WO2014183350A1 - 终端、身份识别卡实现方法以及鉴权方法和装置 - Google Patents

终端、身份识别卡实现方法以及鉴权方法和装置 Download PDF

Info

Publication number
WO2014183350A1
WO2014183350A1 PCT/CN2013/082006 CN2013082006W WO2014183350A1 WO 2014183350 A1 WO2014183350 A1 WO 2014183350A1 CN 2013082006 W CN2013082006 W CN 2013082006W WO 2014183350 A1 WO2014183350 A1 WO 2014183350A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
authentication
identity
terminal
identity card
Prior art date
Application number
PCT/CN2013/082006
Other languages
English (en)
French (fr)
Inventor
杨允
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014183350A1 publication Critical patent/WO2014183350A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Definitions

  • the present invention relates to the field of communications, and in particular to a terminal, an identity card implementation method, and an authentication method and apparatus.
  • 3G third-generation
  • 4G fourth-generation
  • TD time division
  • IP multimedia subsystem IP multimedia subsystem
  • the voice service is not perfect. Therefore, the traditional voice service needs to be carried on the Global System for Mobile Communication (GSM) network for a long period of time.
  • GSM Global System for Mobile Communication
  • 2G/3G dual-mode dual-standby, 2G/3G/4G multi-mode dual-standby mobile terminals will gradually increase, and will be favored by users with its better network compatibility.
  • the dual-standby terminal based on a single chip is more concerned by the terminal manufacturers because of lower cost.
  • dual-card dual-standby terminals on the market are dual-card slots.
  • Two Subscriber Identity Modules (SIMs) cards or a Universal Subscriber Identity Module (USIM) are required. Cards, this method brings great inconvenience to the user's use. For example, the user may insert the wrong card slot, thereby affecting the normal business, and the user experience of the user is degraded.
  • SIMs Subscriber Identity Modules
  • USB Universal Subscriber Identity Module
  • a terminal including: an identity card slot configured to be inserted into a first identity card; and a storage device configured to store at least one card file system, wherein the card is The authentication of the second identity card corresponding to the file system is performed by the first identity card.
  • the storage device comprises: a non-volatile storage medium.
  • the second identity card shares the authentication information of the first identity card with the first identity card.
  • another terminal comprising: an identity card slot configured to insert a first identity card; an interface configured to receive at least one card file system, wherein the card The file system is stored in the storage device of the terminal, and the authentication of the second identity card corresponding to the card file system is performed by the first identity card.
  • the storage device comprises: a non-volatile storage medium.
  • the second identity card shares the authentication information of the first identity card with the first identity card.
  • a method for implementing an identity card including: writing at least one second card file system in a storage device of the terminal, wherein the second card file system corresponds to a second
  • the authentication of the identity card is performed by the first identity card, wherein the first identity card is inserted in the identity card slot of the terminal.
  • the second identity card shares the authentication information of the first identity card with the first identity card.
  • the authentication information includes at least one of the following: an authentication algorithm, an anonymous keyword, and an authentication sequence number.
  • an authentication method including: receiving an authentication request for a second identity card, where the card file system of the second identity card is stored in a terminal
  • the second identity card is authenticated by the first identity card, where the first identity card is inserted in the identity card slot of the terminal.
  • the second identity card shares the authentication information of the first identity card with the first identity card.
  • the authentication information includes at least one of the following: an authentication algorithm, an anonymous keyword, and an authentication sequence number.
  • receiving the authentication request for the second identity card comprises: receiving an authentication request for the second identity card during registration of the second identity card; and/or passing During the process of initiating the service process, the second identity card receives an authentication request for the second identity card.
  • the information in the card file system of the second identity card is obtained by one or more of the following methods: copying a public file in the information of the card file system of the first identity card; or The information of the card file system of the first identification card is generated according to a predetermined algorithm, and the user identity information of the second identity card is generated, wherein the first identity card and the second identity card are established. Mapping relationship; or setting the information of the card file system of the second identification card in advance according to the requirements of the operator.
  • an authentication apparatus including: a receiving unit, configured to receive an authentication request for a second identity card, wherein the card file system of the second identity card Storing in the storage device of the terminal; the authentication unit is configured to perform authentication on the second identity card by using the first identity card, wherein the first identity card is configured to respond to the authentication request Plugged into the identity card slot of the terminal.
  • a storage device is set in the terminal, and the card file system is stored by the storage device, which is equivalent to setting a virtual card, by which a general physical card can be implemented (for example, inserted in an identity)
  • the function of identifying the card in the card slot, the authentication process for the virtual card is performed by the physical card in the terminal.
  • FIG. 1 is a block diagram of a preferred structure of a terminal according to an embodiment of the present invention
  • FIG. 2 is a preferred flow chart of a method for processing an identification card according to an embodiment of the present invention
  • a preferred flow chart of an authentication method of an example
  • FIG. 4 is a block diagram showing a preferred structure of an authentication device according to an embodiment of the present invention
  • FIG. 5 is a data structure of a virtual card save card file system according to an embodiment of the present invention.
  • a preferred schematic diagram
  • FIG. 6 is a preferred schematic diagram of a single-chip single card slot dual card dual standby protocol according to an embodiment of the invention
  • 7 is a schematic diagram of a single-chip single-card slot dual-card dual-standby terminal boot initialization and network registration process according to an embodiment of the present invention
  • FIG. 8 is a parallel operation of a single-chip single-card slot dual-card dual-standby terminal in parallel according to an embodiment of the present invention
  • FIG. 9 is a schematic diagram of a single-chip single-card slot dual-card dual-number single-standby terminal protocol according to an embodiment of the present invention
  • FIG. 10 is a single-chip single-card slot dual-card dual-number single standby according to an embodiment of the present invention
  • FIG. 11 is a schematic diagram of a process of initiating a service by a single-chip single-card slot dual-card dual-number single-standby terminal according to an embodiment of the invention.
  • An embodiment of the present invention provides a terminal, as shown in FIG. 1, including: an identity card slot 102, configured to insert a first identity card; and a storage device 104 configured to store at least one card file system, where The authentication of the second identification card corresponding to the card file system is performed by the first identification card.
  • a terminal as shown in FIG. 1, including: an identity card slot 102, configured to insert a first identity card; and a storage device 104 configured to store at least one card file system, where The authentication of the second identification card corresponding to the card file system is performed by the first identification card.
  • the storage device 104 is disposed in the terminal, and the card file system is stored by the storage device 104, which is equivalent to setting a virtual card, by which a general physical card can be implemented (for example, The function of the card inserted in the identification card slot 102, the authentication process for the virtual card is performed by the physical card in the terminal.
  • the technical problem that the card slot can only realize the function of the ID card less than or equal to the number of the card slot in the related art is solved in the above manner, and the technical effect of saving the card slot and the cost is achieved.
  • the card installed in the card slot is hereinafter referred to as a physical card
  • the card that is implemented by the storage device 104 without requiring a card slot is referred to as a virtual card.
  • the physical card is provided with a storage device 104 for storing the physical card corresponding to the physical card (ie, the file corresponding to the card file system)
  • the storage device 104 described above preferably employs a non-volatile storage medium to ensure data security and is not easily lost.
  • the virtual card cannot obtain its own authentication information.
  • the second identity card (ie, the virtual card) shares the authentication information of the first identity card with the first identity card.
  • the foregoing authentication information may include, but is not limited to, at least one of the following: an authentication algorithm, an anonymous keyword, and an authentication sequence number.
  • the currently used terminals are a few card slots that can correspond to a few numbers.
  • the terminal may further include: an interface, configured to receive at least one card file system, where the card file system is stored in the storage device 104 of the terminal, and the authentication of the second identification card corresponding to the card file system is passed through The identification card is carried out.
  • an interface configured to receive at least one card file system, where the card file system is stored in the storage device 104 of the terminal, and the authentication of the second identification card corresponding to the card file system is passed through The identification card is carried out.
  • the foregoing interface may be implemented by software or by a hardware interface, and the present invention is not limited as long as the virtual card can interact with the outside.
  • a method for processing an identity card based on the foregoing terminal is further provided. As shown in FIG. 2, the method includes the following steps: Step S202: Write a first card of the first identity card in the first identity card.
  • step S204 writing at least one second card file system in the storage device 104 of the terminal, wherein, the second The authentication of the second identification card corresponding to the card file system is performed by the first identification card.
  • the above steps S202 to S204 may be performed on the operator side.
  • an authentication method based on the foregoing terminal is further provided. As shown in FIG.
  • Step S302 Receive an authentication request for the second identity card, where the second identity card is The card file system is stored in the storage device 104 of the terminal;
  • Step S304 In response to the foregoing authentication request, the second identity identification card is authenticated by the first identity identification card, where the first identity identification card is inserted in the terminal The identification card is in the slot 102.
  • the foregoing step S302 can include at least the following two situations: 1) receiving an authentication request for the second identity card during registration of the second identity card; or
  • the card file information of the virtual card is different from the card file information of the physical card in that the card file information of the physical card is included on the chip of the corresponding identification card, and the card file information of the virtual card (ie, the second identity recognition)
  • the information in the card's card file system can be obtained in one or more of the following ways:
  • the user identity information may be user-specific identity information
  • the information of the card file system of the first identification card in advance according to the requirements of the operator.
  • the information of the physical card may be directly copied for the common file information, and the related file for the user specific identity information may be generated according to a predetermined algorithm according to the information of the physical card.
  • An authentication device is also provided in this embodiment, and the device is configured to implement the foregoing embodiments and preferred embodiments, and details are not described herein.
  • the term "unit” or "module” may implement a combination of software and/or hardware of a predetermined function.
  • the method includes: a receiving unit 402 and an authentication unit 404.
  • the receiving unit 402 is configured to receive an authentication request for the second identity card, where the card file system of the second identity card is stored in the storage device of the terminal;
  • the authentication unit 404 is coupled to the receiving unit 402, and configured to In response to the authentication request, the authentication of the second identity card is completed by the first identity card, wherein the first identity card is inserted in the identity card slot of the terminal.
  • the present invention has been described in terms of a preferred embodiment of the present invention, but it is to be understood that the preferred embodiment is only for the purpose of describing the invention.
  • the terminal of the embodiment of the present invention uses a single terminal chip, a card slot, and can support a SIM (or USIM) card to implement a multi-card multi-number mobile terminal.
  • SIM or USIM
  • a multi-card multi-standby terminal can be realized, and multiple mobile phone numbers (for example, multiple MSISDNs) are standby at the same time, and multiple mobile phone numbers work simultaneously and provide services independently of each other during user use. It is also possible to implement a multi-card multi-number single standby terminal, and the user can freely choose which card and card number to use as the card used or activated by the current service.
  • a terminal can achieve a card number more than a card slot by using a virtual card, thereby reducing the cost of the terminal and the operation cost. Further, setting a part of the storage unit in the terminal In order to store the card information of the card, the data can be read directly from the terminal during data interaction without reading data from the SIM card, which speeds up the data reading rate to some extent.
  • the following is an example of a dual-standby terminal based on a single-chip single-card slot, that is, a dual-card dual-standby method and apparatus can be implemented by using a SIM (or USIM) card.
  • a preferred single-chip single-card slot single-standby terminal is provided, and a SIM (or USIM) card is used to implement a multi-card multi-number, single-standby terminal that the user can freely switch the card number.
  • SIM or USIM
  • the above two types of terminals are only a preferred implementation manner. In an actual application, three numbers can be implemented by two physical cards, or multiple numbers can be implemented, as long as there is a virtual terminal.
  • the card should be within the protection scope of the present application.
  • a terminal may have a card slot and a chip, and three virtual cards are provided, so that one card number is realized, or two physical cards are passed. Implement 6 numbers, that is, the terminal can implement 4 virtual cards through two physical cards.
  • a dual-card dual-standby terminal implemented according to an embodiment of the present invention is taken as an example, and a standby protocol of dual standby can be marked as protocol stack 1 (Protocol Stack 1, referred to as PS-1).
  • PS-1 may be a 3G/4G protocol
  • PS-2 protocol stack 2
  • PS-2 may be a 2G protocol.
  • IMSI International Subscriber Identification Number
  • MSISDN Mobile Station International ISDN Number
  • Step S1 When the operator provides the dual standby terminal to the user, the card-2 file system of the terminal is preset, and the IMSI-2 corresponding to the card-2 is set.
  • Step S2 When the user activates the dual-card dual-standby service, the operator associates the card-1 in the card slot with the card-2 built in the dual-standby terminal, so that the card-2 authentication and the card-1 authentication device are The authentication information used is the same, and the SP and the card-2 can share the authentication information and the authentication process using the card-1.
  • Step S3 After the user turns on the power, the dual standby terminal starts the card-2 initialization according to the power-on instruction, starts the card-2 file system in the NV, and completes the initialization of the card-2.
  • Step S4 After both the card-1 and the card-2 complete the normal initialization process, the PS-1 and the PS-2 perform network search according to the network information in the card-1 and the card-2, respectively.
  • Step S5 After the card-1 and the card-2 complete the search and reside.
  • the PS-1 uses the information of the card-1 for network registration
  • the PS-2 uses the information of the card-2 for network registration.
  • the registration process for the PS-1 and the card-1 combination is the same as that of the existing terminal, and details are not described herein again.
  • the PS-2 and the card-2 combination since the card-2 is a virtual card file system in the dual standby terminal in the embodiment of the present invention, authentication cannot be performed, and therefore the authentication needs to be completed by the card-1.
  • Step S6 After receiving the authentication request of the network, the PS-2 sends an authentication request message to the card-1, and performs authentication through the card-1. When the card-1 returns the authentication result, the PS-2 authenticates.
  • Step S7 The PS-2 and the card-2 are authenticated through the network, and after the registration is completed, the normal network service can be obtained. At this point, the two standby sides and the two cards of the dual standby terminal can independently perform their respective services.
  • Step S1 When the operator provides the dual standby terminal to the user, the card-2 file system of the terminal is preset, and the IMSI-2 corresponding to the card-2 is set.
  • Step S2 When the user activates the dual-card dual-number single-standby service, the operator associates the card-1 in the card slot with the card-2 built in the dual-standby terminal, so that the card-2 is authenticated and the card-1 is authenticated.
  • the authentication information used by the right is the same, and the SP, the card-2 can share the authentication information and the authentication process using the card-1.
  • Step S3 After the user turns on the device, according to the prompt, select the card number MSISDN (corresponding card-1 or card-2) to be used.
  • Step S4 The mobile terminal simultaneously performs initialization of the card-1 and the card-2 according to the booting instruction.
  • Step S5 After both the card-1 and the card-2 complete the normal initialization process, the terminal searches for the network according to the network information in the card selected by the user.
  • Step S6 After completing the search and camping. The terminal uses the card information selected by the user to perform network registration.
  • Step S7 When the terminal receives the authentication request of the network, the authentication request message is sent to the card-1, and the authentication is completed by the card-1. When the card-1 returns the authentication result, the terminal sends the authentication response to the network.
  • the corresponding authentication parameters KSI, CK, IK (or CKSN, Kc) are saved in the file system of the card selected by the user, and are used for subsequent services or encryption processes.
  • Step S8 After the terminal authenticates through the network, after completing the registration, the normal network service can be obtained.
  • the above two implementations are described by taking the dual-card dual-number as an example.
  • the implementation of the multi-card multi-number is similar to the above two implementation methods, and only the corresponding card file system needs to be added to the NV built in the terminal. I will not repeat them here.
  • the virtual card is in the 3GPP protocol.
  • the corresponding file structure (including: file status, file identifier, file record number, file length, file code stream, etc.) is created in the NV according to the file information in the 3GPP protocol, and is used for saving.
  • Card-related information for the user's SIM or USIM
  • the terminal reads or updates a file, it searches for the corresponding file according to the file identifier (keyid), and reads or updates the file content.
  • the above file data structure can be as shown in FIG. 5.
  • the file information in the virtual card can be set in advance according to the operator's requirements, or the related file information can be automatically generated according to the algorithm provided by the operator through the inserted real SIM (or USIM) card when the user opens the account.
  • the file information of the real card ie, the physical card above
  • the related files of the user-specific identity information can be generated according to the algorithm provided by the operator and mapped to the real SIM (or USIM).
  • Information and associate the real card with the virtual card.
  • Preferred Embodiment 1 As shown in FIG.
  • FIG. 6 it is a schematic diagram of a dual-card dual-standby terminal with a single-chip single-card slot, which includes: Man Machine Interface (MMI), SIM (USIM) card-1, universal integration The circuit board management module (Universal Integrated Circuit Card Manage, referred to as UICCMng), PS-1, PS-2 and physical layer radio unit.
  • MMI Man Machine Interface
  • SIM SIM
  • UICCMng Universal Integrated Circuit Card Manage
  • PS-1 Public Switche.g., PS-2
  • FIG. 7 the method includes the following steps: Step S1: After booting, The MMI notifies the two standby protocols, PS-1 and PS-2, respectively, to turn on their respective physical layer radios.
  • Step S2 After the two radios are successfully enabled in the standby protocol, the MMI is successfully turned on.
  • Step S3 The MMI sends a card initialization message to the UICCMng and the NV (virtual card) respectively, requesting the card initialization process.
  • Step S4 After receiving the card initialization message, the UICCMng starts to initialize the SIM (or USIM card) in the card operation; after receiving the card initialization message, the NV (virtual card) reads the card related file data saved before the last shutdown, Be prepared for PS-2 reading and writing.
  • Step S5 UICCMng initializes the SIM (USIM) card successfully, sends a card initialization success message to the PS-1, notifies the standby protocol that there is already a card and can be used normally; after the NV (virtual card) completes the data preparation work, the sending card is also successfully initialized. The message is sent to the PS-2, and the standby protocol is notified that the card is already in use and can be used normally.
  • Step S6 The UICCMng NV (virtual card) respectively returns the card initialization success message to the MMI, and notifies the MMI card that the initialization is successful.
  • Step S7 After receiving the initial success message sent by the card-1 and the card-2, the protocol ⁇ PS-1 and PS-2 respectively read the registration related parameters, and perform the network searching and resident process according to the read parameter information.
  • the PS-2 successfully resides, the registration process is initiated by using parameters such as the authentication sequence number CKSN (or KSI) and the user ID (IMSI-2 or corresponding TMSI) stored in the card-2.
  • Step S9 During the registration process of the PS-1, if the network initiates authentication, the PS-1 sends an authentication to the UICCMng request to perform the authentication process of the card.
  • PS-2 during the registration process, if the network initiates authentication, because PS-2 corresponds Card-2 is a virtual card that cannot be authenticated. PS-2 needs to send an authentication request to the UICCMng module to complete the authentication process through card-1.
  • Step S10 After the PS-1 completes the authentication process, the PS-1 sends an authentication response to the network side, and sends the corresponding authentication parameter to the UICCMng, and writes the card-1 (SIM or USIM card).
  • the PS-2 After the PS-2 completes the authentication process, the PS-2 sends an authentication response to the network side, and saves the corresponding authentication parameter in the card-2 (NV virtual card).
  • the two standby protocols ⁇ PS-1 and PS-2 are respectively registered and in the standby state, so that the card-1 and the card-2 can respectively provide the services required by the user.
  • the flow chart of the single-chip single-card slot dual-card dual-standby terminal initiating service may include the following steps: Step S1: The user requests to connect to the network, initiates a dial-up connection, or the user requests to initiate a call, that is, It is the MMI requesting to establish a dial-up connection on the PS-1, and the MMI requests the call service on the PS-2.
  • Step S2 After receiving the dial-up connection request, the PS-1 acquires parameters such as the authentication sequence number CKSN (or KSI) of the corresponding card-1, the user identification code (P-TMSI corresponding to the IMSI-1), and sends the service.
  • Request to the network side request to establish a PS signaling connection.
  • the PS-2 receives the call setup request of the user, acquires the authentication sequence number CKSN (or KSI) of the corresponding card-2, the user identification code (IMSI-2 or the corresponding TMSI), and the like, and sends a CM service request to the network side.
  • Step S3 After receiving the service requests of the PS-1 and the PS-2, respectively, the network side initiates an authentication process (such as the authentication request 1 and the authentication request 2 in the figure).
  • Step S4 For PS-1 (IMSI-1), if the network side initiates an authentication request, PS-1 sends an authentication request to UICCMng to request the card authentication process.
  • PS-2 IMSI-2
  • PS-2 if the network side initiates an authentication request, because the card-2 corresponding to the PS-2 is a virtual card and cannot be authenticated, the PS-2 needs to send an authentication request to the UICCMng module. The authentication process is completed by card-1.
  • Step S5 After the PS-1 completes the authentication process, the PS-1 sends an authentication response to the network side, and sends the corresponding authentication parameter to the UICCMng and writes to the card-1 (SIM or USIM card).
  • the PS-2 After the PS-2 completes the authentication process, the PS-2 sends an authentication response to the network side, and the corresponding authentication parameter is saved in the card-2 (NV virtual card).
  • Step S6 After completing the authentication process of the user identity, the network side sends a service acceptance message to the corresponding PS-1 or PS-2.
  • Step S7 After the PS-1 receives the service acceptance message, the PS signaling connection is established, and the packet data protocol (Packet Data Protocol (PDP)) related service flow is started.
  • PDP Packet Data Protocol
  • Step S8 The process of the PDP activation process and the call establishment process are the same as those of the existing terminal, and details are not described herein again.
  • Step S9 After completing the PDP related operation, the PS-1 replies to the MMI dial-up connection establishment successfully; after the call process is successfully established, the PS-2 replies to the MMI call establishment success. In this way, users can concurrently use data services and voice call services.
  • CM service ie, multimedia service
  • the preferred embodiment 2 is a schematic diagram of a dual-card single-standby terminal of a single-chip single-card slot, which includes: a Man Machine Interface (MMI) and a SIM (USIM) card-1. Universal Integrated Circuit Card Management (UICCMng), PS and physical layer radio unit. Based on the terminal shown in FIG.
  • the embodiment further provides a single-chip single-card slot dual-card single-standby terminal boot initialization and network registration process.
  • the method includes the following steps: Step S1: After the user is powered on The MMI prompts the user to select or default to use the card-2 (NV virtual card) as the user activated mobile phone card, and sends a card setting request message to the PS. Step S2: The MMI separately informs the protocol ⁇ PS to turn on the physical layer radio. Step S3: After the radio is successfully enabled, the MMI restarts the radio success message; Step S4: The MMI sends a card initialization request message to the UICCMng and the NV (virtual card) respectively, requesting the card initialization process.
  • Step S1 After the user is powered on The MMI prompts the user to select or default to use the card-2 (NV virtual card) as the user activated mobile phone card, and sends a card setting request message to the PS.
  • Step S2 The MMI separately informs the protocol ⁇ PS to turn on the physical layer radio
  • Step S5 After receiving the card initialization message, the UICCMng starts to initialize the SIM (or USIM card) in the card operation; after receiving the card initialization message, the NV (virtual card) reads the card related file data saved before the last shutdown, Be prepared for PS-2 reading and writing.
  • Step S6 UICCMng initializes the SIM (USIM) card successfully, sends a card initialization success message to the protocol ⁇ PS, notifies the standby protocol that there is already a card and can be used normally; after the NV (virtual card) completes the data preparation work, the sending card is also successfully initialized. The message is sent to the protocol ⁇ PS, which informs the standby protocol that there is already a card and can be used normally.
  • Step S7 UICCMng NV (virtual card) respectively reply the card initialization success message to the MMI, notify
  • Step S8 After receiving the initial success message sent by the card-1 and the card-2, the protocol ⁇ PS determines that the card is ready. Then, according to the activation card set by the MMI, the card-2, the user identity information and the network information of the card-2 (the virtual card in the NV) are read, and the search and residency process is performed.
  • Step S9 After the protocol ⁇ PS successfully resides, the registration process is initiated by using parameters such as the authentication sequence number CKSN (or KSI), the user identity code (IMSI-2 or the corresponding P-TMSI) in the card-2.
  • Step S10 In the registration process, if the network side initiates authentication, because the currently activated virtual card cannot be authenticated, the protocol ⁇ PS sends the authentication request to the UICCMng module, and the authentication process is completed through the card-1. .
  • Step S11 After the PS-1 completes the authentication process, the protocol ⁇ PS sends an authentication response to the network side, and sends the corresponding authentication parameter to the card-2, and saves the parameter in the card-2 (NV virtual card) ).
  • Step S12 After the authentication process is completed, the standby protocol ⁇ PS completes the registration process of the card-2, and the card 2 (corresponding to the MSISDN-2) is in a standby state, and thus the service required by the user can be provided. As shown in FIG.
  • Step S1 When booting, the user selects the card-2 (corresponding to MSISDN-2) as the activation. Card, the MMI requests to establish a dial-up connection, and the user initiates a request to initiate a call;
  • Step S2 After receiving the dial-up connection request, the protocol obtains an authentication sequence number CKSN (or KSI) corresponding to the card-2, and a user identity code (IMSI) -2 or the corresponding TMSI), and send a CM service request to the network side according to the obtained parameters, requesting to establish a CS domain signaling connection.
  • CKSN or KSI
  • IMSI user identity code
  • Step S3 After receiving the service request of the protocol ⁇ PS, the network side initiates an authentication process as needed.
  • Step S4 For the virtual card user card-2 (corresponding to the MSISDN-2), the authentication cannot be performed. If the network side initiates the authentication, the PS needs to send the authentication request to the UICCMng module, and completes the authentication process through the card-1.
  • Step S5 After the card-1 completes the authentication process, the protocol ⁇ PS sends an authentication response to the network side, and the corresponding authentication parameter is saved in the card-2 (NV virtual card).
  • Step S6 After completing the authentication process of the user identity, the network side sends a service acceptance message to the terminal.
  • Step S7 After receiving the CM service acceptance message, the protocol ⁇ PS completes the establishment of the CS domain signaling connection, and starts the call related service process.
  • the call establishment process is the same as the current terminal process, and details are not described herein.
  • the single card slot dual card single standby terminal completes the process of selecting a mobile phone number (MSISDN-1/IMSI-1, MSISDN-2/IMSI-2) for performing services, and is called for a single card slot dual card single standby terminal.
  • the business process is similar to the above-mentioned calling process, and will not be described here.
  • the embodiment of the present invention achieves the following technical effects: setting a storage device in the terminal, and storing the card file system through the storage device, which is equivalent to setting a virtual card through the virtual
  • the card can implement the function of a general physical card (such as a card inserted in the ID card slot), and the authentication process for the virtual card is performed by a physical card in the terminal.
  • the technical problem that the card slot can only realize the function of the ID card less than or equal to the number of the card slot in the related art is solved in the above manner, and the technical effect of saving the card slot and the cost is achieved.
  • the technical solution of the present invention can realize that the card number of the terminal is more than the card slot thereof, the number of use of the terminal card slot is saved, the manufacturing cost and operation cost of the terminal are reduced, and the rate of reading data by the system during data interaction is accelerated. It will be apparent to those skilled in the art that the various modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across multiple computing devices.
  • the computing device may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from this
  • the steps shown or described are performed sequentially, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

本发明公开了一种终端、身份识别卡实现方法以及鉴权方法和装置,其中,该终端包括:身份识别卡卡槽,设置为***第一身份识别卡;存储装置,设置为存储至少一个卡文件***,其中,对所述卡文件***对应的第二身份识别卡的鉴权通过所述第一身份识别卡进行。本发明解决了相关技术中卡槽的数量与对应的身份识别卡的数量是相同的,有几个卡槽就只能实现小于或等于这个数量的身份识别卡的功能的技术问题,达到了节省卡槽及成本的技术效果。

Description

终端、 身份识别卡实现方法以及鉴权方法和装置 技术领域 本发明涉及通信领域, 具体而言, 涉及一种终端、 身份识别卡实现方法以及鉴权 方法和装置。 背景技术 随着第三代 (3rd Generation, 简称为 3G)、 *** (4rd Generation, 简称为 4G) 通信技术的迅猛发展, 越来越多的人开始体验并享受 3G、 4G通信技术所带来的高速、 便捷的网络服务。然而, 目前的时分(Time Division, 简称为 TD)网络覆盖率比 GSM 网络的网路覆盖率要低, 长期演进 (Long-Term Evolution, 简称为 LTE) 网络的 IP多 媒体子*** (IP multimedia subsystem, 简称为 IMS) 语音业务还不完善; 因此, 传统 的语音业务在较长一段时间内还需要在全球移动通信 (Global system for Mobile Communication, 简称为 GSM) 网络上承载。 在这样的现有背景下, 2G/3G的双模双 待、 2G/3G/4G多模双待的移动终端逐渐会增多, 并且会凭借其较好的网络兼容性而受 到广大用户的青睐。 尤其是基于单芯片的双待终端, 更会因为较低的成本而受到终端 厂家的关注。 目前, 市面上的双卡双待终端, 都是双卡槽, 需要***两张客户识别模块 ( Subscriber Identity Module, 简称为 SIM) 卡或者是全球用户识别模块 (Universal Subscriber Identity Module, 简称为 USIM) 卡, 这种方式给用户的使用带来了很大的 不便, 例如, 用户可能会插错卡槽, 从而影响正常的业务, 使得用户的用户体验下降。 针对上述的问题, 目前尚未提出有效的解决方案。 发明内容 本发明实施例提供了一种终端、 身份识别卡实现方法以及鉴权方法和装置, 以至 少解决相关技术中终端卡槽只能实现小于或等于其数量的身份识别卡的功能的技术问 题。 根据本发明实施例的一个方面, 提供了一种终端, 包括: 身份识别卡卡槽, 设置 为***第一身份识别卡; 存储装置, 设置为存储至少一个卡文件***, 其中, 对所述 卡文件***对应的第二身份识别卡的鉴权通过所述第一身份识别卡进行。 优选地, 所述存储装置包括: 非易失的存储介质。 优选地, 所述第二身份识别卡与所述第一身份识别卡共用所述第一身份识别卡的 鉴权信息。 根据本发明实施例的另一个方面, 提供了另一种终端, 包括: 身份识别卡卡槽, 设置为***第一身份识别卡; 接口, 设置为接收至少一个卡文件***, 其中, 所述卡 文件***存储在所述终端的存储装置中, 对所述卡文件***对应的第二身份识别卡的 鉴权通过所述第一身份识别卡进行。 优选地, 所述存储装置包括: 非易失的存储介质。 优选地, 所述第二身份识别卡与所述第一身份识别卡共用所述第一身份识别卡的 鉴权信息。 根据本发明实施例的另一个方面, 提供了一种身份识别卡实现方法, 包括: 在终 端的存储装置中写入至少一个第二卡文件***, 其中, 对第二卡文件***对应的第二 身份识别卡的鉴权通过第一身份识别卡进行, 其中, 所述第一身份识别卡插在所述终 端的身份识别卡卡槽中。 优选地, 所述第二身份识别卡与所述第一身份识别卡共用所述第一身份识别卡的 鉴权信息。 优选地, 所述鉴权信息包括以下至少之一: 鉴权算法、 匿名关键字、 鉴权序列号。 根据本发明实施例的另一个方面, 提供了一种鉴权方法, 包括: 接收对第二身份 识别卡的鉴权请求, 其中, 所述第二身份识别卡的卡文件***存储在终端的存储装置 中; 响应于所述鉴权请求, 通过第一身份识别卡完成对所述第二身份识别卡的鉴权, 其中, 所述第一身份识别卡插在所述终端的身份识别卡卡槽中。 优选地, 所述第二身份识别卡与所述第一身份识别卡共用所述第一身份识别卡的 鉴权信息。 优选地, 所述鉴权信息包括以下至少之一: 鉴权算法、 匿名关键字、 鉴权序列号。 优选地, 接收对第二身份识别卡的鉴权请求包括: 在对所述第二身份识别卡进行 注册的过程中, 接收对所述第二身份识别卡的鉴权请求; 和 /或在通过所述第二身份识 别卡发起业务流程的过程中, 接收对所述第二身份识别卡的鉴权请求。 优选地, 所述第二身份识别卡的卡文件***中信息通过以下方式中的一种或多种 获得: 拷贝所述第一身份识别卡的卡文件***的信息中的公共文件; 或者根据所述第 一身份识别卡的卡文件***的信息按照预定的算法生成所述第二身份识别卡的用户身 份信息, 其中, 所述第一身份识别卡与所述第二身份识别卡之间建立了映射关系; 或 者预先按照运营商的要求设置所述第二身份识别卡的卡文件***的信息。 根据本发明实施例的另一个方面, 提供了一种鉴权装置, 包括: 接收单元, 设置 为接收对第二身份识别卡的鉴权请求, 其中, 所述第二身份识别卡的卡文件***存储 在终端的存储装置中; 鉴权单元, 设置为响应于所述鉴权请求, 通过第一身份识别卡 完成对所述第二身份识别卡的鉴权, 其中, 所述第一身份识别卡插在所述终端的身份 识别卡卡槽中。 在本发明实施例中,在终端中设置存储装置,通过该存储装置来存储卡文件***, 也就相当于设置了一个虚拟卡, 通过该虚拟卡就可以实现一般的实体卡 (例如插在身 份识别卡卡槽中的卡)的功能,对于虚拟卡的鉴权过程是通过终端中的实体卡进行的。 通过上述方式解决了相关技术中卡槽的数量与对应的身份识别卡的数量是相同的, 有 几个卡槽就只能实现小于或等于这个数量的身份识别卡的功能的技术问题, 达到了节 省卡槽及成本的技术效果。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1是根据本发明实施例的终端的一种优选结构框图; 图 2是根据本发明实施例的身份识别卡处理方法的一种优选流程图; 图 3是根据本发明实施例的鉴权方法的一种优选流程图; 图 4是根据本发明实施例的鉴权装置的一种优选结构框图; 图 5 是根据本发明实施例的虚拟卡保存卡文件***的数据结构的一种优选示意 图; 图 6是根据本发明实施例的单芯片单卡槽双卡双待协议桟的优选示意图; 图 7是根据本发明实施例的单芯片单卡槽双卡双待终端开机初始化及网络注册过 程示意图; 图 8是根据本发明实施例的单芯片单卡槽双卡双待终端并行发起业务的流程示意 图; 图 9 是根据本发明实施例的单芯片单卡槽双卡双号单待终端协议桟的优选示意 图; 图 10 是根据本发明实施例的单芯片单卡槽双卡双号单待终端开机初始化及网络 注册过程示意图; 图 11 是根据本发明实施例的单芯片单卡槽双卡双号单待终端发起业务的流程示 意图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 本发明实施例提供了一种终端, 如图 1所示, 包括: 身份识别卡卡槽 102, 设置 为***第一身份识别卡; 存储装置 104, 设置为存储至少一个卡文件***, 其中, 对 卡文件***对应的第二身份识别卡的鉴权通过第一身份识别卡进行。 值得注意的是, 上述装置较佳地以软件来实现, 但是硬件, 或者软件和硬件的组合的实现也是可能并 被构想的。 在上述优选实施方式中, 在终端中设置存储装置 104, 通过该存储装置 104来存 储卡文件***, 也就相当于设置了一个虚拟卡, 通过该虚拟卡就可以实现一般的实体 卡 (例如, 插在身份识别卡卡槽 102中的卡) 的功能, 对于虚拟卡的鉴权过程是通过 终端中的实体卡进行的。 通过上述方式解决了相关技术中卡槽只能实现小于或等于其 数量的身份识别卡的功能的技术问题, 达到了节省卡槽及成本的技术效果。 为了描述方面, 下文将中装在卡槽中的卡称为实体卡, 将通过存储装置 104实现 而不需要卡槽的卡称为虚拟卡。 考虑到实体卡中设置有自己的存储装置 104设置为存储实体卡对应的卡相关信息 (即卡文件***所对应的文件),这些是掉电不会丢失的存储单元。为了保证虚拟卡的 正常运行, 上述的存储装置 104优选地可以采用非易失的存储介质, 从而保证数据的 安全和不易丢失。 虚拟卡无法获取到自身的鉴权信息, 因此, 为了实现鉴权, 需要在实际应用中, 通过终端中的实体卡中的鉴权信息来实现鉴权, 从而保证鉴权的有效进行。 在一个优 选实施方式中, 第二身份识别卡 (即虚拟卡) 与第一身份识别卡共用第一身份识别卡 的鉴权信息。上述鉴权信息可以但不限于包括以下至少之一: 鉴权算法、 匿名关键字、 鉴权序列号。 当前所用的终端都是几个卡槽最大就能对应几个号, 在实现虚拟卡功能的时候, 就需要设置接口来实现虚拟卡与网络或者是实体卡之间的交互, 从而保证虚拟卡的有 效运行和通信。 即, 在终端还可以包括: 接口, 设置为接收至少一个卡文件***, 其 中, 卡文件***存储在终端的存储装置 104中, 对卡文件***对应的第二身份识别卡 的鉴权通过第一身份识别卡进行。 值得注意的是, 上述接口可以是通过软件实现的, 也可以是通过硬件接口实现的, 对此本发明不作限定, 只要能实现虚拟卡与外部的交 互即可。 本实施例中还提供了一种基于上述终端的身份识别卡处理方法, 如图 2所示, 包 括以下步骤: 步骤 S202: 在第一身份识别卡中写入第一身份识别卡的第一卡文件***, 其中, 上述第一身份识别卡设置为***到终端的身份识别卡卡槽 102中; 步骤 S204: 在终端的存储装置 104中写入至少一个第二卡文件***, 其中, 对第 二卡文件***对应的第二身份识别卡的鉴权通过第一身份识别卡进行。 优选地, 上述的步骤 S202至步骤 S204可以是在运营商侧执行的。 本实施例中还提供了一种基于上述终端的鉴权方法, 如图 3所示,包括以下步骤: 步骤 S302: 接收对第二身份识别卡的鉴权请求, 其中, 第二身份识别卡的卡文件 ***存储在终端的存储装置 104中; 步骤 S304: 响应于上述鉴权请求, 通过第一身份识别卡完成对第二身份识别卡的 鉴权, 其中, 第一身份识别卡插在终端的身份识别卡卡槽 102中。 优选地, 上述步骤 S302至少可以包括以下两种情况: 1 ) 在对第二身份识别卡进行注册的过程中, 接收对第二身份识别卡的鉴权请求; 或者
2)在通过第二身份识别卡发起业务流程的过程中,接收对第二身份识别卡的鉴权 请求。 虚拟卡的卡文件信息与实体卡的卡文件信息的不同之处在于, 实体卡的卡文件信 息包括在其对应的身份识别卡的芯片上, 对于虚拟卡的卡文件信息 (即第二身份识别 卡的卡文件***中的信息) 可以通过以下方式中的一种或多种获得:
1 ) 直接拷贝第一身份识别卡的卡文件***的信息中的公共文件; 或者
2)根据第一身份识别卡的卡文件***的信息按照预定的算法生成第二身份识别卡 的用户身份信息, 其中, 第一身份识别卡与第二身份识别卡之间建立了映射关系, 优 选地, 上述的用户身份信息可以是用户特定身份信息; 或者
3 ) 预先按照运营商的要求设置第一身份识别卡的卡文件***的信息。 优选地, 对于公共文件信息可以直接拷贝实体卡的信息, 对于用户特定身份信息 相关文件可以根据实体卡的信息按照预定的算法生成。 在本实施例中还提供了一种鉴权装置, 该装置设置为实现上述实施例及优选实施 方式, 已经进行过说明的不再赘述。 如以下所使用的, 术语 "单元"或者 "模块"可 以实现预定功能的软件和 /或硬件的组合。尽管以下实施例所描述的装置较佳地以软件 来实现, 但是硬件, 或者软件和硬件的组合的实现也是可能并被构想的。 图 4是根据 本发明实施例的鉴权装置的一种优选结构框图, 如图 4所示, 包括: 接收单元 402和 鉴权单元 404, 下面对该结构进行说明。 接收单元 402, 设置为接收对第二身份识别卡的鉴权请求, 其中, 第二身份识别 卡的卡文件***存储在终端的存储装置中; 鉴权单元 404, 与接收单元 402耦合, 设置为响应于鉴权请求, 通过第一身份识 别卡完成对第二身份识别卡的鉴权, 其中, 第一身份识别卡插在终端的身份识别卡卡 槽中。 本发明提供了一种优选的实施例来进 步对本发明进行解释,但是值得注意的是, 该优选实施例只是为了更好的描述本发明, 并不构成对本发明不当的限定。 本发明实施例的终端采用单个终端芯片、 一个卡槽、 可以支持***一张 SIM (或 USIM)卡, 实现多卡多号的移动终端。 可以实现多卡多待终端, 多个手机号码(例如 多个 MSISDN) 同时待机, 用户使用过程中多个手机号码同时工作、 相互独立提供业 务。 也可以实现多卡多号单待终端, 用户可以自由选择使用哪个卡及***作为当前业 务所使用或者激活的卡。 本发明实施例的上述终端类型中, 一个终端通过虚拟卡的方式可以实现***多于 卡槽的目的, 从而降低了终端的成本和运营的成本, 进一步的, 通过在终端内设置一 部分存储单元设置为存放卡的卡信息, 这样在数据交互的时候可以直接从终端内读取 数据而无需向 SIM卡读取数据, 从一定程度上加快了数据读取的速率。 下面以基于单芯片单卡槽的双待终端为例进行说明,即,通过一张 SIM (或 USIM) 卡就可以实现双卡双待的方法和装置。 通过这种终端可以避免用户因卡插错卡槽而影 响到正常业务的问题, 达到了提高用户体验的技术效果。 优选地, 在本优选实施例中 还提供了一种优选的单芯片单卡槽的单待终端, 通过一张 SIM (或 USIM) 卡实现多 卡多号、 用户可以自由切换***的单待终端。 然而值得说明的是, 上述两种终端仅是 一种优选的实现方式, 在实际的应用中, 也可以通过两个实体卡实现三个号, 或者是 实现多个号, 只要是终端中存在虚拟卡, 都应该在本申请的保护范围内, 例如一种终 端中可以有一个卡槽和芯片, 而设置有 3个虚拟卡, 这样就实现了一卡多号, 也可以 是通过 2个实体卡实现 6个号, 也就是终端可以通过两个实体卡实现 4个虚拟卡。
1 ) 针对多卡多待终端, 以基于本发明实施例实现的双卡双待终端为例进行说明, 可以标记双待的待机协议桟分别为协议桟 1 (Protocol Stack 1, 简称为 PS-1 ) 优选的, 该 PS-1可以是 3G/4G协议桟, 协议桟 2 (Protocol Stack 2, 简称为 PS-2) 优选的, 该 PS-2可以是 2G协议桟。 单芯片单卡槽上对应的 SIM (或 USIM) 卡的国际用户识别 码 (International Mobile Subscriber Identification Number, 简称为 IMSI)、 移动用户国 际号码(即 Mobile Station International ISDN Number,简称为 MSISDN)分别为 IMSI-1、 MSISDN- 1 , 统称为卡 -1 ; 在终端设备非易失性储存介质 (Non- Volatile Memory, 简称 为 NV) 中虚拟卡对应的 IMSI、 MSISDN为 IMSI-2、 MSISDN-2, 统称为卡 -2。 对于上述终端, 在实现的时候主要包括以下步骤: 步骤 S1 : 运营商提供双待终端给用户时, 预先设置终端的卡 -2文件***, 并设置 好对应卡 -2的 IMSI-2。 步骤 S2: 当用户开通双卡双待业务时, 运营商将卡槽中的卡 -1和双待终端中内置 的卡 -2进行关联, 使得卡 -2的鉴权和卡 -1鉴权所使用的鉴权信息相同, SP, 卡 -2可以 共享使用卡 -1的鉴权信息和鉴权过程。 步骤 S3: 用户开机后, 双待终端根据开机指令进行卡 -1 的初始化的同时, 启动 NV中的卡 -2文件***, 完成卡 -2的初始化。 步骤 S4: 在卡 -1和卡 -2都完成了正常的初始化过程之后, PS-1、 PS-2分别根据 卡 -1、 卡 -2中的网络信息, 进行搜网。 步骤 S5: 在卡 -1和卡 -2完成搜网和驻留后。 PS-1用卡 -1的信息进行网络注册, PS-2用卡 -2的信息进行网络注册。 对于 PS-1和卡 -1组合的注册过程和现有的终端相 同, 在此不再赘述。 对于 PS-2和卡 -2组合, 由于卡 -2是本发明实施例中的双待终端 中的虚拟的卡文件***, 无法进行鉴权, 因此需要通过卡 -1来完成鉴权。 步骤 S6: 当 PS-2 收到网络的鉴权请求后, 发送鉴权请求消息给卡 -1, 通过卡 -1 完成鉴权, 当卡 -1返回鉴权结果时, PS-2将鉴权应答发送给网络后, 将对应的鉴权参 数 KSI、 CK、 IK (或 CKSN、 Kc)保存在卡 -2的文件***中, 用于后面的业务或加密 等过程。 步骤 S7: PS-2和卡 -2通过网络鉴权, 完成注册后, 即可获取正常的网络服务。 至 此, 双待终端的两个待机侧、 两张卡都可以独立进行各自的业务。
2)针对多卡多号单待终端, 本实施例以双卡双号单待为例进行说明。可以标记单 芯片单卡槽上对应的 SIM (或 USIM)卡的 IMSI、 MSISDN分别为 IMSI-1、 MSISDN-1, 统称为卡 -1 ; 在终端设备 NV中虚拟卡对应的 IMSI、 MSISDN为 IMSI-2、 MSISDN-2, 统称为卡 -2。 对于上述终端, 在实现的时候主要包括以下步骤: 步骤 S1 : 运营商提供双待终端给用户时, 预先设置终端的卡 -2文件***, 并设置 好对应卡 -2的 IMSI-2。 步骤 S2: 当用户开通双卡双号单待业务时, 运营商将卡槽中的卡 -1和双待终端中 内置的卡 -2进行关联, 使得卡 -2的鉴权和卡 -1鉴权所使用的鉴权信息相同, SP, 卡 -2 可以共享使用卡 -1的鉴权信息和鉴权过程。 步骤 S3:用户开机后,根据提示选择即将使用的*** MSISDN (对应卡 -1或卡 -2)。 步骤 S4: 移动终端根据开机指令同时进行卡 -1和卡 -2的初始化。 步骤 S5: 在卡 -1和卡 -2都完成了正常的初始化过程之后, 终端根据用户选择的卡 中的网络信息, 进行搜网。 步骤 S6: 在完成搜网和驻留后。 终端使用用户选择的卡信息进行网络注册。 步骤 S7: 当终端收到网络的鉴权请求, 发送鉴权请求消息给卡 -1, 通过卡 -1完成 鉴权,当卡 -1返回鉴权结果时,终端将鉴权应答发送给网络后,将对应的鉴权参数 KSI、 CK、 IK (或 CKSN、 Kc)保存到用户所选择卡的文件***中, 用于后面的业务或加密 等过程。 步骤 S8: 终端通过网络鉴权, 完成注册后, 即可获取正常的网络服务。 步骤 S9: 如果用户需要更换待机号码, 在终端关机后, 从上述步骤 S3开始执行, 此处不再赘述。 以上两个实现说明均是以实现双卡双号为例进行说明, 对于多卡多号的实现与以 上两个实现方法类似, 仅需要在终端内置的 NV中增加对应的卡文件***即可, 在此 不再赘述。 优选地, 上述所提及的 NV中虚拟卡文件***的实现方法中虚拟卡以 3GPP协议
31102、 51.011中的文件结构为基础, 在 NV中按照 3GPP协议中的文件信息建立对应 的文件结构 (包括: 文件状态、 文件标识、 文件记录数、 文件长度、 文件码流等), 用 于保存用户的 SIM (或 USIM) 的卡相关信息, 该文件结构中的记录有可以供读取和 更新的文件。 当终端读取或更新某个文件时, 根据文件的标识 (keyid) 查询到对应的 文件, 读取或更新文件内容。 上述的文件数据结构可以如图 5所示。 虚拟卡中的文件信息可以预先按照运营商要求进行设置, 也可以在用户开户时, 通过***的真实的 SIM (或 USIM)卡按照运行商提供的算法自动生成相关文件信息。 例如: 对于公共文件可以直接共享拷贝真实卡 (即上文的实体卡) 的文件信息, 用户 特定身份信息的相关文件可以按照运营商提供的算法生成和真实 SIM (或 USIM) 有 映射关系的身份信息, 并将真实卡和虚拟卡之间进行关联。 下面结合两个具体的实施例,对上述终端从注册到请求业务的流程进行具体说明: 优选实施方式 1 : 如图 6所示, 是一种单芯片单卡槽的双卡双待终端的示意图, 其中, 包括: 人机 接口 (Man Machine Interface, 简称为 MMI)、 SIM (USIM)卡 -1, 通用集成电路卡管 理模块 (Universal Integrated Circuit Card Manage, 简称为 UICCMng)、 PS-1、 PS-2和 物理层射频单元。 基于图 6所示的终端, 本实施例还提供了一种实现单芯片单卡槽双卡双待终端开 机初始化及网络注册过程, 如图 7所示, 包括以下步骤: 步骤 S1 : 开机后, MMI分别通知两个待机协议桟 PS-1和 PS-2开启各自对应的物 理层射频。 步骤 S2: 在两个待机协议桟开启射频成功后, 回复 MMI开射频成功。 步骤 S3: MMI分别下发卡初始化消息给 UICCMng和 NV (虚拟卡), 请求进行 卡初始化过程。 步骤 S4: UICCMng在收到卡初始化消息后,开始初始化卡操作中的 SIM (或 USIM 卡); NV (虚拟卡) 收到卡初始化消息后, 读取上次关机前保存的卡相关文件数据, 做好供 PS-2读写的准备。 步骤 S5: UICCMng初始化 SIM (USIM)卡成功, 发送卡初始化成功消息给 PS-1, 通知待机协议桟已经有卡且可以正常使用; NV (虚拟卡)完成数据准备工作后, 也发 送卡初始化成功消息给 PS-2, 通知该待机协议桟已经有卡且可以正常使用。 步骤 S6: UICCMng NV (虚拟卡)分别回复卡初始化成功消息给 MMI,通知 MMI 卡初始化成功。 步骤 S7: 协议桟 PS-1、 PS-2在收到卡 -1、 卡 -2发送的初始成功消息后, 分别读 取注册相关参数, 根据读取的参数信息进行搜网和驻留过程。 步骤 S8: PS-1成功驻留后, 用卡 -1中的鉴权序列号 CKSN (或 KSI)、 用户身份 识别码 (IMSI-1或对应 P-TMSI) 等参数发起注册过程。 PS-2成功驻留后, 用卡 -2中 保存的鉴权序列号 CKSN (或 KSI)、 用户身份识别码 (IMSI-2或对应 TMSI) 等参数 发起注册过程。 步骤 S9: PS-1在注册过程中, 如果网络发起鉴权, 则 PS-1发送鉴权给 UICCMng 请求进行卡的鉴权过程。 PS-2在注册过程中, 如果网络发起鉴权, 因为 PS-2对应的 卡 -2是虚拟卡无法进行鉴权, PS-2需要将鉴权请求发送给 UICCMng模块, 通过卡 -1 完成鉴权过程。 步骤 S10: 当 PS-1完成鉴权过程后, PS-1发送鉴权应答给网络侧, 同时将对应的 鉴权参数发送给 UICCMng, 写入卡 -1 ( SIM或 USIM卡)。 当 PS-2完成鉴权过程后, PS-2发送鉴权应答给网络侧, 同时将对应的鉴权参数保存在卡 -2中 (NV虚拟卡)。 在鉴权过程完成后, 两个待机协议桟 PS-1、 PS-2分别完成注册, 处于待机状态, 至此卡 -1和卡 -2可以分别提供用户需要的业务。 如图 8所示, 是单芯片单卡槽双卡双待终端并行发起业务的流程图, 可以包括以 下步骤: 步骤 S1 : 用户请求连接网络, 发起拨号连接, 或者是用户请求发起呼叫, 即可以 是 MMI在 PS-1上请求建立拨号连接, MMI在 PS-2上请求进行呼叫业务。 步骤 S2: PS-1在收到拨号连接请求后, 获取对应的卡 -1的鉴权序列号 CKSN (或 KSI)、 用户身份识别码 (IMSI-1对应的 P-TMSI) 等参数并发送业务请求给网络侧, 请求建立 PS信令连接。 PS-2收到用户的呼叫建立请求, 获取对应的卡 -2的鉴权序列 号 CKSN (或 KSI)、 用户身份识别码 (IMSI-2或对应的 TMSI) 等参数发送 CM业务 请求给网络侧, 请求建立 CS域 (电路域) 信令连接。 步骤 S3:网络侧分别收到 PS-1和 PS-2的业务请求后,根据需要发起鉴权过程(如 图中的鉴权请求 1和鉴权请求 2)。 步骤 S4: 对于 PS-1 (IMSI-1 ), 如果网络侧发起鉴权请求, 则 PS-1发送鉴权请求 给 UICCMng以请求进行卡的鉴权过程。 对于 PS-2 (IMSI-2), 如果网络侧发起鉴权请 求, 因为 PS-2对应的卡 -2是虚拟卡而无法进行鉴权, 所以 PS-2需要将鉴权请求发送 给 UICCMng模块, 通过卡 -1完成鉴权过程。 步骤 S5: 当 PS-1完成鉴权过程之后, PS-1发送鉴权应答给网络侧, 同时将对应 的鉴权参数发送给 UICCMng, 写入卡 -1 ( SIM或 USIM卡) 中。 当 PS-2完成鉴权过 程之后, PS-2发送鉴权应答给网络侧, 同时将对应的鉴权参数保存在卡 -2中 (NV虚 拟卡)。 步骤 S6: 网络侧在完成用户身份识别的鉴权过程后, 发送业务接受消息给对应的 PS-1或 PS-2。 步骤 S7: PS-1在收到业务接受消息后, PS信令连接建立完成, 开始进行分组数 据协议 (Packet Data Protocol, 简称为 PDP) 相关业务流程。 PS-2收到 CM业务 (即, 多媒体业务) 接受消息后, CS域信令连接建立完成, 开始呼叫相关的业务流程。 步骤 S8: PDP激活流程、 呼叫建立流程和现有终端的流程相同, 在此不再赘述。 步骤 S9: 在完成上述 PDP相关操作后, PS-1回复 MMI拨号连接建立成功; 呼叫 过程建立成功后, PS-2回复 MMI呼叫建立成功。 这样, 用户就可以并发使用数据业务和语音呼叫业务。 至此, 上述的单卡槽双卡双待终端完成了两个不同手机号码(MSISDN-1/IMSI-1、 MSISDN-2/IMSI-2) 同时进行业务的过程, 对于单卡槽双卡双待终端的被叫业务流程 和上述主叫流程类似, 在此不再赘述。 优选实施方式 2 如图 9所示,是一种单芯片单卡槽的双卡单待终端的示意图,包括:人机接口(Man Machine Interface,简称为 MMI)、SIM(USIM)卡 -1,通用集成电路卡管理模块(Universal Integrated Circuit Card Manage, 简称为 UICCMng)、 PS和物理层射频单元。 基于图 9所示的终端, 本实施例还提供了一种实现单芯片单卡槽双卡单待终端开 机初始化及网络注册过程, 如图 10所示, 包括以下步骤: 步骤 S1 : 用户开机后, MMI提示用户选择或默认选择使用卡 -2 (NV中虚拟卡) 做为用户激活的手机卡, 并向 PS发送卡设置请求消息。 步骤 S2: MMI分别通知协议桟 PS开启物理层射频。 步骤 S3: 协议桟开启射频成功后, 回复 MMI开射频成功消息; 步骤 S4: MMI分别下发卡初始化请求消息给 UICCMng和 NV (虚拟卡), 请求 进行卡初始化过程。 步骤 S5: UICCMng在收到卡初始化消息后,开始初始化卡操作中的 SIM (或 USIM 卡); NV (虚拟卡) 收到卡初始化消息后, 读取上次关机前保存的卡相关文件数据, 做好供 PS-2读写的准备。 步骤 S6: UICCMng初始化 SIM (USIM)卡成功, 发送卡初始化成功消息给协议 桟 PS, 通知待机协议桟已经有卡且可以正常使用; NV (虚拟卡) 完成数据准备工作 后, 也发送卡初始化成功消息给协议桟 PS, 通知该待机协议桟已经有卡且可以正常使 用。 步骤 S7: UICCMng NV (虚拟卡) 分别回复卡初始化成功消息给 MMI, 通知
MMI卡初始化成功。 步骤 S8: 协议桟 PS在收到卡 -1、 卡 -2发送的初始成功消息后, 确定卡已经准备 好。 然后, 根据 MMI设置的激活卡为卡 -2, 读取卡 -2 (NV中虚拟卡) 的用户身份信 息和网络信息等相关参数, 进行搜网、 驻留过程。 步骤 S9: 协议桟 PS成功驻留后, 用卡 -2中的鉴权序列号 CKSN (或 KSI)、 用户 身份识别码 (IMSI-2或对应 P-TMSI) 等参数发起注册过程。 步骤 S10: 协议桟 PS在注册过程中, 如果网络侧发起鉴权, 因为当前激活的虚拟 卡无法进行鉴权, 因此协议桟 PS将鉴权请求发送给 UICCMng模块,通过卡 -1完成鉴 权过程。 步骤 S11 : 当 PS-1完成鉴权过程后, 协议桟 PS发送鉴权应答给网络侧, 同时将 对应的鉴权参数发送给卡 -2, 并将参数保存在卡 -2中 (NV虚拟卡)。 步骤 S12: 鉴权过程完成后, 待机协议桟 PS完成了卡 -2的注册过程, 卡 2 (对 应 MSISDN-2) 处于待机状态, 至此可以提供用户需要的业务。 如图 11所示, 是单芯片单卡槽双卡单待终端并行发起业务的流程图, 该方法可以 包括以下步骤: 步骤 S1 : 开机时,用户选择卡 -2 (对应 MSISDN-2) 作为激活卡, MMI请求建立 拨号连接, 用户发起请求发起呼叫; 步骤 S2:协议桟在收到拨号连接请求后,获取与卡 -2对应的鉴权序列号 CKSN (或 KSI)、 用户身份识别码 (IMSI-2或对应的 TMSI) 等参数, 根据获取的参数发送 CM 业务请求给网络侧, 请求建立 CS域信令连接。 步骤 S3: 网络侧在收到协议桟 PS的业务请求后, 根据需要发起鉴权过程。 步骤 S4: 对于虚拟卡用户卡 -2 (对应 MSISDN-2), 无法进行鉴权, 如果网络侧发 起鉴权, PS需要将鉴权请求发送给 UICCMng模块, 通过卡 -1完成鉴权过程。 步骤 S5: 当卡 -1完成鉴权过程后, 协议桟 PS发送鉴权应答给网络侧, 同时将对 应的鉴权参数保存在卡 -2中 (NV虚拟卡)。 步骤 S6: 网络侧在完成用户身份识别的鉴权过程后, 发送业务接受消息给终端。 步骤 S7: 协议桟 PS在收到 CM业务接受消息后, CS域信令连接建立完成, 开 始呼叫相关业务流程, 对于呼叫建立流程与当前的终端流程相同, 在此不再赘述。 步骤 S8: 呼叫过程建立成功后, 协议桟 PS回复呼叫建立成功消息给 MMI, 用户 可以正常进行语音业务。 上述的单卡槽双卡单待终端完成了选择一个手机号码 (MSISDN-1/IMSI-1、 MSISDN-2/IMSI-2) 进行业务的过程, 对于单卡槽双卡单待终端的被叫业务流程和上 述主叫流程类似, 在此不再赘述。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 在另外一个实施例中, 还提供了一种软件, 该软件用于执行上述实施例及优选实 施方式中描述的技术方案。 在另外一个实施例中, 还提供了一种存储介质, 该存储介质中存储有上述软件, 该存储介质包括但不限于: 光盘、 软盘、 硬盘、 可擦写存储器等。 从以上的描述中, 可以看出, 本发明实施例实现了如下技术效果: 在终端中设置 存储装置, 通过该存储装置来存储卡文件***, 也就相当于设置了一个虚拟卡, 通过 该虚拟卡就可以实现一般的实体卡 (例如插在身份识别卡卡槽中的卡) 的功能, 对于 虚拟卡的鉴权过程是通过终端中的实体卡进行的。 通过上述方式解决了相关技术中卡 槽只能实现小于或等于其数量的身份识别卡的功能的技术问题, 达到了节省卡槽及成 本的技术效果。 工业实用性 本发明技术方案可以实现终端的***多于其卡槽, 节省了终端卡槽的使用数量, 降低了终端的制造成本和运营成本, 并加快了数据交互时***读取数据的速率。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书 一种终端, 包括:
身份识别卡卡槽, 设置为***第一身份识别卡;
存储装置, 设置为存储至少一个卡文件***, 其中, 对所述卡文件***对 应的第二身份识别卡的鉴权通过所述第一身份识别卡进行。 根据权利要求 1所述的终端, 其中, 所述存储装置包括: 非易失的存储介质。 根据权利要求 1或 2所述的终端, 其中, 所述第二身份识别卡与所述第一身份 识别卡共用所述第一身份识别卡的鉴权信息。 一种终端, 包括:
身份识别卡卡槽, 设置为***第一身份识别卡;
接口, 设置为接收至少一个卡文件***, 其中, 所述卡文件***存储在所 述终端的存储装置中, 对所述卡文件***对应的第二身份识别卡的鉴权通过所 述第一身份识别卡进行。 根据权利要求 4所述的终端, 其中, 所述存储装置包括: 非易失的存储介质。 根据权利要求 4或 5所述的终端, 其中, 所述第二身份识别卡与所述第一身份 识别卡共用所述第一身份识别卡的鉴权信息。 一种身份识别卡实现方法, 包括:
在终端的存储装置中写入至少一个第二卡文件***, 其中, 对第二卡文件 ***对应的第二身份识别卡的鉴权通过第一身份识别卡进行, 其中, 所述第一 身份识别卡插在所述终端的身份识别卡卡槽中。 根据权利要求 7所述的方法, 其中, 所述第二身份识别卡与所述第一身份识别 卡共用所述第一身份识别卡的鉴权信息。 根据权利要求 8所述的方法, 其中, 所述鉴权信息包括以下至少之一: 鉴权算 法、 匿名关键字、 鉴权序列号。 一种鉴权方法, 包括: 接收对第二身份识别卡的鉴权请求, 其中, 所述第二身份识别卡的卡文件 ***存储在终端的存储装置中;
响应于所述鉴权请求, 通过第一身份识别卡完成对所述第二身份识别卡的 鉴权, 其中, 所述第一身份识别卡插在所述终端的身份识别卡卡槽中。
11. 根据权利要求 10所述的方法,其中,所述第二身份识别卡与所述第一身份识别 卡共用所述第一身份识别卡的鉴权信息。
12. 根据权利要求 11所述的方法, 其中, 所述鉴权信息包括以下至少之一: 鉴权算 法、 匿名关键字、 鉴权序列号。
13. 根据权利要求 10所述的方法, 其中, 接收对第二身份识别卡的鉴权请求包括: 在对所述第二身份识别卡进行注册的过程中, 接收对所述第二身份识别卡 的鉴权请求; 和 /或
在通过所述第二身份识别卡发起业务流程的过程中, 接收对所述第二身份 识别卡的鉴权请求。
14. 根据权利要求 10至 13中任一项所述的方法, 其中, 所述第二身份识别卡的卡 文件***中信息通过以下方式中的一种或多种获得:
拷贝所述第一身份识别卡的卡文件***的信息中的公共文件; 或者 根据所述第一身份识别卡的卡文件***的信息按照预定的算法生成所述第 二身份识别卡的用户身份信息, 其中, 所述第一身份识别卡与所述第二身份识 别卡之间建立了映射关系; 或者
预先按照运营商的要求设置所述第二身份识别卡的卡文件***的信息。
15. 一种鉴权装置, 包括:
接收单元, 设置为接收对第二身份识别卡的鉴权请求, 其中, 所述第二身 份识别卡的卡文件***存储在终端的存储装置中;
鉴权单元, 设置为响应于所述鉴权请求, 通过第一身份识别卡完成对所述 第二身份识别卡的鉴权, 其中, 所述第一身份识别卡插在所述终端的身份识别 卡卡槽中。
PCT/CN2013/082006 2013-05-15 2013-08-21 终端、身份识别卡实现方法以及鉴权方法和装置 WO2014183350A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310180406.8A CN104159222A (zh) 2013-05-15 2013-05-15 终端、身份识别卡实现方法以及鉴权方法和装置
CN201310180406.8 2013-05-15

Publications (1)

Publication Number Publication Date
WO2014183350A1 true WO2014183350A1 (zh) 2014-11-20

Family

ID=51884608

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/082006 WO2014183350A1 (zh) 2013-05-15 2013-08-21 终端、身份识别卡实现方法以及鉴权方法和装置

Country Status (2)

Country Link
CN (1) CN104159222A (zh)
WO (1) WO2014183350A1 (zh)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106162600A (zh) * 2015-04-01 2016-11-23 酷派软件技术(深圳)有限公司 智能卡的使用方法及智能终端
CN104837128A (zh) * 2015-05-05 2015-08-12 小米科技有限责任公司 多卡多待单通的实现方法及装置、电子设备
CN104883415A (zh) * 2015-05-12 2015-09-02 努比亚技术有限公司 通信方法和装置
CN106304034A (zh) * 2015-05-13 2017-01-04 中兴通讯股份有限公司 一种远程更新移动终端智能卡的方法及***
CN106375995A (zh) * 2015-07-22 2017-02-01 深圳市中兴微电子技术有限公司 一种信息处理方法、***及车载通信装置
CN105959451B (zh) * 2016-06-29 2019-03-22 宇龙计算机通信科技(深圳)有限公司 一种加载mbn的方法及移动终端
CN108235267B (zh) * 2016-12-22 2021-03-19 展讯通信(上海)有限公司 多卡单待终端的通信方法、装置、多卡单待终端及服务器
CN107071176A (zh) * 2017-04-19 2017-08-18 维沃移动通信有限公司 一种移动终端的拨号方法及移动终端
CN107396332A (zh) * 2017-08-21 2017-11-24 北京小米移动软件有限公司 手机卡的启用方法及设备
CN107466059B (zh) * 2017-09-13 2021-01-26 苏州简约纳电子有限公司 一种lte终端测试中模拟usim卡的***
CN109151803B (zh) * 2018-08-31 2019-06-14 星汉智能科技股份有限公司 信息交互方法和装置、智能卡芯片和终端
CN113873524B (zh) * 2021-10-27 2023-02-28 哲库科技(北京)有限公司 网络注册方法、装置、多卡终端及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101400180A (zh) * 2007-09-25 2009-04-01 中兴通讯股份有限公司 一种利用虚拟数据卡代替传统手机卡的方法
CN101977409A (zh) * 2010-10-20 2011-02-16 中兴通讯股份有限公司 一种双网双待终端进行通讯的方法和装置
CN202818629U (zh) * 2012-02-15 2013-03-20 重庆重邮信科通信技术有限公司 一种实现多模多待单卡的装置及终端

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222711B (zh) * 2008-02-02 2010-11-10 代邦(江西)制卡有限公司 支持虚拟sim卡的移动通讯网络***及其认证方法
CN101795452B (zh) * 2009-12-24 2015-01-28 中兴通讯股份有限公司 客户识别模块卡的鉴权方法及终端

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101400180A (zh) * 2007-09-25 2009-04-01 中兴通讯股份有限公司 一种利用虚拟数据卡代替传统手机卡的方法
CN101977409A (zh) * 2010-10-20 2011-02-16 中兴通讯股份有限公司 一种双网双待终端进行通讯的方法和装置
CN202818629U (zh) * 2012-02-15 2013-03-20 重庆重邮信科通信技术有限公司 一种实现多模多待单卡的装置及终端

Also Published As

Publication number Publication date
CN104159222A (zh) 2014-11-19

Similar Documents

Publication Publication Date Title
WO2014183350A1 (zh) 终端、身份识别卡实现方法以及鉴权方法和装置
JP6732948B2 (ja) 仮想ユーザ識別モジュール認証方法および装置
US9705883B2 (en) Communications terminal and system and rights management method
JP6401280B2 (ja) サービスにアクセスするための方法及び装置
WO2017054172A1 (zh) 一种Profile切换的方法及终端
US10805793B2 (en) Communication method and device
JP6367975B2 (ja) Rplmn情報を更新するための方法、およびユーザ機器
ES2765739T3 (es) Método, dispositivo y sistema para autenticarse en una red móvil y un servidor para autenticar dispositivos en una red móvil
KR101591051B1 (ko) 무선 링크 설정을 위해 키 수명들에 대한 액세스의 인에이블링
CN110944319B (zh) 5g通信身份验证方法、设备及存储介质
WO2012159414A1 (zh) 移动终端接入无线局域网热点的方法及移动终端
WO2019214345A1 (zh) 网络连接方法、装置、计算机装置及计算机可读存储介质
CN111050324B (zh) 5g终端设备接入方法、设备及存储介质
WO2017080231A1 (zh) 接入无线网络的方法及装置
WO2012062073A1 (zh) 一种双网终端及其开关机的方法
CN110891266A (zh) 一种网络漫游方法、装置、终端设备及存储介质
KR102044677B1 (ko) 무선 통신 네트워크 등록 방법 및 단말기
CN111132129B (zh) Sim卡信息获取装置和通信终端装置
US10251122B2 (en) Method for switching from a first to a second mobile network operator and corresponding device
US11064344B2 (en) Physical address-based communication method, mobile terminal and communication database
CN113727323B (zh) 双频客户端的通信方法、设备、双频客户端和通信***
JP2017539132A (ja) 端末、サーバ、及びユーザ識別システム及び方法
WO2011160478A1 (zh) 一种复用分组交换业务的移动终端和方法
EP4322480A1 (en) Secure identification of applications in communication network
CN113766435B (zh) 通信群组的建立方法、设备以及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13884934

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13884934

Country of ref document: EP

Kind code of ref document: A1