CN105592019B - The method that two-way access is applied between dual execution environment - Google Patents

The method that two-way access is applied between dual execution environment Download PDF

Info

Publication number
CN105592019B
CN105592019B CN201410613548.3A CN201410613548A CN105592019B CN 105592019 B CN105592019 B CN 105592019B CN 201410613548 A CN201410613548 A CN 201410613548A CN 105592019 B CN105592019 B CN 105592019B
Authority
CN
China
Prior art keywords
communication module
client application
return visit
application
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410613548.3A
Other languages
Chinese (zh)
Other versions
CN105592019A (en
Inventor
鲁志军
郭伟
周钰
陈成钱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201410613548.3A priority Critical patent/CN105592019B/en
Priority to PCT/CN2015/093770 priority patent/WO2016070810A1/en
Publication of CN105592019A publication Critical patent/CN105592019A/en
Application granted granted Critical
Publication of CN105592019B publication Critical patent/CN105592019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The present invention relates to the methods that two-way access between a kind of dual execution environment is applied, comprising: the first Client application issues the access request to the first security application by first communication module;First security application carries out first stage processing to access request, to obtain the first result data and be transferred to second communication module;Second communication module establishes an at least bi-directional communication channel according to the first result data between first communication module and second communication module, so that the first security application passes through each bi-directional communication channel respectively and pays a return visit each second Client application;First security application is based on paying a return visit the resulting each return visit of each second Client application as a result, carrying out second stage processing to access request, to generate the final result data for corresponding to access request;First security application returns to final result data to the first Client application.It applies TEE can concurrently pay a return visit multiple REE applications in processing in the request process that REE is applied.

Description

The method that two-way access is applied between dual execution environment
Technical field
The present invention relates to Intelligent mobile equipment technical fields, more specifically to two-way between a kind of dual execution environment The method for accessing application.
Background technique
With Intelligent mobile equipment (such as smart phone) gradually " means of payment " change, existing intelligent operating system without Method meets security requirement of the payment application to the running environment locating for it.Since system resource is limited, if improving intelligent operation The safety of system is almost certain to that function and user experience is made to decrease.In view of this, current industry is based on newest movement The technology of chip develops, and proposes dual execution environment scheme: i.e. performing environment there are two running simultaneously in an equipment, wherein one A is to focus on function, the multimedia performing environment of user experience, the other is focusing on the credible performing environment of safety.
Currently, credible performing environment (the Trusted execution that GlobalPlatform is proposed Environment, abbreviation TEE) as the program a technology realize platform, be widely applied.On the platform, full The function of a certain business demand of foot, which is realized, is divided into two kinds of applications by original single application: a kind of conduct Client application is deployed in more In media performing environment, also referred to as REE(Rich execution environment) application, another kind is as security application portion Administration is in credible performing environment, also referred to as TEE application.For the security function for realizing system, the REE in multimedia performing environment is answered With the TEE application for needing to access in credible performing environment, that is, access TEE applies provided service, and corresponding service result is again REE in multimedia performing environment application is returned to by TEE application.
As shown in Figure 1, being communicated between REE application and TEE application using following mechanism: REE communication module and TEE are logical Letter module is separately operable under multimedia performing environment and credible performing environment, realizes REE using a kind of request-response mode Using the data interaction between TEE application.Specifically, REE application request access TEE is in application, first turn access request It send to REE communication module, REE communication module is switched under secure operating system by the handover mechanism between dual system, then with The form of Request order sends the request to TEE communication module, after TEE communication module gets request, determines that the request is wanted Specifically be sent to TEE application and by request data be transferred to the TEE application, the TEE application receive request after, handled with Result data is generated, the Response order of TEE communication module is recalled, result data is returned into REE application.Above scheme In, before Response order is without returning to REE application, new Request order cannot be initiated.
There are the following problems for this scheme: when TEE application needs to carry out more complicated place to the access request that REE is applied When reason, due to previous to that can not be inserted into new Request order between Request-Response order, TEE application can not be again Related basic data needed for carrying out complex process is obtained from the REE application in multimedia performing environment, thus it requires credible hold Row environment itself has more, stronger ability to support this complex process.Such as: TEE application need backstage participation, Or need to access intelligent memory card etc. come when carrying out complex process, TEE application just correspondingly needs credible performing environment that can join Net is equipped with intelligent memory card access interface etc., this can undoubtedly make credible performing environment structure become larger, complicate, to make to pacify The difficulty of full operation system verifiability increases, and can also generate more system defects, and then can reduce the safety of system.
Therefore, those skilled in the art expectation obtain it is a kind of make TEE apply processing in the request process that REE is applied The method that REE application can be paid a return visit.
Summary of the invention
The purpose of the present invention is to provide the methods that two-way access between a kind of dual execution environment is applied, in order to answer safely Complex process stage by stage is carried out with the access request to Client application.
To achieve the above object, it is as follows to provide a kind of technical solution by the present invention:
A kind of method of two-way access application between dual execution environment, wherein dual execution environment includes credible performing environment With multimedia performing environment, multimedia performing environment is deployed at least one Client application and first communication module, credible execution Environment is deployed at least one security application and second communication module, passes through the first communication mould between Client application and security application Block and second communication module carry out data interaction, and this method comprises the following steps: a), the first Client application pass through the first communication mould Block issues the access request to the first security application;Wherein, the first Client application is any Client application, and the first security application is First Client application needs the security application accessed;B), the first security application carries out first stage processing to access request, with To the first result data and it is transferred to second communication module;Wherein, the first result data specifies at least one second Client application, the Two Client applications are the Client application that the first security application needs to pay a return visit;C), second communication module is according to the first result data, An at least bi-directional communication channel is established between first communication module and second communication module, so that the first security application passes through respectively Each bi-directional communication channel pays a return visit each second Client application;Wherein, bi-directional communication channel and the second Client application correspond; d), First security application is based on paying a return visit the resulting each return visit of each second Client application as a result, carrying out at second stage to access request Reason, to generate the final result data for corresponding to access request;E), the first security application most terminates to the return of the first Client application Fruit data.
Preferably, in step c), second communication module with request-response mode between first communication module establish to A few bi-directional communication channel.
Preferably, step c) is specifically included: c1), second communication module be based on the first result data generate to Client application An at least callback access request, and at least will be sent to first communication module by a callback access request;Wherein, callback access request and the second client Using one-to-one correspondence;C2), first communication module receives each callback access request, and selects each second visitor respectively based on each callback access request Family application;C3), each second Client application is respectively handled corresponding callback access request, pays a return visit result simultaneously to generate at least one Transfer to first communication module;Wherein, it pays a return visit result and callback access request corresponds;C4), first communication module is based on each return visit As a result at least one return visit response is generated respectively, and each return visit response is sent back into second communication module;Wherein, it pays a return visit response and returns Result is visited to correspond;C5), each return visit response is resolved to each return visit result and by each return visit result by second communication module respectively Transfer to the first security application.
Preferably, the second Client application is multiple, and the first security application concurrently pays a return visit each second Client application.
The method that two-way access is applied between dual execution environment provided by various embodiments of the present invention, so that TEE is applied Processing can pay a return visit REE application in the request process that REE apply, so that apply being capable of access to applying from REE by TEE Request carries out complex process to realize more complete function.Various embodiments of the present invention can also have while guaranteeing security of system Effect reduces the structure complexity of credible performing environment, thus a possibility that reducing generation system defect.In addition, each reality of the present invention Applying example supports a certain security application concurrently to pay a return visit multiple Client applications, and each pay a return visit is by independent bi-directional communication channel Come what is carried out, this significantly improves system working efficiency.
Detailed description of the invention
Fig. 1 shows REE in multimedia performing environment in the prior art and applies and count between TEE application in credible performing environment According to the schematic diagram of interactive process.
The process of the method for two-way access application is shown between the dual execution environment provided Fig. 2 shows first embodiment of the invention It is intended to.
Fig. 3 shows the data between the dual execution environment of first embodiment of the invention offer in the method for two-way access application Interactive process schematic diagram.
Specific embodiment
In embodiment presented herein, dual execution environment includes credible performing environment and multimedia performing environment, the two It is operated together in same intelligent mobile device, for example, smart phone.Multimedia performing environment is deployed at least one client and answers With and first communication module, credible performing environment be deployed at least one security application and second communication module, each Client application At least one service is provided respectively with security application, it is logical by first communication module and second between Client application and security application Letter module is communicated.It should be noted that " return visit " referred to herein indicates that the first client in multimedia performing environment answers When issuing access request with the first security application into credible performing environment, executed to make the first security application obtain multimedia Certain Service Sources in environment inversely access any in multimedia performing environment to realize the response to the access request A or multiple Client applications, rather than only access the first Client application.
In embodiment provided in this article, any Client application or security application can provide at least one service, this The function that literary meaning " service " is realized by Client application or security application, in other words, any Client application or security application are equal At least one function can be achieved.It is that the first security application of access is mentioned that first Client application, which accesses the first security application substantially, At least one service of confession.
" the first Client application " referred to herein is any Client application in multimedia performing environment, and " the first security application " Security application in performing environment that need to access for the first Client application, credible.
As shown in Figures 2 and 3, first embodiment of the invention provides a kind of side of two-way access application between dual execution environment Method comprising following steps:
Step S10, the first Client application issues the access request to the first security application by first communication module;
Specifically, the first Client application is generated to the access request 100 of the first security application, and first communication module can be according to Certain data format is packaged access request 100, such as is encapsulated as Request order 101, and it is logical to be subsequently sent to second Believe module;Second communication module is parsed after receiving encapsulation of data (Request order 101), is obtained access request 100 and is turned It is sent to the first security application.
Step S20, the first security application carries out first stage processing to access request, to obtain the first result data 102 And it is transferred to second communication module.
Wherein, the first result data 102 specifies at least one second Client application, which can It can include the first Client application, it is also possible to not include.That second Client application referred to herein needs to pay a return visit for the first security application, Client application in multimedia performing environment.
First security application carries out treatment by stages to the access request 100 from the first Client application, at the first stage Basic data needed for reason can be obtained from the access request 100, and basic data needed for second stage processing then needs The second Client application is paid a return visit to obtain.First stage processing generates the first result data 102, and the first security application is by first knot Fruit data 102 are transferred to second communication module.
It will be understood by those skilled in the art that there may be following situations: the first security application is carried out to access request After first stage processing, learns and needs to access the second security application for being in together in credible performing environment to complete subsequent processing, And the second security application needs to pay a return visit at least one Client application in multimedia performing environment, thus the first result data at this time It can be generated by the second security application.Such case is encompassed within the scope of the present invention.
Step S30, second communication module is according to the first result data 102, in first communication module and second communication module Between establish an at least bi-directional communication channel so that the first security application passes through each bi-directional communication channel respectively and pays a return visit each second visitor Family application.
In the step, second communication module communicates mould second with request-response mode between first communication module An at least bi-directional communication channel is established between block and first communication module, bi-directional communication channel and the second Client application one are a pair of It answers, so that the first security application concurrently pays a return visit each second Client application by independent bi-directional communication channel respectively.
Under preferable case, step S30 is specifically included:
Step S301, second communication module is generated to pay a return visit at least the one of Client application based on the first result data 102 and be asked 200 are asked, and at least a callback access request 200 is sent to first communication module by this.
Wherein, callback access request 200 and the second Client application correspond.
Step S302, first communication module receives each callback access request 200, and is selected respectively respectively based on each callback access request 200 Second Client application.
Step S303, each second Client application is respectively handled corresponding callback access request 200, to generate at least one time It visits result 201 and transfers to first communication module.
Each second Client application calls one or more services that its own is provided respectively, to it is its corresponding, come from The callback access request of security application carries out independent processing in credible performing environment, and generates pay a return visit result respectively.Wherein, knot is paid a return visit Fruit 201 and callback access request 200 correspond.
Step S304, first communication module is based on each return visit result 201 and generates at least one return visit response 202 respectively, and will Each return visit response 202 sends back second communication module.
Wherein, response 202 is paid a return visit to correspond with result 201 is paid a return visit.First communication module will to each return visit result 201 into Row encapsulation responds 202 to form corresponding pay a return visit.
Callback access request 200 pays a return visit response 202 respectively with the first Client application to the access request 100 of the first security application Have different characteristics field.Wherein, a feature field can be used as corresponding return visit result 201 by paying a return visit response 202.
For example, access request 100 can have following feature field:
Callback access request 200, return visit response 202 can have following feature field, such as:
Wherein, for example, " TEE information ", " TEE/REE information " feature field record multimedia performing environment or credible execution The status information of environment;" the first security application information ", feature field record the object that access request 100 is directed to, " the first safety Using the/the second client application message " feature field records and pays a return visit the object that is directed to of response/callback access request;" order " feature field It can indicate that the first Client application needs to access which service of the first security application offer or the first security application needs to pay a return visit Which service that second Client application provides;" parameter " feature field may include backstage IP address, port numbers and background service The information such as the connection status of device;Different default values can be used to distinguish callback access request 200 and return in " status information " feature field Visit response 202.
Step S305, each return visit response 202 is resolved to each return visit result 201 and by each return visit by second communication module respectively As a result 201 the first security application is transferred to.
By step S30, with callback access request 200 and the form (that is, request-response mode) of response 202 is paid a return visit, it can be the At least one bi-directional communication channel, bi-directional communication channel and callback access request are set up between two communication modules and first communication module 200 correspond, and equally also correspond with the second Client application.Each bi-directional communication channel is all dedicated channel, is only supplied First security application carries out data interaction with the second Client application for corresponding to the bi-directional communication channel.It is needed in the first security application In the case where paying a return visit multiple second Client applications, each bi-directional communication channel can be used concurrently, that is, the first security application can be simultaneously Each second Client application is paid a return visit capablely, to significantly improve the working efficiency of system.
After step S30, second communication module obtains each return visit result 201.
Step S40, the first security application is based on paying a return visit each resulting each return visit result 201 of second Client application, to access Request carries out second stage processing, to generate the final result data 103 for corresponding to access request 100.
Specifically, each resulting each return visit result 201 of second Client application of the first security application return visit passes through correspondence respectively Bi-directional communication channel return the first security application.First security application is based on these and pays a return visit result 201, to from the first client The access request 100 of application carries out second stage processing, to generate final result data 103, as to the access request 100 Final response.
It will be appreciated by those skilled in the art that second stage processing is possible to that the most termination corresponding to access request can't be generated Fruit data, that is, the first security application need Client application from multimedia performing environment obtain again some basic datas come into The processing of row phase III, even more multiple processing, to form the final response to the access request, thus at second stage After reason, the first security application still may pay a return visit again the Client application in multimedia performing environment.Such case It is encompassed within the scope of the present invention.
Step S50, the first security application returns to final result data to the first Client application.
Specifically, in the step, the first security application is successively objective to first via second communication module, first communication module Family application returns to final result data 103.Wherein, second communication module is packaged final result data, such as is encapsulated as Response order 104, first communication module parse encapsulation of data (Response order 104) and obtain final result Data 103.
According to the preferred embodiment of above-described embodiment, first communication module may include protocol process module and service management Module, protocol process module is executed to access request, callback access request, the encapsulation and/or parsing for paying a return visit result, and service management mould Block registers each Client application in multimedia performing environment, foundation (or assisting to establish) bi-directional communication channel and according to the first knot Fruit data select each second Client application.
Further, the Client application in multimedia performing environment is provided visits with external device communication service, safety barrier It asks any of service, data storage service and resource operation service or appoints multiple.
Wherein: being serviced with external device communication and the ability of connection external equipment is provided, including the connection such as use wifi, GPRS Socket ability required for backstage or the ability that other terminals are accessed using equipment such as bluetooth, NFC.
Safety barrier access service provides the ability of various safety barriers on access intelligent terminal, including SD card, intelligence SD Card, SIM card, eSE etc..
Data storage service provides the ability of local datastore, can be with file system, read-write interface of specific implementation etc. Mode provides the provisional and permanent storage to data, and can provide the safety storage of data protection as needed.
Resource operation service provides the mode of operation other resources of smart machine, such as access camera, GPS module.
The method of two-way access application between the dual execution environment that the above embodiment of the present invention provides, so that TEE is applied Processing can pay a return visit REE application in the request process that REE apply, so that apply being capable of access to applying from REE by TEE Request carries out complex process to realize more complete function.
Based on the embodiment of the present invention, the structure of credible performing environment can be effectively reduced while guaranteeing security of system Complexity, thus a possibility that reducing generation system defect.
In addition, subsequent return visit need not wait previous time in the case where a certain security application needs to pay a return visit multiple Client applications Visiting terminates just to start, but can concurrently carry out multiple return visit processes.Thus, by the present invention in that with multiple mutually independent double A certain security application is supported concurrently to pay a return visit multiple Client applications to communication channel, this significantly improves system working efficiency.
Above description is not lain in and is limited the scope of the invention only in the preferred embodiment of the present invention.It is based on Thought of the invention, those skilled in the art can make various modifications design, without departing from thought of the invention and subsidiary power Benefit requires.

Claims (10)

1. a kind of method that two-way access is applied between dual execution environment, wherein the dual execution environment includes credible execution ring Border and multimedia performing environment, the multimedia performing environment are deployed at least one Client application and first communication module, institute It states credible performing environment and is deployed at least one security application and second communication module, between the Client application and security application Data interaction is carried out by the first communication module and second communication module, described method includes following steps:
A), the first Client application issues the access request to the first security application by the first communication module;Wherein, described First Client application is any Client application, and first security application needs the institute accessed for first Client application State security application;
B), first security application carries out first stage processing to the access request, to obtain the first result data and turn It is sent to the second communication module;Wherein, first result data specifies at least one second Client application, second client Using the Client application for needing to pay a return visit for first security application;
C), the second communication module is according to first result data, in the first communication module and second communication An at least bi-directional communication channel is established between module, so that first security application passes through each bi-directional communication channel respectively Pay a return visit each second Client application;Wherein, the bi-directional communication channel and second Client application correspond;
D), first security application is based on paying a return visit the resulting each return visit of each second Client application as a result, to the access Request carries out second stage processing, to generate the final result data for corresponding to the access request;
E), first security application returns to the final result data to first Client application.
2. the method according to claim 1, wherein in the step c), the second communication module with institute It states request-response mode between first communication module and establishes an at least bi-directional communication channel.
3. according to the method described in claim 2, it is characterized in that, the step c) is specifically included:
C1), the second communication module is generated to pay a return visit at least the one of the Client application based on first result data and be asked It asks, and an at least callback access request is sent to the first communication module;Wherein, the callback access request and second visitor Family application corresponds;
C2), the first communication module receives each callback access request, and is selected respectively based on each callback access request each described Second Client application;
C3), each second Client application is respectively handled the corresponding callback access request, is at least returned described in one with generating It visits result and transfers to the first communication module;Wherein, the return visit result and the callback access request correspond;
C4), the first communication module is based on each return visit result and generates at least one return visit response respectively, and by each described time It visits response and sends back the second communication module;Wherein, the return visit response is corresponded with the return visit result;
C5), the second communication module by each return visit response resolve to respectively each returns visit result and will it is each described in time It visits result and transfers to first security application.
4. according to the method described in claim 3, it is characterized in that, the first communication module includes protocol process module kimonos Business management module, the protocol process module are executed to the access request, the callback access request, the encapsulation for paying a return visit result And/or parsing, the service management module register each Client application, establish the bi-directional communication channel and according to institute It states the first result data and selects each second Client application.
5. according to the method described in claim 3, it is characterized in that, the callback access request, return visit response and the access Request the field that has different characteristics.
6. according to the method described in claim 3, it is characterized in that, the return visit response using the corresponding return visit result as One feature field.
7. the method according to claim 1, wherein second Client application is multiple, first safety Using concurrently paying a return visit each second Client application.
8. the method according to claim 1, wherein the Client application provide with external device communication service, Any of safety barrier access service, data storage service and resource operation service are appointed multiple.
9. method according to any one of claim 1 to 8, which is characterized in that the credible performing environment and multimedia Performing environment is operated together in same intelligent mobile device.
10. according to the method described in claim 9, it is characterized in that, the intelligent mobile device is smart phone.
CN201410613548.3A 2014-11-05 2014-11-05 The method that two-way access is applied between dual execution environment Active CN105592019B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410613548.3A CN105592019B (en) 2014-11-05 2014-11-05 The method that two-way access is applied between dual execution environment
PCT/CN2015/093770 WO2016070810A1 (en) 2014-11-05 2015-11-04 Method for a dual access application between two execution environments

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410613548.3A CN105592019B (en) 2014-11-05 2014-11-05 The method that two-way access is applied between dual execution environment

Publications (2)

Publication Number Publication Date
CN105592019A CN105592019A (en) 2016-05-18
CN105592019B true CN105592019B (en) 2018-12-25

Family

ID=55908597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410613548.3A Active CN105592019B (en) 2014-11-05 2014-11-05 The method that two-way access is applied between dual execution environment

Country Status (2)

Country Link
CN (1) CN105592019B (en)
WO (1) WO2016070810A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106547633B (en) * 2016-10-19 2019-12-31 沈阳微可信科技有限公司 Multi-channel communication system and electronic device
CN108282764A (en) * 2017-01-03 2018-07-13 中国移动通信有限公司研究院 A kind of information interacting method and terminal device
US10528749B2 (en) * 2017-03-20 2020-01-07 Huawei Technologies Co., Ltd. Methods and apparatus for containerized secure computing resources
US11734416B2 (en) 2018-04-27 2023-08-22 Huawei Technologies Co., Ltd. Construct general trusted application for a plurality of applications
WO2020034098A1 (en) * 2018-08-14 2020-02-20 华为技术有限公司 Artificial intelligence (ai) processing method and ai processing device
CN110011956B (en) * 2018-12-12 2020-07-31 阿里巴巴集团控股有限公司 Data processing method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745155A (en) * 2014-01-03 2014-04-23 东信和平科技股份有限公司 Credible Key and safe operation method thereof
CN104077533A (en) * 2014-07-17 2014-10-01 北京握奇智能科技有限公司 Sensitive data operating method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10496824B2 (en) * 2011-06-24 2019-12-03 Microsoft Licensing Technology, LLC Trusted language runtime on a mobile platform
US8935746B2 (en) * 2013-04-22 2015-01-13 Oracle International Corporation System with a trusted execution environment component executed on a secure element
CN104125226B (en) * 2014-07-28 2018-01-26 北京握奇智能科技有限公司 A kind of method, apparatus and system for locking and unlocking application

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745155A (en) * 2014-01-03 2014-04-23 东信和平科技股份有限公司 Credible Key and safe operation method thereof
CN104077533A (en) * 2014-07-17 2014-10-01 北京握奇智能科技有限公司 Sensitive data operating method and device

Also Published As

Publication number Publication date
WO2016070810A1 (en) 2016-05-12
CN105592019A (en) 2016-05-18

Similar Documents

Publication Publication Date Title
CN105592019B (en) The method that two-way access is applied between dual execution environment
JP6647388B2 (en) Method, procedure and framework for provisioning an eSIM using primary account information and enabling multi-SIM
CN105659634B (en) For the method close to service and the combined registering and cancellation of Internet of Things service
US20180367983A1 (en) Method, system and smart terminal for implementing virtual sim card
CN103873692B (en) Method, device and system for resource sharing
US20180310157A1 (en) Near field communication method and mobile terminal
CN104219615A (en) Method and device for sharing wireless traffic
CN104253856A (en) Scalable Web Real-Time Communications (WebRTC) media engines, and related method and system
WO2019232678A1 (en) Shared charging method, system, mobile terminal, shared charging device, and server
CN105930731B (en) A kind of method and device of security application TA interaction
CN107318098A (en) A kind of terminal control method, SIM cards, communication module and terminal
CN104216761A (en) Method for using shared device in device capable of operating two operation systems
CN109684114A (en) Message distributing method, device, terminal and medium based on iOS system
CN110582998A (en) Group communication method and device, computer storage medium and computer equipment
CN110324390A (en) A kind of cut-in method, platform of internet of things, application apparatus, service equipment
CN105978606B (en) Bluetooth equipment remote communication method, bluetooth equipment and client
KR101952053B1 (en) Scalable charging system based on service-oriented architecture(soa)
CN106357654A (en) Remote processing calling method and device and communication system
CN109343970A (en) Operating method, device, electronic equipment and computer media based on application program
CN110750206A (en) Data processing method, device and system
JP5931224B2 (en) Data access method and apparatus
CN114727361A (en) Processing method and device for network function selection and network equipment
CN104202432A (en) Remote web management system and method
CN106231538A (en) A kind of method and apparatus of OneM2M framework apparatus bound
CN106845974B (en) Method and device for realizing point-to-point communication of near field communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant