CN101751212B - Method and system for interlocking UI and data card - Google Patents
Method and system for interlocking UI and data card Download PDFInfo
- Publication number
- CN101751212B CN101751212B CN200910188959.1A CN200910188959A CN101751212B CN 101751212 B CN101751212 B CN 101751212B CN 200910188959 A CN200910188959 A CN 200910188959A CN 101751212 B CN101751212 B CN 101751212B
- Authority
- CN
- China
- Prior art keywords
- data card
- random number
- encrypted result
- encrypted
- judges
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The invention relates to a method and a system for interlocking a UI and a data card. The UI generates a random number and transmits the random number to the data card after the random number is encrypted. The data card encrypts the random number to obtain an encrypted result which is transmitted to the UI. The UI judges whether the encrypted result is the same as the encrypted result of the UI. If the encrypted result is the same as the encrypted result of the UI, the UI is allowed to be used. The data card generates a random number and transmits the random number to the UI after the random number is encrypted. The UI encrypts the random number to obtain an encrypted result which is transmitted to the data card. The data card judges whether the encrypted result is the same as the encrypted result of the data card. If the encrypted result is the same as the encrypted result of the data card, the data card is allowed to be used. The data card and the UI conduct regular mutual encryption checks to ensure that the UI corresponds to the Data card one by one and to realize interlocking. The interlocking encryption algorithm and the interval of checks can be rectified according to the practical need, so the practicability and the confidentiality are greatly improved and the differentiated needs for all kinds of customization are satisfied.
Description
Technical field
The present invention relates to communication technical field, more specifically, relate to a kind of UI (User Interface, user interface) and the data card method and system of locking mutually.
Background technology
Data card is a kind of important mobile terminal device, more and more extensive in the application of present stage.User interface software is that data card and user carry out mutual PC side software, the related service of data card, such as phone directory, online, note, telephone service etc. are all by UI and user interactions, then UI is undertaken alternately, realizing these business by data card by the AT instruction of standard and the AT instruction and data card of some data cards expansion.Wherein AT order is the interface command between data terminal equipment and data communications equipment.In the implementation of data card, UI is accounting for very important effect.
For the better characteristic of displaying format customization operator, many customizations operator has proposed a series of customization requirement to the UI of data card, the advertising business that even requires to show operator on UI having.
But UI and data card are generally to complete by the AT instruction of standard alternately, so just there will be such certain situation:
1, user uses certain categorical data card of carrier customization, but has used unmatched UI with it, and the AT instruction of the standard of use, and data card can not normally use, operator's some characteristic service on customization UI, and for example advertising business, also cannot embody.
2, user does not use the data card of carrier customization, has but used the UI of the data card of customization, because non-customized data card is not supported upper some the corresponding business of UI, makes user that the related service providing on the UI of customization cannot be provided.
Summary of the invention
The object of the invention is to carry out the mutual of regular mutual cryptographic check after the normal work of data card and UI, verify the other side's correctness, guarantee the correspondence one by one of UI and data card, realize locking mutually.
For achieving the above object, the technical scheme that the present invention takes is as follows:
The invention provides a kind of UI and the data card system of locking mutually, comprise UI and data card, described UI produces a random number and encrypts this random number and obtains, after encrypted result, random number is sent to data card by AT instruction, data card side software obtains encrypted result to random number encryption and sends to UI by AT instruction, UI judges that whether the encrypted result of this encrypted result and UI is identical, if the same UI judges that UI is the UI corresponding with data card side software, allows to use this UI; Data card produces a random number and encrypts this random number and obtains by AT instruction, random number being sent to UI after encrypted result, UI obtains encrypted result and sends to data card side software by AT instruction this random number encryption, data card judges that whether the encrypted result of this encrypted result and data card is identical, what if the same data card judged data card use is the data card side software supporting with UI, allows to use this data card.
Further, said system also comprises: described data card comprises that data card side timing produces random number module, data card side and judges encrypted result and control module, data card side encrypted random number module.
Further, said system also comprises:
Described data card side timing produces random number module for regularly producing random number reports UI;
Described data card side judges that whether encrypted result and control module be correct and forbid or allow the normal usage data card of user according to judged result for the encrypted result that judges UI and issue;
Described data card side encrypted random number module for the random number that data card side timing produced to random number module and produce at data card side is encrypted and data card side issues UI random number encryption and result is returned to UI.
Further, said system also comprises: described UI comprises that UI side timing produces random number module, UI side and judges encrypted result and control module, UI side encrypted random number module.
Further, said system also comprises:
Described UI side timing produces random number module for regularly producing random number is handed down to data card;
Described UI side judges that whether encrypted result and control module be correct and forbid or allow user normally to use UI according to judged result for the encrypted result that judges data card and send;
Described UI side encrypted random number module for the random number that UI side timing produced to random number module and produce at UI side is encrypted and UI side reports data card random number encryption and result is returned to data card.
The present invention also provides a kind of UI and the data card method of locking mutually, UI produces a random number and encrypts this random number and obtains, after encrypted result, random number is sent to data card by AT instruction, data card side software obtains encrypted result to random number encryption and sends to UI by AT instruction, UI judges that whether the encrypted result of this encrypted result and UI is identical, if the same UI judges that UI is the UI corresponding with data card side software, allows to use this UI; Data card produces a random number and encrypts this random number and obtains, after encrypted result, random number is sent to UI by AT instruction, UI obtains encrypted result and sends to data card side software by AT instruction this random number encryption, data card judges that whether the encrypted result of this encrypted result and data card is identical, what if the same data card judged data card use is the data card side software supporting with UI, allows to use this data card.
Further, said method also comprises: described data card has a timer, and above-mentioned encrypted result judges within the scope of timer time carries out.
Further, said method also comprises: described UI has a timer, and above-mentioned encrypted result judges within the scope of timer time carries out.
Further, said method also comprises: described data card and UI timing verification work once on starting immediately after a verification finishes in the time of normal work.
To sum up, data card of the present invention and UI carry out the mutual of regular mutual cryptographic check, verify the other side's correctness, guarantee the correspondence one by one of UI and data card, realize binding mutually.UI version and data card software version correspondence one by one, in the time that UI version and data card software version do not mate, UI or data card cannot normally use, and have met operator and realize UI version and data card software version and bind to realize the demand of its particular service.Meanwhile, the cryptographic algorithm of binding and the time interval of verification can modify according to actual needs mutually, have greatly strengthened practicality and confidentiality, can be used for having met the differentiated demand of various customizations.
Accompanying drawing explanation
Fig. 1 is embodiment of the present invention software module schematic diagram;
Fig. 2 is embodiment of the present invention data card side schematic flow sheet after powering on;
Fig. 3 is that embodiment of the present invention UI side and data card side start mutual rear schematic flow sheet.
Embodiment
Data card of the present invention proceeds to normal mode of operation after powering on, produce a first timer, generate first random number and use the first cryptographic algorithm to produce the first encrypted result to this first random number as cryptographic calculation, notifying UI by the first random number producing by the mode of AT instruction active reporting.
UI encrypts by the first same cryptographic algorithm the first random number obtaining receiving after the first random number that data card reports in described first timer time range, produce the second encrypted result, and this second encrypted result is returned to data card software by AT instruction, data card judges that whether this second encrypted result is identical with the first encrypted result, if identical, data card judges that UI is the UI corresponding with data card software, data card side is normally worked, otherwise data card side enters non-normal working pattern.
UI proceeds to normal mode of operation in the time starting and data card is mutual, produce a second timer, generate second random number, and use the second cryptographic algorithm to make cryptographic calculation generation the 3rd encrypted result to this second random number, the second random number producing is passed through to the mode notification data card side software of AT instruction.
Data card side software encrypts by the second same cryptographic algorithm the second random number obtaining receiving after the second random number in second timer time range, produce the 4th encrypted result, and the 4th encrypted result is returned to UI by AT instruction, UI judges that whether the 3rd encrypted result is identical with the 4th encrypted result, if identical, UI judges that data card is the data card side software supporting with UI, and UI normally works, otherwise UI enters non-normal working pattern.
The timing of first and second cryptographic algorithm and first and second timer can change according to the needs of UI and data card provider, meets the needs of differentiation.
Data card and UI timing verification work once on starting immediately after a verification finishes in the time of normal work, guarantees UI and data card periodic check like this.
Data card and UI carry out the mutual of regular mutual cryptographic check, verify the other side's correctness, guarantee the correspondence one by one of UI and data card, realize binding mutually.And the cryptographic algorithm of mutually binding and the time interval of verification can modify according to actual needs, greatly strengthened practicality and confidentiality, can be used for having met the differentiated demand of various customizations.
UI version and data card software version Corresponding matching, in the time that UI version and data card software version do not mate, UI or data card cannot normally use, and have met operator and realize UI version and data card software version and bind to realize the demand of its particular service.Meanwhile, the cryptographic algorithm of binding and the time interval of verification can modify according to actual needs mutually, have greatly strengthened practicality and confidentiality, can be used for having met the differentiated demand of various customizations.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in detail.
Fig. 1 is embodiment of the present invention software module schematic diagram, and it mainly comprises:
The timing of data card side produces random number module S101, produces random number report UI for timing;
Data card side judges encrypted result and control module S102, for judging that whether encrypted result that UI issues is correct and forbidding or allow the normal usage data card of user according to judged result;
Data card side encrypted random number module S103, for producing random number that random number module S101 produces at data card side is encrypted and data card side issues UI random number encryption and result being returned to UI to data card side timing;
The timing of UI side produces random number module S104, produces random number be handed down to data card for timing;
UI side judges encrypted result and control module S105, for judging that encrypted result that data card sends is whether correct and forbid or allow user normally to use UI according to judged result;
UI side encrypted random number module S106, for producing random number that random number module S104 produces at UI side is encrypted and UI side reports data card random number encryption and result being returned to data card to UI side timing.
As Fig. 2 embodiment of the present invention data card side schematic flow sheet after powering on, idiographic flow is as follows:
Step S201: data card proceeds to normal mode of operation after powering on, produces random number and adopts cryptographic algorithm to obtain encrypted result;
Step S202: data card by the random number of generation by AT order active reporting mode to UI and start timer;
Step S203: if UI is handed down to the result of data card random number encryption within the scope of timer time, enter step S204, otherwise enter step S206;
Step S204: data card judges that whether the encrypted result that UI issues is correct, if correctly enter step 205, otherwise enters step S206;
Step S205: data card judges that UI is now and the UI of its binding, allows user to carry out normal running, and proceed to step S201 and start verifying work next time;
Step S206: data card judges that now UI is not and the UI of its binding, forbids that user carries out normal running.
If Fig. 3 is that embodiment of the present invention UI side and data card side start mutual rear schematic flow sheet, idiographic flow is as follows:
Step S301:UI proceeds to normal mode of operation after starting alternately with data card side, produces random number and also adopts cryptographic algorithm to obtain encrypted result.
Step S302:UI is handed down to the random number of generation data card and is started timer by AT order.
Step S303: if data card reports the result of UI encrypted random number within the scope of timer time, enter step S304, otherwise enter step S306.
Step S304:UI judges that data card reports the result of encryption whether correct, if correctly enter step 305, otherwise enters step S306.
Step S305:UI judges that data card is now and the data card of its binding, allows user to carry out other normal runnings, and proceeds to step S301 and start verifying work next time.
Step S306:UI judges that now data card is not and the data card of its binding, forbids that user carries out other normal runnings.
The data card the present invention relates to and UI carry out the mutual of regular mutual cryptographic check, verify the other side's correctness, guarantee the correspondence one by one of UI and data card, realize binding mutually.And the cryptographic algorithm of mutually binding and the time interval of verification can modify according to actual needs, greatly strengthened practicality and confidentiality, can be used for having met the differentiated demand of various customizations.
Certainly; the present invention also can have numerous embodiments; in the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art are when making according to the present invention various corresponding changes or variation; in every case any modification of doing within the spirit and principles in the present invention, be equal to replacements, improvement, within protection scope of the present invention all should be included in.
Claims (6)
1. a UI and data card system for locking mutually, comprises UI and data card,
Described UI produces a random number and encrypts this random number and obtains, after encrypted result, random number is sent to data card by AT instruction, data card side software obtains encrypted result to random number encryption and sends to UI by AT instruction, UI judges that whether the encrypted result of this encrypted result and UI is identical, if the same UI judges that UI is the UI corresponding with data card side software, allows to use this UI;
Described data card proceeds to normal mode of operation after powering on, produce a first timer, generate first random number and use the first cryptographic algorithm to produce the first encrypted result to this first random number as cryptographic calculation, and by AT instruction, the first random number being sent to UI;
Described UI obtains the second encrypted result by the first cryptographic algorithm to the first random number encryption receiving after the first random number that data card reports in described first timer time range, and by AT instruction, this second encrypted result is sent to data card side software, data card judges that whether this second encrypted result is identical with the first encrypted result, what if the same data card judged data card use is the data card side software supporting with UI, allows to use this data card; Otherwise data card side enters non-normal working pattern;
Described UI proceeds to normal mode of operation in the time starting and data card is mutual, produce a second timer, generate second random number, and use the second cryptographic algorithm to make cryptographic calculation generation the 3rd encrypted result to this second random number, the second random number producing is passed through to the mode notification data card side software of AT instruction;
Data card side software encrypts by the second cryptographic algorithm the second random number obtaining receiving after the second random number in second timer time range, produce the 4th encrypted result, and the 4th encrypted result is returned to UI by AT instruction, UI judges that whether the 3rd encrypted result is identical with the 4th encrypted result, if identical, UI judges that data card is the data card side software supporting with UI, and UI normally works, otherwise UI enters non-normal working pattern;
Described data card and UI timing verification work once on starting immediately after a verification finishes in the time of normal work.
2. the system as claimed in claim 1, is characterized in that: described data card comprises that data card side timing produces random number module, data card side and judges encrypted result and control module, data card side encrypted random number module.
3. system as claimed in claim 2, is characterized in that:
Described data card side timing produces random number module for regularly producing random number reports UI;
Described data card side judges that whether encrypted result and control module be correct and forbid or allow the normal usage data card of user according to judged result for the encrypted result that judges UI and issue;
Described data card side encrypted random number module for the random number that data card side timing produced to random number module and produce at data card side is encrypted and data card side issues UI random number encryption and result is returned to UI.
4. the system as claimed in claim 1, is characterized in that: described UI comprises that UI side timing produces random number module, UI side and judges encrypted result and control module, UI side encrypted random number module.
5. system as claimed in claim 4, is characterized in that:
Described UI side timing produces random number module for regularly producing random number is handed down to data card;
Described UI side judges that whether encrypted result and control module be correct and forbid or allow user normally to use UI according to judged result for the encrypted result that judges data card and send;
Described UI side encrypted random number module for the random number that UI side timing produced to random number module and produce at UI side is encrypted and UI side reports data card random number encryption and result is returned to data card.
6. a UI and data card method for locking mutually, is characterized in that, comprises the following steps:
Step S201: data card proceeds to normal mode of operation after powering on, produces random number and adopts cryptographic algorithm to obtain encrypted result;
Step S202: data card by the random number of generation by AT order active reporting mode to UI and start timer;
Step S203: if UI is handed down to the result of data card random number encryption within the scope of timer time, enter step S204, otherwise enter step S206;
Step S204: data card judges that whether the encrypted result that UI issues is correct, if correctly enter step 205, otherwise enters step S206;
Step S205: data card judges that UI is now and the UI of its binding, allows user to carry out normal running, and proceed to step S201 and start verifying work next time;
Step S206: data card judges that now UI is not and the UI of its binding, forbids that user carries out normal running;
Step S301:UI proceeds to normal mode of operation after starting alternately with data card side, produces random number and also adopts cryptographic algorithm to obtain encrypted result;
Step S302:UI is handed down to the random number of generation data card and is started timer by AT order;
Step S303: if data card reports the result of UI encrypted random number within the scope of timer time, enter step S304, otherwise enter step S306;
Step S304:UI judges that data card reports the result of encryption whether correct, if correctly enter step 305, otherwise enters step S306;
Step S305:UI judges that data card is now and the data card of its binding, allows user to carry out other normal runnings, and proceeds to step S301 and start verifying work next time;
Step S306:UI judges that now data card is not and the data card of its binding, forbids that user carries out other normal runnings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910188959.1A CN101751212B (en) | 2009-12-16 | 2009-12-16 | Method and system for interlocking UI and data card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910188959.1A CN101751212B (en) | 2009-12-16 | 2009-12-16 | Method and system for interlocking UI and data card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101751212A CN101751212A (en) | 2010-06-23 |
CN101751212B true CN101751212B (en) | 2014-06-04 |
Family
ID=42478247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910188959.1A Expired - Fee Related CN101751212B (en) | 2009-12-16 | 2009-12-16 | Method and system for interlocking UI and data card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101751212B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101958969B (en) * | 2010-07-28 | 2014-02-05 | 中兴通讯股份有限公司 | Wireless communication terminal and method thereof for binding with user interface (UI) |
CN105592435A (en) * | 2014-10-21 | 2016-05-18 | 中兴通讯股份有限公司 | User interface (UI) loading method, device and related equipment |
CN106507333A (en) * | 2015-09-07 | 2017-03-15 | 中兴通讯股份有限公司 | A kind of interlocking of phone and card method and device |
CN107567012A (en) * | 2017-09-26 | 2018-01-09 | 深圳普创天信科技发展有限公司 | A kind of production of soft SIM card, use, processing method and processing device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801700A (en) * | 1997-05-20 | 2006-07-12 | 安尼株式会社 | Encryption communication system for generating passwords on the basis of start information on both parties of communication |
CN1829365A (en) * | 2006-03-28 | 2006-09-06 | 江苏移动通信有限责任公司 | User recognition module and method capable of realizing mobile terminal area locking |
CN101090316A (en) * | 2006-06-16 | 2007-12-19 | 普天信息技术研究院 | Identify authorization method between storage card and terminal equipment at off-line state |
CN101155212A (en) * | 2006-09-30 | 2008-04-02 | 中兴通讯股份有限公司 | Method for limiting use of mobile terminal |
CN101163290A (en) * | 2006-10-09 | 2008-04-16 | 中兴通讯股份有限公司 | Method of limiting use of mobile terminal through machine-card mutual authentication |
-
2009
- 2009-12-16 CN CN200910188959.1A patent/CN101751212B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801700A (en) * | 1997-05-20 | 2006-07-12 | 安尼株式会社 | Encryption communication system for generating passwords on the basis of start information on both parties of communication |
CN1829365A (en) * | 2006-03-28 | 2006-09-06 | 江苏移动通信有限责任公司 | User recognition module and method capable of realizing mobile terminal area locking |
CN101090316A (en) * | 2006-06-16 | 2007-12-19 | 普天信息技术研究院 | Identify authorization method between storage card and terminal equipment at off-line state |
CN101155212A (en) * | 2006-09-30 | 2008-04-02 | 中兴通讯股份有限公司 | Method for limiting use of mobile terminal |
CN101163290A (en) * | 2006-10-09 | 2008-04-16 | 中兴通讯股份有限公司 | Method of limiting use of mobile terminal through machine-card mutual authentication |
Also Published As
Publication number | Publication date |
---|---|
CN101751212A (en) | 2010-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101662465B (en) | Method and device for verifying dynamic password | |
CN102469453B (en) | Security certificate method | |
CN106453330A (en) | Identity authentication method and system | |
CN103078742B (en) | Generation method and system of digital certificate | |
CN102426715A (en) | Unlocking method for electronic door lock, electronic door lock and electronic door lock system | |
CN105553932A (en) | Method, device and system of remote control safety binding of intelligent home appliance | |
CN105005884A (en) | Express item sign-off method, system, server and handheld terminal | |
CN102056077B (en) | Method and device for applying smart card by key | |
CN102420902A (en) | Method for classification management over right of using functions and mobile terminal | |
CN101415182B (en) | Method, system and apparatus for protecting terminal data | |
CN101751212B (en) | Method and system for interlocking UI and data card | |
CN108256909A (en) | A kind of integrating system and method based on block chain | |
CN105516103A (en) | Method, device and system for binding intelligent household electrical appliances | |
CN102789607A (en) | Network transaction method and system | |
CN102332127A (en) | Network TV (television) online payment service based account binding method and payment method | |
CN102647279B (en) | Encryption method, encrypted card, terminal equipment and interlocking of phone and card device | |
CN102208923A (en) | Application-type service management method of near filed communication intelligent card and system thereof | |
CN103903138A (en) | Payment method, terminal, platform and system | |
CN104636916A (en) | Mobile payment method and system and related equipment | |
CN102857913B (en) | Method and device for authenticating in safety channel establishing process as well as intelligent card and terminal | |
CN102325319A (en) | Method and system for wireless connection between mobile phone and computer | |
CN1786864A (en) | Method for safety identification of computer | |
CN104539616A (en) | System for achieving credible message storage and switching among heterogeneous systems | |
CN103870958B (en) | A kind of method of mobile payment and mobile payment special equipment | |
CN102158856A (en) | Mobile terminal identification code authentication system and method, server and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20140604 Termination date: 20171216 |