CN110191054B - Route processing method and device, storage medium and electronic equipment - Google Patents

Route processing method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN110191054B
CN110191054B CN201910370664.XA CN201910370664A CN110191054B CN 110191054 B CN110191054 B CN 110191054B CN 201910370664 A CN201910370664 A CN 201910370664A CN 110191054 B CN110191054 B CN 110191054B
Authority
CN
China
Prior art keywords
application
routing
security modules
communication controller
capacity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910370664.XA
Other languages
Chinese (zh)
Other versions
CN110191054A (en
Inventor
方攀
陈岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910370664.XA priority Critical patent/CN110191054B/en
Publication of CN110191054A publication Critical patent/CN110191054A/en
Application granted granted Critical
Publication of CN110191054B publication Critical patent/CN110191054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/30Special provisions for routing multiclass traffic
    • H04L45/306Route determination based on the nature of the carried application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

The invention discloses a route processing method and a device, a storage medium and electronic equipment, which relate to the technical field of near field communication and are applied to terminal equipment, wherein the terminal equipment comprises a near field communication controller and a plurality of safety modules, and the route processing method comprises the following steps: determining the application identifier storage capacity of each security module; if the application identifier storage capacity of a first target module in the plurality of security modules is larger than the capacity of a routing table in the near field communication controller, determining the total storage capacity of the application identifiers of the other security modules except the first target module in the plurality of security modules; and if the total storage capacity of the application identifications of the rest security modules is less than or equal to the capacity of the routing table in the near field communication controller, writing the application identifications of the rest security modules into the routing table of the near field communication controller, and establishing a mapping relation between the first target module and the default route. The application range of the terminal equipment for realizing the near field communication card simulation can be expanded.

Description

Route processing method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of near field communication technologies, and in particular, to a route processing method, a route processing apparatus, a storage medium, and an electronic device.
Background
Near Field Communication (NFC), also called short-range wireless Communication, is a short-range high-frequency wireless Communication technology that allows contactless point-to-point data transmission between electronic devices. As an important application of near field communication, card simulation may simulate a terminal device (e.g., a mobile phone, a smart watch, etc.) into one card, such as a bus card, a bank card, a door access, various membership cards, etc.
In the card simulation process, the terminal device needs to search for a corresponding Application by relying on an Application Identifier (AID) to realize the corresponding function of the card simulation. With the diversified development of life, the applications simulated by the card on the terminal equipment are more and more, and the number of the corresponding application identifications is more and more.
The storage space for storing the application identifier in the near field communication controller is limited, and once the storage space is full, if a new application identifier exists, the new application identifier cannot be written. Some techniques address this problem by writing a new application id in a manner that overwrites the old application id. However, these methods all cause the problem that the user cannot use the card emulation function normally, and thus cannot pay normally, and cannot verify the identity.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure is directed to a routing processing method, a routing processing apparatus, a storage medium, and an electronic device, so as to overcome, at least to a certain extent, a problem of failure of a terminal device card simulation function due to excessive application identifiers.
According to one aspect of the present disclosure, there is provided a routing processing method applied to a terminal device, the terminal device including a near field communication controller and a plurality of security modules, the routing processing method including: determining the application identifier storage capacity of each security module; if the application identifier storage capacity of a first target module in the plurality of security modules is larger than the capacity of a routing table in the near field communication controller, determining the total storage capacity of the application identifiers of the other security modules except the first target module in the plurality of security modules; and if the total storage capacity of the application identifications of the rest security modules is less than or equal to the capacity of the routing table in the near field communication controller, writing the application identifications of the rest security modules into the routing table of the near field communication controller, and establishing a mapping relation between the first target module and the default route.
According to an aspect of the present disclosure, there is provided a route processing apparatus applied to a terminal device including a near field communication controller and a plurality of security modules, the route processing apparatus including: the first storage capacity determining module is used for determining the application identifier storage capacity of each security module; a second storage capacity determining module, configured to determine, if the storage capacity of the application identifier of a first target module in the multiple security modules is greater than the capacity of the routing table in the near field communication controller, a total storage capacity of the application identifiers of the other security modules except the first target module in the multiple security modules; and the first routing processing module is used for writing the application identifications of the rest of the security modules into the routing table of the near field communication controller and establishing the mapping relation between the first target module and the default route if the total storage capacity of the application identifications of the rest of the security modules is less than or equal to the capacity of the routing table in the near field communication controller.
According to an aspect of the present disclosure, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described route processing method.
According to an aspect of the present disclosure, there is provided an electronic device including: a processor; and a memory for storing executable instructions for the processor; wherein the processor is configured to perform the above-described route processing method via execution of executable instructions.
In the technical solutions provided in some embodiments of the present disclosure, if the application identifier storage amount of one security module is greater than the capacity of the routing table in the near field communication controller, and the total storage amount of the application identifiers of the remaining security modules of the terminal device except the security module is less than or equal to the capacity of the routing table, the application identifiers of the remaining security modules are written into the routing table, and a mapping relationship between the security module and a default route is established. Therefore, when the application identifier selection instruction is received, if the application identifier corresponding to the application identifier selection instruction cannot be searched through the routing table in the near field communication controller, the service content corresponding to the instruction can be routed to the security module which establishes the mapping relation with the default route so as to execute the corresponding service content. The method and the device for realizing the NFC card simulation have the advantages that on the basis of the routing table of the near field communication controller, the default routing scheme is implemented, the application range of the terminal device for realizing the NFC card simulation is greatly expanded, and the problem that new application identification cannot be normally written due to the limitation of the storage capacity of the routing table is solved. In addition, on the basis of the exemplary embodiment of the present disclosure, since the application scene of the card simulation can be expanded, the functions of the terminal device can be enriched, and the behavior activities of people are more convenient.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty. In the drawings:
fig. 1 schematically shows the interaction principle of a terminal device with near field communication functionality;
fig. 2 schematically shows a flow chart of a route processing method according to an exemplary embodiment of the present disclosure;
fig. 3 shows a schematic diagram of a near field communication dual application architecture according to an example embodiment of the present disclosure;
FIG. 4 is a flow diagram schematically illustrating an overall process of a routing method according to one embodiment of the present disclosure;
fig. 5 schematically shows a block diagram of a route processing device according to a first exemplary embodiment of the present disclosure;
fig. 6 schematically shows a block diagram of a route processing device according to a second exemplary embodiment of the present disclosure;
fig. 7 schematically shows a block diagram of a route processing apparatus according to a third exemplary embodiment of the present disclosure;
fig. 8 schematically shows a block diagram of a route processing device according to a fourth exemplary embodiment of the present disclosure;
fig. 9 schematically shows a block diagram of a route processing device according to a fifth exemplary embodiment of the present disclosure;
fig. 10 schematically illustrates a block diagram of a first storage amount determination module according to an exemplary embodiment of the present disclosure;
fig. 11 schematically shows a block diagram of a route processing apparatus according to a sixth exemplary embodiment of the present disclosure;
fig. 12 schematically shows a block diagram of an electronic device according to an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the steps. For example, some steps may be decomposed, and some steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation. In addition, the terms "first," "second," "third," "fourth," "fifth," etc. used below are for purposes of distinction only and are not to be construed as limiting the present disclosure.
The security module (SE) described in the present disclosure may also be referred to as a security Element, which is a generic term of a hardware security Element embedded with a microchip, and can independently implement functions such as small-scale computation and storage, and generally has high security. The application field of the security Module is wide, and for example, the security Module can be applied to various fields in the form of a financial integrated circuit card, a Subscriber Identity Module (SIM) card, a bank U shield, a transportation card, an electronic passport, and the like.
The application program running in the security module may be referred to as a security module application (SE application) and is denoted as an Applet or SE Applet. Typically, one or more applets may run on the security module. For example, the financial integrated circuit card runs a payment application of a bank, and the traffic integrated circuit card runs a bus payment application. With the increasing powerful functions of terminal devices, the application of security modules in terminal devices is also increasing. For example, applets such as a bus payment application, a bank payment application, a membership card identification application, and the like are installed on a security module of a mobile phone, so that a user can easily realize corresponding functions such as bus payment, bank payment, membership authentication, and the like through the mobile phone.
Although the terminal device described in the present disclosure generally refers to a mobile phone, it should be understood by those skilled in the art that the terminal device may also include devices such as a smart watch, a tablet, etc., and the present disclosure is not limited thereto.
A terminal device configured with a near field communication card mode function may generally include an Application Processor (AP), a near field communication controller (NFC controller), and a security module. The security module includes, but is not limited to, an Embedded security module (ESE), a Secure digital Card (i.e., an SD Card used as an NFC security module, recorded as uSD), a SIM Card, a Host-based Card Emulation (HCE), and the like.
In an exemplary embodiment of the present disclosure, the application processor and the nfc controller may be coupled via an I2C bus, the nfc controller and the security module may be coupled via an SWP (Single Wire Protocol) bus, and the application processor and the security module may be coupled via an SPI (Serial Peripheral Interface).
In addition, the near field communication controller is configured with a routing table of an Application Identifier (AID), and the present disclosure does not make any special limitation on the components of the entries in the routing table. The application identifier according to the exemplary embodiment of the present disclosure may be composed of a registered application provider identifier (RID) and an extended dedicated application identifier (PIX), and it is easily understood that one application corresponds to one application identifier.
Fig. 1 schematically illustrates a POS (Point Of Sale) payment scenario as an example. And the POS terminal sends an application identifier selection instruction (Select AID instruction), an NFC controller of the terminal equipment receives the instruction, searches a corresponding application identifier in a routing table, and determines a corresponding Applet according to the application identifier. In this case, the NFC controller may send the corresponding service data to the corresponding Applet through the SWP interface to implement the corresponding card simulation function.
Based on factors such as cost, chip size, power consumption and efficiency, the storage space of the routing table is limited, and taking NXP PN547 (an NFC chip) as an example, the routing table can only store 660 bytes of data. In this case, once the storage space of the routing table is full, if a new application identifier exists, there is a problem that the new application identifier cannot be written. To solve this problem, the new application identity may be written in a manner that overwrites the old application identity. However, these methods all cause the problem that the user cannot use the card emulation function normally, and thus cannot pay normally, and cannot verify the identity.
In view of this, a new route processing method is needed.
It should be understood that the route processing method of the exemplary embodiment of the present disclosure may be implemented by a terminal device, that is, the terminal device may perform the respective steps of the route processing method. In this case, a route processing device described below may be configured in the terminal device.
Fig. 2 schematically shows a flowchart of a route processing method of an exemplary embodiment of the present disclosure. The routing processing method of the exemplary embodiment of the present disclosure is applied to a terminal device, which is a device having a near field communication function and includes a near field communication controller and a plurality of security modules. Referring to fig. 2, the route processing method may include the steps of:
and S22, determining the application identifier storage capacity of each security module.
In an exemplary embodiment of the present disclosure, the security module may include, but is not limited to, an ESE, a ussd, a SIM, a HCE, etc., and the plurality of security modules in the terminal device may refer to at least two of the security modules. In addition, the application identifier storage amount refers to the size of the storage space required for storing the application identifier, and specifically refers to the size of the storage space occupied by the application identifier stored in the routing table of the near field communication controller.
First, the number of application identifications of each security module may be determined. In one embodiment, because the applications (applets) in the security module have a one-to-one correspondence with the application identifications, the number of applications in the security module can be determined as the number of application identifications. In another embodiment, each security module may be configured with an application identifier summary table related thereto, and the number of application identifiers may be directly determined through the application identifier summary table.
Next, the amount of storage for the individual application identifications may be determined. Specifically, for each application identifier, the information stored in the routing table may be composed of a routing address, an identifier of the application identifier, and control data, that is, an entry of the routing table may be composed of a routing address, an identifier of the application identifier, and control data. For example, in a terminal device including four security modules, the routing address may be 2 bytes, and the routing addresses for the four security modules are represented by 00, 01, 10, and 11, respectively; the identification number of the application identification may be 16 bytes; the control data may be 2 bytes for representing the state of the corresponding application, which may include, for example and without limitation, bright screen lock, off screen, bright screen unlock, and the like. For this example, the storage capacity of a single application identifier is 20 bytes.
However, it should be understood that 20 bytes is only an exemplary storage amount of the application identifier, and the size of the space occupied by the application identifier and the content of the application identifier may also be in other forms, which is not particularly limited in this exemplary embodiment.
And then, determining the application identifier storage amount of the security module according to the number of the application identifiers of the security module and the storage amount of a single application identifier. Specifically, the product of the two may be used as the application identification storage amount of the security module. For example, if there are 10 applets in a security module, corresponding to 10 application identifiers, and the size of the required storage space of each application identifier is 20 bytes, the storage amount of the application identifier of the security module is 200 bytes.
S24, if the application identifier storage capacity of the first target module in the plurality of security modules is larger than the capacity of the routing table in the near field communication controller, determining the total storage capacity of the application identifiers of the other security modules except the first target module in the plurality of security modules.
In an exemplary embodiment of the present disclosure, the capacity of the routing table may also be referred to as the size of the routing table or the upper limit of the routing table, representing the maximum amount of data that the routing table can store. The capacity of the routing table is related to the type of near field communication chip used, i.e. the capacity of the routing table may differ from near field communication chip to near field communication chip. Taking an NXP PN547 chip as an example, the capacity of a routing table in the near field communication controller is 660 bytes.
After determining the application identifier storage amount of each security module in step S22, it is determined whether there is a security module whose application identifier storage amount is greater than the capacity of the routing table. If so, it may be determined to be the first target module.
Next, the total amount of storage of the application identifications of the remaining security modules, except for the first target module, may be determined.
For example, the capacity of the routing table in the nfc controller is 660 bytes, and in the case where the security module includes only ESE, ussd, and SIM, if the application id storage amount of the SIM is 700 bytes, the SIM is taken as the first target module, and ESE and uSD become the above-mentioned remaining modules, and if the application id storage amounts of ESE and uSD are 100 bytes and 300 bytes, respectively, the total storage amount of the application ids of the remaining security modules described in step S24 is 400 bytes.
S26, if the total storage capacity of the application identifications of the rest safety modules is smaller than or equal to the capacity of a routing table in the near field communication controller, writing the application identifications of the rest safety modules into the routing table of the near field communication controller, and establishing a mapping relation between the first target module and a default route.
In an exemplary embodiment of the present disclosure, after determining a total storage amount of the application identifications of the security modules other than the first target module, the total storage amount may be compared with a capacity of a routing table in the near field communication controller.
If the total storage amount is less than or equal to the capacity of the routing table in the near field communication controller, the storage space of the routing table is enough to store the application identifications of the rest security modules. In this case, the application identifications of the remaining security modules may be written into the routing table of the near field communication controller, and as described above, the routing address, the identification number of the application identification, and the control data may be used to form an entry of the routing table. Taking the total storage capacity of the application identifiers of the rest security modules as 400 bytes and the capacity of the routing table as 660 bytes as an example, at this time, a space of 260 bytes is still available in the routing table, and if the storage capacity of a single application identifier is 20 bytes, 13 application identifiers can also be written into the routing table.
For the first target module, a mapping relationship of the first target module to a default route may be established. Establishing such a mapping relationship described in this disclosure means that, when the application identifier corresponding to the application identifier selection instruction is not found in the routing table, the information may be directly routed to the first target module to implement the corresponding payment and verification functions.
For the specific application processing procedure, first, the terminal device may receive an application identifier selection instruction sent by, for example, a POS terminal; next, the terminal device may determine whether an application identifier corresponding to the application identifier selection instruction exists in a routing table of the nfc controller. If the application identifier exists, the safety module can be determined according to the routing address corresponding to the application identifier, so that the corresponding service function is realized by using the Applet in the safety module; if the application identifier does not exist, the Applet corresponding to the application identifier selection instruction can be determined from the first target module based on the established default route so as to realize the corresponding service function.
It should be understood that in the process of implementing service functions (e.g., payment, verification, etc.) by using the near field communication technology, the Android application needs to cooperate with the Applet in the security module, that is, a dual-application architecture is generally used to implement services. Fig. 3 schematically illustrates such a dual application architecture, in which an Applet running in the security module is used to perform operations of actual card emulation, and an Android application running in the application processor provides an interface for interaction with a user, performing operations such as receiving a transaction password input by the user, displaying debit information, and the like.
In addition, when the card emulation application is installed, the terminal device may acquire an Application Identifier (AID) from the installation file, and declare AID data used by the Application Identifier (AID) from the installation file. In this case, the AID information can be filtered out by searching the Android application, and the security module corresponding to the AID information is determined.
According to some embodiments of the present disclosure, if the total storage amount of the application identifiers of the security modules other than the first target module is greater than the capacity of the routing table in the near field communication controller, the terminal device may generate an application identifier culling interface, where the application identifier culling interface includes application identifiers related to all security modules.
The application identification removing interface is used as a man-machine interaction interface and can respond to identification removing operation sent by a user to remove the corresponding application identification. In one example, the identification culling operation may be a user check-in operation for the application identification. In addition, one-time identifier elimination operation of the user can be performed on multiple application identifiers, for example, the user can select multiple application identifiers first and then click an elimination button configured on the interface to accomplish simultaneous elimination of the multiple application identifiers.
It should be noted that the term "culling" in the exemplary embodiments of the present disclosure refers to closing (disable) the application identifier, and if necessary, the user may also restore the culled application identifier through a manual operation.
The terminal equipment can remove the application identification selected based on the identification removing operation of the user from the corresponding safety module, and in the process, if the total storage quantity of the application identifications of all the safety modules is larger than the capacity of the routing table in the near field communication controller, a text prompt can be sent out so that the user can continuously remove the application identifications until the total storage quantity of the application identifications of all the safety modules is smaller than or equal to the capacity of the routing table in the near field communication controller.
Next, the terminal device may write the application identifications of all security modules to the routing table of the near field communication controller.
According to some embodiments of the present disclosure, if the total storage amount of the application identifiers of the security modules other than the first target module is greater than the capacity of the routing table in the near field communication controller, the terminal device may generate an application identifier culling interface.
The terminal device may remove the application identifier selected based on the identifier removal operation of the user from the corresponding security module until the application identifier storage amount of the second target module in all the security modules is greater than the capacity of the routing table in the near field communication controller, and the total storage amount of the application identifiers of the other security modules except the second target module in all the security modules is less than or equal to the capacity of the routing table in the near field communication controller. The second target module may be different from the first target module, however, it is easily understood that the second target module and the first target module may be the same security module without largely eliminating the application identifier related to the first target module by the user.
Next, the terminal device may write the application identifiers of the security modules except for the second target module into a routing table of the nfc controller, and establish a mapping relationship between the second target module and a default route.
According to some embodiments of the present disclosure, if the total storage amount of the application identifications of the remaining security modules except the first target module is greater than the capacity of the routing table in the near field communication controller, the terminal device may determine the frequency of use of each application identification in all the security modules and rank the application identifications based on the frequency of use. The frequency of use may be, for example, the number of times the application identifier is used within one month. It should be noted that the frequency of use is not limited thereto, and those skilled in the art may conceive other frequency of use limitations, which, however, should be considered to fall within the scope of the present invention.
Next, the terminal device may eliminate the application identifiers in the order of the frequency of use from low to high until the total storage amount of the application identifiers of all the security modules is less than or equal to the capacity of the routing table in the near field communication controller.
Subsequently, the terminal device may write the application identifications of all security modules to the routing table of the near field communication controller.
According to some embodiments of the present disclosure, if the total storage amount of the application identifications of the remaining security modules except the first target module is greater than the capacity of the routing table in the near field communication controller, the terminal device may determine the frequency of use of each application identification in all the security modules and rank the application identifications based on the frequency of use.
Next, the terminal device may remove the application identifiers in the order from low frequency to high frequency until the application identifier storage amount of the third target module in all the security modules is greater than the capacity of the routing table in the near field communication controller, and the total storage amounts of the application identifiers of the other security modules except the third target module in all the security modules are less than or equal to the capacity of the routing table in the near field communication controller. However, it is easily understood that, in the process of removing the application identifier according to the usage frequency, if the usage frequency of the application identifier in the first target module is higher, the third target module and the first target module described herein may be the same security module.
Subsequently, the terminal device may write the application identifiers of the security modules except for the third target module into a routing table of the near field communication controller, and establish a mapping relationship between the third target module and a default route.
A routing process of an embodiment of the present disclosure will be explained with reference to fig. 4.
In step S402, the terminal device may count the size of the storage space required by each security module AID; in step S404, the terminal device may determine whether there is a security module, where the size of the storage space required by the AID in the security module exceeds the capacity of the NFC routing table, and if there is no security module, go to step S406, and if there is the security module, go to step S408; in step S406, if the sum of the spaces required by all AIDs is smaller than the capacity of the routing table, writing all AID information into the routing table; in step S408, it is determined whether the sum of the spaces required by the rest of the security modules AID exceeds the routing table capacity, and if so, the process goes to step S410, and if not, the process goes to step S412; in step S410, the terminal device may generate a human-computer interaction interface so that the user can remove some AIDs; in step S412, the security module whose AID required space is larger than the capacity of the routing table is matched with the default route, a mapping relationship between them is established, and the rest of the security modules AIDs are written in the routing table.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Further, a route processing device is also provided in this example embodiment.
Fig. 5 schematically shows a block diagram of a route processing apparatus according to an exemplary embodiment of the present disclosure, which is applied to a terminal device including a near field communication controller and a plurality of security modules. Referring to fig. 5, the route processing apparatus 5 according to an exemplary embodiment of the present disclosure may include a first storage amount determining module 51, a second storage amount determining module 53, and a first route processing module 55.
Specifically, the first storage amount determining module 51 may be configured to determine an application identifier storage amount of each security module; the second storage amount determining module 53 may be configured to determine, if the storage amount of the application identifier of the first target module in the plurality of security modules is greater than the capacity of the routing table in the near field communication controller, a total storage amount of the application identifiers of the remaining security modules in the plurality of security modules except the first target module; the first route processing module 55 may be configured to, if the total storage amount of the application identifiers of the remaining security modules is less than or equal to the capacity of the routing table in the near field communication controller, write the application identifiers of the remaining security modules into the routing table of the near field communication controller, and establish a mapping relationship between the first target module and the default route.
According to the routing processing device of the exemplary embodiment of the disclosure, on the basis of the routing table of the near field communication controller, a default routing scheme is implemented, so that the application range of the terminal device for realizing the simulation of the NFC card is greatly expanded, and the problem that a new application identifier cannot be normally written due to the limitation of the storage capacity of the routing table is solved. In addition, on the basis of the exemplary embodiment of the present disclosure, since the application scene of the card simulation can be expanded, the functions of the terminal device can be enriched, and the behavior activities of people are more convenient.
According to an exemplary embodiment of the present disclosure, referring to fig. 6, the route processing device 6 may further include a second route processing module 61, compared to the route processing device 5.
In particular, the second route processing module 61 is configured to perform: if the total storage capacity of the application identifiers of the rest security modules is larger than the capacity of a routing table in the near field communication controller, generating an application identifier eliminating interface; the application identifier removing interface comprises application identifiers of all the security modules; removing the application identifications corresponding to identification removing operation sent by a user until the total storage capacity of the application identifications of the plurality of security modules is less than or equal to the capacity of a routing table in the near field communication controller; the application identifications of the plurality of security modules are written to a routing table of the near field communication controller.
According to an exemplary embodiment of the present disclosure, referring to fig. 7, the route processing device 7 may further include a third route processing module 71, compared to the route processing device 5.
In particular, the third routing processing module 71 is configured to perform: if the total storage capacity of the application identifiers of the rest security modules is larger than the capacity of a routing table in the near field communication controller, generating an application identifier eliminating interface; the application identifier removing interface comprises application identifiers of all the security modules; removing the application identification corresponding to identification removing operation sent by a user until the application identification storage capacity of a second target module in the plurality of security modules is larger than the capacity of the routing table in the near field communication controller, and the total storage capacity of the application identifications of the other security modules except the second target module in the plurality of security modules is smaller than or equal to the capacity of the routing table in the near field communication controller; and writing the application identifications of the other security modules except the second target module into a routing table of the near field communication controller, and establishing a mapping relation between the second target module and a default route.
According to an exemplary embodiment of the present disclosure, referring to fig. 8, the route processing device 8 may further include a fourth route processing module 81, compared to the route processing device 5.
Specifically, the fourth route processing module 81 is configured to perform: if the total storage capacity of the application identifications of the rest security modules is larger than the capacity of a routing table in the near field communication controller, determining the use frequency of each application identification in the plurality of security modules; eliminating the application identifications in the sequence from low use frequency to high use frequency until the total storage capacity of the application identifications of the plurality of security modules is less than or equal to the capacity of a routing table in the near field communication controller; the application identifications of the plurality of security modules are written to a routing table of the near field communication controller.
According to an exemplary embodiment of the present disclosure, referring to fig. 9, the route processing device 9 may further include a fifth route processing module 91, compared to the route processing device 5.
Specifically, the fifth route processing module 91 is configured to perform: if the total storage capacity of the application identifications of the rest security modules is larger than the capacity of a routing table in the near field communication controller, determining the use frequency of each application identification in the plurality of security modules; removing the application identifications in the sequence from low use frequency to high use frequency until the application identification storage capacity of a third target module in the plurality of security modules is larger than the capacity of a routing table in the near field communication controller, and the total storage capacity of the application identifications of the other security modules except the third target module in the plurality of security modules is smaller than or equal to the capacity of the routing table in the near field communication controller; and writing the application identifications of the other safety modules except the third target module into a routing table of the near field communication controller, and establishing a mapping relation between the third target module and a default route.
According to an exemplary embodiment of the present disclosure, referring to fig. 10, the first storage amount determining module 51 may include a storage amount determining unit 101.
Specifically, the storage amount determination unit 101 is configured to perform: determining the number of application identifiers of each security module; determining the storage capacity of a single application identifier; and determining the application identifier storage capacity of each security module according to the number of the application identifiers of each security module and the storage capacity of a single application identifier.
According to an exemplary embodiment of the present disclosure, referring to fig. 11, the route processing apparatus 11 may further include an application determination module 111, compared to the route processing apparatus 5.
Specifically, the application determination module 111 is configured to perform: receiving an application identifier selection instruction; judging whether an application identifier corresponding to the application identifier selection instruction exists in a routing table of the near field communication controller; and if the application does not exist, determining the application corresponding to the application identification selection instruction from the first target module based on the default route.
Since each functional module of the program operation performance analysis apparatus according to the embodiment of the present invention is the same as that in the embodiment of the present invention, it is not described herein again.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above section "exemplary methods" of the present description, when said program product is run on the terminal device.
The program product may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical disk, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 1200 according to this embodiment of the invention is described below with reference to fig. 12. The electronic device 1200 shown in fig. 12 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 12, the electronic device 1200 is embodied in the form of a general purpose computing device. The components of the electronic device 1200 may include, but are not limited to: the at least one processing unit 1210, the at least one memory unit 1220, the bus 1230 connecting the various system components (including the memory unit 1220 and the processing unit 1210), and the display unit 1240.
Wherein the memory unit stores program code that is executable by the processing unit 1210 such that the processing unit 1210 performs steps according to various exemplary embodiments of the present invention as described in the above section "exemplary methods" of the present specification. For example, the processing unit 1210 may perform steps S22 through S26 as shown in fig. 2.
The storage unit 1220 may include a readable medium in the form of a volatile memory unit, such as a random access memory unit (RAM)12201 and/or a cache memory unit 12202, and may further include a read only memory unit (ROM) 12203.
Storage unit 1220 may also include a program/utility 12204 having a set (at least one) of program modules 12205, such program modules 12205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 1230 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 1200 may also communicate with one or more external devices 1300 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 1200, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 1200 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 1250. Also, the electronic device 1200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 1260. As shown, the network adapter 1260 communicates with the other modules of the electronic device 1200 via the bus 1230. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the electronic device 1200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Furthermore, the above-described figures are merely schematic illustrations of processes involved in methods according to exemplary embodiments of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is to be limited only by the terms of the appended claims.

Claims (10)

1. A route processing method is applied to a terminal device, the terminal device comprises a near field communication controller and a plurality of security modules, and the route processing method comprises the following steps:
determining the application identifier storage capacity of each security module;
if the application identifier storage capacity of a first target module in the plurality of security modules is larger than the capacity of a routing table in the near field communication controller, determining the total storage capacity of the application identifiers of the other security modules except the first target module in the plurality of security modules;
and if the total storage capacity of the application identifications of the rest security modules is less than or equal to the capacity of a routing table in the near field communication controller, writing the application identifications of the rest security modules into the routing table of the near field communication controller, and establishing a mapping relation between the first target module and a default route.
2. The route processing method according to claim 1, wherein the route processing method further comprises:
if the total storage capacity of the application identifiers of the rest security modules is larger than the capacity of a routing table in the near field communication controller, generating an application identifier eliminating interface; the application identifier removing interface comprises application identifiers of the security modules;
removing application identifications corresponding to identification removing operation sent by a user until the total storage quantity of the application identifications of the plurality of security modules is less than or equal to the capacity of a routing table in the near field communication controller;
writing the application identifications of the plurality of security modules to a routing table of the near field communication controller.
3. The route processing method according to claim 1, wherein the route processing method further comprises:
if the total storage capacity of the application identifiers of the rest security modules is larger than the capacity of a routing table in the near field communication controller, generating an application identifier eliminating interface; the application identifier removing interface comprises application identifiers of the security modules;
removing application identifications corresponding to identification removing operation sent by a user until the application identification storage capacity of a second target module in the plurality of security modules is larger than the capacity of a routing table in the near field communication controller, and the total storage capacity of the application identifications of the other security modules except the second target module in the plurality of security modules is smaller than or equal to the capacity of the routing table in the near field communication controller;
writing the application identifications of the other security modules except the second target module into a routing table of the near field communication controller, and establishing a mapping relation between the second target module and a default route.
4. The route processing method according to claim 1, wherein the route processing method further comprises:
if the total storage capacity of the application identifications of the rest security modules is larger than the capacity of a routing table in the near field communication controller, determining the use frequency of each application identification in the plurality of security modules;
eliminating the application identifications in the sequence from low use frequency to high use frequency until the total storage capacity of the application identifications of the plurality of security modules is less than or equal to the capacity of a routing table in the near field communication controller;
writing the application identifications of the plurality of security modules to a routing table of the near field communication controller.
5. The route processing method according to claim 1, wherein the route processing method further comprises:
if the total storage capacity of the application identifications of the rest security modules is larger than the capacity of a routing table in the near field communication controller, determining the use frequency of each application identification in the plurality of security modules;
eliminating application identifications in a sequence from low use frequency to high use frequency until the application identification storage capacity of a third target module in the plurality of security modules is larger than the capacity of a routing table in the near field communication controller and the total storage capacity of the application identifications of the other security modules except the third target module in the plurality of security modules is smaller than or equal to the capacity of the routing table in the near field communication controller;
writing the application identifications of the other security modules except the third target module into a routing table of the near field communication controller, and establishing a mapping relation between the third target module and a default route.
6. The routing processing method of claim 1, wherein determining the application identifier storage amount of each security module comprises:
determining the number of application identifiers of each security module;
determining the storage capacity of a single application identifier;
and determining the application identifier storage capacity of each security module according to the number of the application identifiers of each security module and the storage capacity of a single application identifier.
7. The route processing method according to claim 1, wherein the route processing method further comprises:
receiving an application identifier selection instruction;
judging whether an application identifier corresponding to the application identifier selection instruction exists in a routing table of the near field communication controller or not;
and if the application identifier does not exist, determining the application corresponding to the application identifier selection instruction from the first target module based on the default route.
8. A route processing apparatus applied to a terminal device including a near field communication controller and a plurality of security modules, the route processing apparatus comprising:
the first storage capacity determining module is used for determining the application identifier storage capacity of each security module;
a second storage capacity determining module, configured to determine, if the application identifier storage capacity of a first target module in the multiple security modules is greater than a capacity of a routing table in the near field communication controller, a total storage capacity of application identifiers of security modules other than the first target module in the multiple security modules;
and the first routing processing module is used for writing the application identifiers of the rest of security modules into the routing table of the near field communication controller and establishing a mapping relation between the first target module and a default route if the total storage capacity of the application identifiers of the rest of security modules is less than or equal to the capacity of the routing table in the near field communication controller.
9. A storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the route processing method of any one of claims 1 to 7.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the route processing method of any of claims 1 to 7 via execution of the executable instructions.
CN201910370664.XA 2019-05-06 2019-05-06 Route processing method and device, storage medium and electronic equipment Active CN110191054B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910370664.XA CN110191054B (en) 2019-05-06 2019-05-06 Route processing method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910370664.XA CN110191054B (en) 2019-05-06 2019-05-06 Route processing method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110191054A CN110191054A (en) 2019-08-30
CN110191054B true CN110191054B (en) 2021-07-13

Family

ID=67715690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910370664.XA Active CN110191054B (en) 2019-05-06 2019-05-06 Route processing method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110191054B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065107A (en) * 2011-10-21 2013-04-24 中国移动通信集团公司 Method and device of achieving non-contact card swiping application
EP2775739A1 (en) * 2013-03-05 2014-09-10 NXP Semiconductors B.V. Near-field communications and routing
CN106411745A (en) * 2015-07-29 2017-02-15 中国移动通信集团公司 Method and device for modifying contactless frontend chip routing table
CN107911319A (en) * 2017-11-22 2018-04-13 中兴通讯股份有限公司 A kind of method for routing, NFC controller and the NFC device of more security modules

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3040226B1 (en) * 2015-08-17 2018-06-08 Stmicroelectronics (Rousset) Sas NFC DEVICE HAVING MULTIPLE SECURE ELEMENTS

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065107A (en) * 2011-10-21 2013-04-24 中国移动通信集团公司 Method and device of achieving non-contact card swiping application
EP2775739A1 (en) * 2013-03-05 2014-09-10 NXP Semiconductors B.V. Near-field communications and routing
CN106411745A (en) * 2015-07-29 2017-02-15 中国移动通信集团公司 Method and device for modifying contactless frontend chip routing table
CN107911319A (en) * 2017-11-22 2018-04-13 中兴通讯股份有限公司 A kind of method for routing, NFC controller and the NFC device of more security modules

Also Published As

Publication number Publication date
CN110191054A (en) 2019-08-30

Similar Documents

Publication Publication Date Title
US20160224954A1 (en) Method and system for conducting pre-authorized financial transactions
US10825009B2 (en) Payment additional service information processing method and electronic device for supporting the same
EP2820602B1 (en) Systems and methods for mapping a mobile cloud account to a payment account
US10380578B2 (en) Systems and methods for providing near field communications
CN106357600B (en) Card registration method for payment services and mobile electronic device implementing the method
US20160125409A1 (en) System and Method for Authorizing Direct Debit Transactions
US20160132875A1 (en) Enhancement of mobile device initiated transactions
CN109615366B (en) Equipment payment method and device
US10997582B2 (en) Payment transaction method and electronic device therefor
US10997584B2 (en) Payment system, electronic device and payment method thereof
KR20180110395A (en) Method for providing payment service having plug-in service and electronic device therefor
CN104376452A (en) System and method for managing payment success rate on basis of international card payment channel
US20170372313A1 (en) Electronic device and system for payment
CN110191054B (en) Route processing method and device, storage medium and electronic equipment
KR101760502B1 (en) Payment system and method using dynamic track 2
US20170185993A1 (en) Mobile near field communication payment for banking activities from an automated teller machine
KR101636975B1 (en) Method for Registering Card Information for Near Field Communication Payment, System And Payment Apparatus
CN111581994A (en) Near Field Communication (NFC) communication method and device and electronic equipment
CN109240655B (en) EMV-based middleware implementation method and terminal equipment
CN109087109B (en) Mobile payment confirmation method, device, system and storage medium
US20200320509A1 (en) Electronic transaction method and terminal
US20160247147A1 (en) Method and apparatus for accumulating membership points
CN104978651A (en) Account data control method, and relevant equipment and system
JP2001506793A (en) Dynamic interpretation of data for chip cards
WO2019108130A1 (en) A payment transaction system for processing a tokenized transaction over a domestic switch

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant