CN105873018A - Virtual SIM card information storage method and system - Google Patents

Virtual SIM card information storage method and system Download PDF

Info

Publication number
CN105873018A
CN105873018A CN201610378608.7A CN201610378608A CN105873018A CN 105873018 A CN105873018 A CN 105873018A CN 201610378608 A CN201610378608 A CN 201610378608A CN 105873018 A CN105873018 A CN 105873018A
Authority
CN
China
Prior art keywords
sim card
virtual sim
security system
data
operational order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610378608.7A
Other languages
Chinese (zh)
Other versions
CN105873018B (en
Inventor
王洪亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610378608.7A priority Critical patent/CN105873018B/en
Publication of CN105873018A publication Critical patent/CN105873018A/en
Application granted granted Critical
Publication of CN105873018B publication Critical patent/CN105873018B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a virtual SIM card information storage method and system. The method comprises the steps that a, a security system receives an operation instruction initiated by a user for operation on a virtual SIM card; b, the security system stores data about operation on the virtual SIM card according to the operation instruction to a resource sharing control area; c, a main system reads the data stored by the security system to the resource sharing control area; the security system and the main system are two secure systems isolated by hardware, and the resource sharing control area is arranged between the security system and the main system; the main system only has a reading right on the resource sharing control area without a modification right. In combination with the secure two-system technology, the virtual SIM card technology is more secure and reliable, and the risks that user information in the virtual SIM card is tampered and property is subjected to loss are reduced.

Description

A kind of virtual SIM card information storage means and system
Technical field
The present invention relates to mobile communication terminal technical field, particularly relate to a kind of virtual SIM card information storage side Method and system.
Background technology
Existing virtual SIM card technology, typically by with operators in co-operation, directly virtual SIM card information is write Enter in chip ROM, it is achieved transnational automatically select different networks carry out authentication online.And we are common is System is the safest, and virtual SIM card information exists the risk be held as a hostage and distort.
While giving customer convenience, cheap flow, how to guarantee safety, be virtual SIM card skill Art problem demanding prompt solution.Directly virtual SIM card relevant information being stored in safety in cell phone system is not No more, if mobile phone is by root, virtual SIM card information and data are likely to be tampered or kidnap, to user Or enterprise causes heavy losses.
Summary of the invention
The invention provides a kind of virtual SIM card information storage means and system, reduce in virtual SIM card The risk that user profile is tampered.
For realizing above-mentioned design, the present invention by the following technical solutions:
On the one hand, it is provided that a kind of virtual SIM card information storage means, the method, including:
A. security system receives the operational order that virtual SIM card is operated by Client-initiated;
B. security system stores resource-sharing the data operated virtual SIM card according to described operational order Control area;
C. main system reads security system and is stored in the described data in resource-sharing region;
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system Authority, do not have change authority.
Preferably, described security system receives the operational order that virtual SIM card is operated by Client-initiated, Including:
Security system receives the operational order that virtual SIM card is operated by Client-initiated, it is judged that be currently No for security system, if so, continue executing with step b;If it is not, entrance security system, carry out authentication, If not over authentication, terminating the operation to virtual SIM card;If by authentication, it is switched to peace Total system, continues executing with step b.
Preferably, described virtual SIM card is operated, including: to the registration of virtual SIM card, activation, Switching or the amendment of information.
Preferably, described security system is the data storage operated virtual SIM card according to described operational order To resource sharing control region, including:
Security system judges whether to arrange safety check, if it is not, according to described operational order to virtual SIM card Operate, the described data to virtual SIM card operation are stored resource sharing control region;If so, Carry out safety check, if by safety check, virtual SIM card being operated according to described operational order, The described data to virtual SIM card operation are stored resource sharing control region;If not over safety school Test, terminate the operation to virtual SIM card.
Preferably, described according to described operational order, virtual SIM card is operated after, described institute State to virtual SIM card operation data store resource sharing control region before, also include:
Carry out data interaction with carrier server, receive the operating result returned, using this operating result as Data to virtual SIM card operation.
Preferably, after described main system reads the data that security system is stored in resource-sharing region, also wrap Include:
According to described data in UI interface display SIM state machine information.
Preferably, described data are: the data of preset virtual SIM card information.
On the other hand, it is provided that a kind of virtual SIM card information storage system, this system, including:
Operational order receiver module, receives Client-initiated for security system and operates virtual SIM card Operational order;
Data memory module, for security system the number operated virtual SIM card according to described operational order According to storage to resource sharing control region;
Data read module, reads security system for main system and is stored in the described data in resource-sharing region;
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system Authority, do not have change authority.
Preferably, described operational order receiver module, specifically for:
Security system receives the operational order that virtual SIM card is operated by Client-initiated, it is judged that be currently No for security system, if it is not, enter security system, carry out authentication, if not over authentication, Terminate the operation to virtual SIM card;If by authentication, being switched to security system.
Preferably, described security system is the data storage operated virtual SIM card according to described operational order To resource sharing control region, including:
Security system judges whether to arrange safety check, if it is not, according to described operational order to virtual SIM card Operate, the described data to virtual SIM card operation are stored resource sharing control region;If so, Carry out safety check, if by safety check, virtual SIM card being operated according to described operational order, The described data to virtual SIM card operation are stored resource sharing control region;If not over safety school Test, terminate the operation to virtual SIM card.
Preferably, described according to described operational order, virtual SIM card is operated after, described institute State to virtual SIM card operation data store resource sharing control region before, also include:
Carry out data interaction with carrier server, receive the operating result returned, using this operating result as Data to virtual SIM card operation.
Compared with prior art, the invention have the benefit that the present invention receives user by security system and sends out The operational order that virtual SIM card is operated risen;Security system according to described operational order to virtual The data of SIM operation store resource sharing control region;Main system reads security system and is stored in resource The described data of shared region;Wherein, described security system and described main system are the safety pair of hardware isolated System, is provided with described resource sharing control region between security system and main system;Main system is to resource-sharing The authority that control area is only read, does not has the authority of change.The present invention combines safe dual system technology, right The operation of virtual SIM card can only be carried out in the security system, the authority that main system only reads, not change Authority, make virtual SIM card technology more safe and reliable, reduce user profile in virtual SIM card and usurped Change the risk suffered a loss with property.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, the embodiment of the present invention will be retouched below In stating, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only Some embodiments of the present invention, for those of ordinary skill in the art, are not paying creative work Under premise, it is also possible to content according to embodiments of the present invention and these accompanying drawings obtain other accompanying drawing.
Fig. 1 is the first of a kind of virtual SIM card information storage means provided in the specific embodiment of the invention The method flow diagram of embodiment.
Fig. 2 is the second of a kind of virtual SIM card information storage means provided in the specific embodiment of the invention The method flow diagram of embodiment.
Fig. 3 is the 3 of a kind of virtual SIM card information storage means provided in the specific embodiment of the invention The method flow diagram of embodiment.
Fig. 4 is that the one provided in the specific embodiment of the invention carries out network to virtual SIM card with operator The operational flowchart of switching.
Fig. 5 is the enforcement of a kind of virtual SIM card information storage system provided in the specific embodiment of the invention The block diagram of example.
Detailed description of the invention
Technical scheme and the technique effect reached for making to present invention solves the technical problem that, using are more clear Chu, is described in further detail the technical scheme of the embodiment of the present invention below in conjunction with accompanying drawing, it is clear that Described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on this Embodiment in bright, those skilled in the art obtained under not making creative work premise all its His embodiment, broadly falls into the scope of protection of the invention.
Refer to Fig. 1, it is a kind of virtual SIM card information storage provided in the specific embodiment of the invention The method flow diagram of the first embodiment of method.As it can be seen, the method, including:
Step S101: security system receives the operational order that virtual SIM card is operated by Client-initiated.
Step S102: security system stores the data operated virtual SIM card according to described operational order Resource sharing control region.
Step S103: main system reads security system and is stored in the described data in resource-sharing region.
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system Authority, do not have change authority.
In sum, the present embodiment is by combining safe dual system technology, and the operation to virtual SIM card can only Carry out in the security system, the authority that main system only reads, there is no the authority of change, make virtual SIM card Technology is more safe and reliable, reduces the risk that user profile in virtual SIM card is tampered, and makes user avoid The property loss that is subject to because information is tampered.
Refer to Fig. 2, it is a kind of virtual SIM card information storage provided in the specific embodiment of the invention The method flow diagram of the second embodiment of method.As it can be seen, the method, including:
Step S201: security system receives the operational order that virtual SIM card is operated by Client-initiated.
Security system receives user and receives the operational order that virtual SIM card is operated by Client-initiated.Right Operation in virtual SIM card is actively initiated by user.Described virtual SIM card is operated, including: To the registration of virtual SIM card, activate, switch or the amendment etc. of information.
Step S202: judge whether be currently security system.If so, step S205 is continued executing with;If it is not, Continue executing with step S203.
Because for guaranteeing the safety of virtual SIM card, preventing virtual SIM card information to be tampered, to virtual The operation of SIM needs to carry out in the security system, and whether therefore need to judge is currently security system.
Step S203: entering security system, carrying out authentication, it is judged that whether authentication is passed through, if not having Have by authentication, continue executing with step S204;If by authentication, being switched to security system, continuing Continuous execution step S205.
If being currently not security system, then need to enter security system, and carry out authentication, it is judged that identity is tested Whether card passes through, and only just can be switched to security system by authentication, if not over authentication, Then perform step S204: terminate the operation to virtual SIM card.Described authentication, including fingerprint authentication, Iris verification, speech verification or password authentification etc..User can arrange authentication according to self use habit Type.
Step S204: terminate the operation to virtual SIM card.
Step S205: security system stores the data operated virtual SIM card according to described operational order Resource sharing control region.
If being currently security system, or passing through authentication, being switched to security system, then security system According to described operational order, virtual SIM card is operated, according to described operational order to virtual SIM card The data of operation store resource sharing control region.
Preferably, the executive agent of step S201~step S205 is security system, the behaviour to virtual SIM card Carry out in the security system.
Step S206: main system reads security system and is stored in the described data in resource-sharing region.
Described security system and described main system are the safe dual system of hardware isolated, security system and main system Between be provided with described resource sharing control region;The authority that resource sharing control region is only read by main system, There is no the authority of change.After main system reads the described data that security system is stored in resource-sharing region, According to described data in UI interface display SIM state machine information.
Preferably, described data are: the data of preset virtual SIM card information.Security system is not right The data of virtual SIM card operation all share to resource sharing control region, but preset virtual SIM card is believed The data of breath, the data sharing that i.e. the virtual SIM card information of main system needs is corresponding is to resource sharing control district Territory.
The present embodiment is by combining safe dual system technology, and the operation to virtual SIM card can only be in security system In carry out, if being currently not security system, then need enter security system, carry out authentication, only body Part is verified, and is just switched to security system, operates virtual SIM, and what main system only read Authority, does not has the authority of change, makes virtual SIM card technology more safe and reliable, prevent virtual SIM card from believing Breath is tampered, and reduces the risk making user's property suffer a loss because virtual SIM card information is tampered.
Refer to Fig. 3, it is a kind of virtual SIM card information storage provided in the specific embodiment of the invention The method flow diagram of the 3rd embodiment of method.As it can be seen, the method, including:
Step S301: security system receives the operational order that virtual SIM card is operated by Client-initiated.
Security system receives user and receives the operational order that virtual SIM card is operated by Client-initiated.Right Operation in virtual SIM card is actively initiated by user.Described virtual SIM card is operated, including: To the registration of virtual SIM card, activate, switch or the amendment etc. of information.
Step S302: judge whether be currently security system.If so, step S204 is continued executing with;If it is not, Continue executing with step S303.
Because for guaranteeing the safety of virtual SIM card, preventing virtual SIM card information to be tampered, to virtual The operation of SIM needs to carry out in the security system, and whether therefore need to judge is currently security system.
Step S303: entering security system, carrying out authentication, it is judged that whether authentication is passed through, if not having Have by authentication, continue executing with step S306;If by authentication, being switched to security system, continuing Continuous execution step S304.
If being currently not security system, then need to enter security system, and carry out authentication, it is judged that identity is tested Whether card passes through, and only just can be switched to security system by authentication, if not over authentication, Then perform step S306: terminate the operation to virtual SIM card.Described authentication, including fingerprint authentication, Iris verification, speech verification or password authentification etc..User can arrange authentication according to self use habit Type.
Step S304: security system judges whether to arrange safety check, if so, continues executing with step S305; If it is not, continue executing with step S307.
Security system judges whether to arrange safety check, because the operation to virtual SIM card, different operations Content may arrange safety check.
Step S305: judge whether safety check passes through, if by safety check, continuing executing with step S307; If not over safety check, continue executing with step S306.Described safety check, including fingerprint authentication, rainbow Film checking, speech verification or password authentification etc., user can arrange the class of safety check according to self use habit Type.
Step S306: terminate the operation to virtual SIM card.If not over safety check, then terminate void Intend the operation of SIM.
Step S307: virtual SIM card is operated by security system according to described operational order, described right The data of virtual SIM card operation store resource sharing control region.
If being not provided with safety check, or by safety check, then according to described operational order to virtual SIM Card operates, and the described data to virtual SIM card operation are stored resource sharing control region.
Described according to described operational order, virtual SIM card is operated after, described is described to virtual Before the data of SIM operation store resource sharing control region, also include: enter with carrier server Row data interaction, receives the operating result returned, using this operating result as the number operating virtual SIM card According to.If operating successfully, then the described data to virtual SIM card operation are stored security system and resource is total to Enjoy control area;If operation failure, then only the data operating virtual SIM card being stored security system In.All data to virtual SIM card operation all store in security system.
Preferably, described data are: the data of preset virtual SIM card information.Security system is not right The data of virtual SIM card operation all share to resource sharing control region, but preset virtual SIM card is believed The data of breath, the data sharing that i.e. the virtual SIM card information of main system needs is corresponding is to resource sharing control district Territory.
The executive agent of step S301~step S307 is security system, to the operation of virtual SIM card in safety System is carried out.
Step S308: main system reads security system and is stored in the described data in resource-sharing region.
Described security system and described main system are the safe dual system of hardware isolated, security system and main system Between be provided with described resource sharing control region;The authority that resource sharing control region is only read by main system, There is no the authority of change.After main system reads the described data that security system is stored in resource-sharing region, According to described data in UI interface display SIM state machine information.
As a example by carrying out network switching with operator, virtual SIM card and operator carry out the flow process of network switching As shown in Figure 4, concrete steps include figure:
Step S401: security system receives Client-initiated virtual SIM card and carries out network switching with operator Operational order.
Step S402: judge whether be currently security system.If so, step S404 is continued executing with;If it is not, Continue executing with step S403.
Step S403: entering security system, carrying out authentication, it is judged that whether authentication is passed through, if not having Have by authentication, continue executing with step S406;If by authentication, being switched to security system, continuing Continuous execution step S404.
Step S404: security system judges whether to arrange safety check, if so, continues executing with step S405; If it is not, continue executing with step S407.
Step S405: judge whether safety check passes through, if by safety check, continuing executing with step S407; If not over safety check, continue executing with step S406.
Step S406: terminate the operation to virtual SIM card.
Step S407: virtual SIM card is operated by security system according to described operational order, with operator Server carries out data interaction, receives the switching result returned, using this switching result as to virtual SIM card The data of operation.
Step S408: security system carries out secure local updating network state according to described switching result, institute State the data to virtual SIM card operation and store resource sharing control region.
Step S409: main system reads security system and is stored in the described data in resource-sharing region, carries out net Network and SIM card information update.
The present embodiment is by combining safe dual system technology, and the operation to virtual SIM card can only be in security system In carry out, if being currently not security system, then need enter security system, carry out authentication, only body Part is verified, and is just switched to security system, also needs to judge whether to set before operating virtual SIM Put safety check, if being not provided with safety check, or by just virtual SIM being grasped after safety check Make.And the authority that main system only reads, there is no the authority of change, make virtual SIM card technology safer Reliably, prevent virtual SIM card information to be tampered or kidnap, reduce because virtual SIM card information is tampered Make the risk that user's property suffers a loss.
The enforcement of a kind of virtual SIM card information storage system provided in the specific embodiment of the invention is provided Example, the embodiment of system embodiment based on above-mentioned method realizes, and the most most description please be joined Examine the embodiment of preceding method.
Refer to Fig. 5, it is a kind of virtual SIM card information storage provided in the specific embodiment of the invention The block diagram of the first embodiment of system.As it can be seen, this system, including:
Operational order receiver module 51, receives Client-initiated for security system and grasps virtual SIM card The operational order made.
Data memory module 52, for security system operating virtual SIM card according to described operational order Data store resource sharing control region.
Data read module 53, reads security system for main system and is stored in the described number in resource-sharing region According to.
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system Authority, do not have change authority.
Described operational order receiver module 51, specifically for: security system receives Client-initiated to virtual SIM Whether card carries out the operational order operated, it is judged that be currently security system, if it is not, enter security system, enter Row authentication, if not over authentication, terminating the operation to virtual SIM card;If being tested by identity Card, is switched to security system.
Described authentication, including fingerprint authentication or password authentification etc..
Described virtual SIM card is operated, including: to the registration of virtual SIM card, activate, switch, Or the amendment of information.
Described security system is according to described operational order, the data that virtual SIM card operates being stored resource altogether Enjoy control area, including: security system judges whether to arrange safety check, if it is not, refer to according to described operation Virtual SIM card is operated by order, and the described data to virtual SIM card operation are stored resource-sharing control Region processed;If so, safety check is carried out, if by safety check, according to described operational order to virtual SIM Card operates, and the described data to virtual SIM card operation are stored resource sharing control region;If not yet Have by safety check, terminate the operation to virtual SIM card.
Described according to described operational order, virtual SIM card is operated after, described is described to virtual Before the data of SIM operation store resource sharing control region, also include: enter with carrier server Row data interaction, receives the operating result returned, using this operating result as the number operating virtual SIM card According to.If operating successfully, then the described data to virtual SIM card operation are stored security system and resource is total to Enjoy control area;If operation failure, then only the data operating virtual SIM card being stored security system In.All data to virtual SIM card operation all store in security system.
Data read module 53, is additionally operable to: believe at UI interface display SIM state machine according to described data Breath.
Described safety check, including fingerprint authentication or password authentification etc..
Described data are: the data of preset virtual SIM card information.
In sum, the present embodiment is by by combining safe dual system technology, the operation to virtual SIM card Can only carry out in the security system, and the authority that main system only reads, there is no the authority of change, make virtual SIM technology is more safe and reliable, prevents virtual SIM card information to be tampered, reduces because of virtual SIM card The risk that information is tampered and makes user's property suffer a loss.
The know-why of the present invention is described above in association with specific embodiment.These describe and are intended merely to explain this The principle of invention, and limiting the scope of the invention can not be construed to by any way.Based on herein Explaining, those skilled in the art need not pay performing creative labour can associate other tool of the present invention Body embodiment, within these modes fall within protection scope of the present invention.

Claims (11)

1. virtual SIM card information storage means, it is characterised in that including:
A. security system receives the operational order that virtual SIM card is operated by Client-initiated;
B. security system is according to described operational order, the data that virtual SIM card operates being stored resource altogether Enjoy control area;
C. main system reads security system and is stored in the described data in resource-sharing region;
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system Authority, do not have change authority.
A kind of virtual SIM card information storage means the most according to claim 1, it is characterised in that institute State security system and receive the operational order that virtual SIM card is operated by Client-initiated, including:
Security system receives the operational order that virtual SIM card is operated by Client-initiated, it is judged that be currently No for security system, if so, continue executing with step b;If it is not, entrance security system, carry out authentication, If not over authentication, terminating the operation to virtual SIM card;If by authentication, it is switched to peace Total system, continues executing with step b.
A kind of virtual SIM card information storage means the most according to claim 2, it is characterised in that institute State and virtual SIM card is operated, including: to the registration of virtual SIM card, activate, switch or information Amendment.
A kind of virtual SIM card information storage means the most according to claim 2, it is characterised in that institute State security system and the data operated virtual SIM card according to described operational order are stored resource sharing control Region, including:
Security system judges whether to arrange safety check, if it is not, according to described operational order to virtual SIM card Operate, the described data to virtual SIM card operation are stored resource sharing control region;If so, Carry out safety check, if by safety check, virtual SIM card being operated according to described operational order, The described data to virtual SIM card operation are stored resource sharing control region;If not over safety school Test, terminate the operation to virtual SIM card.
A kind of virtual SIM card information storage means the most according to claim 4, it is characterised in that Described according to described operational order, virtual SIM card is operated after, described is described to virtual SIM card Before the data of operation store resource sharing control region, also include:
Carry out data interaction with carrier server, receive the operating result returned, using this operating result as Data to virtual SIM card operation.
A kind of virtual SIM card information storage means the most according to claim 1, it is characterised in that institute After stating the data that main system reading security system is stored in resource-sharing region, also include:
According to described data in UI interface display SIM state machine information.
A kind of virtual SIM card information storage means the most according to claim 1, it is characterised in that institute Stating data is: the data of preset virtual SIM card information.
8. a virtual SIM card information storage system, it is characterised in that including:
Operational order receiver module, receives Client-initiated for security system and operates virtual SIM card Operational order;
Data memory module, for security system the number operated virtual SIM card according to described operational order According to storage to resource sharing control region;
Data read module, reads security system for main system and is stored in the described data in resource-sharing region;
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system Authority, do not have change authority.
A kind of virtual SIM card information storage system the most according to claim 8, it is characterised in that institute State operational order receiver module, specifically for:
Security system receives the operational order that virtual SIM card is operated by Client-initiated, it is judged that be currently No for security system, if it is not, enter security system, carry out authentication, if not over authentication, Terminate the operation to virtual SIM card;If by authentication, being switched to security system.
A kind of virtual SIM card information storage system the most according to claim 9, it is characterised in that Described security system is according to described operational order, the data that virtual SIM card operates being stored resource-sharing control Region processed, including:
Security system judges whether to arrange safety check, if it is not, according to described operational order to virtual SIM card Operate, the described data to virtual SIM card operation are stored resource sharing control region;If so, Carry out safety check, if by safety check, virtual SIM card being operated according to described operational order, The described data to virtual SIM card operation are stored resource sharing control region;If not over safety school Test, terminate the operation to virtual SIM card.
11. a kind of virtual SIM card information storage systems according to claim 10, it is characterised in that Described according to described operational order, virtual SIM card is operated after, described is described to virtual SIM Before the data of card operation store resource sharing control region, also include:
Carry out data interaction with carrier server, receive the operating result returned, using this operating result as Data to virtual SIM card operation.
CN201610378608.7A 2016-05-31 2016-05-31 A kind of virtual SIM card information storage means and system Active CN105873018B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610378608.7A CN105873018B (en) 2016-05-31 2016-05-31 A kind of virtual SIM card information storage means and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610378608.7A CN105873018B (en) 2016-05-31 2016-05-31 A kind of virtual SIM card information storage means and system

Publications (2)

Publication Number Publication Date
CN105873018A true CN105873018A (en) 2016-08-17
CN105873018B CN105873018B (en) 2019-03-22

Family

ID=56643127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610378608.7A Active CN105873018B (en) 2016-05-31 2016-05-31 A kind of virtual SIM card information storage means and system

Country Status (1)

Country Link
CN (1) CN105873018B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135313A (en) * 2017-06-19 2017-09-05 深圳市筑泰防务智能科技有限公司 Hardware physical isolation dual system mobile phone
WO2018053903A1 (en) * 2016-09-22 2018-03-29 宇龙计算机通信科技(深圳)有限公司 Method and device for managing file, and mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090163175A1 (en) * 2007-12-24 2009-06-25 Guangming Shi Virtual sim card for mobile handsets
EP2410777A1 (en) * 2010-07-21 2012-01-25 Apple Inc. Virtual access module distribution apparatus and methods
WO2013174185A1 (en) * 2012-05-22 2013-11-28 中兴通讯股份有限公司 Method, system and related device for realizing virtual sim card
CN104378729A (en) * 2014-06-30 2015-02-25 北京神州泰岳软件股份有限公司 Mobile communication network service implementation method and mobile terminal system
CN104680089A (en) * 2013-11-29 2015-06-03 联想(北京)有限公司 Electronic device and system switching method
CN105071824A (en) * 2015-07-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Intelligent wearable device and data transmission method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090163175A1 (en) * 2007-12-24 2009-06-25 Guangming Shi Virtual sim card for mobile handsets
EP2410777A1 (en) * 2010-07-21 2012-01-25 Apple Inc. Virtual access module distribution apparatus and methods
WO2013174185A1 (en) * 2012-05-22 2013-11-28 中兴通讯股份有限公司 Method, system and related device for realizing virtual sim card
CN104680089A (en) * 2013-11-29 2015-06-03 联想(北京)有限公司 Electronic device and system switching method
CN104378729A (en) * 2014-06-30 2015-02-25 北京神州泰岳软件股份有限公司 Mobile communication network service implementation method and mobile terminal system
CN105071824A (en) * 2015-07-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Intelligent wearable device and data transmission method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018053903A1 (en) * 2016-09-22 2018-03-29 宇龙计算机通信科技(深圳)有限公司 Method and device for managing file, and mobile terminal
CN107135313A (en) * 2017-06-19 2017-09-05 深圳市筑泰防务智能科技有限公司 Hardware physical isolation dual system mobile phone

Also Published As

Publication number Publication date
CN105873018B (en) 2019-03-22

Similar Documents

Publication Publication Date Title
CN104461749B (en) A kind of application program synchronous method, sychronisation and the terminal of multisystem terminal
US10136324B2 (en) Method and apparatus for reading verification information
US20180069869A1 (en) Application platform with flexible permissioning
CN107645482A (en) A kind of risk control method and device for business operation
CN106330958A (en) Secure accessing method and device
CN104618314A (en) Method, device and system for password reset
CN110738473B (en) Wind control method, system, device and equipment
JP2019510316A (en) Method and device for providing account linking and service processing
CN110266656A (en) Exempt from close authenticating identity recognition methods, device and computer equipment
CN104185179A (en) Control apparatus and method for subscriber identity module, and subscriber identity module
CN106657032A (en) System and method for realizing identity identification and data authentication based on security medium confidential short message
CN105631659A (en) Payment request processing method, payment request processing device and terminal
CN101047701B (en) System and method for ensuring safety operation of applied program
CN111582868B (en) Transaction request processing method, device and equipment
CN105873018A (en) Virtual SIM card information storage method and system
CN112312400B (en) Access control method, access controller and storage medium
CN106209569A (en) The method for authenticating of a kind of enterprise instant communication and device
CN107506921B (en) Order risk identification method, system, storage medium and electronic equipment
CN108880819A (en) Work machine operating system and method
CN109067802A (en) A kind of identity authorization system of electric business platform account
CN105871840B (en) A kind of certificate management method and system
CN106919812B (en) Application process authority management method and device
US20110191575A1 (en) Ic chip, information processing apparatus, software module control method, information processing system, information processing method, and program
CN104735251A (en) Method and device for unlocking mobile terminals
US6811077B2 (en) Method for making secure access to a resident application on a user card co-operating with communication system terminal, and corresponding terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant