CN110191054A - Route processing method and device, storage medium and electronic equipment - Google Patents
Route processing method and device, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN110191054A CN110191054A CN201910370664.XA CN201910370664A CN110191054A CN 110191054 A CN110191054 A CN 110191054A CN 201910370664 A CN201910370664 A CN 201910370664A CN 110191054 A CN110191054 A CN 110191054A
- Authority
- CN
- China
- Prior art keywords
- application identities
- security module
- module
- field communication
- near field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/302—Route determination based on requested QoS
- H04L45/306—Route determination based on the nature of the carried application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of route processing method and devices, storage medium and electronic equipment, it is related to technical field of near field communication, applied to terminal device, terminal device includes near field communication controller and multiple security modules, which comprises determining that the application identities amount of storage of each security module;If in multiple security modules the application identities amount of storage of first object module be greater than near field communication controller in routing table capacity, it is determined that in multiple security modules in addition to first object module the application identities of remaining security module total storage capacity;If the total storage capacity of the application identities of remaining security module is less than or equal to the capacity of routing table near field communication controller, then by the routing table of the application identities write-in near field communication controller of remaining security module, and establish the mapping relations of first object module and default route.The disclosure can extend terminal device and realize the quasi- application range of near-field communication card mold.
Description
Technical field
This disclosure relates to which technical field of near field communication, fills in particular to a kind of route processing method, route processing
It sets, storage medium and electronic equipment.
Background technique
Near-field communication (Near Field Communication, NFC) is also known as wireless near field communication, is a kind of short distance
High frequency wireless communication technology, allow electronic equipment between carry out contactless Point-to-Point Data Transmission.As near-field communication
A kind of important application, card mold is quasi- can be modeled to terminal device (for example, mobile phone, smartwatch etc.) card, such as public transport
Card, bank card, gate inhibition, all kinds of member cards etc..
In the treatment process that card mold is intended, terminal device needs to rely on application identities (Application ID, AID) to look into
Corresponding application is found, to realize that card mold intends corresponding function.With the diversified development of life, card mold is quasi- on terminal device
Using more and more, the quantity of corresponding application identities is also more and more.
It is limited near field communication controller for storing the memory space of application identities, once memory space takes,
If there is new application identities, then can there are problems that the new application identities can not be written.Some technologies are in order to solve this
Kind problem, is written new application identities by the way of covering old application identities.However, these will cause user can not be just
It is often used the quasi- function of card mold, leads to not normally be paid, the problems such as identity can not be verified.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part
Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
The disclosure is designed to provide a kind of route processing method, route processing device, storage medium and electronic equipment,
And then overcome the problems, such as to cause terminal device card mold to intend disabler since application identities are excessive at least to a certain extent.
According to one aspect of the disclosure, a kind of route processing method is provided, terminal device is applied to, terminal device includes
Near field communication controller and multiple security modules, route processing method comprise determining that the application identities amount of storage of each security module;
If the application identities amount of storage of first object module is greater than the appearance of routing table near field communication controller in multiple security modules
Amount, it is determined that in multiple security modules in addition to first object module the application identities of remaining security module total storage capacity;If
The total storage capacity of the application identities of remaining security module is less than or equal to the capacity of routing table near field communication controller, then by it
The routing table of the application identities write-in near field communication controller of remaining security module, and establish first object module and default route
Mapping relations.
According to one aspect of the disclosure, a kind of route processing device is provided, terminal device is applied to, terminal device includes
Near field communication controller and multiple security modules, route processing device includes: the first amount of storage determining module, for determining each peace
The application identities amount of storage of full module;Second amount of storage determining module, if for first object module in multiple security modules
Application identities amount of storage be greater than near field communication controller in routing table capacity, it is determined that in multiple security modules remove the first mesh
Mark the total storage capacity of the application identities of remaining outer security module of module;The first via is by processing module, if being used for remaining safe mould
The total storage capacity of the application identities of block is less than or equal to the capacity of routing table near field communication controller, then by remaining security module
Application identities write-in near field communication controller routing table, and establish the mapping relations of first object module and default route.
According to one aspect of the disclosure, a kind of storage medium is provided, computer program, computer program are stored thereon with
Above-mentioned route processing method is realized when being executed by processor.
According to one aspect of the disclosure, a kind of electronic equipment is provided, comprising: processor;And memory, for storing
The executable instruction of processor;Wherein, processor is configured to execute above-mentioned route processing method via executable instruction is executed.
In the technical solution provided by some embodiments of the present disclosure, if the application identities storage of a security module
Amount is greater than the capacity of routing table near field communication controller, and remaining security module of terminal device in addition to the security module
The total storage capacity of application identities be less than or equal to the capacity of routing table, then road is written into the application identities of these remaining security modules
By in table, and establish the mapping relations of the security module and default route.As a result, when receiving application identities selection instruction,
If by the routing table lookup application identities corresponding less than application identities selection instruction near field communication controller, it can be with
The corresponding business tine of the instruction is routed to and is established in the security module of mapping relations with default route, it is corresponding to execute
Business tine.Disclosure illustrative embodiments implement default route on the basis of the routing table of near field communication controller
Scheme, greatly extend terminal device realize nfc card simulation application range, solve due to routing table memory capacity
The problem of limiting and causing new application identities that can not be normally written.In addition, on the basis of disclosure illustrative embodiments,
Due to can with expansion card simulate application scenarios, the function of terminal device can be enriched, make the behavioral activity of people more
It is convenient.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 diagrammatically illustrates the interaction concept of the terminal device near field communication (NFC) function;
Fig. 2 diagrammatically illustrates the flow chart of route processing method according to an exemplary embodiment of the present disclosure;
Fig. 3 shows the schematic diagram of the double application architectures of near-field communication according to an exemplary embodiment of the present disclosure;
Fig. 4 diagrammatically illustrates the flow chart of the route processing method whole process according to an embodiment of the present disclosure;
Fig. 5 diagrammatically illustrates the block diagram of the route processing device of the first illustrative embodiments according to the disclosure;
Fig. 6 diagrammatically illustrates the block diagram of the route processing device of the second illustrative embodiments according to the disclosure;
Fig. 7 diagrammatically illustrates the block diagram of the route processing device of the third illustrative embodiments according to the disclosure;
Fig. 8 diagrammatically illustrates the block diagram of the route processing device of the 4th illustrative embodiments according to the disclosure;
Fig. 9 diagrammatically illustrates the block diagram of the route processing device of the 5th illustrative embodiments according to the disclosure;
Figure 10 diagrammatically illustrates the box of the first amount of storage determining module according to an exemplary embodiment of the present disclosure
Figure;
Figure 11 diagrammatically illustrates the block diagram of the route processing device of the 6th illustrative embodiments according to the disclosure;
Figure 12 diagrammatically illustrates the block diagram of electronic equipment according to an exemplary embodiment of the present disclosure.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes
Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more
Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot
Structure or characteristic can be incorporated in any suitable manner in one or more embodiments.In the following description, it provides perhaps
More details fully understand embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that can
It is omitted with technical solution of the disclosure one or more in the specific detail, or others side can be used
Method, constituent element, device, step etc..In other cases, be not shown in detail or describe known solution to avoid a presumptuous guest usurps the role of the host and
So that all aspects of this disclosure thicken.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure
Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function
Energy entity, not necessarily must be corresponding with physically or logically independent entity.These function can be realized using software form
Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place
These functional entitys are realized in reason device device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all steps.For example, the step of having
It can also decompose, and the step of having can merge or part merges, therefore the sequence actually executed is possible to according to the actual situation
Change.In addition, term " first " used below, " second ", " third ", " the 4th ", " the 5th " etc. are merely to the mesh distinguished
, it should not be understood as the limitation of present disclosure.
Security module described in the disclosure (Secure Element, SE), and it is referred to alternatively as safety element, refer to and is embedded with
The common name of the hardware security element of microchip can independently realize the functions such as small-sized operation, storage, general safety with higher
Property.The application field of security module is extensive, for example, can be with financial integrated circuit card, cell phone customer identification module
The forms such as (Subscriber Identification Module, SIM) card, U shield for bank, traffic all-purpose card, E-Passport are big
Amount is applied to a variety of different fields.
The application program run in security module can be referred to as security module apply (SE application), be denoted as Applet or
SE Applet.In general, one or more Applet can be run in security module.For example, financial integrated circuit card operation is
The payment application of bank, what is run in traffic all-purpose card is public transport payment application etc..As the function of terminal device is become stronger day by day,
Application of the security module in terminal device is also increasingly extensive.For example, in the security module of mobile phone install public transport payment application,
The Applet such as bank payment application, member card identification application, user can easily realize public transport payment, silver by mobile phone as a result,
The corresponding functions such as row payment, membership's verifying.
Although terminal device described in the disclosure is often referred to mobile phone, it will, however, be understood by those skilled in the art that eventually
End equipment can also include the equipment such as smartwatch, plate, and there is no special restriction on this for the disclosure.
Terminal device configured with near-field communication mode card function usually may include application processor (Application
Processor, AP), near field communication controller (NFC controller) and security module.Wherein, security module is including but not limited to embedding
Enter the security module (Embedded Secure Element, ESE) of formula, safe digital card (is used as the SD of NFC security module
Card, is denoted as uSD), SIM card, Intrusion Detection based on host card mold intend (Host-based Card Emulation, HCE) etc..
In the illustrative embodiments of the disclosure, I2C can be passed through between application processor and near field communication controller
Bus coupling can pass through SWP (Single Wire Protocol, single line association between near field communication controller and security module
View) bus coupling, between application processor and security module can by SPI (Serial Peripheral Interface,
Serial Peripheral Interface (SPI)) coupling.
In addition, being configured with the routing table of application identities (AID) near field communication controller, the disclosure is to list item in routing table
Component part do not do it is specifically limited.Wherein, application identities described in disclosure illustrative embodiments can be answered by what is registered
With provider's mark (RID) and the proprietary application of extension mark (PIX) composition, so it is easy to understand that an application is one corresponding
Application identities.
Fig. 1 is schematically illustrated for paying scene with POS (Point Of Sale, point-of-sale terminal).POS terminal hair
Application identities selection instruction (Select AID instruction) out, the NFC controller of terminal device receives the instruction, and in the routing table
Corresponding application identities are searched, determine corresponding Applet according to the application identities.In this case, NFC controller can
Corresponding business datum is sent to corresponding Applet by SWP interface, to realize corresponding card analog functuion.
Based on the factors such as cost, chip size, power consumption, efficiency, the limited storage space of routing table, with NXP PN547 (one
Kind NFC chip) for, routing table is only capable of the data of 660 bytes of storage.In this case, once the memory space of routing table
It takes, if there is new application identities, then can there are problems that the new application identities can not be written.In order to solve this ask
New application identities can be written by the way of covering old application identities in topic.However, these will cause user can not be just
It is often used the quasi- function of card mold, leads to not normally be paid, the problems such as identity can not be verified.
In consideration of it, needing a kind of new route processing method.
It should be understood that the route processing method of disclosure illustrative embodiments can be realized by terminal device,
That is terminal device can execute each step of route processing method.In this case, route processing described below
Device can be configured in terminal device.
Fig. 2 diagrammatically illustrates the flow chart of the route processing method of the illustrative embodiments of the disclosure.The disclosure is shown
The route processing method of example property embodiment is applied to terminal device, which is the equipment for having near field communication (NFC) function,
Including near field communication controller and multiple security modules.With reference to Fig. 2, the route processing method be may comprise steps of:
S22. the application identities amount of storage of each security module is determined.
In the illustrative embodiments of the disclosure, security module can include but is not limited to ESE, uSD, SIM, HCE etc.,
Multiple security modules in terminal device can refer at least two in these security modules.In addition, application identities amount of storage refers to
Be the size of memory space needed for for storing application identities, specifically, referring to that application identities are stored in near-field communication control
The size of shared memory space in the routing table of device processed.
It is possible, firstly, to determine the quantity of the application identities of each security module.In one embodiment, because in security module
Application (Applet) and application identities correspond, therefore, can be by determining in security module the quantity applied as answering
With the quantity of mark.In another embodiment, relative application identities summary sheet can be configured in each security module, it can
To directly determine out the quantity of application identities by the application identities summary sheet.
Next it may be determined to the amount of storage of single application identities.Specifically, being directed to each application identities, routing table
The information of storage can be made of routing address, the identifier of application identities, control data, that is to say, that the list item of routing table
It can be made of routing address, the identifier of application identities, control data.For example, being set in the terminal including four security modules
In standby, routing address can be 2 bytes, indicate the routing address for this four security modules with 00,01,10,11 respectively;It answers
It can be 16 bytes with the identifier of mark;Controlling data can be 2 bytes, for indicating the state of corresponding application, these shapes
State for example can include but is not limited to the locking of bright screen, put out screen, bright screen unlocks etc..Based on this example, the amount of storage of single application identities
For 20 bytes.
It is to be understood, however, that 20 bytes are merely illustrative the amount of storage of application identities, application identities institute duty
Between size and the component contents of application identities can also be other forms, not made it to this in this illustrative embodiment special
It limits.
Then, safety can be determined according to the quantity of the application identities of security module and the amount of storage of single application identities
The application identities amount of storage of module.Specifically, can be using the product of the two as the application identities amount of storage of security module.Example
Such as, 10 Applet, corresponding 10 application identities are shared in a security module, and the required storage of each application identities is empty
Between size be 20 bytes, then the application identities amount of storage of the security module be 200 bytes.
S24. if the application identities amount of storage of first object module is greater than near field communication controller in multiple security modules
The capacity of middle routing table, it is determined that in multiple security modules in addition to first object module the application identities of remaining security module it is total
Amount of storage.
In the illustrative embodiments of the disclosure, the capacity of routing table is referred to alternatively as the size or routing table of routing table again
The upper limit, indicate routing table most multipotency storage data volume size.The capacity of routing table and the type for using near field communications chip
It is related, that is to say, that the capacity of different near field communications chips, routing table may be different.By taking NXP PN547 chip as an example,
The capacity of routing table is 660 bytes near field communication controller.
After step S22 determines the application identities amount of storage of each security module, application identities storage is judged whether there is
Amount is greater than the security module of above-mentioned routing list capacity.If it does, first object module can be determined it as.
Next it may be determined in addition to first object module, the total storage capacity of the application identities of remaining security module.
For example, near field communication controller routing table capacity be 660 bytes, security module only include ESE, uSD,
In the case where SIM, if the application identities amount of storage of SIM is 700 bytes, using SIM as first object module, ESE and uSD
As remaining above-mentioned module, if the application identities amount of storage of ESE and uSD is respectively 100 bytes and 300 bytes, step S24
Described in remaining security module application identities total storage capacity be 400 bytes.
S26. if the total storage capacity of the application identities of remaining security module is less than or equal to the near-field communication control
The application identities of remaining security module, then is written the routing of the near field communication controller by the capacity of routing table in device processed
Table, and establish the mapping relations of the first object module and default route.
In the illustrative embodiments of the disclosure, in the application for determining remaining security module in addition to first object module
After the total storage capacity of mark, which can be compared with the capacity of routing table near field communication controller.
If the total storage capacity is less than or equal to the capacity of routing table near field communication controller, illustrate depositing for routing table
Storage space stores the application identities of remaining security module enough.In such a case, it is possible to answering remaining security module
With mark write-in near field communication controller routing table, as set forth above, it is possible to using routing address, application identities identifier,
Control the list item of data composition routing table.It is 400 bytes with the total storage capacity of the application identities of remaining security module and routes
For table capacity is 660 bytes, at this point, the space in routing table there are also 260 bytes is idle, if the storage of single application identities
Amount is 20 bytes, then routing table can also be written in 13 application identities.
For first object module, it can establish the mapping relations of first object module and default route.Described in the disclosure
This mapping relations established indicate, when not finding application mark corresponding with application identities selection instruction in the routing table
It, can be directly by information router to first object module, to realize corresponding payment, authentication function when knowledge.
For the process of concrete application processing, firstly, terminal device can receive the application identities sent by such as POS terminal
Selection instruction;It is selected next, terminal device may determine that in the routing table of near field communication controller with the presence or absence of with application identities
Select the corresponding application identities of instruction.If it is present can determine safe mould according to the corresponding routing address of the application identities
Block, to realize corresponding business function using the Applet in security module;If it does not exist, then can be based on the silent of foundation
Recognize routing and determine Applet corresponding with application identities selection instruction from first object module, to realize corresponding business function
Energy.
It should be understood that during realizing business function (for example, payment, verifying etc.) using near-field communication technology,
Android is needed to apply and Applet coordinated in security module, that is to say, that generally use double application architectures and realize industry
Business.Fig. 3 diagrammatically illustrates this double application architectures, wherein operates in the Applet of security module for executing practical card mold
Quasi- operation, the Android application operated in application processor provide the interface interacted with user, and execution for example connects
It receives the trading password of user's input, show the operation such as information of withholing.
In addition, terminal device can obtain application identities (AID), sound from installation file when installation card simulation application
The bright AID data that it is used.In such a case, it is possible to filter out AID information, and determine by search Android application
The corresponding security module of AID information.
According to some embodiments of the present disclosure, if the application identities of remaining security module is total in addition to first object module
Amount of storage is greater than the capacity of routing table near field communication controller, then terminal device can be generated application identities and reject interface, should
Application identities are rejected in interface comprising application identities involved in all security modules.
Application identities reject interface as human-computer interaction interface, and the mark that can respond user's sending rejects operation rejecting pair
The application identities answered.In an example, mark rejecting operation can be user and choose operation for application identities.In addition,
The primary mark of user, which rejects operation, can be directed to multiple application identities, for example, user can first select multiple application identities,
Then rejecting button of the configuration on interface, rejecting while to complete multiple application identities are clicked.
It should be noted that term described in disclosure illustrative embodiments " rejecting " refers to closing
(disable) application identities, if it is desired, user can also be by being manually operated the application identities for restoring to be removed.
Terminal device can reject that the mark based on user rejects operation from corresponding security module and that selects answer
With mark, in the process, if the total storage capacity of the application identities of all security modules is greater than near field communication controller Road
By the capacity of table, then text prompting can be issued, so that user continues to reject, until the application identities of all security modules is total
Amount of storage is less than or equal near field communication controller until the capacity of routing table.
Next, the routing of near field communication controller can be written in the application identities of all security modules by terminal device
Table.
According to some embodiments of the present disclosure, if the application identities of remaining security module is total in addition to first object module
Amount of storage is greater than the capacity of routing table near field communication controller, then terminal device can be generated application identities and reject interface.
Terminal device can reject that the mark based on user rejects operation from corresponding security module and that selects answer
With mark, routed up to the application identities amount of storage of the second object module in all security modules is greater than near field communication controller
The capacity of table, and the total storage capacity of the application identities of remaining security module is less than in addition to the second object module in all security modules
Or until the capacity equal to routing table near field communication controller.Wherein, the second object module can be with first object module not
Together, however, it is understood that in the case where user does not largely reject application identities involved in first object module, the
Two object modules and first object module can be same security module.
Lead to next, near field can be written in the application identities of remaining security module in addition to the second object module by terminal device
Believe the routing table of controller, and establishes the mapping relations of the second object module and default route.
According to some embodiments of the present disclosure, if the application identities of remaining security module is total in addition to first object module
Amount of storage is greater than the capacity of routing table near field communication controller, then terminal device can determine respectively applies in all security modules
The frequency of use of mark, and each application identities are ranked up based on frequency of use.Wherein, which may, for example, be one
The number of application identities is used in a month.It should be noted that frequency of use is without being limited thereto, those skilled in the art can associate
To the limited way of other frequency of use, however, these limited ways should belong to design of the invention.
Next, terminal device can reject application identities by the sequence of frequency of use from low to high, until all safety
The total storage capacity of the application identities of module is less than or equal near field communication controller until the capacity of routing table.
Then, the routing table of near field communication controller can be written in the application identities of all security modules by terminal device.
According to some embodiments of the present disclosure, if the application identities of remaining security module is total in addition to first object module
Amount of storage is greater than the capacity of routing table near field communication controller, then terminal device can determine respectively applies in all security modules
The frequency of use of mark, and each application identities are ranked up based on frequency of use.
Next, terminal device can reject application identities by the sequence of frequency of use from low to high, until all safety
The application identities amount of storage of third object module is greater than the capacity of routing table near field communication controller, and all safety in module
The total storage capacity of the application identities of remaining security module is controlled less than or equal to near-field communication in addition to third object module in module
In device until the capacity of routing table.Wherein, third object module can be different from first object module, however, it is readily understood that
Be, by frequency of use reject application identities during, if in first object module the frequency of use of application identities compared with
Height, then third object module described herein and first object module can be same security module.
Then, near-field communication can be written in the application identities of remaining security module in addition to third object module by terminal device
The routing table of controller, and establish the mapping relations of third object module and default route.
It is illustrated below with reference to route processing process of the Fig. 4 to one embodiment of the disclosure.
In step S402, storage size needed for terminal device can count each security module AID;In step
In S404, terminal device be can decide whether there are a security module, and storage size needed for AID is super in the security module
NFC routing list capacity is crossed, if there is no this security module, then go to step S406, if there is this security module,
Then go to step S408;In step S406, if the summation in space needed for all AID is less than routing list capacity, by institute
There is AID information that routing table is written;In step S408, whether the summation in space needed for judging remaining security module AID is more than road
By table capacity, if it does, the S410 that then gos to step, if be less than, go to step S412;In step S410,
Human-computer interaction interface can be generated in terminal device, so that user rejects some AID;It is in step S412, space needed for AID is big
It is matched in the security module of routing list capacity with default route, establishes the mapping relations between them, and by remaining safe mould
Block AID is written in routing table.
It should be noted that although describing each step of method in the disclosure in the accompanying drawings with particular order, this is simultaneously
Undesired or hint must execute these steps in this particular order, or have to carry out the ability of step shown in whole
Realize desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps,
And/or a step is decomposed into execution of multiple steps etc..
Further, a kind of route processing device is additionally provided in this example embodiment.
Fig. 5 diagrammatically illustrates the block diagram of the route processing device of the illustrative embodiments of the disclosure, at the routing
It manages device and is applied to terminal device, terminal device includes near field communication controller and multiple security modules.With reference to Fig. 5, according to this
The route processing device 5 of disclosed illustrative embodiments may include that the first amount of storage determining module 51, the second amount of storage are true
Cover half block 53, the first via are by processing module 55.
Specifically, the first amount of storage determining module 51 is determined for the application identities amount of storage of each security module;The
If the application identities amount of storage that two amount of storage determining modules 53 can be used for first object module in multiple security modules is greater than
The capacity of routing table near field communication controller, it is determined that in multiple security modules in addition to first object module remaining security module
Application identities total storage capacity;If the first via by processing module 55 can be used for remaining security module application identities it is total
Amount of storage is less than or equal to the capacity of routing table near field communication controller, then the application identities of remaining security module is written close
The routing table of field communication controler, and establish the mapping relations of first object module and default route.
Route processing device according to an exemplary embodiment of the present disclosure, in the base of the routing table of near field communication controller
On plinth, the scheme of default route is implemented, the application range that terminal device realizes nfc card simulation is greatly extended, solves
Due to routing table memory capacity limitation and the problem of cause new application identities that can not be normally written.In addition, showing in the disclosure
Example property embodiment on the basis of, due to can with expansion card simulate application scenarios, the function of terminal device can be enriched
Can, keep the behavioral activity of people more convenient.
According to an exemplary embodiment of the present disclosure, with reference to Fig. 6, route processing device 6 is compared to route processing device 5, also
It may include secondary route processing module 61.
Specifically, secondary route processing module 61 is configured as executing: if the application identities of remaining security module is total
Amount of storage is greater than the capacity of routing table near field communication controller, then generates application identities and reject interface;Wherein, application identities are picked
Except the application identities in interface including each security module;Application identities corresponding with the mark rejecting operation that user issues are rejected,
Until the capacity that the total storage capacity of the application identities of multiple security modules is less than or equal to routing table near field communication controller is
Only;By the routing table of the application identities write-in near field communication controller of multiple security modules.
According to an exemplary embodiment of the present disclosure, with reference to Fig. 7, route processing device 7 is compared to route processing device 5, also
It may include third route processing module 71.
Specifically, third route processing module 71 is configured as executing: if the application identities of remaining security module is total
Amount of storage is greater than the capacity of routing table near field communication controller, then generates application identities and reject interface;Wherein, application identities are picked
Except the application identities in interface including each security module;Application identities corresponding with the mark rejecting operation that user issues are rejected,
Until the application identities amount of storage of the second object module is greater than the appearance of routing table near field communication controller in multiple security modules
Amount, and the total storage capacity of the application identities of remaining security module is less than or equal in addition to the second object module in multiple security modules
In near field communication controller until the capacity of routing table;By the application identities write-in of remaining security module in addition to the second object module
The routing table of near field communication controller, and establish the mapping relations of the second object module and default route.
According to an exemplary embodiment of the present disclosure, with reference to Fig. 8, route processing device 8 is compared to route processing device 5, also
It may include the 4th route processing module 81.
Specifically, the 4th route processing module 81 is configured as executing: if the application identities of remaining security module is total
Amount of storage is greater than the capacity of routing table near field communication controller, it is determined that each application identities uses frequency in multiple security modules
Rate;Application identities are rejected by the sequence of frequency of use from low to high, until the total storage capacity of the application identities of multiple security modules
Until capacity less than or equal to routing table near field communication controller;The application identities write-in near field of multiple security modules is led to
Believe the routing table of controller.
According to an exemplary embodiment of the present disclosure, with reference to Fig. 9, route processing device 9 is compared to route processing device 5, also
It may include the 5th route processing module 91.
Specifically, the 5th route processing module 91 is configured as executing: if the application identities of remaining security module is total
Amount of storage is greater than the capacity of routing table near field communication controller, it is determined that each application identities uses frequency in multiple security modules
Rate;Application identities are rejected by the sequence of frequency of use from low to high, up to the application of third object module in multiple security modules
Identify amount of storage be greater than near field communication controller in routing table capacity, and in multiple security modules in addition to third object module its
The total storage capacity of the application identities of remaining security module is less than or equal near field communication controller until the capacity of routing table;It will remove
The routing table of the application identities write-in near field communication controller of remaining outer security module of third object module, and establish third target
The mapping relations of module and default route.
According to an exemplary embodiment of the present disclosure, with reference to Figure 10, the first amount of storage determining module 51 may include amount of storage
Determination unit 101.
Specifically, amount of storage determination unit 101 is configured as executing: determining the quantity of the application identities of each security module;
Determine the amount of storage of single application identities;According to the amount of storage of the quantity of the application identities of each security module and single application identities
Determine the application identities amount of storage of each security module.
According to an exemplary embodiment of the present disclosure, with reference to Figure 11, route processing device 11 compared to route processing device 5,
It can also include applying determining module 111.
Specifically, being configured to execute using determining module 111: receiving application identities selection instruction;Judge near-field communication control
It whether there is application identities corresponding with application identities selection instruction in the routing table of device processed;If it does not exist, then based on default
Application corresponding with application identities selection instruction is determined in routing from first object module.
Since each functional module and the above method of the program analysis of running performance device of embodiment of the present invention are invented
It is identical in embodiment, therefore details are not described herein.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, energy is stored thereon with
Enough realize the program product of this specification above method.In some possible embodiments, various aspects of the invention may be used also
In the form of being embodied as a kind of program product comprising program code, when described program product is run on the terminal device, institute
Program code is stated for executing the terminal device described in above-mentioned " illustrative methods " part of this specification according to this hair
The step of bright various illustrative embodiments.
Program product can be using portable compact disc read only memory (CD-ROM) and including program code, and can be
It is run on terminal device, such as PC.However, program product of the invention is without being limited thereto, and in this document, readable storage
Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device
Using or it is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), CD, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal,
Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing
Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its
The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have
Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
In an exemplary embodiment of the disclosure, a kind of electronic equipment that can be realized the above method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or
Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
The electronic equipment 1200 of this embodiment according to the present invention is described referring to Figure 12.The electricity that Figure 12 is shown
Sub- equipment 1200 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 12, electronic equipment 1200 is showed in the form of universal computing device.The component of electronic equipment 1200 can
To include but is not limited to: at least one above-mentioned processing unit 1210, connects not homologous ray at least one above-mentioned storage unit 1220
The bus 1230 of component (including storage unit 1220 and processing unit 1210), display unit 1240.
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 1210
Row, so that various according to the present invention described in the execution of the processing unit 1210 above-mentioned " illustrative methods " part of this specification
The step of illustrative embodiments.For example, the processing unit 1210 can execute step S22 as shown in Figure 2 to step
S26。
Storage unit 1220 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit
(RAM) 12201 and/or cache memory unit 12202, it can further include read-only memory unit (ROM) 12203.
Storage unit 1220 can also include program/utility with one group of (at least one) program module 12205
12204, such program module 12205 includes but is not limited to: operating system, one or more application program, other programs
It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 1230 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
Electronic equipment 1200 can also be with one or more external equipments 1300 (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 1200 communicate, and/or with make
The electronic equipment 1200 can with it is one or more of the other calculating equipment be communicated any equipment (such as router, modulation
Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 1250.Also, electronic equipment 1200
Network adapter 1260 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public affairs can also be passed through
Common network network, such as internet) communication.As shown, network adapter 1260 passes through its of bus 1230 and electronic equipment 1200
The communication of its module.It should be understood that although not shown in the drawings, other hardware and/or software can be used in conjunction with electronic equipment 1200
Module, including but not limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, magnetic
Tape drive and data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment
Method.
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention
It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable
Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description
Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more
Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould
The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure
His embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Adaptive change follow the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure or
Conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by claim
It points out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the attached claims.
Claims (10)
1. a kind of route processing method is applied to terminal device, the terminal device includes near field communication controller and multiple peaces
Full module, which is characterized in that the route processing method includes:
Determine the application identities amount of storage of each security module;
If the application identities amount of storage of first object module is greater than the near field communication controller in the multiple security module
The capacity of middle routing table, it is determined that in the multiple security module in addition to the first object module remaining security module application
The total storage capacity of mark;
If the total storage capacity of the application identities of remaining security module is less than or equal to the near field communication controller Road
By the capacity of table, then the application identities of remaining security module are written to the routing table of the near field communication controller, and built
Found the mapping relations of the first object module and default route.
2. route processing method according to claim 1, which is characterized in that the route processing method further include:
If the total storage capacity of the application identities of remaining security module is greater than routing table in the near field communication controller
Capacity then generates application identities and rejects interface;Wherein, the application identities reject answering comprising each security module in interface
With mark;
Application identities corresponding with the mark rejecting operation that user issues are rejected, until the application identities of the multiple security module
Total storage capacity be less than or equal to the near field communication controller in routing table capacity until;
The application identities of the multiple security module are written to the routing table of the near field communication controller.
3. route processing method according to claim 1, which is characterized in that the route processing method further include:
If the total storage capacity of the application identities of remaining security module is greater than routing table in the near field communication controller
Capacity then generates application identities and rejects interface;Wherein, the application identities reject answering comprising each security module in interface
With mark;
Application identities corresponding with the mark rejecting operation that user issues are rejected, until the second target in the multiple security module
The application identities amount of storage of module is greater than the capacity of routing table in the near field communication controller, and in the multiple security module
The total storage capacity of the application identities of remaining security module is less than or equal to the near-field communication control in addition to second object module
In device processed until the capacity of routing table;
The application identities of remaining security module in addition to second object module are written to the routing of the near field communication controller
Table, and establish the mapping relations of second object module and default route.
4. route processing method according to claim 1, which is characterized in that the route processing method further include:
If the total storage capacity of the application identities of remaining security module is greater than routing table in the near field communication controller
Capacity, it is determined that the frequency of use of each application identities in the multiple security module;
Application identities are rejected by the sequence of frequency of use from low to high, until the application identities of the multiple security module are always deposited
Reserves are less than or equal in the near field communication controller until the capacity of routing table;
The application identities of the multiple security module are written to the routing table of the near field communication controller.
5. route processing method according to claim 1, which is characterized in that the route processing method further include:
If the total storage capacity of the application identities of remaining security module is greater than routing table in the near field communication controller
Capacity, it is determined that the frequency of use of each application identities in the multiple security module;
Application identities are rejected by the sequence of frequency of use from low to high, until third object module in the multiple security module
Application identities amount of storage is greater than the capacity of routing table in the near field communication controller, and except described in the multiple security module
The total storage capacity of the application identities of remaining outer security module of third object module is less than or equal in the near field communication controller
Until the capacity of routing table;
The application identities of remaining security module in addition to the third object module are written to the routing of the near field communication controller
Table, and establish the mapping relations of the third object module and default route.
6. route processing method according to claim 1, which is characterized in that determine the application identities storage of each security module
Amount includes:
Determine the quantity of the application identities of each security module;
Determine the amount of storage of single application identities;
Each security module is determined according to the amount of storage of the quantity of the application identities of each security module and single application identities
Application identities amount of storage.
7. route processing method according to claim 1, which is characterized in that the route processing method further include:
Receive application identities selection instruction;
Judge in the routing table of the near field communication controller with the presence or absence of application corresponding with the application identities selection instruction
Mark;
If it does not exist, then determining to select with the application identities from the first object module based on the default route
Instruct corresponding application.
8. a kind of route processing device is applied to terminal device, the terminal device includes near field communication controller and multiple peaces
Full module, which is characterized in that the route processing device includes:
First amount of storage determining module, for determining the application identities amount of storage of each security module;
Second amount of storage determining module, if the application identities amount of storage for first object module in the multiple security module
Greater than the capacity of routing table in the near field communication controller, it is determined that remove the first object mould in the multiple security module
The total storage capacity of the application identities of remaining outer security module of block;
The first via is by processing module, if the total storage capacity of the application identities for remaining security module is less than or equal to institute
The capacity of routing table near field communication controller is stated, then the near-field communication is written into the application identities of remaining security module
The routing table of controller, and establish the mapping relations of the first object module and default route.
9. a kind of storage medium, is stored thereon with computer program, which is characterized in that the computer program is executed by processor
Route processing method described in Shi Shixian any one of claims 1 to 7.
10. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to come described in any one of perform claim requirement 1 to 7 via the execution executable instruction
Route processing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910370664.XA CN110191054B (en) | 2019-05-06 | 2019-05-06 | Route processing method and device, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910370664.XA CN110191054B (en) | 2019-05-06 | 2019-05-06 | Route processing method and device, storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110191054A true CN110191054A (en) | 2019-08-30 |
CN110191054B CN110191054B (en) | 2021-07-13 |
Family
ID=67715690
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910370664.XA Active CN110191054B (en) | 2019-05-06 | 2019-05-06 | Route processing method and device, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110191054B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112788604A (en) * | 2019-11-01 | 2021-05-11 | 中国移动通信有限公司研究院 | Near field communication route configuration method, device and computer readable storage medium |
CN114239785A (en) * | 2021-12-20 | 2022-03-25 | 珠海格力电器股份有限公司 | Instruction writing method and device, storage medium and electronic device |
CN114826336A (en) * | 2022-05-09 | 2022-07-29 | 青岛海信日立空调系统有限公司 | Air conditioner outdoor unit and air conditioner |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103065107A (en) * | 2011-10-21 | 2013-04-24 | 中国移动通信集团公司 | Method and device of achieving non-contact card swiping application |
EP2775739A1 (en) * | 2013-03-05 | 2014-09-10 | NXP Semiconductors B.V. | Near-field communications and routing |
CN106411745A (en) * | 2015-07-29 | 2017-02-15 | 中国移动通信集团公司 | Method and device for modifying contactless frontend chip routing table |
US20170055109A1 (en) * | 2015-08-17 | 2017-02-23 | Proton World International N.V. | Nfc device with multiple secure elements |
CN107911319A (en) * | 2017-11-22 | 2018-04-13 | 中兴通讯股份有限公司 | A kind of method for routing, NFC controller and the NFC device of more security modules |
-
2019
- 2019-05-06 CN CN201910370664.XA patent/CN110191054B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103065107A (en) * | 2011-10-21 | 2013-04-24 | 中国移动通信集团公司 | Method and device of achieving non-contact card swiping application |
EP2775739A1 (en) * | 2013-03-05 | 2014-09-10 | NXP Semiconductors B.V. | Near-field communications and routing |
CN106411745A (en) * | 2015-07-29 | 2017-02-15 | 中国移动通信集团公司 | Method and device for modifying contactless frontend chip routing table |
US20170055109A1 (en) * | 2015-08-17 | 2017-02-23 | Proton World International N.V. | Nfc device with multiple secure elements |
CN107911319A (en) * | 2017-11-22 | 2018-04-13 | 中兴通讯股份有限公司 | A kind of method for routing, NFC controller and the NFC device of more security modules |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112788604A (en) * | 2019-11-01 | 2021-05-11 | 中国移动通信有限公司研究院 | Near field communication route configuration method, device and computer readable storage medium |
CN112788604B (en) * | 2019-11-01 | 2023-03-28 | 中国移动通信有限公司研究院 | Near field communication route configuration method, device and computer readable storage medium |
CN114239785A (en) * | 2021-12-20 | 2022-03-25 | 珠海格力电器股份有限公司 | Instruction writing method and device, storage medium and electronic device |
CN114826336A (en) * | 2022-05-09 | 2022-07-29 | 青岛海信日立空调系统有限公司 | Air conditioner outdoor unit and air conditioner |
CN114826336B (en) * | 2022-05-09 | 2023-10-31 | 青岛海信日立空调系统有限公司 | Air conditioner outdoor unit and air conditioner |
Also Published As
Publication number | Publication date |
---|---|
CN110191054B (en) | 2021-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210357903A1 (en) | Systems and methods for providing near field communications | |
WO2022012173A1 (en) | Emulated card switching method, terminal device, and storage medium | |
CN105959317A (en) | Security authentication method and terminal | |
CN110191054A (en) | Route processing method and device, storage medium and electronic equipment | |
AU2014283648A1 (en) | Display card with user interface | |
CN105378624A (en) | Showing interactions as they occur on a whiteboard | |
CN105379171B (en) | Method, equipment and system for secure near field communication framework | |
CN101771754A (en) | Mobile terminal and method for near-field communication thereof | |
WO2019134591A1 (en) | Electronic transaction method and terminal | |
CN108734471A (en) | Identity identifying method, device, system and storage medium in mobile-payment system | |
CN108564359A (en) | Data processing method, terminal device and data processing system | |
CN109669787A (en) | Data transmission method and device, storage medium, electronic equipment | |
CN113965228B (en) | Method for expanding NFC card simulation function, NFC expansion device and NFC terminal | |
CN103544114A (en) | Multiple M1 card control system based on single CPU card and control method thereof | |
CN110460647A (en) | Dispatching method, device, electronic equipment and the storage medium of network node | |
CN103368612B (en) | By switching to silence, electronic equipment communication is controlled method and apparatus | |
CN107786979A (en) | A kind of multiple terminals shared communication method and system | |
CN109087109A (en) | A kind of mobile payment confirmation method, device, system and storage medium | |
CN106204021A (en) | NFC method of mobile payment, device and terminal | |
CN109214801A (en) | A kind of e-payment confirmation method, device and storage medium | |
CN108846662A (en) | wireless payment method and wearable device | |
CN105719141A (en) | Payment method and device | |
CN104751326A (en) | Data processing method and related equipment and system | |
CN107682571B (en) | Change the means of communication, system, equipment and the storage medium of base number | |
CN110045952A (en) | Code call method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |