CN106203127B - A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read - Google Patents

A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read Download PDF

Info

Publication number
CN106203127B
CN106203127B CN201510217015.8A CN201510217015A CN106203127B CN 106203127 B CN106203127 B CN 106203127B CN 201510217015 A CN201510217015 A CN 201510217015A CN 106203127 B CN106203127 B CN 106203127B
Authority
CN
China
Prior art keywords
data
storage area
mirror site
data storage
reading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510217015.8A
Other languages
Chinese (zh)
Other versions
CN106203127A (en
Inventor
黄莺
陈强
包巍
陈蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201510217015.8A priority Critical patent/CN106203127B/en
Publication of CN106203127A publication Critical patent/CN106203127A/en
Application granted granted Critical
Publication of CN106203127B publication Critical patent/CN106203127B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of methods and mobile phone card for realizing that M1 application data general-purposeization is read.This method comprises: the MIRROR SITE of the building data storage area M1 and the data storage area M1, and the corresponding relationship of the data storage area and the MIRROR SITE corresponding position is set;In response to reading the request using data saved in the data storage area, according to the corresponding relationship, read from the corresponding position of the MIRROR SITE described using data.Due to the application data of the not practical data storage area M1 of access, but the application data for knowing data storage area indirectly using data by reading MIRROR SITE solve versatility and data safety issue without knowing private cipher key in advance.

Description

A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read
Technical field
The present invention relates to mobile communication field more particularly to a kind of methods and hand for realizing that M1 application data general-purposeization is read Machine card.
Background technique
Mifare one card (hereinafter referred to as M1 card) is a kind of contact type intelligent card, be widely used in building, cell and School-run enterprise's intelligence " all-purpose card " management, can the application such as integrated gate inhibition's account, dining room mess card (stored value card) in card;All-purpose card system System includes the work card/mess card (also known as Mifare1 card/M1 card) managed in platform, the POS machine and each employee's hand checked card. When card system opens card, initial key is changed to private cipher key, to ensure all-purpose card application Information Security;The key is grasped Each school-run enterprise, building card system integrator hand in, the key of usual individual system is different.
For example, card system integrator purchases a collection of blank card, the employee's essential information and wallet of certain school-run enterprise is written Information (is supplemented with money), and employee is issued.It, be to inquiring in the POS machine of dining room if employee wants how many money in mess card inquired.It was opening Cheng Zhong, the area blank card M1 key can be changed to the private cipher key of our unit by card system, to ensure data safety.That is, this The card of unit can only be read by the POS machine of our unit, can not be identified in the POS machine of other unit.
The space M1 (initial key is complete " F ", 6 bytes) can be reserved in mobile phone SIM/UIM card, answered for card system write-in With data, the function of M1 card is integrated into come, the direct brush mobile phone of employee enters, Eatery Consumption etc..It is writeable in mobile phone card fabrication Enter program, so that user passes through STK/UTK menu (menu towards preset application in card) inquiry all-purpose card wallet balances, transaction Record etc.;The remaining sum of all-purpose card wallet is inquired by mobile phone menu and transaction record is to facilitate that user, to fully demonstrate mobile phone card excellent The way of gesture.But before fabrication, need first to know the private cipher key of card system, and write in editmenu, card could opened The data in the space M1 are correctly read afterwards.
However, the STK/UTK menu of mobile phone is that card vendor is just ready-made before factory, and it is some that private cipher key, which is in school-run enterprise, It is changed when employee Kai Ka.Card vendor can not know its private cipher key in fabrication, if requiring card system integrator public Its private cipher key is opened, hidden danger can be brought to Information Security.If customizing a batch card for some school-run enterprise, arrange in advance privately owned close Key, for mobile communication carrier, a collection of school-run enterprise/building user of every development just customizes a collection of card, and this way is numerous Trivial, at high cost and difficult management, feasibility are poor.
Summary of the invention
The technical problem to be solved by the present invention is to the private cipher keys without knowing the data storage area M1 in advance, so that it may read The application data of the data storage area M1.
According to an aspect of the present invention, a kind of method realizing M1 application data general-purposeization and reading is proposed, comprising:
The MIRROR SITE of the data storage area M1 and the data storage area M1 is constructed, and the data storage area and described is set The corresponding relationship of MIRROR SITE corresponding position;
In response to reading the request using data saved in the data storage area, according to the corresponding relationship, from institute The corresponding position reading for stating MIRROR SITE is described using data.
Further, storage institute is found according to the modification content in the data modification request in response to data modification request The corresponding position of the data storage area of content and the corresponding position of the MIRROR SITE are stated, and in the data storage area Corresponding position and the corresponding position of the MIRROR SITE carry out content modification.
Further, access control right is set in the MIRROR SITE, judges whether the requesting party of reading application data has Access control right, if it is, reading described using data.
Further, static password is set in the MIRROR SITE and/or dynamic password is recognized when the password inputted is correct For with access control right.
Further, the application data include remaining sum and/or consumer record.
According to another aspect of the present invention, it is also proposed that a kind of mobile phone card, comprising:
For constructing the MIRROR SITE of the data storage area M1 and the data storage area M1, and the data are arranged in construction unit The corresponding relationship of memory block and the MIRROR SITE corresponding position;
Response unit, for the request using data in response to being saved in the reading data storage area, according to described Corresponding relationship is read described using data from the corresponding position of the MIRROR SITE.
Further, the response unit is in response to data modification request, according in the modification in the data modification request Hold, finds the corresponding position of the corresponding position and the MIRROR SITE that store the data storage area of the content, and in institute The corresponding position of the corresponding position and the MIRROR SITE of stating data storage area carries out content modification.
Further, access control right is arranged in the MIRROR SITE in the response unit, judges asking for reading application data Whether the side of asking has access control right, if it is, reading described using data.
Further, static password is set in the MIRROR SITE and/or dynamic password is recognized when the password inputted is correct For with access control right.
Further, the application data include remaining sum and/or consumer record.
The present invention constructs the MIRROR SITE of the data storage area M1, when the application data of the data storage area M1 to be read, root According to the corresponding relationship of the data storage area M1 and the corresponding position of the MIRROR SITE of the data storage area M1, from the corresponding positions of the MIRROR SITE Set reading application data.Due to the application data in the not actual data storage area of access, but by reading answering for MIRROR SITE The application data for knowing data storage area indirectly with data, it is therefore not necessary to know private cipher key in advance, so that it may read M1 data The application data of memory block.Protect the Information Security of the data storage area M1.Also, the existing data storage area M1 is not changed Application data store and access control are not related to the transformation of card foundation structure and POS machine tool yet, and implementation cost is smaller, can push away The mobile phone card for the load M1 application that the row whole city or the whole nation are passed through, avoids doing custom card according to the private cipher key of single school-run enterprise, building Brought management and cost problem realize the versatility of mobile phone card.
By referring to the drawings to the detailed description of exemplary embodiment of the present invention, other feature of the invention and its Advantage will become apparent.
Detailed description of the invention
The attached drawing for constituting part of specification describes the embodiment of the present invention, and is used for together with the description Explain the principle of the present invention.
The present invention can be more clearly understood according to following detailed description referring to attached drawing, in which:
Fig. 1 is a kind of flow chart of the one embodiment for the method for realizing the reading of M1 application data general-purposeization of the present invention.
Fig. 2 is a kind of schematic diagram of one embodiment of mobile phone card of the present invention.
Specific embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should also be noted that unless in addition having Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally The range of invention.
Simultaneously, it should be appreciated that for ease of description, the size of various pieces shown in attached drawing is not according to reality Proportionate relationship draw.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the present invention And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as authorizing part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without It is as limitation.Therefore, the other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment, and reference Attached drawing, the present invention is described in more detail.
Fig. 1 is a kind of flow chart of the one embodiment for the method for realizing the reading of M1 application data general-purposeization of the present invention.Packet Include following steps:
In step 110, the MIRROR SITE of the data storage area M1 and the data storage area M1 is constructed, and the data are set and are deposited The corresponding relationship of storage area and the MIRROR SITE corresponding position.
Wherein, identical with the data storage area using data, application number mentioned here in MIRROR SITE write-in According to the application data (for example, remaining sum and/or consumer record) for referring to, according to business demand, showing by mobile phone menu.According to There are initial key field in the related specifications of card system, the data storage area, and initial key is 6 F.User is opening card When, initial key is changed to private cipher key, to guarantee the safety using data of data storage area, but is not wrapped in MIRROR SITE Containing cipher key field, therefore the application data using data indirectly getting data memory block of reading MIRROR SITE can be passed through.
The space M1 is distributed in mobile phone card, it is assumed that there is 0~sector of sector 15 in the space M1, totally 16 sectors, wherein sector 0~sector 7 is data storage area, and 8~sector of sector 15 is MIRROR SITE, it is assumed that the 3rd of the 3rd byte of sector 0 and sector 8 Byte is corresponding, that is, the content saved is identical, then the corresponding relationship of the 3rd byte of sector 0 and the 3rd byte of sector 8 is arranged, Realize the corresponding relationship that the data storage area and the MIRROR SITE corresponding position are set.It is, only needing here Corresponding relationship is set, what the content for not needing which byte preservation for limiting corresponding sector is, is saved Content can be configured according to the actual situation.Assuming that the 3rd byte saved is remaining sum, then balance information is respectively written into 3rd byte of sector 0 and the 3rd byte of sector 8.It will be understood by those of skill in the art that the corresponding positions of the present embodiment The corresponding relationship set is only intended to illustrate, and should not be construed limitation of the present invention, can be specifically arranged according to related specifications Content corresponding to each field of each sector.
In step 120, in response to reading the request using data saved in the data storage area, according to the correspondence Relationship is read described using data from the corresponding position of the MIRROR SITE.
When receive saved in data storage area to be read using data request when, according to the read requests, call Reading data interface is arranged in MIRROR SITE, which opens to upper layer application, and the upper layer application can be mobile phone STK/UTK menu determines that preservation is using data in corresponding MIRROR SITE using the position of data according to saving in data storage area Corresponding position, and read this using data, to know the application data of data storage area stored value card, such as remaining sum indirectly And transaction details.
In an alternative embodiment of the invention, this method further includes in response to data modification request, according to the data modification Modification content in request finds the phase of the corresponding position and the MIRROR SITE that store the data storage area of the content Position is answered, and carries out content modification in the corresponding position of the data storage area and the corresponding position of the MIRROR SITE.
The operation can execute after step 120, i.e., user carries out data modification after first reading original card information, or It can execute before step 120, i.e., user first modifies data, then carries out reading data.Those skilled in the art should can With understand, be only intended to here for example, can according to need execute the above embodiment of the present invention each step, should not manage Solution is limitation of the present invention.
By taking Eatery Consumption as an example, when POS machine is swiped the card, then modification remaining sum operation is triggered, it is assumed that at the 3rd of sector 0 Byte and the 3rd byte of sector 8 save remaining sum, then are remaining sums according to what is modified, what determination to be modified is the 3rd of sector 0 3rd byte of a byte and sector 8 then executes remaining sum with the 3rd byte of sector 8 in the 3rd byte of sector 0 respectively and repairs Change operation.It is, require no knowledge about specific write-in data storage area is what, it is only necessary to know the data storage area with And the corresponding relationship of the MIRROR SITE corresponding position, it is mechanical to execute identical operation in the corresponding position of MIRROR SITE.
For example, remaining sum is 100 yuan before employee consumes, 5 yuan are consumed in POS machine, then in the wallet area of data storage area and mirror As remaining sum is all revised as 95 yuan by the balance field in the wallet area in area, the purse transaction detail of data storage area and the friendship of MIRROR SITE Easy detail all shows 5 yuan of deduction.
In this embodiment, the MIRROR SITE of the data storage area M1 is constructed, applies number when the data storage area M1 to be read According to when, according to the corresponding relationship of the data storage area M1 and the corresponding position of the MIRROR SITE of the data storage area M1, from the MIRROR SITE Corresponding position reading application data.Due to the application data in the not actual data storage area of access, but by reading mirror As the application data for knowing data storage area indirectly using data in area, it is therefore not necessary to know private cipher key in advance, so that it may read Take the application data of the data storage area M1.Protect the Information Security of the data storage area M1.Also, existing M1 data are not changed The application data store and access control of memory block, be not related to yet card foundation structure and POS machine tool transformation, implement cost compared with It is small, the mobile phone card of load M1 application to pass through in the whole city or the whole nation can be carried out, avoid being done according to the private cipher key of single school-run enterprise, building Management and cost problem, realize the versatility of mobile phone card brought by custom card.
Another embodiment of the invention is arranged access control right in the MIRROR SITE, judges reading application data Whether requesting party has access control right, if it is, reading described using data.
MIRROR SITE is different from actual data storage area, and MIRROR SITE itself is free of cipher key field, in order to ensure MIRROR SITE It is not read arbitrarily by third party using data, access control can be set in the reading data interface (api interface) of the MIRROR SITE Permission processed, for example, static password and/or dynamic password is arranged in MIRROR SITE, after requesting party inputs correct password, it is believed that tool There is access control right.For example, a static password (such as 1111) is arranged in MIRROR SITE, the static password is by card manufacturer or fortune It seeks quotient to grasp, only opens to affiliate, if affiliate (cell phone software developer) is in need, can be asked for operator Password obtains the permission for reading MIRROR SITE.Alternatively, the form of dynamic password, dynamic password can be used in order to which confidentiality is higher Calculation method opened to affiliate, to improve the safety of MIRROR SITE reading data, protection is not let out using data Dew.
In this embodiment, static password and/or dynamic password are set in MIRROR SITE, when requesting party input is correct After password, it is believed that there is access control right, further improve the safety for reading data, protection is using data not to not having The third party of permission reveals.
Fig. 2 is a kind of schematic diagram of one embodiment of mobile phone card of the present invention.The mobile phone card includes construction unit 210 and rings Answer unit 220, in which:
For constructing the MIRROR SITE of the data storage area M1 and the data storage area M1, and the number is arranged in construction unit 210 According to the corresponding relationship of memory block and the MIRROR SITE corresponding position.
Wherein, identical with the data storage area using data, application number mentioned here in MIRROR SITE write-in According to the application data (for example, remaining sum and/or consumer record) for referring to, according to business demand, showing by mobile phone menu.According to There are initial key field in the related specifications of card system, the data storage area, and initial key is 6 F.User is opening card When, initial key is changed to private cipher key, to guarantee the safety using data of data storage area, but is not wrapped in MIRROR SITE Containing cipher key field, therefore the application data using data indirectly getting data memory block of reading MIRROR SITE can be passed through.
The space M1 is distributed in mobile phone card, it is assumed that there is 0~sector of sector 15 in the space M1, totally 16 sectors, wherein sector 0~sector 7 is data storage area, and 8~sector of sector 15 is MIRROR SITE, it is assumed that the 3rd byte of sector 0 and the 3rd of sector 8 A byte is corresponding, that is, the content saved is identical, then the corresponding pass of the 3rd byte of sector 0 and the 3rd byte of sector 8 is arranged System realizes the corresponding relationship that the data storage area and the MIRROR SITE corresponding position is arranged.It is, only needing here Corresponding relationship is set, what the content for not needing which byte preservation for limiting corresponding sector is, is saved Content can be configured according to the actual situation.Assuming that the 3rd byte saved is remaining sum, then balance information is write respectively Enter the 3rd byte of sector 0 and the 3rd byte of sector 8.It will be understood by those of skill in the art that the present embodiment is corresponding The corresponding relationship of position is only intended to illustrate, and should not be construed limitation of the present invention, can specifically be set according to related specifications Set content corresponding to each field of each sector.
Response unit 220, for the request using data in response to being saved in the reading data storage area, according to institute Corresponding relationship is stated, is read from the corresponding position of the MIRROR SITE described using data.
When receive saved in data storage area to be read using data request when, according to the read requests, call Reading data interface is arranged in MIRROR SITE, which opens to upper layer application, and the upper layer application can be mobile phone STK/UTK menu determines that preservation is using data in corresponding MIRROR SITE using the position of data according to saving in data storage area Corresponding position, and read this using data, to know the application data of data storage area stored value card, such as remaining sum indirectly And transaction details.
In an alternative embodiment of the invention, the response unit 220 is repaired in response to data modification request according to the data Change the modification content in request, finds the corresponding position and the MIRROR SITE for storing the data storage area of the content Corresponding position, and content modification is carried out in the corresponding position of the data storage area and the corresponding position of the MIRROR SITE.
By taking Eatery Consumption as an example, when POS machine is swiped the card, then modification remaining sum operation is triggered, it is assumed that at the 3rd of sector 0 Byte and the 3rd byte of sector 8 save remaining sum, then are remaining sums according to what is modified, what determination to be modified is the 3rd of sector 0 3rd byte of a byte and sector 8 then executes remaining sum with the 3rd byte of sector 8 in the 3rd byte of sector 0 respectively and repairs Change operation.It is, require no knowledge about specific write-in data storage area is what, it is only necessary to know the data storage area with And the corresponding relationship of the MIRROR SITE corresponding position, it is mechanical to execute identical operation in the corresponding position of MIRROR SITE.
For example, remaining sum is 100 yuan before employee consumes, 5 yuan are consumed in POS machine, then in the wallet area of data storage area and mirror As remaining sum is all revised as 95 yuan by the balance field in the wallet area in area, the purse transaction detail of data storage area and the friendship of MIRROR SITE Easy detail all shows 5 yuan of deduction.
In this embodiment, the MIRROR SITE of the data storage area M1 is constructed, applies number when the data storage area M1 to be read According to when, according to the corresponding relationship of the data storage area M1 and the corresponding position of the MIRROR SITE of the data storage area M1, from the MIRROR SITE Corresponding position reading application data.Due to the application data in the not actual data storage area of access, but by reading mirror As the application data for knowing data storage area indirectly using data in area, it is therefore not necessary to know private cipher key in advance, so that it may read Take the application data of the data storage area M1.Protect the Information Security of the data storage area M1.Also, existing M1 data are not changed The application data store and access control of memory block, be not related to yet card foundation structure and POS machine tool transformation, implement cost compared with It is small, the mobile phone card of load M1 application to pass through in the whole city or the whole nation can be carried out, avoid being done according to the private cipher key of single school-run enterprise, building Management and cost problem, realize the versatility of mobile phone card brought by custom card.
Access control right, judgement is arranged in the MIRROR SITE in another embodiment of the invention, the response unit 220 Whether the requesting party of reading application data has access control right, if it is, reading described using data.
MIRROR SITE is different from actual data storage area, and MIRROR SITE itself is free of cipher key field, in order to ensure MIRROR SITE It is not read arbitrarily by third party using data, access control can be set in the reading data interface (api interface) of the MIRROR SITE Permission processed, for example, static password and/or dynamic password is arranged in MIRROR SITE, after requesting party inputs correct password, it is believed that tool There is access control right.For example, a static password (such as 1111) is arranged in MIRROR SITE, the static password is by card manufacturer or fortune It seeks quotient to grasp, only opens to affiliate, if affiliate (cell phone software developer) is in need, can be asked for operator Password obtains the permission for reading MIRROR SITE.Alternatively, the form of dynamic password, dynamic password can be used in order to which confidentiality is higher Calculation method opened to affiliate, to improve the safety of MIRROR SITE reading data, protection is not let out using data Dew.
In this embodiment, static password and/or dynamic password are set in MIRROR SITE, when requesting party input is correct Password after, it is believed that there is access control right, further improve the safety for reading data, protection is using data not to not having The third party's leakage having permission.
Below by a specific embodiment, the present invention is described further.
In mobile phone card fabrication, the MIRROR SITE of the data storage area M1 and the data storage area M1 is constructed.
Wherein, the true data storage area M1 is as shown in the table, disappears including data corresponding to each Sector Name, enterprise Fermi key and enterprise supplement key with money, and when fabrication, data corresponding to each sector can be 0 or for sky entirely, and enterprise's consumption is close Key and enterprise, which supplement key with money, can be set to 6 F, after opening card, personal data be written by card system, and key is revised as Private cipher key.
Sector Name KA KB
0 Issue area A0A1A2A3A4A5 Enterprise supplements key with money
1 Wallet area Enterprise consumes key Enterprise supplements key with money
2 Purse transaction detail 1 Enterprise consumes key Enterprise supplements key with money
3 Purse transaction detail 2 Enterprise consumes key Enterprise supplements key with money
4 。。。 。。。 。。。
The MIRROR SITE of the data storage area M1 is as shown in the table, including data corresponding to each Sector Name, does not wrap Key is consumed containing enterprise and enterprise supplements key with money, and reading data interface (api interface) is set in MIRROR SITE.
Sector Name
0 Issue area
1 Wallet area
2 Purse transaction detail 1
3 Purse transaction detail 2
4 。。。
Enterprise consumes when opening card in the personal information of data storage area write-in employee, and by the enterprise of data storage area Key and enterprise supplement the private cipher key that key etc. is changed to enterprise with money, to guarantee when supplementing with money or consuming, data storage area electronics The safety of wallet.
The corresponding relationship of the data storage area and the MIRROR SITE corresponding position is set, for example, the of setting sector 0 The corresponding relationship of 3 bytes and the 3rd byte of sector 8.
According to the corresponding relationship, identical operation can be executed in data storage area and MIRROR SITE, for example, storing in data The balance field in the wallet area in area is written 100 yuan, then the balance field in the wallet area of MIRROR SITE is equally written 100 yuan.It is eating Hall consumption when, employee POS machine spend 5 yuan, then data storage area wallet area and MIRROR SITE wallet area balance field 95 yuan are all revised as, the purse transaction detail of data storage area and the transaction details of MIRROR SITE all show 5 yuan of deduction.
When mobile phone user inquires the remaining sum and transaction details of data storage area by mobile phone menu, according to corresponding relationship, lead to Remaining sum and transaction details field that reading data interface reads MIRROR SITE are crossed, knows the remaining sum of data storage area stored value card indirectly And transaction details.
Access control right is set in api interface, if user is mounted with other application software, application software in mobile phone It needs to ask for static password and/or dynamic password to operator, obtains the permission for reading MIRROR SITE, then can just read mirror image The information such as transaction record, the remaining sum in area.
When receiving the request for reading data storage area application data, judge whether with access control right, through sentencing It is disconnected that there is permission, then according to corresponding relationship, the remaining sum and transaction details field of MIRROR SITE are read by reading data interface, indirectly Know the remaining sum and transaction details of data storage area stored value card.
In the present invention, due to being provided with MIRROR SITE, the existing data storage area M1 application data store and access control are not changed System, the transformation for not also being related to card foundation structure and POS machine tool have got through mobile phone dish in the case where not knowing privately owned password List has the application software of access authority and the reading channel of the data storage area M1 electronic wallet application data, avoids all-purpose card System integrator discloses the problem of private cipher key leads to Information Security, also, without customizing card for a certain school-run enterprise, can push away The mobile phone card of the current load M1 application in the row whole city/whole nation, avoids doing management brought by custom card for single school-run enterprise, building And cost problem.
So far, the present invention is described in detail.In order to avoid covering design of the invention, it is public that this field institute is not described The some details known.Those skilled in the art as described above, completely it can be appreciated how implementing technology disclosed herein Scheme.
Method and device of the invention may be achieved in many ways.For example, can by software, hardware, firmware or Person's software, hardware, firmware any combination realize method and device of the invention.The step of for the method it is above-mentioned Sequence is merely to be illustrated, and the step of method of the invention is not limited to sequence described in detail above, unless with other sides Formula illustrates.In addition, in some embodiments, the present invention can be also embodied as recording program in the recording medium, these Program includes for realizing machine readable instructions according to the method for the present invention.Thus, the present invention also covers storage for executing The recording medium of program according to the method for the present invention.
Although some specific embodiments of the invention are described in detail by example, the skill of this field Art personnel it should be understood that above example merely to being illustrated, the range being not intended to be limiting of the invention.The skill of this field Art personnel are it should be understood that can without departing from the scope and spirit of the present invention modify to above embodiments.This hair Bright range is defined by the following claims.

Claims (8)

1. a kind of method realizing contact type intelligent card M1 application data general-purposeization and reading, comprising:
The MIRROR SITE of the data storage area M1 and the data storage area M1 is constructed, and the data storage area and the mirror image are set The corresponding relationship of area corresponding position, wherein do not include cipher key field in the MIRROR SITE;
The request using data saved in the data storage area is read in response to upper layer application, according to the request call institute MIRROR SITE reading data interface is stated, and according to the corresponding relationship, reads the application number from the corresponding position of the MIRROR SITE According to;
In response to data modification request, according to the modification content in the data modification request, the institute for storing the content is found State the corresponding position of data storage area and the corresponding position of the MIRROR SITE, and the corresponding position of the data storage area with And the corresponding position of the MIRROR SITE carries out content modification.
2. the method according to claim 1 realizing contact type intelligent card M1 application data general-purposeization and reading, comprising:
Access control right is set in the MIRROR SITE, judges whether the requesting party of reading application data has access control power Limit, if it is, reading described using data.
3. the method according to claim 2 realizing contact type intelligent card M1 application data general-purposeization and reading, comprising:
Static password and/or dynamic password are set in the MIRROR SITE, when the password inputted is correct, it is believed that there is access control Permission processed.
4. the method according to claim 1 realizing contact type intelligent card M1 application data general-purposeization and reading, comprising:
The application data include remaining sum and/or consumer record.
5. a kind of mobile phone card, comprising:
Construction unit for constructing the MIRROR SITE of the data storage area contact type intelligent card M1 and the data storage area M1, and is set Set the corresponding relationship of the data storage area and the MIRROR SITE corresponding position, wherein do not include key in the MIRROR SITE Field;
Response unit, for reading the request using data saved in the data storage area in response to upper layer application, according to MIRROR SITE reading data interface described in the request call, and according to the corresponding relationship, from the corresponding position of the MIRROR SITE It reads described using data;The response unit is in response to data modification request, according to the modification in the data modification request Content, finds the corresponding position of the corresponding position and the MIRROR SITE that store the data storage area of the content, and The corresponding position of the data storage area and the corresponding position of the MIRROR SITE carry out content modification.
6. mobile phone card according to claim 5, comprising:
Access control right is arranged in the MIRROR SITE in the response unit, judges whether the requesting party of reading application data has Access control right, if it is, reading described using data.
7. mobile phone card according to claim 6, comprising:
Static password and/or dynamic password are set in the MIRROR SITE, when the password inputted is correct, it is believed that there is access control Permission processed.
8. mobile phone card according to claim 5, comprising:
The application data include remaining sum and/or consumer record.
CN201510217015.8A 2015-04-30 2015-04-30 A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read Active CN106203127B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510217015.8A CN106203127B (en) 2015-04-30 2015-04-30 A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510217015.8A CN106203127B (en) 2015-04-30 2015-04-30 A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read

Publications (2)

Publication Number Publication Date
CN106203127A CN106203127A (en) 2016-12-07
CN106203127B true CN106203127B (en) 2019-07-16

Family

ID=57458285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510217015.8A Active CN106203127B (en) 2015-04-30 2015-04-30 A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read

Country Status (1)

Country Link
CN (1) CN106203127B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599724B (en) * 2016-12-20 2020-08-21 北京握奇智能科技有限公司 Method and system for accessing sector data of smart card
CN108319432A (en) * 2018-01-23 2018-07-24 维沃移动通信有限公司 A kind of application operation method and terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544114A (en) * 2013-10-12 2014-01-29 上海柯斯软件有限公司 Multiple M1 card control system based on single CPU card and control method thereof
CN103778530A (en) * 2012-10-22 2014-05-07 中国移动通信集团安徽有限公司 Industry application account over-the-air transferring method, system and apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136081A (en) * 2011-03-24 2011-07-27 北京握奇数据系统有限公司 Integrated circuit (IC) card and data updating method thereof
EP2819078A1 (en) * 2013-06-27 2014-12-31 Gemalto SA Method, device and system for accessing a contact-less service

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778530A (en) * 2012-10-22 2014-05-07 中国移动通信集团安徽有限公司 Industry application account over-the-air transferring method, system and apparatus
CN103544114A (en) * 2013-10-12 2014-01-29 上海柯斯软件有限公司 Multiple M1 card control system based on single CPU card and control method thereof

Also Published As

Publication number Publication date
CN106203127A (en) 2016-12-07

Similar Documents

Publication Publication Date Title
CN105912272B (en) A kind of device and method for the operation controlling multiple security application softwares
CN104836715B (en) Run on the mobile apparatus it is multiple using data sharing method and apparatus
KR102218693B1 (en) Method for processing multiple sim information and an electronic device thereof
CN103702319B (en) SIM (subscriber identity module) card, individualized card writing system and method as well as SIM card obtained according to method
CN103973444B (en) Security token and service access system
US20160103716A1 (en) Method for using shared device in apparatus capable of operating two operating systems
CN110048846A (en) A kind of signature verification method and system based on block chain intelligence contract
CN102883047A (en) Method and system for realizing data security of intelligent mobile terminals
CN103544114B (en) Based on many M1 card control system and the control method thereof of single CPU card
CN102063431B (en) Information database system and method for controlling systematic access of information database
WO2018121366A1 (en) Tee-based offline payment method, payment system thereof and mobile terminal
CN106203127B (en) A kind of method and mobile phone card for realizing that M1 application data general-purposeization is read
CN102722813A (en) Hierarchical multiple electronic currency device and multiple electronic currency management method
CN110046991A (en) A kind of data processing method and system based on block chain intelligence contract
CN109151151A (en) Realize the method and device of the user mode switching of terminal
CN102999839A (en) Cloud platform and virtual SE (security element) based electronic currency security payment system and cloud platform and virtual SE based electronic currency security payment method
CN104820803B (en) Data sharing method between enterprise mobile application
CN105354508B (en) A kind of mobile terminal safety control method and device
CN110100411A (en) Cryptographic system management
CN106295267B (en) It is a kind of access electronic equipment physical memory in private data method and apparatus
CN107038073A (en) Method for processing resource and device
CN103699853B (en) A kind of intelligent SD card and control system thereof and method
TWI615783B (en) Point-of-sale terminal mode switching method and device
WO2021056767A1 (en) Information processing method, mobile terminal and computer storage medium
CN104348951B (en) A kind of card AMS

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant