CN107872786A - A kind of control method and smart card - Google Patents
A kind of control method and smart card Download PDFInfo
- Publication number
- CN107872786A CN107872786A CN201610848245.9A CN201610848245A CN107872786A CN 107872786 A CN107872786 A CN 107872786A CN 201610848245 A CN201610848245 A CN 201610848245A CN 107872786 A CN107872786 A CN 107872786A
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- smart card
- imei
- itself
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of control method, including:Smart card obtains the first information;The terminal that the first information includes first terminal configures(Terminal Profile)Value and international mobile equipment identification number(IMEI);Judge whether the second information that the first information obtained stores with itself is identical;The Terminal Profile values and IMEI that second packet stores containing smart card itself;According to judged result, the first terminal is carried out authenticating lock operation or the first terminal is accessed network.The present invention also discloses a kind of smart card.
Description
Technical field
The present invention relates to net networking technology, more particularly to a kind of control method and smart card.
Background technology
Internet of Things is the important component of generation information technology, and the important development stage in " informationization " epoch.
At present, internet of things service, wearable device, point-of-sale terminal (POS, Point Of Sale) be can be applied to, (client carries vehicle-mounted rear dress
In boutique or the navigation system in otherwise purchase installation after car), the market such as intelligent electric meter.
Internet of Things card rate are cheap compared with domestic consumer's card rate, in order to avoid Internet of Things card is banished into personal user's hand, to individual
People user market impacts, or the problems such as arrearage occurs, is applied to illegal purposes, can not trace, it is necessary to by Internet of Things card and
Terminal is bound, i.e., internet-of-things terminal and card bound after can normal use, card extraction is put into other-end then not
It can use.
At present, conventional binding mode is the public telephone scheme in existing network, but during the implementation program, terminal and smart card
It is required for customizing, the difficulty of terminal customization is very big in Internet of Things.
The content of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of control method and smart card.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of control method, and applied to smart card, methods described includes:
Obtain the first information;The first information include first terminal terminal configuration (Terminal Profile) value and
International mobile equipment identification number (IMEI, International Mobile Equipment Identity);
Judge whether the second information that the first information obtained stores with itself is identical;Second packet contains the intelligence
The Terminal Profile values and IMEI of itself storage can be blocked;
According to judged result, the first terminal is carried out authenticating lock operation or the first terminal is accessed network.
It is described according to judged result in such scheme, to the first terminal authenticate lock operation or make described the
One accessing terminal to network, including:
When the first information and second information differ, authentication lock operation is carried out to the first terminal.
In such scheme, the acquisition first information, including:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
In such scheme, before whether the first information for judging to obtain is identical with the second information of itself storage, institute
Stating method also includes:
Judge itself whether binding terminal, when itself binding terminal, the first information for judging to obtain is deposited with itself
Whether the second information of storage is identical.
It is described to judge itself whether binding terminal in such scheme, including:
Using the first mark of itself storage, itself whether binding terminal is judged;First mark, which characterizes binding, is
It is no to have been turned on.
In such scheme, methods described also includes:
When itself unbound terminal, the first information is stored, sets first mark to characterize binding
Start, and make the first terminal access network;The first information of storage is used to determine whether using the smart card
Accessing terminal to network.
The embodiment of the present invention additionally provides a kind of smart card, including:
Acquiring unit, for obtaining the first information;The first information includes the TerminalProfile values of first terminal
With code IMEI;
Whether judging unit, the second information that the first information for judging to obtain stores with itself are identical;Described second
The Terminal Profile values and IMEI that packet stores containing smart card itself;
Operating unit, for according to judged result, the first terminal is carried out authenticating lock operation or makes described first
Accessing terminal to network.
In such scheme, the operating unit, it is specifically used for:
When the first information and second information differ, authentication lock operation is carried out to the first terminal.
In such scheme, the acquiring unit, it is specifically used for:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
In such scheme, the judging unit, it is additionally operable to judge the smart card whether binding terminal, when the intelligence
When blocking binding terminal, judge whether the first information of acquisition is identical with the second information of the smart cards for storage.
In such scheme, the judging unit, it is specifically used for:
Using the first mark of itself storage, the smart card whether binding terminal is judged;First mark characterizes
Whether binding has been turned on.
In such scheme, the operating unit, it is additionally operable to:
When the unbound terminal of the smart card, the first information is stored, sets first mark to characterize
Binding has been turned on, and makes the first terminal access network;The first information of storage is used to determine whether to use the intelligence
The accessing terminal to network that can block.
Control method provided in an embodiment of the present invention and smart card, obtain the first information;The first information includes first
The Terminal Profile values and IMEI of terminal;Judge the second information for being stored with itself of the first information for obtaining whether phase
Together;The Terminal Profile values and IMEI that second packet stores containing the smart card itself;According to judged result,
The first terminal is carried out authenticating lock operation or makes the first terminal access network.Using Terminal Profile values
Binding machine and card is realized with the dual judgements of IMEI, and TerminalProfile values are not easy modification, in this way, substantially increasing
The threshold of binding machine and card disabler, improves security.
In addition, when implementing the scheme of the embodiment of the present invention, it is not necessary to network and terminal are transformed, in this way, implementing letter
Single, change amount is small, workable.
Brief description of the drawings
In accompanying drawing (it is not necessarily drawn to scale), similar reference phase described in different views
As part.Similar reference numerals with different letter suffix can represent the different examples of similar component.Accompanying drawing with example and
Unrestricted mode generally shows each embodiment discussed herein.
Fig. 1 is the control method schematic flow sheet of the embodiment of the present invention one;
Fig. 2 is the method flow schematic diagram that the terminal A of the embodiment of the present invention two is bound for the first time with smart card;
Fig. 3 is the method flow schematic diagram that the terminal A of the embodiment of the present invention two is bound again with smart card;
Fig. 4 is the method flow schematic diagram that the terminal B of the embodiment of the present invention two is bound with smart card;
Fig. 5 is the schematic diagram of a scenario that the embodiment of the present invention two realizes one-to-one binding;
Fig. 6 is the smart card architecture schematic diagram of the embodiment of the present invention three.
Embodiment
Below in conjunction with the accompanying drawings and embodiment is described in further detail again to the present invention.
At present, in Internet of Things field, the scheme of the binding scheme of smart card and terminal is the public telephone scheme of existing network, i.e. intelligence
Can card and terminal customizes, respectively store symmetric key, complete the verification of machine card key during start by customizing flow, pass through verification
It then can be used, otherwise can not use.
Following defect be present in this scheme:Terminal and smart card are required to customize.But because Internet of Things field is extensive, if
The class that makes preparations for sowing is various, updates fast, so the difficulty of terminal customization is big.
Based on this, in various embodiments of the present invention:Smart card obtains the first information;The first information includes first
The Terminal Profile values and IMEI of terminal;Judge the second information for being stored with itself of the first information for obtaining whether phase
Together;The Terminal Profile values and IMEI that second packet stores containing the smart card itself;According to judged result,
The first terminal is carried out authenticating lock operation or makes the first terminal access network.
Embodiment one
The embodiment of the present invention provides a kind of control method, applied to smart card.Specifically, the smart card is to be applied to
The smart card of Internet of Things field, it is referred to as Internet of Things card.The smart card is Universal Integrated Circuit Card (UICC, Universal
Integrated Circuit Card)。
Fig. 1 is the control method schematic flow sheet of the embodiment of the present invention one.As shown in figure 1, this method comprises the following steps:
Step 101:Obtain the first information;
Here, the first information includes the Terminal Profile values and IMEI of first terminal.
Specifically, the Terminal Profile values that the first terminal is sent are received;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
Here, during practical application, card machine interaction flow is carried out with the smart card after the first terminal start, start is handed over
After the completion of mutual flow, the first terminal actively sends Terminal Profile values to smart card, to trigger the smart card
Start binding machine and card and judge flow, i.e., ask IMEI to the first terminal, and perform step 102~103.
The physical meaning of Terminal Profile values is:The function that this value display terminal is supported, usual same model
This value of terminal is identical, is a fixed value.And generally it is not easy to be changed by the external world.If it find that Terminal Profile
Value is different, illustrates that terminal has been changed.
Step 102:Judge whether the second information that the first information obtained stores with itself is identical;
Here, the Terminal Profile values and IMEI that second packet stores containing the smart card itself.
When judging, the smart card by the Terminal Profile values of first terminal and itself storage Terminal
Profile values are compared, to judge whether the two is identical.Similarly, the smart card by the IMEI of the first terminal with from
The IMEI of body storage is compared, to judge whether the two is identical.
The Terminal Profile values of first terminal are identical with the Terminal Profile values that itself is stored, and first
When the IMEI of terminal is identical with the IMEI that itself is stored, the smart card thinks that the first information is identical with the second information.Certainly,
The Terminal Profile values of one terminal are different from the Terminal Profile values that itself is stored, or, first terminal
During the IMEI differences that IMEI stores with itself, the smart card thinks that the first information is different from second information.
Here, it is with the reason for by the way of IMEI is combined to judge using Terminal Profile values:Terminal is being
System layer easily realizes IMEI renewal, if criminal updates system layer by brush machine (giving terminal installation system again)
The IMEI for returning to smart card is consistent with the IMEI that smart card is stored, it is possible to realizes former separation between machine and card.And terminal is sent
Terminal Profile values be privately owned, it usually needs obtaining certain authority could change, in addition each chip producer its repair
The authority and method ordered are different, so its revision is extremely difficult, thus substantially increases criminal and pass through brush
The mode of machine changes IMEI to evade the threshold of binding machine and card.
During practical application, before this step is performed, this method can also include:
Whether the smart card judges itself binding terminal, when itself binding terminal, judges the first letter obtained
Cease whether identical with the second information of itself storage.
Wherein, whether the smart card judges itself terminal using the first mark of itself storage.
Here, first mark characterizes whether binding has been turned on.
Specifically, when the described first mark, which characterizes binding, to be had been turned on, the smart card determines itself binding terminal.
Wherein, during practical application, the smart card can be provided with private file, and the first mark is included in this private file
And second information (Terminal Profile values and IMEI), to be successfully received the Terminal Profile values of first terminal
Afterwards, judge whether the first terminal is the terminal bound with itself with the information in this private file.
When the described first mark, which characterizes, binds not actuated, the smart card determines itself unbound terminal, now, described
Smart card is stored the first information, is set first mark to characterize binding and is had been turned on, and makes the first terminal
Access network.
Here, the first information of storage is used to determine whether the accessing terminal to network using the smart card.Change sentence
Talk about, the first information be used for subsequently judge with itself boot up interaction flow terminal whether be with itself bind end
End, when the terminal subsequently with itself booting up interaction flow is not the terminal with itself binding, then the terminal is reflected
Lock operation is weighed, the accessing terminal to network is prevented with this.When the terminal subsequently with itself booting up interaction flow is
During terminal (i.e. the first terminal) bound with itself, then without any intervention, so that the described accessing terminal to network.
Step 103:According to judged result, the first terminal is carried out authenticating lock operation or connects the first terminal
Enter network.
Specifically, when the first information and second information differ, the smart card is to the first terminal
Carry out authentication lock operation and (message of failed authentication is returned to the first terminal, to intervene the first terminal access network
Network).
When the first information is identical with second information, the smart card does not make any intervention, afterflow after continuation
Journey, so that the first terminal normally accesses network.
Control method provided in an embodiment of the present invention, obtain the first information;The first information includes first terminal
Terminal Profile values and IMEI;Judge whether the second information that the first information obtained stores with itself is identical;It is described
The Terminal Profile values and IMEI that second packet stores containing the smart card itself;According to judged result, to described
First terminal carries out authenticating lock operation or makes the first terminal access network.Using Terminal Profile values and IMEI
Binding machine and card is realized in dual judgement, and Terminal Profile values are not easy modification, in this way, the machine card of substantially increasing is tied up
Determine the threshold of disabler, improve security.
In addition, when implementing the scheme of the embodiment of the present invention, it is not necessary to network and terminal are transformed, in this way, implementing letter
Single, change amount is small, workable.
Embodiment two
On the basis of embodiment one, the present embodiment is described in detail how to realize binding machine and card decision process.
First, private file is provided with UICC, is sent comprising first mark, IMEI and during starting up of terminal
Terminal Profile values.
Secondly, the application scenarios of the present embodiment are:There are two terminals of terminal A and terminal B, terminal A is and UICC bindings
Terminal, terminal B are unbundling terminal.
3rd, the scheme of the embodiment of the present invention is realized, it is necessary to be modified to UICC.Specifically, machine is set on UICC
Card binding judging unit, is combined judgement, carrying out authentication lock operation according to judged result (returns for the content of reception
Failed authentication) cause terminal can not step on net or do not do any intervention so that terminal normally steps on net.
So, the process that terminal A and UICC is bound, as shown in Fig. 2 comprising the following steps:
Step 201:After terminal A starts, interaction flow is booted up with UICC;
Here, the process meets flow as defined in international standard.
Step 202:After the completion of interaction, terminal A sends Terminal Profile values, starts binding machine and card to trigger UICC
Determination flow;
Step 203:After UICC receives Terminal Profile values, proactive command is sent to terminal A, with requesting terminal
A sends IMEI;
Step 204:After terminal A receives order, IMEI is returned to UICC;
Step 205:After UICC receives IMEI, judge whether binding terminal using the first mark, when determining unbound, note
Terminal Profile values and IMEI are recorded, and sets the first mark to characterize binding and has been turned on, and does not do and intervenes, afterflow after continuation
Journey, so that terminal A normally steps on net, i.e., successful access network network.
Here, it is necessary to which explanation is:During unbound terminal, in UICC proprietary file, the first mark characterizes binding and not opened
It is dynamic, and Terminal Profile values and IMEI are not stored.After UICC binds a terminal, can the first mark table just be set
Sign binding has been turned on, and stores Terminal Profile values and IMEI.
Then, after terminal A shuts down, after turning back on, UICC needs execution machine card decision process.As shown in figure 3, terminal
The flow that A and UICC is bound comprises the following steps:
Step 301:After terminal A starts, interaction flow is booted up with UICC;
Step 302:After the completion of interaction, terminal A sends Terminal Profile values, starts binding machine and card to trigger UICC
Determination flow;
Step 303:After UICC receives Terminal Profile values, proactive command is sent to terminal A, with requesting terminal
A sends IMEI;
Step 304:After terminal A receives order, IMEI is returned to UICC;
Step 305:After UICC receives IMEI, judge whether binding terminal using the first mark, it is determined that when having bound, sentence
(storage) the TerminalProfile values and IMEI of the disconnected Terminal Profile values received and IMEI and record whether phase
Together, do not do when identical and intervene, continue follow-up process, so that terminal A normally steps on net, i.e., successful access network network.
When here, due to first binding, UICC stores Terminal Profile values and IMEI, and the first mark characterizes
Have been turned on, after terminal A triggering again is received, UICC can determine UICC binding terminals, then judge according to the first mark
Whether the Terminal Profile values and IMEI received be identical with the TerminalProfile values and IMEI of storage, determines phase
Do not do and intervene simultaneously, continue follow-up process, so that terminal A normally steps on net.
So, after terminal A and UICC is bound, user wants to extract to be put into terminal B from terminal A by UICC to use, then together
There is the process that terminal B and UICC is bound in sample.
As shown in figure 4, the flow that terminal B and UICC is bound comprises the following steps:
Step 401:After terminal B starts, interaction flow is booted up with UICC;
Step 402:After the completion of interaction, terminal B sends Terminal Profile values, starts binding machine and card to trigger UICC
Determination flow;
Step 403:After UICC receives Terminal Profile values, proactive command is sent to terminal B, with requesting terminal
B sends IMEI;
Step 404:After terminal B receives order, IMEI is returned to UICC;
Step 405:After UICC receives IMEI, judge whether binding terminal using the first mark, it is determined that when having bound, sentence
(storage) the TerminalProfile values and IMEI of the disconnected Terminal Profile values received and IMEI and record whether phase
Together, it is determined that when differing, authentication lock operation is carried out to terminal B, to intervene terminal B access networks so that terminal B can not be normal
Net is stepped on, also can not just use UICC.
When here, due to first binding, UICC stores Terminal Profile values and IMEI, and the first mark characterizes
Have been turned on, after terminal B triggering is received, UICC can determine UICC binding terminals, then judge to receive according to the first mark
Terminal Profile values and IMEI with store TerminalProfile values and IMEI it is whether identical, it is determined that differing
When terminal B is carried out authentication lock operation (to terminal B return failed authentication message) so that terminal B can not normally step on net.
In this process, due to using the dual judgement of IMEI and Terminal Profile values, so, terminal B is passed through
Although the mode of brush machine can make it that its IMEI is identical with terminal A IMEI, terminal B Terminal can not be changed
Profile values, therefore, after the scheme of the embodiment of the present invention, substantially increase and tied up by terminal brush machine mode machine card
Determine the threshold of disabler.
In other words, as shown in figure 5, after using the scheme of the embodiment of the present invention, man-to-man machine can be effectively realized
Card binding relationship.
From the above description, it will be seen that during the scheme of the embodiment embodiment of the present invention, it is not necessary to terminal and network
Side is modified, in this way, implementing simply, change amount is small, workable.
Embodiment three
To realize the method for the embodiment of the present invention, the present embodiment provides a kind of smart card.Specifically, the smart card is
Applied to the smart card of Internet of Things field, Internet of Things card is referred to as.The smart card is UICC.As shown in fig. 6, the smart card
Including:
Acquiring unit 61, for obtaining the first information;The first information includes the TerminalProfile of first terminal
Value and code IMEI;
Whether judging unit 62, the second information that the first information for judging to obtain stores with itself are identical;Described
The Terminal Profile values and IMEI that two packets store containing smart card itself;
Operating unit 63, for according to judged result, to the first terminal authenticate lock operation or make described the
One accessing terminal to network.
Wherein, the acquiring unit 61, is specifically used for:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
Here, during practical application, card machine interaction flow is carried out with the smart card after the first terminal start, start is handed over
After the completion of mutual flow, the first terminal actively sends Terminal Profile values to smart card, to trigger the smart card
Start binding machine and card judge flow, i.e., described acquiring unit 61 to the first terminal request IMEI, and judging unit 62 and
Operating unit 63 completes corresponding function.
The physical meaning of Terminal Profile values is:The function that this value display terminal is supported, usual same model
This value of terminal is identical, is a fixed value.And generally it is not easy to be changed by the external world.If it find that Terminal Profile
Value is different, illustrates that terminal has been changed.
When judging, the judging unit 62 stores the Terminal Profile values of first terminal with itself
Terminal Profile values are compared, to judge whether the two is identical.Similarly, the judging unit 62 is whole by described first
The IMEI at end is compared with the IMEI that itself is stored, to judge whether the two is identical.
The Terminal Profile values of first terminal are identical with the Terminal Profile values that itself is stored, and first
When the IMEI of terminal is identical with the IMEI that itself is stored, the judging unit 62 thinks that the first information is identical with the second information.When
So, the Terminal Profile values of first terminal are different from the TerminalProfile values that itself is stored, or, first eventually
During the IMEI differences that the IMEI at end stores with itself, the judging unit 62 thinks the first information with second information not
Together.
Here, it is with the reason for by the way of IMEI is combined to judge using Terminal Profile values:Terminal is being
System layer easily realizes IMEI renewal, if criminal updates system layer by brush machine (giving terminal installation system again)
The IMEI for returning to smart card is consistent with the IMEI that smart card is stored, it is possible to realizes former separation between machine and card.And terminal is sent
Terminal Profile values be privately owned, it usually needs obtaining certain authority could change, in addition each chip producer its repair
The authority and method ordered are different, so its revision is extremely difficult, thus substantially increases criminal and pass through brush
The mode of machine changes IMEI to evade the threshold of binding machine and card.
During practical application, the judging unit 62, it is additionally operable to judge the smart card whether binding terminal, when the intelligence
When can block binding terminal, judge whether the first information of acquisition is identical with the second information of the smart cards for storage.
Wherein, whether the judging unit 62 judges smart card terminal using the first mark of itself storage.
Here, first mark characterizes whether binding has been turned on.
Specifically, when the described first mark, which characterizes binding, to be had been turned on, the judging unit 62 determines the smart card
Binding terminal.
Wherein, during practical application, the smart card can be provided with private file, and the first mark is included in this private file
And second information (Terminal Profile values and IMEI), to be successfully received the Terminal Profile values of first terminal
Afterwards, judge whether the first terminal is the terminal bound with itself with the information in this private file.
When the described first mark, which characterizes, binds not actuated, the judging unit 62 determines the smart card unbound end
End, now, the operating unit 63 is stored the first information, is set first mark to characterize binding and is had been turned on,
And make the first terminal access network.
Here, the first information of storage is used to determine whether the accessing terminal to network using the smart card.Change sentence
Talk about, the first information be used for subsequently judge with the smart card boot up interaction flow terminal whether be and the intelligence
The terminal of binding can be blocked, when the follow-up terminal that interaction flow is booted up with the smart card is bound with the smart card
During terminal, then authentication lock operation is carried out to the terminal, the accessing terminal to network is prevented with this.When it is described subsequently with the intelligence
When the terminal that energy card boots up interaction flow is terminal (i.e. the first terminal) with smart card binding, then without any
Intervene, so that the described accessing terminal to network.
When the first information and second information differ, the operating unit 63 is carried out to the first terminal
Authenticate lock operation (message of failed authentication being returned to the first terminal, to intervene the first terminal access network).
When the first information is identical with second information, the operating unit 63 does not make any intervention, after continuation
Afterflow journey, so that the first terminal normally accesses network.
During practical application, the acquiring unit 61, judging unit 62 and operating unit 63 can be by micro- in smart card
Manage device (MCU, Micro Control Unit), digital signal processor (DSP, Digital SignalProcessor) or can
The processors such as programmed logic array (PLA) (FPGA, Field-Programmable Gate Array) are realized.
Scheme provided in an embodiment of the present invention, the acquiring unit 61 obtain the first information;The first information includes the
The Terminal Profile values and IMEI of one terminal;The judging unit 62 judges the first information and the second of storage obtained
Whether information is identical;The Terminal Profile values and IMEI that second packet stores containing the smart card itself;Institute
Operating unit 63 is stated according to judged result, the first terminal is carried out authenticating lock operation or makes the first terminal access network
Network.Binding machine and card is realized using Terminal Profile values and the dual judgements of IMEI, and Terminal Profile values are not
It is easily modified, in this way, substantially increasing the threshold of binding machine and card disabler, improves security.
In addition, when implementing the scheme of the embodiment of the present invention, it is not necessary to network and terminal are transformed, in this way, implementing letter
Single, change amount is small, workable.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware
Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage
The form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (12)
1. a kind of control method, it is characterised in that applied to smart card, methods described includes:
Obtain the first information;The first information includes the international shiftings of terminal configuration Terminal Profile Zhi He of first terminal
Dynamic EIC equipment identification code IMEI;
Judge whether the second information that the first information obtained stores with itself is identical;Second packet contains the smart card
The Terminal Profile values and IMEI of itself storage;
According to judged result, the first terminal is carried out authenticating lock operation or the first terminal is accessed network.
2. according to the method for claim 1, it is characterised in that it is described according to judged result, the first terminal is carried out
Authentication lock operation makes the first terminal access network, including:
When the first information and second information differ, authentication lock operation is carried out to the first terminal.
3. according to the method for claim 1, it is characterised in that the acquisition first information, including:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
4. according to the method for claim 1, it is characterised in that the first information for judging to obtain and the of itself storage
Before whether two information are identical, methods described also includes:
Judge itself whether binding terminal, when itself binding terminal, judge the first information and itself storage obtained
Whether the second information is identical.
5. according to the method for claim 4, it is characterised in that it is described to judge itself whether binding terminal, including:
Using the first mark of itself storage, itself whether binding terminal is judged;Whether first mark characterizes binding
Start.
6. according to the method for claim 5, it is characterised in that methods described also includes:
When itself unbound terminal, the first information is stored, sets first mark to characterize binding and has been turned on,
And make the first terminal access network;The first information of storage is used to determine whether to connect using the terminal of the smart card
Enter network.
7. a kind of smart card, it is characterised in that the smart card includes:
Acquiring unit, for obtaining the first information;The first information include first terminal Terminal Profile values with
Code IMEI;
Whether judging unit, the second information that the first information for judging to obtain stores with itself are identical;Second information
Include the Terminal Profile values and IMEI of smart card itself storage;
Operating unit, for according to judged result, carrying out authenticating lock operation to the first terminal or making the first terminal
Access network.
8. smart card according to claim 7, it is characterised in that the operating unit, be specifically used for:
When the first information and second information differ, authentication lock operation is carried out to the first terminal.
9. smart card according to claim 7, it is characterised in that the acquiring unit, be specifically used for:
Receive the Terminal Profile values that the first terminal is sent;
Send and order to the first terminal;It is described to order for asking the first terminal to send IMEI;
Receive the IMEI that the first terminal returns.
10. smart card according to claim 7, it is characterised in that the judging unit, be additionally operable to judge the smart card
Whether binding terminal, when the smart card binding terminal, judge the first information of acquisition and the smart cards for storage
Whether the second information is identical.
11. smart card according to claim 10, it is characterised in that the judging unit, be specifically used for:
Using the first mark of itself storage, the smart card whether binding terminal is judged;First mark characterizes binding
Whether have been turned on.
12. smart card according to claim 11, it is characterised in that the operating unit, be additionally operable to:
When the unbound terminal of the smart card, the first information is stored, sets first mark to characterize binding
Have been turned on, and make the first terminal access network;The first information of storage is used to determine whether to use the smart card
Accessing terminal to network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610848245.9A CN107872786B (en) | 2016-09-23 | 2016-09-23 | Control method and smart card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610848245.9A CN107872786B (en) | 2016-09-23 | 2016-09-23 | Control method and smart card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107872786A true CN107872786A (en) | 2018-04-03 |
CN107872786B CN107872786B (en) | 2021-06-25 |
Family
ID=61751642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610848245.9A Active CN107872786B (en) | 2016-09-23 | 2016-09-23 | Control method and smart card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107872786B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112839325A (en) * | 2020-12-29 | 2021-05-25 | 北京握奇智能科技有限公司 | Method for realizing machine-card binding by card end application |
WO2023273289A1 (en) * | 2021-06-29 | 2023-01-05 | 展讯通信(上海)有限公司 | Anti-theft method and apparatus for sim card |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103079203A (en) * | 2013-02-05 | 2013-05-01 | 北京握奇数据***有限公司 | Terminal authentication method and smart card |
US20140323092A1 (en) * | 2007-09-12 | 2014-10-30 | Devicefidelity, Inc. | Wirelessly accessing broadband services using intelligent cards |
CN105228125A (en) * | 2014-05-27 | 2016-01-06 | 中兴通讯股份有限公司 | A kind of smart card dynamic binding method, apparatus and system |
-
2016
- 2016-09-23 CN CN201610848245.9A patent/CN107872786B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140323092A1 (en) * | 2007-09-12 | 2014-10-30 | Devicefidelity, Inc. | Wirelessly accessing broadband services using intelligent cards |
CN103079203A (en) * | 2013-02-05 | 2013-05-01 | 北京握奇数据***有限公司 | Terminal authentication method and smart card |
CN105228125A (en) * | 2014-05-27 | 2016-01-06 | 中兴通讯股份有限公司 | A kind of smart card dynamic binding method, apparatus and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112839325A (en) * | 2020-12-29 | 2021-05-25 | 北京握奇智能科技有限公司 | Method for realizing machine-card binding by card end application |
WO2023273289A1 (en) * | 2021-06-29 | 2023-01-05 | 展讯通信(上海)有限公司 | Anti-theft method and apparatus for sim card |
Also Published As
Publication number | Publication date |
---|---|
CN107872786B (en) | 2021-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10748144B2 (en) | System and method for transaction security enhancement | |
US9686632B2 (en) | Method and apparatus for accessing virtual smart cards | |
CN105446713B (en) | Method for secure storing and equipment | |
EP3462704B1 (en) | Information processing apparatus, information processing method, program, and information processing system | |
CN109995713A (en) | Service processing method and relevant device in a kind of micro services frame | |
CN103984579B (en) | More equipment rooms share the method for current application program real-time running state | |
CN110023941A (en) | A kind of system on chip and method for realizing secure operating system switching | |
CN105745663B (en) | Protection system including the assessment of machine learning snapshot | |
CN108428451B (en) | Voice control method, electronic equipment and voice control system | |
CN104660557B (en) | operation processing method and device | |
CN110400145A (en) | A kind of digital identity application system and method, identity authorization system and method | |
CN107464109A (en) | Credible mobile payment device, system and method | |
CN110876144B (en) | Mobile application method, device and system for identity certificate | |
CN107533596B (en) | Fingerprint identification method and mobile terminal | |
CN110766394A (en) | Bus taking payment method and device based on credit degree, electronic equipment and storage medium | |
CN108288168A (en) | Borrow or lend money register method, terminal and the computer readable storage medium of service account | |
CN106897629A (en) | The control method and terminal of terminal applies | |
CN108076042A (en) | User information acquiring method, server and computer-readable medium | |
CN107634989A (en) | A kind of cloud wallet construction method and server | |
US10115092B1 (en) | Service composition in a mobile communication device application framework | |
EP3416121B1 (en) | Digital wallet application for mobile payment | |
CN107872786A (en) | A kind of control method and smart card | |
CN107526580A (en) | Terminal applies recognition methods and device | |
WO2016127449A1 (en) | Instruction processing method, device and terminal | |
CN108154372A (en) | A kind of account communications and liaison method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |