment identification number(IMEI);Judge whether the second information that the first information obtained stores with itself is identical;The Terminal Profile values and IMEI that second packet stores containing smart card itself;According to judged result, the first terminal is carried out authenticating lock operation or the first terminal is accessed network.The present invention also discloses a kind of smart card.

Description

A kind of control method and smart card
Technical field
The present invention relates to net networking technology, more particularly to a kind of control method and smart card.
Background technology
Internet of Things is the important component of generation information technology, and the important development stage in " informationization " epoch. At present, internet of things service, wearable device, point-of-sale terminal (POS, Point Of Sale) be can be applied to, (client carries vehicle-mounted rear dress In boutique or the navigation system in otherwise purchase installation after car), the market such as intelligent electric meter.
Internet of Things card rate are cheap compared with domestic consumer's card rate, in order to avoid Internet of Things card is banished into personal user's hand, to individual People user market impacts, or the problems such as arrearage occurs, is applied to illegal purposes, can not trace, it is necessary to by Internet of Things card and Terminal is bound, i.e., internet-of-things terminal and card bound after can normal use, card extraction is put into other-end then not It can use.
At present, conventional binding mode is the public telephone scheme in existing network, but during the implementation program, terminal and smart card It is required for customizing, the difficulty of terminal customization is very big in Internet of Things.
The content of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of control method and smart card.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of control method, and applied to smart card, methods described includes:
Obtain the first information;The first information include first terminal terminal configuration (Terminal Profile) value and International mobile equipment identification number (IMEI, International Mobile Equipment Identity);
Judge whether the second information that the first information obtained stores with itself is identical;Second packet contains the intelligence The Terminal Profile values and IMEI of itself storage can be blocked;
According to judged result, the first terminal is carried out authenticating lock operation or the first terminal is accessed network.
It is described according to judged result in such scheme, to the first terminal authenticate lock operation or make described the One accessing terminal to network, including:
When the first information and second information differ, authentication lock operation is carried out to the first terminal.
In such scheme, the acquisition first information, including:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
In such scheme, before whether the first information for judging to obtain is identical with the second information of itself storage, institute Stating method also includes:
Judge itself whether binding terminal, when itself binding terminal, the first information for judging to obtain is deposited with itself Whether the second information of storage is identical.
It is described to judge itself whether binding terminal in such scheme, including:
Using the first mark of itself storage, itself whether binding terminal is judged;First mark, which characterizes binding, is It is no to have been turned on.
In such scheme, methods described also includes:
When itself unbound terminal, the first information is stored, sets first mark to characterize binding Start, and make the first terminal access network;The first information of storage is used to determine whether using the smart card Accessing terminal to network.
The embodiment of the present invention additionally provides a kind of smart card, including:
Acquiring unit, for obtaining the first information;The first information includes the TerminalProfile values of first terminal With code IMEI;
Whether judging unit, the second information that the first information for judging to obtain stores with itself are identical;Described second The Terminal Profile values and IMEI that packet stores containing smart card itself;
Operating unit, for according to judged result, the first terminal is carried out authenticating lock operation or makes described first Accessing terminal to network.
In such scheme, the operating unit, it is specifically used for:
When the first information and second information differ, authentication lock operation is carried out to the first terminal.
In such scheme, the acquiring unit, it is specifically used for:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
In such scheme, the judging unit, it is additionally operable to judge the smart card whether binding terminal, when the intelligence When blocking binding terminal, judge whether the first information of acquisition is identical with the second information of the smart cards for storage.
In such scheme, the judging unit, it is specifically used for:
Using the first mark of itself storage, the smart card whether binding terminal is judged;First mark characterizes Whether binding has been turned on.
In such scheme, the operating unit, it is additionally operable to:
When the unbound terminal of the smart card, the first information is stored, sets first mark to characterize Binding has been turned on, and makes the first terminal access network;The first information of storage is used to determine whether to use the intelligence The accessing terminal to network that can block.
Control method provided in an embodiment of the present invention and smart card, obtain the first information;The first information includes first The Terminal Profile values and IMEI of terminal;Judge the second information for being stored with itself of the first information for obtaining whether phase Together;The Terminal Profile values and IMEI that second packet stores containing the smart card itself;According to judged result, The first terminal is carried out authenticating lock operation or makes the first terminal access network.Using Terminal Profile values Binding machine and card is realized with the dual judgements of IMEI, and TerminalProfile values are not easy modification, in this way, substantially increasing The threshold of binding machine and card disabler, improves security.
In addition, when implementing the scheme of the embodiment of the present invention, it is not necessary to network and terminal are transformed, in this way, implementing letter Single, change amount is small, workable.
Brief description of the drawings
In accompanying drawing (it is not necessarily drawn to scale), similar reference phase described in different views As part.Similar reference numerals with different letter suffix can represent the different examples of similar component.Accompanying drawing with example and Unrestricted mode generally shows each embodiment discussed herein.
Fig. 1 is the control method schematic flow sheet of the embodiment of the present invention one;
Fig. 2 is the method flow schematic diagram that the terminal A of the embodiment of the present invention two is bound for the first time with smart card;
Fig. 3 is the method flow schematic diagram that the terminal A of the embodiment of the present invention two is bound again with smart card;
Fig. 4 is the method flow schematic diagram that the terminal B of the embodiment of the present invention two is bound with smart card;
Fig. 5 is the schematic diagram of a scenario that the embodiment of the present invention two realizes one-to-one binding;
Fig. 6 is the smart card architecture schematic diagram of the embodiment of the present invention three.
Embodiment
Below in conjunction with the accompanying drawings and embodiment is described in further detail again to the present invention.
At present, in Internet of Things field, the scheme of the binding scheme of smart card and terminal is the public telephone scheme of existing network, i.e. intelligence Can card and terminal customizes, respectively store symmetric key, complete the verification of machine card key during start by customizing flow, pass through verification It then can be used, otherwise can not use.
Following defect be present in this scheme:Terminal and smart card are required to customize.But because Internet of Things field is extensive, if The class that makes preparations for sowing is various, updates fast, so the difficulty of terminal customization is big.
Based on this, in various embodiments of the present invention:Smart card obtains the first information;The first information includes first The Terminal Profile values and IMEI of terminal;Judge the second information for being stored with itself of the first information for obtaining whether phase Together;The Terminal Profile values and IMEI that second packet stores containing the smart card itself;According to judged result, The first terminal is carried out authenticating lock operation or makes the first terminal access network.
Embodiment one
The embodiment of the present invention provides a kind of control method, applied to smart card.Specifically, the smart card is to be applied to The smart card of Internet of Things field, it is referred to as Internet of Things card.The smart card is Universal Integrated Circuit Card (UICC, Universal Integrated Circuit Card)。
Fig. 1 is the control method schematic flow sheet of the embodiment of the present invention one.As shown in figure 1, this method comprises the following steps:
Step 101:Obtain the first information;
Here, the first information includes the Terminal Profile values and IMEI of first terminal.
Specifically, the Terminal Profile values that the first terminal is sent are received;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
Here, during practical application, card machine interaction flow is carried out with the smart card after the first terminal start, start is handed over After the completion of mutual flow, the first terminal actively sends Terminal Profile values to smart card, to trigger the smart card Start binding machine and card and judge flow, i.e., ask IMEI to the first terminal, and perform step 102~103.
The physical meaning of Terminal Profile values is:The function that this value display terminal is supported, usual same model This value of terminal is identical, is a fixed value.And generally it is not easy to be changed by the external world.If it find that Terminal Profile Value is different, illustrates that terminal has been changed.
Step 102:Judge whether the second information that the first information obtained stores with itself is identical;
Here, the Terminal Profile values and IMEI that second packet stores containing the smart card itself.
When judging, the smart card by the Terminal Profile values of first terminal and itself storage Terminal Profile values are compared, to judge whether the two is identical.Similarly, the smart card by the IMEI of the first terminal with from The IMEI of body storage is compared, to judge whether the two is identical.
The Terminal Profile values of first terminal are identical with the Terminal Profile values that itself is stored, and first When the IMEI of terminal is identical with the IMEI that itself is stored, the smart card thinks that the first information is identical with the second information.Certainly, The Terminal Profile values of one terminal are different from the Terminal Profile values that itself is stored, or, first terminal During the IMEI differences that IMEI stores with itself, the smart card thinks that the first information is different from second information.
Here, it is with the reason for by the way of IMEI is combined to judge using Terminal Profile values:Terminal is being System layer easily realizes IMEI renewal, if criminal updates system layer by brush machine (giving terminal installation system again) The IMEI for returning to smart card is consistent with the IMEI that smart card is stored, it is possible to realizes former separation between machine and card.And terminal is sent Terminal Profile values be privately owned, it usually needs obtaining certain authority could change, in addition each chip producer its repair The authority and method ordered are different, so its revision is extremely difficult, thus substantially increases criminal and pass through brush The mode of machine changes IMEI to evade the threshold of binding machine and card.
During practical application, before this step is performed, this method can also include:
Whether the smart card judges itself binding terminal, when itself binding terminal, judges the first letter obtained Cease whether identical with the second information of itself storage.
Wherein, whether the smart card judges itself terminal using the first mark of itself storage.
Here, first mark characterizes whether binding has been turned on.
Specifically, when the described first mark, which characterizes binding, to be had been turned on, the smart card determines itself binding terminal.
Wherein, during practical application, the smart card can be provided with private file, and the first mark is included in this private file And second information (Terminal Profile values and IMEI), to be successfully received the Terminal Profile values of first terminal Afterwards, judge whether the first terminal is the terminal bound with itself with the information in this private file.
When the described first mark, which characterizes, binds not actuated, the smart card determines itself unbound terminal, now, described Smart card is stored the first information, is set first mark to characterize binding and is had been turned on, and makes the first terminal Access network.
Here, the first information of storage is used to determine whether the accessing terminal to network using the smart card.Change sentence Talk about, the first information be used for subsequently judge with itself boot up interaction flow terminal whether be with itself bind end End, when the terminal subsequently with itself booting up interaction flow is not the terminal with itself binding, then the terminal is reflected Lock operation is weighed, the accessing terminal to network is prevented with this.When the terminal subsequently with itself booting up interaction flow is During terminal (i.e. the first terminal) bound with itself, then without any intervention, so that the described accessing terminal to network.
Step 103:According to judged result, the first terminal is carried out authenticating lock operation or connects the first terminal Enter network.
Specifically, when the first information and second information differ, the smart card is to the first terminal Carry out authentication lock operation and (message of failed authentication is returned to the first terminal, to intervene the first terminal access network Network).
When the first information is identical with second information, the smart card does not make any intervention, afterflow after continuation Journey, so that the first terminal normally accesses network.
Control method provided in an embodiment of the present invention, obtain the first information;The first information includes first terminal Terminal Profile values and IMEI;Judge whether the second information that the first information obtained stores with itself is identical;It is described The Terminal Profile values and IMEI that second packet stores containing the smart card itself;According to judged result, to described First terminal carries out authenticating lock operation or makes the first terminal access network.Using Terminal Profile values and IMEI Binding machine and card is realized in dual judgement, and Terminal Profile values are not easy modification, in this way, the machine card of substantially increasing is tied up Determine the threshold of disabler, improve security.
In addition, when implementing the scheme of the embodiment of the present invention, it is not necessary to network and terminal are transformed, in this way, implementing letter Single, change amount is small, workable.
Embodiment two
On the basis of embodiment one, the present embodiment is described in detail how to realize binding machine and card decision process.
First, private file is provided with UICC, is sent comprising first mark, IMEI and during starting up of terminal Terminal Profile values.
Secondly, the application scenarios of the present embodiment are:There are two terminals of terminal A and terminal B, terminal A is and UICC bindings Terminal, terminal B are unbundling terminal.
3rd, the scheme of the embodiment of the present invention is realized, it is necessary to be modified to UICC.Specifically, machine is set on UICC Card binding judging unit, is combined judgement, carrying out authentication lock operation according to judged result (returns for the content of reception Failed authentication) cause terminal can not step on net or do not do any intervention so that terminal normally steps on net.
So, the process that terminal A and UICC is bound, as shown in Fig. 2 comprising the following steps:
Step 201:After terminal A starts, interaction flow is booted up with UICC;
Here, the process meets flow as defined in international standard.
Step 202:After the completion of interaction, terminal A sends Terminal Profile values, starts binding machine and card to trigger UICC Determination flow;
Step 203:After UICC receives Terminal Profile values, proactive command is sent to terminal A, with requesting terminal A sends IMEI;
Step 204:After terminal A receives order, IMEI is returned to UICC;
Step 205:After UICC receives IMEI, judge whether binding terminal using the first mark, when determining unbound, note Terminal Profile values and IMEI are recorded, and sets the first mark to characterize binding and has been turned on, and does not do and intervenes, afterflow after continuation Journey, so that terminal A normally steps on net, i.e., successful access network network.
Here, it is necessary to which explanation is:During unbound terminal, in UICC proprietary file, the first mark characterizes binding and not opened It is dynamic, and Terminal Profile values and IMEI are not stored.After UICC binds a terminal, can the first mark table just be set Sign binding has been turned on, and stores Terminal Profile values and IMEI.
Then, after terminal A shuts down, after turning back on, UICC needs execution machine card decision process.As shown in figure 3, terminal The flow that A and UICC is bound comprises the following steps:
Step 301:After terminal A starts, interaction flow is booted up with UICC;
Step 302:After the completion of interaction, terminal A sends Terminal Profile values, starts binding machine and card to trigger UICC Determination flow;
Step 303:After UICC receives Terminal Profile values, proactive command is sent to terminal A, with requesting terminal A sends IMEI;
Step 304:After terminal A receives order, IMEI is returned to UICC;
Step 305:After UICC receives IMEI, judge whether binding terminal using the first mark, it is determined that when having bound, sentence (storage) the TerminalProfile values and IMEI of the disconnected Terminal Profile values received and IMEI and record whether phase Together, do not do when identical and intervene, continue follow-up process, so that terminal A normally steps on net, i.e., successful access network network.
When here, due to first binding, UICC stores Terminal Profile values and IMEI, and the first mark characterizes Have been turned on, after terminal A triggering again is received, UICC can determine UICC binding terminals, then judge according to the first mark Whether the Terminal Profile values and IMEI received be identical with the TerminalProfile values and IMEI of storage, determines phase Do not do and intervene simultaneously, continue follow-up process, so that terminal A normally steps on net.
So, after terminal A and UICC is bound, user wants to extract to be put into terminal B from terminal A by UICC to use, then together There is the process that terminal B and UICC is bound in sample.
As shown in figure 4, the flow that terminal B and UICC is bound comprises the following steps:
Step 401:After terminal B starts, interaction flow is booted up with UICC;
Step 402:After the completion of interaction, terminal B sends Terminal Profile values, starts binding machine and card to trigger UICC Determination flow;
Step 403:After UICC receives Terminal Profile values, proactive command is sent to terminal B, with requesting terminal B sends IMEI;
Step 404:After terminal B receives order, IMEI is returned to UICC;
Step 405:After UICC receives IMEI, judge whether binding terminal using the first mark, it is determined that when having bound, sentence (storage) the TerminalProfile values and IMEI of the disconnected Terminal Profile values received and IMEI and record whether phase Together, it is determined that when differing, authentication lock operation is carried out to terminal B, to intervene terminal B access networks so that terminal B can not be normal Net is stepped on, also can not just use UICC.
When here, due to first binding, UICC stores Terminal Profile values and IMEI, and the first mark characterizes Have been turned on, after terminal B triggering is received, UICC can determine UICC binding terminals, then judge to receive according to the first mark Terminal Profile values and IMEI with store TerminalProfile values and IMEI it is whether identical, it is determined that differing When terminal B is carried out authentication lock operation (to terminal B return failed authentication message) so that terminal B can not normally step on net.
In this process, due to using the dual judgement of IMEI and Terminal Profile values, so, terminal B is passed through Although the mode of brush machine can make it that its IMEI is identical with terminal A IMEI, terminal B Terminal can not be changed Profile values, therefore, after the scheme of the embodiment of the present invention, substantially increase and tied up by terminal brush machine mode machine card Determine the threshold of disabler.
In other words, as shown in figure 5, after using the scheme of the embodiment of the present invention, man-to-man machine can be effectively realized Card binding relationship.
From the above description, it will be seen that during the scheme of the embodiment embodiment of the present invention, it is not necessary to terminal and network Side is modified, in this way, implementing simply, change amount is small, workable.
Embodiment three
To realize the method for the embodiment of the present invention, the present embodiment provides a kind of smart card.Specifically, the smart card is Applied to the smart card of Internet of Things field, Internet of Things card is referred to as.The smart card is UICC.As shown in fig. 6, the smart card Including:
Acquiring unit 61, for obtaining the first information;The first information includes the TerminalProfile of first terminal Value and code IMEI;
Whether judging unit 62, the second information that the first information for judging to obtain stores with itself are identical;Described The Terminal Profile values and IMEI that two packets store containing smart card itself;
Operating unit 63, for according to judged result, to the first terminal authenticate lock operation or make described the One accessing terminal to network.
Wherein, the acquiring unit 61, is specifically used for:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
Here, during practical application, card machine interaction flow is carried out with the smart card after the first terminal start, start is handed over After the completion of mutual flow, the first terminal actively sends Terminal Profile values to smart card, to trigger the smart card Start binding machine and card judge flow, i.e., described acquiring unit 61 to the first terminal request IMEI, and judging unit 62 and Operating unit 63 completes corresponding function.
The physical meaning of Terminal Profile values is:The function that this value display terminal is supported, usual same model This value of terminal is identical, is a fixed value.And generally it is not easy to be changed by the external world.If it find that Terminal Profile Value is different, illustrates that terminal has been changed.
When judging, the judging unit 62 stores the Terminal Profile values of first terminal with itself Terminal Profile values are compared, to judge whether the two is identical.Similarly, the judging unit 62 is whole by described first The IMEI at end is compared with the IMEI that itself is stored, to judge whether the two is identical.
The Terminal Profile values of first terminal are identical with the Terminal Profile values that itself is stored, and first When the IMEI of terminal is identical with the IMEI that itself is stored, the judging unit 62 thinks that the first information is identical with the second information.When So, the Terminal Profile values of first terminal are different from the TerminalProfile values that itself is stored, or, first eventually During the IMEI differences that the IMEI at end stores with itself, the judging unit 62 thinks the first information with second information not Together.
Here, it is with the reason for by the way of IMEI is combined to judge using Terminal Profile values:Terminal is being System layer easily realizes IMEI renewal, if criminal updates system layer by brush machine (giving terminal installation system again) The IMEI for returning to smart card is consistent with the IMEI that smart card is stored, it is possible to realizes former separation between machine and card.And terminal is sent Terminal Profile values be privately owned, it usually needs obtaining certain authority could change, in addition each chip producer its repair The authority and method ordered are different, so its revision is extremely difficult, thus substantially increases criminal and pass through brush The mode of machine changes IMEI to evade the threshold of binding machine and card.
During practical application, the judging unit 62, it is additionally operable to judge the smart card whether binding terminal, when the intelligence When can block binding terminal, judge whether the first information of acquisition is identical with the second information of the smart cards for storage.
Wherein, whether the judging unit 62 judges smart card terminal using the first mark of itself storage.
Here, first mark characterizes whether binding has been turned on.
Specifically, when the described first mark, which characterizes binding, to be had been turned on, the judging unit 62 determines the smart card Binding terminal.
Wherein, during practical application, the smart card can be provided with private file, and the first mark is included in this private file And second information (Terminal Profile values and IMEI), to be successfully received the Terminal Profile values of first terminal Afterwards, judge whether the first terminal is the terminal bound with itself with the information in this private file.
When the described first mark, which characterizes, binds not actuated, the judging unit 62 determines the smart card unbound end End, now, the operating unit 63 is stored the first information, is set first mark to characterize binding and is had been turned on, And make the first terminal access network.
Here, the first information of storage is used to determine whether the accessing terminal to network using the smart card.Change sentence Talk about, the first information be used for subsequently judge with the smart card boot up interaction flow terminal whether be and the intelligence The terminal of binding can be blocked, when the follow-up terminal that interaction flow is booted up with the smart card is bound with the smart card During terminal, then authentication lock operation is carried out to the terminal, the accessing terminal to network is prevented with this.When it is described subsequently with the intelligence When the terminal that energy card boots up interaction flow is terminal (i.e. the first terminal) with smart card binding, then without any Intervene, so that the described accessing terminal to network.
When the first information and second information differ, the operating unit 63 is carried out to the first terminal Authenticate lock operation (message of failed authentication being returned to the first terminal, to intervene the first terminal access network).
When the first information is identical with second information, the operating unit 63 does not make any intervention, after continuation Afterflow journey, so that the first terminal normally accesses network.
During practical application, the acquiring unit 61, judging unit 62 and operating unit 63 can be by micro- in smart card Manage device (MCU, Micro Control Unit), digital signal processor (DSP, Digital SignalProcessor) or can The processors such as programmed logic array (PLA) (FPGA, Field-Programmable Gate Array) are realized.
Scheme provided in an embodiment of the present invention, the acquiring unit 61 obtain the first information;The first information includes the The Terminal Profile values and IMEI of one terminal;The judging unit 62 judges the first information and the second of storage obtained Whether information is identical;The Terminal Profile values and IMEI that second packet stores containing the smart card itself;Institute Operating unit 63 is stated according to judged result, the first terminal is carried out authenticating lock operation or makes the first terminal access network Network.Binding machine and card is realized using Terminal Profile values and the dual judgements of IMEI, and Terminal Profile values are not It is easily modified, in this way, substantially increasing the threshold of binding machine and card disabler, improves security.
In addition, when implementing the scheme of the embodiment of the present invention, it is not necessary to network and terminal are transformed, in this way, implementing letter Single, change amount is small, workable.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage The form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (12)

1. a kind of control method, it is characterised in that applied to smart card, methods described includes:
Obtain the first information;The first information includes the international shiftings of terminal configuration Terminal Profile Zhi He of first terminal Dynamic EIC equipment identification code IMEI;
Judge whether the second information that the first information obtained stores with itself is identical;Second packet contains the smart card The Terminal Profile values and IMEI of itself storage;
According to judged result, the first terminal is carried out authenticating lock operation or the first terminal is accessed network.
2. according to the method for claim 1, it is characterised in that it is described according to judged result, the first terminal is carried out Authentication lock operation makes the first terminal access network, including:
When the first information and second information differ, authentication lock operation is carried out to the first terminal.
3. according to the method for claim 1, it is characterised in that the acquisition first information, including:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
4. according to the method for claim 1, it is characterised in that the first information for judging to obtain and the of itself storage Before whether two information are identical, methods described also includes:
Judge itself whether binding terminal, when itself binding terminal, judge the first information and itself storage obtained Whether the second information is identical.
5. according to the method for claim 4, it is characterised in that it is described to judge itself whether binding terminal, including:
Using the first mark of itself storage, itself whether binding terminal is judged;Whether first mark characterizes binding Start.
6. according to the method for claim 5, it is characterised in that methods described also includes:
When itself unbound terminal, the first information is stored, sets first mark to characterize binding and has been turned on, And make the first terminal access network;The first information of storage is used to determine whether to connect using the terminal of the smart card Enter network.
7. a kind of smart card, it is characterised in that the smart card includes:
Acquiring unit, for obtaining the first information;The first information include first terminal Terminal Profile values with Code IMEI;
Whether judging unit, the second information that the first information for judging to obtain stores with itself are identical;Second information Include the Terminal Profile values and IMEI of smart card itself storage;
Operating unit, for according to judged result, carrying out authenticating lock operation to the first terminal or making the first terminal Access network.
8. smart card according to claim 7, it is characterised in that the operating unit, be specifically used for:
When the first information and second information differ, authentication lock operation is carried out to the first terminal.
9. smart card according to claim 7, it is characterised in that the acquiring unit, be specifically used for:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
10. smart card according to claim 7, it is characterised in that the judging unit, be additionally operable to judge the smart card Whether binding terminal, when the smart card binding terminal, judge the first information of acquisition and the smart cards for storage Whether the second information is identical.
11. smart card according to claim 10, it is characterised in that the judging unit, be specifically used for:
Using the first mark of itself storage, the smart card whether binding terminal is judged;First mark characterizes binding Whether have been turned on.
12. smart card according to claim 11, it is characterised in that the operating unit, be additionally operable to:
When the unbound terminal of the smart card, the first information is stored, sets first mark to characterize binding Have been turned on, and make the first terminal access network;The first information of storage is used to determine whether to use the smart card Accessing terminal to network.
CN201610848245.9A 2016-09-23 2016-09-23 Control method and smart card Active CN107872786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610848245.9A CN107872786B (en) 2016-09-23 2016-09-23 Control method and smart card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610848245.9A CN107872786B (en) 2016-09-23 2016-09-23 Control method and smart card

Publications (2)

Publication Number Publication Date
CN107872786A true CN107872786A (en) 2018-04-03
CN107872786B CN107872786B (en) 2021-06-25

Family

ID=61751642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610848245.9A Active CN107872786B (en) 2016-09-23 2016-09-23 Control method and smart card

Country Status (1)

Country Link
CN (1) CN107872786B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112839325A (en) * 2020-12-29 2021-05-25 北京握奇智能科技有限公司 Method for realizing machine-card binding by card end application
WO2023273289A1 (en) * 2021-06-29 2023-01-05 展讯通信(上海)有限公司 Anti-theft method and apparatus for sim card

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103079203A (en) * 2013-02-05 2013-05-01 北京握奇数据***有限公司 Terminal authentication method and smart card
US20140323092A1 (en) * 2007-09-12 2014-10-30 Devicefidelity, Inc. Wirelessly accessing broadband services using intelligent cards
CN105228125A (en) * 2014-05-27 2016-01-06 中兴通讯股份有限公司 A kind of smart card dynamic binding method, apparatus and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140323092A1 (en) * 2007-09-12 2014-10-30 Devicefidelity, Inc. Wirelessly accessing broadband services using intelligent cards
CN103079203A (en) * 2013-02-05 2013-05-01 北京握奇数据***有限公司 Terminal authentication method and smart card
CN105228125A (en) * 2014-05-27 2016-01-06 中兴通讯股份有限公司 A kind of smart card dynamic binding method, apparatus and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112839325A (en) * 2020-12-29 2021-05-25 北京握奇智能科技有限公司 Method for realizing machine-card binding by card end application
WO2023273289A1 (en) * 2021-06-29 2023-01-05 展讯通信(上海)有限公司 Anti-theft method and apparatus for sim card

Also Published As

Publication number Publication date
CN107872786B (en) 2021-06-25

Similar Documents

Publication Publication Date Title
US10748144B2 (en) System and method for transaction security enhancement
US9686632B2 (en) Method and apparatus for accessing virtual smart cards
CN105446713B (en) Method for secure storing and equipment
EP3462704B1 (en) Information processing apparatus, information processing method, program, and information processing system
CN109995713A (en) Service processing method and relevant device in a kind of micro services frame
CN103984579B (en) More equipment rooms share the method for current application program real-time running state
CN110023941A (en) A kind of system on chip and method for realizing secure operating system switching
CN105745663B (en) Protection system including the assessment of machine learning snapshot
CN108428451B (en) Voice control method, electronic equipment and voice control system
CN104660557B (en) operation processing method and device
CN110400145A (en) A kind of digital identity application system and method, identity authorization system and method
CN107464109A (en) Credible mobile payment device, system and method
CN110876144B (en) Mobile application method, device and system for identity certificate
CN107533596B (en) Fingerprint identification method and mobile terminal
CN110766394A (en) Bus taking payment method and device based on credit degree, electronic equipment and storage medium
CN108288168A (en) Borrow or lend money register method, terminal and the computer readable storage medium of service account
CN106897629A (en) The control method and terminal of terminal applies
CN108076042A (en) User information acquiring method, server and computer-readable medium
CN107634989A (en) A kind of cloud wallet construction method and server
US10115092B1 (en) Service composition in a mobile communication device application framework
EP3416121B1 (en) Digital wallet application for mobile payment
CN107872786A (en) A kind of control method and smart card
CN107526580A (en) Terminal applies recognition methods and device
WO2016127449A1 (en) Instruction processing method, device and terminal
CN108154372A (en) A kind of account communications and liaison method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant