CN110191054A - Route processing method and device, storage medium and electronic equipment - Google Patents

Route processing method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN110191054A
CN110191054A CN201910370664.XA CN201910370664A CN110191054A CN 110191054 A CN110191054 A CN 110191054A CN 201910370664 A CN201910370664 A CN 201910370664A CN 110191054 A CN110191054 A CN 110191054A
Authority
CN
China
Prior art keywords
application identities
security module
module
field communication
near field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910370664.XA
Other languages
Chinese (zh)
Other versions
CN110191054B (en
Inventor
方攀
陈岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910370664.XA priority Critical patent/CN110191054B/en
Publication of CN110191054A publication Critical patent/CN110191054A/en
Application granted granted Critical
Publication of CN110191054B publication Critical patent/CN110191054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/306Route determination based on the nature of the carried application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of route processing method and devices, storage medium and electronic equipment, it is related to technical field of near field communication, applied to terminal device, terminal device includes near field communication controller and multiple security modules, which comprises determining that the application identities amount of storage of each security module;If in multiple security modules the application identities amount of storage of first object module be greater than near field communication controller in routing table capacity, it is determined that in multiple security modules in addition to first object module the application identities of remaining security module total storage capacity;If the total storage capacity of the application identities of remaining security module is less than or equal to the capacity of routing table near field communication controller, then by the routing table of the application identities write-in near field communication controller of remaining security module, and establish the mapping relations of first object module and default route.The disclosure can extend terminal device and realize the quasi- application range of near-field communication card mold.

Description

Route processing method and device, storage medium and electronic equipment
Technical field
This disclosure relates to which technical field of near field communication, fills in particular to a kind of route processing method, route processing It sets, storage medium and electronic equipment.
Background technique
Near-field communication (Near Field Communication, NFC) is also known as wireless near field communication, is a kind of short distance High frequency wireless communication technology, allow electronic equipment between carry out contactless Point-to-Point Data Transmission.As near-field communication A kind of important application, card mold is quasi- can be modeled to terminal device (for example, mobile phone, smartwatch etc.) card, such as public transport Card, bank card, gate inhibition, all kinds of member cards etc..
In the treatment process that card mold is intended, terminal device needs to rely on application identities (Application ID, AID) to look into Corresponding application is found, to realize that card mold intends corresponding function.With the diversified development of life, card mold is quasi- on terminal device Using more and more, the quantity of corresponding application identities is also more and more.
It is limited near field communication controller for storing the memory space of application identities, once memory space takes, If there is new application identities, then can there are problems that the new application identities can not be written.Some technologies are in order to solve this Kind problem, is written new application identities by the way of covering old application identities.However, these will cause user can not be just It is often used the quasi- function of card mold, leads to not normally be paid, the problems such as identity can not be verified.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
The disclosure is designed to provide a kind of route processing method, route processing device, storage medium and electronic equipment, And then overcome the problems, such as to cause terminal device card mold to intend disabler since application identities are excessive at least to a certain extent.
According to one aspect of the disclosure, a kind of route processing method is provided, terminal device is applied to, terminal device includes Near field communication controller and multiple security modules, route processing method comprise determining that the application identities amount of storage of each security module; If the application identities amount of storage of first object module is greater than the appearance of routing table near field communication controller in multiple security modules Amount, it is determined that in multiple security modules in addition to first object module the application identities of remaining security module total storage capacity;If The total storage capacity of the application identities of remaining security module is less than or equal to the capacity of routing table near field communication controller, then by it The routing table of the application identities write-in near field communication controller of remaining security module, and establish first object module and default route Mapping relations.
According to one aspect of the disclosure, a kind of route processing device is provided, terminal device is applied to, terminal device includes Near field communication controller and multiple security modules, route processing device includes: the first amount of storage determining module, for determining each peace The application identities amount of storage of full module;Second amount of storage determining module, if for first object module in multiple security modules Application identities amount of storage be greater than near field communication controller in routing table capacity, it is determined that in multiple security modules remove the first mesh Mark the total storage capacity of the application identities of remaining outer security module of module;The first via is by processing module, if being used for remaining safe mould The total storage capacity of the application identities of block is less than or equal to the capacity of routing table near field communication controller, then by remaining security module Application identities write-in near field communication controller routing table, and establish the mapping relations of first object module and default route.
According to one aspect of the disclosure, a kind of storage medium is provided, computer program, computer program are stored thereon with Above-mentioned route processing method is realized when being executed by processor.
According to one aspect of the disclosure, a kind of electronic equipment is provided, comprising: processor;And memory, for storing The executable instruction of processor;Wherein, processor is configured to execute above-mentioned route processing method via executable instruction is executed.
In the technical solution provided by some embodiments of the present disclosure, if the application identities storage of a security module Amount is greater than the capacity of routing table near field communication controller, and remaining security module of terminal device in addition to the security module The total storage capacity of application identities be less than or equal to the capacity of routing table, then road is written into the application identities of these remaining security modules By in table, and establish the mapping relations of the security module and default route.As a result, when receiving application identities selection instruction, If by the routing table lookup application identities corresponding less than application identities selection instruction near field communication controller, it can be with The corresponding business tine of the instruction is routed to and is established in the security module of mapping relations with default route, it is corresponding to execute Business tine.Disclosure illustrative embodiments implement default route on the basis of the routing table of near field communication controller Scheme, greatly extend terminal device realize nfc card simulation application range, solve due to routing table memory capacity The problem of limiting and causing new application identities that can not be normally written.In addition, on the basis of disclosure illustrative embodiments, Due to can with expansion card simulate application scenarios, the function of terminal device can be enriched, make the behavioral activity of people more It is convenient.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 diagrammatically illustrates the interaction concept of the terminal device near field communication (NFC) function;
Fig. 2 diagrammatically illustrates the flow chart of route processing method according to an exemplary embodiment of the present disclosure;
Fig. 3 shows the schematic diagram of the double application architectures of near-field communication according to an exemplary embodiment of the present disclosure;
Fig. 4 diagrammatically illustrates the flow chart of the route processing method whole process according to an embodiment of the present disclosure;
Fig. 5 diagrammatically illustrates the block diagram of the route processing device of the first illustrative embodiments according to the disclosure;
Fig. 6 diagrammatically illustrates the block diagram of the route processing device of the second illustrative embodiments according to the disclosure;
Fig. 7 diagrammatically illustrates the block diagram of the route processing device of the third illustrative embodiments according to the disclosure;
Fig. 8 diagrammatically illustrates the block diagram of the route processing device of the 4th illustrative embodiments according to the disclosure;
Fig. 9 diagrammatically illustrates the block diagram of the route processing device of the 5th illustrative embodiments according to the disclosure;
Figure 10 diagrammatically illustrates the box of the first amount of storage determining module according to an exemplary embodiment of the present disclosure Figure;
Figure 11 diagrammatically illustrates the block diagram of the route processing device of the 6th illustrative embodiments according to the disclosure;
Figure 12 diagrammatically illustrates the block diagram of electronic equipment according to an exemplary embodiment of the present disclosure.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot Structure or characteristic can be incorporated in any suitable manner in one or more embodiments.In the following description, it provides perhaps More details fully understand embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that can It is omitted with technical solution of the disclosure one or more in the specific detail, or others side can be used Method, constituent element, device, step etc..In other cases, be not shown in detail or describe known solution to avoid a presumptuous guest usurps the role of the host and So that all aspects of this disclosure thicken.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function Energy entity, not necessarily must be corresponding with physically or logically independent entity.These function can be realized using software form Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place These functional entitys are realized in reason device device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all steps.For example, the step of having It can also decompose, and the step of having can merge or part merges, therefore the sequence actually executed is possible to according to the actual situation Change.In addition, term " first " used below, " second ", " third ", " the 4th ", " the 5th " etc. are merely to the mesh distinguished , it should not be understood as the limitation of present disclosure.
Security module described in the disclosure (Secure Element, SE), and it is referred to alternatively as safety element, refer to and is embedded with The common name of the hardware security element of microchip can independently realize the functions such as small-sized operation, storage, general safety with higher Property.The application field of security module is extensive, for example, can be with financial integrated circuit card, cell phone customer identification module The forms such as (Subscriber Identification Module, SIM) card, U shield for bank, traffic all-purpose card, E-Passport are big Amount is applied to a variety of different fields.
The application program run in security module can be referred to as security module apply (SE application), be denoted as Applet or SE Applet.In general, one or more Applet can be run in security module.For example, financial integrated circuit card operation is The payment application of bank, what is run in traffic all-purpose card is public transport payment application etc..As the function of terminal device is become stronger day by day, Application of the security module in terminal device is also increasingly extensive.For example, in the security module of mobile phone install public transport payment application, The Applet such as bank payment application, member card identification application, user can easily realize public transport payment, silver by mobile phone as a result, The corresponding functions such as row payment, membership's verifying.
Although terminal device described in the disclosure is often referred to mobile phone, it will, however, be understood by those skilled in the art that eventually End equipment can also include the equipment such as smartwatch, plate, and there is no special restriction on this for the disclosure.
Terminal device configured with near-field communication mode card function usually may include application processor (Application Processor, AP), near field communication controller (NFC controller) and security module.Wherein, security module is including but not limited to embedding Enter the security module (Embedded Secure Element, ESE) of formula, safe digital card (is used as the SD of NFC security module Card, is denoted as uSD), SIM card, Intrusion Detection based on host card mold intend (Host-based Card Emulation, HCE) etc..
In the illustrative embodiments of the disclosure, I2C can be passed through between application processor and near field communication controller Bus coupling can pass through SWP (Single Wire Protocol, single line association between near field communication controller and security module View) bus coupling, between application processor and security module can by SPI (Serial Peripheral Interface, Serial Peripheral Interface (SPI)) coupling.
In addition, being configured with the routing table of application identities (AID) near field communication controller, the disclosure is to list item in routing table Component part do not do it is specifically limited.Wherein, application identities described in disclosure illustrative embodiments can be answered by what is registered With provider's mark (RID) and the proprietary application of extension mark (PIX) composition, so it is easy to understand that an application is one corresponding Application identities.
Fig. 1 is schematically illustrated for paying scene with POS (Point Of Sale, point-of-sale terminal).POS terminal hair Application identities selection instruction (Select AID instruction) out, the NFC controller of terminal device receives the instruction, and in the routing table Corresponding application identities are searched, determine corresponding Applet according to the application identities.In this case, NFC controller can Corresponding business datum is sent to corresponding Applet by SWP interface, to realize corresponding card analog functuion.
Based on the factors such as cost, chip size, power consumption, efficiency, the limited storage space of routing table, with NXP PN547 (one Kind NFC chip) for, routing table is only capable of the data of 660 bytes of storage.In this case, once the memory space of routing table It takes, if there is new application identities, then can there are problems that the new application identities can not be written.In order to solve this ask New application identities can be written by the way of covering old application identities in topic.However, these will cause user can not be just It is often used the quasi- function of card mold, leads to not normally be paid, the problems such as identity can not be verified.
In consideration of it, needing a kind of new route processing method.
It should be understood that the route processing method of disclosure illustrative embodiments can be realized by terminal device, That is terminal device can execute each step of route processing method.In this case, route processing described below Device can be configured in terminal device.
Fig. 2 diagrammatically illustrates the flow chart of the route processing method of the illustrative embodiments of the disclosure.The disclosure is shown The route processing method of example property embodiment is applied to terminal device, which is the equipment for having near field communication (NFC) function, Including near field communication controller and multiple security modules.With reference to Fig. 2, the route processing method be may comprise steps of:
S22. the application identities amount of storage of each security module is determined.
In the illustrative embodiments of the disclosure, security module can include but is not limited to ESE, uSD, SIM, HCE etc., Multiple security modules in terminal device can refer at least two in these security modules.In addition, application identities amount of storage refers to Be the size of memory space needed for for storing application identities, specifically, referring to that application identities are stored in near-field communication control The size of shared memory space in the routing table of device processed.
It is possible, firstly, to determine the quantity of the application identities of each security module.In one embodiment, because in security module Application (Applet) and application identities correspond, therefore, can be by determining in security module the quantity applied as answering With the quantity of mark.In another embodiment, relative application identities summary sheet can be configured in each security module, it can To directly determine out the quantity of application identities by the application identities summary sheet.
Next it may be determined to the amount of storage of single application identities.Specifically, being directed to each application identities, routing table The information of storage can be made of routing address, the identifier of application identities, control data, that is to say, that the list item of routing table It can be made of routing address, the identifier of application identities, control data.For example, being set in the terminal including four security modules In standby, routing address can be 2 bytes, indicate the routing address for this four security modules with 00,01,10,11 respectively;It answers It can be 16 bytes with the identifier of mark;Controlling data can be 2 bytes, for indicating the state of corresponding application, these shapes State for example can include but is not limited to the locking of bright screen, put out screen, bright screen unlocks etc..Based on this example, the amount of storage of single application identities For 20 bytes.
It is to be understood, however, that 20 bytes are merely illustrative the amount of storage of application identities, application identities institute duty Between size and the component contents of application identities can also be other forms, not made it to this in this illustrative embodiment special It limits.
Then, safety can be determined according to the quantity of the application identities of security module and the amount of storage of single application identities The application identities amount of storage of module.Specifically, can be using the product of the two as the application identities amount of storage of security module.Example Such as, 10 Applet, corresponding 10 application identities are shared in a security module, and the required storage of each application identities is empty Between size be 20 bytes, then the application identities amount of storage of the security module be 200 bytes.
S24. if the application identities amount of storage of first object module is greater than near field communication controller in multiple security modules The capacity of middle routing table, it is determined that in multiple security modules in addition to first object module the application identities of remaining security module it is total Amount of storage.
In the illustrative embodiments of the disclosure, the capacity of routing table is referred to alternatively as the size or routing table of routing table again The upper limit, indicate routing table most multipotency storage data volume size.The capacity of routing table and the type for using near field communications chip It is related, that is to say, that the capacity of different near field communications chips, routing table may be different.By taking NXP PN547 chip as an example, The capacity of routing table is 660 bytes near field communication controller.
After step S22 determines the application identities amount of storage of each security module, application identities storage is judged whether there is Amount is greater than the security module of above-mentioned routing list capacity.If it does, first object module can be determined it as.
Next it may be determined in addition to first object module, the total storage capacity of the application identities of remaining security module.
For example, near field communication controller routing table capacity be 660 bytes, security module only include ESE, uSD, In the case where SIM, if the application identities amount of storage of SIM is 700 bytes, using SIM as first object module, ESE and uSD As remaining above-mentioned module, if the application identities amount of storage of ESE and uSD is respectively 100 bytes and 300 bytes, step S24 Described in remaining security module application identities total storage capacity be 400 bytes.
S26. if the total storage capacity of the application identities of remaining security module is less than or equal to the near-field communication control The application identities of remaining security module, then is written the routing of the near field communication controller by the capacity of routing table in device processed Table, and establish the mapping relations of the first object module and default route.
In the illustrative embodiments of the disclosure, in the application for determining remaining security module in addition to first object module After the total storage capacity of mark, which can be compared with the capacity of routing table near field communication controller.
If the total storage capacity is less than or equal to the capacity of routing table near field communication controller, illustrate depositing for routing table Storage space stores the application identities of remaining security module enough.In such a case, it is possible to answering remaining security module With mark write-in near field communication controller routing table, as set forth above, it is possible to using routing address, application identities identifier, Control the list item of data composition routing table.It is 400 bytes with the total storage capacity of the application identities of remaining security module and routes For table capacity is 660 bytes, at this point, the space in routing table there are also 260 bytes is idle, if the storage of single application identities Amount is 20 bytes, then routing table can also be written in 13 application identities.
For first object module, it can establish the mapping relations of first object module and default route.Described in the disclosure This mapping relations established indicate, when not finding application mark corresponding with application identities selection instruction in the routing table It, can be directly by information router to first object module, to realize corresponding payment, authentication function when knowledge.
For the process of concrete application processing, firstly, terminal device can receive the application identities sent by such as POS terminal Selection instruction;It is selected next, terminal device may determine that in the routing table of near field communication controller with the presence or absence of with application identities Select the corresponding application identities of instruction.If it is present can determine safe mould according to the corresponding routing address of the application identities Block, to realize corresponding business function using the Applet in security module;If it does not exist, then can be based on the silent of foundation Recognize routing and determine Applet corresponding with application identities selection instruction from first object module, to realize corresponding business function Energy.
It should be understood that during realizing business function (for example, payment, verifying etc.) using near-field communication technology, Android is needed to apply and Applet coordinated in security module, that is to say, that generally use double application architectures and realize industry Business.Fig. 3 diagrammatically illustrates this double application architectures, wherein operates in the Applet of security module for executing practical card mold Quasi- operation, the Android application operated in application processor provide the interface interacted with user, and execution for example connects It receives the trading password of user's input, show the operation such as information of withholing.
In addition, terminal device can obtain application identities (AID), sound from installation file when installation card simulation application The bright AID data that it is used.In such a case, it is possible to filter out AID information, and determine by search Android application The corresponding security module of AID information.
According to some embodiments of the present disclosure, if the application identities of remaining security module is total in addition to first object module Amount of storage is greater than the capacity of routing table near field communication controller, then terminal device can be generated application identities and reject interface, should Application identities are rejected in interface comprising application identities involved in all security modules.
Application identities reject interface as human-computer interaction interface, and the mark that can respond user's sending rejects operation rejecting pair The application identities answered.In an example, mark rejecting operation can be user and choose operation for application identities.In addition, The primary mark of user, which rejects operation, can be directed to multiple application identities, for example, user can first select multiple application identities, Then rejecting button of the configuration on interface, rejecting while to complete multiple application identities are clicked.
It should be noted that term described in disclosure illustrative embodiments " rejecting " refers to closing (disable) application identities, if it is desired, user can also be by being manually operated the application identities for restoring to be removed.
Terminal device can reject that the mark based on user rejects operation from corresponding security module and that selects answer With mark, in the process, if the total storage capacity of the application identities of all security modules is greater than near field communication controller Road By the capacity of table, then text prompting can be issued, so that user continues to reject, until the application identities of all security modules is total Amount of storage is less than or equal near field communication controller until the capacity of routing table.
Next, the routing of near field communication controller can be written in the application identities of all security modules by terminal device Table.
According to some embodiments of the present disclosure, if the application identities of remaining security module is total in addition to first object module Amount of storage is greater than the capacity of routing table near field communication controller, then terminal device can be generated application identities and reject interface.
Terminal device can reject that the mark based on user rejects operation from corresponding security module and that selects answer With mark, routed up to the application identities amount of storage of the second object module in all security modules is greater than near field communication controller The capacity of table, and the total storage capacity of the application identities of remaining security module is less than in addition to the second object module in all security modules Or until the capacity equal to routing table near field communication controller.Wherein, the second object module can be with first object module not Together, however, it is understood that in the case where user does not largely reject application identities involved in first object module, the Two object modules and first object module can be same security module.
Lead to next, near field can be written in the application identities of remaining security module in addition to the second object module by terminal device Believe the routing table of controller, and establishes the mapping relations of the second object module and default route.
According to some embodiments of the present disclosure, if the application identities of remaining security module is total in addition to first object module Amount of storage is greater than the capacity of routing table near field communication controller, then terminal device can determine respectively applies in all security modules The frequency of use of mark, and each application identities are ranked up based on frequency of use.Wherein, which may, for example, be one The number of application identities is used in a month.It should be noted that frequency of use is without being limited thereto, those skilled in the art can associate To the limited way of other frequency of use, however, these limited ways should belong to design of the invention.
Next, terminal device can reject application identities by the sequence of frequency of use from low to high, until all safety The total storage capacity of the application identities of module is less than or equal near field communication controller until the capacity of routing table.
Then, the routing table of near field communication controller can be written in the application identities of all security modules by terminal device.
According to some embodiments of the present disclosure, if the application identities of remaining security module is total in addition to first object module Amount of storage is greater than the capacity of routing table near field communication controller, then terminal device can determine respectively applies in all security modules The frequency of use of mark, and each application identities are ranked up based on frequency of use.
Next, terminal device can reject application identities by the sequence of frequency of use from low to high, until all safety The application identities amount of storage of third object module is greater than the capacity of routing table near field communication controller, and all safety in module The total storage capacity of the application identities of remaining security module is controlled less than or equal to near-field communication in addition to third object module in module In device until the capacity of routing table.Wherein, third object module can be different from first object module, however, it is readily understood that Be, by frequency of use reject application identities during, if in first object module the frequency of use of application identities compared with Height, then third object module described herein and first object module can be same security module.
Then, near-field communication can be written in the application identities of remaining security module in addition to third object module by terminal device The routing table of controller, and establish the mapping relations of third object module and default route.
It is illustrated below with reference to route processing process of the Fig. 4 to one embodiment of the disclosure.
In step S402, storage size needed for terminal device can count each security module AID;In step In S404, terminal device be can decide whether there are a security module, and storage size needed for AID is super in the security module NFC routing list capacity is crossed, if there is no this security module, then go to step S406, if there is this security module, Then go to step S408;In step S406, if the summation in space needed for all AID is less than routing list capacity, by institute There is AID information that routing table is written;In step S408, whether the summation in space needed for judging remaining security module AID is more than road By table capacity, if it does, the S410 that then gos to step, if be less than, go to step S412;In step S410, Human-computer interaction interface can be generated in terminal device, so that user rejects some AID;It is in step S412, space needed for AID is big It is matched in the security module of routing list capacity with default route, establishes the mapping relations between them, and by remaining safe mould Block AID is written in routing table.
It should be noted that although describing each step of method in the disclosure in the accompanying drawings with particular order, this is simultaneously Undesired or hint must execute these steps in this particular order, or have to carry out the ability of step shown in whole Realize desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps, And/or a step is decomposed into execution of multiple steps etc..
Further, a kind of route processing device is additionally provided in this example embodiment.
Fig. 5 diagrammatically illustrates the block diagram of the route processing device of the illustrative embodiments of the disclosure, at the routing It manages device and is applied to terminal device, terminal device includes near field communication controller and multiple security modules.With reference to Fig. 5, according to this The route processing device 5 of disclosed illustrative embodiments may include that the first amount of storage determining module 51, the second amount of storage are true Cover half block 53, the first via are by processing module 55.
Specifically, the first amount of storage determining module 51 is determined for the application identities amount of storage of each security module;The If the application identities amount of storage that two amount of storage determining modules 53 can be used for first object module in multiple security modules is greater than The capacity of routing table near field communication controller, it is determined that in multiple security modules in addition to first object module remaining security module Application identities total storage capacity;If the first via by processing module 55 can be used for remaining security module application identities it is total Amount of storage is less than or equal to the capacity of routing table near field communication controller, then the application identities of remaining security module is written close The routing table of field communication controler, and establish the mapping relations of first object module and default route.
Route processing device according to an exemplary embodiment of the present disclosure, in the base of the routing table of near field communication controller On plinth, the scheme of default route is implemented, the application range that terminal device realizes nfc card simulation is greatly extended, solves Due to routing table memory capacity limitation and the problem of cause new application identities that can not be normally written.In addition, showing in the disclosure Example property embodiment on the basis of, due to can with expansion card simulate application scenarios, the function of terminal device can be enriched Can, keep the behavioral activity of people more convenient.
According to an exemplary embodiment of the present disclosure, with reference to Fig. 6, route processing device 6 is compared to route processing device 5, also It may include secondary route processing module 61.
Specifically, secondary route processing module 61 is configured as executing: if the application identities of remaining security module is total Amount of storage is greater than the capacity of routing table near field communication controller, then generates application identities and reject interface;Wherein, application identities are picked Except the application identities in interface including each security module;Application identities corresponding with the mark rejecting operation that user issues are rejected, Until the capacity that the total storage capacity of the application identities of multiple security modules is less than or equal to routing table near field communication controller is Only;By the routing table of the application identities write-in near field communication controller of multiple security modules.
According to an exemplary embodiment of the present disclosure, with reference to Fig. 7, route processing device 7 is compared to route processing device 5, also It may include third route processing module 71.
Specifically, third route processing module 71 is configured as executing: if the application identities of remaining security module is total Amount of storage is greater than the capacity of routing table near field communication controller, then generates application identities and reject interface;Wherein, application identities are picked Except the application identities in interface including each security module;Application identities corresponding with the mark rejecting operation that user issues are rejected, Until the application identities amount of storage of the second object module is greater than the appearance of routing table near field communication controller in multiple security modules Amount, and the total storage capacity of the application identities of remaining security module is less than or equal in addition to the second object module in multiple security modules In near field communication controller until the capacity of routing table;By the application identities write-in of remaining security module in addition to the second object module The routing table of near field communication controller, and establish the mapping relations of the second object module and default route.
According to an exemplary embodiment of the present disclosure, with reference to Fig. 8, route processing device 8 is compared to route processing device 5, also It may include the 4th route processing module 81.
Specifically, the 4th route processing module 81 is configured as executing: if the application identities of remaining security module is total Amount of storage is greater than the capacity of routing table near field communication controller, it is determined that each application identities uses frequency in multiple security modules Rate;Application identities are rejected by the sequence of frequency of use from low to high, until the total storage capacity of the application identities of multiple security modules Until capacity less than or equal to routing table near field communication controller;The application identities write-in near field of multiple security modules is led to Believe the routing table of controller.
According to an exemplary embodiment of the present disclosure, with reference to Fig. 9, route processing device 9 is compared to route processing device 5, also It may include the 5th route processing module 91.
Specifically, the 5th route processing module 91 is configured as executing: if the application identities of remaining security module is total Amount of storage is greater than the capacity of routing table near field communication controller, it is determined that each application identities uses frequency in multiple security modules Rate;Application identities are rejected by the sequence of frequency of use from low to high, up to the application of third object module in multiple security modules Identify amount of storage be greater than near field communication controller in routing table capacity, and in multiple security modules in addition to third object module its The total storage capacity of the application identities of remaining security module is less than or equal near field communication controller until the capacity of routing table;It will remove The routing table of the application identities write-in near field communication controller of remaining outer security module of third object module, and establish third target The mapping relations of module and default route.
According to an exemplary embodiment of the present disclosure, with reference to Figure 10, the first amount of storage determining module 51 may include amount of storage Determination unit 101.
Specifically, amount of storage determination unit 101 is configured as executing: determining the quantity of the application identities of each security module; Determine the amount of storage of single application identities;According to the amount of storage of the quantity of the application identities of each security module and single application identities Determine the application identities amount of storage of each security module.
According to an exemplary embodiment of the present disclosure, with reference to Figure 11, route processing device 11 compared to route processing device 5, It can also include applying determining module 111.
Specifically, being configured to execute using determining module 111: receiving application identities selection instruction;Judge near-field communication control It whether there is application identities corresponding with application identities selection instruction in the routing table of device processed;If it does not exist, then based on default Application corresponding with application identities selection instruction is determined in routing from first object module.
Since each functional module and the above method of the program analysis of running performance device of embodiment of the present invention are invented It is identical in embodiment, therefore details are not described herein.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, energy is stored thereon with Enough realize the program product of this specification above method.In some possible embodiments, various aspects of the invention may be used also In the form of being embodied as a kind of program product comprising program code, when described program product is run on the terminal device, institute Program code is stated for executing the terminal device described in above-mentioned " illustrative methods " part of this specification according to this hair The step of bright various illustrative embodiments.
Program product can be using portable compact disc read only memory (CD-ROM) and including program code, and can be It is run on terminal device, such as PC.However, program product of the invention is without being limited thereto, and in this document, readable storage Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device Using or it is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), CD, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In an exemplary embodiment of the disclosure, a kind of electronic equipment that can be realized the above method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
The electronic equipment 1200 of this embodiment according to the present invention is described referring to Figure 12.The electricity that Figure 12 is shown Sub- equipment 1200 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 12, electronic equipment 1200 is showed in the form of universal computing device.The component of electronic equipment 1200 can To include but is not limited to: at least one above-mentioned processing unit 1210, connects not homologous ray at least one above-mentioned storage unit 1220 The bus 1230 of component (including storage unit 1220 and processing unit 1210), display unit 1240.
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 1210 Row, so that various according to the present invention described in the execution of the processing unit 1210 above-mentioned " illustrative methods " part of this specification The step of illustrative embodiments.For example, the processing unit 1210 can execute step S22 as shown in Figure 2 to step S26。
Storage unit 1220 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 12201 and/or cache memory unit 12202, it can further include read-only memory unit (ROM) 12203.
Storage unit 1220 can also include program/utility with one group of (at least one) program module 12205 12204, such program module 12205 includes but is not limited to: operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 1230 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 1200 can also be with one or more external equipments 1300 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 1200 communicate, and/or with make The electronic equipment 1200 can with it is one or more of the other calculating equipment be communicated any equipment (such as router, modulation Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 1250.Also, electronic equipment 1200 Network adapter 1260 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public affairs can also be passed through Common network network, such as internet) communication.As shown, network adapter 1260 passes through its of bus 1230 and electronic equipment 1200 The communication of its module.It should be understood that although not shown in the drawings, other hardware and/or software can be used in conjunction with electronic equipment 1200 Module, including but not limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, magnetic Tape drive and data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment Method.
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure His embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Adaptive change follow the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure or Conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by claim It points out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the attached claims.

Claims (10)

1. a kind of route processing method is applied to terminal device, the terminal device includes near field communication controller and multiple peaces Full module, which is characterized in that the route processing method includes:
Determine the application identities amount of storage of each security module;
If the application identities amount of storage of first object module is greater than the near field communication controller in the multiple security module The capacity of middle routing table, it is determined that in the multiple security module in addition to the first object module remaining security module application The total storage capacity of mark;
If the total storage capacity of the application identities of remaining security module is less than or equal to the near field communication controller Road By the capacity of table, then the application identities of remaining security module are written to the routing table of the near field communication controller, and built Found the mapping relations of the first object module and default route.
2. route processing method according to claim 1, which is characterized in that the route processing method further include:
If the total storage capacity of the application identities of remaining security module is greater than routing table in the near field communication controller Capacity then generates application identities and rejects interface;Wherein, the application identities reject answering comprising each security module in interface With mark;
Application identities corresponding with the mark rejecting operation that user issues are rejected, until the application identities of the multiple security module Total storage capacity be less than or equal to the near field communication controller in routing table capacity until;
The application identities of the multiple security module are written to the routing table of the near field communication controller.
3. route processing method according to claim 1, which is characterized in that the route processing method further include:
If the total storage capacity of the application identities of remaining security module is greater than routing table in the near field communication controller Capacity then generates application identities and rejects interface;Wherein, the application identities reject answering comprising each security module in interface With mark;
Application identities corresponding with the mark rejecting operation that user issues are rejected, until the second target in the multiple security module The application identities amount of storage of module is greater than the capacity of routing table in the near field communication controller, and in the multiple security module The total storage capacity of the application identities of remaining security module is less than or equal to the near-field communication control in addition to second object module In device processed until the capacity of routing table;
The application identities of remaining security module in addition to second object module are written to the routing of the near field communication controller Table, and establish the mapping relations of second object module and default route.
4. route processing method according to claim 1, which is characterized in that the route processing method further include:
If the total storage capacity of the application identities of remaining security module is greater than routing table in the near field communication controller Capacity, it is determined that the frequency of use of each application identities in the multiple security module;
Application identities are rejected by the sequence of frequency of use from low to high, until the application identities of the multiple security module are always deposited Reserves are less than or equal in the near field communication controller until the capacity of routing table;
The application identities of the multiple security module are written to the routing table of the near field communication controller.
5. route processing method according to claim 1, which is characterized in that the route processing method further include:
If the total storage capacity of the application identities of remaining security module is greater than routing table in the near field communication controller Capacity, it is determined that the frequency of use of each application identities in the multiple security module;
Application identities are rejected by the sequence of frequency of use from low to high, until third object module in the multiple security module Application identities amount of storage is greater than the capacity of routing table in the near field communication controller, and except described in the multiple security module The total storage capacity of the application identities of remaining outer security module of third object module is less than or equal in the near field communication controller Until the capacity of routing table;
The application identities of remaining security module in addition to the third object module are written to the routing of the near field communication controller Table, and establish the mapping relations of the third object module and default route.
6. route processing method according to claim 1, which is characterized in that determine the application identities storage of each security module Amount includes:
Determine the quantity of the application identities of each security module;
Determine the amount of storage of single application identities;
Each security module is determined according to the amount of storage of the quantity of the application identities of each security module and single application identities Application identities amount of storage.
7. route processing method according to claim 1, which is characterized in that the route processing method further include:
Receive application identities selection instruction;
Judge in the routing table of the near field communication controller with the presence or absence of application corresponding with the application identities selection instruction Mark;
If it does not exist, then determining to select with the application identities from the first object module based on the default route Instruct corresponding application.
8. a kind of route processing device is applied to terminal device, the terminal device includes near field communication controller and multiple peaces Full module, which is characterized in that the route processing device includes:
First amount of storage determining module, for determining the application identities amount of storage of each security module;
Second amount of storage determining module, if the application identities amount of storage for first object module in the multiple security module Greater than the capacity of routing table in the near field communication controller, it is determined that remove the first object mould in the multiple security module The total storage capacity of the application identities of remaining outer security module of block;
The first via is by processing module, if the total storage capacity of the application identities for remaining security module is less than or equal to institute The capacity of routing table near field communication controller is stated, then the near-field communication is written into the application identities of remaining security module The routing table of controller, and establish the mapping relations of the first object module and default route.
9. a kind of storage medium, is stored thereon with computer program, which is characterized in that the computer program is executed by processor Route processing method described in Shi Shixian any one of claims 1 to 7.
10. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to come described in any one of perform claim requirement 1 to 7 via the execution executable instruction Route processing method.
CN201910370664.XA 2019-05-06 2019-05-06 Route processing method and device, storage medium and electronic equipment Active CN110191054B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910370664.XA CN110191054B (en) 2019-05-06 2019-05-06 Route processing method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910370664.XA CN110191054B (en) 2019-05-06 2019-05-06 Route processing method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110191054A true CN110191054A (en) 2019-08-30
CN110191054B CN110191054B (en) 2021-07-13

Family

ID=67715690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910370664.XA Active CN110191054B (en) 2019-05-06 2019-05-06 Route processing method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110191054B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788604A (en) * 2019-11-01 2021-05-11 中国移动通信有限公司研究院 Near field communication route configuration method, device and computer readable storage medium
CN114239785A (en) * 2021-12-20 2022-03-25 珠海格力电器股份有限公司 Instruction writing method and device, storage medium and electronic device
CN114826336A (en) * 2022-05-09 2022-07-29 青岛海信日立空调系统有限公司 Air conditioner outdoor unit and air conditioner

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065107A (en) * 2011-10-21 2013-04-24 中国移动通信集团公司 Method and device of achieving non-contact card swiping application
EP2775739A1 (en) * 2013-03-05 2014-09-10 NXP Semiconductors B.V. Near-field communications and routing
CN106411745A (en) * 2015-07-29 2017-02-15 中国移动通信集团公司 Method and device for modifying contactless frontend chip routing table
US20170055109A1 (en) * 2015-08-17 2017-02-23 Proton World International N.V. Nfc device with multiple secure elements
CN107911319A (en) * 2017-11-22 2018-04-13 中兴通讯股份有限公司 A kind of method for routing, NFC controller and the NFC device of more security modules

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065107A (en) * 2011-10-21 2013-04-24 中国移动通信集团公司 Method and device of achieving non-contact card swiping application
EP2775739A1 (en) * 2013-03-05 2014-09-10 NXP Semiconductors B.V. Near-field communications and routing
CN106411745A (en) * 2015-07-29 2017-02-15 中国移动通信集团公司 Method and device for modifying contactless frontend chip routing table
US20170055109A1 (en) * 2015-08-17 2017-02-23 Proton World International N.V. Nfc device with multiple secure elements
CN107911319A (en) * 2017-11-22 2018-04-13 中兴通讯股份有限公司 A kind of method for routing, NFC controller and the NFC device of more security modules

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788604A (en) * 2019-11-01 2021-05-11 中国移动通信有限公司研究院 Near field communication route configuration method, device and computer readable storage medium
CN112788604B (en) * 2019-11-01 2023-03-28 中国移动通信有限公司研究院 Near field communication route configuration method, device and computer readable storage medium
CN114239785A (en) * 2021-12-20 2022-03-25 珠海格力电器股份有限公司 Instruction writing method and device, storage medium and electronic device
CN114826336A (en) * 2022-05-09 2022-07-29 青岛海信日立空调系统有限公司 Air conditioner outdoor unit and air conditioner
CN114826336B (en) * 2022-05-09 2023-10-31 青岛海信日立空调系统有限公司 Air conditioner outdoor unit and air conditioner

Also Published As

Publication number Publication date
CN110191054B (en) 2021-07-13

Similar Documents

Publication Publication Date Title
US20210357903A1 (en) Systems and methods for providing near field communications
WO2022012173A1 (en) Emulated card switching method, terminal device, and storage medium
CN105959317A (en) Security authentication method and terminal
CN110191054A (en) Route processing method and device, storage medium and electronic equipment
AU2014283648A1 (en) Display card with user interface
CN105378624A (en) Showing interactions as they occur on a whiteboard
CN105379171B (en) Method, equipment and system for secure near field communication framework
CN101771754A (en) Mobile terminal and method for near-field communication thereof
WO2019134591A1 (en) Electronic transaction method and terminal
CN108734471A (en) Identity identifying method, device, system and storage medium in mobile-payment system
CN108564359A (en) Data processing method, terminal device and data processing system
CN109669787A (en) Data transmission method and device, storage medium, electronic equipment
CN113965228B (en) Method for expanding NFC card simulation function, NFC expansion device and NFC terminal
CN103544114A (en) Multiple M1 card control system based on single CPU card and control method thereof
CN110460647A (en) Dispatching method, device, electronic equipment and the storage medium of network node
CN103368612B (en) By switching to silence, electronic equipment communication is controlled method and apparatus
CN107786979A (en) A kind of multiple terminals shared communication method and system
CN109087109A (en) A kind of mobile payment confirmation method, device, system and storage medium
CN106204021A (en) NFC method of mobile payment, device and terminal
CN109214801A (en) A kind of e-payment confirmation method, device and storage medium
CN108846662A (en) wireless payment method and wearable device
CN105719141A (en) Payment method and device
CN104751326A (en) Data processing method and related equipment and system
CN107682571B (en) Change the means of communication, system, equipment and the storage medium of base number
CN110045952A (en) Code call method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant