CN103530553A - Mobile terminal with authorization card and authorization method - Google Patents

Mobile terminal with authorization card and authorization method Download PDF

Info

Publication number
CN103530553A
CN103530553A CN201310497527.5A CN201310497527A CN103530553A CN 103530553 A CN103530553 A CN 103530553A CN 201310497527 A CN201310497527 A CN 201310497527A CN 103530553 A CN103530553 A CN 103530553A
Authority
CN
China
Prior art keywords
mobile terminal
authorization card
authorization
card
interface circuit
Prior art date
Application number
CN201310497527.5A
Other languages
Chinese (zh)
Inventor
赵志超
孙涛
赵华太
Original Assignee
山东神思电子技术股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 山东神思电子技术股份有限公司 filed Critical 山东神思电子技术股份有限公司
Priority to CN201310497527.5A priority Critical patent/CN103530553A/en
Publication of CN103530553A publication Critical patent/CN103530553A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a mobile terminal with an authorization card and an authorization method. According to the mobile terminal with the authorization card and the authorization method, software is replaced with hardware, and the authorization card can be separated from the body of the mobile terminal; similar to hardware encryption, the authorization card needs to be used when matched operation with authorization required is conducted, and the authorization card is not needed when other ordinary operation is conducted. Accordingly, usage is not affected, limited operation can not be conducted when the authorization card is unavailable, so that operation, such as rewriting into a system, caused by the missing of the mobile terminal is effectively avoided, and the mobile terminal can be retrieved more easily.

Description

A kind of mobile terminal and authorization method with authorization card

Technical field

The present invention relates to a kind of mobile terminal and the method to mobile terminal mandate, specifically the mobile terminal based on safety problem in built-in field.

Background technology

Mobile terminal is one of frequent equipment using of current user, as all kinds of handheld devices such as mobile phones.The portability of mobile device brings great convenience to user, but simultaneously also to user, has brought the easily puzzlement of stolen, easy loss of mobile terminal.

Along with becoming increasingly abundant of mobile terminal application, mobile terminal, not only for meeting user's communication need, also provides as online working, has exchanged the services such as amusement.This just will inevitably be on mobile terminal the sensitive data such as memory communicating record, account number cipher, daily record of work.Therefore the loss of mobile terminal not only can be brought loss economically to user, also may be because the potential loss that the sensitive data existing on mobile terminal causes.Therefore can guarantee that it is not the research direction that need to be concerned by leakage that mobile terminal is lost rear sensitive data.

In prior art, already existed protecting sensitive data and mobile terminal in the time of can solving mobile terminal and lose to give the relevant solution of problem for change.These solutions are mostly after lost terminal, by modes such as note, phone, passwords, mobile terminal can not normally be used, yet this class solution only can be protected the safety of data in mobile terminal, but can not guarantee that mobile terminal is given for change.Reason is that these solutions are all realized by software, and after terminal system is write again, mobile terminal can be reused, thereby can not fundamentally solve the problem that mobile terminal is lost.

And in other are realized, by radio-frequency technique (Radio Frequency Identification, RFID) etc. technology realizes the means such as mobile terminal warning and prevents that mobile terminal from losing, but in public arenas such as noisy market, buses, user is difficult to perceive mobile terminal and reports to the police, and can not fundamentally solve the problem that mobile terminal is lost.

Therefore, inventor thinks, after losing as mobile terminals such as mobile phones, do not have hardware mandate can not normally use and again writing system be very necessary, thereby, by hardware mode, replace software mode and propose a kind of new technology path.

Summary of the invention

In view of this, the object of the present invention is to provide a kind of mobile terminal with authorization card, in the solution of losing at mobile terminal, with hardware mode, replace software mode and produce a kind of new technology path.Meanwhile, the present invention also provides a kind of authorization method.

The present invention is by the following technical solutions:

According to one aspect of the present invention, a kind of mobile terminal with authorization card, the authorization card that comprises the individual packages of terminal body and given terminal body privileged operation, and adaptedly, terminal body the be provided with interface circuit of for both communicating by letter corresponding to authorization card.

Described interface circuit is adaptive slot interface circuit or serial interface circuit.

When interface circuit is slot interface circuit, corresponding authorization card is SD card, miniSD card or IF card, and when interface circuit is serial interface circuit, the communication interface of corresponding authorization card is USB interface.

Described authorization card comprises:

Interface circuit, adapts to authorization card type;

Tandom number generator, is connected in described interface circuit, to respond the request of mobile terminal, produces random number, by described interface circuit, returns this random number;

Crypto-operation engine, is connected in described interface circuit, receives the described random number of processing through terminal body, uses predetermined private key to sign, and passback mobile terminal is verified; And

Storer, is connected in interface circuit, tandom number generator and crypto-operation engine.

Described authorization card is based on internal bus, for the connection of packaged device.

Described storer disposes volatile memory and nonvolatile memory.

Authorization method according to a kind of mobile terminal of another aspect of the present invention, mobile terminal is separated with authorization card, and by authorization card individual packages, the packing forms of the authorization card of coupling individual packages, on mobile terminal, configure adaptive interface, thereby, when given Authorized operation need to be performed, authorization card is connected and obtains the authorization with mobile terminal, authorize by after carry out predetermined Authorized operation.

Mobile terminal configuration wireless communication module, and the running status of mobile terminal is divided into controlled mode and uncontrolled pattern, thereby after mobile terminal is lost, mobile radio telecommunications module by configuration triggers controlled mode, but operation under controlled mode can not move, and in the situation that authorization card is connected with mobile terminal, after authorizing and passing through, removes controlled mode and enter uncontrolled pattern.

Authorized operation based on authorization card comprises the step of authentication password.

The invention has the beneficial effects as follows and use hardware mode to replace software, authorization card wherein can be separated with terminal body, be similar to hardware encipher, when the operation of the needs mandate of mating, need to use this authorization card, and when the normal operations of carrying out in addition, do not need authorization card, neither impact is used, and when with no authorized card, the operation limiting can not be carried out, thereby effectively avoided mobile terminal to lose, carries out as the operation of writing system again.So more be conducive to giving for change of mobile terminal.

Accompanying drawing explanation

Fig. 1 is the foundation theory diagram with the mobile terminal of authorization card of the present invention.

Fig. 2 is the theory diagram of authorization card.

Fig. 3 is the partitioned organization schematic diagram of the Flash (flash memory) with the mobile terminal of authorization card.

Fig. 4 is the licensing process process flow diagram of authorization card and terminal body.

Embodiment

The concept that should be appreciated that authorization card is known by those skilled in the art, such as bank cashier authorization card, and current generally use, but on mobile terminal, owing to also not occurring similar operational version as reasons such as volume, portability.

The design of this case based on such, proposes a kind of mobile terminal with authorization card, and describes its implementation in following content, can effectively solve the problem that mobile terminal is lost rear protecting sensitive data, also can provide terminal management function simultaneously.During normal use, mobile terminal does not need authorization card normally to move, and when needs privileged operation, need to insert authorization card and authorize, and just can carry out privileged operation.

Be to be understood that, about the content of authorizing, those skilled in the art designs according to the requirement of mobile terminal, does not belong to the improved content of this case, the authorized content embodying in following example is only expressed as the content of associated exemplary, does not represent concrete restriction of the present invention.

In certain embodiments, the mobile terminal that has so an authorization card comprises embedded microprocessor, storer, communication module, authorization card.Wherein, communication module is used for carrying out message command with the external world and exchanges.Authorization card individual packages becomes as SD card form, or USB interface is provided, and is conveniently connected with terminal body.Authorization card should comprise tandom number generator, crypto-operation engine, volatile memory, nonvolatile memory and control interface.

In certain embodiments, terminal body can carry out following configuration, and terminal body, according to whether being divided into licensing mode and unauthorized pattern by mandate, is divided into controlled mode and uncontrolled pattern according to terminal body running status.

After terminal body loss, can be by receiving order as communication module, then make terminal enter controlled mode turning-off mobile terminal body, when terminal body reuses, need to insert authorization card, authorize after entering licensing mode and could normally start, if do not insert authorization card, prompting is inserted authorization card and is shown user's information, does not insert in the situation of authorization card and does not allow writing system again.

According to foregoing, mobile terminal due to user's with no authorized card, cannot be used terminal body and access terminal data after losing.User cannot restart terminal body by operations such as updating systems after finding terminal body.

With a specific embodiment, be described implementation process of the present invention below, but the present invention is not limited only to this embodiment.Content of the present invention contain anyly on core content of the present invention, make an amendment, equivalence, the various schemes of replacing.

The authorization card of the present embodiment is packaged into the form of SD card, and the present invention is not limited to the packing forms of SD card.For the ease of explanatory note, directly use mobile terminal to represent terminal body.

There is the mobile terminal of authorization card as shown in Figure 1, comprise following critical piece:

1) processor: central authorities process logical block, is responsible for the operation of data operation, instruction process, control mobile terminal etc.

2) storer: comprise ROM, RAM, FLASH, wherein ROM is for the not revisable start-up code of storage, and RAM is for the variable of storage running, and FLASH is for storage program, digital certificate and data;

3) communication module: communicate and data transmission etc. with miscellaneous equipment;

4) authorization card: carry out crypto-operation, realize the function of the required crypto-operation of licensing process and storage sensitive data;

5) other external unit.

Wherein, authorization card completes the associative operation of authorization function, and authorization card is the set of related hardware and firmware, and the memory function of crypto-operation function and sensitive data is provided.Authorization card is packaged into SD card, mini SD card, TF card (T-Flash claims again microSD), also can be advantageously connected to mobile device, to adapt to different mobile terminal demands.

The composition structure of authorization card is as shown in Figure 2:

1) control interface: authorization card control interface is the hardware interface of authorization card input and output, is the interface of mobile terminal accessing authorization card Resource Supply, and mobile terminal docks with this control interface by system IO interface.

2) tandom number generator: produce random number, for Authorized operation provides true random number.

3) crypto-operation engine: for Authorized operation provides crypto-operation.

4) volatile memory: the ephemeral data that storage authorization card produces when operation.

Nonvolatile memory: the data of storage permanent storage, generally store the sensitive datas such as key of authorization card, and subprogram and general data.

Authorization card is packaged into after SD form, and the reserved order by expansion SD agreement is realized.The major function that authorization card completes has: get random number, digital signature, certifying signature.Between authorization card and mobile terminal, mutual basic interface order meets the standard of SD protocol command.

This programme adopts SD explosion command, and command format is as shown in table 1:

Table 1 SD explosion command Data field

The definition of SD explosion command is as shown in table 2, by parameter field [10:8], is determined.

Table 2 Command definition Parameter [10:8] Remarks Get random number 001 Parameter [11:14] represents to get the byte number of random number Digital signature 010 Message M is carried out to digital signature, and [11:14] represents the length of message Certifying signature 011 Information signature is verified, [11:14] represents the length of message, and [15:20] represents the length of information signature

1) get random number: mobile terminal can take out a true random number by this order from authorization card, and concrete operation step is as follows:

A) mobile terminal sends and gets random number order to authorization card;

B) authorization card produces the random number of a request length by randomizer after receiving order, and returns to mobile terminal by the response of SD explosion command.

2) digital signature: mobile terminal can make authorization card with the private key of oneself, message M be signed by this order, and concrete operation step is as follows:

A) mobile terminal sends digital signature order to authorization card;

B) authorization card receives after order, calls crypto-operation engine and uses the private key of oneself to sign to message M, obtains the PRI{M} that signs, and signature PRI{M} is returned to mobile terminal by CMD60 command response.

3) certifying signature: mobile terminal can make the PKI that authorization card utility command transmits verify signature PRI{M} by this order, and concrete operation step is as follows:

A) mobile terminal sends certifying signature order to authorization card;

B) authorization card receives after order, calling the PKI that crypto-operation engine utility command transmits verifies message PRI{M}, if be verified, show it is that legal authorization card returns to 1, otherwise be that illegal authorization card returns to 0, by the response of SD explosion command, return to mobile terminal.

The guidance code of mobile terminal leaves in ROM, guidance code can not be changed, and the major function of this part code is to realize the initialization of basic hardware, FLASH management, detect mobile terminal pattern (controlled mode and uncontrolled pattern), the basic function of empowerment management and boot.

The FLASH storage and distribution of mobile terminal as shown in Figure 3, is followed successively by sensitive data district, system program district, application area, data field.Wherein, sensitive data district, system program district are read-only under unauthorized pattern, are only to change after authorizing.Authorization card digital certificate is deposited in sensitive data district, the sensitive datas such as user name password, mode flags, and the operation code of system program district storage system, deposit application area and data field, the code of application program and user data.Wherein, the mode flags in sensitive data district is revised as controlled mode under unauthorized pattern, but can not revise uncontrolled pattern by controlled mode.

Sensitive data district, system program district are read-only under unauthorized pattern, after authorizing, are only and can change.Therefore revising sensitive data and again all needing the licensing process by authorization card during updating system.The process of change sensitive data and system program is as follows:

A) mobile terminal detects authorization card, if authorization card execution step b detected; Otherwise execution step d;

B) mobile terminal request mandate, passes through if authorize, and performs step c; Otherwise execution step d;

C) revise sensitive data or system program;

D) refusal is revised sensitive data or system program, closes a terminal.

E) licensing process of mobile terminal is as shown in Figure IV:

F) whether mobile terminal checking is authorization card, if authorization card sends and gets random number order to authorization card;

G) authorization card receives after random number order, calls tandom number generator and produces random number, and random number is returned to mobile terminal;

H) repeating step a, b are many times;

I) acquisition for mobile terminal, to after these a plurality of random numbers, is upset the order of random number connect, and then random getting N time got 1 byte at every turn, obtains the random number of a common N byte.

The random number sending obtaining to authorization card is carried out the order of digital signature;

Authorization card receives after signature order, and oneself signature private key of use authority card is signed to random number, and signature is sent to mobile terminal;

Mobile terminal receives after signature, utilizes the PKI that is stored in authorization card in FLASH to verify random number signature, enters uncontrolled pattern if be verified, normal boot-strap, otherwise close mobile device.

Have authorization card mobile terminal after loss, user can be by mobile terminal locking, and by authorization card, mobile terminal solution is locked, and concrete steps are as follows:

1) user can be by network to sending Text Command, and command format is as shown in table 3:

Table 3 Beginning flag User name+# Password # Command context End mark

As #*zzc#zzc123#shutdown*#

Command context wherein

Table 4 command context function shutdown close a terminal, and enter controlled mode. lock locking terminal, and enter controlled mode, only allow to dial designated telephone.

2) mobile terminal receives after order, resolve user name password, and whether authentication of users name password is correct, if correct, makes mobile terminal enter controlled mode, and turning-off mobile terminal; If incorrect, do not carry out any operation.

3) in controlled mode, when reusing mobile phone, user points out insertion authorization card, the essential informations such as demonstration user's name, contact method, and guide user to give back mobile device.

System is restarting or during screen locking, prompting user input command, if continuous 3 password mistakes enter controlled mode, needs to insert authorization card and carries out just can normally using after Authorized operation.

Mode by password and authorization card combination can guarantee the data security in customer mobile terminal, and after guaranteeing that again mobile terminal is lost, mobile terminal is unavailable, can not reactivate mobile terminal by the mode of updating system program.This with regard to fundamentally solved mobile terminal and lost or be stolen after data information reveal and mobile terminal by the problem of other people use.

Claims (9)

1. a mobile terminal with authorization card, it is characterized in that, the authorization card that comprises the individual packages of terminal body and given terminal body privileged operation, and adaptedly, terminal body the be provided with interface circuit of for both communicating by letter corresponding to authorization card.
2. the mobile terminal with authorization card according to claim 1, is characterized in that, described interface circuit is adaptive slot interface circuit or serial interface circuit.
3. the mobile terminal with authorization card according to claim 2, it is characterized in that, when interface circuit is slot interface circuit, corresponding authorization card is SD card, miniSD card or IF card, and when interface circuit is serial interface circuit, the communication interface of corresponding authorization card is USB interface.
4. according to the arbitrary described mobile terminal with authorization card of claims 1 to 3, it is characterized in that, described authorization card comprises:
Interface circuit, adapts to authorization card type;
Tandom number generator, is connected in described interface circuit, to respond the request of mobile terminal, produces random number, by described interface circuit, returns this random number;
Crypto-operation engine, is connected in described interface circuit, receives the described random number of processing through terminal body, uses predetermined private key to sign, and passback mobile terminal is verified; And
Storer, is connected in interface circuit, tandom number generator and crypto-operation engine.
5. the mobile terminal with authorization card according to claim 4, is characterized in that, described authorization card is based on internal bus, for the connection of packaged device.
6. the mobile terminal with authorization card according to claim 4, is characterized in that, described storer disposes volatile memory and nonvolatile memory.
7. the authorization method of a mobile terminal, it is characterized in that, mobile terminal is separated with authorization card, and by authorization card individual packages, the packing forms of the authorization card of coupling individual packages configures adaptive interface on mobile terminal, thereby, when given Authorized operation need to be performed, authorization card is connected and obtains the authorization with mobile terminal, authorize by after carry out predetermined Authorized operation.
8. the authorization method of mobile terminal according to claim 7, it is characterized in that, mobile terminal configuration wireless communication module, and the running status of mobile terminal is divided into controlled mode and uncontrolled pattern, thereby after mobile terminal is lost, by the mobile radio telecommunications module triggering controlled mode of configuration, but operation under controlled mode can not move, and in the situation that authorization card is connected with mobile terminal, after authorizing and passing through, removes controlled mode and enter uncontrolled pattern.
9. according to the authorization method of the mobile terminal described in claim 7 or 8, it is characterized in that, the Authorized operation based on authorization card comprises the step of authentication password.
CN201310497527.5A 2013-10-22 2013-10-22 Mobile terminal with authorization card and authorization method CN103530553A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310497527.5A CN103530553A (en) 2013-10-22 2013-10-22 Mobile terminal with authorization card and authorization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310497527.5A CN103530553A (en) 2013-10-22 2013-10-22 Mobile terminal with authorization card and authorization method

Publications (1)

Publication Number Publication Date
CN103530553A true CN103530553A (en) 2014-01-22

Family

ID=49932557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310497527.5A CN103530553A (en) 2013-10-22 2013-10-22 Mobile terminal with authorization card and authorization method

Country Status (1)

Country Link
CN (1) CN103530553A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106060788A (en) * 2016-05-24 2016-10-26 中国科学院信息工程研究所 Short message-based security TF card issuing method applicable to circuit domain encrypted communication
CN106529262A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Data protection method for mobile terminal and mobile terminal

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1402131A (en) * 2001-08-14 2003-03-12 大买家科技股份有限公司 System and method for controlling software operation by storage card
CN101005662A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with long-range control function and its long-range control method
CN101043327A (en) * 2007-03-16 2007-09-26 中兴通讯股份有限公司 Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method
CN101223799A (en) * 2005-05-16 2008-07-16 索尼爱立信移动通讯股份有限公司 Method for disabling a mobile device
CN102693385A (en) * 2012-05-28 2012-09-26 山东神思电子技术股份有限公司 Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN102883047A (en) * 2012-08-31 2013-01-16 惠州Tcl移动通信有限公司 Method and system for realizing data security of intelligent mobile terminals
CN102915415A (en) * 2011-08-04 2013-02-06 中国长城计算机深圳股份有限公司 Safety control method and system of mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1402131A (en) * 2001-08-14 2003-03-12 大买家科技股份有限公司 System and method for controlling software operation by storage card
CN101223799A (en) * 2005-05-16 2008-07-16 索尼爱立信移动通讯股份有限公司 Method for disabling a mobile device
CN101005662A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with long-range control function and its long-range control method
CN101043327A (en) * 2007-03-16 2007-09-26 中兴通讯股份有限公司 Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method
CN102915415A (en) * 2011-08-04 2013-02-06 中国长城计算机深圳股份有限公司 Safety control method and system of mobile terminal
CN102693385A (en) * 2012-05-28 2012-09-26 山东神思电子技术股份有限公司 Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN102883047A (en) * 2012-08-31 2013-01-16 惠州Tcl移动通信有限公司 Method and system for realizing data security of intelligent mobile terminals

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106060788A (en) * 2016-05-24 2016-10-26 中国科学院信息工程研究所 Short message-based security TF card issuing method applicable to circuit domain encrypted communication
CN106060788B (en) * 2016-05-24 2019-06-11 中国科学院信息工程研究所 A kind of safe TF card short message hair fastener method suitable for circuit domain coded communication
CN106529262A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Data protection method for mobile terminal and mobile terminal

Similar Documents

Publication Publication Date Title
CN1251549C (en) Method for enabling PKI functions in a smart card
US20080003980A1 (en) Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof
US20090103732A1 (en) Method of personalizing a NFC Chipset
EP1804418A1 (en) A dynamic password authentication system and the method thereof
CN101416223B (en) Method for the protection of a movable object, especially a vehicle, against unauthorized use
DE69934911T2 (en) Mobile phone auto pc logon
EP1379093B1 (en) Method for securing a mobile communications terminal
US9210573B2 (en) Method and apparatus for registering a computing device with a service provider
EP2477431B1 (en) Protection of a security element coupled with an NFC circuit
US20080235520A1 (en) Transportable, Configurable Data Carrier For Exchanging Data Between Electrical Devices, and Method Therefor
KR20110020870A (en) Personalizing a sim by means of a unique personalized master sim
CN101662765B (en) Encryption system and method of short message of mobile telephone
US7054613B2 (en) SIM card to mobile device interface protection method and system
EP1379094A1 (en) Method for locking a mobile communication terminal
US20040172536A1 (en) Method for authentication between a portable telecommunication object and a public access terminal
JP2012507220A (en) Key distribution method and system
JPH08500950A (en) Method and apparatus for efficient real-time authentication and encryption in a communication system
US9647984B2 (en) System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device
CN1523914A (en) Method for establishing and managing a trust model between a chip card and a radio terminal
HU0200571A2 (en) Enabling conformance to legislative requirements for mobile devices
JP5496652B2 (en) Method for ensuring secure access to a proximity communication module of a mobile terminal
CN103916844A (en) Subscriber identity module card opening method and virtual subscriber identity module card server
JP2003250183A (en) Ic card, terminal, communication terminal, communication station, communication apparatus and communication control method
ES2347853T3 (en) Procedure for access at least to a part of the data of a microprocessor card.
CN101026834A (en) Locking method and unlocking method

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140122

RJ01 Rejection of invention patent application after publication