CN105873018A - Virtual SIM card information storage method and system - Google Patents
Virtual SIM card information storage method and system Download PDFInfo
- Publication number
- CN105873018A CN105873018A CN201610378608.7A CN201610378608A CN105873018A CN 105873018 A CN105873018 A CN 105873018A CN 201610378608 A CN201610378608 A CN 201610378608A CN 105873018 A CN105873018 A CN 105873018A
- Authority
- CN
- China
- Prior art keywords
- sim card
- virtual sim
- security system
- data
- operational order
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a virtual SIM card information storage method and system. The method comprises the steps that a, a security system receives an operation instruction initiated by a user for operation on a virtual SIM card; b, the security system stores data about operation on the virtual SIM card according to the operation instruction to a resource sharing control area; c, a main system reads the data stored by the security system to the resource sharing control area; the security system and the main system are two secure systems isolated by hardware, and the resource sharing control area is arranged between the security system and the main system; the main system only has a reading right on the resource sharing control area without a modification right. In combination with the secure two-system technology, the virtual SIM card technology is more secure and reliable, and the risks that user information in the virtual SIM card is tampered and property is subjected to loss are reduced.
Description
Technical field
The present invention relates to mobile communication terminal technical field, particularly relate to a kind of virtual SIM card information storage side
Method and system.
Background technology
Existing virtual SIM card technology, typically by with operators in co-operation, directly virtual SIM card information is write
Enter in chip ROM, it is achieved transnational automatically select different networks carry out authentication online.And we are common is
System is the safest, and virtual SIM card information exists the risk be held as a hostage and distort.
While giving customer convenience, cheap flow, how to guarantee safety, be virtual SIM card skill
Art problem demanding prompt solution.Directly virtual SIM card relevant information being stored in safety in cell phone system is not
No more, if mobile phone is by root, virtual SIM card information and data are likely to be tampered or kidnap, to user
Or enterprise causes heavy losses.
Summary of the invention
The invention provides a kind of virtual SIM card information storage means and system, reduce in virtual SIM card
The risk that user profile is tampered.
For realizing above-mentioned design, the present invention by the following technical solutions:
On the one hand, it is provided that a kind of virtual SIM card information storage means, the method, including:
A. security system receives the operational order that virtual SIM card is operated by Client-initiated;
B. security system stores resource-sharing the data operated virtual SIM card according to described operational order
Control area;
C. main system reads security system and is stored in the described data in resource-sharing region;
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and
Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system
Authority, do not have change authority.
Preferably, described security system receives the operational order that virtual SIM card is operated by Client-initiated,
Including:
Security system receives the operational order that virtual SIM card is operated by Client-initiated, it is judged that be currently
No for security system, if so, continue executing with step b;If it is not, entrance security system, carry out authentication,
If not over authentication, terminating the operation to virtual SIM card;If by authentication, it is switched to peace
Total system, continues executing with step b.
Preferably, described virtual SIM card is operated, including: to the registration of virtual SIM card, activation,
Switching or the amendment of information.
Preferably, described security system is the data storage operated virtual SIM card according to described operational order
To resource sharing control region, including:
Security system judges whether to arrange safety check, if it is not, according to described operational order to virtual SIM card
Operate, the described data to virtual SIM card operation are stored resource sharing control region;If so,
Carry out safety check, if by safety check, virtual SIM card being operated according to described operational order,
The described data to virtual SIM card operation are stored resource sharing control region;If not over safety school
Test, terminate the operation to virtual SIM card.
Preferably, described according to described operational order, virtual SIM card is operated after, described institute
State to virtual SIM card operation data store resource sharing control region before, also include:
Carry out data interaction with carrier server, receive the operating result returned, using this operating result as
Data to virtual SIM card operation.
Preferably, after described main system reads the data that security system is stored in resource-sharing region, also wrap
Include:
According to described data in UI interface display SIM state machine information.
Preferably, described data are: the data of preset virtual SIM card information.
On the other hand, it is provided that a kind of virtual SIM card information storage system, this system, including:
Operational order receiver module, receives Client-initiated for security system and operates virtual SIM card
Operational order;
Data memory module, for security system the number operated virtual SIM card according to described operational order
According to storage to resource sharing control region;
Data read module, reads security system for main system and is stored in the described data in resource-sharing region;
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and
Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system
Authority, do not have change authority.
Preferably, described operational order receiver module, specifically for:
Security system receives the operational order that virtual SIM card is operated by Client-initiated, it is judged that be currently
No for security system, if it is not, enter security system, carry out authentication, if not over authentication,
Terminate the operation to virtual SIM card;If by authentication, being switched to security system.
Preferably, described security system is the data storage operated virtual SIM card according to described operational order
To resource sharing control region, including:
Security system judges whether to arrange safety check, if it is not, according to described operational order to virtual SIM card
Operate, the described data to virtual SIM card operation are stored resource sharing control region;If so,
Carry out safety check, if by safety check, virtual SIM card being operated according to described operational order,
The described data to virtual SIM card operation are stored resource sharing control region;If not over safety school
Test, terminate the operation to virtual SIM card.
Preferably, described according to described operational order, virtual SIM card is operated after, described institute
State to virtual SIM card operation data store resource sharing control region before, also include:
Carry out data interaction with carrier server, receive the operating result returned, using this operating result as
Data to virtual SIM card operation.
Compared with prior art, the invention have the benefit that the present invention receives user by security system and sends out
The operational order that virtual SIM card is operated risen;Security system according to described operational order to virtual
The data of SIM operation store resource sharing control region;Main system reads security system and is stored in resource
The described data of shared region;Wherein, described security system and described main system are the safety pair of hardware isolated
System, is provided with described resource sharing control region between security system and main system;Main system is to resource-sharing
The authority that control area is only read, does not has the authority of change.The present invention combines safe dual system technology, right
The operation of virtual SIM card can only be carried out in the security system, the authority that main system only reads, not change
Authority, make virtual SIM card technology more safe and reliable, reduce user profile in virtual SIM card and usurped
Change the risk suffered a loss with property.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, the embodiment of the present invention will be retouched below
In stating, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only
Some embodiments of the present invention, for those of ordinary skill in the art, are not paying creative work
Under premise, it is also possible to content according to embodiments of the present invention and these accompanying drawings obtain other accompanying drawing.
Fig. 1 is the first of a kind of virtual SIM card information storage means provided in the specific embodiment of the invention
The method flow diagram of embodiment.
Fig. 2 is the second of a kind of virtual SIM card information storage means provided in the specific embodiment of the invention
The method flow diagram of embodiment.
Fig. 3 is the 3 of a kind of virtual SIM card information storage means provided in the specific embodiment of the invention
The method flow diagram of embodiment.
Fig. 4 is that the one provided in the specific embodiment of the invention carries out network to virtual SIM card with operator
The operational flowchart of switching.
Fig. 5 is the enforcement of a kind of virtual SIM card information storage system provided in the specific embodiment of the invention
The block diagram of example.
Detailed description of the invention
Technical scheme and the technique effect reached for making to present invention solves the technical problem that, using are more clear
Chu, is described in further detail the technical scheme of the embodiment of the present invention below in conjunction with accompanying drawing, it is clear that
Described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on this
Embodiment in bright, those skilled in the art obtained under not making creative work premise all its
His embodiment, broadly falls into the scope of protection of the invention.
Refer to Fig. 1, it is a kind of virtual SIM card information storage provided in the specific embodiment of the invention
The method flow diagram of the first embodiment of method.As it can be seen, the method, including:
Step S101: security system receives the operational order that virtual SIM card is operated by Client-initiated.
Step S102: security system stores the data operated virtual SIM card according to described operational order
Resource sharing control region.
Step S103: main system reads security system and is stored in the described data in resource-sharing region.
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and
Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system
Authority, do not have change authority.
In sum, the present embodiment is by combining safe dual system technology, and the operation to virtual SIM card can only
Carry out in the security system, the authority that main system only reads, there is no the authority of change, make virtual SIM card
Technology is more safe and reliable, reduces the risk that user profile in virtual SIM card is tampered, and makes user avoid
The property loss that is subject to because information is tampered.
Refer to Fig. 2, it is a kind of virtual SIM card information storage provided in the specific embodiment of the invention
The method flow diagram of the second embodiment of method.As it can be seen, the method, including:
Step S201: security system receives the operational order that virtual SIM card is operated by Client-initiated.
Security system receives user and receives the operational order that virtual SIM card is operated by Client-initiated.Right
Operation in virtual SIM card is actively initiated by user.Described virtual SIM card is operated, including:
To the registration of virtual SIM card, activate, switch or the amendment etc. of information.
Step S202: judge whether be currently security system.If so, step S205 is continued executing with;If it is not,
Continue executing with step S203.
Because for guaranteeing the safety of virtual SIM card, preventing virtual SIM card information to be tampered, to virtual
The operation of SIM needs to carry out in the security system, and whether therefore need to judge is currently security system.
Step S203: entering security system, carrying out authentication, it is judged that whether authentication is passed through, if not having
Have by authentication, continue executing with step S204;If by authentication, being switched to security system, continuing
Continuous execution step S205.
If being currently not security system, then need to enter security system, and carry out authentication, it is judged that identity is tested
Whether card passes through, and only just can be switched to security system by authentication, if not over authentication,
Then perform step S204: terminate the operation to virtual SIM card.Described authentication, including fingerprint authentication,
Iris verification, speech verification or password authentification etc..User can arrange authentication according to self use habit
Type.
Step S204: terminate the operation to virtual SIM card.
Step S205: security system stores the data operated virtual SIM card according to described operational order
Resource sharing control region.
If being currently security system, or passing through authentication, being switched to security system, then security system
According to described operational order, virtual SIM card is operated, according to described operational order to virtual SIM card
The data of operation store resource sharing control region.
Preferably, the executive agent of step S201~step S205 is security system, the behaviour to virtual SIM card
Carry out in the security system.
Step S206: main system reads security system and is stored in the described data in resource-sharing region.
Described security system and described main system are the safe dual system of hardware isolated, security system and main system
Between be provided with described resource sharing control region;The authority that resource sharing control region is only read by main system,
There is no the authority of change.After main system reads the described data that security system is stored in resource-sharing region,
According to described data in UI interface display SIM state machine information.
Preferably, described data are: the data of preset virtual SIM card information.Security system is not right
The data of virtual SIM card operation all share to resource sharing control region, but preset virtual SIM card is believed
The data of breath, the data sharing that i.e. the virtual SIM card information of main system needs is corresponding is to resource sharing control district
Territory.
The present embodiment is by combining safe dual system technology, and the operation to virtual SIM card can only be in security system
In carry out, if being currently not security system, then need enter security system, carry out authentication, only body
Part is verified, and is just switched to security system, operates virtual SIM, and what main system only read
Authority, does not has the authority of change, makes virtual SIM card technology more safe and reliable, prevent virtual SIM card from believing
Breath is tampered, and reduces the risk making user's property suffer a loss because virtual SIM card information is tampered.
Refer to Fig. 3, it is a kind of virtual SIM card information storage provided in the specific embodiment of the invention
The method flow diagram of the 3rd embodiment of method.As it can be seen, the method, including:
Step S301: security system receives the operational order that virtual SIM card is operated by Client-initiated.
Security system receives user and receives the operational order that virtual SIM card is operated by Client-initiated.Right
Operation in virtual SIM card is actively initiated by user.Described virtual SIM card is operated, including:
To the registration of virtual SIM card, activate, switch or the amendment etc. of information.
Step S302: judge whether be currently security system.If so, step S204 is continued executing with;If it is not,
Continue executing with step S303.
Because for guaranteeing the safety of virtual SIM card, preventing virtual SIM card information to be tampered, to virtual
The operation of SIM needs to carry out in the security system, and whether therefore need to judge is currently security system.
Step S303: entering security system, carrying out authentication, it is judged that whether authentication is passed through, if not having
Have by authentication, continue executing with step S306;If by authentication, being switched to security system, continuing
Continuous execution step S304.
If being currently not security system, then need to enter security system, and carry out authentication, it is judged that identity is tested
Whether card passes through, and only just can be switched to security system by authentication, if not over authentication,
Then perform step S306: terminate the operation to virtual SIM card.Described authentication, including fingerprint authentication,
Iris verification, speech verification or password authentification etc..User can arrange authentication according to self use habit
Type.
Step S304: security system judges whether to arrange safety check, if so, continues executing with step S305;
If it is not, continue executing with step S307.
Security system judges whether to arrange safety check, because the operation to virtual SIM card, different operations
Content may arrange safety check.
Step S305: judge whether safety check passes through, if by safety check, continuing executing with step S307;
If not over safety check, continue executing with step S306.Described safety check, including fingerprint authentication, rainbow
Film checking, speech verification or password authentification etc., user can arrange the class of safety check according to self use habit
Type.
Step S306: terminate the operation to virtual SIM card.If not over safety check, then terminate void
Intend the operation of SIM.
Step S307: virtual SIM card is operated by security system according to described operational order, described right
The data of virtual SIM card operation store resource sharing control region.
If being not provided with safety check, or by safety check, then according to described operational order to virtual SIM
Card operates, and the described data to virtual SIM card operation are stored resource sharing control region.
Described according to described operational order, virtual SIM card is operated after, described is described to virtual
Before the data of SIM operation store resource sharing control region, also include: enter with carrier server
Row data interaction, receives the operating result returned, using this operating result as the number operating virtual SIM card
According to.If operating successfully, then the described data to virtual SIM card operation are stored security system and resource is total to
Enjoy control area;If operation failure, then only the data operating virtual SIM card being stored security system
In.All data to virtual SIM card operation all store in security system.
Preferably, described data are: the data of preset virtual SIM card information.Security system is not right
The data of virtual SIM card operation all share to resource sharing control region, but preset virtual SIM card is believed
The data of breath, the data sharing that i.e. the virtual SIM card information of main system needs is corresponding is to resource sharing control district
Territory.
The executive agent of step S301~step S307 is security system, to the operation of virtual SIM card in safety
System is carried out.
Step S308: main system reads security system and is stored in the described data in resource-sharing region.
Described security system and described main system are the safe dual system of hardware isolated, security system and main system
Between be provided with described resource sharing control region;The authority that resource sharing control region is only read by main system,
There is no the authority of change.After main system reads the described data that security system is stored in resource-sharing region,
According to described data in UI interface display SIM state machine information.
As a example by carrying out network switching with operator, virtual SIM card and operator carry out the flow process of network switching
As shown in Figure 4, concrete steps include figure:
Step S401: security system receives Client-initiated virtual SIM card and carries out network switching with operator
Operational order.
Step S402: judge whether be currently security system.If so, step S404 is continued executing with;If it is not,
Continue executing with step S403.
Step S403: entering security system, carrying out authentication, it is judged that whether authentication is passed through, if not having
Have by authentication, continue executing with step S406;If by authentication, being switched to security system, continuing
Continuous execution step S404.
Step S404: security system judges whether to arrange safety check, if so, continues executing with step S405;
If it is not, continue executing with step S407.
Step S405: judge whether safety check passes through, if by safety check, continuing executing with step S407;
If not over safety check, continue executing with step S406.
Step S406: terminate the operation to virtual SIM card.
Step S407: virtual SIM card is operated by security system according to described operational order, with operator
Server carries out data interaction, receives the switching result returned, using this switching result as to virtual SIM card
The data of operation.
Step S408: security system carries out secure local updating network state according to described switching result, institute
State the data to virtual SIM card operation and store resource sharing control region.
Step S409: main system reads security system and is stored in the described data in resource-sharing region, carries out net
Network and SIM card information update.
The present embodiment is by combining safe dual system technology, and the operation to virtual SIM card can only be in security system
In carry out, if being currently not security system, then need enter security system, carry out authentication, only body
Part is verified, and is just switched to security system, also needs to judge whether to set before operating virtual SIM
Put safety check, if being not provided with safety check, or by just virtual SIM being grasped after safety check
Make.And the authority that main system only reads, there is no the authority of change, make virtual SIM card technology safer
Reliably, prevent virtual SIM card information to be tampered or kidnap, reduce because virtual SIM card information is tampered
Make the risk that user's property suffers a loss.
The enforcement of a kind of virtual SIM card information storage system provided in the specific embodiment of the invention is provided
Example, the embodiment of system embodiment based on above-mentioned method realizes, and the most most description please be joined
Examine the embodiment of preceding method.
Refer to Fig. 5, it is a kind of virtual SIM card information storage provided in the specific embodiment of the invention
The block diagram of the first embodiment of system.As it can be seen, this system, including:
Operational order receiver module 51, receives Client-initiated for security system and grasps virtual SIM card
The operational order made.
Data memory module 52, for security system operating virtual SIM card according to described operational order
Data store resource sharing control region.
Data read module 53, reads security system for main system and is stored in the described number in resource-sharing region
According to.
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and
Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system
Authority, do not have change authority.
Described operational order receiver module 51, specifically for: security system receives Client-initiated to virtual SIM
Whether card carries out the operational order operated, it is judged that be currently security system, if it is not, enter security system, enter
Row authentication, if not over authentication, terminating the operation to virtual SIM card;If being tested by identity
Card, is switched to security system.
Described authentication, including fingerprint authentication or password authentification etc..
Described virtual SIM card is operated, including: to the registration of virtual SIM card, activate, switch,
Or the amendment of information.
Described security system is according to described operational order, the data that virtual SIM card operates being stored resource altogether
Enjoy control area, including: security system judges whether to arrange safety check, if it is not, refer to according to described operation
Virtual SIM card is operated by order, and the described data to virtual SIM card operation are stored resource-sharing control
Region processed;If so, safety check is carried out, if by safety check, according to described operational order to virtual SIM
Card operates, and the described data to virtual SIM card operation are stored resource sharing control region;If not yet
Have by safety check, terminate the operation to virtual SIM card.
Described according to described operational order, virtual SIM card is operated after, described is described to virtual
Before the data of SIM operation store resource sharing control region, also include: enter with carrier server
Row data interaction, receives the operating result returned, using this operating result as the number operating virtual SIM card
According to.If operating successfully, then the described data to virtual SIM card operation are stored security system and resource is total to
Enjoy control area;If operation failure, then only the data operating virtual SIM card being stored security system
In.All data to virtual SIM card operation all store in security system.
Data read module 53, is additionally operable to: believe at UI interface display SIM state machine according to described data
Breath.
Described safety check, including fingerprint authentication or password authentification etc..
Described data are: the data of preset virtual SIM card information.
In sum, the present embodiment is by by combining safe dual system technology, the operation to virtual SIM card
Can only carry out in the security system, and the authority that main system only reads, there is no the authority of change, make virtual
SIM technology is more safe and reliable, prevents virtual SIM card information to be tampered, reduces because of virtual SIM card
The risk that information is tampered and makes user's property suffer a loss.
The know-why of the present invention is described above in association with specific embodiment.These describe and are intended merely to explain this
The principle of invention, and limiting the scope of the invention can not be construed to by any way.Based on herein
Explaining, those skilled in the art need not pay performing creative labour can associate other tool of the present invention
Body embodiment, within these modes fall within protection scope of the present invention.
Claims (11)
1. virtual SIM card information storage means, it is characterised in that including:
A. security system receives the operational order that virtual SIM card is operated by Client-initiated;
B. security system is according to described operational order, the data that virtual SIM card operates being stored resource altogether
Enjoy control area;
C. main system reads security system and is stored in the described data in resource-sharing region;
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and
Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system
Authority, do not have change authority.
A kind of virtual SIM card information storage means the most according to claim 1, it is characterised in that institute
State security system and receive the operational order that virtual SIM card is operated by Client-initiated, including:
Security system receives the operational order that virtual SIM card is operated by Client-initiated, it is judged that be currently
No for security system, if so, continue executing with step b;If it is not, entrance security system, carry out authentication,
If not over authentication, terminating the operation to virtual SIM card;If by authentication, it is switched to peace
Total system, continues executing with step b.
A kind of virtual SIM card information storage means the most according to claim 2, it is characterised in that institute
State and virtual SIM card is operated, including: to the registration of virtual SIM card, activate, switch or information
Amendment.
A kind of virtual SIM card information storage means the most according to claim 2, it is characterised in that institute
State security system and the data operated virtual SIM card according to described operational order are stored resource sharing control
Region, including:
Security system judges whether to arrange safety check, if it is not, according to described operational order to virtual SIM card
Operate, the described data to virtual SIM card operation are stored resource sharing control region;If so,
Carry out safety check, if by safety check, virtual SIM card being operated according to described operational order,
The described data to virtual SIM card operation are stored resource sharing control region;If not over safety school
Test, terminate the operation to virtual SIM card.
A kind of virtual SIM card information storage means the most according to claim 4, it is characterised in that
Described according to described operational order, virtual SIM card is operated after, described is described to virtual SIM card
Before the data of operation store resource sharing control region, also include:
Carry out data interaction with carrier server, receive the operating result returned, using this operating result as
Data to virtual SIM card operation.
A kind of virtual SIM card information storage means the most according to claim 1, it is characterised in that institute
After stating the data that main system reading security system is stored in resource-sharing region, also include:
According to described data in UI interface display SIM state machine information.
A kind of virtual SIM card information storage means the most according to claim 1, it is characterised in that institute
Stating data is: the data of preset virtual SIM card information.
8. a virtual SIM card information storage system, it is characterised in that including:
Operational order receiver module, receives Client-initiated for security system and operates virtual SIM card
Operational order;
Data memory module, for security system the number operated virtual SIM card according to described operational order
According to storage to resource sharing control region;
Data read module, reads security system for main system and is stored in the described data in resource-sharing region;
Wherein, described security system and described main system are the safe dual system of hardware isolated, security system and
Described resource sharing control region it is provided with between main system;Resource sharing control region is only read by main system
Authority, do not have change authority.
A kind of virtual SIM card information storage system the most according to claim 8, it is characterised in that institute
State operational order receiver module, specifically for:
Security system receives the operational order that virtual SIM card is operated by Client-initiated, it is judged that be currently
No for security system, if it is not, enter security system, carry out authentication, if not over authentication,
Terminate the operation to virtual SIM card;If by authentication, being switched to security system.
A kind of virtual SIM card information storage system the most according to claim 9, it is characterised in that
Described security system is according to described operational order, the data that virtual SIM card operates being stored resource-sharing control
Region processed, including:
Security system judges whether to arrange safety check, if it is not, according to described operational order to virtual SIM card
Operate, the described data to virtual SIM card operation are stored resource sharing control region;If so,
Carry out safety check, if by safety check, virtual SIM card being operated according to described operational order,
The described data to virtual SIM card operation are stored resource sharing control region;If not over safety school
Test, terminate the operation to virtual SIM card.
11. a kind of virtual SIM card information storage systems according to claim 10, it is characterised in that
Described according to described operational order, virtual SIM card is operated after, described is described to virtual SIM
Before the data of card operation store resource sharing control region, also include:
Carry out data interaction with carrier server, receive the operating result returned, using this operating result as
Data to virtual SIM card operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610378608.7A CN105873018B (en) | 2016-05-31 | 2016-05-31 | A kind of virtual SIM card information storage means and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610378608.7A CN105873018B (en) | 2016-05-31 | 2016-05-31 | A kind of virtual SIM card information storage means and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105873018A true CN105873018A (en) | 2016-08-17 |
CN105873018B CN105873018B (en) | 2019-03-22 |
Family
ID=56643127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610378608.7A Active CN105873018B (en) | 2016-05-31 | 2016-05-31 | A kind of virtual SIM card information storage means and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105873018B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107135313A (en) * | 2017-06-19 | 2017-09-05 | 深圳市筑泰防务智能科技有限公司 | Hardware physical isolation dual system mobile phone |
WO2018053903A1 (en) * | 2016-09-22 | 2018-03-29 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for managing file, and mobile terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090163175A1 (en) * | 2007-12-24 | 2009-06-25 | Guangming Shi | Virtual sim card for mobile handsets |
EP2410777A1 (en) * | 2010-07-21 | 2012-01-25 | Apple Inc. | Virtual access module distribution apparatus and methods |
WO2013174185A1 (en) * | 2012-05-22 | 2013-11-28 | 中兴通讯股份有限公司 | Method, system and related device for realizing virtual sim card |
CN104378729A (en) * | 2014-06-30 | 2015-02-25 | 北京神州泰岳软件股份有限公司 | Mobile communication network service implementation method and mobile terminal system |
CN104680089A (en) * | 2013-11-29 | 2015-06-03 | 联想(北京)有限公司 | Electronic device and system switching method |
CN105071824A (en) * | 2015-07-20 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Intelligent wearable device and data transmission method |
-
2016
- 2016-05-31 CN CN201610378608.7A patent/CN105873018B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090163175A1 (en) * | 2007-12-24 | 2009-06-25 | Guangming Shi | Virtual sim card for mobile handsets |
EP2410777A1 (en) * | 2010-07-21 | 2012-01-25 | Apple Inc. | Virtual access module distribution apparatus and methods |
WO2013174185A1 (en) * | 2012-05-22 | 2013-11-28 | 中兴通讯股份有限公司 | Method, system and related device for realizing virtual sim card |
CN104680089A (en) * | 2013-11-29 | 2015-06-03 | 联想(北京)有限公司 | Electronic device and system switching method |
CN104378729A (en) * | 2014-06-30 | 2015-02-25 | 北京神州泰岳软件股份有限公司 | Mobile communication network service implementation method and mobile terminal system |
CN105071824A (en) * | 2015-07-20 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Intelligent wearable device and data transmission method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018053903A1 (en) * | 2016-09-22 | 2018-03-29 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for managing file, and mobile terminal |
CN107135313A (en) * | 2017-06-19 | 2017-09-05 | 深圳市筑泰防务智能科技有限公司 | Hardware physical isolation dual system mobile phone |
Also Published As
Publication number | Publication date |
---|---|
CN105873018B (en) | 2019-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104461749B (en) | A kind of application program synchronous method, sychronisation and the terminal of multisystem terminal | |
US10136324B2 (en) | Method and apparatus for reading verification information | |
US20180069869A1 (en) | Application platform with flexible permissioning | |
CN107645482A (en) | A kind of risk control method and device for business operation | |
CN106330958A (en) | Secure accessing method and device | |
CN104618314A (en) | Method, device and system for password reset | |
CN110738473B (en) | Wind control method, system, device and equipment | |
JP2019510316A (en) | Method and device for providing account linking and service processing | |
CN110266656A (en) | Exempt from close authenticating identity recognition methods, device and computer equipment | |
CN104185179A (en) | Control apparatus and method for subscriber identity module, and subscriber identity module | |
CN106657032A (en) | System and method for realizing identity identification and data authentication based on security medium confidential short message | |
CN105631659A (en) | Payment request processing method, payment request processing device and terminal | |
CN101047701B (en) | System and method for ensuring safety operation of applied program | |
CN111582868B (en) | Transaction request processing method, device and equipment | |
CN105873018A (en) | Virtual SIM card information storage method and system | |
CN112312400B (en) | Access control method, access controller and storage medium | |
CN106209569A (en) | The method for authenticating of a kind of enterprise instant communication and device | |
CN107506921B (en) | Order risk identification method, system, storage medium and electronic equipment | |
CN108880819A (en) | Work machine operating system and method | |
CN109067802A (en) | A kind of identity authorization system of electric business platform account | |
CN105871840B (en) | A kind of certificate management method and system | |
CN106919812B (en) | Application process authority management method and device | |
US20110191575A1 (en) | Ic chip, information processing apparatus, software module control method, information processing system, information processing method, and program | |
CN104735251A (en) | Method and device for unlocking mobile terminals | |
US6811077B2 (en) | Method for making secure access to a resident application on a user card co-operating with communication system terminal, and corresponding terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |