CN112560082A - Method for locking terminal equipment and terminal equipment - Google Patents

Method for locking terminal equipment and terminal equipment Download PDF

Info

Publication number
CN112560082A
CN112560082A CN202011387752.XA CN202011387752A CN112560082A CN 112560082 A CN112560082 A CN 112560082A CN 202011387752 A CN202011387752 A CN 202011387752A CN 112560082 A CN112560082 A CN 112560082A
Authority
CN
China
Prior art keywords
terminal device
instruction
nfc
terminal equipment
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011387752.XA
Other languages
Chinese (zh)
Other versions
CN112560082B (en
Inventor
邓伟伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN202011387752.XA priority Critical patent/CN112560082B/en
Publication of CN112560082A publication Critical patent/CN112560082A/en
Application granted granted Critical
Publication of CN112560082B publication Critical patent/CN112560082B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/354Card activation or deactivation

Abstract

The embodiment of the application provides a method for locking terminal equipment, which comprises the following steps: the method comprises the steps that terminal equipment receives a first instruction sent by a server, wherein the first instruction is used for indicating to lock or unlock a Near Field Communication (NFC) function of the terminal equipment; and the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction. The embodiment of the application also provides the terminal equipment.

Description

Method for locking terminal equipment and terminal equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method for locking a terminal device and a terminal device.
Background
A corresponding virtual card such as an entrance guard card or a bus card is usually bound on the terminal device, so that life is more convenient. However, if the terminal device is lost, there is a risk that the virtual card bound to the terminal device is stolen.
Disclosure of Invention
The embodiment of the application provides a method for locking a terminal device and the terminal device, which can prevent a virtual card bound on a crowdsourcing pressing device from being stolen under the condition that the terminal device is lost.
The technical scheme of the embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides a method for locking a terminal device, where the method includes:
the method comprises the steps that terminal equipment receives a first instruction sent by a server, wherein the first instruction is used for indicating to lock or unlock a Near Field Communication (NFC) function of the terminal equipment; and the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction.
In some optional embodiments, the locking or unlocking, by the terminal device, the NFC function of the terminal device based on the first instruction includes:
the instruction push service entity of the terminal equipment sends the instruction sequence file corresponding to the first instruction to the NFC control entity of the terminal equipment;
the NFC control entity sends the instruction sequence file to a data partition of the terminal equipment, and the NFC control entity of the terminal equipment executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, locking or unlocking the NFC function by the NFC firmware of the terminal equipment.
In some optional embodiments, after the terminal device locks or unlocks the NFC function of the terminal device based on the first instruction, the method further includes:
and the terminal equipment sends the state of the NFC function of the terminal equipment to the server.
In some optional embodiments, if the terminal device locks the NFC function based on the first instruction, the terminal device prohibits to actively unlock the NFC function.
In some optional embodiments, if the terminal device locks the NFC function based on the first instruction, the terminal device prohibits opening of the virtual card bound to the terminal device.
An embodiment of the present application further provides a terminal device, where the terminal device includes:
the terminal equipment comprises a receiving unit, a sending unit and a processing unit, wherein the receiving unit is used for receiving a first instruction sent by a server, and the first instruction is used for indicating to lock or unlock the NFC function of the terminal equipment;
and the processing unit is used for locking or unlocking the NFC function of the terminal equipment based on the first instruction.
In some optional embodiments, an instruction push service entity of the terminal device sends an instruction sequence file corresponding to the first instruction to a data partition of the terminal device, and an NFC control entity of the terminal device executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, locking or unlocking the NFC function by the NFC firmware of the terminal equipment.
In some optional embodiments, the terminal device further includes:
a sending unit, configured to send the state of the NFC function of the terminal device to the server.
In some optional embodiments, the processing unit is configured to prohibit, if the terminal device locks the NFC function based on the first instruction, active unlocking of the NFC function.
In some optional embodiments, if the processing unit locks the NFC function based on the first instruction, the processing unit is configured to prohibit the virtual card bound to the terminal device from being opened.
An embodiment of the present application further provides a terminal device, where the terminal device includes:
a memory configured to store an executable program;
a processor configured to implement the above-described method of locking a terminal device by executing the executable program stored in the memory.
The embodiment of the application also provides a storage medium, which stores an executable program, and when the executable program is executed by a processor, the method for locking the terminal device is realized.
According to the method and the device for locking the terminal equipment, the terminal equipment receives a first instruction sent by a server, and the first instruction is used for indicating to lock or unlock the NFC function of the terminal equipment; and the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction. Therefore, under the condition that the terminal equipment is lost, the indication for locking the NFC function of the terminal equipment is sent to the terminal equipment through the server, so that the terminal equipment can lock the NFC function in time, and the virtual card bound on the terminal equipment is prevented from being stolen. After the terminal equipment loses and locks the NFC function, the terminal equipment is found back, and then the server sends an indication for unlocking the NFC function to the terminal equipment, so that the terminal equipment can timely use the NFC function, and normal use of the virtual card bound on the terminal equipment is realized.
Drawings
Fig. 1 is a schematic view of an alternative processing flow of a method for locking a terminal device according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating that a terminal device locks an NFC function of the terminal device based on the first instruction according to the embodiment of the present application;
fig. 3 is a schematic diagram illustrating a terminal device unlocking an NFC function of the terminal device based on the first instruction lock according to the embodiment of the present application;
fig. 4 is a schematic diagram of an alternative composition structure of the terminal device in the embodiment of the present application;
fig. 5 is a schematic diagram of an alternative software and hardware structure of the terminal device in the embodiment of the present application;
fig. 6 is an alternative functional structure diagram of the terminal device in the embodiment of the present application.
Detailed Description
The present application will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
An Embedded Secure Element (ESE) is a unit Embedded in a terminal device, and is used for protecting data security; the ESE can store corresponding virtual cards such as bank cards, bus cards or access control cards. If the ESE stores the virtual card, the representation terminal device is bound with the virtual card, and the terminal device supports the use of the virtual card in a non-unlocking state or a shutdown state. If the virtual card bound on the terminal equipment is desired to be deleted, the virtual card needs to be manually deleted on the terminal equipment, and the virtual card bound on the terminal equipment cannot be deleted by restoring factory settings.
For cards stored in the ESE, such as bank cards, national network Electronic Identity (EID) cards and other virtual cards that involve large amounts of money or important private data, a password or biometric input is required to confirm the transaction. However, for cards with small amount of money or convenience, such as bus cards or access cards, passwords or biological features are generally not set; after the terminal device is lost due to theft and the like, other people except the user corresponding to the terminal device can still use the virtual card bound by the terminal device, such as a bus is used or an entrance guard card is used to enter and exit a place needing identity recognition, and further potential safety hazards are caused.
Aiming at the potential safety hazard, the virtual card bound by the terminal equipment can be prevented from being stolen by establishing the connection between the terminal equipment and other equipment. For example, by establishing a connection between the terminal device and the bluetooth anti-lost device, the virtual card bound to the terminal device can be used only when the terminal device detects that the terminal device is in a connection state with the bluetooth anti-lost device. However, such a processing procedure is cumbersome and must be used when the user carries the mobile terminal and the bluetooth anti-lost device at the same time; moreover, the Bluetooth anti-lost device belongs to a small object and is easy to lose; if the Bluetooth anti-loss device is lost, even if the terminal equipment is not lost, the user corresponding to the terminal equipment cannot use the virtual card, so that inconvenience is brought to the user. Or, if the terminal device and the bluetooth anti-lost device are lost at the same time, but the bluetooth anti-lost device and the terminal device are still in a connected state, the other people except the user corresponding to the terminal device can still use the virtual card.
In view of the above problems, the present applicant considers that the use of the virtual card stored in the ESE is implemented based on the NFC function, and therefore proposes a method for locking the terminal device, so that the terminal device cannot open the virtual card stored in the ESE.
An embodiment of the present application provides a method for locking a terminal device, and an optional processing flow diagram of the method for locking a terminal device, as shown in fig. 1, may include at least the following steps:
step S101, a terminal device receives a first instruction sent by a server, wherein the first instruction is used for indicating to lock or unlock the NFC function of the terminal device.
In some embodiments, if the terminal device is lost, the user corresponding to the terminal device may log in an account corresponding to the terminal device through authentication methods such as a password, and send a request message requesting locking or unlocking of an NFC function of the terminal device to a manufacturer to which the terminal device belongs; and after verifying that the identity of the user is legal through the modes of verifying the account number-password and the like of the user, a manufacturer to which the terminal equipment belongs sends a request to a server to request to lock or unlock the NFC function of the terminal equipment. And then, the server sends a first instruction to the terminal equipment, wherein the first instruction is used for indicating the terminal equipment to lock or unlock the NFC function of the terminal equipment.
And step S102, the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction.
In some optional embodiments, the schematic diagram of the terminal device locking the NFC function of the terminal device based on the first instruction may be as shown in fig. 2:
the instruction push service entity of the terminal equipment sends an instruction sequence file corresponding to a first instruction for indicating locking of the NFC function of the terminal equipment to a data partition of the terminal equipment; an NFC control entity (NFC Controller Interface, NCI) of the terminal equipment executes the instruction sequence file; and if the authentication service entity authenticates that the instruction sequence file is legal, locking the NFC function by the NFC firmware of the terminal equipment.
The instruction push service entity can be used for executing the entity of the background service and can be used for executing the instruction sequence file. The authentication service entity authenticates that the instruction sequence file is legal, and can also mean that the authentication service entity authenticates that the terminal equipment has the authority of executing the instruction sequence file.
In some embodiments, the NFC Firmware locking NFC function of the terminal device may be Firmware (FW) in the terminal device, such as an NFC chip locking NFC function.
In some embodiments, if the terminal device locks the NFC functionality based on the first instruction, the terminal device prohibits actively unlocking the NFC functionality; that is, if the terminal device locks the NFC function based on the first instruction, the terminal device does not actively unlock the NFC function until the terminal device receives an instruction to unlock the NFC function sent by the server.
In some embodiments, if the terminal device locks the NFC function based on the first instruction, the terminal device prohibits opening of the virtual card bound to the terminal device; that is, the NFC function of the terminal device cannot be used, and the virtual card bound to the terminal device and used only based on the NFC function cannot be used or cannot be opened.
In the embodiment of the application, under the condition that the terminal equipment is lost, the server sends the indication for locking the NFC function of the terminal equipment to the terminal equipment, so that the terminal equipment can lock the NFC function in time, and the virtual card bound on the terminal equipment is prevented from being stolen. The use experience of the user, the trust degree of the brand of the terminal equipment and the competitiveness of the terminal equipment product are improved.
In other optional embodiments, if the terminal device is lost, and the terminal device is retrieved after the user applies for locking the NFC function of the terminal device through the server, the user may apply for unlocking the NFC function of the terminal device through the server; the schematic diagram of the terminal device unlocking the NFC function of the terminal device based on the first instruction lock may be as shown in fig. 3:
the instruction push service entity of the terminal equipment sends an instruction sequence file corresponding to a first instruction for instructing to unlock the NFC function of the terminal equipment to a data partition of the terminal equipment; the NCI of the terminal equipment executes the instruction sequence file; and if the authentication service entity of the terminal equipment authenticates that the instruction sequence file is legal, the NFC firmware of the terminal equipment unlocks the NFC function.
The instruction push service entity can be used for executing the entity of the background service and can be used for executing the instruction sequence file. The authentication service entity authenticates that the instruction sequence file is legal, and can also mean that the authentication service entity authenticates that the terminal equipment has the authority of executing the instruction sequence file.
In some embodiments, the NFC firmware of the terminal device locks the NFC function, which may be a FW (e.g., NFC chip) in the terminal device unlocks the NFC function.
In some embodiments, if the terminal device unlocks the NFC function based on the first instruction, the terminal device opens a virtual card bound to the terminal device; namely, the NFC function of the terminal device can be used, and the virtual card bound to the terminal device and used based on the NFC function can be used or can be turned on.
In some embodiments, after the terminal device locks or unlocks the NFC function of the terminal device based on the first instruction, the method may further include:
step S103, the terminal device sends the state of the NFC function of the terminal device to the server.
In some embodiments, after the NFC firmware of the terminal device locks or unlocks the NFC function, the state of the NFC function of the terminal device is fed back to the NFC service entity of the terminal device, the NFC service entity transparently transmits the state of the NFC function of the terminal device to the instruction push service entity of the terminal device, and then the instruction push service entity of the terminal device sends the state of the NFC function of the terminal device to the server, so that the server synchronizes the state of the NFC function of the terminal device.
In some embodiments, after acquiring the state of the NFC function of the terminal device, the server may notify the user of the terminal device of the state of the terminal device through the cloud. For example, the server sends the state of the terminal device to a mailbox of the user, or sends the state of the terminal device to a mobile phone number reserved by the user, and the like.
In order to implement the method for locking a terminal device, an embodiment of the present application further provides a terminal device 300, where an optional structural diagram of the terminal device 300 is shown in fig. 4, and includes:
a receiving unit 301, configured to receive a first instruction sent by a server, where the first instruction is used to instruct to lock or unlock an NFC function of the terminal device;
and the processing unit 302 is used for locking or unlocking the NFC function of the terminal device based on the first instruction.
In some optional embodiments, the instruction push service entity of the terminal device sends the instruction sequence file corresponding to the first instruction to the data partition, and the NFC control entity of the terminal device executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, locking or unlocking the NFC function by the NFC firmware of the terminal equipment.
In some optional embodiments, the terminal device 300 further includes:
a sending unit 303, configured to send the state of the NFC function of the terminal device to the server.
In some optional embodiments, the processing unit 302 is configured to prohibit, if the terminal device locks the NFC function based on the first instruction, actively unlocking the NFC function.
In some optional embodiments, if the processing unit 302 locks the NFC function based on the first instruction, the processing unit 302 is configured to prohibit the virtual card bound to the terminal device from being opened.
An embodiment of the present application further provides a terminal device, where the terminal device includes: a memory configured to store an executable program; a processor configured to implement the above-described method of locking a terminal device by executing the executable program stored in the memory, which will be exemplarily described below with reference to fig. 5.
Fig. 5 exemplarily shows an optional software and hardware structure diagram of the terminal device 10, and the terminal device 10 includes a hardware layer, an application layer, an operating system layer, and a driver layer. However, it should be understood by those skilled in the art that the structure of the apparatus 10 for playing a live broadcast shown in fig. 5 is only an example, and does not constitute a limitation to the structure of the terminal device 10. For example, the terminal device 10 may have more components than those shown in fig. 5 according to the implementation requirement, or omit some components according to the implementation requirement.
The hardware layers of the terminal device 10 comprise a processor 11, an input/output interface 13, a memory 14 and a communication interface 12, the components being able to communicate via a system bus connection.
The processor 11 may be implemented by a CPU, a Microprocessor (MCU), an Application Specific Integrated Circuit (ASIC), or a Field-Programmable Gate Array (FPGA).
The input/output interface 13 may be implemented using input/output devices such as a display screen, a touch screen, a speaker, etc.
The memory 14 may be implemented by a nonvolatile memory such as a flash memory, a hard disk, and an optical disk, or may be implemented by a volatile memory such as a Double Data Rate (DDR) dynamic cache. The nonvolatile Memory may be a Read Only Memory (ROM) or a Programmable Read-Only Memory (PROM). In which executable instructions are stored for performing the above-described method of locking a terminal device.
The memory 14 in the embodiment of the present application is used for storing various types of application programs and operating systems to support the operation of the terminal device 10.
The method for locking the terminal device disclosed in the embodiment of the present application may be applied to the processor 11, or may be implemented by the processor 11. The processor 11 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 11. The Processor 11 may be a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like.
The processor 11 may implement or perform the methods, steps and logic blocks provided in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The software modules may be located in a storage medium located in a memory where information is read by the processor 11 to perform the steps of the method described above in conjunction with its hardware.
The memory 14 may be arranged, for example, centrally with other components of the apparatus 10 for playing the live broadcast, or may be arranged distributed with respect to other components in the terminal device 10.
The Communication interface 12 provides the processor 11 with external data such as access performance of the off-site memory 14, and for example, the Communication interface 12 may perform wired Communication (such as optical cable and cable) to receive samples for training the machine learning model, and may also receive samples based on Near Field Communication (NFC), Bluetooth, and ZigBee, and may also implement Communication systems such as Code Division Multiple Access (CDMA) and Wideband Code Division Multiple Access (WCDMA) and their evolution systems.
The driver layer includes middleware 15 for the operating system 16 to recognize and communicate with the components of the hardware layer, such as a set of drivers for the components of the hardware layer.
The operating system 16 is used for providing a graphical interface facing a user, and exemplarily includes a plug-in icon, a desktop background and an application icon, and the operating system 16 supports the user to control the device via the graphical interface, and the embodiment of the present application does not limit the software environment of the device, such as the type and version of the operating system, and may be, for example, a Linux operating system, a UNIX operating system or other operating systems.
The application layer includes an application run by the user-side terminal, for example, an application 17 running in the application layer and locking the terminal device, so as to implement the method for locking the terminal device provided in the embodiment of the present application.
The embodiment of the present application further provides a terminal device, for example, see fig. 6. The terminal device 30 shown in fig. 6 includes: a processor 31, a memory 32 and a communication interface 33. The various components of the live device 30 are coupled together by a bus system 34. It will be appreciated that bus system 34 is used to enable communications among these components. The bus system 34 includes a power bus, a control bus, and a status signal bus in addition to the data bus.
The components shown in fig. 6 are merely examples, and do not represent quantities that may be distributed over physical locations, logically integrated through connection of a bus system 34 (e.g., cables, fibers), in which case the bus system 34 may enable communication between the distributed applications 322 (e.g., databases) via the communication interface 33.
It will be appreciated that the memory 32 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. The nonvolatile memory can be ROM and PROM. The memory 32 described in embodiments herein is intended to comprise, without being limited to, these and any other suitable types of memory.
The memory 32 in the embodiment of the present application is used for storing various types of application programs 322 and an operating system 321 to support the operation of the terminal device 30.
The method for locking the terminal device disclosed in the embodiment of the present application may be applied to the processor 31, or implemented by the processor 31. The processor 31 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 31. The processor 31 described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like.
The processor 31 may implement or perform the methods, steps and logic blocks provided in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The software modules may be located in a storage medium located in the memory 32, and the processor 31 reads the information in the memory 32 and performs the steps of the aforementioned methods in conjunction with its hardware.
Of course, the embodiments of the present application are not limited to being provided as methods and hardware, and may be implemented in various ways, for example, as a storage medium (storing a program for executing the method for locking a terminal device provided in the embodiments of the present application), where the program is executed by a processor to perform the following operations:
receiving a first instruction sent by a server, wherein the first instruction is used for indicating to lock or unlock a Near Field Communication (NFC) function of the terminal equipment;
and locking or unlocking the NFC function of the terminal equipment based on the first instruction.
In some alternative embodiments, the program, when executed by the processor, performs the following:
and sending the state of the NFC function of the terminal equipment to the server.
In some alternative embodiments, the program, when executed by the processor, performs the following:
and if the terminal equipment locks the NFC function based on the first instruction, forbidding to actively unlock the NFC function.
In some alternative embodiments, the program, when executed by the processor, performs the following:
and if the NFC function is locked based on the first instruction, forbidding to open the virtual card bound by the terminal equipment.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the above method embodiments may be implemented by hardware related to program commands, and the foregoing program may be stored in a storage medium, where the storage medium includes: various media capable of storing program codes, such as a removable Memory device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, and an optical disk.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially implemented in the form of a software product stored in a storage medium, and include several commands for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a global system for mobile communication (GSM) system, a Code Division Multiple Access (CDMA) system, a Wideband Code Division Multiple Access (WCDMA) system, a General Packet Radio Service (GPRS), an LTE system, an LTE Frequency Division Duplex (FDD) system, an LTE Time Division Duplex (TDD) system, an LTE-advanced long term evolution (LTE-A) system, an NR system, an evolution system of an NR system, an LTE-based access transmitted spectrum (LTE-U) system on an unlicensed band, an NR (NR-based access transmitted spectrum, UMTS-based mobile communication system, a UMTS-integrated radio access (UMTS) system on an unlicensed band, WiMAX) communication system, Wireless Local Area Networks (WLANs), wireless fidelity (WiFi), next generation communication systems, or other communication systems.
The system architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person of ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
The server referred to in the embodiments of the present application may be a computer device having communication and computing capabilities. The embodiment of the present application does not limit the specific technology and the specific device form adopted by the server. In the embodiment of the present application, the terminal device may be any terminal, for example, the terminal device may be a user equipment for machine type communication. That is, the terminal device may also be referred to as user equipment UE, a Mobile Station (MS), a mobile terminal (mobile terminal), a terminal (terminal), etc., and the terminal device may communicate with one or more core networks via a Radio Access Network (RAN), for example, the terminal device may be a mobile phone (or referred to as a "cellular" phone), a computer with a mobile terminal, etc., and the terminal device may also be a portable, pocket, hand-held, computer-included, or vehicle-mounted mobile device that exchanges language and/or data with the RAN. The embodiments of the present application are not particularly limited.
Optionally, the network device and the terminal device may be deployed on land, including indoors or outdoors, hand-held or vehicle-mounted; can also be deployed on the water surface; it may also be deployed on airborne airplanes, balloons and satellite vehicles. The embodiment of the application does not limit the application scenes of the server and the terminal equipment.
Optionally, the server and the terminal device may communicate via a licensed spectrum (licensed spectrum), may communicate via an unlicensed spectrum (unlicensed spectrum), or may communicate via both the licensed spectrum and the unlicensed spectrum. The server and the terminal device may communicate with each other through a frequency spectrum of 7 gigahertz (GHz) or less, through a frequency spectrum of 7GHz or more, or through both a frequency spectrum of 7GHz or less and a frequency spectrum of 7GHz or more. The embodiment of the present application does not limit the spectrum resources used between the server and the terminal device.
As used herein, "terminal equipment" includes, but is not limited to, connections via wireline, such as Public Switched Telephone Network (PSTN), Digital Subscriber Line (DSL), Digital cable, direct cable connection; and/or another data connection/network; and/or via a Wireless interface, e.g., to a cellular Network, a Wireless Local Area Network (WLAN), a digital television Network such as a DVB-H Network, a satellite Network, an AM-FM broadcast transmitter; and/or means of another terminal device arranged to receive/transmit communication signals; and/or Internet of Things (IoT) devices. A terminal device arranged to communicate over a wireless interface may be referred to as a "wireless communication terminal", "wireless terminal", or "mobile terminal". Examples of mobile terminals include, but are not limited to, satellite or cellular telephones; personal Communications Systems (PCS) terminals that may combine cellular radiotelephones with data processing, facsimile, and data Communications capabilities; PDAs that may include radiotelephones, pagers, internet/intranet access, Web browsers, notepads, calendars, and/or Global Positioning System (GPS) receivers; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. Terminal Equipment may refer to an access terminal, User Equipment (UE), subscriber unit, subscriber station, mobile station, remote terminal, mobile device, User terminal, wireless communication device, User agent, or User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device having Wireless communication capabilities, a computing device or other processing device connected to a Wireless modem, a vehicle mounted device, a wearable device, a terminal device in a 5G network, or a terminal device in a future evolved PLMN, etc.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. A method for locking a terminal device, the method comprising:
the method comprises the steps that terminal equipment receives a first instruction sent by a server, wherein the first instruction is used for indicating to lock or unlock a Near Field Communication (NFC) function of the terminal equipment;
and the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction.
2. The method of claim 1, wherein the terminal device locking or unlocking the NFC function of the terminal device based on the first instruction comprises:
the instruction push service entity of the terminal equipment sends the instruction sequence file corresponding to the first instruction to a data partition of the terminal equipment, and the NFC control entity of the terminal equipment executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, locking or unlocking the NFC function by the NFC firmware of the terminal equipment.
3. The method of claim 1, wherein after the terminal device locks or unlocks the NFC functionality of the terminal device based on the first instruction, the method further comprises:
and the terminal equipment sends the state of the NFC function of the terminal equipment to the server.
4. The method of claim 1, wherein if the terminal device locks the NFC functionality based on the first instruction, the terminal device prohibits actively unlocking the NFC functionality.
5. The method according to any one of claims 1 to 4, wherein if the terminal device locks the NFC function based on the first instruction, the terminal device prohibits opening of the virtual card bound by the terminal device.
6. A terminal device, characterized in that the terminal device comprises:
the terminal equipment comprises a receiving unit, a sending unit and a processing unit, wherein the receiving unit is used for receiving a first instruction sent by a server, and the first instruction is used for indicating to lock or unlock the Near Field Communication (NFC) function of the terminal equipment;
and the processing unit is used for locking or unlocking the NFC function of the terminal equipment based on the first instruction.
7. The terminal device according to claim 6, wherein the instruction push service entity of the terminal device sends an instruction sequence file corresponding to the first instruction to the data partition, and the NFC control entity of the terminal device executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, locking or unlocking the NFC function by the NFC firmware of the terminal equipment.
8. The terminal device according to claim 6, wherein the terminal device further comprises:
a sending unit, configured to send the state of the NFC function of the terminal device to the server.
9. The terminal device according to claim 6, wherein the processing unit is configured to prohibit actively unlocking the NFC functionality if the terminal device locks the NFC functionality based on the first instruction.
10. The terminal device according to any one of claims 6 to 9, wherein if the processing unit locks the NFC functionality based on the first instruction, the processing unit is configured to prohibit opening of the virtual card bound to the terminal device.
11. A terminal device, characterized in that the terminal device comprises:
a memory configured to store an executable program;
a processor configured to implement the method of locking a terminal device of any one of claims 1 to 5 by executing an executable program stored in the memory.
12. A storage medium storing an executable program which, when executed by a processor, implements the method of locking a terminal device of any one of claims 1 to 5.
CN202011387752.XA 2020-12-01 2020-12-01 Method for locking terminal equipment and terminal equipment Active CN112560082B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011387752.XA CN112560082B (en) 2020-12-01 2020-12-01 Method for locking terminal equipment and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011387752.XA CN112560082B (en) 2020-12-01 2020-12-01 Method for locking terminal equipment and terminal equipment

Publications (2)

Publication Number Publication Date
CN112560082A true CN112560082A (en) 2021-03-26
CN112560082B CN112560082B (en) 2023-09-08

Family

ID=75047515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011387752.XA Active CN112560082B (en) 2020-12-01 2020-12-01 Method for locking terminal equipment and terminal equipment

Country Status (1)

Country Link
CN (1) CN112560082B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113316132A (en) * 2021-05-28 2021-08-27 Oppo广东移动通信有限公司 Near field communication control method, terminal device, network device and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110212687A1 (en) * 2010-02-26 2011-09-01 Research In Motion Limited Communications device responsive to near field communications (nfc) to enter locked or unlocked operating modes
CN103370954A (en) * 2011-03-14 2013-10-23 捷讯研究有限公司 Mobile wireless communications device having a near field communication (NFC) device and providing memory erasure and related methods
WO2013155562A1 (en) * 2012-04-17 2013-10-24 Secure Nfc Pty. Ltd. Nfc card lock
US20140283018A1 (en) * 2013-03-15 2014-09-18 Saurabh Dadu Mechanisms for locking computing devices
CN104471600A (en) * 2014-04-01 2015-03-25 华为终端有限公司 Safety unit management method and terminal
US20150089586A1 (en) * 2013-09-24 2015-03-26 Miguel Ballesteros Systems and methods for nfc access control in a secure element centric nfc architecture
US20160150408A1 (en) * 2013-06-07 2016-05-26 Zte Corporation Mobile Terminal, and Safety Verification Method and Device for Mobile Payment
US9420403B1 (en) * 2012-01-31 2016-08-16 Sprint Communications Company L.P. Remote deactivation of near field communication functionality
JP2017068823A (en) * 2015-09-30 2017-04-06 株式会社東芝 Memory device and information processing system
WO2017116008A1 (en) * 2015-12-30 2017-07-06 송영상 Method, tag and application for providing user terminal lock function
CN107451492A (en) * 2017-07-26 2017-12-08 上海青橙实业有限公司 Mobile terminal unlocking method and mobile terminal
CN108805539A (en) * 2018-02-09 2018-11-13 深圳市微付充科技有限公司 A kind of method of payment, mobile device and storage device that Intrusion Detection based on host snap gauge is quasi-
CN111191213A (en) * 2018-11-14 2020-05-22 华为终端有限公司 Method for deleting security service and electronic equipment
CN111737121A (en) * 2020-06-15 2020-10-02 Oppo(重庆)智能科技有限公司 NFC chip testing method and device, terminal equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110212687A1 (en) * 2010-02-26 2011-09-01 Research In Motion Limited Communications device responsive to near field communications (nfc) to enter locked or unlocked operating modes
CN103370954A (en) * 2011-03-14 2013-10-23 捷讯研究有限公司 Mobile wireless communications device having a near field communication (NFC) device and providing memory erasure and related methods
US9420403B1 (en) * 2012-01-31 2016-08-16 Sprint Communications Company L.P. Remote deactivation of near field communication functionality
WO2013155562A1 (en) * 2012-04-17 2013-10-24 Secure Nfc Pty. Ltd. Nfc card lock
US20140283018A1 (en) * 2013-03-15 2014-09-18 Saurabh Dadu Mechanisms for locking computing devices
US20160150408A1 (en) * 2013-06-07 2016-05-26 Zte Corporation Mobile Terminal, and Safety Verification Method and Device for Mobile Payment
US20150089586A1 (en) * 2013-09-24 2015-03-26 Miguel Ballesteros Systems and methods for nfc access control in a secure element centric nfc architecture
CN104471600A (en) * 2014-04-01 2015-03-25 华为终端有限公司 Safety unit management method and terminal
JP2017068823A (en) * 2015-09-30 2017-04-06 株式会社東芝 Memory device and information processing system
WO2017116008A1 (en) * 2015-12-30 2017-07-06 송영상 Method, tag and application for providing user terminal lock function
CN107451492A (en) * 2017-07-26 2017-12-08 上海青橙实业有限公司 Mobile terminal unlocking method and mobile terminal
CN108805539A (en) * 2018-02-09 2018-11-13 深圳市微付充科技有限公司 A kind of method of payment, mobile device and storage device that Intrusion Detection based on host snap gauge is quasi-
CN111191213A (en) * 2018-11-14 2020-05-22 华为终端有限公司 Method for deleting security service and electronic equipment
CN111737121A (en) * 2020-06-15 2020-10-02 Oppo(重庆)智能科技有限公司 NFC chip testing method and device, terminal equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
UFUK DEMIR ALAN,DERYA BIRANT: "Server-Based Intelligent Public Transportation System with NFC", 《IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE》, vol. 10, no. 1, pages 30 - 46, XP011676129, DOI: 10.1109/MITS.2017.2776102 *
邓伟伟: "基于PKI实现网络通信安全性的研究", 《中国新通信》, no. 06, pages 19 *
黄莺: "NFC移动支付技术及现网应用研究", 《电信科学》, no. 2, pages 108 - 115 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113316132A (en) * 2021-05-28 2021-08-27 Oppo广东移动通信有限公司 Near field communication control method, terminal device, network device and storage medium

Also Published As

Publication number Publication date
CN112560082B (en) 2023-09-08

Similar Documents

Publication Publication Date Title
US8655310B1 (en) Control of secure elements through point-of-sale device
JP4803947B2 (en) Electronics
CN102177740B (en) Method for providing smart card (SIM) security by checking a temporary subscriber identifier (TMSI)
US20130331027A1 (en) Communications system providing remote access via mobile wireless communications device and related methods
US20120036557A1 (en) Wi-fi access method, access point and wi-fi access system
US20110077051A1 (en) UICC Control Over Devices Used to Obtain Service
CN102833712A (en) Method, device, server and system for preventing information leakage and equipment
EP1673958B1 (en) Method and system for controlling resources via a mobile terminal, related network and computer program product therefor
CN104168557A (en) Upgrading method for operating systems and upgrading device for operating systems
CN107835204A (en) The security control of configuration file policing rule
CA2816787C (en) Communications system providing remote access via mobile wireless communications device and related methods
CN114238900A (en) Data transmission method and electronic equipment
JP5196528B2 (en) Portable terminal device and program
CN105392133A (en) Method and system for wireless function device to automatically access to wireless access point
EP3090376B1 (en) Method for accessing a service and a corresponding server
US10750363B2 (en) Methods and apparatuses for conditional WiFi roaming
CN112560082B (en) Method for locking terminal equipment and terminal equipment
US20090221264A1 (en) Storage system of mobile terminal and access control method
US10819711B2 (en) Data access method, user equipment and server
CN113796150A (en) Service transmission method and device, and communication equipment
EP3840434B1 (en) Device-to-device service restriction method and storage medium
CN104718771A (en) Method to disable a network access application in a secure element
CN108282784B (en) Wireless network access method, MiFi terminal, mobile terminal and storage medium
WO2004062243A2 (en) System and method for distributed authorization for access to communications device
CN106255112B (en) Wireless local area network access method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant