CN107404719A - SIM card processing method, device, terminal and ESAM chips - Google Patents

SIM card processing method, device, terminal and ESAM chips Download PDF

Info

Publication number
CN107404719A
CN107404719A CN201610333585.8A CN201610333585A CN107404719A CN 107404719 A CN107404719 A CN 107404719A CN 201610333585 A CN201610333585 A CN 201610333585A CN 107404719 A CN107404719 A CN 107404719A
Authority
CN
China
Prior art keywords
sim card
esam
card
terminal
card number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610333585.8A
Other languages
Chinese (zh)
Inventor
孙东平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610333585.8A priority Critical patent/CN107404719A/en
Priority to PCT/CN2016/085725 priority patent/WO2017197689A1/en
Publication of CN107404719A publication Critical patent/CN107404719A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of client identification module SIM card processing method, device, terminal and ESAM chips, wherein, this method includes:Obtain the card number of the SIM card of insertion terminal;Using the embedded safety module ESAM chips for being authenticated to the card number of SIM card, the card number of the SIM card to getting is authenticated.By the present invention, solve in correlation technique, exist and SIM card is authenticated by way of software algorithm, the problem of safety and reliability of authentication can not be ensured, and then improve the effect of the safety and reliability of SIM card authentication.

Description

SIM card processing method, device, terminal and ESAM chips
Technical field
The present invention relates to the communications field, in particular to a kind of client identification module (Subscriber Identity Module, referred to as SIM) card processing method, device, terminal and embedded safety module (Embedded Secure Access Module, referred to as ESAM) chip.
Background technology
In the related art, lost due to terminal (for example, mobile phone) often occurs, stolen phenomenon, therefore, many terminals It is both provided with carrying out the SIM card of insertion the function of authentication.But to terminal access SIM card authenticate when, typically Authenticated by the way of software algorithm.It is typically also that can be broken by software code even if these functions are set Solution.Once being cracked, the terminal lost or be stolen can still use.
Therefore, in the related art, exist and SIM card is authenticated by way of software algorithm, can not ensure to authenticate Safety and reliability the problem of.
The content of the invention
The embodiments of the invention provide a kind of SIM card processing method, device, terminal and ESAM chips, at least to solve In correlation technique, SIM card is authenticated by way of software algorithm, the safety and reliability that can not ensure to authenticate is asked Topic.
According to one embodiment of present invention, there is provided a kind of terminal, including:Client identification module SIM card circuit, base band Processor, and embedded safety module ESAM chips, wherein:The SIM card circuit, for having detected SIM card insertion, read The card number of the SIM card of access;The ESAM chips, be connected to the SIM card circuit and the BBP, for pair The card number of the SIM card read is authenticated.
Alternatively, the ESAM chips, it is additionally operable to according to the ESAM marks ID and and ESAM for being used to identify ESAM chips The binding relationship of the card number of the SIM card of chip bonding, the card number of the SIM card to reading are authenticated.
Alternatively, the BBP, it is used to indicate to the SIM card for what is sent according to the ESAM chips The notice of card number authentification failure, carry out the destruction of the software of the terminal.
Alternatively, the ESAM chips, the destruction of software for notifying the BBP to carry out the terminal is additionally operable to, And after the instruction message that software destruction that the BBP returns, for indicating the terminal is completed is received, break Open the communication path with the SIM card circuit and with the BBP.
According to another embodiment of the invention, there is provided a kind of client identification module SIM card processing method, including:Obtain Take the card number of the SIM card of insertion terminal;Using the embedded safety module ESAM cores for being authenticated to the card number of SIM card Piece, the card number of the SIM card to getting are authenticated.
Alternatively, using the ESAM chips for being authenticated to the card number of SIM card, to the SIM card that gets Card number is authenticated including:According to for identify ESAM chips ESAM identify ID and with the SIM card of ESAM chip bondings The binding relationship of card number, the card number of the SIM card to getting are authenticated, including:According to the SIM card got The ESAM ID that store in card number, the ESAM chips and for the key of encryption carry out that ciphertext is calculated;Compare meter Obtained ciphertext and card number, the ESAM in the ESAM chips according to the SIM card prestored in the binding relationship Whether the predetermined ciphertext that ID and the cipher key calculation obtain is identical;It is that the ciphertext being calculated makes a reservation for described in comparison result Ciphertext be identical in the case of, it is determined that to the SIM card card number certification success;And/or it is calculated in comparison result Ciphertext is in the case of differing, it is determined that the card number authentification failure to the SIM card with the predetermined ciphertext.
Alternatively, according to the ESAM ID stored in the card number of the SIM card got, the ESAM chips, with And carry out ciphertext is calculated and include for the key of encryption:Generate the random number for calculating the ciphertext;Using generation The random number, according to the ESAM ID, Yi Jiyong stored in the card number of the SIM card got, the ESAM chips In the key of encryption carry out that ciphertext is calculated.
Alternatively, the embedded safety module ESAM chips for being authenticated to the card number of SIM card are being used, to obtaining To the SIM card card number be authenticated after, in addition to:When to the card number authentification failure of the SIM card, control The terminal carries out destruction operation, including:Sent a notification message to the BBP of the terminal, wherein, the notice disappears Cease for notifying the BBP to destroy the software of the terminal;Returned receiving the BBP , for indicating that the software of the terminal destroys the instruction message completed after, disconnect with the SIM card circuit of the terminal and with The communication path of the BBP of the terminal.
According to still a further embodiment, there is provided a kind of client identification module SIM card processing unit, including, obtain Modulus block, the card number of the SIM card for obtaining insertion terminal;Authentication module, for using for recognizing the card number of SIM card The embedded safety module ESAM chips of card, the card number of the SIM card to getting is authenticated.
Alternatively, the authentication module be additionally operable to according to be used for identify ESAM chips ESAM mark ID and with ESAM cores The binding relationship of the card number of the SIM card of piece binding, the card number of the SIM card to getting are authenticated;Wherein, the certification Module includes:Computing unit, described in being stored in the card number according to the SIM card got, the ESAM chips ESAM ID and key for encryption carry out that ciphertext is calculated;Comparing unit, for comparing the ciphertext being calculated and institute State in ESAM chips according to the card number of the SIM card prestored in the binding relationship, the ESAM ID and the key meter Whether obtained predetermined ciphertext is identical;Determining unit, for comparison result be the ciphertext that is calculated with it is described predetermined close Text be identical in the case of, it is determined that to the SIM card card number certification success;And/or comparison result be calculated it is close In the case that the literary and predetermined ciphertext is differs, it is determined that the card number authentification failure to the SIM card.
Alternatively, the computing unit includes:Subelement is generated, for generating the random number for being used for calculating the ciphertext; Computation subunit, for the random number using generation, according to the card number of the SIM card got, the ESAM chips The ESAM ID of middle storage, and for the key of encryption carry out that ciphertext is calculated.
Alternatively, described device also includes:Control module, for when to the card number authentification failure of the SIM card, control The terminal carries out destruction operation;The control module includes:Notification unit, for the BBP transmission to the terminal Notification message, wherein, the notification message is used to notify the BBP to destroy the software of the terminal;Disconnect Unit, for disappearing in the instruction for receiving software destruction completion that the BBP returns, for indicating the terminal After breath, the communication path with the SIM card circuit of the terminal and with the BBP of the terminal is disconnected.
According to still another embodiment of the invention, a kind of embedded safety module ESAM chips are additionally provided.The ESAM cores Piece includes any one of foregoing client identification module SIM card processing unit.
According to still another embodiment of the invention, a kind of storage medium is additionally provided.The storage medium is arranged to storage and used In the program code for performing following steps:Obtain the card number of the SIM card of insertion terminal;Using for the card number progress to SIM card The embedded safety module ESAM chips of certification, the card number of the SIM card to getting are authenticated.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:Using for SIM card The ESAM chips that are authenticated of card number, the card number of the SIM card to getting is authenticated including:According to for identifying The ESAM mark ID of ESAM chips and the binding relationship with the card number of the SIM card of ESAM chip bondings, described in getting The card number of SIM card is authenticated, including:According to being stored in the card number of the SIM card got, the ESAM chips ESAM ID and key for encryption carry out that ciphertext is calculated;Compare in the ciphertext being calculated and the ESAM chips Obtained according to the card number of the SIM card prestored in the binding relationship, the ESAM ID and the cipher key calculation predetermined Whether ciphertext is identical;In the case of in comparison result, to be the ciphertext that is calculated be identical with the predetermined ciphertext, it is determined that to institute State the card number certification success of SIM card;And/or in comparison result it is that the ciphertext that is calculated differs with the predetermined ciphertext In the case of, it is determined that the card number authentification failure to the SIM card.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:According to what is got The ESAM ID and the key for encryption stored in the card number of the SIM card, the ESAM chips is calculated Ciphertext includes:Generate the random number for calculating the ciphertext;Using the random number of generation, according to getting The ESAM ID stored in the card number of SIM card, the ESAM chips, and for encryption key be calculated it is close Text.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:Using be used for pair The embedded safety module ESAM chips that the card number of SIM card is authenticated, the card number of the SIM card to getting are carried out After certification, in addition to:When to the card number authentification failure of the SIM card, the terminal is controlled to carry out destruction operation, including: Sent a notification message to the BBP of the terminal, wherein, the notification message is used to notify the BBP pair The software of the terminal is destroyed;Receiving software pin that the BBP returns, for indicating the terminal After ruining the instruction message of completion, the communication with the SIM card circuit of the terminal and with the BBP of the terminal is disconnected Path.
By the present invention, an ESAM chip is set between the SIM card circuit and BBP of terminal, passes through ESAM The card number for the SIM card that chip accesses to terminal is authenticated, and because ESAM chips have safe, is not easy to be cracked excellent Point, therefore, can solve in the related art, to authenticate SIM card by way of software algorithm, authentication can not be ensured The problem of safety and reliability, reach the effect for the safety and reliability for improving SIM card authentication.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the structured flowchart of terminal according to embodiments of the present invention;
Fig. 2 is the flow chart of SIM card processing method according to embodiments of the present invention;
Fig. 3 is the flow chart of SIM card processing method according to the preferred embodiment of the invention;
Fig. 4 is the structured flowchart one of SIM card processing unit according to embodiments of the present invention;
Fig. 5 is the structured flowchart of authentication module 44 in SIM card processing unit according to embodiments of the present invention;
Fig. 6 is the structured flowchart of computing unit 52 in SIM card processing unit according to embodiments of the present invention;
Fig. 7 is the structured flowchart two of SIM card processing unit according to embodiments of the present invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that do not conflicting In the case of, the feature in embodiment and embodiment in the application can be mutually combined.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.
Embodiment 1
The terminal that the present embodiment is provided can be mobile terminal, terminal or similar arithmetic unit.Fig. 1 is The structured flowchart of terminal according to embodiments of the present invention.(only show in figure as shown in figure 1, terminal 10 can include one or more Go out one) SIM card circuit 102, one or more (one is only shown in figure) ESAM chips 104 and BBP 106. It will appreciated by the skilled person that the structure shown in Fig. 1 is only to illustrate, it does not cause to limit to the structure of above-mentioned terminal It is fixed.For example, terminal 10 may also include the component more or less than shown in Fig. 1 (for example, baseband portion, radio frequency part, aobvious Show part, peripheral hardware part, daughter board etc.), or there is the configuration different from shown in Fig. 1.
SIM card circuit 102, for having detected SIM card insertion, read the card number of the SIM card of insertion;ESAM chips 104, SIM card circuit 102 and BBP 106 are connected respectively to, the card number for the SIM card to reading is authenticated.
By the above-mentioned technical proposal of the embodiment of the present invention, between the SIM card circuit 102 and BBP of terminal 10 ESAM chips are set, are authenticated by the card number of SIM card of the ESAM chips to being inserted in SIM card circuit 102.Due to ESAM cores Piece has the advantages of safe, to be not easy to be cracked, and can solve in the related art, to exist by way of software algorithm pair SIM card is authenticated, can not ensure authentication safety and reliability the problem of, reach improve SIM card authentication security and The effect of reliability.
Terminal 10 can include one or more SIM card circuits 102, when comprising multiple SIM card circuits 102, each SIM card The SIM card of identical or different operators (such as move, UNICOM etc.) is can be inserted into circuit 102, as long as SIM card circuit 102 can To identify and read the card number corresponding to the SIM card of insertion.
Terminal 10 can include one or more ESAM chips 104, when including multiple ESAM chips 104, each ESAM chips 104 can be respectively connecting to different SIM card circuits 102.That is, according to different demands, one in terminal 10 or Multiple SIM card circuits 102 may be connected to same ESAM chips 104, or different SIM card circuits 102 be connected to it is different ESAM chips 104, as long as meeting that ESAM chips 104 are respectively connecting to SIM card circuit 102 and BBP 106.ESAM Chip 104 can by bus with and SIM card circuit 102 and BBP 106 be connected.
Alternatively, ESAM chips 104 are additionally operable to according to for identifying the ESAM ID of ESAM chips and being tied up with ESAM chips The binding relationship of the card number of fixed SIM card, the card number of the SIM card to reading are authenticated.
ESAM chip hardware securities obtain ITSECEAL5 level certifications, it is seen that its security is to be worth affirmative.Together When, ESAM chips also have the function of identification.Unique label (ESAM ID) is stored in ESAM chip internals, this Unique label is set before ESAM chips dispatch from the factory, and is unique, such as the identity card of people, can not be changed, while can To prevent the attack of the measures such as SEMA/DEMA, SPA/DPA, DFA and sequential from cracking, security and uniqueness ensure that.
Identify ID in the ESAM that will be used to identify that ESAM chips, and the card number of SIM card when being bound, it is necessary to distribute this The operator of SIM card binds together the ESAM ID of SIM card number and ESAM chips, and corresponding binding information is write ESAM chips.
When lost terminal or it is stolen after, it is general to change other SIM cards when using.When having detected SIM card insertion When, read the card number of the SIM card of insertion.ESAM chips according to for identifying the ESAM ID of ESAM chips, and with ESAM chips The binding relationship of the card number of the SIM card of binding, the card number of the SIM card to reading are authenticated, and in the SIM card to reading Card number certification.
By the above-mentioned technical proposal of the embodiment of the present invention, according to the ESAM ID, Yi Jiyu for identifying ESAM chips The binding relationship of the card number with SIM card of ESAM chip bondings, the card number of the SIM card to reading are authenticated, and ensure that pair The accuracy of the card number certification of the SIM card of insertion, further ensures the safety and reliability to SIM card certification.
Alternatively, in card number authentification failure of the ESAM chips 104 to the SIM card of reading, control terminal carries out destruction behaviour Make.
It should be noted that above-mentioned control terminal carry out destroy operation can include it is a variety of, for example, can include to terminal Lock operation and to terminal breaking-up operation.Wherein, the lock operation can carry out limitation use to some important applications Restriction operation.And breaking-up operation is then the destruction operation destroyed to terminal hardware.When the owner of terminal obtains again To terminal, it is necessary to when being reused to terminal, for above-mentioned lock operation, it is necessary to carried terminal, binding when used correlation The place or other relevant departments that certificate and SIM card arrange to operator are unlocked operation to limiting operation.And for upper State breaking-up operation, then when needing carried terminal, binding used related certificate and the place that is arranged to operator of SIM card or Other relevant departments carry out hardware recovery operation processing to destroying to operate, and the hardware recovery of breaking-up operation is compared to lock operation Unblock operation comparatively, it may be necessary to consume a longer time.
By the above-mentioned technical proposal of the embodiment of the present invention, it can solve the problem that the auto-destruct function of terminal data is easily broken The problem of solution, and then ensure that the privacy and property safety of user.
Alternatively, BBP 106 is according to the notices of ESAM chips 104, the software installed in terminal it is automatic Destroy, for example, the client installed in unloading or partial relief terminal 10, removing in terminal 10 account that preserves and close Code, format the file stored in terminal 10, the operating system for formatting terminal 10 etc..
By the above-mentioned technical proposal of the embodiment of the present invention, the destruction of the software to being installed in terminal 10 is realized, is removed The data such as picture, the video of privacy of user may be revealed and user's bank account, the void of user's property loss may be caused Intend the related account of account (such as account and GID of each Bank Account Number, Alipay, wechat, internet finance correlation) With encrypted message and business information etc., it targetedly ensure that the privacy and property safety of user.
Alternatively, ESAM chips 104 can be also used for the software installed in the notice progress terminal 10 of BBP 106 Destroy, and after receiving software that BBP 106 returns, for instruction terminal and destroying the instruction message completed, break Open the communication path with SIM card circuit 102 and with BBP 106.For example, by the way that the inside of ESAM chips 104 is melted Silk short circuit, disconnects and SIM card circuit 102 and the communication path with BBP 106.
By the above-mentioned technical proposal of the embodiment of the present invention, due to ESAM chips 104 be connected to SIM card circuit 102 and Between BBP 106, after the communication path between SIM card circuit 10 and BBP 106 disconnects, SIM card circuit 102 by cisco unity malfunction.Simultaneously as the communication path between ESAM chips 104 and BBP 106 disconnects, base band Processor 106 will can't detect ESAM chips 104, and detect that ESAM chips 104 are the necessary conditions of download version, therefore detect It also will be unable to complete download function less than ESAM chips 104, terminal now turns into plate brick, it is therefore prevented that lose terminal and used, And non-serviceable terminal does not possess the value that can be merchandised, therefore, reduce because stealing terminal and caused by injury accident Quantity.
Embodiment 2
A kind of client identification module SIM card processing method is provided in the present embodiment, and Fig. 2 is according to embodiments of the present invention SIM card processing method flow chart, as shown in Fig. 2 the flow comprises the following steps:
Step S202, obtain the card number of the SIM card of insertion terminal;
Step S204, using the embedded safety module ESAM chips for being authenticated to the card number of SIM card, to obtaining To the card number of SIM card be authenticated.
Alternatively, above-mentioned steps S204 can include:According to the ESAM ID for identifying ESAM chips, and and ESAM The binding relationship of the card number of the SIM card of chip bonding, the card number of the SIM card to getting are authenticated, including:
Carried out according to the ESAM ID stored in the card number of the SIM card got, ESAM chips and for the key of encryption Ciphertext is calculated;
Compare the ciphertext being calculated and the card in ESAM chips according to the SIM card prestored in above-mentioned binding relationship Number, the obtained predetermined ciphertext of above-mentioned ESAM ID and above-mentioned cipher key calculation it is whether identical;
In the case of in comparison result, to be the ciphertext that is calculated be identical with predetermined ciphertext, it is determined that the card number to SIM card Certification success;And/or comparison result be the ciphertext that is calculated with predetermined ciphertext to differ in the case of, it is determined that to SIM The card number authentification failure of card.
Alternatively, can also be authenticated according to the card number of SIM card of other various ways to getting, for example, can be with According to the binding of the ID of the user of ESAM ID, the ESAM chip bondings for identifying ESAM chips and the card number of SIM card Relation, or, according to the ID of the user of ESAM chip bondings and the binding relationship of the card number of SIM card, or, direct root According to the card number of binding SIM card in ESAM chips, the card number of the SIM card to getting is authenticated.And above-mentioned ID can be The identity card of user or other can be unique mark user identity certificate number.
The mode compared by using key encryption and encrypted result, the card number for adding the SIM card to getting are recognized The security of card and the reliability of authentication result.
Alternatively, above-mentioned steps S204 can also include:
Generate the random number for calculating ciphertext;
Using the random number of generation, according to the ESAM ID stored in the card number of the SIM card got, ESAM chips, and Key for encryption carries out that ciphertext is calculated.
By generating the random number for being used for calculating ciphertext, above-mentioned random number is used when calculating ciphertext, due to random number Generation be random, ensure that the security of card number certification and the reliability of authentication result of the SIM card to getting.
Alternatively, after step S204, can also include:
Sent a notification message to the BBP of terminal, wherein, notification message is used to notify BBP to terminal Software destroyed;
After receiving software that BBP returns, for instruction terminal and destroying the instruction message completed, disconnect Communication path with the SIM card circuit of terminal and with the BBP of terminal.
Alternatively, BBP can be destroyed using various ways to the software of terminal, for example, can by with At least one of under type is destroyed to the software of terminal:Unloading or partial relief terminal on installed client, Remove the account preserved in terminal and password, format the file stored in terminal, the operating system of formatting terminal.
It is alternatively possible to disconnected using various ways with the SIM card circuit of terminal and with the BBP of terminal Communication path, for example, can be by the internal fuse short circuit of ESAM chips.
Alternatively, the executive agent of above-mentioned steps can be ESAM chips or the terminal for being embedded with above-mentioned ESAM chips Deng, but not limited to this.
Based on above-described embodiment and preferred embodiment, to illustrate that the whole flow process of scheme interacts, in this preferred embodiment In, there is provided a kind of SIM card processing method, Fig. 3 are the flow charts of SIM card processing method according to the preferred embodiment of the invention, It should be noted that in the SIM card processing method, terminal illustrates by taking mobile phone as an example.As shown in figure 3, the flow includes Following steps:
Step S302:Into client, auto-destruct setting is carried out, can select to unload some clients, format text Part, the removing of account number cipher and deletion mobile phone operating system;
Step S304:The insertion of SIM card is detected whether, is detected accordingly by the interrupt signal of SIM card;
Step S306:The inside mini system of ESAM modules is read out to SIM card number;
Step S308:ESAM inside modules produce one group of random number, the checking for ciphertext;
Step S310:The SIM card number that will be read, with reference to the identity card originally bound, the ID of ESAM in itself carry out key Calculating;
Step S312:The ciphertext calculated and the ciphertext originally set are compared;If both ciphertexts are identical, Go to S314 and S316;Ciphertext difference then goes to S318;
Step S314:Ciphertext is identical, the card number certification success to the SIM card of reading, can carry out data transmission work;
Step S316:After certification, mobile phone can be terminated with normal use, flow.
Step S318:The ciphertext of calculating and the ciphertext originally set are different, and the card number certification to the SIM card of reading is lost Lose, start the Shredding Process of correlation.For example, the destruction work of software can be carried out first, application program app unloading, account are carried out The removing of number password, the deletion of formatted file and mobile phone operating system;
Step S320:Judge that software is destroyed whether to complete, if do not completed, return to S318, completed if software is destroyed, Jump to S322;
Step S322:The fuse short circuit of ESAM inside modules, starts corresponding hardware and destroys;
Step S324:ESAM modules stopped work, shut off logical between SIM card circuit and BBP Letter, mobile phone can not carry out the work related to SIM;
Step S326:Mobile phone is completed to destroy.After ESAM inside modules fuse short circuits, BBP can not detect ESAM modules, even if brush machine again, whole mobile phone system will not also start.
For example, owner A mobile phone is lost, owner A phone number is 15888888888, identity card 300000199911113333, ESAM ID is IS400500600, and it is automatic that owner A has handled startup when mobile phone is bought The function of destruction, and bound phone number, ESAM ID and identity card in business hall.And to the pattern of auto-destruct Also set, when SIM card number not pair when, will all applications, while format the file and hand of storage such as unloading Alipay Machine system, ESAM auto-destructs are also started, and this is the setting that owner A is carried out to the auto-destruct item of oneself mobile phone.Have One day, owner A mobile phone was lost, and is found by B, and B has injected the Mobile phone card of oneself A mobile phone, and now, mobile phone can detect The insertion of SIM card, carry out the reading of SIM card number after detection, and by the SIM card number of reading and owner A identification card number, ESAM Id number carries out the calculating of ciphertext, is then compared the ciphertext of calculating and the ciphertext originally set, after comparing, finds ciphertext It is different, the card number authentification failure of SIM card, now start auto-destruct, first carry out software auto-destruct, mainly unloading is paid The application programs such as treasured, format the data and cell phone system of storage, after the completion of carry out ESAM auto-destruct, now, in ESAM Portion's fuse short circuit, completes to destroy, while the path being also disconnected between SIM card circuit and BBP, mobile phone turn into plate brick.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but a lot In the case of the former be more preferably embodiment.Based on such understanding, technical scheme is substantially in other words to existing The part that technology contributes can be embodied in the form of software product, and the computer software product is stored in a storage In medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, calculate Machine, server, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiment 3
A kind of client identification module SIM card processing unit and ESAM chips are additionally provided in the present embodiment, and the device is used In realizing above-described embodiment and preferred embodiment, repeating no more for explanation had been carried out.As used below, term " module " can realize the combination of the software and/or hardware of predetermined function.Although the device described by following examples is preferably Realized with software, but hardware, or software and hardware combination realization and may and be contemplated.
Fig. 4 is the structured flowchart one of SIM card processing unit according to embodiments of the present invention, as shown in figure 4, the device bag Include:Acquisition module 42, authentication module 44, are illustrated to the device below.
Acquisition module 42, the card number of the SIM card for obtaining insertion terminal;Authentication module 44, it is connected to above-mentioned acquisition mould Block 42, for using the embedded safety module ESAM chips for being used for being authenticated to the card number of SIM card, to the SIM got The card number of card is authenticated.
Fig. 5 is the structured flowchart of authentication module 44 in SIM card processing unit according to embodiments of the present invention, the authentication module 4 are additionally operable to according to the ESAM mark ID and the binding with the card number of the SIM card of ESAM chip bondings for being used to identify ESAM chips Relation, the card number of the SIM card to getting are authenticated, as shown in figure 5, the authentication module 44 includes computing unit 52, compared Unit 54 and determining unit 56, the authentication module 44 is illustrated below.
Computing unit 52, for the ESAM ID, Yi Jiyong stored in the card number according to the SIM card got, ESAM chips In the key of encryption carry out that ciphertext is calculated;Comparing unit 54, above-mentioned computing unit 52 is connected to, is calculated for comparing Ciphertext with being obtained in ESAM chips according to the card number of the SIM card prestored in binding relationship, ESAM ID and cipher key calculation Predetermined ciphertext it is whether identical;Confirmation unit 56, above-mentioned comparing unit 54 is connected to, for being calculated in comparison result In the case of ciphertext and predetermined ciphertext are identical, it is determined that the card number certification success to above-mentioned SIM card;And/or it is in comparison result The ciphertext being calculated is in the case of differing, it is determined that the card number authentification failure to SIM card with above-mentioned predetermined ciphertext.
Fig. 6 is the structured flowchart of computing unit 52 in SIM card processing unit according to embodiments of the present invention, as shown in fig. 6, The computing unit 52 includes generation subelement 62 and computation subunit 64, and the computing unit 52 is illustrated below.
Subelement 62 is generated, for generating the random number for being used for calculating ciphertext;Computation subunit 64, it is connected to above-mentioned generation Subelement 62, for the random number using generation, according to the ESAM stored in the card number of the SIM card got, ESAM chips ID, and for the key of encryption carry out that ciphertext is calculated.
Fig. 7 is the structured flowchart two of SIM card processing unit according to embodiments of the present invention, as shown in fig. 7, the device also wraps Control module 46 is included, for when to the card number authentification failure of SIM card, control terminal to carry out destruction operation.The control module 46 Including notification unit 72, switching units 74, the control module 46 is illustrated below.
Notification unit 72, for being sent a notification message to the BBP of terminal, wherein, above-mentioned notification message is used to lead to Know that above-mentioned BBP is destroyed to the software of terminal;Switching units 74, above-mentioned notification unit 72 is connected to, for connecing After receiving the instruction message that software destruction that BBP returns, for instruction terminal is completed, the SIM card with terminal is disconnected Circuit and the communication path with the BBP of terminal.
Alternatively, above-mentioned BBP, which to the software of terminal destroy, includes at least one of:Unloading or portion Divide on discharging terminal in the client installed, removing terminal the account preserved and password, format the text stored in terminal Part, the operating system for formatting terminal;Or disconnect logical with the SIM card circuit of terminal and with the BBP of terminal Letter path includes:By the internal fuse short circuit of ESAM chips.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong Cross in the following manner realization, but not limited to this:Above-mentioned module is respectively positioned in ESAM chips;Or above-mentioned modules are with any group The form of conjunction is located in different ESAM chips respectively, and above-mentioned ESAM chips are positioned at including SIM card circuit and BBP Terminal among.
Embodiments of the invention additionally provide a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium can The program code for performing following steps to be arranged to storage to be used for:
S1, obtain the card number of the SIM card of insertion terminal;
S2, using the embedded safety module ESAM chips for being authenticated to the card number of SIM card, to what is got The card number of SIM card is authenticated;
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:
Using the ESAM chips for being authenticated to the card number of SIM card, the card number of the SIM card to getting is authenticated Including:
ID and binding with the card number of the SIM card of ESAM chip bondings are identified according to the ESAM for identifying ESAM chips Relation, the card number of the SIM card to getting are authenticated, including:
S1, according to the ESAM ID stored in the card number of the SIM card got, ESAM chips, and the key for encryption Carry out that ciphertext is calculated;
S2, compare the ciphertext that is calculated and the card number in ESAM chips according to the SIM card prestored in binding relationship, Whether the predetermined ciphertext that ESAM ID and cipher key calculation obtain is identical;
S3, in the case of to be the ciphertext that is calculated be identical with predetermined ciphertext in comparison result, it is determined that the card to SIM card Number certification success;And/or comparison result be the ciphertext that is calculated with predetermined ciphertext to differ in the case of, it is determined that pair The card number authentification failure of SIM card
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:
Enter according to the ESAM ID stored in the card number of the SIM card got, ESAM chips, and for the key of encryption Ciphertext, which is calculated, in row includes:
S1, generate the random number for calculating ciphertext;
S2, using the random number of generation, according to the ESAM ID stored in the card number of the SIM card got, ESAM chips, And for the key of encryption carry out that ciphertext is calculated.
Alternatively, storage medium is also configured to the program code that storage is used to perform following steps:Using be used for pair The embedded safety module ESAM chips that the card number of SIM card is authenticated, the card number of the SIM card to getting are authenticated it Afterwards, in addition to:When to the card number authentification failure of SIM card, control terminal carries out destruction operation, including:
S1, sent a notification message to the BBP of terminal, wherein, notification message is used to notify BBP to end The software at end is destroyed;
S2, after receiving software that BBP returns, for instruction terminal and destroying the instruction message completed, break Open the communication path with the SIM card circuit of terminal and with the BBP of terminal.
Alternatively, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, RandomAccess Memory), mobile hard disk, magnetic disc or light Disk etc. is various can be with the medium of store program codes.
Alternatively, in the present embodiment, processor performs according to the program code stored in storage medium:Obtain insertion The card number of the SIM card of terminal;Using the embedded safety module ESAM chips for being authenticated to the card number of SIM card, to obtaining The card number for the SIM card got is authenticated.
Alternatively, in the present embodiment, processor performs according to the program code stored in storage medium:Using for The ESAM chips being authenticated to the card number of SIM card, the card number of the SIM card to getting are authenticated including:According to for marking The ESAM ID of ESAM chips and the binding relationship with the card number of the SIM card of ESAM chip bondings are known, to the SIM card got Card number be authenticated, including:According to the ESAM ID stored in the card number of the SIM card got, ESAM chips, and it is used for The key of encryption carries out that ciphertext is calculated;Compare the ciphertext that is calculated with ESAM chips according to being deposited in advance in binding relationship Whether the predetermined ciphertext that card number, ESAM ID and the cipher key calculation of the SIM card of storage obtain is identical;It is to calculate in comparison result In the case of the ciphertext that arrives and predetermined ciphertext are identical, it is determined that the card number certification success to SIM card;And/or it is in comparison result The ciphertext being calculated is in the case of differing, it is determined that the card number authentification failure to SIM card with predetermined ciphertext.
Alternatively, in the present embodiment, processor performs according to the program code stored in storage medium:According to acquisition To the card number of SIM card, the ESAM ID that store in ESAM chips, and for the key of encryption carry out that ciphertext bag is calculated Include:Generate the random number for calculating ciphertext;Using the random number of generation, according to the card number of the SIM card got, ESAM chips The ESAM ID of middle storage, and for the key of encryption carry out that ciphertext is calculated.
Alternatively, in the present embodiment, processor performs according to the program code stored in storage medium:Using use In the embedded safety module ESAM chips that the card number to SIM card is authenticated, the card number of the SIM card to getting is authenticated Afterwards, in addition to:Control terminal carries out destruction operation, including:Sent a notification message to the BBP of terminal, wherein, lead to Know that message is used to notify BBP to destroy the software of terminal;Receive BBP return, for referring to After showing that the software of terminal destroys the instruction message completed, the BBP with the SIM card circuit of terminal and with terminal is disconnected Communication path.
Alternatively, the specific example in the present embodiment may be referred to described in above-described embodiment and optional embodiment Example, the present embodiment will not be repeated here.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed Network on, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to they are stored Performed in the storage device by computing device, and in some cases, can be with different from shown in order execution herein The step of going out or describing, they are either fabricated to each integrated circuit modules respectively or by multiple modules in them or Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (13)

  1. A kind of 1. terminal, it is characterised in that including client identification module SIM card circuit, BBP, and embedded-type security mould Block ESAM chips, wherein:
    The SIM card circuit, for having detected SIM card insertion, read the card number of the SIM card of insertion;
    The ESAM chips, the SIM card circuit and the BBP are connected to, for the SIM card to reading Card number be authenticated.
  2. 2. terminal according to claim 1, it is characterised in that the ESAM chips, be additionally operable to according to for identifying ESAM The ESAM mark ID of chip, and the binding relationship with the card number of the SIM card of ESAM chip bondings, to the SIM read The card number of card is authenticated.
  3. 3. terminal according to claim 1, it is characterised in that the BBP, for according to the ESAM chips What is sent is used for notice of the instruction to the card number authentification failure of the SIM card, carries out the destruction of the software of the terminal.
  4. 4. terminal according to any one of claim 1 to 3, it is characterised in that
    The ESAM chips, the destruction of software for notifying the BBP to carry out the terminal is additionally operable to, and received After the instruction message that software destruction that the BBP returns, for indicating the terminal is completed, disconnect and the SIM Card circuit and the communication path with the BBP.
  5. A kind of 5. client identification module SIM card processing method, it is characterised in that
    Obtain the card number of the SIM card of insertion terminal;
    Using the embedded safety module ESAM chips for being authenticated to the card number of SIM card, to the SIM card got Card number be authenticated.
  6. 6. according to the method for claim 5, it is characterised in that using the ESAM for being used to be authenticated the card number of SIM card Chip, the card number of the SIM card to getting are authenticated including:
    According to for identifying the ESAM mark ID of ESAM chips and being closed with the binding of the card number of the SIM card of ESAM chip bondings System, the card number of the SIM card to getting are authenticated, including:
    According to the ESAM ID stored in the card number of the SIM card got, the ESAM chips and for encryption Key carries out that ciphertext is calculated;
    Compare the ciphertext being calculated and the card in the ESAM chips according to the SIM card prestored in the binding relationship Number, the obtained predetermined ciphertext of the ESAM ID and the cipher key calculation it is whether identical;
    In the case of in comparison result, to be the ciphertext that is calculated be identical with the predetermined ciphertext, it is determined that to the SIM card Card number certification success;And/or comparison result be the ciphertext that is calculated with the predetermined ciphertext to differ in the case of, really The fixed card number authentification failure to the SIM card.
  7. 7. according to the method for claim 6, it is characterised in that according to the card number of the SIM card got, the ESAM The ESAM ID that are stored in chip and key for encryption, which carry out ciphertext is calculated, to be included:
    Generate the random number for calculating the ciphertext;
    Using the random number of generation, according to being stored in the card number of the SIM card got, the ESAM chips ESAM ID, and for the key of encryption carry out that ciphertext is calculated.
  8. 8. according to the method for claim 5, it is characterised in that using embedding for being authenticated to the card number of SIM card Enter formula security module ESAM chips, after the card number of the SIM card to getting is authenticated, in addition to:
    When to the card number authentification failure of the SIM card, the terminal is controlled to carry out destruction operation, including:
    Sent a notification message to the BBP of the terminal, wherein, the notification message is used to notify the Base-Band Processing Device is destroyed to the software of the terminal;
    After the instruction message that software destruction that the BBP returns, for indicating the terminal is completed is received, Disconnect the communication path with the SIM card circuit of the terminal and with the BBP of the terminal.
  9. A kind of 9. client identification module SIM processing units, it is characterised in that including:
    Acquisition module, the card number of the SIM card for obtaining insertion terminal;
    Authentication module, for using the embedded safety module ESAM chips for being used for being authenticated to the card number of SIM card, to obtaining To the card number of the SIM card be authenticated.
  10. 10. device according to claim 9, it is characterised in that the authentication module is additionally operable to according to for identifying ESAM The ESAM mark ID of chip and the binding relationship with the card number of the SIM card of ESAM chip bondings, to the SIM card got Card number be authenticated;
    Wherein, the authentication module includes:
    Computing unit, for the ESAM ID stored in the card number according to the SIM card got, the ESAM chips And for the key of encryption carry out that ciphertext is calculated;
    Comparing unit, for comparing the ciphertext being calculated with being prestored in the ESAM chips according in the binding relationship SIM card the obtained predetermined ciphertext of card number, the ESAM ID and the cipher key calculation it is whether identical;
    Determining unit, in the case of in comparison result, to be the ciphertext that is calculated be identical with the predetermined ciphertext, it is determined that Card number certification success to the SIM card;And/or in comparison result it is the ciphertext that is calculated and the predetermined ciphertext for not phase With in the case of, it is determined that the card number authentification failure to the SIM card.
  11. 11. device according to claim 10, it is characterised in that the computing unit includes:
    Subelement is generated, for generating the random number for being used for calculating the ciphertext;
    Computation subunit, for the random number using generation, according to the card number of the SIM card got, the ESAM The ESAM ID stored in chip, and for the key of encryption carry out that ciphertext is calculated.
  12. 12. device according to claim 9, it is characterised in that also include:Control module, for the SIM card During card number authentification failure, the terminal is controlled to carry out destruction operation;
    The control module includes:
    Notification unit, for being sent a notification message to the BBP of the terminal, wherein, the notification message is used to notify The BBP is destroyed to the software of the terminal;
    Switching units, for complete in the destruction for receiving software that the BBP returns, for indicating the terminal Into instruction message after, disconnect the communication path with the SIM card circuit of the terminal and with the BBP of the terminal.
  13. 13. a kind of embedded safety module ESAM chips, it is characterised in that including any one of claim 9 to 12 Device.
CN201610333585.8A 2016-05-18 2016-05-18 SIM card processing method, device, terminal and ESAM chips Withdrawn CN107404719A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610333585.8A CN107404719A (en) 2016-05-18 2016-05-18 SIM card processing method, device, terminal and ESAM chips
PCT/CN2016/085725 WO2017197689A1 (en) 2016-05-18 2016-06-14 Sim card processing method and apparatus, terminal, and esam chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610333585.8A CN107404719A (en) 2016-05-18 2016-05-18 SIM card processing method, device, terminal and ESAM chips

Publications (1)

Publication Number Publication Date
CN107404719A true CN107404719A (en) 2017-11-28

Family

ID=60324625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610333585.8A Withdrawn CN107404719A (en) 2016-05-18 2016-05-18 SIM card processing method, device, terminal and ESAM chips

Country Status (2)

Country Link
CN (1) CN107404719A (en)
WO (1) WO2017197689A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111008392A (en) * 2019-12-25 2020-04-14 中电科航空电子有限公司 Self-destruction control method of positioning equipment and related device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113064725B (en) * 2021-03-30 2023-11-03 三川在线(杭州)信息技术有限公司 Virtual resource transfer method, vehicle-mounted unit, storage medium and electronic device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1688171A (en) * 2005-05-16 2005-10-26 航天科工信息技术研究院 Apparatus and method for implementing data safety transmission of mobile communication apparatus
CN101511083A (en) * 2008-12-25 2009-08-19 北京握奇数据系统有限公司 Authentication method and terminal for telecom smart card
CN101521886A (en) * 2009-01-21 2009-09-02 北京握奇数据系统有限公司 Method and device for authenticating terminal and telecommunication smart card
CN101583124A (en) * 2009-06-10 2009-11-18 大唐微电子技术有限公司 Authentication method and system of subscriber identity module and terminal
CN101605328A (en) * 2009-05-25 2009-12-16 厦门敏讯信息技术股份有限公司 Communication system, terminal, SIM and machine-card authentication method
CN101984575A (en) * 2010-10-14 2011-03-09 中兴通讯股份有限公司 Method and device for protecting mobile terminal software
CN102361481A (en) * 2011-07-07 2012-02-22 上海凯卓信息科技有限公司 Method for binding hardware encryption trans-flash (TF) card with mobile phone subscriber identity module (SIM) card
CN102438239A (en) * 2011-11-21 2012-05-02 上海凯卓信息科技有限公司 Mobile terminal compound information protecting method based on intelligent security card

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104864A (en) * 2009-12-22 2011-06-22 中兴通讯股份有限公司 Method for realizing network and card locking function of terminal and terminal
CN102377566B (en) * 2010-08-11 2014-04-09 北京融通高科科技发展有限公司 Security processing device and system for electric meter data
CN103258354A (en) * 2013-05-02 2013-08-21 无锡昶达信息技术有限公司 Vehicle-mounted device for expressway non-stop electronic toll collection system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1688171A (en) * 2005-05-16 2005-10-26 航天科工信息技术研究院 Apparatus and method for implementing data safety transmission of mobile communication apparatus
CN101511083A (en) * 2008-12-25 2009-08-19 北京握奇数据系统有限公司 Authentication method and terminal for telecom smart card
CN101521886A (en) * 2009-01-21 2009-09-02 北京握奇数据系统有限公司 Method and device for authenticating terminal and telecommunication smart card
CN101605328A (en) * 2009-05-25 2009-12-16 厦门敏讯信息技术股份有限公司 Communication system, terminal, SIM and machine-card authentication method
CN101583124A (en) * 2009-06-10 2009-11-18 大唐微电子技术有限公司 Authentication method and system of subscriber identity module and terminal
CN101984575A (en) * 2010-10-14 2011-03-09 中兴通讯股份有限公司 Method and device for protecting mobile terminal software
CN102361481A (en) * 2011-07-07 2012-02-22 上海凯卓信息科技有限公司 Method for binding hardware encryption trans-flash (TF) card with mobile phone subscriber identity module (SIM) card
CN102438239A (en) * 2011-11-21 2012-05-02 上海凯卓信息科技有限公司 Mobile terminal compound information protecting method based on intelligent security card

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111008392A (en) * 2019-12-25 2020-04-14 中电科航空电子有限公司 Self-destruction control method of positioning equipment and related device

Also Published As

Publication number Publication date
WO2017197689A1 (en) 2017-11-23

Similar Documents

Publication Publication Date Title
US11962616B2 (en) Protection against rerouting a communication channel of a telecommunication device having an NFC circuit and a secure data circuit
US10999737B2 (en) Detection of a rerouting of a communication channel of a telecommunication device connected to an NFC circuit
US8718602B2 (en) Method and system for remote control of smart card
EP3528160B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
EP2693789B1 (en) Mobile terminal encryption method, hardware encryption device and mobile terminal
US9179301B2 (en) Protection of a communication channel of a telecommunication device coupled to an NFC circuit against misrouting
US20170013451A1 (en) Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media
CN101296241B (en) Method for improving identity authentication security based on password card
CN104767713B (en) Account binding method, server and system
CN101102574A (en) Terminal verification method and device
CN110691352B (en) SIM card access control method, device, medium and equipment
CN104079562A (en) Safety authentication method based on payment terminal and related device
CN107273150B (en) Preloading firmware downloading and writing method and device
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN105825149A (en) Switching method for multi-operation system and terminal equipment
US6975883B1 (en) Device for protecting the initial utilization of a processor /chip card
CN101304315B (en) Method for improving identification authentication security based on password card
CN107404719A (en) SIM card processing method, device, terminal and ESAM chips
JP4993114B2 (en) Shared management method for portable storage device and portable storage device
US9313662B2 (en) Method of protecting a mobile-telephone-type telecommunication terminal
CN114239006A (en) Social security card PIN resetting method, system and medium based on standard interface
CN108197940A (en) Payment request response method, mobile terminal and the readable storage medium storing program for executing of mobile terminal
CN113158201A (en) Information safety backup method and device
CN101304422B (en) Method for improving identification authentication security based on password card
CN101304317B (en) Method for improving identification authentication security based on password card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20171128