CN105592091A - Security application downloading method - Google Patents

Security application downloading method Download PDF

Info

Publication number
CN105592091A
CN105592091A CN201511009467.3A CN201511009467A CN105592091A CN 105592091 A CN105592091 A CN 105592091A CN 201511009467 A CN201511009467 A CN 201511009467A CN 105592091 A CN105592091 A CN 105592091A
Authority
CN
China
Prior art keywords
application
security application
contingency table
client
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201511009467.3A
Other languages
Chinese (zh)
Other versions
CN105592091B (en
Inventor
姜科
冀乃庚
傅宜生
田丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201511009467.3A priority Critical patent/CN105592091B/en
Publication of CN105592091A publication Critical patent/CN105592091A/en
Application granted granted Critical
Publication of CN105592091B publication Critical patent/CN105592091B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a security application downloading method, comprising: when a third-party client-side operating in a user terminal sending an application downloading request to the trusted execution environment manager of the user terminal, the trusted execution environment manager determining the third-party client-side can download a security application based on a first association list, a third association list and a fourth association list, and the application installation package associated with the security application based on a second association list, and later starting the downloading process of a target security application based on the choice of a user. The security application downloading method possesses high configurability.

Description

Security application method for down loading
Technical field
The present invention relates to the method that application is downloaded, more specifically, relate to security application method for down loading.
Background technology
At present, along with becoming increasingly abundant of the class of business of the increasingly extensive and different field of cyber-net application, for example, download security application (for example payment in financial field is applied) and become more and more important for residing at the lower safety barrier (SE) of credible execution environment (TSM) in user terminal (mobile terminal or).
In existing technical scheme, conventionally adopt defined APDU instruction in GP specification to complete the down operation of security application.
But. There are the following problems for above-mentioned existing technical scheme: (1) be difficult to guarantee safety barrier with application installation kit and installation parameter suitable close associated; (2) restive third party's client on user terminal access and download permission to security application that run on; (3) be difficult to flexible configuration application downloading mode and personalized pattern.
Therefore, there is following demand: provide the security application method for down loading with high configurability.
Summary of the invention
In order to solve the existing problem of above-mentioned prior art scheme, the present invention proposes the security application method for down loading with high configurability.
The object of the invention is to be achieved through the following technical solutions:
A kind of security application method for down loading, described security application method for down loading comprises the following steps:
(A1) build the first contingency table, the second contingency table, the 3rd contingency table and the 4th contingency table, and by described the first contingency table, the second contingency table, the 3rd contingency table and described the 4th contingency table are stored in database, wherein, incidence relation between described the first contingency table instruction security application and safety barrier type, incidence relation between described the second contingency table instruction security application and application installation kit, incidence relation between described the 3rd contingency table instruction third party's client and safety barrier type, incidence relation between described the 4th contingency table instruction third party's client and security application,
(A2) in the time running on third party's client in user terminal and send application download request to the credible execution environment manager of this user terminal, described credible execution environment manager determines based on described the first contingency table, the 3rd contingency table and the 4th contingency table the security application that this third party client can download, and determine the application installation kit of security application association based on described the second contingency table, and the selection based on user subsequently starts the downloading process of targeted security application.
In the above in disclosed scheme, preferably, security application can associated multiple safety barrier types, and safety barrier type can associated multiple security application, and security application can associated multiple application installation kits, and an application installation kit can associated multiple security application, and third party's client can associated multiple safety barrier types, and a safety barrier type can associated multiple third party's clients. And third party's client can associated multiple security application, and a security application can associated multiple third party's clients.
In the above in disclosed scheme, preferably, described the 4th contingency table comes associated security application and third party's client by security application identifier with third party's client identifier, described the first contingency table comes associated security application and safety barrier type by security application identifier with safety barrier type identifier, described the second contingency table comes associated security application and application installation kit by security application identifier with application installation kit identifier, and described the 3rd contingency table comes associated third party's client and safety barrier type by third party's client identifier with safety barrier type identifier.
In the above in disclosed scheme, preferably, described security application identifier is made up of application identification code and application version number, described safety barrier type identifier is made up of safety barrier publisher code and safety barrier class code, described application installation kit identifier forms by applying installation kit identification code and applying installation kit version number, and described third party's client identifier is made up of client bag name and client hash value.
In disclosed scheme, preferably, database maintenance can enough be carried out newly-increased record operation, deletion record operation and amendment record operation by the mode of configuration to described the first contingency table, the second contingency table and the 3rd contingency table in the above.
In disclosed scheme, preferably, database maintenance can enough administer and maintain the incidence relation between security application and application installation kit by configuring described the second contingency table in the above.
In the above in disclosed scheme, preferably, receiving after described application download request, described credible execution environment manager is carried out matching operation and the client hash value execution verification operation comprising in described application download request is verified to the identity of the third party's client that sends described application download request by the client bag name to comprising in described application download request, and if be verified, the list of the security application that can download is provided to it, otherwise, refuse this application download request.
In the above in disclosed scheme, preferably, described credible execution environment manager provides the list of its security application that can download in the following way to the third party's client that sends described application download request: (1) inquires about described the 3rd contingency table to determine whether current safety bearer type supports to send third party's client of described application download request according to the third party's client identifier comprising in described application download request and safety barrier type identifier; (2), if determine that the support of current safety bearer type sends third party's client of described application download request, inquire about described the first contingency table with the set of the security application determining current safety bearer type and supported and inquire about described the 4th contingency table to determine the set of the security application of supporting the third party's client that sends described application download request; (3) determine the set of the security application that current safety bearer type supports and support the intersection of sets collection of security application of the third party's client that sends described application download request with the list of the security application that obtains sending third party's client of described application download request and can access and download.
In disclosed scheme, preferably, a security application is only associated with an application provider in the above.
In the above in disclosed scheme, preferably, each application provider all can arrange by the current downloading mode parameter of inquiring about described database and configuring this application provider this application provider's current downloading mode.
In disclosed scheme, preferably, described current downloading mode is in a key downloading mode and asynchronous examination & verification downloading mode in the above.
In disclosed scheme, preferably, the workflow of a described key downloading mode at least comprises in the above: (1) user triggers application and downloads the transmission of applying for; (2) application provider synchronously audits application and downloads application; (3) if application application examination & verification is passed through, download intended application; (4) intended application of having downloaded is installed.
In disclosed scheme, preferably, the workflow of described asynchronous audit mode at least comprises in the above: (1) user triggers application and downloads the transmission of applying for; (2) application is downloaded in the asynchronous examination & verification application of application provider, and is notified and informed auditing result by auditing result; (3) auditing result of record application application finishes application process thereupon; (4) if application application examination & verification is passed through, trigger the down operation of intended application and the intended application of having downloaded is installed thereupon by user.
In the above in disclosed scheme, preferably, each application provider all can arrange by the current individual operation mode parameter of inquiring about described database and configuring this application provider this application provider's current individual operation pattern.
In disclosed scheme, preferably, described current individual operation pattern is in DP personalization of documents operator scheme and online individual operation pattern in the above.
In disclosed scheme, preferably, described DP personalization of documents operator scheme is used DP files in batch transmission personal data in the above.
In disclosed scheme, preferably, described online individual operation pattern is obtained personal data by online request in the above.
Security application method for down loading disclosed in this invention has the following advantages: have high configurability, extensibility and compatibility.
Brief description of the drawings
By reference to the accompanying drawings, technical characterictic of the present invention and advantage will be understood better by those skilled in the art, wherein:
Fig. 1 is the flow chart of security application method for down loading according to an embodiment of the invention.
Detailed description of the invention
Fig. 1 is the flow chart of security application method for down loading according to an embodiment of the invention. as shown in Figure 1, security application method for down loading disclosed in this invention comprises the following steps: that (A1) builds the first contingency table, the second contingency table, the 3rd contingency table and the 4th contingency table, and by described the first contingency table, the second contingency table, the 3rd contingency table and described the 4th contingency table are stored in database, wherein, incidence relation between described the first contingency table instruction security application and safety barrier type, incidence relation between described the second contingency table instruction security application and application installation kit, incidence relation between described the 3rd contingency table instruction third party's client and safety barrier type, incidence relation between described the 4th contingency table instruction third party's client and security application, (A2) in the time running on for example, third party's client in user terminal (mobile terminal) and send application download request to the credible execution environment manager of this user terminal, described credible execution environment manager determines based on described the first contingency table, the 3rd contingency table and the 4th contingency table the security application (for example application of the payment in financial field) that this third party client can download, and determine the application installation kit of security application association based on described the second contingency table, and the selection based on user subsequently starts the downloading process of targeted security application.
Preferably, in security application method for down loading disclosed in this invention, security application can associated multiple safety barrier types, and a safety barrier type can associated multiple security application.
Preferably, in security application method for down loading disclosed in this invention, security application can associated multiple application installation kits, and an application installation kit can associated multiple security application.
Preferably, in security application method for down loading disclosed in this invention, third party's client can associated multiple safety barrier types, and a safety barrier type can associated multiple third party's clients.
Preferably, in security application method for down loading disclosed in this invention, third party's client can associated multiple security application, and a security application can associated multiple third party's clients.
Preferably, in security application method for down loading disclosed in this invention, described the 4th contingency table comes associated security application and third party's client by security application identifier with third party's client identifier.
Preferably, in security application method for down loading disclosed in this invention, described the first contingency table comes associated security application and safety barrier type by security application identifier with safety barrier type identifier.
Preferably, in security application method for down loading disclosed in this invention, described the second contingency table comes associated security application and application installation kit by security application identifier with application installation kit identifier.
Preferably, in security application method for down loading disclosed in this invention, described the 3rd contingency table comes associated third party's client and safety barrier type by third party's client identifier with safety barrier type identifier.
Preferably, in security application method for down loading disclosed in this invention, described security application identifier is made up of application identification code and application version number.
Preferably, in security application method for down loading disclosed in this invention, described safety barrier type identifier is made up of safety barrier publisher code and safety barrier class code.
Preferably, in security application method for down loading disclosed in this invention, described application installation kit identifier forms by applying installation kit identification code and applying installation kit version number.
Preferably, in security application method for down loading disclosed in this invention, described third party's client identifier is made up of client bag name and client hash value.
Preferably, in security application method for down loading disclosed in this invention, database maintenance can enough be carried out newly-increased record operation, deletion record operation and amendment record operation by the mode of configuration to described the first contingency table, the second contingency table and the 3rd contingency table.
Preferably, in security application method for down loading disclosed in this invention, database maintenance can be enough (for example administers and maintains incidence relation between security application and application installation kit by configuring described the second contingency table, split assigning in multiple installation kits of the corresponding load-on module possibility of security application, is associated with multiple installation kits).
Preferably, in security application method for down loading disclosed in this invention, receiving after described application download request, described credible execution environment manager is carried out matching operation and the client hash value execution verification operation comprising in described application download request is verified to the identity of the third party's client that sends described application download request by the client bag name to comprising in described application download request, and if be verified, the list of the security application that can download is provided to it, otherwise, refuse this application download request.
Preferably, in security application method for down loading disclosed in this invention, described credible execution environment manager provides the list of its security application that can download in the following way to the third party's client that sends described application download request: (1) inquires about described the 3rd contingency table to determine whether current safety bearer type supports to send third party's client of described application download request according to the third party's client identifier comprising in described application download request and safety barrier type identifier; (2), if determine that the support of current safety bearer type sends third party's client of described application download request, inquire about described the first contingency table with the set (security application being associated with current safety bearer type) of the security application determining current safety bearer type and supported and inquire about described the 4th contingency table to determine the set (security application being associated with the third party's client that sends described application download request) of the security application of supporting the third party's client that sends described application download request; (3) determine the set of the security application that current safety bearer type supports and support the intersection of sets collection of security application of the third party's client that sends described application download request with the list of the security application that obtains sending third party's client of described application download request and can access and download.
Preferably, in security application method for down loading disclosed in this invention, a security application is only associated with an application provider.
Preferably, in security application method for down loading disclosed in this invention, each application provider all can arrange by the current downloading mode parameter of inquiring about described database and configuring this application provider this application provider's current downloading mode.
Preferably, in security application method for down loading disclosed in this invention, described current downloading mode is in a key downloading mode and asynchronous examination & verification downloading mode.
Preferably, in security application method for down loading disclosed in this invention, the workflow of a described key downloading mode at least comprises: (1) user triggers application and downloads the transmission of applying for; (2) application provider synchronously audits application and downloads application; (3) if application application examination & verification is passed through, download intended application; (4) intended application of having downloaded is installed.
Preferably, in security application method for down loading disclosed in this invention, the workflow of described asynchronous audit mode at least comprises: (1) user triggers application and downloads the transmission of applying for; (2) application is downloaded in the asynchronous examination & verification application of application provider, and is notified and informed auditing result by auditing result; (3) auditing result of record application application finishes application process thereupon; (4) if application application examination & verification is passed through, trigger the down operation of intended application and the intended application of having downloaded is installed thereupon by user.
Preferably, in security application method for down loading disclosed in this invention, each application provider all can arrange by the current individual operation mode parameter of inquiring about described database and configuring this application provider this application provider's current individual operation pattern.
Preferably, in security application method for down loading disclosed in this invention, described current individual operation pattern is in DP personalization of documents operator scheme and online individual operation pattern.
Preferably, in security application method for down loading disclosed in this invention, described DP personalization of documents operator scheme is used DP files in batch transmission personal data.
Preferably, in security application method for down loading disclosed in this invention, described online individual operation pattern is obtained personal data by online request.
Therefore security application method for down loading disclosed in this invention has following advantages: there is high configurability, extensibility and compatibility.
Although the present invention is described by above-mentioned preferred embodiment, its way of realization is not limited to above-mentioned embodiment. Should be realized that: in the situation that not departing from purport of the present invention and scope, those skilled in the art can make different variations and amendment to the present invention.

Claims (17)

1. a security application method for down loading, described security application method for down loading comprises the following steps:
(A1) build the first contingency table, the second contingency table, the 3rd contingency table and the 4th contingency table, and by described the first contingency table, the second contingency table, the 3rd contingency table and described the 4th contingency table are stored in database, wherein, incidence relation between described the first contingency table instruction security application and safety barrier type, incidence relation between described the second contingency table instruction security application and application installation kit, incidence relation between described the 3rd contingency table instruction third party's client and safety barrier type, incidence relation between described the 4th contingency table instruction third party's client and security application,
(A2) in the time running on third party's client in user terminal and send application download request to the credible execution environment manager of this user terminal, described credible execution environment manager determines based on described the first contingency table, the 3rd contingency table and the 4th contingency table the security application that this third party client can download, and determine the application installation kit of security application association based on described the second contingency table, and the selection based on user subsequently starts the downloading process of targeted security application.
2. security application method for down loading according to claim 1, it is characterized in that, security application can associated multiple safety barrier types, and safety barrier type can associated multiple security application, and security application can associated multiple application installation kits, and an application installation kit can associated multiple security application, and third party's client can associated multiple safety barrier types, and safety barrier type can associated multiple third party's clients, and third party's client can associated multiple security application, and a security application can associated multiple third party's clients.
3. security application method for down loading according to claim 2, it is characterized in that, described the 4th contingency table comes associated security application and third party's client by security application identifier with third party's client identifier, described the first contingency table comes associated security application and safety barrier type by security application identifier with safety barrier type identifier, described the second contingency table comes associated security application and application installation kit by security application identifier with application installation kit identifier, and described the 3rd contingency table comes associated third party's client and safety barrier type by third party's client identifier with safety barrier type identifier.
4. security application method for down loading according to claim 2, it is characterized in that, described security application identifier is made up of application identification code and application version number, described safety barrier type identifier is made up of safety barrier publisher code and safety barrier class code, described application installation kit identifier forms by applying installation kit identification code and applying installation kit version number, and described third party's client identifier is made up of client bag name and client hash value.
5. security application method for down loading according to claim 4, it is characterized in that, database maintenance can enough be carried out newly-increased record operation, deletion record operation and amendment record operation by the mode of configuration to described the first contingency table, the second contingency table and the 3rd contingency table.
6. security application method for down loading according to claim 5, is characterized in that, database maintenance can enough administer and maintain the incidence relation between security application and application installation kit by configuring described the second contingency table.
7. security application method for down loading according to claim 6, it is characterized in that, receiving after described application download request, described credible execution environment manager is carried out matching operation and the client hash value execution verification operation comprising in described application download request is verified to the identity of the third party's client that sends described application download request by the client bag name to comprising in described application download request, and if be verified, the list of the security application that can download is provided to it, otherwise, refuse this application download request.
8. security application method for down loading according to claim 7, it is characterized in that, described credible execution environment manager provides the list of its security application that can download in the following way to the third party's client that sends described application download request: (1) inquires about described the 3rd contingency table to determine whether current safety bearer type supports to send third party's client of described application download request according to the third party's client identifier comprising in described application download request and safety barrier type identifier; (2), if determine that the support of current safety bearer type sends third party's client of described application download request, inquire about described the first contingency table with the set of the security application determining current safety bearer type and supported and inquire about described the 4th contingency table to determine the set of the security application of supporting the third party's client that sends described application download request; (3) determine the set of the security application that current safety bearer type supports and support the intersection of sets collection of security application of the third party's client that sends described application download request with the list of the security application that obtains sending third party's client of described application download request and can access and download.
9. security application method for down loading according to claim 8, is characterized in that, a security application is only associated with an application provider.
10. security application method for down loading according to claim 9, it is characterized in that, each application provider all can arrange by the current downloading mode parameter of inquiring about described database and configuring this application provider this application provider's current downloading mode.
11. security application method for down loading according to claim 10, is characterized in that, described current downloading mode is in a key downloading mode and asynchronous examination & verification downloading mode.
12. security application method for down loading according to claim 11, is characterized in that, the workflow of a described key downloading mode at least comprises: (1) user triggers application and downloads the transmission of applying for; (2) application provider synchronously audits application and downloads application; (3) if application application examination & verification is passed through, download intended application; (4) intended application of having downloaded is installed.
13. security application method for down loading according to claim 12, is characterized in that, the workflow of described asynchronous audit mode at least comprises: (1) user triggers application and downloads the transmission of applying for; (2) application is downloaded in the asynchronous examination & verification application of application provider, and is notified and informed auditing result by auditing result; (3) auditing result of record application application finishes application process thereupon; (4) if application application examination & verification is passed through, trigger the down operation of intended application and the intended application of having downloaded is installed thereupon by user.
14. security application method for down loading according to claim 13, it is characterized in that, each application provider all can arrange by the current individual operation mode parameter of inquiring about described database and configuring this application provider this application provider's current individual operation pattern.
15. security application method for down loading according to claim 14, is characterized in that, described current individual operation pattern is in DP personalization of documents operator scheme and online individual operation pattern.
16. security application method for down loading according to claim 15, is characterized in that, described DP personalization of documents operator scheme is used DP files in batch transmission personal data.
17. security application method for down loading according to claim 16, is characterized in that, described online individual operation pattern is obtained personal data by online request.
CN201511009467.3A 2015-12-30 2015-12-30 Security application method for down loading Active CN105592091B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511009467.3A CN105592091B (en) 2015-12-30 2015-12-30 Security application method for down loading

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511009467.3A CN105592091B (en) 2015-12-30 2015-12-30 Security application method for down loading

Publications (2)

Publication Number Publication Date
CN105592091A true CN105592091A (en) 2016-05-18
CN105592091B CN105592091B (en) 2018-12-25

Family

ID=55931305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511009467.3A Active CN105592091B (en) 2015-12-30 2015-12-30 Security application method for down loading

Country Status (1)

Country Link
CN (1) CN105592091B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169762A (en) * 2017-05-24 2017-09-15 中国银联股份有限公司 The collocation method and device of a kind of safety barrier
CN107454112A (en) * 2017-09-29 2017-12-08 恒宝股份有限公司 A kind of method and its system for accessing trusted application
CN107682159A (en) * 2017-10-12 2018-02-09 北京握奇智能科技有限公司 The trusted application management method and trusted application management system of a kind of intelligent terminal
CN110278267A (en) * 2019-06-21 2019-09-24 浙江蓝卓工业互联网信息技术有限公司 A kind of the limitation application method and system of industry internet APP
CN114760276A (en) * 2022-06-13 2022-07-15 深圳市汇顶科技股份有限公司 Method and device for downloading data and secure element

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301289A (en) * 2013-07-17 2015-01-21 中国银联股份有限公司 Apparatus for security information interaction
CN104702615A (en) * 2015-03-20 2015-06-10 武汉天喻信息产业股份有限公司 Multi-service realizing system and method based on security terminal
CN104901979A (en) * 2014-03-04 2015-09-09 北京奇虎科技有限公司 Method and device for downloading application program files

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301289A (en) * 2013-07-17 2015-01-21 中国银联股份有限公司 Apparatus for security information interaction
CN104901979A (en) * 2014-03-04 2015-09-09 北京奇虎科技有限公司 Method and device for downloading application program files
CN104702615A (en) * 2015-03-20 2015-06-10 武汉天喻信息产业股份有限公司 Multi-service realizing system and method based on security terminal

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169762A (en) * 2017-05-24 2017-09-15 中国银联股份有限公司 The collocation method and device of a kind of safety barrier
WO2018214646A1 (en) * 2017-05-24 2018-11-29 中国银联股份有限公司 Method and apparatus for configuring security carrier
TWI676141B (en) * 2017-05-24 2019-11-01 大陸商中國銀聯股份有限公司 Method and device for configuring safety carrier
US11521199B2 (en) 2017-05-24 2022-12-06 China Unionpay Co., Ltd. Method and apparatus for configuring security carrier
CN107454112A (en) * 2017-09-29 2017-12-08 恒宝股份有限公司 A kind of method and its system for accessing trusted application
CN107682159A (en) * 2017-10-12 2018-02-09 北京握奇智能科技有限公司 The trusted application management method and trusted application management system of a kind of intelligent terminal
CN107682159B (en) * 2017-10-12 2021-02-02 北京握奇智能科技有限公司 Trusted application management method and trusted application management system of intelligent terminal
CN110278267A (en) * 2019-06-21 2019-09-24 浙江蓝卓工业互联网信息技术有限公司 A kind of the limitation application method and system of industry internet APP
CN110278267B (en) * 2019-06-21 2021-10-29 浙江蓝卓工业互联网信息技术有限公司 Method and system for limiting use of industrial internet APP
CN114760276A (en) * 2022-06-13 2022-07-15 深圳市汇顶科技股份有限公司 Method and device for downloading data and secure element

Also Published As

Publication number Publication date
CN105592091B (en) 2018-12-25

Similar Documents

Publication Publication Date Title
US9456027B2 (en) Methods, secure element, server, computer programs and computer program products for improved application management
CN1653460B (en) Method for loading an application in a device, device and smart card therefor
AU2016201055B2 (en) Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
CN105592091A (en) Security application downloading method
JP5944556B2 (en) System, method, and computer program for interfacing between a service provider and secure storage
US9185554B2 (en) System and methods to store, retrieve, manage, augment and monitor applications on appliances
EP3337219B1 (en) Carrier configuration processing method, device and system, and computer storage medium
CN106201607A (en) The upgrade method of a kind of software version and equipment
US20060200814A1 (en) Software distribution with activation control
JP2015092374A5 (en)
JP2015092374A (en) Apparatus and methods for managing firmware verification on wireless device
CN102830992A (en) Plug-in loading method and system
JP2012084159A5 (en)
US9942047B2 (en) Controlling application access to mobile device functions
CN106164861A (en) For the method disposing one group of software application
CN103561040A (en) File downloading method and system
CN111935110A (en) Method and device for controlling permission of tenant to access container instance
US11418944B2 (en) Adaptive eSIM delivery
CN109495874B (en) Profile downloading method and device
CN103906034A (en) Mobile application providing method and mobile application providing server
CN102056172A (en) Smart card and authentication method thereof
EP3413600B1 (en) Communication device and method of managing profiles
US20120231763A1 (en) Method and system for antivirus on a mobile device by sim card
CN114036495A (en) Method and device for updating privatized deployment verification code system
KR20230019032A (en) Pre-personalized secure element and embedded personalization

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant