CN112560082B - Method for locking terminal equipment and terminal equipment - Google Patents

Method for locking terminal equipment and terminal equipment Download PDF

Info

Publication number
CN112560082B
CN112560082B CN202011387752.XA CN202011387752A CN112560082B CN 112560082 B CN112560082 B CN 112560082B CN 202011387752 A CN202011387752 A CN 202011387752A CN 112560082 B CN112560082 B CN 112560082B
Authority
CN
China
Prior art keywords
terminal equipment
terminal device
instruction
nfc function
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011387752.XA
Other languages
Chinese (zh)
Other versions
CN112560082A (en
Inventor
邓伟伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN202011387752.XA priority Critical patent/CN112560082B/en
Publication of CN112560082A publication Critical patent/CN112560082A/en
Application granted granted Critical
Publication of CN112560082B publication Critical patent/CN112560082B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/354Card activation or deactivation

Abstract

The embodiment of the application provides a method for locking terminal equipment, which comprises the following steps: the terminal equipment receives a first instruction sent by a server, wherein the first instruction is used for indicating to lock or unlock a Near Field Communication (NFC) function of the terminal equipment; the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction. The embodiment of the application also provides terminal equipment.

Description

Method for locking terminal equipment and terminal equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method for locking a terminal device and a terminal device.
Background
The terminal device is usually bound with a virtual card such as an access card or a bus card, so that life is more convenient. However, if the terminal device is lost, there is a risk that the virtual card bound to the terminal device is stolen.
Disclosure of Invention
The embodiment of the application provides a method for locking terminal equipment and the terminal equipment, which can prevent a virtual card bound on a fury press equipment from being stolen under the condition that the terminal equipment is lost.
The technical scheme of the embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides a method for locking a terminal device, where the method includes:
the terminal equipment receives a first instruction sent by a server, wherein the first instruction is used for indicating to lock or unlock a near field communication (Near Field Communication, NFC) function of the terminal equipment; the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction.
In some optional embodiments, the terminal device locks or unlocks the NFC function of the terminal device based on the first instruction, including:
the instruction pushing service entity of the terminal equipment sends an instruction sequence file corresponding to the first instruction to the NFC control entity of the terminal equipment;
the NFC control entity sends the instruction sequence file to a data partition of the terminal equipment, and the NFC control entity of the terminal equipment executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, the NFC firmware of the terminal equipment locks or unlocks the NFC function.
In some optional embodiments, after the terminal device locks or unlocks the NFC functionality of the terminal device based on the first instruction, the method further includes:
and the terminal equipment sends the state of the NFC function of the terminal equipment to the server.
In some optional embodiments, if the terminal device locks the NFC function based on the first instruction, the terminal device prohibits actively unlocking the NFC function.
In some alternative embodiments, if the terminal device locks the NFC function based on the first instruction, the terminal device prohibits opening the virtual card bound by the terminal device.
The embodiment of the application also provides a terminal device, which comprises:
the receiving unit is used for receiving a first instruction sent by the server, wherein the first instruction is used for indicating to lock or unlock the NFC function of the terminal equipment;
and the processing unit locks or unlocks the NFC function of the terminal equipment based on the first instruction.
In some optional embodiments, the instruction push service entity of the terminal device sends an instruction sequence file corresponding to the first instruction to a data partition of the terminal device, and the NFC control entity of the terminal device executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, the NFC firmware of the terminal equipment locks or unlocks the NFC function.
In some alternative embodiments, the terminal device further comprises:
and the sending unit is used for sending the state of the NFC function of the terminal equipment to the server.
In some optional embodiments, the processing unit is configured to prohibit the active unlocking of the NFC function if the terminal device locks the NFC function based on the first instruction.
In some optional embodiments, if the processing unit locks the NFC function based on the first instruction, the processing unit is configured to prohibit opening the virtual card bound by the terminal device.
The embodiment of the application also provides a terminal device, which comprises:
a memory configured to store an executable program;
and the processor is configured to realize the method for locking the terminal equipment by executing the executable program stored in the memory.
The embodiment of the application also provides a storage medium which stores an executable program, and the executable program realizes the method for locking the terminal equipment when being executed by a processor.
According to the method and the device for locking the terminal equipment, the terminal equipment receives the first instruction sent by the server, and the first instruction is used for indicating to lock or unlock the NFC function of the terminal equipment; the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction. In this way, when the terminal equipment is lost, the server sends the indication of locking the NFC function of the terminal equipment to the terminal equipment, so that the terminal equipment can lock the NFC function in time, and the virtual card bound on the terminal equipment is prevented from being stolen. After the terminal equipment is lost and the NFC function is locked, the terminal equipment is retrieved again, and then the server sends an instruction for unlocking the NFC function to the terminal equipment, so that the terminal equipment can achieve the NFC functions in time, and normal use of the virtual card bound on the terminal equipment is realized.
Drawings
FIG. 1 is a schematic diagram of an alternative process flow of a method for locking a terminal device according to an embodiment of the present application;
fig. 2 is a schematic diagram of locking an NFC function of a terminal device according to an embodiment of the present application based on the first instruction;
fig. 3 is a schematic diagram of a terminal device unlocking an NFC function of the terminal device based on the first instruction lock according to an embodiment of the present application;
fig. 4 is a schematic diagram of an alternative composition structure of a terminal device in an embodiment of the present application;
FIG. 5 is a schematic diagram of an alternative software and hardware configuration of a terminal device according to an embodiment of the present application;
fig. 6 is a schematic diagram of an alternative functional structure of a terminal device in an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
An embedded security element (Embedded Secure Element, ESE) is a unit embedded inside the terminal device for protecting the security of data; the ESE can store virtual cards corresponding to a bank card, a bus card, an access card and the like. If the virtual card is stored in the ESE, the terminal equipment is characterized as binding the virtual card, and the terminal equipment supports the use of the virtual card in a non-unlocking state or a shutdown state. If the virtual card bound on the terminal device is desired to be deleted, the virtual card needs to be manually deleted on the terminal device, and the virtual card bound on the terminal device cannot be deleted by restoring factory settings.
For stored cards in ESE, such as bank cards, citizen network electronic identity (Dlectronic Identity, EID) and the like, virtual cards involving large amounts of money or important privacy data, it is necessary to enter a password or biometric for validation at the time of transaction. However, for cards with small money or convenience such as bus cards or access cards, no password or biological feature is generally set; after the terminal equipment is lost due to theft and the like, other people except the user corresponding to the terminal equipment can still use the virtual card bound by the terminal equipment, such as using buses to take buses or using entrance guard cards to enter and exit places needing identity recognition, so that potential safety hazards are caused.
Aiming at the potential safety hazard, the virtual card bound by the terminal equipment can be prevented from being stolen by establishing the connection between the terminal equipment and other equipment. For example, by establishing a connection between the terminal device and the bluetooth anti-lost device, the virtual card bound by the terminal device may be used when the terminal device detects that the terminal device is in a connection state with the bluetooth anti-lost device. However, such a process is cumbersome and must be used when the user carries the mobile terminal and the bluetooth anti-lost device at the same time; moreover, the Bluetooth anti-lost device belongs to a small object and is easy to lose; if the Bluetooth anti-lost device is lost, even if the terminal equipment is not lost, the user corresponding to the terminal equipment cannot use the virtual card, so that inconvenience is brought to the user. Or if the terminal device and the Bluetooth anti-lost device are lost at the same time, but the Bluetooth anti-lost device and the terminal device are still in a connection state, other people except the user corresponding to the terminal device can still use the virtual card.
In view of the above problems, the present inventors have proposed a method for locking a terminal device so that the terminal device cannot open an ESE-stored virtual card, considering that the use of the ESE-stored virtual card is realized based on an NFC function.
An embodiment of the present application provides a method for locking a terminal device, and an optional process flow diagram of the method for locking a terminal device, as shown in fig. 1, may at least include the following steps:
in step S101, a terminal device receives a first instruction sent by a server, where the first instruction is used to instruct to lock or unlock an NFC function of the terminal device.
In some embodiments, if the terminal device is lost, a user corresponding to the terminal device may log in an account corresponding to the terminal device in an authentication manner such as a password, and send a request message for locking or unlocking an NFC function of the terminal device to a vendor to which the terminal device belongs; after checking that the identity of the user is legal through the account number, the password and other modes of the user, the manufacturer of the terminal equipment sends a request to a server to request to lock or unlock the NFC function of the terminal equipment. And then, the server sends a first instruction to the terminal equipment, wherein the first instruction is used for indicating the terminal equipment to lock or unlock the NFC function of the terminal equipment.
Step S102, the terminal device locks or unlocks the NFC function of the terminal device based on the first instruction.
In some alternative embodiments, the schematic diagram of the terminal device locking the NFC function of the terminal device based on the first instruction may be as shown in fig. 2:
the instruction push service entity of the terminal equipment sends an instruction sequence file corresponding to a first instruction for indicating to lock the NFC function of the terminal equipment to a data partition of the terminal equipment; -the NFC control entity (NFC Controller Interface, NCI) of the terminal device executing said instruction sequence file; and if the authentication service entity authenticates that the instruction sequence file is legal, the NFC firmware of the terminal equipment locks the NFC function.
The instruction push service entity can be used for executing the background service entity and can be used for executing the instruction sequence file. The authentication service entity authenticating that the instruction sequence file is legal may also mean that the authentication service entity authenticates that the terminal device has the authority to execute the instruction sequence file.
In some embodiments, the NFC Firmware of the terminal device locks the NFC function, which may be Firmware (FW) in the terminal device, such as an NFC chip.
In some embodiments, if the terminal device locks the NFC function based on the first instruction, the terminal device prohibits actively unlocking the NFC function; if the terminal equipment locks the NFC function based on the first instruction, the terminal equipment does not actively unlock the NFC function before the terminal equipment receives an instruction for unlocking the NFC function sent by the server.
In some embodiments, if the terminal device locks the NFC function based on the first instruction, the terminal device prohibits opening a virtual card bound by the terminal device; that is, the NFC function of the terminal device cannot be used, and neither of the virtual cards bound on the terminal device that can be used based on the NFC function can be used, or can be opened.
In the embodiment of the application, under the condition that the terminal equipment is lost, the server sends the indication of locking the NFC function of the terminal equipment to the terminal equipment, so that the terminal equipment can lock the NFC function in time, and the virtual card bound on the terminal equipment is prevented from being stolen. The user experience, the trust degree of the brands of the terminal equipment and the competitiveness of the terminal equipment products are improved.
In other alternative embodiments, if the terminal device is lost and the user applies for locking the NFC function of the terminal device through the server and then the terminal device is retrieved, the user may apply for unlocking the NFC function of the terminal device through the server; the schematic diagram of unlocking the NFC function of the terminal device by the terminal device based on the first instruction lock may be as shown in fig. 3:
the instruction pushing service entity of the terminal equipment sends an instruction sequence file corresponding to a first instruction for indicating unlocking of the NFC function of the terminal equipment to a data partition of the terminal equipment; the NCI of the terminal equipment executes the instruction sequence file; and if the authentication service entity of the terminal equipment authenticates that the instruction sequence file is legal, the NFC firmware of the terminal equipment unlocks the NFC function.
The instruction push service entity can be used for executing the background service entity and can be used for executing the instruction sequence file. The authentication service entity authenticating that the instruction sequence file is legal may also mean that the authentication service entity authenticates that the terminal device has the authority to execute the instruction sequence file.
In some embodiments, the NFC firmware of the terminal device locks the NFC function, which may be a FW (such as an NFC chip) in the terminal device unlocks the NFC function.
In some embodiments, if the terminal device unlocks the NFC function based on the first instruction, the terminal device opens a virtual card bound by the terminal device; that is, the NFC function of the terminal device can be used, and the virtual card based on the NFC function bound on the terminal device can be used or can be opened.
In some embodiments, after the terminal device locks or unlocks the NFC function of the terminal device based on the first instruction, the method may further include:
step S103, the terminal device sends the state of the NFC function of the terminal device to the server.
In some embodiments, after the NFC firmware of the terminal device locks or unlocks the NFC function, the state of the NFC function of the terminal device is fed back to the NFC service entity of the terminal device, and the NFC service entity transparently transmits the state of the NFC function of the terminal device to the instruction push service entity of the terminal device, and then the instruction push service entity of the terminal device sends the state of the NFC function of the terminal device to the server, so that the server synchronizes the state of the NFC function of the terminal device.
In some embodiments, after the server obtains the state of the NFC function of the terminal device, the user of the terminal device may be notified of the state of the terminal device through the cloud. For example, the server sends the state of the terminal device to the mailbox of the user, or sends the state of the terminal device to the mobile phone number reserved by the user, etc.
In order to implement the method for locking the terminal device, the embodiment of the present application further provides a terminal device 300, where an optional structural diagram of the terminal device 300 is shown in fig. 4, and includes:
a receiving unit 301, configured to receive a first instruction sent by a server, where the first instruction is used to instruct to lock or unlock an NFC function of the terminal device;
the processing unit 302 locks or unlocks the NFC functionality of the terminal device based on the first instruction.
In some optional embodiments, the instruction push service entity of the terminal device sends an instruction sequence file corresponding to the first instruction to a data partition, and the NFC control entity of the terminal device executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, the NFC firmware of the terminal equipment locks or unlocks the NFC function.
In some alternative embodiments, the terminal device 300 further comprises:
a transmitting unit 303, configured to transmit, to the server, a state of an NFC function of the terminal device.
In some optional embodiments, the processing unit 302 is configured to prohibit the active unlocking of the NFC function if the terminal device locks the NFC function based on the first instruction.
In some alternative embodiments, if the processing unit 302 locks the NFC function based on the first instruction, the processing unit 302 is configured to prohibit opening the virtual card bound by the terminal device.
The embodiment of the application also provides a terminal device, which comprises: a memory configured to store an executable program; a processor configured to implement the above-described method of locking a terminal device by executing the executable program stored in the memory will be exemplarily described below with reference to fig. 5.
Fig. 5 illustrates an alternative software and hardware architecture diagram of the terminal device 10, where the terminal device 10 includes a hardware layer, an application layer, an operating system layer, and a driver layer. However, it should be understood by those skilled in the art that the structure of the terminal device 10 shown in fig. 5 is only an example and does not constitute a limitation on the structure of the terminal device 10. For example, the terminal device 10 may set more components than fig. 5 according to the implementation requirements, or omit setting part components according to the implementation requirements.
The hardware layers of the terminal device 10 comprise a processor 11, an input/output interface 13, a memory 14 and a communication interface 12, which components may communicate via a system bus connection.
The processor 11 may be implemented using a CPU, microprocessor (MCU, microcontroller Unit), application specific integrated circuit (ASIC, application Specific Integrated Circuit) or logic programmable gate array (FPGA, field-Programmable Gate Array).
The input/output interface 13 may be implemented using input/output devices such as a display screen, a touch screen, a speaker, etc.
The memory 14 may be implemented by a nonvolatile memory such as a flash memory, a hard disk, or an optical disk, or may be implemented by a volatile memory such as a Double Data Rate (DDR) dynamic cache. The nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), or a Programmable Read-Only Memory. In which executable instructions for performing the above-described method of locking a terminal device are stored.
The memory 14 in the present embodiment is used to store various kinds of application programs and operating systems to support the operation of the terminal device 10.
The method for locking the terminal device disclosed by the embodiment of the application can be applied to the processor 11 or realized by the processor 11. The processor 11 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in the processor 11 or by instructions in the form of software. The processor 11 may be a general purpose processor, a digital signal processor (DSP, digital Signal Processor), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like.
The processor 11 may implement or perform the methods, steps and logic blocks provided in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The software modules may be located in a storage medium having memory for the processor 11 to read information from the memory and to perform the steps of the method in combination with its hardware.
The memory 14 may be provided centrally with other components of the terminal device 10 or may be distributed with respect to other components in the terminal device 10, for example.
The communication interface 12 provides the processor 11 with access performance of external data such as the memory 14 provided in a different place, and the communication interface 12 may be used for communication in a wired manner (such as an optical cable and a cable) for receiving samples for training a machine learning model, or may be used for receiving samples based on a near field communication (NFC, near Field Communication) technology, a Bluetooth (Bluetooth) technology, a ZigBee (ZigBee) technology, or may be used for receiving samples in a near field communication manner in a communication system such as a Code Division Multiple Access (CDMA), a Wideband Code Division Multiple Access (WCDMA) and an evolution system thereof.
The driver layer includes middleware 15 for the operating system 16 to identify and communicate with the components of the hardware layer, such as a collection of drivers for the components of the hardware layer.
The operating system 16 is used to provide a graphical user-oriented interface, and illustratively includes a plug-in icon, a desktop background and an application icon, where the operating system 16 supports a user to control a device via the graphical interface.
The application layer includes an application running on the user side terminal, for example, an application 17 running on the application layer and used for implementing the method for locking the terminal device provided by the embodiment of the application.
The embodiment of the application also provides a terminal device, as an example, see fig. 6. The terminal device 30 shown in fig. 6 includes: a processor 31, a memory 32 and a communication interface 33. The various components in the terminal device 30 are coupled together by a bus system 34. It is understood that the bus system 34 is used to enable connected communications between these components. The bus system 34 includes a power bus, a control bus, and a status signal bus in addition to the data bus.
The components shown in fig. 6 are merely examples, and are not representative of the number, may be physically distributed and logically integrated by being connected by a bus system 34 (e.g., may be cables, optical fibers), and the bus system 34 may enable communication between distributed applications 322 (e.g., databases) via a communication interface 33.
It will be appreciated that the memory 32 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. The nonvolatile memory may be ROM or PROM. The memory 32 described in embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
The memory 32 in the embodiment of the present application is used to store various kinds of application programs 322 and an operating system 321 to support the operation of the terminal device 30.
The method for locking the terminal device disclosed by the embodiment of the application can be applied to the processor 31 or realized by the processor 31. The processor 31 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in the processor 31 or by instructions in the form of software. The processor 31 may be a general purpose processor, DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like.
The processor 31 may implement or perform the methods, steps and logic blocks provided in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The software modules may be located in a storage medium located in a memory 32 and the processor 31 reads information from the memory 32 to perform the steps of the method described above in connection with its hardware.
Of course, the embodiment of the present application is not limited to being provided as a method and hardware, but may be implemented in various ways, for example, as a storage medium (stored with a program for executing the method for locking a terminal device provided in the embodiment of the present application), the program, when executed by a processor, performs the following operations:
receiving a first instruction sent by a server, wherein the first instruction is used for indicating to lock or unlock a near field communication NFC function of the terminal equipment;
and locking or unlocking the NFC function of the terminal equipment based on the first instruction.
In some alternative embodiments, the program, when executed by the processor, performs the following operations:
and sending the state of the NFC function of the terminal equipment to the server.
In some alternative embodiments, the program, when executed by the processor, performs the following operations:
and if the terminal equipment locks the NFC function based on the first instruction, prohibiting the NFC function from being actively unlocked.
In some alternative embodiments, the program, when executed by the processor, performs the following operations:
and if the NFC function is locked based on the first instruction, the virtual card bound by the terminal equipment is forbidden to be started.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to a program command, and the foregoing program may be stored in a storage medium, where the storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, or the like, which can store program codes.
Alternatively, the above-described integrated units of the present application may be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium, comprising several commands for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.
The technical scheme of the embodiment of the application can be applied to various communication systems, such as: global system for mobile communications (global system of mobile communication, GSM), code division multiple access (code division multiple access, CDMA) system, wideband code division multiple access (wideband code division multiple access, WCDMA) system, general packet radio service (general packet radio service, GPRS), LTE system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE time division duplex (time division duplex, TDD) system, long term evolution advanced (advanced long term evolution, LTE-a) system, NR system, evolution system of NR system, LTE-based access to unlicensed spectrum on unlicensed band, NR-based access to unlicensed spectrum on unlicensed band, NR-U system, universal mobile communication system (universal mobile telecommunication system, UMTS), worldwide interoperability for microwave access (worldwide interoperability for microwave access, wiMAX) communication system, wireless local area network (wireless local area networks, WLAN), wireless fidelity (wireless fidelity, wiFi), next generation communication system or other communication system, etc.
The system architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution provided in the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiments of the present application is equally applicable to similar technical problems.
The server involved in the embodiments of the present application may be a computer device having communication and computing capabilities. The embodiment of the application does not limit the specific technology and the specific equipment form adopted by the server. In the embodiment of the application, the terminal device may be any terminal, for example, the terminal device may be a user device for machine type communication. That is, the terminal device may also be referred to as a user equipment UE, a Mobile Station (MS), a mobile terminal (mobile terminal), a terminal (terminal), etc., which may communicate with one or more core networks via a radio access network (radio access network, RAN), e.g., the terminal device may be a mobile phone (or "cellular" phone), a computer with a mobile terminal, etc., e.g., the terminal device may also be a portable, pocket, hand-held, computer-built-in or car-mounted mobile device, which exchanges voice and/or data with the radio access network. The embodiment of the application is not particularly limited.
Alternatively, the network devices and terminal devices may be deployed on land, including indoors or outdoors, hand-held or vehicle-mounted; the device can be deployed on the water surface; but also on aerial planes, balloons and satellites. The embodiment of the application does not limit the application scenes of the server equipment and the terminal equipment.
Optionally, the server and the terminal device may communicate through a licensed spectrum (licensed spectrum), may also communicate through an unlicensed spectrum (unlicensed spectrum), and may also communicate through both the licensed spectrum and the unlicensed spectrum. The server and the terminal device may communicate with each other through a frequency spectrum of 7 gigahertz (GHz) or less, may communicate through a frequency spectrum of 7GHz or more, and may communicate using both a frequency spectrum of 7GHz or less and a frequency spectrum of 7GHz or more. The embodiment of the application does not limit the spectrum resources used between the server and the terminal equipment.
"terminal device" as used herein includes, but is not limited to, a connection via a wireline, such as via a public-switched telephone network (Public Switched Telephone Networks, PSTN), a digital subscriber line (Digital Subscriber Line, DSL), a digital cable, a direct cable connection; and/or another data connection/network; and/or via a wireless interface, e.g., for a cellular network, a wireless local area network (Wireless Local Area Network, WLAN), a digital television network such as a DVB-H network, a satellite network, an AM-FM broadcast transmitter; and/or means of the other terminal device arranged to receive/transmit communication signals; and/or internet of things (Internet of Things, ioT) devices. Terminal devices arranged to communicate over a wireless interface may be referred to as "wireless communication terminals", "wireless terminals" or "mobile terminals". Examples of mobile terminals include, but are not limited to, satellites or cellular telephones; a personal communications system (Personal Communications System, PCS) terminal that may combine a cellular radiotelephone with data processing, facsimile and data communications capabilities; a PDA that can include a radiotelephone, pager, internet/intranet access, web browser, organizer, calendar, and/or a global positioning system (Global Positioning System, GPS) receiver; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. A terminal device may refer to an access terminal, user Equipment (UE), subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital assistant (Personal Digital Assistant, PDA), a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, an in-vehicle device, a wearable device, a terminal device in a 5G network or a terminal device in a future evolved PLMN, etc.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. A method of locking a terminal device, the method comprising:
in case the terminal device is lost and the server receives a request message sent by the vendor to which the terminal device belongs,
the terminal equipment receives a first instruction sent by the server, wherein the first instruction is used for indicating to lock or unlock a near field communication NFC function of the terminal equipment; the request message is used for requesting to lock or unlock the NFC function of the terminal equipment, and the request message is initiated by a user to which the terminal equipment belongs and sent after the manufacturer to which the terminal equipment belongs checks and passes;
the terminal equipment locks or unlocks the NFC function of the terminal equipment based on the first instruction;
under the condition that the terminal equipment locks the NFC function based on the first instruction, the terminal equipment prohibits starting the virtual card bound by the terminal equipment, and the terminal equipment prohibits actively unlocking the NFC function before the terminal equipment receives the first instruction for unlocking the NFC function sent by the server.
2. The method according to claim 1, wherein the terminal device locks or unlocks the NFC functionality of the terminal device based on the first instruction, comprising:
the instruction pushing service entity of the terminal equipment sends an instruction sequence file corresponding to the first instruction to a data partition of the terminal equipment, and the NFC control entity of the terminal equipment executes the instruction sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, the NFC firmware of the terminal equipment locks or unlocks the NFC function.
3. The method according to claim 1, wherein after the terminal device locks or unlocks the NFC functionality of the terminal device based on the first instruction, the method further comprises:
and the terminal equipment sends the state of the NFC function of the terminal equipment to the server.
4. A terminal device, characterized in that the terminal device comprises:
the terminal equipment comprises a receiving unit, a server and a control unit, wherein the receiving unit is used for receiving a first instruction sent by the server under the condition that terminal equipment is lost and the server receives a request message sent by a manufacturer to which the terminal equipment belongs, and the first instruction is used for indicating to lock or unlock a near field communication NFC function of the terminal equipment; the request message is used for requesting to lock or unlock the NFC function of the terminal equipment, and the request message is initiated by a user to which the terminal equipment belongs and sent after the manufacturer to which the terminal equipment belongs checks and passes;
a processing unit, configured to lock or unlock an NFC function of the terminal device based on the first instruction;
the processing unit is further configured to prohibit starting of the virtual card bound by the terminal device when the NFC function is locked based on the first instruction, and prohibit active unlocking of the NFC function before the receiving unit receives the first instruction for unlocking the NFC function sent by the server.
5. The terminal device according to claim 4, wherein the command push service entity of the terminal device sends a command sequence file corresponding to the first command to a data partition, and the NFC control entity of the terminal device executes the command sequence file;
and if the authentication service entity authenticates that the instruction sequence file is legal, the NFC firmware of the terminal equipment locks or unlocks the NFC function.
6. The terminal device according to claim 4, characterized in that the terminal device further comprises:
and the sending unit is used for sending the state of the NFC function of the terminal equipment to the server.
7. A terminal device, characterized in that the terminal device comprises:
a memory configured to store an executable program;
a processor configured to implement the method of locking a terminal device of any one of claims 1 to 3 by executing an executable program stored in said memory.
8. A storage medium storing an executable program which when executed by a processor implements the method of locking a terminal device of any one of claims 1 to 3.
CN202011387752.XA 2020-12-01 2020-12-01 Method for locking terminal equipment and terminal equipment Active CN112560082B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011387752.XA CN112560082B (en) 2020-12-01 2020-12-01 Method for locking terminal equipment and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011387752.XA CN112560082B (en) 2020-12-01 2020-12-01 Method for locking terminal equipment and terminal equipment

Publications (2)

Publication Number Publication Date
CN112560082A CN112560082A (en) 2021-03-26
CN112560082B true CN112560082B (en) 2023-09-08

Family

ID=75047515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011387752.XA Active CN112560082B (en) 2020-12-01 2020-12-01 Method for locking terminal equipment and terminal equipment

Country Status (1)

Country Link
CN (1) CN112560082B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113316132A (en) * 2021-05-28 2021-08-27 Oppo广东移动通信有限公司 Near field communication control method, terminal device, network device and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103370954A (en) * 2011-03-14 2013-10-23 捷讯研究有限公司 Mobile wireless communications device having a near field communication (NFC) device and providing memory erasure and related methods
WO2013155562A1 (en) * 2012-04-17 2013-10-24 Secure Nfc Pty. Ltd. Nfc card lock
CN104471600A (en) * 2014-04-01 2015-03-25 华为终端有限公司 Safety unit management method and terminal
US9420403B1 (en) * 2012-01-31 2016-08-16 Sprint Communications Company L.P. Remote deactivation of near field communication functionality
JP2017068823A (en) * 2015-09-30 2017-04-06 株式会社東芝 Memory device and information processing system
WO2017116008A1 (en) * 2015-12-30 2017-07-06 송영상 Method, tag and application for providing user terminal lock function
CN107451492A (en) * 2017-07-26 2017-12-08 上海青橙实业有限公司 Mobile terminal unlocking method and mobile terminal
CN108805539A (en) * 2018-02-09 2018-11-13 深圳市微付充科技有限公司 A kind of method of payment, mobile device and storage device that Intrusion Detection based on host snap gauge is quasi-
CN111191213A (en) * 2018-11-14 2020-05-22 华为终端有限公司 Method for deleting security service and electronic equipment
CN111737121A (en) * 2020-06-15 2020-10-02 Oppo(重庆)智能科技有限公司 NFC chip testing method and device, terminal equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8526880B2 (en) * 2010-02-26 2013-09-03 Blackberry Limited Communications device responsive to near field communications (NFC) to enter locked or unlocked operating modes
WO2014142960A1 (en) * 2013-03-15 2014-09-18 Intel Corporation Mechanisms for locking computing devices
CN104240085A (en) * 2013-06-07 2014-12-24 中兴通讯股份有限公司 Mobile terminal and mobile payment safety verification method and device
US10194318B2 (en) * 2013-09-24 2019-01-29 Intel IP Corporation Systems and methods for NFC access control in a secure element centric NFC architecture

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103370954A (en) * 2011-03-14 2013-10-23 捷讯研究有限公司 Mobile wireless communications device having a near field communication (NFC) device and providing memory erasure and related methods
US9420403B1 (en) * 2012-01-31 2016-08-16 Sprint Communications Company L.P. Remote deactivation of near field communication functionality
WO2013155562A1 (en) * 2012-04-17 2013-10-24 Secure Nfc Pty. Ltd. Nfc card lock
CN104471600A (en) * 2014-04-01 2015-03-25 华为终端有限公司 Safety unit management method and terminal
JP2017068823A (en) * 2015-09-30 2017-04-06 株式会社東芝 Memory device and information processing system
WO2017116008A1 (en) * 2015-12-30 2017-07-06 송영상 Method, tag and application for providing user terminal lock function
CN107451492A (en) * 2017-07-26 2017-12-08 上海青橙实业有限公司 Mobile terminal unlocking method and mobile terminal
CN108805539A (en) * 2018-02-09 2018-11-13 深圳市微付充科技有限公司 A kind of method of payment, mobile device and storage device that Intrusion Detection based on host snap gauge is quasi-
CN111191213A (en) * 2018-11-14 2020-05-22 华为终端有限公司 Method for deleting security service and electronic equipment
CN111737121A (en) * 2020-06-15 2020-10-02 Oppo(重庆)智能科技有限公司 NFC chip testing method and device, terminal equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于PKI实现网络通信安全性的研究;邓伟伟;《中国新通信》(第06期);19 *

Also Published As

Publication number Publication date
CN112560082A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
US8655310B1 (en) Control of secure elements through point-of-sale device
JP4803947B2 (en) Electronics
US20120036557A1 (en) Wi-fi access method, access point and wi-fi access system
EP1562394A2 (en) Apparatus and method for setting use restriction of mobile communication terminal
US8839370B2 (en) Restricting access to hardware for which a driver is installed on a computer
US20110077051A1 (en) UICC Control Over Devices Used to Obtain Service
US7275695B2 (en) Portable terminal and function limiting method
EP1821555A1 (en) Method and system for sharing memory area of mobile terminal
US20030093693A1 (en) System and method for providing secured access to mobile devices
US20060186199A1 (en) Apparatus for authorising access to an electronic device
EP1673958B1 (en) Method and system for controlling resources via a mobile terminal, related network and computer program product therefor
CN104503713A (en) Printer and authentication device and running method of printer and control device and method of authentication device
JP5196528B2 (en) Portable terminal device and program
CN112560082B (en) Method for locking terminal equipment and terminal equipment
CN105392133A (en) Method and system for wireless function device to automatically access to wireless access point
CN111031523A (en) Shared bicycle control system and method based on NFC technology
US20090221264A1 (en) Storage system of mobile terminal and access control method
CN113796150A (en) Service transmission method and device, and communication equipment
WO2009145730A1 (en) Method and system for disabling camera feature of a mobile device
CN104718771A (en) Method to disable a network access application in a secure element
JP2008121331A (en) Keyless device for vehicle
CN108282784B (en) Wireless network access method, MiFi terminal, mobile terminal and storage medium
WO2004062243A2 (en) System and method for distributed authorization for access to communications device
US20190191303A1 (en) Deployable Cell And Method For Validating A Deployable Cell To Be Fully Operational
US20140159875A1 (en) Terminal and operation control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant