CN101751212B - Method and system for interlocking UI and data card - Google Patents

Method and system for interlocking UI and data card Download PDF

Info

Publication number
CN101751212B
CN101751212B CN200910188959.1A CN200910188959A CN101751212B CN 101751212 B CN101751212 B CN 101751212B CN 200910188959 A CN200910188959 A CN 200910188959A CN 101751212 B CN101751212 B CN 101751212B
Authority
CN
China
Prior art keywords
data card
random number
encrypted result
encrypted
judges
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200910188959.1A
Other languages
Chinese (zh)
Other versions
CN101751212A (en
Inventor
房立军
谭冠军
尚江峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN200910188959.1A priority Critical patent/CN101751212B/en
Publication of CN101751212A publication Critical patent/CN101751212A/en
Application granted granted Critical
Publication of CN101751212B publication Critical patent/CN101751212B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method and a system for interlocking a UI and a data card. The UI generates a random number and transmits the random number to the data card after the random number is encrypted. The data card encrypts the random number to obtain an encrypted result which is transmitted to the UI. The UI judges whether the encrypted result is the same as the encrypted result of the UI. If the encrypted result is the same as the encrypted result of the UI, the UI is allowed to be used. The data card generates a random number and transmits the random number to the UI after the random number is encrypted. The UI encrypts the random number to obtain an encrypted result which is transmitted to the data card. The data card judges whether the encrypted result is the same as the encrypted result of the data card. If the encrypted result is the same as the encrypted result of the data card, the data card is allowed to be used. The data card and the UI conduct regular mutual encryption checks to ensure that the UI corresponds to the Data card one by one and to realize interlocking. The interlocking encryption algorithm and the interval of checks can be rectified according to the practical need, so the practicability and the confidentiality are greatly improved and the differentiated needs for all kinds of customization are satisfied.

Description

A kind of UI and data card be the method and system of locking mutually
Technical field
The present invention relates to communication technical field, more specifically, relate to a kind of UI (User Interface, user interface) and the data card method and system of locking mutually.
Background technology
Data card is a kind of important mobile terminal device, more and more extensive in the application of present stage.User interface software is that data card and user carry out mutual PC side software, the related service of data card, such as phone directory, online, note, telephone service etc. are all by UI and user interactions, then UI is undertaken alternately, realizing these business by data card by the AT instruction of standard and the AT instruction and data card of some data cards expansion.Wherein AT order is the interface command between data terminal equipment and data communications equipment.In the implementation of data card, UI is accounting for very important effect.
For the better characteristic of displaying format customization operator, many customizations operator has proposed a series of customization requirement to the UI of data card, the advertising business that even requires to show operator on UI having.
But UI and data card are generally to complete by the AT instruction of standard alternately, so just there will be such certain situation:
1, user uses certain categorical data card of carrier customization, but has used unmatched UI with it, and the AT instruction of the standard of use, and data card can not normally use, operator's some characteristic service on customization UI, and for example advertising business, also cannot embody.
2, user does not use the data card of carrier customization, has but used the UI of the data card of customization, because non-customized data card is not supported upper some the corresponding business of UI, makes user that the related service providing on the UI of customization cannot be provided.
Summary of the invention
The object of the invention is to carry out the mutual of regular mutual cryptographic check after the normal work of data card and UI, verify the other side's correctness, guarantee the correspondence one by one of UI and data card, realize locking mutually.
For achieving the above object, the technical scheme that the present invention takes is as follows:
The invention provides a kind of UI and the data card system of locking mutually, comprise UI and data card, described UI produces a random number and encrypts this random number and obtains, after encrypted result, random number is sent to data card by AT instruction, data card side software obtains encrypted result to random number encryption and sends to UI by AT instruction, UI judges that whether the encrypted result of this encrypted result and UI is identical, if the same UI judges that UI is the UI corresponding with data card side software, allows to use this UI; Data card produces a random number and encrypts this random number and obtains by AT instruction, random number being sent to UI after encrypted result, UI obtains encrypted result and sends to data card side software by AT instruction this random number encryption, data card judges that whether the encrypted result of this encrypted result and data card is identical, what if the same data card judged data card use is the data card side software supporting with UI, allows to use this data card.
Further, said system also comprises: described data card comprises that data card side timing produces random number module, data card side and judges encrypted result and control module, data card side encrypted random number module.
Further, said system also comprises:
Described data card side timing produces random number module for regularly producing random number reports UI;
Described data card side judges that whether encrypted result and control module be correct and forbid or allow the normal usage data card of user according to judged result for the encrypted result that judges UI and issue;
Described data card side encrypted random number module for the random number that data card side timing produced to random number module and produce at data card side is encrypted and data card side issues UI random number encryption and result is returned to UI.
Further, said system also comprises: described UI comprises that UI side timing produces random number module, UI side and judges encrypted result and control module, UI side encrypted random number module.
Further, said system also comprises:
Described UI side timing produces random number module for regularly producing random number is handed down to data card;
Described UI side judges that whether encrypted result and control module be correct and forbid or allow user normally to use UI according to judged result for the encrypted result that judges data card and send;
Described UI side encrypted random number module for the random number that UI side timing produced to random number module and produce at UI side is encrypted and UI side reports data card random number encryption and result is returned to data card.
The present invention also provides a kind of UI and the data card method of locking mutually, UI produces a random number and encrypts this random number and obtains, after encrypted result, random number is sent to data card by AT instruction, data card side software obtains encrypted result to random number encryption and sends to UI by AT instruction, UI judges that whether the encrypted result of this encrypted result and UI is identical, if the same UI judges that UI is the UI corresponding with data card side software, allows to use this UI; Data card produces a random number and encrypts this random number and obtains, after encrypted result, random number is sent to UI by AT instruction, UI obtains encrypted result and sends to data card side software by AT instruction this random number encryption, data card judges that whether the encrypted result of this encrypted result and data card is identical, what if the same data card judged data card use is the data card side software supporting with UI, allows to use this data card.
Further, said method also comprises: described data card has a timer, and above-mentioned encrypted result judges within the scope of timer time carries out.
Further, said method also comprises: described UI has a timer, and above-mentioned encrypted result judges within the scope of timer time carries out.
Further, said method also comprises: described data card and UI timing verification work once on starting immediately after a verification finishes in the time of normal work.
To sum up, data card of the present invention and UI carry out the mutual of regular mutual cryptographic check, verify the other side's correctness, guarantee the correspondence one by one of UI and data card, realize binding mutually.UI version and data card software version correspondence one by one, in the time that UI version and data card software version do not mate, UI or data card cannot normally use, and have met operator and realize UI version and data card software version and bind to realize the demand of its particular service.Meanwhile, the cryptographic algorithm of binding and the time interval of verification can modify according to actual needs mutually, have greatly strengthened practicality and confidentiality, can be used for having met the differentiated demand of various customizations.
Accompanying drawing explanation
Fig. 1 is embodiment of the present invention software module schematic diagram;
Fig. 2 is embodiment of the present invention data card side schematic flow sheet after powering on;
Fig. 3 is that embodiment of the present invention UI side and data card side start mutual rear schematic flow sheet.
Embodiment
Data card of the present invention proceeds to normal mode of operation after powering on, produce a first timer, generate first random number and use the first cryptographic algorithm to produce the first encrypted result to this first random number as cryptographic calculation, notifying UI by the first random number producing by the mode of AT instruction active reporting.
UI encrypts by the first same cryptographic algorithm the first random number obtaining receiving after the first random number that data card reports in described first timer time range, produce the second encrypted result, and this second encrypted result is returned to data card software by AT instruction, data card judges that whether this second encrypted result is identical with the first encrypted result, if identical, data card judges that UI is the UI corresponding with data card software, data card side is normally worked, otherwise data card side enters non-normal working pattern.
UI proceeds to normal mode of operation in the time starting and data card is mutual, produce a second timer, generate second random number, and use the second cryptographic algorithm to make cryptographic calculation generation the 3rd encrypted result to this second random number, the second random number producing is passed through to the mode notification data card side software of AT instruction.
Data card side software encrypts by the second same cryptographic algorithm the second random number obtaining receiving after the second random number in second timer time range, produce the 4th encrypted result, and the 4th encrypted result is returned to UI by AT instruction, UI judges that whether the 3rd encrypted result is identical with the 4th encrypted result, if identical, UI judges that data card is the data card side software supporting with UI, and UI normally works, otherwise UI enters non-normal working pattern.
The timing of first and second cryptographic algorithm and first and second timer can change according to the needs of UI and data card provider, meets the needs of differentiation.
Data card and UI timing verification work once on starting immediately after a verification finishes in the time of normal work, guarantees UI and data card periodic check like this.
Data card and UI carry out the mutual of regular mutual cryptographic check, verify the other side's correctness, guarantee the correspondence one by one of UI and data card, realize binding mutually.And the cryptographic algorithm of mutually binding and the time interval of verification can modify according to actual needs, greatly strengthened practicality and confidentiality, can be used for having met the differentiated demand of various customizations.
UI version and data card software version Corresponding matching, in the time that UI version and data card software version do not mate, UI or data card cannot normally use, and have met operator and realize UI version and data card software version and bind to realize the demand of its particular service.Meanwhile, the cryptographic algorithm of binding and the time interval of verification can modify according to actual needs mutually, have greatly strengthened practicality and confidentiality, can be used for having met the differentiated demand of various customizations.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in detail.
Fig. 1 is embodiment of the present invention software module schematic diagram, and it mainly comprises:
The timing of data card side produces random number module S101, produces random number report UI for timing;
Data card side judges encrypted result and control module S102, for judging that whether encrypted result that UI issues is correct and forbidding or allow the normal usage data card of user according to judged result;
Data card side encrypted random number module S103, for producing random number that random number module S101 produces at data card side is encrypted and data card side issues UI random number encryption and result being returned to UI to data card side timing;
The timing of UI side produces random number module S104, produces random number be handed down to data card for timing;
UI side judges encrypted result and control module S105, for judging that encrypted result that data card sends is whether correct and forbid or allow user normally to use UI according to judged result;
UI side encrypted random number module S106, for producing random number that random number module S104 produces at UI side is encrypted and UI side reports data card random number encryption and result being returned to data card to UI side timing.
As Fig. 2 embodiment of the present invention data card side schematic flow sheet after powering on, idiographic flow is as follows:
Step S201: data card proceeds to normal mode of operation after powering on, produces random number and adopts cryptographic algorithm to obtain encrypted result;
Step S202: data card by the random number of generation by AT order active reporting mode to UI and start timer;
Step S203: if UI is handed down to the result of data card random number encryption within the scope of timer time, enter step S204, otherwise enter step S206;
Step S204: data card judges that whether the encrypted result that UI issues is correct, if correctly enter step 205, otherwise enters step S206;
Step S205: data card judges that UI is now and the UI of its binding, allows user to carry out normal running, and proceed to step S201 and start verifying work next time;
Step S206: data card judges that now UI is not and the UI of its binding, forbids that user carries out normal running.
If Fig. 3 is that embodiment of the present invention UI side and data card side start mutual rear schematic flow sheet, idiographic flow is as follows:
Step S301:UI proceeds to normal mode of operation after starting alternately with data card side, produces random number and also adopts cryptographic algorithm to obtain encrypted result.
Step S302:UI is handed down to the random number of generation data card and is started timer by AT order.
Step S303: if data card reports the result of UI encrypted random number within the scope of timer time, enter step S304, otherwise enter step S306.
Step S304:UI judges that data card reports the result of encryption whether correct, if correctly enter step 305, otherwise enters step S306.
Step S305:UI judges that data card is now and the data card of its binding, allows user to carry out other normal runnings, and proceeds to step S301 and start verifying work next time.
Step S306:UI judges that now data card is not and the data card of its binding, forbids that user carries out other normal runnings.
The data card the present invention relates to and UI carry out the mutual of regular mutual cryptographic check, verify the other side's correctness, guarantee the correspondence one by one of UI and data card, realize binding mutually.And the cryptographic algorithm of mutually binding and the time interval of verification can modify according to actual needs, greatly strengthened practicality and confidentiality, can be used for having met the differentiated demand of various customizations.
Certainly; the present invention also can have numerous embodiments; in the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art are when making according to the present invention various corresponding changes or variation; in every case any modification of doing within the spirit and principles in the present invention, be equal to replacements, improvement, within protection scope of the present invention all should be included in.

Claims (6)

1. a UI and data card system for locking mutually, comprises UI and data card,
Described UI produces a random number and encrypts this random number and obtains, after encrypted result, random number is sent to data card by AT instruction, data card side software obtains encrypted result to random number encryption and sends to UI by AT instruction, UI judges that whether the encrypted result of this encrypted result and UI is identical, if the same UI judges that UI is the UI corresponding with data card side software, allows to use this UI;
Described data card proceeds to normal mode of operation after powering on, produce a first timer, generate first random number and use the first cryptographic algorithm to produce the first encrypted result to this first random number as cryptographic calculation, and by AT instruction, the first random number being sent to UI;
Described UI obtains the second encrypted result by the first cryptographic algorithm to the first random number encryption receiving after the first random number that data card reports in described first timer time range, and by AT instruction, this second encrypted result is sent to data card side software, data card judges that whether this second encrypted result is identical with the first encrypted result, what if the same data card judged data card use is the data card side software supporting with UI, allows to use this data card; Otherwise data card side enters non-normal working pattern;
Described UI proceeds to normal mode of operation in the time starting and data card is mutual, produce a second timer, generate second random number, and use the second cryptographic algorithm to make cryptographic calculation generation the 3rd encrypted result to this second random number, the second random number producing is passed through to the mode notification data card side software of AT instruction;
Data card side software encrypts by the second cryptographic algorithm the second random number obtaining receiving after the second random number in second timer time range, produce the 4th encrypted result, and the 4th encrypted result is returned to UI by AT instruction, UI judges that whether the 3rd encrypted result is identical with the 4th encrypted result, if identical, UI judges that data card is the data card side software supporting with UI, and UI normally works, otherwise UI enters non-normal working pattern;
Described data card and UI timing verification work once on starting immediately after a verification finishes in the time of normal work.
2. the system as claimed in claim 1, is characterized in that: described data card comprises that data card side timing produces random number module, data card side and judges encrypted result and control module, data card side encrypted random number module.
3. system as claimed in claim 2, is characterized in that:
Described data card side timing produces random number module for regularly producing random number reports UI;
Described data card side judges that whether encrypted result and control module be correct and forbid or allow the normal usage data card of user according to judged result for the encrypted result that judges UI and issue;
Described data card side encrypted random number module for the random number that data card side timing produced to random number module and produce at data card side is encrypted and data card side issues UI random number encryption and result is returned to UI.
4. the system as claimed in claim 1, is characterized in that: described UI comprises that UI side timing produces random number module, UI side and judges encrypted result and control module, UI side encrypted random number module.
5. system as claimed in claim 4, is characterized in that:
Described UI side timing produces random number module for regularly producing random number is handed down to data card;
Described UI side judges that whether encrypted result and control module be correct and forbid or allow user normally to use UI according to judged result for the encrypted result that judges data card and send;
Described UI side encrypted random number module for the random number that UI side timing produced to random number module and produce at UI side is encrypted and UI side reports data card random number encryption and result is returned to data card.
6. a UI and data card method for locking mutually, is characterized in that, comprises the following steps:
Step S201: data card proceeds to normal mode of operation after powering on, produces random number and adopts cryptographic algorithm to obtain encrypted result;
Step S202: data card by the random number of generation by AT order active reporting mode to UI and start timer;
Step S203: if UI is handed down to the result of data card random number encryption within the scope of timer time, enter step S204, otherwise enter step S206;
Step S204: data card judges that whether the encrypted result that UI issues is correct, if correctly enter step 205, otherwise enters step S206;
Step S205: data card judges that UI is now and the UI of its binding, allows user to carry out normal running, and proceed to step S201 and start verifying work next time;
Step S206: data card judges that now UI is not and the UI of its binding, forbids that user carries out normal running;
Step S301:UI proceeds to normal mode of operation after starting alternately with data card side, produces random number and also adopts cryptographic algorithm to obtain encrypted result;
Step S302:UI is handed down to the random number of generation data card and is started timer by AT order;
Step S303: if data card reports the result of UI encrypted random number within the scope of timer time, enter step S304, otherwise enter step S306;
Step S304:UI judges that data card reports the result of encryption whether correct, if correctly enter step 305, otherwise enters step S306;
Step S305:UI judges that data card is now and the data card of its binding, allows user to carry out other normal runnings, and proceeds to step S301 and start verifying work next time;
Step S306:UI judges that now data card is not and the data card of its binding, forbids that user carries out other normal runnings.
CN200910188959.1A 2009-12-16 2009-12-16 Method and system for interlocking UI and data card Expired - Fee Related CN101751212B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910188959.1A CN101751212B (en) 2009-12-16 2009-12-16 Method and system for interlocking UI and data card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910188959.1A CN101751212B (en) 2009-12-16 2009-12-16 Method and system for interlocking UI and data card

Publications (2)

Publication Number Publication Date
CN101751212A CN101751212A (en) 2010-06-23
CN101751212B true CN101751212B (en) 2014-06-04

Family

ID=42478247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910188959.1A Expired - Fee Related CN101751212B (en) 2009-12-16 2009-12-16 Method and system for interlocking UI and data card

Country Status (1)

Country Link
CN (1) CN101751212B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101958969B (en) * 2010-07-28 2014-02-05 中兴通讯股份有限公司 Wireless communication terminal and method thereof for binding with user interface (UI)
CN105592435A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 User interface (UI) loading method, device and related equipment
CN106507333A (en) * 2015-09-07 2017-03-15 中兴通讯股份有限公司 A kind of interlocking of phone and card method and device
CN107567012A (en) * 2017-09-26 2018-01-09 深圳普创天信科技发展有限公司 A kind of production of soft SIM card, use, processing method and processing device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801700A (en) * 1997-05-20 2006-07-12 安尼株式会社 Encryption communication system for generating passwords on the basis of start information on both parties of communication
CN1829365A (en) * 2006-03-28 2006-09-06 江苏移动通信有限责任公司 User recognition module and method capable of realizing mobile terminal area locking
CN101090316A (en) * 2006-06-16 2007-12-19 普天信息技术研究院 Identify authorization method between storage card and terminal equipment at off-line state
CN101155212A (en) * 2006-09-30 2008-04-02 中兴通讯股份有限公司 Method for limiting use of mobile terminal
CN101163290A (en) * 2006-10-09 2008-04-16 中兴通讯股份有限公司 Method of limiting use of mobile terminal through machine-card mutual authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801700A (en) * 1997-05-20 2006-07-12 安尼株式会社 Encryption communication system for generating passwords on the basis of start information on both parties of communication
CN1829365A (en) * 2006-03-28 2006-09-06 江苏移动通信有限责任公司 User recognition module and method capable of realizing mobile terminal area locking
CN101090316A (en) * 2006-06-16 2007-12-19 普天信息技术研究院 Identify authorization method between storage card and terminal equipment at off-line state
CN101155212A (en) * 2006-09-30 2008-04-02 中兴通讯股份有限公司 Method for limiting use of mobile terminal
CN101163290A (en) * 2006-10-09 2008-04-16 中兴通讯股份有限公司 Method of limiting use of mobile terminal through machine-card mutual authentication

Also Published As

Publication number Publication date
CN101751212A (en) 2010-06-23

Similar Documents

Publication Publication Date Title
CN101662465B (en) Method and device for verifying dynamic password
CN102469453B (en) Security certificate method
CN106453330A (en) Identity authentication method and system
CN103078742B (en) Generation method and system of digital certificate
CN102426715A (en) Unlocking method for electronic door lock, electronic door lock and electronic door lock system
CN105553932A (en) Method, device and system of remote control safety binding of intelligent home appliance
CN105005884A (en) Express item sign-off method, system, server and handheld terminal
CN102056077B (en) Method and device for applying smart card by key
CN102420902A (en) Method for classification management over right of using functions and mobile terminal
CN101415182B (en) Method, system and apparatus for protecting terminal data
CN101751212B (en) Method and system for interlocking UI and data card
CN108256909A (en) A kind of integrating system and method based on block chain
CN105516103A (en) Method, device and system for binding intelligent household electrical appliances
CN102789607A (en) Network transaction method and system
CN102332127A (en) Network TV (television) online payment service based account binding method and payment method
CN102647279B (en) Encryption method, encrypted card, terminal equipment and interlocking of phone and card device
CN102208923A (en) Application-type service management method of near filed communication intelligent card and system thereof
CN103903138A (en) Payment method, terminal, platform and system
CN104636916A (en) Mobile payment method and system and related equipment
CN102857913B (en) Method and device for authenticating in safety channel establishing process as well as intelligent card and terminal
CN102325319A (en) Method and system for wireless connection between mobile phone and computer
CN1786864A (en) Method for safety identification of computer
CN104539616A (en) System for achieving credible message storage and switching among heterogeneous systems
CN103870958B (en) A kind of method of mobile payment and mobile payment special equipment
CN102158856A (en) Mobile terminal identification code authentication system and method, server and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140604

Termination date: 20171216