CN114531679A - Mobile terminal permission interaction system and method based on user identification card - Google Patents

Mobile terminal permission interaction system and method based on user identification card Download PDF

Info

Publication number
CN114531679A
CN114531679A CN202210167423.7A CN202210167423A CN114531679A CN 114531679 A CN114531679 A CN 114531679A CN 202210167423 A CN202210167423 A CN 202210167423A CN 114531679 A CN114531679 A CN 114531679A
Authority
CN
China
Prior art keywords
identification code
mobile terminal
authority
card
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210167423.7A
Other languages
Chinese (zh)
Inventor
官轲
张亲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qinlin Science & Technology Co ltd
Original Assignee
Shenzhen Qinlin Science & Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qinlin Science & Technology Co ltd filed Critical Shenzhen Qinlin Science & Technology Co ltd
Priority to CN202210167423.7A priority Critical patent/CN114531679A/en
Publication of CN114531679A publication Critical patent/CN114531679A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a mobile terminal permission interaction system and a method based on a user identification card, wherein the system comprises: the mobile terminal responds to a security identification code searching instruction sent by the card reader and sends the security identification code of the user identification card and a requirement authority for selection of the user identification card to the card reader; the card reader is used for sending the required authority and the safety identification code to the server; the server is used for responding to the safety identification code corresponding to the requirement authority and the user identification card sent by the card reader and authorizing the safety identification code. According to the method and the system, the card reader is used for acquiring the security identification code and the requirement authority of the user identification card of the mobile terminal, the security identification code is transmitted to the server to be authorized, the authorization condition and the authorization information can be directly managed and supervised in a unified mode through the server, and convenience and rapidness are achieved.

Description

Mobile terminal permission interaction system and method based on user identification card
Technical Field
The application relates to the technical field of communication, in particular to a mobile terminal permission interaction system and method based on a user identification card.
Background
With the rapid development of the internet of things technology, the function of simulating the access card by using the NFC is widely used, but with the acceleration of the updating iteration speed of the intelligent terminal, the mobile phone replacing speed of people is higher and higher, and the failure of the card application carrying the NFC can be caused when the mobile phone is replaced once, so that a mobile phone user is required to hold the replaced mobile phone to a specified place after the mobile phone is replaced every time, and the access card simulated by the NFC is authorized.
Disclosure of Invention
In view of the above, an object of the present application is to provide a mobile terminal permission interaction system and method based on a user identification card, which can acquire a security identification code and a requirement permission of the user identification card of a mobile terminal through a card reader, transmit the security identification code to a server to authorize the security identification code, and directly perform unified management and supervision on authorization conditions and authorization information through the server, so as to be convenient and fast.
In a first aspect, an embodiment of the present application provides a mobile terminal permission interaction system based on a user identification card, where the system includes: the mobile terminal is used for judging whether a card reader connected to the mobile terminal has a reading authority for reading the security identification code of the user identification card, and if the card reader has the reading authority, the mobile terminal responds to a security identification code searching instruction sent by the card reader, sends the security identification code of the user identification card to the card reader, and sends a requirement authority selected by a user aiming at the user identification card to the card reader; the card reader is used for sending a security identification code searching instruction to the mobile terminal and sending the requirement authority and the security identification code to a server according to the requirement authority sent by the mobile terminal and the security identification code of the user identification card; and the server is used for responding to the requirement authority sent by the card reader and the safety identification code corresponding to the user identification card and authorizing the safety identification code.
Optionally, the system further comprises: the system comprises at least one identifier, wherein the at least one identifier is respectively arranged at different positions in a target area, when a user identification card of the mobile terminal is close to the target identifier, the target identifier receives a radio frequency signal transmitted by the user identification card of the mobile terminal, and a safety identification code of the user identification card is identified from the radio frequency signal.
Optionally, an actuator corresponding to each identifier is further provided at a position where the identifier is installed, wherein the target identifier is further configured to: the security identification code of the user identification card is connected with the server and is sent to the server; receiving an authorization level stored by a server and corresponding to the security identification code from the server, wherein the authorization level is used for indicating at least one activity authority of the security identification code in the target area; and controlling the target execution mechanism to execute corresponding action when the security identification code is determined to have the activity right aiming at the target execution mechanism corresponding to the target identifier according to the authorization level fed back by the server.
Optionally, the system includes a plurality of card readers and a mobile terminal connected to each card reader, wherein the server is further configured to: receiving a security identification code and a requirement authority of a user identification card installed on a mobile terminal connected with each card reader from each card reader; for each mobile terminal, determining an authorization priority value of a security identification code of a subscriber identification card installed for the mobile terminal according to equipment parameters of the mobile terminal, wherein the equipment parameters comprise at least one of the following items: the method comprises the following steps of (1) communication stability between a mobile terminal and a server, load condition of the mobile terminal, the number of tasks currently processed by the mobile terminal and position information of the mobile terminal; and authorizing the security identification codes corresponding to the mobile terminals according to the determined authorization priority values.
Optionally, the server is further configured to: establishing an authority item aiming at the safety identification code according to the safety identification code and the requirement authority corresponding to the safety identification code; judging whether the required authority of the safety identification code is consistent with the verification authority of the safety identification code pre-stored in a server or not; if the required authority of the safety identification code is consistent with the verification authority, the verification is successful, and the authority item is stored; and if the required authority of the safety identification code is not consistent with the verification authority, the verification fails.
Optionally, the server is further configured to: after receiving a security identification code corresponding to a requirement authority and a user identification card sent by a card reader, directly establishing an authority item aiming at the security identification code so as to authorize the security identification code; after a preset time, verifying the required authority of the safety identification code based on the verification authority of the safety identification code stored in advance; wherein the server is further configured to: deleting the established permission entry for the secure identification code to cancel authorization of the secure identification code upon determining that the required permission validation for the secure identification code fails; and sending prompt information to the mobile terminal provided with the user identification card corresponding to the safety identification code, wherein the prompt information is used for prompting that the authority verification aiming at the safety identification code fails.
Optionally, the system includes a plurality of card readers and a mobile terminal connected to each card reader, wherein the server is further configured to: receiving a security identification code and a requirement authority of a user identification card installed on a mobile terminal connected with each card reader from each card reader; judging whether the number of the security identification codes waiting for authorization currently exceeds an authorization number threshold of the server or not; if the number of the security identification codes waiting for authorization currently exceeds an authorization number threshold, performing temporary authorization on a target security identification code, and storing the target security identification code and the requirement authority corresponding to the target security identification code into a temporary authorization storage module, wherein the target security identification code is the security identification code which is positioned after the authorization number threshold in a waiting sequence; when the number of the security identification codes waiting for authorization does not exceed the authorization number threshold value of the server, extracting the target security identification codes stored in the temporary authorization storage module; judging whether the required authority of the temporarily authorized target security identification code is consistent with the verification authority of the target security identification code pre-stored in the server; if the required authority of the temporarily authorized target security identification code is consistent with the verification authority, the target security identification code is authorized; and if the required authority of the temporarily authorized target security identification code is not consistent with the verification authority, canceling the temporary authorization of the target security identification code.
In a second aspect, an embodiment of the present application further provides a method for rights interaction of a mobile terminal based on a subscriber identity module, where the method includes: the card reader sends a safety identification code searching instruction to the mobile terminal in a connection state; the mobile terminal judges whether the card reader has the reading authority of reading the safety identification code of the user identification card installed in the mobile terminal; if the card reader has the reading authority, the mobile terminal responds to a security identification code searching instruction sent by the card reader and sends the security identification code of the user identification card to the card reader; the mobile terminal sends the requirement authority selected by the user aiming at the user identification card to the card reader; the card reader sends the requirement authority and the safety identification code to a server; and the server responds to the safety identification code corresponding to the requirement authority and the user identification card sent by the card reader and authorizes the safety identification code.
In a third aspect, an embodiment of the present application further provides an electronic device, including: the mobile terminal permission interaction method comprises a processor, a memory and a bus, wherein the memory stores machine readable instructions executable by the processor, the processor and the memory are communicated through the bus when the electronic device runs, and the machine readable instructions are executed by the processor to execute the steps of the mobile terminal permission interaction method based on the user identification card.
In a fourth aspect, the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the above-mentioned method for interacting the authority of the mobile terminal based on the user identification card are performed.
Compared with the mobile terminal interaction system in the prior art, the mobile terminal permission interaction system and the mobile terminal permission interaction method based on the user identification card have the advantages that the safety identification code and the requirement permission of the user identification card of the mobile terminal are obtained through the card reader and transmitted to the server to authorize the safety identification code, the authorization condition and the authorization information can be directly managed and supervised in a unified mode through the server, and convenience and rapidness are achieved.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic structural diagram of a mobile terminal permission interaction system based on a subscriber identity module card according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of another user identification card-based mobile terminal permission interaction system according to an embodiment of the present application;
fig. 3 is a flowchart of a method for rights interaction of a mobile terminal based on a subscriber identity module card according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. Every other embodiment that can be obtained by a person skilled in the art without making creative efforts based on the embodiments of the present application falls within the protection scope of the present application.
First, an application scenario to which the present application is applicable will be described. The method and the device can be applied to the field of information interaction of the mobile terminal.
Research shows that with the rapid development of the update iteration speed of the mobile phone intelligent terminal, the mobile phone replacing speed of people is higher and higher, the failure of the card application carrying the NFC can be caused when the mobile phone is replaced once, and the property authorization is required manually when the mobile phone is replaced every time.
Meanwhile, the simulated card number of the manual authorization of the NFC is very easy to copy, and is not beneficial to the unified management and supervision of the community. The authorization condition and the authorization information cannot be fed back and inquired in real time, and the management requirement of the community cannot be met.
Based on the above, the embodiment of the application provides a mobile terminal permission interaction system and method based on a user identification card, a card reader is used for acquiring a security identification code and a requirement permission of the user identification card of a mobile terminal, and the security identification code and the requirement permission are transmitted to a server to authorize the security identification code, so that community personnel can directly perform unified management and supervision on authorization conditions and authorization information through the server, and the system and method are convenient and fast. Meanwhile, due to the non-replicability and confidentiality of the security identification code of the user identification card, the security identification code of the user identification card cannot be copied, and the unified management and supervision capability of a community is enhanced.
Referring to fig. 1, fig. 1 is a block diagram of a mobile terminal permission interaction system based on a subscriber identity module card according to an embodiment of the present disclosure. As shown in fig. 1, an interactive system provided in an embodiment of the present application includes: the mobile terminal 101, the card reader 102, and the server 103, where a Subscriber Identity Module (SIM) card is installed in the mobile terminal 101, and Security Identity codes (SEID) are stored in the SIM card, where one Security Identity code corresponds to only one SIM card, and for example, the length of the SIM card may be ten bytes.
As shown in fig. 1, a mobile terminal 101 is connected to a card reader 102, the mobile terminal 101 is configured to determine whether the card reader 102 connected to the mobile terminal 101 has a reading authority for reading a security identification code of a user identification card, and if the card reader 102 has the reading authority, the mobile terminal 101 sends the security identification code of the user identification card to the card reader 102 in response to a security identification code search instruction issued by the card reader 102.
Alternatively, if the mobile terminal 101 determines that the card reader 102 does not have the reading authority to read the security identification code of the subscriber identity card, the mobile terminal 101 ignores the security identification code searching command sent by the card reader 102.
For example, the mobile terminal 101 may determine whether the card reader 102 has a reading right to read the security identification code of the user identification card according to an APDU (Application Protocol Data Unit) command sent by the card reader 102.
Here, the card reader may be held by a worker and inserted into the mobile terminal when the subscriber identity card is primarily authorized.
In one example, the security identification code seek command issued by the card reader 102 may be "00 a 404000080 ca 004400" and the return data content of the mobile terminal may be "00440C 930A + SEID".
The first half of the security identifier code-searching command "00 a 404000080 ca 004400" is used to indicate a secret key (APDU) given by the card issuing authority of the subscriber identity card, and the second half is used to indicate the required SEID code-searching action of the card reader 102.
Thus, the card reader 102 can acquire the security identification code of the user identification card of the mobile terminal 101.
The mobile terminal 101 is further configured to send the requirement authority selected by the user for the user identification card to the card reader 102.
The mobile terminal 101 sends the requirement permission selected by the user for the user identification card to the card reader 102, and may send the requirement permission together with the security identification code, or send the requirement permission after the security identification code is sent, and at this time, the mobile terminal needs to determine that the card reader 102 has the reading permission and then sends the requirement permission to the card reader 102.
For example, an application program (APP) for authorizing a subscriber identity module card may be pre-installed in the mobile terminal 101, when the mobile terminal 101 is connected to the card reader 102, the application program is entered, a plurality of area identifiers are displayed in an operation interface of the application program, one area identifier corresponds to one geographic area, in response to a user selecting a target area identifier of the plurality of area identifiers, an authority configuration interface for the target area identifier is displayed, the authority configuration interface includes a plurality of activity authorities, a target area corresponding to the selected target area identifier is an area in the plurality of areas where the user desires that the subscriber identity module card can obtain activity authority, a selection of the user for at least one activity authority of the plurality of authorities is received, and the selected activity authority is determined as a required authority for the subscriber identity module card selection.
Taking the target area as the cell a as an example, the method can receive the selection of a user on an operation interface of an application program for the target area identifier corresponding to the cell a in the displayed multiple area identifiers, enter an authority configuration interface for the cell a, display multiple authority selection items corresponding to the cell a in the authority configuration interface at the moment, receive the selection of the user for at least one activity authority in multiple authorities, and determine the selected activity authority as the required authority selected by the user for the user identification card.
The user may use the application program to send the requirement authority to the card reader 102 in the mobile terminal 101, and in response to the requirement authority clicked by the user, the application program may send the requirement authority clicked by the user to the card reader 102. For example, the user may click on the access right in the mobile terminal, and the application program sends the access requirement right to the card reader 102 in response to the click on the access right of the user.
As shown in fig. 1, the card reader 102 is connected not only to the mobile terminal 101 but also to the server 103 by a communication signal.
The card reader 102 is configured to send a security identifier code-searching instruction to the mobile terminal 101, and is configured to send a requirement authority and a security identifier code to the server 103 according to the requirement authority and the security identifier code of the user identifier card sent by the mobile terminal 101.
For example, the security identifier code-searching instruction sent by the card reader 102 to the mobile terminal 101 may be "00 a 404000080 ca 004400", the application program in the mobile terminal 101 may verify the security identifier code-searching instruction, and when the application program successfully verifies the security identifier code-searching instruction, the returned data content of the mobile terminal may be "00440C 930A + SEID". Meanwhile, the card reader 102 may obtain the requirement authority corresponding to the security identification code according to the requirement authority clicked by the user, which is sent to the card reader 102 by the application program.
After obtaining the security identification code and the requirement authority corresponding to the security identification code, the card reader 102 may send the security identification code and the requirement authority corresponding to the security identification code to the server 103 through the mobile network.
In an example, the card reader 102 may send the acquired security identification code and the requirement authority corresponding to the security identification code to the processor of the mobile terminal 101, and then the processor of the mobile terminal 101 sends the security identification code acquired by the card reader 102 and the requirement authority corresponding to the security identification code to the server 103 through a cellular network of the mobile terminal.
In an example two, the card reader 102 may include a data sending module (not shown in the figure), the data sending module (not shown in the figure) may be installed with a SIM card and/or may be connected with WiFi, and the card reader 102 may send the acquired security identification code and the requirement authority corresponding to the security identification code to the server 103 through a cellular mobile network of its own SIM card and/or a network connected through WiFi after it is connected with WiFi.
In this way, the server 103 can send the security identifier and the requirement authority corresponding to the security identifier to the server 103 according to the requirement of the user.
The server 103 is configured to authorize the security identification code in response to the security identification code corresponding to the user identification card and the requirement authority sent by the card reader 102.
The mobile terminal authority interaction system comprises a plurality of card readers 102 and mobile terminals 101 connected with the card readers 102.
Specifically, after receiving the security identification code and the requirement authority corresponding to the security identification code, the server 103 may receive, from each card reader 102, the security identification code and the requirement authority of the user identification card installed on the mobile terminal 101 connected to each card reader 102; for each mobile terminal 101, according to the device parameters of the mobile terminal 101, an authorization priority value for the security identification code of the subscriber identity card installed in the mobile terminal 101 is determined, and according to the determined authorization priority value, the security identification code corresponding to each mobile terminal is authorized.
In a preferred example, the device parameters of the mobile terminal 101 are obtained by the application program, and when the card reader 102 is connected to the mobile terminal 101, the device parameters are sent to the server 103 through the card reader 102 in real time. Illustratively, the device parameter may include, but is not limited to, at least one of: the communication stability between the mobile terminal and the server, the load condition of the mobile terminal, the number of tasks currently processed by the mobile terminal and the position information of the mobile terminal.
For example, the calculation manner of the server 103 determining the authorization priority value of the security identifier for the subscriber identity card installed in the mobile terminal 101 according to the device parameter may be as follows: firstly, whether the communication signal strength between the card reader 102 and the server 103 meets the information transmission requirement is judged, if the communication signal strength does not meet the information transmission requirement, it is determined that the current mobile terminal 101 does not meet the authorization condition, and the authorization priority value is set to zero.
If the signal strength meets the information transmission requirement, determining an authorization priority value of the security identification code of the subscriber identity module card installed on the mobile terminal 101 according to the load condition of the mobile terminal 101, the number of tasks currently processed by the mobile terminal 101 and the position information of the mobile terminal 101.
Specifically, the lower the load of the mobile terminal 101, the smaller the number of tasks currently processed by the mobile terminal 101, the fewer other mobile terminals that are performing authorization near the location of the mobile terminal 101, and the higher the authorization priority value, the more the server 103 authorizes the security identifier of the subscriber identity card installed in the mobile terminal 101.
The load condition of the mobile terminal 101 may be determined by the processor utilization and the memory utilization of the mobile terminal.
The server 103 is further configured to establish an authority entry for the security identification code according to the security identification code and the requirement authority corresponding to the security identification code; judging whether the required authority of the security identification code is consistent with the verification authority of the security identification code pre-stored in the server; if the required authority of the safety identification code is consistent with the verification authority, the verification is successful, and the authority item is stored; and if the required authority of the safety identification code is inconsistent with the verification authority, the verification fails.
Specifically, when the consistency verification of the required authority of the server 103 for the security identifier and the verification authority is successful, and the authority entry is stored, at this time, the server 103 completes the authorization for the security identifier.
Therefore, the server can complete authorization on the security identification code of the user identification card, when the user changes the mobile equipment, the authorization of the server on the security identification code of the user identification card cannot disappear, and the problem that the user needs to perform NFC authorization again when changing the mobile equipment is solved.
After receiving the security identification code corresponding to the required permission and the user identification card sent by the card reader 102, directly establishing a permission entry aiming at the security identification code so as to authorize the security identification code; and after the verification condition is met, verifying the required authority of the safety identification code based on the verification authority of the safety identification code stored in advance.
Here, the condition for verifying the requirement authority of the security identification code by the server 103 may be that the number of new security identification codes received by the server 103 and the requirement authority corresponding to the security identification code is less than a preset number, and at this time, the server 103 has enough residual computing capacity and can verify the requirement authority of the security identification code based on the verification authority of the pre-stored security identification code by using the residual computing resources.
The server 103 is further used for deleting the established authority entry aiming at the security identification code to cancel the authorization of the security identification code when the requirement authority verification aiming at the security identification code is determined to fail; and sending prompt information to the mobile terminal provided with the user identification card corresponding to the safety identification code, wherein the prompt information is used for prompting that the authority verification aiming at the safety identification code fails.
For example, the prompt message may be "permission fails to verify, please apply for permission again".
The mobile terminal authority interaction system comprises a plurality of card readers 103, mobile terminals 101 connected with the card readers 103, and a server 103, and is further used for receiving a security identification code and a requirement authority of a user identification card installed on the mobile terminal 101 connected with each card reader 102 from each card reader 102; judging whether the number of the security identification codes waiting for authorization currently exceeds an authorization number threshold of the server 103; if the number of the security identification codes waiting for authorization currently exceeds an authorization number threshold, performing temporary authorization on a target security identification code, and storing the target security identification code and the requirement authority corresponding to the target security identification code into a temporary authorization storage module, wherein the target security identification code is the security identification code which is positioned after the authorization number threshold in a waiting sequence; when the number of the security identification codes waiting for authorization does not exceed the authorization number threshold of the server 103, extracting the target security identification codes stored in the temporary authorization storage module; judging whether the required authority of the temporarily authorized target security identification code is consistent with the verification authority of the target security identification code pre-stored in the server 103; if the required authority of the temporarily authorized target security identification code is consistent with the verification authority, the target security identification code is authorized; and if the required authority of the temporarily authorized target security identification code is not consistent with the verification authority, canceling the temporary authorization of the target security identification code.
Optionally, if the number of the security identification codes waiting for authorization currently does not exceed the authorization number threshold, storing the security identification codes and the requirement permission corresponding to the security identification codes into a requirement permission authorization storage module, generating a requirement permission entry for the security identification codes so as to perform requirement authorization on the security identification codes, and judging whether the requirement permission of the security identification codes in the requirement authorization entry is consistent with the verification permission of the target security identification codes stored in the server 103 in advance; if the required authority of the temporarily authorized target security identification code is consistent with the verification authority, authorizing the target security identification code; and if the requirement authority of the temporarily authorized target security identification code is not consistent with the verification authority, canceling the requirement authorization of the security identification code.
Therefore, the method and the device can ensure that the time for the user to wait for authorization is not too long due to insufficient processing efficiency of the server when the user is authorized.
For example, if the processing capability of the processor 103 for the authorization task of the security identifier is to process five authorization tasks at the same time, the authorization number threshold of the server 103 may be ten.
Specifically, the waiting sequence may be ordered from first to last in the time order in which the server 103 receives the security identifiers. Or sorting from large to small according to the authorization priority value.
Compared with the mobile terminal interaction system in the prior art, the mobile terminal permission interaction system provided by the embodiment of the application acquires the security identification code and the requirement permission of the user identification card of the mobile terminal through the card reader, and transmits the security identification code to the server for authorization, so that community personnel can directly perform unified management and supervision on authorization conditions and authorization information through the server, and the system is convenient and fast.
Referring to fig. 2, fig. 2 is a block diagram of another user identification card based mobile terminal permission interaction system according to an embodiment of the present application. As shown in fig. 2, the mobile terminal permission interaction system based on the user identification card according to the embodiment of the present application includes: a mobile terminal 201, a card reader 202, a server 203 and an identifier 204. The description of the process in which the server 203 authorizes the mobile terminal 201 through the card reader 202 may refer to the description of the mobile terminal 101, the card reader 102, and the server 103 in fig. 1, and may achieve the same technical effect, which is not described in detail herein.
As shown in fig. 2, in the authority interaction system, at least one identifier 204 is included, the at least one identifier 204 is respectively installed at different positions within a target area, when a subscriber identity card of a mobile terminal 201 approaches the target identifier 204, the target identifier 204 receives a radio frequency signal transmitted by the subscriber identity card of the mobile terminal 201, and identifies a security identification code of the subscriber identity card from the radio frequency signal.
Illustratively, the frequency at which the identifier 204 communicates with the mobile terminal 201 may be 13.56 mhz and support the ISO14443A communication protocol.
In this way, the identifier 204 can obtain the security identification code of the subscriber identity card that needs to be subjected to authority identification.
It should be noted that, an actuator corresponding to each identifier 204 is further provided at a position where each identifier 204 is installed, for example, the identifier 204 may be installed at a doorway, and the actuator installed at the doorway to control the opening and closing of the door is a motor to control the opening and closing of the door. The identifier 204 can also be installed in the elevator, and the actuator of the identifier 204 installed in the elevator is a motor controlling the elevator to run up and down.
The identifier 204 is connected with the server 203 and is used for the server 203 to send the identified security identification code of the subscriber identity card; the authorization level stored by the server 203 corresponding to the security identifier is received from the server 203.
Wherein the authorization level is used for indicating at least one activity right of the security identification code in the target area; and controlling the target execution mechanism to execute corresponding action when the security identification code is determined to have the activity right aiming at the target execution mechanism corresponding to the target identifier 204 according to the authorization level fed back by the server 203.
Specifically, the identifier 204 sends the identified security identification code to the server 203, and determines whether the authorization level fed back by the security identification code satisfies the activity permission for opening the control door, and if the authorization level satisfies the activity permission for opening the control door, controls the motor for opening and closing the control door, and opens the control door.
Wherein the authorization level may be determined based on the rights entry for the demand rights or temporary rights stored in server 203.
In this way, the identifier 204 can control the activities of the target actuators based on the authorization entries stored in the server 203.
Compared with the mobile terminal interaction system in the prior art, the mobile terminal permission interaction system and the mobile terminal permission interaction method based on the user identification card have the advantages that the safety identification code and the requirement permission of the user identification card of the mobile terminal are obtained through the card reader and transmitted to the server to authorize the safety identification code, community personnel can directly conduct unified management and supervision on authorization conditions and authorization information through the server, and convenience and rapidness are achieved.
In addition, the identifier can also control the activity of the target execution mechanism by determining the authority corresponding to the security identification code of the mobile terminal, thereby avoiding the problem that the card number of the NFC analog card is easy to be identified and copied in the prior art.
Based on the same inventive concept, the embodiment of the application also provides a mobile terminal permission interaction method based on the user identification card corresponding to the mobile terminal permission interaction system based on the user identification card.
Referring to fig. 3, fig. 3 is a flowchart of a mobile terminal permission interaction method based on a subscriber identity module card according to an embodiment of the present application, where as shown in fig. 3, the mobile terminal permission interaction method includes:
s301, the card reader sends a security identification code searching instruction to the mobile terminal in a connection state.
S302, the mobile terminal judges whether the card reader has the reading authority of reading the security identification code of the user identification card installed in the mobile terminal.
And S303, if the card reader has the reading authority, the mobile terminal responds to a security identification code searching instruction sent by the card reader, and sends the security identification code of the user identification card to the card reader.
S304, the mobile terminal sends the requirement authority selected by the user aiming at the user identification card to the card reader.
S305, the card reader sends the requirement authority and the safety identification code to a server.
S306, the server responds to the safety identification code corresponding to the user identification card and the requirement authority sent by the card reader, and authorizes the safety identification code.
Compared with the mobile terminal permission interaction method in the prior art, the mobile terminal permission interaction method based on the user identification card can acquire the security identification code and the requirement permission of the user identification card of the mobile terminal through the card reader, and transmits the security identification code to the server for authorization, so that community personnel can directly perform unified management and supervision on authorization conditions and authorization information through the server, and convenience and rapidness are realized.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 4, the electronic device 400 includes a processor 410, a memory 420, and a bus 430.
The memory 420 stores machine-readable instructions executable by the processor 410, when the electronic device 400 runs, the processor 410 communicates with the memory 420 through the bus 430, and when the machine-readable instructions are executed by the processor 410, the steps of the method for interacting the authority of the mobile terminal based on the subscriber identity module card in the embodiment of the method shown in fig. 3 may be executed.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method for rights interaction of a mobile terminal based on a subscriber identity card in the method embodiment shown in fig. 3 may be executed.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the method, the apparatus, and the medium described above may refer to corresponding processes in the foregoing system embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A mobile terminal permission interaction system based on a user identification card is characterized by comprising a mobile terminal, a card reader and a server, wherein the mobile terminal is provided with the user identification card, a security identification code is stored in the user identification card,
the mobile terminal is used for judging whether a card reader connected to the mobile terminal has a reading authority for reading the security identification code of the user identification card, and if the card reader has the reading authority, the mobile terminal responds to a security identification code searching instruction sent by the card reader, sends the security identification code of the user identification card to the card reader, and is used for sending a requirement authority selected by a user for the user identification card to the card reader;
the card reader is used for sending a security identification code searching instruction to the mobile terminal and sending the requirement authority and the security identification code to a server according to the requirement authority sent by the mobile terminal and the security identification code of the user identification card;
and the server is used for responding to the requirement authority sent by the card reader and the safety identification code corresponding to the user identification card and authorizing the safety identification code.
2. The system of claim 1, further comprising:
the system comprises at least one identifier, wherein the at least one identifier is respectively arranged at different positions in a target area, when a user identification card of the mobile terminal is close to the target identifier, the target identifier receives a radio frequency signal transmitted by the user identification card of the mobile terminal, and a safety identification code of the user identification card is identified from the radio frequency signal.
3. The system according to claim 2, wherein an actuator corresponding to each identifier is further provided at a position where the identifier is installed,
wherein the object recognizer is further configured to:
the security identification code of the user identification card is connected with the server and is sent to the server;
receiving an authorization level stored by a server and corresponding to the security identification code from the server, wherein the authorization level is used for indicating at least one activity authority of the security identification code in the target area;
and controlling the target execution mechanism to execute corresponding action when the security identification code is determined to have the activity right aiming at the target execution mechanism corresponding to the target identifier according to the authorization level fed back by the server.
4. The system of claim 1, wherein the system comprises a plurality of card readers and a mobile terminal connected to each card reader,
wherein the server is further configured to:
receiving a security identification code and a requirement authority of a user identification card installed on a mobile terminal connected with each card reader from each card reader;
for each mobile terminal, determining an authorization priority value of a security identification code of a subscriber identification card installed for the mobile terminal according to equipment parameters of the mobile terminal, wherein the equipment parameters comprise at least one of the following items: the method comprises the following steps of (1) communication stability between a mobile terminal and a server, load condition of the mobile terminal, the number of tasks currently processed by the mobile terminal and position information of the mobile terminal;
and authorizing the security identification codes corresponding to the mobile terminals according to the determined authorization priority values.
5. The system of claim 1, wherein the server is further configured to:
establishing an authority item aiming at the safety identification code according to the safety identification code and the requirement authority corresponding to the safety identification code;
judging whether the required authority of the safety identification code is consistent with the verification authority of the safety identification code pre-stored in a server or not;
if the required authority of the safety identification code is consistent with the verification authority, the verification is successful, and the authority item is stored;
and if the required authority of the safety identification code is not consistent with the verification authority, the verification fails.
6. The system of claim 5, wherein the server is further configured to:
after receiving a security identification code corresponding to a requirement authority and a user identification card sent by a card reader, directly establishing an authority item aiming at the security identification code so as to authorize the security identification code;
after the verification condition is met, verifying the required authority of the safety identification code based on the verification authority of the safety identification code stored in advance;
wherein the server is further configured to:
deleting the established permission entry for the secure identification code to cancel authorization of the secure identification code upon determining that the required permission validation for the secure identification code fails;
and sending prompt information to the mobile terminal provided with the user identification card corresponding to the safety identification code, wherein the prompt information is used for prompting that the authority verification aiming at the safety identification code fails.
7. The system of claim 1, wherein the system comprises a plurality of card readers and a mobile terminal connected to each card reader,
wherein the server is further configured to:
receiving a security identification code and a requirement authority of a user identification card installed on a mobile terminal connected with each card reader from each card reader;
judging whether the number of the security identification codes waiting for authorization currently exceeds an authorization number threshold of the server or not;
if the number of the current security identification codes waiting for authorization exceeds an authorization number threshold, temporarily authorizing a target security identification code, and storing the target security identification code and the requirement authority corresponding to the target security identification code into a temporary authorization storage module, wherein the target security identification code is the security identification code which is positioned after the authorization number threshold in a waiting sequence;
when the number of the security identification codes waiting for authorization does not exceed the authorization number threshold value of the server, extracting the target security identification codes stored in the temporary authorization storage module;
judging whether the required authority of the temporarily authorized target security identification code is consistent with the verification authority of the target security identification code pre-stored in the server;
if the required authority of the temporarily authorized target security identification code is consistent with the verification authority, the target security identification code is authorized;
and if the required authority of the temporarily authorized target security identification code is not consistent with the verification authority, canceling the temporary authorization of the target security identification code.
8. A mobile terminal permission interaction method based on a user identification card is characterized by comprising the following steps:
the card reader sends a safety identification code searching instruction to the mobile terminal in a connection state;
the mobile terminal judges whether the card reader has the reading authority of reading the safety identification code of the user identification card installed in the mobile terminal;
if the card reader has the reading authority, the mobile terminal responds to a security identification code searching instruction sent by the card reader and sends the security identification code of the user identification card to the card reader;
the mobile terminal sends the requirement authority selected by the user aiming at the user identification card to the card reader;
the card reader sends the requirement authority and the safety identification code to a server;
and the server responds to the safety identification code corresponding to the requirement authority and the user identification card sent by the card reader and authorizes the safety identification code.
9. An electronic device, comprising: a processor, a memory and a bus, wherein the memory stores machine-readable instructions executable by the processor, the processor and the memory communicate with each other through the bus when the electronic device runs, and the processor executes the machine-readable instructions to execute the method for rights interaction of the mobile terminal according to claim 8.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, performs the mobile terminal permission interaction method according to claim 8.
CN202210167423.7A 2022-02-23 2022-02-23 Mobile terminal permission interaction system and method based on user identification card Pending CN114531679A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210167423.7A CN114531679A (en) 2022-02-23 2022-02-23 Mobile terminal permission interaction system and method based on user identification card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210167423.7A CN114531679A (en) 2022-02-23 2022-02-23 Mobile terminal permission interaction system and method based on user identification card

Publications (1)

Publication Number Publication Date
CN114531679A true CN114531679A (en) 2022-05-24

Family

ID=81624155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210167423.7A Pending CN114531679A (en) 2022-02-23 2022-02-23 Mobile terminal permission interaction system and method based on user identification card

Country Status (1)

Country Link
CN (1) CN114531679A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115103304A (en) * 2022-07-22 2022-09-23 荣耀终端有限公司 Position information calling method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778702A (en) * 2014-01-22 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Access control method, NFC (near field communication) terminal, access control device and access control system
CN104424676A (en) * 2013-08-28 2015-03-18 北京数码视讯科技股份有限公司 Identity information sending method, identity information sending device, access control card reader and access control system
CN105279463A (en) * 2015-09-10 2016-01-27 上海卓易科技股份有限公司 Card swiping and reading method, mobile terminal, and card reader
WO2016197330A1 (en) * 2015-06-09 2016-12-15 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
WO2018045917A1 (en) * 2016-09-09 2018-03-15 天地融科技股份有限公司 Authorization system, method, and card
CN109544753A (en) * 2018-11-26 2019-03-29 日立楼宇技术(广州)有限公司 A kind of right management method and system based on two dimensional code

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424676A (en) * 2013-08-28 2015-03-18 北京数码视讯科技股份有限公司 Identity information sending method, identity information sending device, access control card reader and access control system
CN103778702A (en) * 2014-01-22 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Access control method, NFC (near field communication) terminal, access control device and access control system
WO2016197330A1 (en) * 2015-06-09 2016-12-15 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN105279463A (en) * 2015-09-10 2016-01-27 上海卓易科技股份有限公司 Card swiping and reading method, mobile terminal, and card reader
WO2018045917A1 (en) * 2016-09-09 2018-03-15 天地融科技股份有限公司 Authorization system, method, and card
CN109544753A (en) * 2018-11-26 2019-03-29 日立楼宇技术(广州)有限公司 A kind of right management method and system based on two dimensional code

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115103304A (en) * 2022-07-22 2022-09-23 荣耀终端有限公司 Position information calling method and device
CN115103304B (en) * 2022-07-22 2023-01-10 荣耀终端有限公司 Position information calling method and device

Similar Documents

Publication Publication Date Title
CN100583114C (en) System and method for remote security enablement
CN109544135B (en) Bank card binding method and device, storage medium and mobile terminal
JP5926047B2 (en) Method and apparatus for controlling execution of protected internal functions and applications embedded in a small circuit card for portable terminal
US20180115546A1 (en) Information processing device, information processing system, and information processing method
CN107911340B (en) Login verification method, device and equipment of application program and storage medium
CN110009776B (en) Identity authentication method and device
CN111355723B (en) Single sign-on method, device, equipment and readable storage medium
CN109754505B (en) Unlocking method and device based on IC card
CN107437016B (en) Application control method and related product
CN111581994B (en) Near field communication NFC communication method and device and electronic equipment
AU2017285865B2 (en) Mobile authentication method and system therefor
CN112448956B (en) Authority processing method and device of short message verification code and computer equipment
CN109377612A (en) Reserve access method, system, computer equipment and storage medium
KR20170095029A (en) Method, application, computer program and device for providing authentication service using mobile terminal
CN110120928A (en) A kind of identity authentication method, device, server and computer-readable medium
CN107682376B (en) Wind control data interaction method and device
CN114531679A (en) Mobile terminal permission interaction system and method based on user identification card
CN101790155A (en) Method, device and system for updating security algorithm of mobile terminal
CN108494749A (en) Method, apparatus, equipment and the computer readable storage medium of IP address disabling
CN108600242B (en) Account registration method, device and equipment of application software and readable storage medium
CN104980279A (en) Identity authentication method, and related equipment and system
CN110942537A (en) Intelligent door lock unlocking system, method, device and medium
CN112422281B (en) Method and system for changing secret key in security module
CN110309635A (en) Management method, device, equipment and the computer storage medium of data quality model
US20230385418A1 (en) Information processing device, information processing method, program, mobile terminal, and information processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination