CN106203127B - A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read - Google Patents
A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read Download PDFInfo
- Publication number
- CN106203127B CN106203127B CN201510217015.8A CN201510217015A CN106203127B CN 106203127 B CN106203127 B CN 106203127B CN 201510217015 A CN201510217015 A CN 201510217015A CN 106203127 B CN106203127 B CN 106203127B
- Authority
- CN
- China
- Prior art keywords
- data
- storage area
- mirror site
- data storage
- reading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephone Function (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of methods and mobile phone card for realizing that M1 application data general-purposeization is read.This method comprises: the MIRROR SITE of the building data storage area M1 and the data storage area M1, and the corresponding relationship of the data storage area and the MIRROR SITE corresponding position is set;In response to reading the request using data saved in the data storage area, according to the corresponding relationship, read from the corresponding position of the MIRROR SITE described using data.Due to the application data of the not practical data storage area M1 of access, but the application data for knowing data storage area indirectly using data by reading MIRROR SITE solve versatility and data safety issue without knowing private cipher key in advance.
Description
Technical field
The present invention relates to mobile communication field more particularly to a kind of methods and hand for realizing that M1 application data general-purposeization is read
Machine card.
Background technique
Mifare one card (hereinafter referred to as M1 card) is a kind of contact type intelligent card, be widely used in building, cell and
School-run enterprise's intelligence " all-purpose card " management, can the application such as integrated gate inhibition's account, dining room mess card (stored value card) in card;All-purpose card system
System includes the work card/mess card (also known as Mifare1 card/M1 card) managed in platform, the POS machine and each employee's hand checked card.
When card system opens card, initial key is changed to private cipher key, to ensure all-purpose card application Information Security;The key is grasped
Each school-run enterprise, building card system integrator hand in, the key of usual individual system is different.
For example, card system integrator purchases a collection of blank card, the employee's essential information and wallet of certain school-run enterprise is written
Information (is supplemented with money), and employee is issued.It, be to inquiring in the POS machine of dining room if employee wants how many money in mess card inquired.It was opening
Cheng Zhong, the area blank card M1 key can be changed to the private cipher key of our unit by card system, to ensure data safety.That is, this
The card of unit can only be read by the POS machine of our unit, can not be identified in the POS machine of other unit.
The space M1 (initial key is complete " F ", 6 bytes) can be reserved in mobile phone SIM/UIM card, answered for card system write-in
With data, the function of M1 card is integrated into come, the direct brush mobile phone of employee enters, Eatery Consumption etc..It is writeable in mobile phone card fabrication
Enter program, so that user passes through STK/UTK menu (menu towards preset application in card) inquiry all-purpose card wallet balances, transaction
Record etc.;The remaining sum of all-purpose card wallet is inquired by mobile phone menu and transaction record is to facilitate that user, to fully demonstrate mobile phone card excellent
The way of gesture.But before fabrication, need first to know the private cipher key of card system, and write in editmenu, card could opened
The data in the space M1 are correctly read afterwards.
However, the STK/UTK menu of mobile phone is that card vendor is just ready-made before factory, and it is some that private cipher key, which is in school-run enterprise,
It is changed when employee Kai Ka.Card vendor can not know its private cipher key in fabrication, if requiring card system integrator public
Its private cipher key is opened, hidden danger can be brought to Information Security.If customizing a batch card for some school-run enterprise, arrange in advance privately owned close
Key, for mobile communication carrier, a collection of school-run enterprise/building user of every development just customizes a collection of card, and this way is numerous
Trivial, at high cost and difficult management, feasibility are poor.
Summary of the invention
The technical problem to be solved by the present invention is to the private cipher keys without knowing the data storage area M1 in advance, so that it may read
The application data of the data storage area M1.
According to an aspect of the present invention, a kind of method realizing M1 application data general-purposeization and reading is proposed, comprising:
The MIRROR SITE of the data storage area M1 and the data storage area M1 is constructed, and the data storage area and described is set
The corresponding relationship of MIRROR SITE corresponding position;
In response to reading the request using data saved in the data storage area, according to the corresponding relationship, from institute
The corresponding position reading for stating MIRROR SITE is described using data.
Further, storage institute is found according to the modification content in the data modification request in response to data modification request
The corresponding position of the data storage area of content and the corresponding position of the MIRROR SITE are stated, and in the data storage area
Corresponding position and the corresponding position of the MIRROR SITE carry out content modification.
Further, access control right is set in the MIRROR SITE, judges whether the requesting party of reading application data has
Access control right, if it is, reading described using data.
Further, static password is set in the MIRROR SITE and/or dynamic password is recognized when the password inputted is correct
For with access control right.
Further, the application data include remaining sum and/or consumer record.
According to another aspect of the present invention, it is also proposed that a kind of mobile phone card, comprising:
For constructing the MIRROR SITE of the data storage area M1 and the data storage area M1, and the data are arranged in construction unit
The corresponding relationship of memory block and the MIRROR SITE corresponding position;
Response unit, for the request using data in response to being saved in the reading data storage area, according to described
Corresponding relationship is read described using data from the corresponding position of the MIRROR SITE.
Further, the response unit is in response to data modification request, according in the modification in the data modification request
Hold, finds the corresponding position of the corresponding position and the MIRROR SITE that store the data storage area of the content, and in institute
The corresponding position of the corresponding position and the MIRROR SITE of stating data storage area carries out content modification.
Further, access control right is arranged in the MIRROR SITE in the response unit, judges asking for reading application data
Whether the side of asking has access control right, if it is, reading described using data.
Further, static password is set in the MIRROR SITE and/or dynamic password is recognized when the password inputted is correct
For with access control right.
Further, the application data include remaining sum and/or consumer record.
The present invention constructs the MIRROR SITE of the data storage area M1, when the application data of the data storage area M1 to be read, root
According to the corresponding relationship of the data storage area M1 and the corresponding position of the MIRROR SITE of the data storage area M1, from the corresponding positions of the MIRROR SITE
Set reading application data.Due to the application data in the not actual data storage area of access, but by reading answering for MIRROR SITE
The application data for knowing data storage area indirectly with data, it is therefore not necessary to know private cipher key in advance, so that it may read M1 data
The application data of memory block.Protect the Information Security of the data storage area M1.Also, the existing data storage area M1 is not changed
Application data store and access control are not related to the transformation of card foundation structure and POS machine tool yet, and implementation cost is smaller, can push away
The mobile phone card for the load M1 application that the row whole city or the whole nation are passed through, avoids doing custom card according to the private cipher key of single school-run enterprise, building
Brought management and cost problem realize the versatility of mobile phone card.
By referring to the drawings to the detailed description of exemplary embodiment of the present invention, other feature of the invention and its
Advantage will become apparent.
Detailed description of the invention
The attached drawing for constituting part of specification describes the embodiment of the present invention, and is used for together with the description
Explain the principle of the present invention.
The present invention can be more clearly understood according to following detailed description referring to attached drawing, in which:
Fig. 1 is a kind of flow chart of the one embodiment for the method for realizing the reading of M1 application data general-purposeization of the present invention.
Fig. 2 is a kind of schematic diagram of one embodiment of mobile phone card of the present invention.
Specific embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should also be noted that unless in addition having
Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
The range of invention.
Simultaneously, it should be appreciated that for ease of description, the size of various pieces shown in attached drawing is not according to reality
Proportionate relationship draw.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the present invention
And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable
In the case of, the technology, method and apparatus should be considered as authorizing part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without
It is as limitation.Therefore, the other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment, and reference
Attached drawing, the present invention is described in more detail.
Fig. 1 is a kind of flow chart of the one embodiment for the method for realizing the reading of M1 application data general-purposeization of the present invention.Packet
Include following steps:
In step 110, the MIRROR SITE of the data storage area M1 and the data storage area M1 is constructed, and the data are set and are deposited
The corresponding relationship of storage area and the MIRROR SITE corresponding position.
Wherein, identical with the data storage area using data, application number mentioned here in MIRROR SITE write-in
According to the application data (for example, remaining sum and/or consumer record) for referring to, according to business demand, showing by mobile phone menu.According to
There are initial key field in the related specifications of card system, the data storage area, and initial key is 6 F.User is opening card
When, initial key is changed to private cipher key, to guarantee the safety using data of data storage area, but is not wrapped in MIRROR SITE
Containing cipher key field, therefore the application data using data indirectly getting data memory block of reading MIRROR SITE can be passed through.
The space M1 is distributed in mobile phone card, it is assumed that there is 0~sector of sector 15 in the space M1, totally 16 sectors, wherein sector
0~sector 7 is data storage area, and 8~sector of sector 15 is MIRROR SITE, it is assumed that the 3rd of the 3rd byte of sector 0 and sector 8
Byte is corresponding, that is, the content saved is identical, then the corresponding relationship of the 3rd byte of sector 0 and the 3rd byte of sector 8 is arranged,
Realize the corresponding relationship that the data storage area and the MIRROR SITE corresponding position are set.It is, only needing here
Corresponding relationship is set, what the content for not needing which byte preservation for limiting corresponding sector is, is saved
Content can be configured according to the actual situation.Assuming that the 3rd byte saved is remaining sum, then balance information is respectively written into
3rd byte of sector 0 and the 3rd byte of sector 8.It will be understood by those of skill in the art that the corresponding positions of the present embodiment
The corresponding relationship set is only intended to illustrate, and should not be construed limitation of the present invention, can be specifically arranged according to related specifications
Content corresponding to each field of each sector.
In step 120, in response to reading the request using data saved in the data storage area, according to the correspondence
Relationship is read described using data from the corresponding position of the MIRROR SITE.
When receive saved in data storage area to be read using data request when, according to the read requests, call
Reading data interface is arranged in MIRROR SITE, which opens to upper layer application, and the upper layer application can be mobile phone
STK/UTK menu determines that preservation is using data in corresponding MIRROR SITE using the position of data according to saving in data storage area
Corresponding position, and read this using data, to know the application data of data storage area stored value card, such as remaining sum indirectly
And transaction details.
In an alternative embodiment of the invention, this method further includes in response to data modification request, according to the data modification
Modification content in request finds the phase of the corresponding position and the MIRROR SITE that store the data storage area of the content
Position is answered, and carries out content modification in the corresponding position of the data storage area and the corresponding position of the MIRROR SITE.
The operation can execute after step 120, i.e., user carries out data modification after first reading original card information, or
It can execute before step 120, i.e., user first modifies data, then carries out reading data.Those skilled in the art should can
With understand, be only intended to here for example, can according to need execute the above embodiment of the present invention each step, should not manage
Solution is limitation of the present invention.
By taking Eatery Consumption as an example, when POS machine is swiped the card, then modification remaining sum operation is triggered, it is assumed that at the 3rd of sector 0
Byte and the 3rd byte of sector 8 save remaining sum, then are remaining sums according to what is modified, what determination to be modified is the 3rd of sector 0
3rd byte of a byte and sector 8 then executes remaining sum with the 3rd byte of sector 8 in the 3rd byte of sector 0 respectively and repairs
Change operation.It is, require no knowledge about specific write-in data storage area is what, it is only necessary to know the data storage area with
And the corresponding relationship of the MIRROR SITE corresponding position, it is mechanical to execute identical operation in the corresponding position of MIRROR SITE.
For example, remaining sum is 100 yuan before employee consumes, 5 yuan are consumed in POS machine, then in the wallet area of data storage area and mirror
As remaining sum is all revised as 95 yuan by the balance field in the wallet area in area, the purse transaction detail of data storage area and the friendship of MIRROR SITE
Easy detail all shows 5 yuan of deduction.
In this embodiment, the MIRROR SITE of the data storage area M1 is constructed, applies number when the data storage area M1 to be read
According to when, according to the corresponding relationship of the data storage area M1 and the corresponding position of the MIRROR SITE of the data storage area M1, from the MIRROR SITE
Corresponding position reading application data.Due to the application data in the not actual data storage area of access, but by reading mirror
As the application data for knowing data storage area indirectly using data in area, it is therefore not necessary to know private cipher key in advance, so that it may read
Take the application data of the data storage area M1.Protect the Information Security of the data storage area M1.Also, existing M1 data are not changed
The application data store and access control of memory block, be not related to yet card foundation structure and POS machine tool transformation, implement cost compared with
It is small, the mobile phone card of load M1 application to pass through in the whole city or the whole nation can be carried out, avoid being done according to the private cipher key of single school-run enterprise, building
Management and cost problem, realize the versatility of mobile phone card brought by custom card.
Another embodiment of the invention is arranged access control right in the MIRROR SITE, judges reading application data
Whether requesting party has access control right, if it is, reading described using data.
MIRROR SITE is different from actual data storage area, and MIRROR SITE itself is free of cipher key field, in order to ensure MIRROR SITE
It is not read arbitrarily by third party using data, access control can be set in the reading data interface (api interface) of the MIRROR SITE
Permission processed, for example, static password and/or dynamic password is arranged in MIRROR SITE, after requesting party inputs correct password, it is believed that tool
There is access control right.For example, a static password (such as 1111) is arranged in MIRROR SITE, the static password is by card manufacturer or fortune
It seeks quotient to grasp, only opens to affiliate, if affiliate (cell phone software developer) is in need, can be asked for operator
Password obtains the permission for reading MIRROR SITE.Alternatively, the form of dynamic password, dynamic password can be used in order to which confidentiality is higher
Calculation method opened to affiliate, to improve the safety of MIRROR SITE reading data, protection is not let out using data
Dew.
In this embodiment, static password and/or dynamic password are set in MIRROR SITE, when requesting party input is correct
After password, it is believed that there is access control right, further improve the safety for reading data, protection is using data not to not having
The third party of permission reveals.
Fig. 2 is a kind of schematic diagram of one embodiment of mobile phone card of the present invention.The mobile phone card includes construction unit 210 and rings
Answer unit 220, in which:
For constructing the MIRROR SITE of the data storage area M1 and the data storage area M1, and the number is arranged in construction unit 210
According to the corresponding relationship of memory block and the MIRROR SITE corresponding position.
Wherein, identical with the data storage area using data, application number mentioned here in MIRROR SITE write-in
According to the application data (for example, remaining sum and/or consumer record) for referring to, according to business demand, showing by mobile phone menu.According to
There are initial key field in the related specifications of card system, the data storage area, and initial key is 6 F.User is opening card
When, initial key is changed to private cipher key, to guarantee the safety using data of data storage area, but is not wrapped in MIRROR SITE
Containing cipher key field, therefore the application data using data indirectly getting data memory block of reading MIRROR SITE can be passed through.
The space M1 is distributed in mobile phone card, it is assumed that there is 0~sector of sector 15 in the space M1, totally 16 sectors, wherein sector
0~sector 7 is data storage area, and 8~sector of sector 15 is MIRROR SITE, it is assumed that the 3rd byte of sector 0 and the 3rd of sector 8
A byte is corresponding, that is, the content saved is identical, then the corresponding pass of the 3rd byte of sector 0 and the 3rd byte of sector 8 is arranged
System realizes the corresponding relationship that the data storage area and the MIRROR SITE corresponding position is arranged.It is, only needing here
Corresponding relationship is set, what the content for not needing which byte preservation for limiting corresponding sector is, is saved
Content can be configured according to the actual situation.Assuming that the 3rd byte saved is remaining sum, then balance information is write respectively
Enter the 3rd byte of sector 0 and the 3rd byte of sector 8.It will be understood by those of skill in the art that the present embodiment is corresponding
The corresponding relationship of position is only intended to illustrate, and should not be construed limitation of the present invention, can specifically be set according to related specifications
Set content corresponding to each field of each sector.
Response unit 220, for the request using data in response to being saved in the reading data storage area, according to institute
Corresponding relationship is stated, is read from the corresponding position of the MIRROR SITE described using data.
When receive saved in data storage area to be read using data request when, according to the read requests, call
Reading data interface is arranged in MIRROR SITE, which opens to upper layer application, and the upper layer application can be mobile phone
STK/UTK menu determines that preservation is using data in corresponding MIRROR SITE using the position of data according to saving in data storage area
Corresponding position, and read this using data, to know the application data of data storage area stored value card, such as remaining sum indirectly
And transaction details.
In an alternative embodiment of the invention, the response unit 220 is repaired in response to data modification request according to the data
Change the modification content in request, finds the corresponding position and the MIRROR SITE for storing the data storage area of the content
Corresponding position, and content modification is carried out in the corresponding position of the data storage area and the corresponding position of the MIRROR SITE.
By taking Eatery Consumption as an example, when POS machine is swiped the card, then modification remaining sum operation is triggered, it is assumed that at the 3rd of sector 0
Byte and the 3rd byte of sector 8 save remaining sum, then are remaining sums according to what is modified, what determination to be modified is the 3rd of sector 0
3rd byte of a byte and sector 8 then executes remaining sum with the 3rd byte of sector 8 in the 3rd byte of sector 0 respectively and repairs
Change operation.It is, require no knowledge about specific write-in data storage area is what, it is only necessary to know the data storage area with
And the corresponding relationship of the MIRROR SITE corresponding position, it is mechanical to execute identical operation in the corresponding position of MIRROR SITE.
For example, remaining sum is 100 yuan before employee consumes, 5 yuan are consumed in POS machine, then in the wallet area of data storage area and mirror
As remaining sum is all revised as 95 yuan by the balance field in the wallet area in area, the purse transaction detail of data storage area and the friendship of MIRROR SITE
Easy detail all shows 5 yuan of deduction.
In this embodiment, the MIRROR SITE of the data storage area M1 is constructed, applies number when the data storage area M1 to be read
According to when, according to the corresponding relationship of the data storage area M1 and the corresponding position of the MIRROR SITE of the data storage area M1, from the MIRROR SITE
Corresponding position reading application data.Due to the application data in the not actual data storage area of access, but by reading mirror
As the application data for knowing data storage area indirectly using data in area, it is therefore not necessary to know private cipher key in advance, so that it may read
Take the application data of the data storage area M1.Protect the Information Security of the data storage area M1.Also, existing M1 data are not changed
The application data store and access control of memory block, be not related to yet card foundation structure and POS machine tool transformation, implement cost compared with
It is small, the mobile phone card of load M1 application to pass through in the whole city or the whole nation can be carried out, avoid being done according to the private cipher key of single school-run enterprise, building
Management and cost problem, realize the versatility of mobile phone card brought by custom card.
Access control right, judgement is arranged in the MIRROR SITE in another embodiment of the invention, the response unit 220
Whether the requesting party of reading application data has access control right, if it is, reading described using data.
MIRROR SITE is different from actual data storage area, and MIRROR SITE itself is free of cipher key field, in order to ensure MIRROR SITE
It is not read arbitrarily by third party using data, access control can be set in the reading data interface (api interface) of the MIRROR SITE
Permission processed, for example, static password and/or dynamic password is arranged in MIRROR SITE, after requesting party inputs correct password, it is believed that tool
There is access control right.For example, a static password (such as 1111) is arranged in MIRROR SITE, the static password is by card manufacturer or fortune
It seeks quotient to grasp, only opens to affiliate, if affiliate (cell phone software developer) is in need, can be asked for operator
Password obtains the permission for reading MIRROR SITE.Alternatively, the form of dynamic password, dynamic password can be used in order to which confidentiality is higher
Calculation method opened to affiliate, to improve the safety of MIRROR SITE reading data, protection is not let out using data
Dew.
In this embodiment, static password and/or dynamic password are set in MIRROR SITE, when requesting party input is correct
Password after, it is believed that there is access control right, further improve the safety for reading data, protection is using data not to not having
The third party's leakage having permission.
Below by a specific embodiment, the present invention is described further.
In mobile phone card fabrication, the MIRROR SITE of the data storage area M1 and the data storage area M1 is constructed.
Wherein, the true data storage area M1 is as shown in the table, disappears including data corresponding to each Sector Name, enterprise
Fermi key and enterprise supplement key with money, and when fabrication, data corresponding to each sector can be 0 or for sky entirely, and enterprise's consumption is close
Key and enterprise, which supplement key with money, can be set to 6 F, after opening card, personal data be written by card system, and key is revised as
Private cipher key.
Sector Name | KA | KB | |
0 | Issue area | A0A1A2A3A4A5 | Enterprise supplements key with money |
1 | Wallet area | Enterprise consumes key | Enterprise supplements key with money |
2 | Purse transaction detail 1 | Enterprise consumes key | Enterprise supplements key with money |
3 | Purse transaction detail 2 | Enterprise consumes key | Enterprise supplements key with money |
4 | 。。。 | 。。。 | 。。。 |
The MIRROR SITE of the data storage area M1 is as shown in the table, including data corresponding to each Sector Name, does not wrap
Key is consumed containing enterprise and enterprise supplements key with money, and reading data interface (api interface) is set in MIRROR SITE.
Sector Name | |
0 | Issue area |
1 | Wallet area |
2 | Purse transaction detail 1 |
3 | Purse transaction detail 2 |
4 | 。。。 |
Enterprise consumes when opening card in the personal information of data storage area write-in employee, and by the enterprise of data storage area
Key and enterprise supplement the private cipher key that key etc. is changed to enterprise with money, to guarantee when supplementing with money or consuming, data storage area electronics
The safety of wallet.
The corresponding relationship of the data storage area and the MIRROR SITE corresponding position is set, for example, the of setting sector 0
The corresponding relationship of 3 bytes and the 3rd byte of sector 8.
According to the corresponding relationship, identical operation can be executed in data storage area and MIRROR SITE, for example, storing in data
The balance field in the wallet area in area is written 100 yuan, then the balance field in the wallet area of MIRROR SITE is equally written 100 yuan.It is eating
Hall consumption when, employee POS machine spend 5 yuan, then data storage area wallet area and MIRROR SITE wallet area balance field
95 yuan are all revised as, the purse transaction detail of data storage area and the transaction details of MIRROR SITE all show 5 yuan of deduction.
When mobile phone user inquires the remaining sum and transaction details of data storage area by mobile phone menu, according to corresponding relationship, lead to
Remaining sum and transaction details field that reading data interface reads MIRROR SITE are crossed, knows the remaining sum of data storage area stored value card indirectly
And transaction details.
Access control right is set in api interface, if user is mounted with other application software, application software in mobile phone
It needs to ask for static password and/or dynamic password to operator, obtains the permission for reading MIRROR SITE, then can just read mirror image
The information such as transaction record, the remaining sum in area.
When receiving the request for reading data storage area application data, judge whether with access control right, through sentencing
It is disconnected that there is permission, then according to corresponding relationship, the remaining sum and transaction details field of MIRROR SITE are read by reading data interface, indirectly
Know the remaining sum and transaction details of data storage area stored value card.
In the present invention, due to being provided with MIRROR SITE, the existing data storage area M1 application data store and access control are not changed
System, the transformation for not also being related to card foundation structure and POS machine tool have got through mobile phone dish in the case where not knowing privately owned password
List has the application software of access authority and the reading channel of the data storage area M1 electronic wallet application data, avoids all-purpose card
System integrator discloses the problem of private cipher key leads to Information Security, also, without customizing card for a certain school-run enterprise, can push away
The mobile phone card of the current load M1 application in the row whole city/whole nation, avoids doing management brought by custom card for single school-run enterprise, building
And cost problem.
So far, the present invention is described in detail.In order to avoid covering design of the invention, it is public that this field institute is not described
The some details known.Those skilled in the art as described above, completely it can be appreciated how implementing technology disclosed herein
Scheme.
Method and device of the invention may be achieved in many ways.For example, can by software, hardware, firmware or
Person's software, hardware, firmware any combination realize method and device of the invention.The step of for the method it is above-mentioned
Sequence is merely to be illustrated, and the step of method of the invention is not limited to sequence described in detail above, unless with other sides
Formula illustrates.In addition, in some embodiments, the present invention can be also embodied as recording program in the recording medium, these
Program includes for realizing machine readable instructions according to the method for the present invention.Thus, the present invention also covers storage for executing
The recording medium of program according to the method for the present invention.
Although some specific embodiments of the invention are described in detail by example, the skill of this field
Art personnel it should be understood that above example merely to being illustrated, the range being not intended to be limiting of the invention.The skill of this field
Art personnel are it should be understood that can without departing from the scope and spirit of the present invention modify to above embodiments.This hair
Bright range is defined by the following claims.
Claims (8)
1. a kind of method realizing contact type intelligent card M1 application data general-purposeization and reading, comprising:
The MIRROR SITE of the data storage area M1 and the data storage area M1 is constructed, and the data storage area and the mirror image are set
The corresponding relationship of area corresponding position, wherein do not include cipher key field in the MIRROR SITE;
The request using data saved in the data storage area is read in response to upper layer application, according to the request call institute
MIRROR SITE reading data interface is stated, and according to the corresponding relationship, reads the application number from the corresponding position of the MIRROR SITE
According to;
In response to data modification request, according to the modification content in the data modification request, the institute for storing the content is found
State the corresponding position of data storage area and the corresponding position of the MIRROR SITE, and the corresponding position of the data storage area with
And the corresponding position of the MIRROR SITE carries out content modification.
2. the method according to claim 1 realizing contact type intelligent card M1 application data general-purposeization and reading, comprising:
Access control right is set in the MIRROR SITE, judges whether the requesting party of reading application data has access control power
Limit, if it is, reading described using data.
3. the method according to claim 2 realizing contact type intelligent card M1 application data general-purposeization and reading, comprising:
Static password and/or dynamic password are set in the MIRROR SITE, when the password inputted is correct, it is believed that there is access control
Permission processed.
4. the method according to claim 1 realizing contact type intelligent card M1 application data general-purposeization and reading, comprising:
The application data include remaining sum and/or consumer record.
5. a kind of mobile phone card, comprising:
Construction unit for constructing the MIRROR SITE of the data storage area contact type intelligent card M1 and the data storage area M1, and is set
Set the corresponding relationship of the data storage area and the MIRROR SITE corresponding position, wherein do not include key in the MIRROR SITE
Field;
Response unit, for reading the request using data saved in the data storage area in response to upper layer application, according to
MIRROR SITE reading data interface described in the request call, and according to the corresponding relationship, from the corresponding position of the MIRROR SITE
It reads described using data;The response unit is in response to data modification request, according to the modification in the data modification request
Content, finds the corresponding position of the corresponding position and the MIRROR SITE that store the data storage area of the content, and
The corresponding position of the data storage area and the corresponding position of the MIRROR SITE carry out content modification.
6. mobile phone card according to claim 5, comprising:
Access control right is arranged in the MIRROR SITE in the response unit, judges whether the requesting party of reading application data has
Access control right, if it is, reading described using data.
7. mobile phone card according to claim 6, comprising:
Static password and/or dynamic password are set in the MIRROR SITE, when the password inputted is correct, it is believed that there is access control
Permission processed.
8. mobile phone card according to claim 5, comprising:
The application data include remaining sum and/or consumer record.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510217015.8A CN106203127B (en) | 2015-04-30 | 2015-04-30 | A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510217015.8A CN106203127B (en) | 2015-04-30 | 2015-04-30 | A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106203127A CN106203127A (en) | 2016-12-07 |
CN106203127B true CN106203127B (en) | 2019-07-16 |
Family
ID=57458285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510217015.8A Active CN106203127B (en) | 2015-04-30 | 2015-04-30 | A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106203127B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599724B (en) * | 2016-12-20 | 2020-08-21 | 北京握奇智能科技有限公司 | Method and system for accessing sector data of smart card |
CN108319432A (en) * | 2018-01-23 | 2018-07-24 | 维沃移动通信有限公司 | A kind of application operation method and terminal |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544114A (en) * | 2013-10-12 | 2014-01-29 | 上海柯斯软件有限公司 | Multiple M1 card control system based on single CPU card and control method thereof |
CN103778530A (en) * | 2012-10-22 | 2014-05-07 | 中国移动通信集团安徽有限公司 | Industry application account over-the-air transferring method, system and apparatus |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136081A (en) * | 2011-03-24 | 2011-07-27 | 北京握奇数据系统有限公司 | Integrated circuit (IC) card and data updating method thereof |
EP2819078A1 (en) * | 2013-06-27 | 2014-12-31 | Gemalto SA | Method, device and system for accessing a contact-less service |
-
2015
- 2015-04-30 CN CN201510217015.8A patent/CN106203127B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103778530A (en) * | 2012-10-22 | 2014-05-07 | 中国移动通信集团安徽有限公司 | Industry application account over-the-air transferring method, system and apparatus |
CN103544114A (en) * | 2013-10-12 | 2014-01-29 | 上海柯斯软件有限公司 | Multiple M1 card control system based on single CPU card and control method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN106203127A (en) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105912272B (en) | A kind of device and method for the operation controlling multiple security application softwares | |
CN104836715B (en) | Run on the mobile apparatus it is multiple using data sharing method and apparatus | |
KR102218693B1 (en) | Method for processing multiple sim information and an electronic device thereof | |
CN103702319B (en) | SIM (subscriber identity module) card, individualized card writing system and method as well as SIM card obtained according to method | |
CN103973444B (en) | Security token and service access system | |
US20160103716A1 (en) | Method for using shared device in apparatus capable of operating two operating systems | |
CN110048846A (en) | A kind of signature verification method and system based on block chain intelligence contract | |
CN102883047A (en) | Method and system for realizing data security of intelligent mobile terminals | |
CN103544114B (en) | Based on many M1 card control system and the control method thereof of single CPU card | |
CN102063431B (en) | Information database system and method for controlling systematic access of information database | |
WO2018121366A1 (en) | Tee-based offline payment method, payment system thereof and mobile terminal | |
CN106203127B (en) | A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read | |
CN102722813A (en) | Hierarchical multiple electronic currency device and multiple electronic currency management method | |
CN110046991A (en) | A kind of data processing method and system based on block chain intelligence contract | |
CN109151151A (en) | Realize the method and device of the user mode switching of terminal | |
CN102999839A (en) | Cloud platform and virtual SE (security element) based electronic currency security payment system and cloud platform and virtual SE based electronic currency security payment method | |
CN104820803B (en) | Data sharing method between enterprise mobile application | |
CN105354508B (en) | A kind of mobile terminal safety control method and device | |
CN110100411A (en) | Cryptographic system management | |
CN106295267B (en) | It is a kind of access electronic equipment physical memory in private data method and apparatus | |
CN107038073A (en) | Method for processing resource and device | |
CN103699853B (en) | A kind of intelligent SD card and control system thereof and method | |
TWI615783B (en) | Point-of-sale terminal mode switching method and device | |
WO2021056767A1 (en) | Information processing method, mobile terminal and computer storage medium | |
CN104348951B (en) | A kind of card AMS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |