CN114945167A - Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method - Google Patents

Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method Download PDF

Info

Publication number
CN114945167A
CN114945167A CN202111602760.6A CN202111602760A CN114945167A CN 114945167 A CN114945167 A CN 114945167A CN 202111602760 A CN202111602760 A CN 202111602760A CN 114945167 A CN114945167 A CN 114945167A
Authority
CN
China
Prior art keywords
mobile phone
sim card
data
information
personal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111602760.6A
Other languages
Chinese (zh)
Inventor
支录奎
张福海
支煜栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN114945167A publication Critical patent/CN114945167A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • H04W8/265Network addressing or numbering for mobility support for initial activation of new user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An offline interaction realization method for a mobile phone and an SIM card data line and a remote supervision control method. The invention belongs to an improvement of a mobile phone card and an application system thereof. Especially, the improvement of the data interaction mode between the mobile phone SIM card and the mobile phone is applied to the application of the scene. The invention relates to a method for realizing data offline interaction between a mobile phone and an SIM card, which is characterized in that an input module and a radio frequency output module are arranged on the SIM card of the mobile phone, wherein the SIM card is provided with a memory, an arithmetic unit and a controller, the input module is used for carrying out data interaction with biological identification APP software in the mobile phone, and the radio frequency output module is used for carrying out data interaction with an SIM card reader through a near field communication module. The invention improves the data interaction mode of the existing mobile phone and the SIM card, so that the mobile phone and the SIM card can realize data interaction under the condition of no network, and the off-line data interaction method is utilized to realize remote supervision control and develop various application scenes.

Description

Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method
Technical Field
The invention belongs to the electronic information technology, in particular to improvement of a data interaction mode of a mobile phone SIM card and a mobile phone and application of an application scene.
Background
Data interaction between the existing mobile phone and the SIM card needs to be realized in a network environment, and the speed and the expansion of an application scene are limited when some networks have no environment or the network is slow.
Disclosure of Invention
The invention relates to a method for realizing offline data interaction between a mobile phone and an SIM card and a remote supervisory control method.
The method for realizing the data offline interaction of the mobile phone and the SIM card comprises the steps of arranging an input module and a radio frequency output module on the SIM card of the mobile phone, wherein the SIM card is provided with a memory, an arithmetic unit and a controller, carrying out data interaction with biological identification APP software in the mobile phone by utilizing the input module, and carrying out data interaction with an SIM card reader by utilizing the radio frequency output module through a near field communication module.
The radio frequency input module adopts a Bluetooth radio frequency module, and the output module adopts near field communication or other communication modes.
The invention relates to a remote supervision and control method of a mobile phone card based on the method for realizing the offline interaction between a mobile phone and an SIM card data, which comprises the following steps: (1) storing a series of comprehensive application data of national personal network number, a biometric authentication comparison sample, personal certificates, a personal application card, health information and social attributes in the SIM card of the mobile phone as claimed in claim 1 or 2; (2) collecting personal biological information by a mobile phone camera; (3) the mobile phone inputs personal biological information acquired by a camera into mobile phone APP biological identification algorithm software, and then the mobile phone APP biological identification algorithm software calls a biological authentication comparison sample stored in an SIM card in advance from the mobile phone SIM card to compare with the acquired personal biological information; (4) when the comparison result is in accordance with the comparison result, the mobile phone APP outputs confirmation information to be fed back to the mobile phone SIM card and activates the SIM card, and after the SIM card is activated, the SIM card reader can access the SIM card offline; the SIM can not be accessed when the comparison result is not in accordance; (6) when the SIM card of the mobile phone can be accessed by the SIM card reader of the mobile phone, the access information is uploaded to the monitoring platform connected with the card reader, and the monitoring platform can remotely complete the set monitoring content on line.
The remote supervision control method comprises the steps of writing a national personal network number, a biological authentication comparison sample, a personal certificate, a personal application card, health information and social attribute comprehensive application data into an SIM card; after all information in the SIM card of the mobile phone is encrypted, a national personal network number label is attached, and the label is a public unified credit code of mobile phone mobile personnel and mobile phone internet surfing personnel; and all information used in the mobile phone SIM card is managed by a special supervision platform for the mobile phone SIM card and the mobile phone SIM card reader, the supervision platform has the functions of writing, updating, supervising and managing the data of the mobile phone SIM card, and can also perform registration permission and data query supervision functions on the mobile phone SIM card reader.
The application scenarios of the remote supervisory control method include, but are not limited to, the following situations: the mobile phone SIM card reader can also be applied to 'one-standard three-real' authenticity supervision, a fire-fighting smoke detector, a television set top box, an electronic door lock, an airplane door bin, a railway train, a road vehicle, a waterway ship, a field landmark object, equipment and a wire pole.
The application scenarios of the remote supervisory control method include, but are not limited to, the following situations: and the payment of the digital RMB, certificate checking, data interaction, remote identity authentication, signature and credit investigation data are completed.
According to the remote supervision control method, when a mobile phone SIM card reader reads a mobile phone SIM card, the biological information in the SIM card can be compared with the biological information of personnel in a supervision platform database, if the comparison is successful, an alarm can be given immediately, and the alarm information can be returned to a real-name authentication site in real time.
According to the remote supervision control method, the geographic position number or doorplate number information installed on the SIM card reader of the mobile phone is bound with the electronic map installed in the SIM card reader of the mobile phone, the mobile real-name system track information of the mobile phone, the geographic position number information installed on the SIM card reader of the mobile phone and the electronic map information are overlapped and integrated, a track mark of a mobile personnel real-name system point of the mobile phone positioned on the electronic map is formed, and the SIM card reader of the mobile phone is linked with a background to realize the track query function of mobile personnel, the comparison and on-site alarm functions of the mobile personnel, and the remote visual supervision and comprehensive alarm functions.
According to the remote supervision control method, the biological characteristics of a mobile phone owner are compared with the biological sample of the mobile phone SIM card when the mobile phone owner dials a call, real-name system authentication is carried out on line in real time, the SIM card cannot be activated when the authentication is not in accordance, and telecommunication fraud and reverse selling of the SIM card are effectively prevented.
The invention integrates the multi-source data in the SIM card of the mobile phone with the radio frequency module embedded in the SIM card and the like into a whole to form an integral technical scheme. The SIM card reader technology, biological acquisition, biological identification, feature extraction, network communication, doorplate number superposition positioning, GIS track generation, track query and other technologies are combined, on the basis of the original carrier of the SIM card of the mobile phone, five parts (shown in figures 1-1 and 2) of a radio frequency input module, a radio frequency output module, a memory, an arithmetic unit and a controller are embedded, and comprehensive application data (shown in figures 2 and 1) of national personal network numbers, biological authentication comparison samples, personal certificates, personal application cards, health information, social attributes and the like are written in, so that a complete software and hardware integrated system with functions of input, output, storage, calculation, control, data and the like is integrated in the SIM card. The biometric authentication comparison sample data, the personal certificate data and the personal application card data are encrypted and packaged according to the national encryption standard, the encrypted data are attached with a national personal network number label, so that the personal information can only be seen from the outside, and other personal information is packaged and encrypted in a data bin of the personal network number. The data are read and decrypted through a mobile phone SIM card reader, the card reader automatically overlaps doorplate number positioning information of the installation place of the card reader when mobile personnel mobile phone SIM card information is read, the positioning information is overlapped with electronic map information (GIS) in the mobile phone SIM card reader to form track information point positions of mobile personnel of the mobile phone, the information is uploaded to a mobile phone SIM card reader management platform so as to facilitate track information synthesis, inquiry and supervision, and meanwhile, data reading is carried out through a receiving multi-service application output interface (see the figure 2 (2)), so that services such as data exchange, digital RMB payment and the like are realized.
The invention is shown in the following 6 (as shown in fig. 1-2) and the detailed functional content is shown in fig. 2):
(1) a mobile phone SIM card (see figures 1-1(2), 1-2 (1));
(2) a mobile phone SIM card reader (see figures 1-2 (2));
(3) applying an alarm system to a mobile phone SIM card scene;
(4) a mobile phone SIM card data read-write manager;
(5) a mobile phone SIM card data read-write management platform;
(6) and a mobile phone SIM card reader supervision platform.
The invention has the characteristics that:
1. a radio frequency input module, a radio frequency output module, a memory, an arithmetic unit and a controller are embedded on the basis of a mobile phone SIM card carrier, and multi-source data is fused;
2. the real-name accurate positioning, track generation and track query of mobile personnel of the mobile phone are realized;
3. the track of the mobile personnel can be monitored in real time and an alarm can be given;
4. the purposes of facilitating the public, benefiting people and benefiting people are achieved;
5. the contradiction between personal information protection and real-name system tracking is effectively solved;
6. and no network support is needed in the process of finishing the data exchange between the SIM card of the mobile phone and the SIM card reader of the mobile phone.
Drawings
FIG. 1-1 is a schematic diagram of the operation between a mobile phone and a SIM card, and between the SIM card and a card reader;
fig. 1-2 is a work flow diagram of a mobile phone SIM card technical scheme implementation process;
FIG. 2 is a functional flow chart of the whole system of the SIM card of the mobile phone;
FIG. 3 is a system architecture diagram of the primary application scenario of the present invention;
FIG. 4 is a schematic diagram of a SIM card identity card authentication system;
FIG. 4-1 is a display diagram of a normal mobile phone card;
FIG. 4-2 is a display diagram of a mobile phone card connection failure;
FIG. 5 is a schematic diagram of a background demonstration of a creator using a SIM card identity authentication system;
FIG. 6 is a schematic diagram of a background demonstration of local authentication using a SIM card identity authentication system;
FIG. 7 is a background functional demonstration of a SIM card identity authentication system;
FIG. 8 is a diagram of a background demonstration of SIM card identity authentication and point location;
FIG. 9 is a background demonstration of SIM card identity authentication and point location testing and point selection;
fig. 10 is a background demonstration diagram of a point location list of SIM card identity authentication and point location;
FIG. 11 is a diagram of a background demonstration of a SIM card movement trace query;
FIG. 12 is a diagram of a background demonstration of a SIM card mobile personnel list;
FIG. 13 is a diagram of a background demonstration of SIM card mobile personnel alignment and handling;
FIG. 14 is a schematic diagram of a background demonstration of a first activation in a SIM card cos system development and scenario application;
fig. 15 is a communication channel of the SIM card and the handset;
FIG. 16 is a diagram of a mobile billing system for value-added tax invoice based on a Bluetooth SIM card type tax control disc;
fig. 17 is a diversified function diagram of the bluetooth SIM card type mobile billing system;
FIG. 18 is a diagram of a real-name digital asset social ecology;
FIG. 19 is a flowchart of the operation of opening the door with the identification card;
FIG. 20 is a flow chart of public area access control with the addition of a list of authorized persons;
FIG. 21 is a flow diagram of a private area issuing an authority to enter a people list to a lock.
Detailed Description
The invention belongs to a mobile phone SIM card based on the fusion of a radio frequency communication module and multi-source data, which is characterized in that a radio frequency input module, a radio frequency output module, a memory, an arithmetic unit and a controller are embedded in the basis of the existing carrier of the mobile phone SIM card, a software operation environment is established at the same time, a complete physical structure system with the functions of input, output, storage, calculation, control and the like is established in the SIM card, a material basis is provided for the operation of mobile phone SIM card software, the multi-source data such as national personal network numbers, biological authentication comparison samples, personal certificates, personal application cards and the like and the SIM card physical structure system are integrated, and the written multi-source data are processed into respectively usable data through the operation of the SIM card software. On the basis, multi-source application data such as national personal network numbers, biometric authentication comparison samples, personal certificates, personal application cards and the like are written, and a mobile phone SIM card collecting system (shown in a figure 1-1 (2)), a figure 1-2(1) and a mobile phone SIM card collecting system (shown in a figure 2 (1)) are completed. And other systems (see fig. 2, (2), (3), (4), (5) and (6)) are linked to realize the whole system scheme and functional flow.
The specific implementation mode of the invention is as follows:
1. the system for implementing the invention comprises (as shown in figures 1-2 and 2):
(1) mobile phone SIM card
(2) SIM card reader of mobile phone
(3) Applying an alarm system to a mobile phone SIM card scene;
(4) a mobile phone SIM card data read-write manager;
(5) a mobile phone SIM card data read-write management platform;
(6) and a mobile phone SIM card reader supervision platform.
2. The implementation steps of the invention are as follows: 3 groups of data, the 1 st group of data national personal network number, the 2 nd group of data biometric authentication comparison sample, the 3 rd group of data personal certificates, personal application cards and other multi-source data are written in the mobile phone SIM card set system, and the 3 groups of data need to perform data interaction with mobile phone APP identification software and a mobile phone SIM card reader, so a Near Field Communication (NFC) radio frequency communication module and a Bluetooth (BLE) radio frequency communication module are embedded to form a complete software and hardware working system.
The data writing workflow is as follows:
firstly, writing a personal biometric authentication comparison sample into a mobile phone SIM card as a real-name mobile phone mobile personnel identification comparison source;
secondly, writing multi-source data such as personal certificates and personal application cards into the SIM card of the mobile phone, and calling the multi-source data only if the comparison between the personal identity of the mobile phone and the biometric authentication comparison sample in the SIM card of the mobile phone is successful;
thirdly, writing the national personal network number data into the mobile phone SIM card and binding the national personal network number data with other data sources to form that all data in the mobile phone SIM card are hidden in a national personal network number data packet after being encrypted, and all data in the mobile phone SIM card only open the national personal network number to the outside.
The data operation workflow is as follows:
the method comprises the steps that a mobile phone acquires face information or voice information of a user through a mobile phone camera or a sound pick-up (see the picture 1-1 (1)) and inputs the face information or the voice information into a mobile phone APP identity authentication and identification software cache region, then the mobile phone APP identity authentication and identification software acquires a personal biological authentication comparison sample from a mobile phone SIM card through a mobile phone SIM card Bluetooth (BLE) radio frequency communication module (see the picture 1-1 (2)) and compares the personal biological authentication comparison sample with the face information or the voice information acquired by the mobile phone cache region, and if the comparison is successful, data in the mobile phone SIM card are activated, a mobile phone SIM card reader can read the data in the mobile phone SIM card through a mobile phone SIM card Near Field Communication (NFC) radio frequency communication module (see the picture 1-1 (2));
in the step (2), the SIM card reader reads the information in the SIM card through a Near Field Communication (NFC) radio frequency communication module, and meanwhile, the SIM card reader is superposed with the doorplate number track information point position of the installation place of the SIM card reader;
and (3) performing data exchange after receiving the comprehensive information in the step (2), completing the due function in the step (3) by the SIM card scene application alarm system, and performing data reading by a multi-service application output interface (see the figure 2 and 3) to realize services such as data exchange, currency payment and the like.
In the step (4), the SIM card data manager of the mobile phone can register and update the data of the SIM card data fusion system of the mobile phone in the step (1);
in the step (5), the SIM card data read-write management platform can also register, update, supervise and manage the data of the mobile phone SIM card data fusion system in the step (1);
and (6) uniformly managing the data generated in the steps (2) and (3) by the SIM card reader supervision and management platform, and positioning the track information points generated in the step (2) in the step (6) to form synthetic track line information and track plane information.
3. The details of the present invention and the functions of the modules (refer to fig. 1-2 and fig. 2) are shown;
(1) the mobile phone SIM card data fusion system comprises:
firstly, the function of a national personal network number system (equivalent to a data warehouse key code);
secondly, the SIM card Near Field Communication (NFC) module and the Bluetooth (BLE) module complete data exchange with a SIM card reader of the mobile phone, the SIM card Bluetooth (BLE) module is linked with mobile phone identification software, so that the mobile phone can directly call a personal biometric authentication comparison sample written in the SIM card in advance to be compared with a personal biometric characteristic value acquired currently by the mobile phone, comparison result data are returned to the SIN card by the Bluetooth (BLE) module, if the comparison is successful, the SIM card can be activated to be successfully applied, otherwise, the SIM card data cannot be applied;
thirdly, a mobile phone SIM card data exchange control system (selects the content needing to exchange data with a mobile phone SIM card reader);
fourthly, the biological comparison sample is in a single machine version (a mobile phone APP identity authentication software system), and the mobile phone (person and certificate integrated identity authentication) is completed, so that the biological countercheck sample attack is also prevented;
fifthly, comparing results of the biological person and the certificate (if the comparison is successful, selecting data contents needing to be exchanged for activation according to the fourth step);
automatically generating an authority ID number of the SIM card (if the comparison is successful, automatically generating the authority ID number so as to compare with an authority ID library);
seventhly, selecting and binding documents and applying (binding document data to be exchanged and national personal network numbers) according to the documents;
extracting characteristic values of the samples of the mobile personnel (extracting the characteristic values of the human faces matched with the blacklist library in the comparison process so as to be compared with the characteristic values of the database);
ninthly, a mobile phone biological acquisition camera (biological characteristic acquisition is carried out on the mobile phone when the function is realized);
r, all personal certificate data (ciphertext), (all personal certificate data are encrypted and stored after being fused);
Figure RE-GDA0003730308500000101
all personal card data (ciphertext) (all personal card data are encrypted and stored after being fused);
Figure RE-GDA0003730308500000102
a mobile phone APP biological identification algorithm and a control system (biological characteristic data collected by the mobile phone is compared with biological characteristic data in the SIM card by the mobile phone APP biological identification algorithm, and data calling is completed by the mobile phone APP biological identification control system);
Figure RE-GDA0003730308500000103
original function system of mobile phone SIM card (in the mobile phone SIM card)The original communication function).
(2) SIM card reader of mobile phone
Firstly, a multi-service application output interface (a mobile phone SIM card reader is an interface for different users respectively, and can provide channels for identity authentication, data exchange and currency payment in different fields and different industries);
secondly, a data uploading interface (for uploading the data in the step (2) and carrying out supervision and management on the data in the step (6));
thirdly, relevant data feedback receiving (in the process of identity authentication in an application scene, identity authentication information is uploaded to a mobile personnel database, and information which is successfully compared immediately feeds back to an authentication field so as to capture);
a positioning number superimposer (the mobile phone SIM card application scene applies the installation position of the card reader, namely the doorplate number and the GIS to be superimposed to form the integration of an electronic map and a mobile point);
fifthly, comparing the authority ID numbers of the SIM cards (a biological characteristic value authority ID number library established by the application scene card reader of the SIM card of the mobile phone, wherein the authority ID numbers are equivalent to a password library);
sixthly, a data exchange (decryption) control system (the SIM card application scene application card reader of the mobile phone reads a data ciphertext from the SIM card and needs to decrypt and bind with related data);
seventhly, a near field communication module (providing a data exchange channel with a mobile phone SIM card);
and (8) an Application Program (API) function interface (for expanding the application range of the user service and providing a channel for developing the SDK function for a third party).
(3) Mobile phone SIM card scene application alarm system
Firstly, alarming one-touch of the home (after the scene application alarm system of the SIM card of the mobile phone receives the alarm information, the related personnel of the home can receive the same whole information content by pressing the one-touch so as to process in time);
secondly, displaying personal identity characters (displaying basic character information of the criminal suspect);
thirdly, a scene application alarm interface (for receiving alarm information sent by a mobile phone SIM card application scene application card reader);
fourthly, a sound alarm (sending out voice alarm information);
fifthly, displaying video information of the criminal suspect by a video emergency alarm display;
sixthly, a scene application duty watch (which displays the duty personnel list and duty of the duty station);
and (c) applying a visual manager to the scene (except that the alarm information is displayed in a local visual mode, the alarm information and the positioning information can be shared to be fixed in the attribution and flow to the police force).
(4) Data read-write manager for mobile phone SIM card
A Near Field Communication (NFC) module (providing a data exchange channel with a mobile phone SIM card);
writing and reading SIM card data (reading and writing SIM card data of a mobile phone);
thirdly, a data remote uploading interface (completes communication supervision between the SIM card data read-write manager and the SIM card data read-write management platform);
fourthly, encrypting and decrypting the SIM card data (encrypting and decrypting the data in the SIM card of the mobile phone according to the national encryption standard);
checking and signing SIM card data (checking and signing responsibility for data written into the SIM card of the mobile phone);
and sixthly, editing the data written by the SIM card (finishing preliminary verification and registration combing of the data written into the SIM card of the mobile phone).
(5) Mobile phone SIM card data read-write management platform
Interface of data remote management platform (for completing data exchange between SIM card data read-write management platform and SIM card data read-write manager and SIM card)
Secondly, a mobile phone SIM card comprehensive visual real-time supervision and management alarm system (a visual automatic alarm picture is popped up for relevant information in a police service command hall);
thirdly, a mobile phone SIM card data reading and writing system (completes the control, calculation and storage of the data writing and reading of the mobile phone SIM card and the mobile phone SIM card reading and writing manager);
fourthly, updating the SIM data of the mobile phone (updating the data in the SIM card according to the objective change of the household registration management data and the application data);
a mobile phone SIM card biological characteristic data supervision and management system (according to the objective change of the citizen identity biological characteristic data, updating the biological comparison sample single-edition data in the SIM card);
sixthly, registering and managing the SIM card of the mobile phone (completing registering and managing the SIM card of the newly accessed mobile phone).
(6) Mobile phone SIM card reader supervision platform
Firstly, a data remote management platform interface (which is a data management interface for (6) supervision and (2));
a card reader registration management system (for performing registration management on a newly installed SIM card reader of the mobile phone);
thirdly, mobile phone SIM card point positioning and GIS superposition (point positioning information is formed into surface track information);
fourthly, a mobile phone SIM card positioning track generating system (generating multi-azimuth multi-image layer line and plane omnibearing track information);
fifth, handset SIM card track inquiry monitoring system (can provide authority inquiry download, browse and abnormal automatic alarm interface)
Sixthly, a GIS management and alarm information returning system (for (6), abnormal alarm information found can be timely returned to a scene application site);
seventhly, comparing the database interface with another database (calling scene identity authentication data to compare with the matched data);
the SIM card authority ID number management system carries out unified supervision and management on the authority ID numbers generated in the step (1) and the authority ID numbers established in the step (2);
ninthly, managing the visual real-time alarm system of the platform (realizing visual automatic pop-up alarm picture for the alarm information in the police service command hall).
As shown in most 6 (see fig. 1-2) above, and as shown in 49 application functions (see fig. 2), after the workflow connections (see fig. 1-2 and fig. 2) are performed, the functions of all application scenarios described in the patent claims can be realized. For the implementation mode of the main application scene of the invention, the method mainly comprises the following steps: identity authentication and positioning, track query, relevant data comparison and disposal, certificate reading, data interaction and payment. The system architecture diagram is shown in fig. 3.
One of application scenarios: identity authentication and location
1. Identity authentication on mobile phone
The SIM card identity authentication system is shown in figure 4, and an icon on a mobile phone is shown as a graph shown in figure 4-1 to indicate that the mobile phone card is connected normally, and a graph shown in figure 4-2 indicates that the mobile phone card has a fault and needs to be processed.
2. Identity authentication on mobile phone
As shown in fig. 5, a person sample is created on a mobile phone, in the process, card issuance is simulated, a piece of person information is generated in a system background, and when the person sample is created, two photos can be selected, one is a normal face photo, and the other is a mask wearing photo, so that recognition can be performed without taking off the mask.
3. Identity authentication on mobile phone
As shown in fig. 6, after the sample of the created person is successful, the identification of the witness can be performed, after the identification is passed, information in the sim card is activated, and operations such as unlocking, door opening prohibition, scene data interaction, payment certificate reading and the like can be performed, and when the identification of the witness is failed, none of the operations can be performed.
The system is provided with a health identification interface and can interact with any health information.
4. Mobile phone function demonstration
As shown in fig. 7, the license reading function can call and refer to the identity card and all the contents of the certificate stored in the mobile phone. Advanced pedestrian and certificate integrated comparison and identification are carried out, after identification is successful, the certificate is clicked and read, and the mobile phone certificate check interface is accessed for checking.
5. Positioning for card swiping
(1) Brush mobile phone door
Firstly, carrying out combined authentication and identification on the mobile phone, and after the authentication is successful, approaching a mobile phone sim card part to a door lock card reading area to unlock the door lock. If the verification is unsuccessful or not, the door lock cannot be opened.
(2) Data transmission
After the mobile phone card swipes the door lock, whether the card swiping record and the positioning information is successful or not, the card swiping record and the positioning information can be uploaded to a back-end platform, the mobile phone card enters a personnel track library, and personnel tracks can be checked through a background management interface.
(3) Comparison of related data
If the card swiping user is a person in related data, a piece of contrast alarm information can be formed in the background, an alarm sound is sent out in the background, an alarm prompt is popped up, and meanwhile, the alarm information can be pushed to the front end through a background management function and an alarm is given.
6. Background demonstration
(1) Sim card identity authentication and spot location
At the system background management end, Sim card identity authentication and point positioning are selected, and corresponding operations can be performed, as shown in fig. 8.
(2) Sim card identity authentication and spot location
Testing and selecting points: as shown in fig. 9, for convenience of demonstration, the position of the simulated test point is selected, and the next time the card is swiped, the position is recorded.
Point location list: as shown in fig. 10, all installed SIM card reader sites are listed, and clicking the card reader site menu can view the site location information record list.
Application scenario two: sim card movement trajectory query
As shown in fig. 11, the system background management end fills in the id number of the person to be queried, and can find out the point, line and surface information of the person.
Application scenario three: sim card mobile personnel related data comparison and visual emergency disposal
1. Data uploading comparison after card swiping
And (3) swiping a card by using the sim card part of the mobile phone to approach a door lock or an entrance guard card reading area, and uploading card swiping record and positioning information to a system background to form track information and compare whether the card swiping record and the positioning information is successful or not.
2. Comparison of related data
If the card swiping user is a person in the non-relevant data, the door lock or the entrance guard is opened. If the card swiping user is a person in the related data, a piece of contrast alarm information is immediately formed in the background.
3. Visual emergency disposal
After the alarm information is generated, the background sends out an alarm sound, an alarm prompt is popped up, and the alarm prompt can be checked through a background management interface. Meanwhile, the alarm information is pushed to a front-end entrance guard, and emergency treatment can be carried out at the first time.
The background demonstration is as follows:
sim card mobile personnel related data comparison and disposal
As shown in fig. 12, the personnel list in the relevant database lists all relevant database personnel, and one of the personnel is clicked to check the card-swiping record of the personnel.
And (3) recording the card swiping of the personnel in the related database: as shown in fig. 13, a list of people in all ratios is listed and the treatment results for that person are indicated.
The sim card cos system development and scene application background demonstration of the invention
First activation
As shown in fig. 14, for a newly added card reading device, activation is required through this function, and the device is added to the background device library.
(II) Intelligent park & Intelligent traffic applications
The Bluetooth SIM card is installed in the mobile phone, and the mobile phone is a bus card and a park card
Using the APP, opening the card on line and recharging on line;
operating the mobile phone without lighting, and taking a car by swiping a card once;
based on RCC channels, accurately brushing the mobile phone by 4-6 cm;
transaction speed experienced well within 300 milliseconds.
(III) Internet bank SIM shield
New-generation mobile banking security authentication tool
The mobile phone SIM shield implants the security authentication data into the mobile phone SIM card by adopting a hardware encryption technology, so that a security barrier is added for large-amount transfer payment, and payment transaction is relieved.
The advantages are that:
the SIM card and the U-Key are combined into one, so that the mobile phone is more portable;
the payment limit is increased, and the cumulative amount of the single daily transfer is up to 500 ten thousand yuan.
The SIM card supports operating systems including apple, android, and the like, and has a compatibility rate of an intelligent system close to 100%, and a transmission channel with a mobile phone is shown in fig. 15.
(IV) application of intelligent door lock of security house
The identity card/the door lock key is installed in the mobile phone, and the mobile phone is used for unlocking.
Network card and high-safety Bluetooth SIM card
The advantages are that:
portable easy-to-use: installing an identity card network card into a mobile phone SIM card, wherein the mobile phone is the identity card;
safety door opening: the mobile phone is unlocked by using the identity data, so that the management is standard, the supervision is convenient, and the safety and the reliability are realized;
triple protection: the security chip, the security operating system and the personal password are protected more safely;
real name anti-subletting: and the management efficiency is improved.
(V) Mobile billing tax control disk
Bluetooth SIM card type mobile billing system
The State tax administration develops a mobile value-added tax invoice invoicing system based on a Bluetooth SIM card type tax control disc by relying on the concept of 'Internet + tax', as shown in figure 16. The billing requirement of small, medium and small individual industrial and commercial customers is met, and the problem of shortage of billing personnel for dealing with value-added tax common invoices of tax bureaus is solved.
The advantages are that:
free from the limitation of time and space, the mobile equipment makes an invoice anytime anywhere;
the mobile billing APP can finish ticket collection and tax copying and declaration without running a tax bureau;
the electronic invoice, the short message, the WeChat, the mailbox and the tax cloud platform deliver the invoice, so that the characteristic of convenience and timeliness is realized;
identity authentication: the user identity is legal and the login is safe;
confidentiality: sensitive data can be declared to be encrypted and transmitted by a Bluetooth SIM card, so that leakage and tampering are prevented;
non-repudiation: and the declaration data is digitally signed, so that the authenticity and non-repudiation of the declaration information are guaranteed.
(VI) digital authentication (CA)
Bluetooth SIM card type mobile billing system
High safe bluetooth SIM card can store individual CA certificate, enterprise CA certificate, and examining and approving, signing in-process, APP reads the certificate information in the SIM card, utilizes the means of electronization to get rid of contact printing, physics signature, contract make a round trip express delivery, the loaded down with trivial details management process such as paper contract is filed, as shown in FIG. 17, lets the official seal of each organization safe controllable, carries out electronization examination and approving, signing anytime and anywhere, lets the organization operation process convenient, safe.
(seventh) B-SIM card: security entrance to value internet in 5G era "
The block chain encryption algorithm is integrated in the SIM card, the safety, the confidentiality and the convenience of digital asset management are supported, and the social ecology of the real-name digital asset is shown in figure 18.
The working process of the mobile phone identity card in the invention is explained as follows:
the workflow of opening the door by using the mobile phone identification card is illustrated, and the flow diagram is shown in fig. 19:
the method comprises the following steps: and the mobile phone camera carries out face recognition, and a face recognition algorithm of Taishou is adopted. After identification, comparing the face characteristics with the face characteristics pre-stored in the Sim card, and after the comparison is successful, indicating that verification of the combination of the testimony and the testimony is finished;
step two: after the verification of the combination of the person and the certificate is successful, the verification success information and the identity information are written into the data position in the card, and the card swiping preparation is made. The effective time of the data is one minute, and after one minute, the data position data is removed;
step three: when the card is swiped, the mobile phone card part is close to the position of the equipment card reader, the card reader reads information in the data bit after recognizing the card, and the protocol of the card reader can be RCC, NFC and other near field communication protocols to finish the card reading operation. Judging whether the data is an unlocking command or not, judging whether the identity information is in a white list of the door lock or not, and if the data is the unlocking command and the identity information is in the white list, executing unlocking operation;
step four: if the equipment, the entrance guard, the card port and the like in the public area exist, and the card reading equipment is in a networking state, the equipment uploads the door opening information, including identity information, specific position of the equipment and other superimposed geographic position information to a background server, and track information is generated at a service supervision end; if the equipment is in a non-network state, only the door opening action is executed, and data uploading is not performed;
step five: if the equipment is personal equipment such as a home door lock, the equipment processes a non-network state, can smoothly open the door lock and does not upload information to a system background.
(II) a white name adding single flow of the public area access control, wherein the flow schematic diagram is shown in FIG. 20:
the method comprises the following steps: the entrance guard of the public area is managed uniformly by the background, and when one entrance guard device is added, the information of one device is formed in the background and comprises the information of the number, the position, the model, the related data and the like of the device;
step two: the equipment processes the networking state, and when the related data needs to be added, the background issues the related data to the equipment through the network;
step three: when the equipment is in an off-line state, a maintenance computer is required to be carried to increase related data, and issuing operation is carried out after the equipment is connected on site.
(III) the private area issues a white name single flow to the lock, and the flow diagram is shown in FIG. 21:
the method comprises the following steps: private door locks are typically in a no-net state;
step two: and the mobile phone camera carries out face recognition and adopts a face recognition algorithm. After identification, comparing the face characteristics with the face characteristics pre-stored in the Sim card, and after the comparison is successful, indicating that verification of the combination of the testimony and the testimony is finished;
step three: the method comprises the following steps that firstly, the mobile phone acquires door lock information, the door lock information is inquired in the background, if the door lock is in a primary installation state, the door lock and the identity of a user are bound in the background, and the operation on a white list of the door lock in the later period can be only carried out by identity personnel;
step four: when the mobile phone card identity has the authority of a door lock administrator, related data can be added to the door lock;
step five: when the white list is added, firstly, the verification of the person-certificate-in-one is completed, after the verification is successful, the mobile phone writes the identity information and the instruction for adding the white list into the Sim card, and the content is reset after one minute;
step six: the mobile phone is close to the card reading device, the card reader reads the identity information and the command in the Sim card, and when the identity information and the command are judged to belong to the related data command, the identity information is written into the related data of the door lock.

Claims (9)

1. A method for realizing data offline interaction between a mobile phone and an SIM card is characterized in that an input module and a radio frequency output module are arranged on the SIM card of the mobile phone, wherein the SIM card is provided with a memory, an arithmetic unit and a controller, the input module is used for carrying out data interaction with biological identification APP software in the mobile phone, and the radio frequency output module is used for carrying out data interaction with an SIM card reader through a near field communication module.
2. The method as claimed in claim 1, wherein the rf input module is a bluetooth rf module, and the output module is near field communication or other communication methods.
3. The remote supervisory control method based on the mobile phone card is characterized by comprising the following steps: (1) storing a series of comprehensive application data of national personal network number, a biometric authentication comparison sample, personal certificates, a personal application card, health information and social attributes in the SIM card of the mobile phone as claimed in claim 1 or 2; (2) collecting personal biological information by a mobile phone camera; (3) the mobile phone inputs personal biological information acquired by a camera into mobile phone APP biological identification algorithm software, and then the mobile phone APP biological identification algorithm software calls a biological authentication comparison sample stored in an SIM card in advance from the mobile phone SIM card to compare with the acquired personal biological information; (4) when the comparison result is consistent, the mobile phone APP outputs confirmation information to be fed back to the mobile phone SIM card and activates the SIM card, and after the SIM card is activated, the SIM card reader can access the SIM card offline; the SIM can not be accessed when the comparison result is not in accordance; (6) when the SIM card of the mobile phone can be accessed by the SIM card reader of the mobile phone, the access information is uploaded to the monitoring platform connected with the card reader, and the monitoring platform can remotely complete the set monitoring content on line.
4. The remote supervisory control method according to claim 3, wherein the SIM card is written with national personal network number, biometric authentication comparison sample, personal certificate, personal application card, health information, social attribute type comprehensive application data; after all information in the SIM card of the mobile phone is encrypted, a national personal network number label is attached, and the label is a public code of mobile phone mobile personnel and mobile phone internet surfing personnel; and all information used in the mobile phone SIM card is managed by a special supervision platform for the mobile phone SIM card and the mobile phone SIM card reader, the supervision platform has the functions of writing, updating, supervising and managing the data of the mobile phone SIM card, and can also perform registration permission and data query supervision functions on the mobile phone SIM card reader.
5. The remote supervisory control method according to claim 3, wherein said application scenarios include, but are not limited to, the following scenarios: the mobile phone SIM card reader can also be applied to 'one-standard three-real' authenticity supervision, a fire-fighting smoke detector, a television set top box, an electronic door lock, an airplane door bin, a railway train, a road vehicle, a waterway ship, a field landmark object, equipment and a wire pole.
6. The remote supervisory control method according to claim 3, wherein said application scenarios include, but are not limited to, the following scenarios: and the payment of the digital RMB, certificate checking, data interaction, remote identity authentication, signature and credit investigation data are completed.
7. The remote supervisory control method according to claim 3, wherein the SIM card reader of the mobile phone can compare the biological information in the SIM card with the biological information of the personnel in the mobile personnel bank in the supervisory platform when reading the SIM card of the mobile phone, and if the comparison is successful, an alarm can be given immediately, and the alarm information can be returned to the real-name authentication site in real time.
8. The remote supervisory control method according to claim 3, wherein the geographical position number or doorplate number information installed on the mobile phone SIM card reader is bound with an electronic map installed in the mobile phone SIM card reader, the mobile real-name system track information of the mobile phone, the geographical position number information installed on the mobile phone SIM card reader and the electronic map information are overlapped and fused into a whole, so that a track mark of a mobile phone mobile personnel real-name system point positioned on the electronic map is formed, and the mobile phone SIM card reader is linked with a background to realize a mobile personnel track query function, a blacklist comparison function, a field alarm function, a remote visual supervisory function and a comprehensive alarm function.
9. The remote supervisory control method according to claim 3, wherein the mobile phone owner compares his/her biometric features with the mobile phone SIM card biometric sample when making a call, real-time on-line real-name authentication is performed, and the SIM card cannot be activated when the authentication is not in compliance, thereby effectively preventing telecommunication fraud.
CN202111602760.6A 2021-10-04 2021-12-24 Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method Pending CN114945167A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2021111684438 2021-10-04
CN202111168443 2021-10-04

Publications (1)

Publication Number Publication Date
CN114945167A true CN114945167A (en) 2022-08-26

Family

ID=82906082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111602760.6A Pending CN114945167A (en) 2021-10-04 2021-12-24 Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method

Country Status (1)

Country Link
CN (1) CN114945167A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550902A (en) * 2022-10-31 2022-12-30 中国联合网络通信集团有限公司 Security data updating method, USIM, terminal, device and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1514635A (en) * 2003-04-29 2004-07-21 叶丰平 Method of realizing mobile electronic business using finger print intelligence terminal and intelligent hand set
CN103813041A (en) * 2012-11-15 2014-05-21 中国电信股份有限公司 Method and system for controlling communication behavioral capacity of mobile phone terminal
CN104156751A (en) * 2013-08-28 2014-11-19 陕西省公安厅 Research based on phone card and identity document
CN105023106A (en) * 2015-07-28 2015-11-04 艾体威尔电子技术(北京)有限公司 Attendance management method and system based on intelligent NFC tag
CN105303656A (en) * 2015-09-22 2016-02-03 广州盛华信息服务有限公司 Intelligent access control system based on CA (certification authority) technical application identification
CN205384622U (en) * 2016-02-18 2016-07-13 公安部第一研究所 It is alert with multi -functional ID card recognition system based on tall and erect application of ann
CN105894272A (en) * 2016-04-05 2016-08-24 南昌大学 Bus instant payment method and payment, recharge and query system based on mobile phone APP
CN107230079A (en) * 2016-03-25 2017-10-03 中国人民银行印制科学技术研究所 The method and system of offline electronic payment are carried out using digital cash chip card
CN113179490A (en) * 2021-04-20 2021-07-27 孙为新 Emergency dialing technology and track tracking method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1514635A (en) * 2003-04-29 2004-07-21 叶丰平 Method of realizing mobile electronic business using finger print intelligence terminal and intelligent hand set
CN103813041A (en) * 2012-11-15 2014-05-21 中国电信股份有限公司 Method and system for controlling communication behavioral capacity of mobile phone terminal
CN104156751A (en) * 2013-08-28 2014-11-19 陕西省公安厅 Research based on phone card and identity document
CN105023106A (en) * 2015-07-28 2015-11-04 艾体威尔电子技术(北京)有限公司 Attendance management method and system based on intelligent NFC tag
CN105303656A (en) * 2015-09-22 2016-02-03 广州盛华信息服务有限公司 Intelligent access control system based on CA (certification authority) technical application identification
CN205384622U (en) * 2016-02-18 2016-07-13 公安部第一研究所 It is alert with multi -functional ID card recognition system based on tall and erect application of ann
CN107230079A (en) * 2016-03-25 2017-10-03 中国人民银行印制科学技术研究所 The method and system of offline electronic payment are carried out using digital cash chip card
CN105894272A (en) * 2016-04-05 2016-08-24 南昌大学 Bus instant payment method and payment, recharge and query system based on mobile phone APP
CN113179490A (en) * 2021-04-20 2021-07-27 孙为新 Emergency dialing technology and track tracking method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550902A (en) * 2022-10-31 2022-12-30 中国联合网络通信集团有限公司 Security data updating method, USIM, terminal, device and medium
CN115550902B (en) * 2022-10-31 2024-03-19 中国联合网络通信集团有限公司 Security data updating method, USIM, terminal, equipment and medium

Similar Documents

Publication Publication Date Title
CN111553767B (en) Shared house leasing system, method and storage medium based on block chain
CN108091012A (en) The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN108540449B (en) Intelligent seal control method and system and computer storage medium
CN104240342A (en) Access control method and device
CN106453874B (en) Mobile phone control method and system
CN204926094U (en) System based on authentication is carried out to biological characteristics information
JP2013242886A (en) Application data relating to logical and physical securities
CN107734158A (en) The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN103745397A (en) System and method for realizing electronic transaction risk control based on position scene identification
CN102880955B (en) A kind of high safety with fingerprint method of payment
CN201508555U (en) Internet bar management system based on face recognition
CN103295341A (en) POS (point-of-sales) safety certification device, POS safety certification system and POS device safety certification method
CN110008676A (en) A kind of personnel's multidimensional challenge and true identity discrimination system and method
CN104240013A (en) Door access control method and door access control platform
CN107689097B (en) Synchronizing Passwords based on frequency hopping generate and verify system and its application
CN100541532C (en) The method of stamped signature centralized management and delegable Electronic Signature safety
CN110599653B (en) Access control unlocking method, device and storage medium
CN104240014A (en) Door access control method and door access control platform
CN110021085A (en) A kind of open-door system and method for barcode scanning parallel proof
CN203350880U (en) POS safety certification device and system
CN108460876A (en) A kind of time sync-type Quick Response Code guard method and system
CN112734248A (en) Real estate intelligent management system
CN103996035A (en) Passenger security check identity certification product
CN114945167A (en) Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method
CN107833033A (en) A kind of method that registration card transaction illegal activities are docked with Skynet system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination