CN107240157B - Near field communication security control method, mobile terminal and computer readable storage medium - Google Patents
Near field communication security control method, mobile terminal and computer readable storage medium Download PDFInfo
- Publication number
- CN107240157B CN107240157B CN201710340693.2A CN201710340693A CN107240157B CN 107240157 B CN107240157 B CN 107240157B CN 201710340693 A CN201710340693 A CN 201710340693A CN 107240157 B CN107240157 B CN 107240157B
- Authority
- CN
- China
- Prior art keywords
- field communication
- near field
- application
- preset
- nfc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 151
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000012795 verification Methods 0.000 claims abstract description 55
- 230000005540 biological transmission Effects 0.000 claims abstract description 21
- 230000003993 interaction Effects 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 22
- 230000008569 process Effects 0.000 description 9
- 239000008186 active pharmaceutical agent Substances 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 238000004088 simulation Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 241000699670 Mus sp. Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10297—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B1/00—Machines for printing and issuing tickets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/70—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
- H04B5/77—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Toxicology (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Power Engineering (AREA)
- Theoretical Computer Science (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明公开了一种近场通信安全控制方法,包括:在启动安全读取模式时,将近场通信控制器读取数据的传输路径,重定向到可信执行环境中的预设缓存区;通过所述可信执行环境的预设可信应用,基于所述近场通信控制器将近场通信卡片的第一身份标识读取到所述预设缓存区中,并基于所述第一身份标识,对所述近场通信卡片进行安全校验;在所述近场通信卡片通过安全校验时,设置普通执行环境中对应所述近场通信卡片的近场通信应用可访问所述预设可信应用,以供所述近场通信应用通过所述预设可信应用访问所述近场通信卡片。本发明还公开了一种移动终端及计算机可读储存介质。本发明能够提升移动终端进行近场通信交互时的安全性。
The invention discloses a near field communication safety control method, comprising: when a safe reading mode is started, a near field communication controller reads a data transmission path, and redirects it to a preset buffer area in a trusted execution environment; The preset trusted application of the trusted execution environment reads the first identity of the near field communication card into the preset buffer based on the near field communication controller, and based on the first identity, Perform security verification on the near field communication card; when the near field communication card passes the security verification, set the near field communication application corresponding to the near field communication card in a common execution environment to access the preset trusted application, so that the near field communication application can access the near field communication card through the preset trusted application. The invention also discloses a mobile terminal and a computer-readable storage medium. The present invention can improve the security when the mobile terminal performs near field communication interaction.
Description
技术领域technical field
本发明涉及移动终端技术领域,具体涉及一种近场通信安全控制方法、移动终端及计算机可读存储介质。The present invention relates to the technical field of mobile terminals, in particular to a near field communication security control method, a mobile terminal and a computer-readable storage medium.
背景技术Background technique
NFC(NearFieldCommunication,近场通信)是一种短距高频的无线电技术,允许电子设备之间进行非接触式点对点数据传输交换数据,由RFID(Radio FrequencyIdentification,非接触式射频识别)演变而来。NFC工作频率为13.56Hz,有效范围为20cm以内,其传输速度有106Kbit/秒、212Kbit/秒或者424Kbit/秒三种。NFC有3种工作模式:读卡器模式、点对点模式、卡模拟模式。NFC (Near Field Communication) is a short-range high-frequency radio technology that allows non-contact point-to-point data transmission and exchange of data between electronic devices. It is evolved from RFID (Radio Frequency Identification, non-contact radio frequency identification). The NFC operating frequency is 13.56Hz, the effective range is within 20cm, and its transmission speed is 106Kbit/sec, 212Kbit/sec or 424Kbit/sec. NFC has 3 working modes: card reader mode, peer-to-peer mode, and card emulation mode.
移动终端在配置NFC控制器,且NFC控制器工作于读卡器模式时,移动终端可通过NFC控制器产生射频场,从外部采用相同标准的NFC卡片中读写数据,例如,用户可通过手机对“深圳通”卡的信息进行读取,并进行充值等操作。然而,由于NFC的低门槛,不法分子能够自行制造NFC卡片,并将木马程序或者其他危险代码写入到NFC卡片中,若该NFC卡片被用户操作移动终端读取,NFC卡片写入的木马程序或危险代码将被植入到用户的移动终端,导致用户数据被窃取或破坏。When the mobile terminal is equipped with an NFC controller and the NFC controller works in the card reader mode, the mobile terminal can generate a radio frequency field through the NFC controller to read and write data from an NFC card with the same standard from the outside. Read the information of the "Shenzhen Pass" card, and perform operations such as recharging. However, due to the low threshold of NFC, criminals can make NFC cards by themselves, and write Trojan programs or other dangerous codes into the NFC card. If the NFC card is read by the user operating the mobile terminal, the Trojan program written in the NFC card Or dangerous codes will be implanted into the user's mobile terminal, resulting in the theft or destruction of user data.
发明内容SUMMARY OF THE INVENTION
本发明提供一种近场通信安全控制方法、移动终端及计算机可读存储介质,旨在提升移动终端进行近场通信交互时的安全性。The present invention provides a near field communication security control method, a mobile terminal and a computer-readable storage medium, aiming to improve the security of the mobile terminal when performing near field communication interaction.
为实现上述发明目的,本发明提供一种近场通信安全控制方法,该近场通信安全控制方法包括:In order to achieve the above purpose of the invention, the present invention provides a near field communication security control method, the near field communication security control method includes:
在启动安全读取模式时,将近场通信控制器读取数据的传输路径,重定向到可信执行环境中的预设缓存区;When the secure read mode is activated, the near field communication controller reads the data transmission path and redirects it to the preset buffer area in the trusted execution environment;
通过所述可信执行环境的预设可信应用,基于所述近场通信控制器将近场通信卡片的第一身份标识读取到所述预设缓存区中,并基于所述第一身份标识,对所述近场通信卡片进行安全校验;Through the preset trusted application of the trusted execution environment, the first identification of the near field communication card is read into the preset buffer area based on the near field communication controller, and based on the first identification , performing security verification on the near field communication card;
在所述近场通信卡片通过安全校验时,设置普通执行环境中对应所述近场通信卡片的近场通信应用可访问所述预设可信应用,以供所述近场通信应用通过所述预设可信应用访问所述近场通信卡片。When the near field communication card passes the security verification, it is set that the near field communication application corresponding to the near field communication card in the common execution environment can access the preset trusted application, so that the near field communication application can pass all the The preset trusted application accesses the near field communication card.
可选地,所述近场通信应用为票务应用,设置所述近场通信应用可访问所述预设可信应用的步骤之后,还包括:Optionally, the near field communication application is a ticketing application, and after the step of setting the near field communication application to be able to access the preset trusted application, the method further includes:
通过预设可信应用将近场通信卡片携带的用户实名信息读取到预设缓存区中,并基于用户实名信息以及票务应用的预设票务信息生成临时申请信息;Read the user's real-name information carried by the near field communication card into the preset cache area through the preset trusted application, and generate temporary application information based on the user's real-name information and the preset ticketing information of the ticketing application;
通过所述预设可信应用与所述票务应用之间的访问通道,将所述临时申请信息传输至所述票务应用,以供所述票务应用完成实名购票。The temporary application information is transmitted to the ticketing application through the access channel between the preset trusted application and the ticketing application, so that the ticketing application can complete the real-name ticket purchase.
可选地,通过预设可信应用读取第一身份标识的步骤包括:Optionally, the step of reading the first identity identifier through a preset trusted application includes:
按照预设频率,对所述预设可信应用进行预设次数的调用,以指示所述预设可信应用读取所述近场通信卡片的第一身份标识。According to a preset frequency, the preset trusted application is called a preset number of times to instruct the preset trusted application to read the first identity identifier of the near field communication card.
可选地,所述基于所述第一身份标识,通过所述预设可信应用对所述近场通信卡片进行安全校验的步骤之后,还包括:Optionally, after the step of performing security verification on the near field communication card through the preset trusted application based on the first identity identifier, the method further includes:
在所述近场通信卡片未通过安全校验时,输出所述近场通信卡片不安全的第一提示信息。When the near field communication card fails the security verification, output first prompt information that the near field communication card is not safe.
可选地,所述在启动安全读取模式时,将近场通信控制器读取数据的传输路径,重定向到可信执行环境中的预设缓存区的步骤之前,还包括:Optionally, before the step of redirecting the transmission path of the near field communication controller to read data to a preset buffer area in the trusted execution environment when the secure reading mode is activated, the method further includes:
在接收到用户的安全读取模式启动操作时,启动安全读取模式。Secure read mode is initiated upon receipt of a secure read mode initiation operation from the user.
可选地,所述启动安全读取模式之前,还包括:Optionally, before starting the safe reading mode, the method further includes:
在接收到用户的安全读取模式启动操作时,显示预设鉴权界面,以供用户输入鉴权数据;When receiving the user's safe reading mode startup operation, a preset authentication interface is displayed for the user to input authentication data;
基于显示的所述预设鉴权界面接收用户输入的鉴权数据,并基于所述鉴权数据进行用户身份认证;Receive authentication data input by the user based on the displayed preset authentication interface, and perform user identity authentication based on the authentication data;
在用户身份认证通过之后,启动安全读取模式。After the user authentication is passed, the secure read mode is activated.
可选地,设置所述近场通信应用可访问所述预设可信应用的步骤之前,还包括:Optionally, before the step of setting the near field communication application to be able to access the preset trusted application, the method further includes:
在所述近场通信卡片通过安全校验时,通过所述预设可信应用读取所述近场通信应用的第二身份标识到所述预设缓存区中;When the near field communication card passes the security check, read the second identity of the near field communication application into the preset buffer area through the preset trusted application;
基于所述第二身份标识,通过所述预设可信应用对所述近场通信应用进行安全校验;Based on the second identity identifier, perform security verification on the near field communication application by using the preset trusted application;
在所述近场通信应用通过安全校验时,设置所述近场通信应用可访问所述预设可信应用。When the near field communication application passes the security check, it is set that the near field communication application can access the preset trusted application.
可选地,所述基于所述第二身份标识,通过所述预设可信应用对所述近场通信应用进行安全校验的步骤之后,还包括:Optionally, after the step of performing security verification on the near field communication application by using the preset trusted application based on the second identity identifier, the method further includes:
在所述近场通信应用未通过安全校验时,输出所述近场通信应用不安全的第二提示信息。When the near field communication application fails the security check, output second prompt information that the near field communication application is not safe.
进一步地,本发明还提供一种移动终端,该移动终端包括:Further, the present invention also provides a mobile terminal, the mobile terminal includes:
存储有近场通信安全控制程序的存储器;A memory storing a near field communication security control program;
处理器,配置为执行所述近场通信安全控制程序以实现如下步骤:A processor configured to execute the near field communication security control program to achieve the following steps:
在启动安全读取模式时,将近场通信控制器读取数据的传输路径,重定向到可信执行环境中的预设缓存区;When the secure read mode is activated, the near field communication controller reads the data transmission path and redirects it to the preset buffer area in the trusted execution environment;
通过所述可信执行环境的预设可信应用,基于所述近场通信控制器将近场通信卡片的第一身份标识读取到所述预设缓存区中,并基于所述第一身份标识,对所述近场通信卡片进行安全校验;Through the preset trusted application of the trusted execution environment, the first identification of the near field communication card is read into the preset buffer area based on the near field communication controller, and based on the first identification , performing security verification on the near field communication card;
在所述近场通信卡片通过安全校验时,设置普通执行环境中对应所述近场通信卡片的近场通信应用可访问所述预设可信应用,以供所述近场通信应用通过所述预设可信应用访问所述近场通信卡片。When the near field communication card passes the security verification, it is set that the near field communication application corresponding to the near field communication card in the common execution environment can access the preset trusted application, so that the near field communication application can pass all the The preset trusted application accesses the near field communication card.
进一步地,本发明还提供一种计算机可读存储介质,该计算机可读存储介质上存储有近场通信安全控制程序,所述近场通信安全控制程序被处理器执行时实现如下步骤:Further, the present invention also provides a computer-readable storage medium on which a near-field communication security control program is stored, and the near-field communication security control program is executed by a processor to implement the following steps:
在启动安全读取模式时,将近场通信控制器读取数据的传输路径,重定向到可信执行环境中的预设缓存区;When the secure read mode is activated, the near field communication controller reads the data transmission path and redirects it to the preset buffer area in the trusted execution environment;
通过所述可信执行环境的预设可信应用,基于所述近场通信控制器将近场通信卡片的第一身份标识读取到所述预设缓存区中,并基于所述第一身份标识,对所述近场通信卡片进行安全校验;Through the preset trusted application of the trusted execution environment, the first identification of the near field communication card is read into the preset buffer area based on the near field communication controller, and based on the first identification , performing security verification on the near field communication card;
在所述近场通信卡片通过安全校验时,设置普通执行环境中对应所述近场通信卡片的近场通信应用可访问所述预设可信应用,以供所述近场通信应用通过所述预设可信应用访问所述近场通信卡片。When the near field communication card passes the security verification, it is set that the near field communication application corresponding to the near field communication card in the common execution environment can access the preset trusted application, so that the near field communication application can pass all the The preset trusted application accesses the near field communication card.
本发明提出的近场通信安全控制方法,结合近场通信的读取功能,以及和普通执行环境环境隔离的可信执行环境,将近场通信控制器读取数据的传输路径重定向到可信执行环境中的预设缓存区,并通过可信执行环境中的预设可信应用对近场通信卡片进行安全检验,在且仅在近场通信卡片通过安全检验时,设置普通执行环境中对应近场通信卡片的近场通信应用可访问预设可信应用,以供近场通信应用通过预设可信应用访问近场通信卡片,达到提升移动终端进行近场通信交互时的安全性的目的。The near field communication security control method proposed by the present invention combines the reading function of near field communication and the trusted execution environment isolated from the common execution environment, and redirects the transmission path of the data read by the near field communication controller to the trusted execution environment. The preset buffer area in the environment, and the security check of the near field communication card is carried out through the preset trusted application in the trusted execution environment. When and only when the near field communication card passes the security check, set the corresponding close The near field communication application of the field communication card can access the preset trusted application, so that the near field communication application can access the near field communication card through the preset trusted application, so as to achieve the purpose of improving the security of the mobile terminal when performing near field communication interaction.
附图说明Description of drawings
图1为实现本发明各个实施例一可选的一个移动终端的硬件结构示意图;FIG. 1 is a schematic diagram of the hardware structure of an optional mobile terminal for realizing the first embodiment of the present invention;
图2为如图1所示的移动终端的一种通信网络系统架构图;Fig. 2 is a kind of communication network system architecture diagram of the mobile terminal as shown in Fig. 1;
图3为本发明近场通信安全控制方法第一实施例的流程示意图;3 is a schematic flowchart of a first embodiment of a near field communication security control method according to the present invention;
图4为本发明近场通信安全控制方法第一实施例中读取近场通信卡片的的操作示例图;FIG. 4 is an example diagram of an operation of reading a near field communication card in the first embodiment of the near field communication security control method of the present invention;
图5为本发明近场通信安全控制方法第三实施例中触发安全读取模式启动操作的控件的示例图;FIG. 5 is an exemplary diagram of a control that triggers a start-up operation of a safe read mode in a third embodiment of the near field communication security control method of the present invention;
图6为本发明近场通信安全控制方法第三实施例中的一种鉴权界面示例图;6 is an exemplary diagram of an authentication interface in the third embodiment of the near field communication security control method of the present invention;
图7为本发明近场通信安全控制方法第三实施例中的用户输入的鉴权数据的示例图。FIG. 7 is an example diagram of authentication data input by a user in the third embodiment of the near field communication security control method of the present invention.
具体实施方式Detailed ways
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.
在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本发明的说明,其本身没有特定的意义。因此,“模块”、“部件”或“单元”可以混合地使用。In the following description, suffixes such as 'module', 'component' or 'unit' used to represent elements are used only to facilitate the description of the present invention and have no specific meaning per se. Thus, "module", "component" or "unit" may be used interchangeably.
终端可以以各种形式来实施。例如,本发明中描述的终端可以包括诸如手机、平板电脑、笔记本电脑、掌上电脑、个人数字助理(Personal Digital Assistant,PDA)、便捷式媒体播放器(Portable Media Player,PMP)、导航装置、可穿戴设备、智能手环、计步器等移动终端,以及诸如数字TV、台式计算机等固定终端。The terminal may be implemented in various forms. For example, the terminals described in the present invention may include mobile phones, tablet computers, notebook computers, handheld computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, Mobile terminals such as wearable devices, smart bracelets, and pedometers, as well as stationary terminals such as digital TVs and desktop computers.
后续描述中将以移动终端为例进行说明,本领域技术人员将理解的是,除了特别用于移动目的的元件之外,根据本发明的实施方式的构造也能够应用于固定类型的终端。In the following description, a mobile terminal will be used as an example, and those skilled in the art will understand that, in addition to elements specially used for mobile purposes, the configurations according to the embodiments of the present invention can also be applied to stationary type terminals.
请参阅图1,其为实现本发明各个实施例的一种移动终端的硬件结构示意图,该移动终端100可以包括:RF(Radio Frequency,射频)单元101、WiFi模块102、音频输出单元103、A/V(音频/视频)输入单元104、传感器105、显示单元106、用户输入单元107、接口单元108、存储器109、处理器110、以及电源111等部件。本领域技术人员可以理解,图1中示出的移动终端结构并不构成对移动终端的限定,移动终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。Please refer to FIG. 1 , which is a schematic diagram of the hardware structure of a mobile terminal implementing various embodiments of the present invention. The
下面结合图1对移动终端的各个部件进行具体的介绍:Below in conjunction with Fig. 1, each component of the mobile terminal is introduced in detail:
射频单元101可用于收发信息或通话过程中,信号的接收和发送,具体的,将基站的下行信息接收后,给处理器110处理;另外,将上行的数据发送给基站。通常,射频单元101包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元101还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于GSM(Global System of Mobile communication,全球移动通讯系统)、GPRS(General Packet Radio Service,通用分组无线服务)、CDMA2000(CodeDivision Multiple Access 2000,码分多址2000)、WCDMA(Wideband Code DivisionMultiple Access,宽带码分多址)、TD-SCDMA(Time Division-Synchronous CodeDivision Multiple Access,时分同步码分多址)、FDD-LTE(Frequency DivisionDuplexing-Long Term Evolution,频分双工长期演进)和TDD-LTE(Time DivisionDuplexing-Long Term Evolution,分时双工长期演进)等。The
WiFi属于短距离无线传输技术,移动终端通过WiFi模块102可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图1示出了WiFi模块102,但是可以理解的是,其并不属于移动终端的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-distance wireless transmission technology, and the mobile terminal can help users to send and receive emails, browse web pages, access streaming media, etc. through the
音频输出单元103可以在移动终端100处于呼叫信号接收模式、通话模式、记录模式、语音识别模式、广播接收模式等等模式下时,将射频单元101或WiFi模块102接收的或者在存储器109中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元103还可以提供与移动终端100执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元103可以包括扬声器、蜂鸣器等等。When the
A/V输入单元104用于接收音频或视频信号。A/V输入单元104可以包括图形处理器(Graphics Processing Unit,GPU)1041和麦克风1042,图形处理器1041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元106上。经图形处理器1041处理后的图像帧可以存储在存储器109(或其它存储介质)中或者经由射频单元101或WiFi模块102进行发送。麦克风1042可以在电话通话模式、记录模式、语音识别模式等等运行模式中经由麦克风1042接收声音(音频数据),并且能够将这样的声音处理为音频数据。处理后的音频(语音)数据可以在电话通话模式的情况下转换为可经由射频单元101发送到移动通信基站的格式输出。麦克风1042可以实施各种类型的噪声消除(或抑制)算法以消除(或抑制)在接收和发送音频信号的过程中产生的噪声或者干扰。The A/
移动终端100还包括至少一种传感器105,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1061的亮度,接近传感器可在移动终端100移动到耳边时,关闭显示面板1061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The
显示单元106用于显示由用户输入的信息或提供给用户的信息。显示单元106可包括显示面板1061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1061。The
用户输入单元107可用于接收输入的数字或字符信息,以及产生与移动终端的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元107可包括触控面板1071以及其他输入设备1072。触控面板1071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1071上或在触控面板1071附近的操作),并根据预先设定的程式驱动相应的连接装置。触控面板1071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器110,并能接收处理器110发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1071。除了触控面板1071,用户输入单元107还可以包括其他输入设备1072。具体地,其他输入设备1072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种,具体此处不做限定。The
进一步的,触控面板1071可覆盖显示面板1061,当触控面板1071检测到在其上或附近的触摸操作后,传送给处理器110以确定触摸事件的类型,随后处理器110根据触摸事件的类型在显示面板1061上提供相应的视觉输出。虽然在图1中,触控面板1071与显示面板1061是作为两个独立的部件来实现移动终端的输入和输出功能,但是在某些实施例中,可以将触控面板1071与显示面板1061集成而实现移动终端的输入和输出功能,具体此处不做限定。Further, the
接口单元108用作至少一个外部装置与移动终端100连接可以通过的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元108可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到移动终端100内的一个或多个元件或者可以用于在移动终端100和外部装置之间传输数据。The
存储器109可用于存储软件程序以及各种数据。存储器109可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器109可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The
处理器110是移动终端的控制中心,利用各种接口和线路连接整个移动终端的各个部分,通过运行或执行存储在存储器109内的软件程序和/或模块,以及调用存储在存储器109内的数据,执行移动终端的各种功能和处理数据,从而对移动终端进行整体监控。处理器110可包括一个或多个处理单元;优选的,处理器110可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器110中。The
近场通信(NearFieldCommunication,以下简称为NFC)是一种短距高频的无线电技术,允许电子设备之间进行非接触式点对点数据传输交换数据,由非接触式射频识别(RFID)演变而来。NFC工作频率为13.56Hz,有效范围为20cm以内,其传输速度有106Kbit/秒、212Kbit/秒或者424Kbit/秒三种。NFC有3种工作模式:读卡器模式、点对点模式、卡模拟模式。在读卡器模式时,NFC设备产生射频场从外部采用相同标准的NFC标签中读写数据。在点对点模式中,NFC可以与其他的NFC设备通信,进行点对点的数据传输。卡模拟模式中,读卡器是主动设备,产生射频场;NFC设备为被动设备,模拟一张符合NFC标准的非接触式卡片与读卡器进行交互。移动终端100通过NFC控制器111实现NFC功能,如实现NFC支付等。Near Field Communication (hereinafter referred to as NFC) is a short-range high-frequency radio technology that allows contactless point-to-point data transmission and exchange of data between electronic devices. It is evolved from contactless radio frequency identification (RFID). The NFC operating frequency is 13.56Hz, the effective range is within 20cm, and its transmission speed is 106Kbit/sec, 212Kbit/sec or 424Kbit/sec. NFC has 3 working modes: card reader mode, peer-to-peer mode, and card emulation mode. In card reader mode, the NFC device generates a radio frequency field to read and write data from an external NFC tag using the same standard. In peer-to-peer mode, NFC can communicate with other NFC devices for peer-to-peer data transmission. In the card simulation mode, the card reader is an active device that generates a radio frequency field; the NFC device is a passive device that simulates a contactless card that conforms to the NFC standard to interact with the card reader. The
移动终端100还可以包括给各个部件供电的电源112(比如电池),优选的,电源112可以通过电源管理系统与处理器110逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The
尽管图1未示出,移动终端100还可以包括蓝牙模块等,在此不再赘述。Although not shown in FIG. 1 , the
为了便于理解本发明实施例,下面对本发明的移动终端所基于的通信网络系统进行描述。To facilitate understanding of the embodiments of the present invention, the following describes a communication network system on which the mobile terminal of the present invention is based.
请参阅图2,图2为本发明实施例提供的一种通信网络系统架构图,该通信网络系统为通用移动通信技术的LTE系统,该LTE系统包括依次通讯连接的UE(User Equipment,用户设备)201,E-UTRAN(Evolved UMTS Terrestrial Radio Access Network,演进式UMTS陆地无线接入网)202,EPC(Evolved Packet Core,演进式分组核心网)203和运营商的IP业务204。Please refer to FIG. 2. FIG. 2 is an architecture diagram of a communication network system according to an embodiment of the present invention. The communication network system is an LTE system of universal mobile communication technology. ) 201 , E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, Evolved UMTS Terrestrial Radio Access Network) 202 , EPC (Evolved Packet Core, Evolved Packet Core) 203 and operator's
具体地,UE201可以是上述移动终端100,此处不再赘述。Specifically, the
E-UTRAN202包括eNodeB2021和其它eNodeB2022等。其中,eNodeB2021可以通过回程(backhaul)(例如X2接口)与其它eNodeB2022连接,eNodeB2021连接到EPC203,eNodeB2021可以提供UE201到EPC203的接入。
EPC203可以包括MME(Mobility Management Entity,移动性管理实体)2031,HSS(Home Subscriber Server,归属用户服务器)2032,其它MME2033,SGW(Serving Gate Way,服务网关)2034,PGW(PDN Gate Way,分组数据网络网关)2035和PCRF(Policy andCharging Rules Function,政策和资费功能实体)2036等。其中,MME2031是处理UE201和EPC203之间信令的控制节点,提供承载和连接管理。HSS2032用于提供一些寄存器来管理诸如归属位置寄存器(图中未示)之类的功能,并且保存有一些有关服务特征、数据速率等用户专用的信息。所有用户数据都可以通过SGW2034进行发送,PGW2035可以提供UE 201的IP地址分配以及其它功能,PCRF2036是业务数据流和IP承载资源的策略与计费控制策略决策点,它为策略与计费执行功能单元(图中未示)选择及提供可用的策略和计费控制决策。
IP业务204可以包括因特网、内联网、IMS(IP Multimedia Subsystem,IP多媒体子系统)或其它IP业务等。The
虽然上述以LTE系统为例进行了介绍,但本领域技术人员应当知晓,本发明不仅仅适用于LTE系统,也可以适用于其他无线通信系统,例如GSM、CDMA2000、WCDMA、TD-SCDMA以及未来新的网络系统等,此处不做限定。Although the above description takes the LTE system as an example, those skilled in the art should know that the present invention is not only applicable to the LTE system, but also applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA and future wireless communication systems. The network system, etc., is not limited here.
基于上述移动终端硬件结构以及通信网络系统,提出本发明移动终端的各个实施例。Based on the above-mentioned mobile terminal hardware structure and communication network system, various embodiments of the mobile terminal of the present invention are proposed.
参照图1,在本发明移动终端的第一实施例中,该移动终端包括:Referring to FIG. 1, in the first embodiment of the mobile terminal of the present invention, the mobile terminal includes:
存储有NFC安全控制程序的存储器109;a
处理器110,配置为执行存储器109中存储的NFC安全控制程序以实现以下操作:The
在启动安全读取模式时,将NFC控制器111读取数据的传输路径,重定向到可信执行环境中的预设缓存区;When the secure reading mode is activated, the transmission path of the data read by the NFC controller 111 is redirected to a preset buffer area in the trusted execution environment;
通过可信执行环境的预设可信应用,基于NFC控制器111将NFC卡片的第一身份标识读取到预设缓存区中,并基于第一身份标识,对NFC卡片进行安全校验;Through the preset trusted application of the trusted execution environment, based on the NFC controller 111, the first identity identifier of the NFC card is read into the preset buffer area, and based on the first identity identifier, the security verification of the NFC card is performed;
在NFC卡片通过安全校验时,设置普通执行环境中对应NFC卡片的NFC应用可访问预设可信应用,以供该NFC应用通过前述预设可信应用访问NFC卡片。When the NFC card passes the security verification, it is set that the NFC application corresponding to the NFC card in the common execution environment can access the preset trusted application, so that the NFC application can access the NFC card through the aforementioned preset trusted application.
进一步地,前述NFC应用为票务应用,处理器110执行存储器109中储存的NFC安全控制程序时,还执行以下操作:Further, the aforementioned NFC application is a ticketing application, and when the
通过预设可信应用将NFC卡片携带的用户实名信息读取到预设缓存区中,并基于用户实名信息以及票务应用的预设票务信息生成临时申请信息;Read the user's real-name information carried by the NFC card into the preset cache area through the preset trusted application, and generate temporary application information based on the user's real-name information and the preset ticketing information of the ticketing application;
通过预设可信应用与票务应用之间的访问通道,将临时申请信息传输至票务应用,以供票务应用完成实名购票。Through the preset access channel between the trusted application and the ticketing application, the temporary application information is transmitted to the ticketing application, so that the ticketing application can complete the real-name ticket purchase.
进一步地,处理器110执行存储器109中储存的NFC安全控制程序时,还执行以下操作:Further, when the
按照预设频率,对预设可信应用进行预设次数的调用,以指示预设可信应用读取NFC卡片的第一身份标识。According to the preset frequency, the preset trusted application is called a preset number of times to instruct the preset trusted application to read the first identity identifier of the NFC card.
进一步地,处理器110执行存储器109中储存的NFC安全控制程序时,还执行以下操作:Further, when the
在NFC卡片未通过安全校验时,输出NFC卡片不安全的第一提示信息。When the NFC card fails the security verification, output the first prompt message that the NFC card is not secure.
进一步地,处理器110执行存储器109中储存的NFC安全控制程序时,还执行以下操作:Further, when the
在接收到用户的安全读取模式启动操作时,启动安全读取模式。Secure read mode is initiated upon receipt of a secure read mode initiation operation from the user.
进一步地,处理器110执行存储器109中储存的NFC安全控制程序时,还执行以下操作:Further, when the
在接收到用户的安全读取模式启动操作时,显示预设鉴权界面,以供用户输入鉴权数据;When receiving the user's safe reading mode startup operation, a preset authentication interface is displayed for the user to input authentication data;
基于显示的预设鉴权界面接收用户输入的鉴权数据,并基于鉴权数据进行用户身份认证;Receive authentication data input by the user based on the displayed preset authentication interface, and perform user identity authentication based on the authentication data;
在用户身份认证通过之后,启动安全读取模式。After the user authentication is passed, the secure read mode is activated.
进一步地,处理器110执行存储器109中储存的NFC安全控制程序时,还执行以下操作:Further, when the
通过预设可信应用读取NFC应用的第二身份标识到预设缓存区中;Read the second identity of the NFC application into the preset cache area through the preset trusted application;
基于第二身份标识,通过预设可信应用对NFC应用进行安全校验;Based on the second identity identifier, perform security verification on the NFC application through a preset trusted application;
在NFC应用通过安全校验时,设置NFC应用可访问预设可信应用。When the NFC application passes the security verification, the NFC application can be set to access the preset trusted application.
进一步地,处理器110执行存储器109中储存的NFC安全控制程序时,还执行以下操作:Further, when the
在NFC应用未通过安全校验时,输出NFC应用不安全的第二提示信息。When the NFC application fails the security verification, output the second prompt message that the NFC application is not secure.
进一步的,本发明还提供一种NFC安全控制方法,应用于移动终端,参照图3,在本发明近场通信安全控制方法的第一实施例中,该近场通信安全控制方法包括:Further, the present invention also provides an NFC security control method, which is applied to a mobile terminal. Referring to FIG. 3 , in the first embodiment of the near field communication security control method of the present invention, the near field communication security control method includes:
步骤S10,在启动安全读取模式时,将NFC控制器111读取数据的传输路径,重定向到可信执行环境中的预设缓存区;Step S10, when starting the secure reading mode, redirect the transmission path of the data read by the NFC controller 111 to a preset buffer area in the trusted execution environment;
步骤S20,通过可信执行环境的预设可信应用,基于NFC控制器111将NFC卡片的第一身份标识读取到预设缓存区中,并基于第一身份标识,对NFC卡片进行安全校验;Step S20, through the preset trusted application of the trusted execution environment, based on the NFC controller 111, the first identity of the NFC card is read into the preset buffer area, and based on the first identity, the security verification of the NFC card is performed. test;
步骤S30,在NFC卡片通过安全校验时,设置普通执行环境中对应NFC卡片的NFC应用可访问预设可信应用,以供该NFC应用通过前述预设可信应用访问NFC卡片。In step S30, when the NFC card passes the security verification, it is set that the NFC application corresponding to the NFC card in the common execution environment can access the preset trusted application, so that the NFC application can access the NFC card through the aforementioned preset trusted application.
为便于理解本发明方案,以下首先对本发明涉及的可信执行环境进行说明。In order to facilitate understanding of the solution of the present invention, the trusted execution environment involved in the present invention is first described below.
可信执行环境(Trusted Executive Environment,以下简称为TEE)是GlobalPlatform(GP)提出的概念。Trusted Executive Environment (Trusted Executive Environment, hereinafter referred to as TEE) is a concept proposed by GlobalPlatform (GP).
针对移动设备的开放环境,安全问题也越来越受到关注,不仅仅是终端用户,还包括服务提供者,移动运营商,以及芯片厂商。TEE是与设备上的普通执行环境(Rich OSExecution Environment,或称富系统执行环境,通常是Android等,以下简称为REE)并存的运行环境,并且给REE提供安全服务。它具有其自身的执行空间,比REE的安全级别更高,但是比起安全元素(SE,通常是智能卡)的安全性要低一些。但是TEE能够满足大多数应用的安全需求。从成本上看,TEE提供了安全和成本的平衡。For the open environment of mobile devices, security issues are increasingly concerned, not only by end users, but also by service providers, mobile operators, and chip manufacturers. TEE is a running environment that coexists with a common execution environment (Rich OSExecution Environment, or rich system execution environment, usually Android, etc., hereinafter referred to as REE) on the device, and provides security services to REE. It has its own execution space and is more secure than REE, but less secure than Secure Element (SE, usually a smart card). But TEE can meet the security needs of most applications. From a cost perspective, TEE provides a balance of safety and cost.
其中,TEE所能访问的软硬件资源是与REE分离的。TEE提供了授权安全软件(或称可信应用,以下简称为TA)的安全执行环境,同时也保护TA的资源和数据的保密性,完整性和访问权限。为了保证TEE本身的可信根,TEE在安全启动过程中是要通过验证并且与REE隔离的。在TEE中,每个TA是相互独立的,而且不能在未授权的情况下不能互相访问。Among them, the software and hardware resources that the TEE can access are separated from the REE. TEE provides a secure execution environment for authorized security software (or trusted applications, hereinafter referred to as TA), and also protects the confidentiality, integrity and access rights of TA resources and data. In order to ensure the root of trust of the TEE itself, the TEE must be authenticated and isolated from the REE during the secure boot process. In TEE, each TA is independent of each other and cannot access each other without authorization.
GP在TEE的标准化方面下足了工夫,基础的规范有TEE内部应用程序编程接口(Application Programming Interface,以下简称为API),TEE客户端API,当然目前还有一系列的补充的功能性API规范,以及应用管理、调试功能、安全保护轮廓等规范正在制定中。其中,TEE内部API主要包含了密钥管理,密码算法,安全存储,安全时钟资源和服务,还有扩展的可信UI等API。可信UI是指在关键信息的显示和用户关键数据(如口令)输入时,屏幕显示和键盘等硬件资源完全由TEE控制和访问,而REE中的软件应用不能访问。内部API是TEE提供给TA的编程接口;TEE客户端API则是让运行在REE中的客户端应用(CA)访问TA服务和数据的底层通信接口。GP has made great efforts in the standardization of TEE. The basic specifications include TEE internal application programming interface (Application Programming Interface, hereinafter referred to as API), TEE client API, and of course there are a series of supplementary functional API specifications. As well as specifications for application management, debugging functions, safety protection profiles, etc. are being developed. Among them, the TEE internal API mainly includes key management, cryptographic algorithms, secure storage, secure clock resources and services, as well as extended trusted UI and other APIs. Trusted UI means that hardware resources such as screen display and keyboard are completely controlled and accessed by TEE when key information is displayed and user key data (such as password) is input, while software applications in REE cannot access. The internal API is the programming interface provided by the TEE to the TA; the TEE client API is the underlying communication interface that allows the client application (CA) running in the REE to access the TA service and data.
基于以下关于TEE的简单介绍,下面开始对本发明方案进行说明。Based on the following brief introduction about TEE, the solution of the present invention will be described below.
在本发明实施例中,提供有安全读取模式,并在TEE中设置有预设缓存区。其中,由于TEE和REE的软硬隔离,REE侧的任何应用将不能直接访问该预设缓存区。此外,对于预设缓存区的物理位置以及大小的设置,本发明不做具体限制,可由本领域技术人员根据实际需要进行设置,例如,可在存储器109中归属于TEE的储存区域中划分大小为1Mb的储存区域作为预设缓存区。In the embodiment of the present invention, a secure read mode is provided, and a preset buffer area is set in the TEE. Among them, due to the soft and hard isolation between TEE and REE, any application on the REE side will not be able to directly access the preset buffer area. In addition, the physical location and size of the preset buffer area are not specifically limited in the present invention, and can be set by those skilled in the art according to actual needs. For example, the storage area belonging to the TEE in the
在该安全读取模式启动时,处理器110基于本发明提供的近场通信安全控制程序实现功能,首先对NFC控制器111进行初始化,使其工作于读卡器模式,然后将NFC控制器111读取数据的传输路径,重定向到TEE中的预设缓存区。容易理解的是,在将NFC控制器111读取数据的传输路径重定向至TEE中的预设缓存区中之后,NFC控制器111读取到的任何数据将被储存到预设缓存区中,等待处理。When the secure reading mode is activated, the
在完成对NFC控制器111的重定向之后,通过TEE中的预设TA将NFC卡片的身份标识读取到预设缓存区中,以下将NFC卡片的身份标识(在本实施例中,身份标识唯一标识NFC卡片,不同的NFC卡片的身份标识不同)记为第一身份标识,也即是第一身份标识为NFC卡片的身份标识。具体的,通过可信执行环境的预设可信应用,基于NFC控制器111将NFC卡片的第一身份标识读取到预设缓存区中包括:After the redirection to the NFC controller 111 is completed, the identification of the NFC card is read into the preset buffer area through the preset TA in the TEE, and the identification of the NFC card (in this embodiment, the identification The unique identification of the NFC card, the identification of different NFC cards is different) is recorded as the first identification, that is, the first identification is the identification of the NFC card. Specifically, through the preset trusted application of the trusted execution environment, based on the NFC controller 111, the first identification of the NFC card is read into the preset cache area, including:
按照预设频率,对预设TA进行预设次数的调用,以指示预设TA读取NFC卡片的第一身份标识。According to the preset frequency, the preset TA is called for a preset number of times to instruct the preset TA to read the first identity identifier of the NFC card.
在本实施例中,对预设TA进行反复调用,通过该反复调用告知预设TA,NFC控制器111已经准备完成,可对NFC卡片的第一身份标识进行读取。需要说明的是,本发明对于预设频率以及预设次数的取值不做具体限制,可由本领域技术人员根据实际需要进行设置,例如,本发明按照5次/秒的频率对预设TA进行5次调用,以指示预设TA读取NFC卡片的第一身份标识。In this embodiment, the preset TA is repeatedly called, and the preset TA is notified through the repeated calling that the NFC controller 111 is ready to read the first identity of the NFC card. It should be noted that the present invention does not specifically limit the values of the preset frequency and the preset number of times, which can be set by those skilled in the art according to actual needs. 5 calls to instruct the preset TA to read the first identity of the NFC card.
在具体实施时,如图4所示,当用户握持移动终端靠近NFC卡片,在移动终端与NFC卡片的间距位于NFC通信距离之内时,预设TA将通过NFC控制器111产生的射频场,对NFC卡片携带的数据进行读取,此处预设TA将读取到NFC卡片的第一身份标识,并将读取到的第一身份标识储存至TEE的预设缓存区中。需要说明的是,在本实施例中,NFC卡片可以是图3所示物理形态为卡片的NFC卡片,也可以是工作在卡模拟模式的NFC设备,或者是其他形式的NFC卡片。In specific implementation, as shown in FIG. 4 , when the user holds the mobile terminal close to the NFC card, and the distance between the mobile terminal and the NFC card is within the NFC communication distance, the preset TA will pass the radio frequency field generated by the NFC controller 111 . , read the data carried by the NFC card, where the preset TA will read the first identity of the NFC card, and store the read first identity in the preset buffer area of the TEE. It should be noted that, in this embodiment, the NFC card may be an NFC card in the physical form of a card as shown in FIG. 3 , an NFC device working in a card simulation mode, or an NFC card in other forms.
在预设TA将NFC卡片的第一身份标识读取到预设缓存区中之后,基于预设缓存区中的第一身份标识,通过预设TA对NFC卡片进行安全校验,可选地,在一实施例中,预设TA包括第一身份认证规则,通过预设TA对NFC卡片进行安全校验包括:After the preset TA reads the first identity of the NFC card into the preset cache, based on the first identity in the preset cache, the NFC card is checked for security by the preset TA, optionally, In one embodiment, the preset TA includes a first identity authentication rule, and performing security verification on the NFC card by using the preset TA includes:
判断第一身份标识是否在预设TA的第一身份认证规则中,其中,在第一身份标识在预设TA的第一身份认证规则中时,确定NFC卡片通过安全校验,否则确定NFC卡片未通过安全校验。Determine whether the first identity identifier is in the first identity authentication rule of the preset TA, wherein, when the first identity identifier is in the first identity authentication rule of the preset TA, it is determined that the NFC card has passed the security check, otherwise the NFC card is determined Failed security check.
在具体实施时,前述第一身份认证规则可在移动终端出厂或安装前述预设TA时,预置在前述预设TA中。前述第一身份认证规则包括可信的NFC卡片的身份标识。During specific implementation, the aforementioned first identity authentication rule may be preset in the aforementioned preset TA when the mobile terminal is shipped from the factory or when the aforementioned preset TA is installed. The aforementioned first identity authentication rule includes the identity identifier of the trusted NFC card.
可选地,在一实施例中,预设TA包括约定的第一非对称加密算法(对于采用何种非对称加密算法,本发明不做具体限制,可由本领域技术人员根据实际需要进行选取),在读取NFC卡片的第一身份标识的同时,还读取NFC卡片携带的第一密文(NFC卡片厂商采用约定的第一非对称加密算法对于第一身份标识计算得到的密文),通过预设TA对NFC卡片进行安全校验包括:Optionally, in an embodiment, the preset TA includes the agreed first asymmetric encryption algorithm (which asymmetric encryption algorithm is adopted, the present invention does not make specific restrictions, and can be selected by those skilled in the art according to actual needs) , while reading the first identity of the NFC card, it also reads the first ciphertext carried by the NFC card (the ciphertext obtained by the NFC card manufacturer using the agreed first asymmetric encryption algorithm to calculate the first identity), The security verification of the NFC card through the preset TA includes:
通过预设TA的第一非对称加密算法,对读取到的第一身份标识进行计算,得到第二密文;By presetting the first asymmetric encryption algorithm of the TA, the read first identity identifier is calculated to obtain the second ciphertext;
判断计算的第二密文与第一密文是否匹配,其中,在二者密文匹配时确定NFC卡片通过安全校验,否则确定NFC卡片未通过安全校验。It is judged whether the calculated second ciphertext matches the first ciphertext, wherein when the two ciphertexts match, it is determined that the NFC card has passed the security check; otherwise, it is determined that the NFC card has not passed the security check.
在预设TA返回的校验结果为NFC卡片通过安全校验时,设置REE中对应所述NFC卡片的NFC应用可访问预设TA,以供前述NFC应用通过预设TA访问NFC卡片。When the verification result returned by the preset TA is that the NFC card has passed the security verification, it is set that the NFC application corresponding to the NFC card in the REE can access the preset TA, so that the aforementioned NFC application can access the NFC card through the preset TA.
例如,以NFC卡片为“深圳通”为例,当通过预设TA对其进行安全校验,且“深圳通”通过安全校验时,设置REE中的“鹏淘应用”可访问预设TA,从而“鹏淘应用”可通过预设TA访问“深圳通”,通过相应的读写操作,实现“余额查询”以及“充值”等功能。For example, taking the NFC card as "Shenzhen Pass" as an example, when the security verification is carried out through the preset TA, and the "Shenzhen Pass" passes the security verification, the "Pengtao application" in the REE can be set to access the preset TA , so that "Pengtao App" can access "Shenzhen Tong" through the preset TA, and realize functions such as "balance inquiry" and "recharge" through corresponding read and write operations.
进一步地,步骤S20之后,还包括:Further, after step S20, it also includes:
在NFC卡片未通过安全校验时,输出NFC卡片不安全的第一提示信息。When the NFC card fails the security verification, output the first prompt message that the NFC card is not secure.
容易理解的是,在NFC卡片未通过安全校验时,说明NFC卡片可能是伪造的,存在一定的安全风险,此时输出提示NFC卡片不安全的第一提示信息,例如,在屏幕显示第一提示信息“NFC卡片不安全,存在安全风险”。It is easy to understand that when the NFC card fails the security verification, it means that the NFC card may be counterfeit and there is a certain security risk. At this time, the first prompt message indicating that the NFC card is unsafe is output. The prompt message "NFC card is not safe, there is a security risk".
可选地,在一实施例中,在输出NFC卡片不安全的第一提示信息的同时,还执行以下步骤:Optionally, in an embodiment, while outputting the first prompt information that the NFC card is unsafe, the following steps are also performed:
清除预设缓存区中的第一身份标识。Clear the first ID in the preset buffer area.
本发明提出的近场通信安全控制方法,结合近场通信的读取功能,以及和普通执行环境环境隔离的可信执行环境,将近场通信控制器读取数据的传输路径重定向到可信执行环境中的预设缓存区,并通过可信执行环境中的预设可信应用对近场通信卡片进行安全检验,在且仅在近场通信卡片通过安全检验时,设置普通执行环境中对应近场通信卡片的近场通信应用可访问预设可信应用,以供近场通信应用通过预设可信应用访问近场通信卡片,达到提升移动终端进行近场通信交互时的安全性的目的。The near field communication security control method proposed by the present invention combines the reading function of near field communication and the trusted execution environment isolated from the common execution environment, and redirects the transmission path of the data read by the near field communication controller to the trusted execution environment. The preset buffer area in the environment, and the security check of the near field communication card is carried out through the preset trusted application in the trusted execution environment. When and only when the near field communication card passes the security check, set the corresponding close The near field communication application of the field communication card can access the preset trusted application, so that the near field communication application can access the near field communication card through the preset trusted application, so as to achieve the purpose of improving the security of the mobile terminal when performing near field communication interaction.
进一步地,基于第一实施例,提出本发明NFC安全控制方法的第二实施例,在本实施例中,步骤S30之后,还包括以下步骤:Further, based on the first embodiment, a second embodiment of the NFC security control method of the present invention is proposed. In this embodiment, after step S30, the following steps are further included:
通过预设TA将NFC卡片携带的用户实名信息读取到预设缓存区中,并基于用户实名信息以及票务应用的预设票务信息生成临时申请信息;Read the user's real-name information carried by the NFC card into the preset cache area through the preset TA, and generate temporary application information based on the user's real-name information and the preset ticketing information of the ticketing application;
通过预设TA与票务应用之间的访问通道,将临时申请信息传输至票务应用,以供票务应用完成实名购票。Through the preset access channel between the TA and the ticketing application, the temporary application information is transmitted to the ticketing application, so that the ticketing application can complete the real-name ticket purchase.
容易理解的是,在实际生活中,如景点、动物园、游乐园等场所都需要进行实名购票,用户在通过票务应用进行购票时,需要手动输入其实名信息进行购票,操作比较繁琐。为此,本实施例在前述第一实施例的基础上,进一步增加了临时申请信息的处理操作,以下仅对此进行说明,其他可参照前述实施例,此处不再赘述。It is easy to understand that in real life, places such as scenic spots, zoos, amusement parks and other places need to purchase real-name tickets. When users purchase tickets through the ticketing application, they need to manually enter their real-name information to purchase tickets, which is a cumbersome operation. Therefore, based on the foregoing first embodiment, this embodiment further increases the processing operation of provisional application information, which is only described below, and the other may refer to the foregoing embodiment, which will not be repeated here.
在本发明实施例中,前述NFC应用为票务应用,当NFC卡片通过安全校验,且设置票务应用可访问预设TA之后,进一步通过预设TA对NFC卡片携带的用户实名信息进行读取,将用户实名信息读取到预设缓存区中。In the embodiment of the present invention, the aforementioned NFC application is a ticketing application. When the NFC card passes the security verification and the ticketing application is set to be able to access the preset TA, the user's real-name information carried by the NFC card is further read through the preset TA. Read the user's real-name information into the preset buffer.
之后,基于预设TA和票务应用的访问通道,获取到票务应用的预设票务信息,并基于用户实名信息以及预设票务信息生成临时申请信息。其中,预设票务信息即用户操作票务应用购票所需的,除实名信息之外的其他票务信息,包括但不限于购票数量、位置等;临时申请信息由预设TA按照票务应用的购票规则生成,可理解为购票请求。After that, based on the preset TA and the access channel of the ticketing application, the preset ticketing information of the ticketing application is acquired, and temporary application information is generated based on the user's real-name information and the preset ticketing information. Among them, the preset ticketing information is other ticketing information other than real-name information required by the user to operate the ticketing application to purchase tickets, including but not limited to the number of tickets purchased, location, etc.; The ticket rule is generated, which can be understood as a ticket purchase request.
在生成临时申请信息之后,通过前述访问通道将生成的临时申请信息传输至票务应用,之后,票务应用可将该临时申请信息传输至预设票务服务器,完成实名购票。After the temporary application information is generated, the generated temporary application information is transmitted to the ticketing application through the aforementioned access channel, and then the ticketing application can transmit the temporary application information to the preset ticketing server to complete the real-name ticket purchase.
例如,NFC卡片为身份证,票务应用为“携程应用”,用户操作“携程应用”购买某航班机票,并完成机票信息(如位置、舱位等)的选择,在需要输入实名信息时,用户将移动终端靠近身份证。移动终端通过预设TA对身份证进行安全校验,并在身份证通过安全校验之后,读取到身份证携带的用户实名信息“身份证号,姓名等”,并结合用户输入的预设票务信息,按照“携程应用”的购票规则,生成“携程应用”可用的购票请求“临时申请信息”,将“临时申请信息”传输至“携程应用”,由“携程应用”完成机票的购买。For example, the NFC card is an ID card, and the ticketing application is "Ctrip Application". The user operates the "Ctrip Application" to purchase a flight ticket and completes the selection of ticket information (such as location, class, etc.). When the real-name information needs to be entered, the user will The mobile terminal is close to the ID card. The mobile terminal performs security verification on the ID card through the preset TA, and after the ID card passes the security verification, it reads the user's real-name information "ID card number, name, etc." carried in the ID card, and combines the preset user input For ticket information, in accordance with the ticket purchase rules of the "Ctrip App", generate a ticket purchase request "Temporary Application Information" available to the "Ctrip App", transmit the "Temporary Application Information" to the "Ctrip App", and the "Ctrip App" will complete the ticket purchase. Buy.
需要说明的是,前述访问通道即客户端API。It should be noted that the aforementioned access channel is the client API.
进一步地,在本实施例中,在票务应用完成实名购票之后,将票务应用实名购票获得的购票凭证(如携带门票信息的二维码、条形码等)透传至预设TA,并通过预设TA,按照GP规范,将购票凭证储存到安全单元(如嵌入式安全单元,ESE)中。在需要使用购票凭证时,将NFC控制器111配置为卡模拟模式之后,将移动终端靠近校票终端即可完成校验,方便快捷。Further, in this embodiment, after the ticketing application completes the real-name ticket purchase, the ticket purchase certificate (such as a two-dimensional code, barcode, etc. carrying the ticket information) obtained by the ticketing application's real-name ticket purchase is transparently transmitted to the preset TA, and By presetting TA, the ticket purchase voucher is stored in a security element (eg, embedded security element, ESE) according to the GP specification. When the ticket voucher needs to be used, after the NFC controller 111 is configured in the card simulation mode, the verification can be completed by bringing the mobile terminal close to the ticket terminal, which is convenient and quick.
进一步地,基于第一实施例,提出本发明NFC安全控制方法的第三实施例,在本实施例中,步骤S10之前,还包括:Further, based on the first embodiment, a third embodiment of the NFC security control method of the present invention is proposed. In this embodiment, before step S10, the method further includes:
在接收到用户的安全读取模式启动操作时,启动安全读取模式。Secure read mode is initiated upon receipt of a secure read mode initiation operation from the user.
需要说明的是,本实施例在前述第一实施例的基础上,增加了安全读取模式的启动操作,以下仅对此进行说明,其他可参照前述实施例,此处不再赘述。It should be noted that this embodiment adds the start-up operation of the safe reading mode on the basis of the foregoing first embodiment, which is only described below.
在本发明实施例中,可在移动终端的“设置”界面中增加用于开启安全读取模式的控件,或者在本发明提供的近场通信安全控制程序的UI中增加用于开启安全读取模式的控件,供用户操作,已开启安全读取模式。例如,如图5所示,用户可通过滑动图5所示圆形控件触发安全读取模式启动操作。In this embodiment of the present invention, a control for enabling the secure reading mode may be added to the "settings" interface of the mobile terminal, or a control for enabling secure reading may be added to the UI of the near field communication security control program provided by the present invention Mode control for user operation, safe read mode has been turned on. For example, as shown in FIG. 5 , the user can trigger the safe reading mode start operation by sliding the circular control shown in FIG. 5 .
进一步地,在本实施例中,启动安全读取模式之前,还包括:Further, in this embodiment, before starting the safe reading mode, the method further includes:
在接收到用户的安全读取模式启动操作时,显示预设鉴权界面,以供用户输入鉴权数据;When receiving the user's safe reading mode startup operation, a preset authentication interface is displayed for the user to input authentication data;
基于显示的所述预设鉴权界面接收用户输入的鉴权数据,并基于所述鉴权数据进行用户身份认证;Receive authentication data input by the user based on the displayed preset authentication interface, and perform user identity authentication based on the authentication data;
在用户身份认证通过之后,启动安全读取模式。After the user authentication is passed, the secure read mode is activated.
在本发明实施例中,进一步增加了对用户的鉴权操作,具体的,在接收到用户的安全读取模式启动操作时,显示预设鉴权界面,以供用户输入鉴权数据,在具体实施时,通过TEE的可信UI实现预设鉴权界面的显示,从而确保屏幕显示和键盘等硬件资源完全由TEE控制和访问,防止用户输入鉴权数据被窃取。其中,本发明对预设鉴权界面的形式不做具体限制,可由本领域技术人员根据实际需要进行设置,例如,本发明实施例采用图6所示的九宫格鉴权界面。In the embodiment of the present invention, an authentication operation for the user is further added. Specifically, when the user's safe reading mode activation operation is received, a preset authentication interface is displayed for the user to input authentication data. During implementation, the preset authentication interface is displayed through the trusted UI of the TEE, thereby ensuring that hardware resources such as screen display and keyboard are completely controlled and accessed by the TEE, preventing user input authentication data from being stolen. The form of the preset authentication interface is not specifically limited in the present invention, and can be set by those skilled in the art according to actual needs. For example, the embodiment of the present invention adopts the Jiugongge authentication interface shown in FIG. 6 .
之后,通过显示的预设鉴权界面接收用户输入的鉴权数据,并在接收到用户输入的鉴权数据之后,将用户输入的鉴权数据与预设鉴权数据进行比对,以实现用户身份认证,其中,在二者鉴权数据一致时,确定用户身份认证通过,否则确定用户身份认证失败。例如,基于图6所示的九宫格鉴权界面,用户绘制了图7所示的图案(即输入的鉴权数据),若该图案与预设图案(即预设鉴权数据,如预授权用户绘制的鉴权图案)相同,则确定用户身份认证通过。After that, the authentication data input by the user is received through the displayed preset authentication interface, and after receiving the authentication data input by the user, the authentication data input by the user is compared with the preset authentication data, so as to realize the user Identity authentication, wherein, when the authentication data of the two are consistent, it is determined that the user identity authentication has passed, otherwise it is determined that the user identity authentication has failed. For example, based on the Jiugongge authentication interface shown in FIG. 6 , the user draws the pattern shown in FIG. 7 (that is, the input authentication data), if the pattern is the same as the preset pattern (that is, the preset authentication data, such as the pre-authorized user If the drawn authentication pattern) is the same, it is determined that the user identity authentication is passed.
在确定用户身份认证通过之后,即可启动安全读取模式。After it is determined that the user authentication is passed, the secure reading mode can be started.
进一步地,基于前述任一实施例,提出本发明NFC安全控制方法的第四实施例,在本实施例中,步骤S30之前,还包括:Further, based on any of the foregoing embodiments, a fourth embodiment of the NFC security control method of the present invention is proposed. In this embodiment, before step S30, the method further includes:
在NFC卡片通过安全校验时,通过预设TA读取前述NFC应用的第二身份标识到预设缓存区中;When the NFC card passes the security verification, read the second identity identifier of the aforementioned NFC application into the preset buffer area through the preset TA;
基于第二身份标识,通过预设TA对前述NFC应用进行安全校验;Based on the second identity identifier, perform security verification on the aforementioned NFC application through a preset TA;
在前述NFC应用通过安全校验时,设置前述NFC应用可访问预设TA。When the aforementioned NFC application passes the security verification, it is set that the aforementioned NFC application can access the preset TA.
需要说明的是,本实施例在前述实施例的基础上,进一步增加了对NFC应用的安全检验操作,以下仅对此进行说明,其他可参照前述实施例,此处不再赘述。It should be noted that, on the basis of the foregoing embodiments, this embodiment further adds a security check operation for NFC applications, which is only described below, and the others can refer to the foregoing embodiments, which will not be repeated here.
在本发明实施例中,当NFC卡片通过安全校验,且前述NFC应用的第二身份标识被读取到预设缓存区中之后,基于预设缓存区中的第二身份标识,通过预设TA对前述NFC应用进行安全校验。其中,第二身份标识可通过解析前述NFC应用的应用安装包得到,具体可为前述NFC应用的应用证书哈希值。In the embodiment of the present invention, after the NFC card passes the security verification and the second identity identifier of the aforementioned NFC application is read into the preset buffer area, based on the second identity identifier in the preset buffer area, the preset The TA performs security verification on the aforementioned NFC application. The second identity identifier may be obtained by parsing the application installation package of the aforementioned NFC application, and may specifically be the hash value of the application certificate of the aforementioned NFC application.
可选地,在一实施例中,预设TA包括第二身份认证规则,通过预设TA对NFC卡片进行安全校验包括:Optionally, in an embodiment, the preset TA includes a second identity authentication rule, and performing security verification on the NFC card by using the preset TA includes:
判断第二身份标识是否在预设TA的第二身份认证规则中,其中,在第二身份标识在预设TA的第二身份认证规则中时,确定前述NFC应用通过安全校验,否则确定前述NFC应用未通过安全校验。Judging whether the second identity is in the second identity authentication rule of the preset TA, wherein, when the second identity is in the second identity authentication rule of the preset TA, it is determined that the aforementioned NFC application has passed the security check, otherwise, it is determined that the aforementioned NFC application has passed the security check. The NFC application failed the security check.
在具体实施时,前述第二身份认证规则可在移动终端出厂或安装前述预设TA时,预置在前述预设TA中。前述第二身份认证规则包括可信的NFC应用的身份标识。During specific implementation, the aforementioned second identity authentication rule may be preset in the aforementioned preset TA when the mobile terminal is shipped from the factory or when the aforementioned preset TA is installed. The aforementioned second identity authentication rule includes an identity identifier of a trusted NFC application.
可选地,在一实施例中,预设TA包括约定的第二非对称加密算法(对于采用何种非对称加密算法,本发明不做具体限制,可由本领域技术人员根据实际需要进行选取),在读取前述NFC应用的第二身份标识的同时,还读取前述NFC应用携带的第三密文(NFC应用厂商采用约定的第二非对称加密算法对于第二身份标识计算得到的密文),通过预设TA对前述NFC应用进行安全校验包括:Optionally, in an embodiment, the preset TA includes the agreed second asymmetric encryption algorithm (which asymmetric encryption algorithm is adopted, the present invention does not make specific restrictions, and can be selected by those skilled in the art according to actual needs) , while reading the second identity identifier of the aforementioned NFC application, it also reads the third ciphertext carried by the aforementioned NFC application (the ciphertext calculated by the NFC application manufacturer for the second identity identifier using the agreed second asymmetric encryption algorithm ), the security verification of the aforementioned NFC application by the preset TA includes:
通过预设TA的第二非对称加密算法,对读取到的第二身份标识进行计算,得到第四密文;By presetting the second asymmetric encryption algorithm of the TA, the read second identity identifier is calculated to obtain the fourth ciphertext;
判断计算的第四密文与第三密文是否匹配,其中,在二者密文匹配时确定前述NFC应用通过安全校验,否则确定前述NFC应用未通过安全校验。It is judged whether the calculated fourth ciphertext matches the third ciphertext, wherein when the two ciphertexts match, it is determined that the aforementioned NFC application has passed the security check; otherwise, it is determined that the aforementioned NFC application has not passed the security check.
在预设TA返回的校验结果为前述NFC应用通过安全校验时,设置前述NFC应用可访问预设TA,以供前述NFC应用通过预设TA访问NFC卡片。When the verification result returned by the preset TA is that the aforementioned NFC application has passed the security verification, it is set that the aforementioned NFC application can access the preset TA, so that the aforementioned NFC application can access the NFC card through the preset TA.
进一步地,基于第二身份标识,通过预设TA对前述NFC应用进行安全校验的步骤之后。还包括:Further, based on the second identity identifier, after the step of performing security verification on the aforementioned NFC application by using a preset TA. Also includes:
在前述NFC应用未通过安全校验时,输出前述NFC应用不安全的第二提示信息。When the aforementioned NFC application fails the security verification, output the second prompt information that the aforementioned NFC application is not safe.
容易理解的是,在前述NFC应用未通过安全校验时,说明前述NFC应用可能是非法发布的山寨应用,存在一定的安全风险,此时输出提示NFC应用不安全的第二提示信息,例如,在屏幕显示第二提示信息“NFC应用不安全,存在安全风险”。It is easy to understand that when the aforementioned NFC application fails the security check, it means that the aforementioned NFC application may be an illegally released copycat application, and there is a certain security risk. At this time, a second prompt message indicating that the NFC application is unsafe is output. A second prompt message "NFC application is not safe, there is a security risk" is displayed on the screen.
可选地,在一实施例中,在输出NFC应用不安全的第二提示信息的同时,还执行以下步骤:Optionally, in an embodiment, while outputting the second prompt information that the NFC application is unsafe, the following steps are also performed:
清除预设缓存区中的第二身份标识。Clear the second ID in the preset buffer.
此外,本发明还提出一种计算机可读存储介质,该计算机可读存储介质上存储有NFC安全控制程序,该NFC安全控制程序被处理器110执行时实现如下操作:In addition, the present invention also provides a computer-readable storage medium, on which an NFC security control program is stored, and when the NFC security control program is executed by the
在启动安全读取模式时,将NFC控制器111读取数据的传输路径,重定向到TEE中的预设缓存区;When the safe reading mode is activated, the transmission path of the data read by the NFC controller 111 is redirected to the preset buffer area in the TEE;
通过TEE的预设TA,基于NFC控制器111将NFC卡片的第一身份标识读取到预设缓存区中,并基于第一身份标识,对NFC卡片进行安全校验;Through the preset TA of the TEE, based on the NFC controller 111, the first identification of the NFC card is read into the preset buffer area, and based on the first identification, the security verification of the NFC card is performed;
在NFC卡片通过安全校验时,设置REE中对应NFC卡片的NFC应用可访问预设TA,以供该NFC应用通过前述预设TA访问NFC卡片。When the NFC card passes the security verification, it is set that the NFC application corresponding to the NFC card in the REE can access the preset TA, so that the NFC application can access the NFC card through the aforementioned preset TA.
进一步地,NFC应用为票务应用,前述NFC安全控制程序被处理器110执行时还实现如下操作:Further, the NFC application is a ticketing application, and when the aforementioned NFC security control program is executed by the
通过预设TA将NFC卡片携带的用户实名信息读取到预设缓存区中,并基于用户实名信息以及票务应用的预设票务信息生成临时申请信息;Read the user's real-name information carried by the NFC card into the preset cache area through the preset TA, and generate temporary application information based on the user's real-name information and the preset ticketing information of the ticketing application;
通过预设TA与票务应用之间的访问通道,将临时申请信息传输至票务应用,以供票务应用完成实名购票。Through the preset access channel between the TA and the ticketing application, the temporary application information is transmitted to the ticketing application, so that the ticketing application can complete the real-name ticket purchase.
进一步地,前述NFC安全控制程序被处理器110执行时还实现如下操作:Further, when the aforementioned NFC security control program is executed by the
按照预设频率,对预设TA进行预设次数的调用,以指示预设TA读取NFC卡片的第一身份标识。According to the preset frequency, the preset TA is called for a preset number of times to instruct the preset TA to read the first identity identifier of the NFC card.
进一步地,前述NFC安全控制程序被处理器110执行时还实现如下操作:Further, when the aforementioned NFC security control program is executed by the
在NFC卡片未通过安全校验时,输出NFC卡片不安全的第一提示信息。When the NFC card fails the security verification, output the first prompt message that the NFC card is not secure.
进一步地,前述NFC安全控制程序被处理器110执行时还实现如下操作:Further, when the aforementioned NFC security control program is executed by the
在接收到用户的安全读取模式启动操作时,启动安全读取模式。Secure read mode is initiated upon receipt of a secure read mode initiation operation from the user.
进一步地,前述NFC安全控制程序被处理器110执行时还实现如下操作:Further, when the aforementioned NFC security control program is executed by the
在接收到用户的安全读取模式启动操作时,显示预设鉴权界面,以供用户输入鉴权数据;When receiving the user's safe reading mode startup operation, a preset authentication interface is displayed for the user to input authentication data;
基于显示的预设鉴权界面接收用户输入的鉴权数据,并基于鉴权数据进行用户身份认证;Receive authentication data input by the user based on the displayed preset authentication interface, and perform user identity authentication based on the authentication data;
在用户身份认证通过之后,启动安全读取模式。After the user authentication is passed, the secure read mode is activated.
进一步地,前述近场通信安全控制程序被处理器110执行时还实现如下操作:Further, when the aforementioned near field communication security control program is executed by the
通过预设TA读取NFC应用的第二身份标识到预设缓存区中;Read the second identity of the NFC application into the preset buffer area through the preset TA;
基于第二身份标识,通过预设TA对NFC应用进行安全校验;Based on the second identity identifier, the security verification is performed on the NFC application through the preset TA;
在NFC应用通过安全校验时,设置NFC应用可访问预设TA。When the NFC application passes the security verification, the NFC application can be set to access the preset TA.
进一步地,前述近场通信安全控制程序被处理器110执行时还实现如下操作:Further, when the aforementioned near field communication security control program is executed by the
在NFC应用未通过安全校验时,输出NFC应用不安全的第二提示信息。When the NFC application fails the security verification, output the second prompt message that the NFC application is not secure.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that, herein, the terms "comprising", "comprising" or any other variation thereof are intended to encompass non-exclusive inclusion, such that a process, method, article or device comprising a series of elements includes not only those elements, It also includes other elements not expressly listed or inherent to such a process, method, article or apparatus. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in a process, method, article or apparatus that includes the element.
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The above-mentioned serial numbers of the embodiments of the present invention are only for description, and do not represent the advantages or disadvantages of the embodiments.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。From the description of the above embodiments, those skilled in the art can clearly understand that the method of the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course can also be implemented by hardware, but in many cases the former is better implementation. Based on such understanding, the technical solutions of the present invention can be embodied in the form of software products in essence or the parts that make contributions to the prior art, and the computer software products are stored in a storage medium (such as ROM/RAM) as described above. , magnetic disk, optical disk), including several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present invention.
上面结合附图对本发明的实施例进行了描述,但是本发明并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本发明的启示下,在不脱离本发明宗旨和权利要求所保护的范围情况下,还可做出很多形式,这些均属于本发明的保护之内。The embodiments of the present invention have been described above in conjunction with the accompanying drawings, but the present invention is not limited to the above-mentioned specific embodiments, which are merely illustrative rather than restrictive. Under the inspiration of the present invention, without departing from the scope of protection of the present invention and the claims, many forms can be made, which all belong to the protection of the present invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710340693.2A CN107240157B (en) | 2017-05-12 | 2017-05-12 | Near field communication security control method, mobile terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710340693.2A CN107240157B (en) | 2017-05-12 | 2017-05-12 | Near field communication security control method, mobile terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107240157A CN107240157A (en) | 2017-10-10 |
CN107240157B true CN107240157B (en) | 2020-08-21 |
Family
ID=59985844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710340693.2A Active CN107240157B (en) | 2017-05-12 | 2017-05-12 | Near field communication security control method, mobile terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107240157B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107659921B (en) * | 2017-11-08 | 2023-12-26 | 上海坤锐电子科技有限公司 | NFC universal realization circuit and chip |
CN110427790B (en) * | 2019-07-22 | 2021-02-05 | 创新先进技术有限公司 | RFID device and information processing method based on same |
US10789391B1 (en) | 2019-07-22 | 2020-09-29 | Alibaba Group Holding Limited | RFID information processing |
CN110609799A (en) * | 2019-09-11 | 2019-12-24 | 天津飞腾信息技术有限公司 | Safety protection method for off-chip nonvolatile storage |
CN111860016A (en) * | 2020-07-15 | 2020-10-30 | 维沃移动通信有限公司 | Information display method, device and electronic device for near field communication NFC |
CN114302404B (en) * | 2021-12-23 | 2024-11-19 | 汇顶科技(成都)有限责任公司 | Near field communication method, configuration method, NFC host and electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2746981A1 (en) * | 2012-12-19 | 2014-06-25 | ST-Ericsson SA | Trusted execution environment access control rules derivation |
CN104765612A (en) * | 2015-04-10 | 2015-07-08 | 武汉天喻信息产业股份有限公司 | System and method for having access to credible execution environment and credible application |
CN105591672A (en) * | 2015-04-30 | 2016-05-18 | 中国银联股份有限公司 | NFC-based communication method and device |
CN105812332A (en) * | 2014-12-31 | 2016-07-27 | 北京握奇智能科技有限公司 | Data protection method |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105446713B (en) * | 2014-08-13 | 2019-04-26 | 阿里巴巴集团控股有限公司 | Method for secure storing and equipment |
KR20160056749A (en) * | 2014-11-12 | 2016-05-20 | 삼성전자주식회사 | Appratus and method for payment |
CN105592403B (en) * | 2014-12-29 | 2020-03-31 | 中国银联股份有限公司 | NFC-based communication device and method |
CN105590201B (en) * | 2015-04-23 | 2019-05-10 | 中国银联股份有限公司 | Mobile payment device and mobile-payment system |
CN105447406B (en) * | 2015-11-10 | 2018-10-19 | 华为技术有限公司 | A kind of method and apparatus for accessing memory space |
CN108809659B (en) * | 2015-12-01 | 2022-01-18 | 神州融安科技(北京)有限公司 | Dynamic password generation method, dynamic password verification method, dynamic password system and dynamic password verification system |
CN105429760B (en) * | 2015-12-01 | 2018-12-14 | 神州融安科技(北京)有限公司 | A kind of auth method and system of the digital certificate based on TEE |
CN106056380A (en) * | 2016-05-27 | 2016-10-26 | 深圳市雪球科技有限公司 | Mobile payment risk control system and mobile payment risk control method |
-
2017
- 2017-05-12 CN CN201710340693.2A patent/CN107240157B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2746981A1 (en) * | 2012-12-19 | 2014-06-25 | ST-Ericsson SA | Trusted execution environment access control rules derivation |
CN105812332A (en) * | 2014-12-31 | 2016-07-27 | 北京握奇智能科技有限公司 | Data protection method |
CN104765612A (en) * | 2015-04-10 | 2015-07-08 | 武汉天喻信息产业股份有限公司 | System and method for having access to credible execution environment and credible application |
CN105591672A (en) * | 2015-04-30 | 2016-05-18 | 中国银联股份有限公司 | NFC-based communication method and device |
Also Published As
Publication number | Publication date |
---|---|
CN107240157A (en) | 2017-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107240157B (en) | Near field communication security control method, mobile terminal and computer readable storage medium | |
US9635018B2 (en) | User identity verification method and system, password protection apparatus and storage medium | |
CN108475304B (en) | A method, device and mobile terminal for associating application program and biometric feature | |
CN108683996B (en) | Device finding method, terminal and computer-readable storage medium | |
CN109416800B (en) | A kind of authentication method of mobile terminal and mobile terminal | |
CN108075899B (en) | An authentication method, mobile terminal and computer-readable storage medium | |
WO2019196693A1 (en) | Application control method and device, readable storage medium and terminal | |
CN110457888B (en) | A verification code input method, device, electronic device and storage medium | |
WO2016192511A1 (en) | Method and apparatus for remotely deleting information | |
CN109687974B (en) | APK verification method and device, mobile terminal and readable storage medium | |
CN106255102B (en) | Terminal equipment identification method and related equipment | |
CN107563158B (en) | Method, device and computer readable storage medium for displaying hidden application icon | |
CN106534324A (en) | Data sharing method and cloud server | |
CN107635234B (en) | Wi-Fi control method, mobile terminal and computer-readable storage medium | |
CN107622213A (en) | A kind of data access method, terminal and computer-readable recording medium | |
CN107317680B (en) | Method and system for marking safety account and computer readable storage medium | |
CN108601062B (en) | WiFi connection sharing method, terminal and computer storage medium | |
CN107135498B (en) | A file sharing method and device | |
CN107194217B (en) | User data access control method, apparatus and computer-readable storage medium | |
CN111967871A (en) | Secure payment method, device and storage medium | |
CN107395363B (en) | Fingerprint sharing method and mobile terminal | |
CN107633161B (en) | Terminal for access control of protected data and related product | |
CN107092819A (en) | A kind of fingerprint typing method of inspection and device | |
CN113556330B (en) | Business card information management method, mobile terminal and storage medium | |
CN114125851B (en) | Information processing method, mobile terminal and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200703 Address after: 210013, Gu Ping Gang 4, Gulou District, Jiangsu, Nanjing Applicant after: Nanjing xinwindows Information Technology Co.,Ltd. Address before: 518057 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor Applicant before: NUBIA TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20250107 Address after: Room 1310, IoT Technology Park Building, No. 38 Guangdong Road, Gulou District, Nanjing City, Jiangsu Province, China 210003 Patentee after: Jiangsu Hongyitong Information Technology Co.,Ltd. Country or region after: China Address before: 210013 gulping 4, Gulou District, Nanjing, Jiangsu Patentee before: Nanjing xinwindows Information Technology Co.,Ltd. Country or region before: China |