CN103685194B - Capacity calling method and device, and terminal - Google Patents
Capacity calling method and device, and terminal Download PDFInfo
- Publication number
- CN103685194B CN103685194B CN201210352570.8A CN201210352570A CN103685194B CN 103685194 B CN103685194 B CN 103685194B CN 201210352570 A CN201210352570 A CN 201210352570A CN 103685194 B CN103685194 B CN 103685194B
- Authority
- CN
- China
- Prior art keywords
- ability
- application
- specified application
- request message
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses a capacity calling method and device, and a terminal. The method comprises the following steps: a first capacity calling request message sent by a specified application in the terminal is received, wherein the specified application is one of applications of the terminal having the capacity calling authority; verification information corresponding to the specified application is added into the first capacity calling request message to generate a second capacity calling request message; the second capacity calling request message is sent to a capacity open platform; and a corresponding capacity calling response message returned by the capacity open platform is received, and the capacity calling response message is sent to the specified application. By adopting the method, the device and the terminal of provided in the invention, the network resources and terminal resources can be reduced.
Description
Technical field
The present invention relates to wireless communication field, more particularly, to a kind of capacity calling method, device and terminal.
Background technology
The enriching constantly of development along with the Internet and internet, applications, the opportunity brought in the face of internet development with
Challenge, the application innovation dynamics that how to increase is being explored by telecom operators, on the basis of depth excavates value-added service expansion potentiality, opens
Begin to attempt, by open telecommunications and the Internet capability, to attract global development person, by overall reduction application innovation threshold, be based on
Open capability development more long-tail application.
Moreover, mobile Internet is that in application, the new business model such as charging provides opportunity, however this to
The forward direction business model of whole user's charge, leads to frequently occur and usurps accounting code, forge user identity, distort and counterfeit application
Etc. the generation of phenomenon, certain customers are maliciously deducted fees, and operator suffers from customer complaint, have also had a strong impact on application developer simultaneously
Commercial interest with operator.Further, since the popularization increased income with intelligence energy terminal of terminal operating system, and single terminal
Once the scene that application news conference is downloaded and run by great amount of terminals, terminal applies and the ability of terminal applies is also made to open
Face security risk and the challenge of more increasing.
Therefore, during the ability of terminaloriented application scenarios is open, how to ensure the open safety of ability, application uses
Safety is it is ensured that charging safety, privacy of user safety, and the safety of application and content etc. is that the key of ability opening is asked all the time
Topic is it is therefore desirable to meet the open demand for security of ability by effective security mechanism.
Existing ability open systemss dispose security component in each application, but this mode can bring identity logic weight
Purgation again carries the problem installed, and causes the expense of Internet resources, and is arranged on a large amount of occupancy to terminal resource during terminal.This
Outward, dispose the mode of security component it is also difficult to solve the replacement problem of each security component in each application.
Content of the invention
The embodiment of the present invention provides a kind of capacity calling method, device and terminal, in order to solve present in prior art
In application downloading process, network resource overhead is big and the big problem of resource occupation in the terminal is installed in application.
The embodiment of the present invention provides a kind of capacity calling method, including:
The first ability call request message that specified application in receiving terminal sends, wherein, described specified applies as institute
State terminal there is ability and call one of each application of authority;
Described the first ability call request message is added and the corresponding checking information of described specified application, generate second
Ability call request message;
Send described the second ability call request message to ability open platform;
The corresponding ability receiving described ability open platform return calls response message, and sends to described specified application
Described ability calls response message.
The embodiment of the present invention provides a kind of ability calling device, including:
Receiving unit, the first ability call request message sending for the specified application in receiving terminal, wherein, described
Specify application to have ability for described terminal and call one of each application of authority;And the correspondence that receiving ability open platform returns
Ability call response message, and send described ability to described specified application and call response message;
Adding device, for adding and the corresponding checking of described specified application in described the first ability call request message
Information, generates the second ability call request message;
Transmitting element, for sending described the second ability call request message to described ability open platform.
The embodiment of the present invention provides a kind of terminal, including:Aforementioned capabilities calling device.
Beneficial effects of the present invention include:
In method provided in an embodiment of the present invention, when there is multiple application in terminal, arbitrary application all can pass through one
Security Middleware calls sound to ability open platform transmitting capacity call request message, the ability that acquisition capability open platform returns
Answer message.Therefore do not need to download respectively in each application in the terminal and security component is installed, only download peace in the terminal
Fill a Security Middleware to get final product such that it is able to reduce the expense of Internet resources when application is downloaded, and decrease application installation
Shared resource in the terminal.
Brief description
Accompanying drawing is used for providing a further understanding of the present invention, and constitutes a part for description, implements with the present invention
Example is used for explaining the present invention together, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart of capacity calling method provided in an embodiment of the present invention;
Fig. 2 is the detail flowchart of capacity calling method provided in an embodiment of the present invention;
Fig. 3 is that Security Middleware provided in an embodiment of the present invention obtains the detailed process of application key to ability open platform
Figure;
Fig. 4 is the structural representation of ability calling device provided in an embodiment of the present invention.
Specific embodiment
In order to provide the implementation saving Internet resources and terminal resource, embodiments provide a kind of ability and adjust
With method, device and terminal, below in conjunction with Figure of description, the preferred embodiments of the present invention are illustrated it will be appreciated that this
The described preferred embodiment in place is merely to illustrate and explains the present invention, is not intended to limit the present invention.And do not conflict
In the case of, the embodiment in the application and the feature in embodiment can be mutually combined.
The embodiment of the present invention provides a kind of capacity calling method, as shown in figure 1, including:
The first ability call request message that specified application in step 101, receiving terminal sends, wherein, this is specified should
Call one of each application of authority with there is ability for this terminal;
Step 102, interpolation and this corresponding checking information of specified application, generation in this first ability call request message
The second ability call request message;
Step 103, send this second ability call request message to ability open platform;
Step 104, receive this ability open platform return corresponding ability call response message, and to this specify application
Send this ability and call response message.
Below in conjunction with the accompanying drawings, it is described in detail with the method that specific embodiment provides to the present invention.
Fig. 2 show the detail flowchart of capacity calling method provided in an embodiment of the present invention, specifically includes:
Step 201, specified application send to the Security Middleware in its affiliated terminal and carry specified application identities AppID
The first ability call request message.
Wherein it is intended that application can be any one in the multiple application of terminal, that is, any one is applied and calls in ability
When, all send, to Security Middleware, the first ability call request message carrying application identities.
Step 202, Security Middleware receive this first ability call request message, carry random number to specified application return
The checking instruction message of Random.
Step 203, specified application receive this checking instruction message, based on specified application key A ppKey and Random generation
First message summary H1.
Step 204, specified application send the checking request message carrying H1 to Security Middleware.
Step 205, Security Middleware receive this checking request message, specified application are verified, specially:
Obtain and apply corresponding application key with specifying, generate based on specified application corresponding application key and Random
Second eap-message digest H2, judges whether H1 with H2 be identical.
Wherein, when there is application key corresponding with specifying application in locally stored application key, can directly transfer
With the corresponding application key of specified application;Apply corresponding application key when not existing in locally stored application key with specifying
When, Security Middleware obtains to ability open platform and applies corresponding application key with specifying, and the concrete flow process that obtains is referring to flow process
3.
When H1 with H2 is identical, it is verified, enter step 206;When H1 with H2 is different, authentication failed, stop this stream
Journey.
Step 206, Security Middleware adds based on the corresponding mobile subscriber of terminal in the first ability call request message
International number MSISDN and AppID generate pseudo-code PID, Security Middleware receive specify application send the first ability call please
Ask the number of times Counter of message, the terminal token TerToken generating based on authentication factor S eed and Counter, generation carries
The second ability call request message of AppID, PID, Counter and TerToken.
Step 207, Security Middleware sends this second ability call request message to ability open platform.
Step 208, ability open platform receives this second ability call request message, and TerToken is verified, tool
Body is:
Token is generated based on the authentication factor shared with Security Middleware and Counter, judges TerToken and this token
Whether identical.
When TerToken is identical with this token, it is verified, enter step 209;When TerToken is different with this token
When, authentication failed, return error code.
Step 209, the contract signing relationship to application and ability for the ability open platform, the order relations of user and application product,
The sub- account of developer and the account of user, are verified one by one.
When being verified, enter step 210;When failing the authentication, return error code.
Step 210, ability open platform carries out withholding fee process to application, user.
Step 211, ability open platform sends call request message to ability platform.
Step 212, ability platform calls response message to ability open platform resettability.
Step 213, ability open platform receives this ability and calls response message, and sends this ability tune to Security Middleware
Use response message.
Step 214, Security Middleware receives this ability and calls response message, and sends this ability to specified application and call sound
Answer message.
Ability open platform, after the ability of completing is called, can also carry out the operation such as fee deduction treatment, and this part is existing
Technology, will not be described in detail herein.
Fig. 3 is right with specified application when not existing in the locally stored application key of Security Middleware in above-mentioned steps 205
During the application key answered, Security Middleware obtains the detailed process of application key corresponding with specifying application to ability open platform
Figure, specifically includes:
Step 301, Security Middleware is based on Security Middleware key Mkey, AppID, H1, Random and timestamp
Timestamp generates the 3rd eap-message digest H3;
Step 302, Security Middleware to ability open platform send middleware safe to carry mark MiddlewareID,
The specified application cipher key acquisition request message of AppID, H1, H3, Random and Timestamp;
Step 303, ability open platform receives this and specifies application cipher key acquisition request message, H3 is verified, specifically
For:
Ability open platform obtains Security Middleware key corresponding with Security Middleware by MiddlewareID, is based on
Security Middleware key corresponding with Security Middleware, AppID, H1, Random and Timestamp generate the 4th eap-message digest
H4, judges whether H3 with H4 be identical.
When H3 with H4 is identical, H3 is verified, enters step 304;When H3 and H4 differs, H3 is verified and loses
Lose, stop this flow process.
Step 304, ability open platform is verified to H1, specially:
Ability open platform is obtained by AppID and applies corresponding application key with specifying, based on corresponding with specified application
Application key and Random generate the 5th eap-message digest H5, judge whether H1 with H5 identical.
When H1 with H5 is identical, H1 is verified, enters step 305;When H1 and H5 differs, H1 is verified and loses
Lose, stop this flow process.
Step 305, ability open platform returns to Security Middleware and carries the close of application key corresponding with specifying application
Key response message.
Preferably, it is possible to use Security Middleware key corresponding with Security Middleware, answer to corresponding with specified application
Be encrypted with key, ability open platform return to Security Middleware carry encryption with the corresponding application key of specified application
Key response message.
Step 306, Security Middleware receives this key response message.
Security Middleware is decrypted with specified application corresponding application key to encryption, obtains corresponding with specifying application
Application key, and be saved in local.
The installation of downloading of Security Middleware does not need the new exploitation of split originator proposition to require, and user can pass through client
The various ways such as integrated, website download obtain Security Middleware installation file and are installed, after Security Middleware installs
Automatically initiate initialization flow process.
It can be seen that, using method provided in an embodiment of the present invention it is not necessary in the terminal each application in respectively download and
Security component is installed, only downloading one Security Middleware of installation in the terminal can be such that it is able to reduce network when application is downloaded
The expense of resource, decreases application and installs resource shared in the terminal.
And, Security Middleware can be automatically performed the renewal of version.Security Middleware timing is entered with ability open platform
Row communication, obtains the version information of Security Middleware, automatically downloads when finding and there is redaction, and completes backstage replacement more
Newly.So as to solve present in prior art, the problem that the security component of deployment is difficult to update in each application.
Based on same inventive concept, according to the capacity calling method of the above embodiment of the present invention offer, correspondingly, the present invention
Embodiment also provides a kind of ability calling device, and this ability calling device is equivalent to the Security Middleware in said method, its knot
Structure schematic diagram is as shown in figure 4, specifically include:
Receiving unit 401, the first ability call request message sending for the specified application in receiving terminal, wherein,
This is specified application to have ability for this terminal and calls one of each application of authority;And the correspondence that receiving ability open platform returns
Ability call response message, and to this specify application send this ability call response message;
Adding device 402, applies corresponding checking for adding to specify with this in this first ability call request message
Information, generates the second ability call request message;
Transmitting element 403, for sending this second ability call request message to this ability open platform.
Further, receiving unit 401, specify application specifically for receiving specified the carrying of application transmission in this terminal
The first ability call request message of mark AppID;
Adding device 402, is based on the corresponding shifting of this terminal specifically for adding in this first ability call request message
Employ pseudo-code PID of family international number MSISDN and AppID generation, this receiving unit 401 receives this and specifies application transmission to be somebody's turn to do
The number of times Counter of the first ability call request message, the terminal token being generated based on authentication factor S eed and Counter
TerToken.
Further, this ability calling device, also includes:
Authentication unit 404, applies corresponding checking for adding to specify with this in this first ability call request message
Before information, this specified application verification is passed through.
Further, authentication unit 404, specifically for specifying the checking that application return carries random number R andom to refer to this
Show message;Receiving this specifies the first message carrying based on specified application key A ppKey and Random generate that application sends to pluck
Want the checking request message of H1;Obtain to specify with this and apply corresponding application key, apply corresponding application based on specifying with this
Key and Random generate the second eap-message digest H2, determine that H1 with H2 is identical.
Further, authentication unit 404, specifically for right with this specified application when existing in locally stored application key
During the application key answered, transfer to specify with this and apply corresponding application key;When do not exist in locally stored application key with
When this specifies application corresponding application key, send to this ability open platform and specify application cipher key acquisition request message;Receive
What this ability open platform returned carries the key response message with this specified application corresponding application key.
This ability calling device also has application integrity detection, sensitive information safeguard protection, security hardening, supports locally
The function such as simulation test and far call test.
Application integrity detects:Ability calling device calculates media access control MAC fingerprint, and the MAC with safety storage
Fingerprint is mated, to prevent the terminal capability calling device after reaching the standard grade to be tampered in download and running.
Sensitive information safeguard protection:Ability calling device provides application software rank(Do not rely on hardware and do not rely on
Transformation/customization to operating system)Sensitive information safety protecting mechanism(As encrypted storage, discrete storage, Code obfuscation, peace
Full algorithm conversion, the in time mechanism such as removing internal memory)Ensure that the AppKey being preset in ability calling device is not cracked by static state(As
Static anti-reverse engineering analysis)Or dynamically crack(As memory headroom sniff, dynamic code tracking etc.).
Security hardening:By software engineering method(As Code obfuscation etc.)The application program that supportability calling device provides
DLL API is under any circumstance(Follow the tracks of including static anti-reverse engineering analysis, dynamic code)Illegally do not altered, and
Prevent ability calling device from illegally being distorted in either statically or dynamically situation by software engineering method, that is, in ability calling device quilt
After illegally distorting, need refusal to execute and point out exception error.
Support local simulation test:Ability calling device such as then will be able to be initialized for test environment with identifying user environment
Flow process is closed, thus supporting the local simulation test of terminal applies.
Support far call test:On-line testing can be carried out to meet developer using simulator, ability calls dress
Put the support being capable of simulator test function.
Based on same inventive concept, according to the capacity calling method of the above embodiment of the present invention offer, correspondingly, the present invention
Embodiment also provides a kind of terminal, including the ability calling device shown in above-mentioned Fig. 4.
In sum, scheme provided in an embodiment of the present invention, including:The first energy that specified application in receiving terminal sends
Power call request message, wherein, this is specified application to have ability for this terminal and calls one of each application of authority;In this first energy
Add in power call request message to specify with this and apply corresponding checking information, generate the second ability call request message;Xiang Neng
Power open platform sends this second ability call request message;The corresponding ability receiving the return of this ability open platform calls sound
Answer message, and specify application to send this ability to this and call response message.Using scheme provided in an embodiment of the present invention, Neng Gou
On the premise of guarantee ability open safety, save Internet resources and terminal resource.
Obviously, those skilled in the art can carry out the various changes and modification essence without deviating from the present invention to the present invention
God and scope.So, if these modifications of the present invention and modification belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprise these changes and modification.
Claims (9)
1. a kind of capacity calling method is it is characterised in that include:
The first ability call request message that specified application in receiving terminal sends, wherein, described specified applies as described end
End has ability and calls one of each application of authority;
Described specified application verification is being passed through afterwards, adding in described the first ability call request message should with described specifying
Use corresponding checking information, generate the second ability call request message;
Send described the second ability call request message to ability open platform;
The corresponding ability receiving described ability open platform return calls response message, and sends described to described specified application
Ability calls response message.
2. the method for claim 1 is it is characterised in that the first ability that the specified application in receiving terminal sends calls
Request message, specially:
The first ability call request message carrying specified application identities AppID that specified application in receiving terminal sends;
Described the first ability call request message is added and the corresponding checking information of described specified application, specially:
Described the first ability call request message is added and is based on described terminal corresponding mobile subscriber international number MSISDN
Pseudo-code PID generating with AppID, the number of times receiving the described specified application described the first ability call request message of transmission
Counter, the terminal token TerToken being generated based on authentication factor S eed and Counter.
3. the method for claim 1 is it is characterised in that pass through to described specified application verification, specially:
Return the checking instruction message carrying random number R andom to described specified application;
The first message carrying based on specified application key A ppKey and Random generate receiving described specified application transmission is plucked
Want the checking request message of H1;
Obtain and the corresponding application key of described specified application, apply key and Random based on corresponding with described specified application
Generate the second eap-message digest H2, determine that H1 with H2 is identical.
4. method as claimed in claim 3 is it is characterised in that obtain and the corresponding application key of described specified application, specifically
For:
When existing in locally stored application key with described specified application corresponding application key, transferring should with described specifying
With corresponding application key;
When not existing in locally stored application key with described specified application corresponding application key, open to described ability
Platform sends specifies application cipher key acquisition request message;Receive carrying and described specified application of described ability open platform return
The key response message of corresponding application key.
5. a kind of ability calling device is it is characterised in that include:
Receiving unit, the first ability call request message sending for the specified application in receiving terminal, wherein, described specified
Apply and for described terminal, there is ability and call one of each application of authority;And the corresponding energy that receiving ability open platform returns
Power calls response message, and calls response message to the described specified application described ability of transmission;
Authentication unit, for verifying to described specified application;
Adding device, for passing through to described specified application verification afterwards, to call in described the first ability in described authentication unit
Add in request message and the corresponding checking information of described specified application, generate the second ability call request message;
Transmitting element, for sending described the second ability call request message to described ability open platform.
6. device as claimed in claim 5 is it is characterised in that described receiving unit, specifically for receiving in described terminal
Specify the first ability call request message carrying specified application identities AppID that application sends;
Described adding device, is based on the corresponding shifting of described terminal specifically for adding in described the first ability call request message
Employ pseudo-code PID of family international number MSISDN and AppID generation, receive the described the first ability tune of described specified application transmission
With the number of times Counter of request message, the terminal token TerToken based on authentication factor S eed and Counter generation.
7. device as claimed in claim 5 is it is characterised in that described authentication unit, specifically for returning to described specified application
Return the checking instruction message carrying random number R andom;Receive carrying based on specified application key of described specified application transmission
The checking request message of the first message summary H1 that AppKey and Random generates;Obtain and the corresponding application of described specified application
Key, generates the second eap-message digest H2 based on described specified application corresponding application key and Random, determines H1 and H2 phase
With.
8. device as claimed in claim 7 is it is characterised in that described authentication unit, specifically for when locally stored application
When existing in key with described specified application corresponding application key, transfer and the corresponding application key of described specified application;When
When not existing in locally stored application key with described specified application corresponding application key, send out to described ability open platform
Send and specify application cipher key acquisition request message;Receive carrying of described ability open platform return corresponding with described specified application
The key response message of application key.
9. a kind of terminal is it is characterised in that include the ability calling device described in any one of claim 5-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210352570.8A CN103685194B (en) | 2012-09-20 | 2012-09-20 | Capacity calling method and device, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210352570.8A CN103685194B (en) | 2012-09-20 | 2012-09-20 | Capacity calling method and device, and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103685194A CN103685194A (en) | 2014-03-26 |
CN103685194B true CN103685194B (en) | 2017-02-22 |
Family
ID=50321520
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210352570.8A Active CN103685194B (en) | 2012-09-20 | 2012-09-20 | Capacity calling method and device, and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103685194B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105491557B (en) * | 2014-09-15 | 2020-04-21 | 中兴通讯股份有限公司 | System and method for realizing capability opening and capability opening platform |
CN106304035A (en) | 2015-05-22 | 2017-01-04 | 中兴通讯股份有限公司 | A kind of ability opening method and system, the open functional entity of ability |
CN107645474B (en) * | 2016-07-20 | 2020-02-14 | 腾讯科技(深圳)有限公司 | Method and device for logging in open platform |
CN107645521A (en) * | 2016-07-21 | 2018-01-30 | 平安科技(深圳)有限公司 | Functional unit installation method, terminal and server |
CN108156122B (en) * | 2016-12-06 | 2021-08-13 | 中移(杭州)信息技术有限公司 | Method, system and equipment for introducing capability of capability open platform |
CN107261502A (en) * | 2017-05-10 | 2017-10-20 | 珠海金山网络游戏科技有限公司 | A kind of anti-external store system of game on line based on procotol and method |
CN109144743A (en) * | 2017-06-28 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of acquisition methods of data, device and equipment |
CN112131597A (en) * | 2019-10-22 | 2020-12-25 | 刘高峰 | Method and device for generating encrypted information and intelligent equipment |
CN114844644A (en) * | 2022-03-16 | 2022-08-02 | 深信服科技股份有限公司 | Resource request method, device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969475A (en) * | 2010-11-15 | 2011-02-09 | 张军 | Business data controllable distribution and fusion application system based on cloud computing |
CN102065573A (en) * | 2010-12-28 | 2011-05-18 | 北京高信达通信技术有限公司福州分公司 | WAP gateway agent service data processing method and server |
CN102082771A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团福建有限公司 | Service management middleware based on ESB (enterprise service bus) technology |
CN102572815A (en) * | 2010-12-29 | 2012-07-11 | 中国移动通信集团公司 | Method, system and device for processing terminal application request |
-
2012
- 2012-09-20 CN CN201210352570.8A patent/CN103685194B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102082771A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团福建有限公司 | Service management middleware based on ESB (enterprise service bus) technology |
CN101969475A (en) * | 2010-11-15 | 2011-02-09 | 张军 | Business data controllable distribution and fusion application system based on cloud computing |
CN102065573A (en) * | 2010-12-28 | 2011-05-18 | 北京高信达通信技术有限公司福州分公司 | WAP gateway agent service data processing method and server |
CN102572815A (en) * | 2010-12-29 | 2012-07-11 | 中国移动通信集团公司 | Method, system and device for processing terminal application request |
Also Published As
Publication number | Publication date |
---|---|
CN103685194A (en) | 2014-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103685194B (en) | Capacity calling method and device, and terminal | |
CN107220083B (en) | Method and system for installation-free operation of application program in android system | |
CN110336833B (en) | Picture content consensus method based on block chain and server | |
CN102394887B (en) | OAuth protocol-based safety certificate method of open platform and system thereof | |
US6889212B1 (en) | Method for enforcing a time limited software license in a mobile communication device | |
CN102378170B (en) | Method, device and system of authentication and service calling | |
KR100463736B1 (en) | Method for permitting debugging and testing of software on mobile communication device in a secure environment | |
US8584231B2 (en) | Service opening method and system, and service opening server | |
CN102204299B (en) | Method for securely changing mobile device from old owner to new owner | |
US7784089B2 (en) | System and method for providing a multi-credential authentication protocol | |
RU2395166C2 (en) | Method for provision of access to coded content of one of multiple subscriber systems, device for access provision to coded content and method for generation of protected content packets | |
CN102724204B (en) | Secure and trusted capability opening platform | |
CN107483509A (en) | A kind of auth method, server and readable storage medium storing program for executing | |
CN108933838B (en) | Application data processing method and device | |
CN103813329A (en) | Capability calling method and capability opening system | |
CN105550584A (en) | RBAC based malicious program interception and processing method in Android platform | |
WO2012041046A1 (en) | Application store system and development method using the application store system | |
US20080104572A1 (en) | Dispatch api that permits midlets to initiate dispatch calls | |
Ahmad et al. | Enhancing the security of mobile applications by using TEE and (U) SIM | |
CN101789973A (en) | Method and system for constructing Mashup application | |
CN108923910A (en) | A kind of method that mobile application APK is anti-tamper | |
CN103139695B (en) | The telecommunication capability call method of curstomer-oriented end and the network equipment | |
CN115544538A (en) | Data transmission method, device, equipment and readable storage medium | |
CN102375953A (en) | Software certification method and software certification device | |
Grillo et al. | Transaction oriented text messaging with Trusted-SMS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |