CN113127852A - SE application management method and device based on chip card and storage medium - Google Patents

SE application management method and device based on chip card and storage medium Download PDF

Info

Publication number
CN113127852A
CN113127852A CN202110317083.7A CN202110317083A CN113127852A CN 113127852 A CN113127852 A CN 113127852A CN 202110317083 A CN202110317083 A CN 202110317083A CN 113127852 A CN113127852 A CN 113127852A
Authority
CN
China
Prior art keywords
application
area
file
profile
format
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110317083.7A
Other languages
Chinese (zh)
Other versions
CN113127852B (en
Inventor
徐小俊
李桂玉
蒋小辉
黄小鹏
沈志成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eastcompeace Technology Co Ltd
Original Assignee
Eastcompeace Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eastcompeace Technology Co Ltd filed Critical Eastcompeace Technology Co Ltd
Priority to CN202110317083.7A priority Critical patent/CN113127852B/en
Publication of CN113127852A publication Critical patent/CN113127852A/en
Application granted granted Critical
Publication of CN113127852B publication Critical patent/CN113127852B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/31Programming languages or programming paradigms

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the technical field of communication, and discloses a chip card-based SE application management method, a chip card-based SE application management device and a storage medium, wherein the chip card-based SE application management method comprises the following steps: constructing a smart card main security area frame, wherein the frame comprises a first area and a plurality of second areas, the data in the second areas are independent, and the data in the second areas can access the data in the first area; receiving a file loading command, judging whether an execution area of the file loading command is a first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic; the loaded file is an executable loaded file, and the first format characteristic comprises a first file name, a first file identifier or a first file format. The invention has at least the following beneficial effects: when the SE application is selected, the SE area is directly positioned, the application selection efficiency is high, no additional rule constraint is generated for an operator, and the method is more flexible and efficient to realize.

Description

SE application management method and device based on chip card and storage medium
Technical Field
The invention relates to the technical field of communication, in particular to a SE application management method and device based on a chip card and a storage medium.
Background
An eUICC (Embedded Universal Integrated Circuit Card) is a new UICC product form, and is Embedded in a terminal device, unlike a conventional UICC, which can be plugged or replaced. The eUICC can configure multiple profiles (user profiles), only one profile can be activated at any time, and the requirements that a user selects an operator after deploying a terminal or wants to change another operator can be met by activating different operator profiles.
In the prior art, the operator information signed by the user may be completed by downloading a profile of the corresponding operator, where the profile includes a security domain, a file system, a key, an application, and the like. Profile signed has two states, active and inactive: the profile is activated, so that the network of the signed operator can be used, and the data communication function can be used; the profile is not activated and the network of the contracted operator cannot be used. The operator network only allows one profile to be active and the others to be inactive.
The downloaded profiles are associated to an eUICC security domain ISDR, and the security domain, the file system, the application and the like in each profile are not interfered with each other. After activating a certain profile, the corresponding MNOSD (mobile network operator security domain) is managed as the main security domain on the card, and the files and applications under the MNOSD can be used. While security domains, file systems, keys, applications, etc. of inactive profiles cannot be used. After a user activates a profile of an operator, an application unrelated to the operator may be downloaded, and an existing specification requires that an application downloaded after the operator profile is activated is installed under an MNOSD corresponding to the operator, for example, an SE application, so in the prior art, when the SE application is used, the profile1 is disabled, and the profile2 is activated, all profiles need to be traversed, the SE application is migrated to the profile2, and the efficiency of activating the profile is affected, and when the SE application is selected without activating the profile, all profiles need to be traversed, and the efficiency of selecting the application is affected.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides a chip card-based SE application management method which can improve the use efficiency of SE application.
The invention also provides a chip card-based SE application management device with the chip card-based SE application management method.
The invention also provides a computer readable storage medium with the SE application management method based on the chip card.
According to the first aspect of the invention, the SE application management method based on the chip card comprises the following steps: constructing a smart card main security area frame, wherein the frame comprises a first area and a plurality of second areas, the data in the second areas are independent from each other, and the data in the second areas can access the data in the first areas; receiving a file loading command, judging whether an execution area of the file loading command is the first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic; the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format.
According to some embodiments of the invention, further comprising the step of: receiving a file loading command, judging whether an execution area of the file loading command is the second area, and if the execution area is the second area, setting the loaded file as a file with a second format characteristic; the second format characteristic comprises a second file name, a second file identifier or a second file format.
According to some embodiments of the invention, the file with the first format characteristic can generate a first application through instantiation, and the first application is set as the application with the first application format characteristic; the file with the second format characteristic can generate a second application through instantiation, and the second application is set to be the application with the second application format characteristic; wherein the first application format feature comprises a first application name, a first application identifier, or a first application format; the second application format characteristic includes a second application name, a second application identification, or a second application format.
According to some embodiments of the invention, further comprising a file deletion process, comprising: receiving a file deleting command, judging whether an execution area of the file deleting command is the first area, and if the execution area is the first area, deleting the file with the first format characteristic; and receiving a file deleting command, judging whether an execution area of the file deleting command is the second area, and deleting the file with the second format characteristic if the execution area is the second area.
According to some embodiments of the invention, there is further included an application deletion process comprising: receiving an application deleting command, judging whether an execution area of the application deleting command is the first area, and if the execution area is the first area, deleting the application with the first application format characteristic; and receiving an application deleting command, judging whether an execution area of the application deleting command is the second area, and deleting the application with the second application format characteristic if the execution area is the second area.
According to some embodiments of the invention, the method further comprises a search process of the application, comprising: receiving an application searching instruction, wherein the application related in the application searching instruction comprises a first application and/or a second application; judging whether the current smart card has activated profile; if the activated profile exists, setting the activated profile as a search target, and searching the application in the activated profile; judging whether the application is found in the activated profile; if the application is found in the activated profile, returning to the position of the application and executing the application; if the activated profile does not exist currently or the application is not found in the activated profile, setting the first area as a search target, and searching the application in the first area; if the application is found in the first area, returning to the position of the application and executing the application; and if the application is not found in the first area, returning that the application does not exist.
According to some embodiments of the present invention, the profiles are set in the second area, the profiles are in one-to-one correspondence with the second area and are equal in number, and the second area includes MNOSD _ profile, key _ profile, application _ profile, and CAP _ profile.
According to some embodiments of the present invention, the first region is an SE region including MNOSD _ SE, key _ SE, application _ SE, and CAP _ SE.
According to a second aspect of the invention, a chip card based SE application management apparatus comprises: the smart card master security area framework building module is used for building a smart card master security area framework, the framework comprises a first area and a plurality of second areas, data in the second areas are independent, and the data in the second areas can access the data in the first areas; the file loading module is used for receiving a file loading command, judging whether an execution area of the file loading command is the first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic; the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format.
A computer-readable storage medium according to an embodiment of the third aspect of the invention, on which a computer program is stored which, when being executed by one or more processors, is capable of performing the steps of the chip-card based SE application management method of any of the above.
The SE application management method based on the chip card at least has the following beneficial effects: when failure activation operation is carried out on the profile, SE application can be directly accessed without special operation, under the condition of no activation of the profile, when the SE application is selected, the SE application is directly positioned to the SE area, the application selection efficiency is high, the life cycle code of the SE application of the scheme completely accords with GP specifications, no special processing is carried out, no additional rule constraint is carried out on a profile operator, and the realization is more flexible and efficient.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic flow chart of a method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for downloading an executable loading file according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart of a method of installing an application according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for deleting a file according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating a method for deleting an application according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a method for searching applications according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a main secure area of an EUICC card according to an embodiment of the present invention;
FIG. 8 is a block diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
It should be understood that, the sequence numbers of the steps in the embodiments of the present invention do not mean the execution sequence, and the execution sequence of each process should be determined by the function and the inherent logic of the process, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and more than, less than, more than, etc. are understood as excluding the present number, and more than, less than, etc. are understood as including the present number. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
Interpretation of terms:
SE application: the scheme refers to applications which are irrelevant to the profile and have safety standard requirements in an eUICC card, and the applications can normally run under the condition that the profile is not activated or switched;
profile: a user profile, also called an attribute parameter set;
MNOSD; a mobile operator security domain;
CAP: a CAP file, namely a Converted Applet (CAP) file.
Before understanding specific embodiments of the present invention, it can be appreciated that:
SE region: refers to an area independent of the profile, whose contents can be accessed by all profiles; SE application: the SE application is an application which is installed on the EUICC card and is irrelevant to the profile, and the application can be normally used when different profiles are switched; profile application: the profile application is an application installed on the EUICC card, related to a profile, belonging to one and only one profile, and can be normally used only when the profile is activated. If the profile is switched, the application cannot be normally used, and from the perspective of a user, the profile application does not exist under the currently activated profile; SE CAP: the CAP is downloaded on the EUICC card and is irrelevant to the profile, and the CAP can be normally used when switching is carried out among different profiles; profile CAP: the CAP is downloaded on the EUICC card, belongs to one profile and only belongs to one profile, the CAP can be normally used only when the profile is activated, if the profile is switched, the CAP cannot be normally used, and the CAP does not exist under the currently activated profile from the perspective of a user; SE CAP information table: the packet-related information of all SE CAPs in the registration card is represented by a packet ID. Any download/delete operation of the SE CAP requires modification of the information table; profile CAP information table: the packet-related information of all profile CAPs related to a profile in the registration card is represented by a packet ID. Any download/delete operation pertaining to a CAP within the profile requires modification of the information table.
Referring to fig. 1, fig. 1 is a schematic flow chart of a method according to an embodiment of the present invention, including:
constructing a smart card main security area frame, wherein the frame comprises a first area and a plurality of second areas, the data in the second areas are independent, and the data in the second areas can access the data in the first area;
receiving a file loading command, judging whether an execution area of the file loading command is a first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic;
the loaded file is an executable loaded file, and the first format characteristic comprises a first file name, a first file identifier or a first file format. And the document feature can be represented in any form within the protection scope of the scheme.
It should be noted that, by dividing the main security area of the smart card into a first area and a plurality of second areas, where the first area may be used as an SE area, and the second area may be used as a profile area, specifically, may be an independent area applied by each operator, and data of the second areas are independent from each other, and data of the first area may be accessed through data of the second areas.
Furthermore, the execution area is judged for the loaded file, and the format of the loaded file is further defined, so that the files in the two areas can be further managed more clearly, the management efficiency of the files is improved, and the calling, deleting and searching speed of the files in the future is also greatly facilitated.
In some embodiments of the invention, further comprising the step of:
receiving a file loading command, judging whether an execution area of the file loading command is a second area, and if the execution area is the second area, setting the loaded file as a file with a second format characteristic;
the second format characteristic includes a second file name, a second file identification, or a second file format.
In a specific embodiment of the present invention, the file with the first format characteristic is a file with a flag of CAP _ SE, and the file with the second format characteristic is a file with a flag of CAP _ profile.
Fig. 2 is a schematic flow chart of a method for downloading an executable loading file according to an embodiment of the present invention, where a file is loaded, it is determined in which area the file is loaded, and in the diagram, the file can be determined according to a selected MNOSD, if the file is in an SE area, MNOSD _ SE, if the file is in a profile area, MNOSD _ profile, and according to the selected loading area, the executable loading file is downloaded, and the downloaded file is identified according to different areas, if the file is in the SE area, the file is identified as CAP _ SE, if the file is in the profile area, the file is identified as CAP _ profile
In some embodiments of the present invention, the file with the first format characteristic is an executable loading file, and can generate the first application through instantiation, and set the first application as the application with the first application format characteristic;
the file with the second format characteristic is an executable loading file, a second application can be generated through instantiation, and the second application is set to be the application with the second application format characteristic;
the first application format characteristic comprises a first application name, a first application identifier or a first application format; the second application format characteristic includes a second application name, a second application identification, or a second application format.
In a specific embodiment of the present invention, the first application is an application with an identifier of application _ SE, and the second application is an application with an identifier of application _ profile.
Fig. 3 is a flowchart illustrating a method for installing an application according to an embodiment of the present invention, where as shown in the figure, it may be determined that an area where the application is installed is the area according to a selected MNOSD, and if the area is the SE area, the area is MNOSD _ SE, and if the area is the profile area, the area is MNOSD _ profile, and according to the selected installation area, the application is installed, and the installed application is respectively identified according to different areas, and if the area is the SE area, the application _ SE is identified, and if the area is the profile area, the application _ profile is identified.
In some embodiments of the present invention, a file deletion process is further included, including:
receiving a file deleting command, judging whether an execution area of the file deleting command is a first area, and if the execution area is the first area, deleting a file with a first format characteristic;
and receiving a file deleting command, judging whether an execution area of the file deleting command is a second area, and deleting the file with the second format characteristic if the execution area is the second area.
Referring to fig. 4, fig. 4 is a flowchart illustrating a file deleting method according to an embodiment of the present invention, as shown in the figure, according to a selected MNOSD, it may be determined in which area a file to be deleted is located, if the file is located in an SE area, MNOSD _ SE, if the file is located in a profile area, MNOSD _ profile, and according to the selected deletion area, a file with an identifier of CAP _ SE in the SE area is deleted, or a file with an identifier of CAP _ profile in the profile area is deleted.
In some embodiments of the present invention, an application deletion process is further included, including:
receiving an application deleting command, judging whether an execution area of the application deleting command is a first area, and if the execution area is the first area, deleting the application with the first application format characteristic;
and receiving an application deleting command, judging whether an execution area of the application deleting command is a second area, and deleting the application with the second application format characteristic if the execution area is the second area.
Fig. 5 is a flowchart of a method for deleting an application according to an embodiment of the present invention, as shown in the figure, according to a selected MNOSD, which area an application that needs to be deleted is in may be determined, if the application is in an SE area, MNOSD _ SE, if the application is in a profile area, MNOSD _ profile, and according to the selected deletion area, a file with an application _ SE identifier in the SE area or a file with an application _ profile identifier in the profile area may be deleted.
Referring to fig. 6, fig. 6 is a schematic flowchart of a method for searching for an application according to an embodiment of the present invention, including:
receiving an application searching instruction, wherein the application related in the application searching instruction comprises a first application and/or a second application;
judging whether the current smart card has activated profile;
if the activated profile exists, setting the activated profile as a search target, and searching for an application in the activated profile;
judging whether the application is found in the activated profile;
if the application is found in the activated profile, returning to the position of the application and executing the application;
if the activated profile does not exist currently or the application is not found in the activated profile, setting the first area as a search target, and searching the application in the first area;
if the application is found in the first area, returning to the position of the application and executing the application;
and if the application is not found in the first area, returning that the application does not exist.
Fig. 7 shows a structural schematic diagram of a main security area of an EUICC card according to an embodiment of the present invention, as shown in fig. 7, a main security domain of the EUICC card is ISD-R, and is divided into an SE area and a plurality of profile areas, where the plurality of profile areas are respectively numbered profile1, profile2, profile3, and the like, where it can be understood that the number of profile areas is equal to the number of second areas, and may represent the number of operators supported by a smart card, that is, the profiles are set in the second areas, the profiles are in one-to-one correspondence with the second areas and are equal in number, and the profile areas include MNOSD _ profile, key _ profile, application _ profile, and CAP _ profile.
Referring to fig. 7, the first region is an SE region, and the SE region includes MNOSD _ SE, key _ SE, application _ SE, and CAP _ SE.
Fig. 8 shows a block schematic diagram of a device according to an embodiment of the present invention, which is used for implementing the SE application management method based on chip card, and includes:
the smart card master security area framework building module is used for building a smart card master security area framework, the framework comprises a first area and a plurality of second areas, data in the second areas are independent, and the data in the second areas can access the data in the first areas;
the file loading module is used for receiving a file loading command, judging whether an execution area of the file loading command is a first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic;
the loaded file is an executable loaded file, and the first format characteristic comprises a first file name, a first file identifier or a first file format.
Embodiments of the present invention also include a computer-readable storage medium, wherein the computer-readable storage medium includes a stored computer program; the computer program controls, when running, the device on which the computer-readable storage medium is located to perform the chip-card based SE application management method.
According to the scheme, a relevant rule is defined for distinguishing SE application from profile application, the rule follows GP specifications, according to the GP specification description, any security domain in the EUICC card has a corresponding associated security domain, and any executable loading file also has a corresponding associated security domain.
By the SE application management method based on the chip card, when failure activation operation is carried out on the profile, the SE application can be directly accessed without special operation, and when the SE application is selected under the condition of no activation of the profile, the SE application is directly positioned to the SE area, so that the selection and application efficiency is high.
Although specific embodiments have been described herein, those of ordinary skill in the art will recognize that many other modifications or alternative embodiments are equally within the scope of this disclosure. For example, any of the functions and/or processing capabilities described in connection with a particular device or component may be performed by any other device or component. In addition, while various illustrative implementations and architectures have been described in accordance with embodiments of the present disclosure, those of ordinary skill in the art will recognize that many other modifications of the illustrative implementations and architectures herein are also within the scope of the present disclosure.
Certain aspects of the present disclosure are described above with reference to block diagrams and flowchart illustrations of systems, methods, systems, and/or computer program products according to example embodiments. It will be understood that one or more blocks of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by executing computer-executable program instructions. Also, according to some embodiments, some blocks of the block diagrams and flow diagrams may not necessarily be performed in the order shown, or may not necessarily be performed in their entirety. In addition, additional components and/or operations beyond those shown in the block diagrams and flow diagrams may be present in certain embodiments.
Accordingly, blocks of the block diagrams and flowchart illustrations support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special purpose hardware and computer instructions.
A program module, application, etc. herein can include one or more software components, including, for example, software objects, methods, data structures, etc. Each such software component may include computer-executable instructions that, in response to execution, cause at least a portion of the functionality herein (e.g., one or more operations of the illustrative methods herein) to be performed.
The software components may be encoded in any of a variety of programming languages. An illustrative programming language may be a low-level programming language, such as assembly language associated with a particular hardware architecture and/or operating system platform. Software components that include assembly language instructions may need to be converted by an assembler program into executable machine code prior to execution by a hardware architecture and/or platform. Another exemplary programming language may be a higher level programming language, which may be portable across a variety of architectures. Software components that include higher level programming languages may need to be converted to an intermediate representation by an interpreter or compiler before execution. Other examples of programming languages include, but are not limited to, a macro language, a shell or command language, a job control language, a scripting language, a database query or search language, or a report writing language. In one or more exemplary embodiments, a software component containing instructions of one of the above programming language examples may be executed directly by an operating system or other software component without first being converted to another form.
The software components may be stored as files or other data storage constructs. Software components of similar types or related functionality may be stored together, such as in a particular directory, folder, or library. Software components may be static (e.g., preset or fixed) or dynamic (e.g., created or modified at execution time).
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.

Claims (10)

1. A SE application management method based on chip card is characterized by comprising the following steps:
constructing a smart card main security area frame, wherein the frame comprises a first area and a plurality of second areas, the data in the second areas are independent from each other, and the data in the second areas can access the data in the first areas;
receiving a file loading command, judging whether an execution area of the file loading command is the first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic;
the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format.
2. The method for chip-card based SE application management according to claim 1, further comprising the steps of:
receiving a file loading command, judging whether an execution area of the file loading command is the second area, and if the execution area is the second area, setting the loaded file as a file with a second format characteristic;
the second format characteristic comprises a second file name, a second file identifier or a second file format.
3. Chip-card based SE application management method according to claim 2,
the file with the first format characteristic can generate a first application through instantiation, and the first application is set to be the application with the first application format characteristic;
the file with the second format characteristic can generate a second application through instantiation, and the second application is set to be the application with the second application format characteristic;
wherein the first application format feature comprises a first application name, a first application identifier, or a first application format; the second application format characteristic includes a second application name, a second application identification, or a second application format.
4. The chip-card-based SE application management method as claimed in claim 3, further comprising a file deletion process comprising:
receiving a file deleting command, judging whether an execution area of the file deleting command is the first area, and if the execution area is the first area, deleting the file with the first format characteristic;
and receiving a file deleting command, judging whether an execution area of the file deleting command is the second area, and deleting the file with the second format characteristic if the execution area is the second area.
5. The method for chip-card-based SE application management as claimed in claim 3, further comprising an application deletion process comprising:
receiving an application deleting command, judging whether an execution area of the application deleting command is the first area, and if the execution area is the first area, deleting the application with the first application format characteristic;
and receiving an application deleting command, judging whether an execution area of the application deleting command is the second area, and deleting the application with the second application format characteristic if the execution area is the second area.
6. The method for chip-card-based SE application management as claimed in claim 1, further comprising an application lookup procedure comprising:
receiving an application searching instruction, wherein the application related in the application searching instruction comprises a first application and/or a second application;
judging whether the current smart card has activated profile;
if the activated profile exists, setting the activated profile as a search target, and searching the application in the activated profile;
judging whether the application is found in the activated profile;
if the application is found in the activated profile, returning to the position of the application and executing the application;
if the activated profile does not exist currently or the application is not found in the activated profile, setting the first area as a search target, and searching the application in the first area;
if the application is found in the first area, returning to the position of the application and executing the application;
and if the application is not found in the first area, returning that the application does not exist.
7. The SE application management method based on chip cards of claim 6, wherein profiles are arranged in the second area, the profiles are in one-to-one correspondence with the second area and are equal in number, and the second area comprises MNOSD _ profile, Key _ profile, application _ profile and CAP _ profile.
8. A SE application managing method on a chip card according to any one of claims 1-7,
the first area is an SE area, and the SE area comprises MNOSD _ SE, key _ SE, application _ SE and CAP _ SE.
9. A chip card based SE application management apparatus for implementing the chip card based SE application management method of any of claims 1-8, comprising:
the smart card master security area framework building module is used for building a smart card master security area framework, the framework comprises a first area and a plurality of second areas, data in the second areas are independent, and the data in the second areas can access the data in the first areas;
the file loading module is used for receiving a file loading command, judging whether an execution area of the file loading command is the first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic;
the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored computer program; the computer program controls, when executed, an apparatus on which the computer-readable storage medium is located to perform the method for chip-card based SE application management according to any of claims 1 to 8.
CN202110317083.7A 2021-03-25 2021-03-25 SE application management method and device based on chip card and storage medium Active CN113127852B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110317083.7A CN113127852B (en) 2021-03-25 2021-03-25 SE application management method and device based on chip card and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110317083.7A CN113127852B (en) 2021-03-25 2021-03-25 SE application management method and device based on chip card and storage medium

Publications (2)

Publication Number Publication Date
CN113127852A true CN113127852A (en) 2021-07-16
CN113127852B CN113127852B (en) 2024-04-30

Family

ID=76773885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110317083.7A Active CN113127852B (en) 2021-03-25 2021-03-25 SE application management method and device based on chip card and storage medium

Country Status (1)

Country Link
CN (1) CN113127852B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115278646A (en) * 2022-07-26 2022-11-01 无锡融卡科技有限公司 Embedded SIM card, terminal and method for selecting, downloading and installing application program

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105451214A (en) * 2015-12-04 2016-03-30 中国联合网络通信集团有限公司 Card application access method and device
CN105704702A (en) * 2016-04-20 2016-06-22 中国联合网络通信集团有限公司 Applet downloading method and device
CN106664112A (en) * 2015-01-04 2017-05-10 华为技术有限公司 Data updating method and apparatus, and embedded universal integrated circuit card
CN108702386A (en) * 2017-06-14 2018-10-23 华为技术有限公司 A kind of management method and device of universal embedded integrated circuit card configuration file
CN108924821A (en) * 2018-08-10 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of method and its eUICC card managing application unrelated with operator
CN111417109A (en) * 2020-03-17 2020-07-14 江苏恒宝智能系统技术有限公司 eSIM card and its operator file management method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106664112A (en) * 2015-01-04 2017-05-10 华为技术有限公司 Data updating method and apparatus, and embedded universal integrated circuit card
CN105451214A (en) * 2015-12-04 2016-03-30 中国联合网络通信集团有限公司 Card application access method and device
CN105704702A (en) * 2016-04-20 2016-06-22 中国联合网络通信集团有限公司 Applet downloading method and device
CN108702386A (en) * 2017-06-14 2018-10-23 华为技术有限公司 A kind of management method and device of universal embedded integrated circuit card configuration file
CN108924821A (en) * 2018-08-10 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of method and its eUICC card managing application unrelated with operator
CN111417109A (en) * 2020-03-17 2020-07-14 江苏恒宝智能系统技术有限公司 eSIM card and its operator file management method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115278646A (en) * 2022-07-26 2022-11-01 无锡融卡科技有限公司 Embedded SIM card, terminal and method for selecting, downloading and installing application program

Also Published As

Publication number Publication date
CN113127852B (en) 2024-04-30

Similar Documents

Publication Publication Date Title
KR100911604B1 (en) System and method for the management of wireless communications device system software downloads in the field
CN111131352B (en) Theme switching method and device
CN105335187A (en) Application processing method and apparatus
CN108121594B (en) Process management method and device
CN104182255A (en) Method and terminal for upgrading library files of system application
CN101533481B (en) Method for expanding function of mask smart card
CN101895883B (en) Smart card supporting authentication arithmetic update and method for updating authentication arithmetic
CN105630518A (en) Method and device for updating resources of Android application software
CN103716346A (en) Management method and device of application on android handset client
CN109195157B (en) Application management method and device and terminal
CN104699503A (en) Method and device for replacing function execution logic in Android system
CN104731622A (en) Application program loading method and device and mobile terminal
CN113127852B (en) SE application management method and device based on chip card and storage medium
CN114090475A (en) USB device redirection method, system, electronic device and storage medium
CN111475825A (en) Role authority setting method and device
CN113672296B (en) Custom application switching method, switching device, electronic equipment and storage medium
CN103677933A (en) Patching method and system for smart card
CN102184374A (en) Method and device for downloading file based on Java intelligent card
CN113127075B (en) Method and device for managing registration table of smart card and storage medium
CN108121574B (en) Hot upgrading method and device for kernel module and virtual machine system
CN113360251B (en) Intelligent contract execution and cross-contract calling method, device and storage medium
EP2898413B1 (en) A security module and a method for optimum memory utilization
CN101770508A (en) Data access method in mobile communication terminal and equipment thereof
CN113568637B (en) Method and device for updating and managing smart card system package
CN113360252B (en) Container-based accelerated intelligent contract execution method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant