CN113127852B - SE application management method and device based on chip card and storage medium - Google Patents

SE application management method and device based on chip card and storage medium Download PDF

Info

Publication number
CN113127852B
CN113127852B CN202110317083.7A CN202110317083A CN113127852B CN 113127852 B CN113127852 B CN 113127852B CN 202110317083 A CN202110317083 A CN 202110317083A CN 113127852 B CN113127852 B CN 113127852B
Authority
CN
China
Prior art keywords
application
area
file
format
profile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110317083.7A
Other languages
Chinese (zh)
Other versions
CN113127852A (en
Inventor
徐小俊
李桂玉
蒋小辉
黄小鹏
沈志成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eastcompeace Technology Co Ltd
Original Assignee
Eastcompeace Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eastcompeace Technology Co Ltd filed Critical Eastcompeace Technology Co Ltd
Priority to CN202110317083.7A priority Critical patent/CN113127852B/en
Publication of CN113127852A publication Critical patent/CN113127852A/en
Application granted granted Critical
Publication of CN113127852B publication Critical patent/CN113127852B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/31Programming languages or programming paradigms

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the technical field of communication, and discloses a chip card-based SE application management method, a device and a storage medium, wherein the chip card-based SE application management method comprises the following steps: constructing a main security area framework of the smart card, wherein the framework comprises a first area and a plurality of second areas, the data in the second areas are mutually independent, and the data in the second areas can access the data in the first area; receiving a file loading command, judging whether an execution area of the file loading command is a first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic; the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format. The invention has at least the following beneficial effects: when the SE application is selected, the SE application is directly positioned in the SE area, the efficiency of selecting the application is high, no additional rule constraint is caused to operators, and the implementation is more flexible and efficient.

Description

SE application management method and device based on chip card and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for managing SE applications based on a chip card, and a storage medium.
Background
The eUICC (Embedded Universal Integrated Circuit Card ) is a new UICC product form, and is embedded in a terminal device, and can not be plugged or replaced like a traditional UICC. The eUICC can configure multiple profiles (user profiles), only one profile can be activated at any time, and by activating different operator profiles, the requirement that the user selects an operator after deploying the terminal or wants to replace another operator can be met.
In the prior art, the operator information signed by the user may be completed by downloading the profile of the corresponding operator, where the profile includes a security domain, a file system, a key, an application, and the like. The profile of the subscription has two states, active and inactive: the network of the contracted operator can be used by activating profile, and a data communication function can be used; the network of the contracted carrier cannot be used without activating profile. The operator network allows only one profile to be active and the other inactive.
The downloaded profiles are associated to the eUICC security domain ISDR, while the security domains, file systems, applications, etc. in each profile do not interfere with each other. After a profile is activated, the corresponding MNOSD (mobile network operator security domain) is managed as a main security domain on the card, and the files and applications under the card can be used. And security domains, file systems, keys, applications, etc. of the unactivated profile cannot be used. After the user activates the profile of the operator, the application irrelevant to the operator can be downloaded, and the existing specification requires that the application downloaded after the operator profile is activated is installed under MNOSD corresponding to the operator, such as an SE application, so in the prior art, when the SE application is used, the profile1 is disabled and the profile2 is activated, all profiles need to be traversed, the SE application is migrated to the profile2, the efficiency of activating the profile is affected, and when the SE application is selected without activating the profile, all profiles need to be traversed, and the efficiency of selecting the application is affected.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. Therefore, the invention provides the SE application management method based on the chip card, which can improve the service efficiency of the SE application.
The invention also provides a SE application management device based on the chip card, which is provided with the SE application management method based on the chip card.
The invention also provides a computer readable storage medium with the SE application management method based on the chip card.
An embodiment of the invention provides a method for managing SE application based on a chip card, comprising the following steps: constructing a main security area framework of the smart card, wherein the framework comprises a first area and a plurality of second areas, the data in the second areas are mutually independent, and the data in the second areas can access the data in the first area; receiving a file loading command, judging whether an execution area of the file loading command is the first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic; the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format.
According to some embodiments of the invention, the method further comprises the step of: receiving a file loading command, judging whether an execution area of the file loading command is the second area, and if the execution area is the second area, setting the loaded file as a file with a second format characteristic; the second format feature includes a second file name, a second file identification, or a second file format.
According to some embodiments of the invention, the file having the first format feature is capable of generating a first application by instantiation, and the first application is set as an application having the first application format feature; the file with the second format characteristic can generate a second application through instantiation, and the second application is set to be an application with the second application format characteristic; the first application format feature comprises a first application name, a first application identifier or a first application format; the second application format feature includes a second application name, a second application identification, or a second application format.
According to some embodiments of the invention, the method further comprises a file deletion process, including: receiving a file deleting command, judging whether an execution area of the file deleting command is the first area, and deleting a file with the first format characteristic if the execution area is the first area; and receiving a file deleting command, judging whether an execution area of the file deleting command is the second area, and deleting the file with the second format characteristic if the execution area is the second area.
According to some embodiments of the invention, the method further comprises an application deletion process, including: receiving an application deleting command, judging whether an execution area of the application deleting command is the first area, and deleting an application with the first application format characteristic if the execution area is the first area; and receiving an application deleting command, judging whether an execution area of the application deleting command is the second area, and deleting the application with the second application format characteristic if the execution area is the second area.
According to some embodiments of the invention, the method further comprises a search process of the application, including: receiving an application searching instruction, wherein the application related in the application searching instruction comprises a first application and/or a second application; judging whether activated profile exists on the current smart card; if the activated profile exists, setting the activated profile as a searching target, and searching the application in the activated profile; judging whether the application is found in the activated profile; if the application is found in the activated profile, returning to the position of the application and executing the application; if the activated profile does not exist currently or the application is not found in the activated profile, setting the first area as a finding target, and finding the application in the first area; if the application is found in the first area, returning to the position of the application and executing the application; and if the application is not found in the first area, returning that the application does not exist.
According to some embodiments of the present invention, the profile is set in the second area, where the profile corresponds to the second area one by one and the number of the profiles is equal, and the second area includes MNOSD _profile, key_profile, application_profile, and cap_profile.
According to some embodiments of the invention, the first area is a SE area including MNOSD _se, key_se, application_se, and cap_se.
A chip card-based SE application management apparatus according to an embodiment of a second aspect of the present invention includes: the intelligent card main safety area framework construction module is used for constructing an intelligent card main safety area framework, the framework comprises a first area and a plurality of second areas, the data in the second areas are mutually independent, and the data in the second areas can access the data in the first area; the file loading module is used for receiving a file loading command, judging whether an execution area of the file loading command is the first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic; the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format.
A computer-readable storage medium according to an embodiment of the third aspect of the present invention has stored thereon a computer program capable of performing the steps of the chip card based SE application management method of any of the above described embodiments when executed by one or more processors.
The SE application management method based on the chip card has at least the following beneficial effects: when the profile is subjected to the failure activation operation, the SE application can be directly accessed without special operation, when the SE application is selected under the condition of no activation of the profile, the SE application is directly positioned in the SE area, the efficiency of the selection application is high, and the life cycle code of the SE application in the scheme completely accords with the GP standard, has no special treatment and no additional rule constraint on a profile operator, and is more flexible and efficient to realize.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
FIG. 1 is a flow chart of a method according to an embodiment of the invention;
FIG. 2 is a flowchart illustrating a method for downloading an executable loading file according to an embodiment of the present invention;
FIG. 3 is a flow chart of a method of installing an application according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for deleting a file according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating a method for deleting an application according to an embodiment of the present invention;
FIG. 6 is a flow chart of a method for finding an application according to an embodiment of the present invention;
Fig. 7 is a schematic structural diagram of a main security area of an EUICC card according to an embodiment of the present invention;
fig. 8 is a block schematic diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
It should be understood that, the sequence number of each step in the embodiment of the present invention does not mean that the execution sequence of each process should be determined by the function and the internal logic of each process, and should not limit the implementation process of the embodiment of the present invention.
In the description of the present invention, a plurality means one or more, and a plurality means two or more, and it is understood that greater than, less than, exceeding, etc. does not include the present number, and it is understood that greater than, less than, within, etc. include the present number. The description of the first and second is for the purpose of distinguishing between technical features only and should not be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
Term interpretation:
SE application: security elements application, the scheme refers to an application which has safety standard requirements and is irrelevant to profile in the eUICC card, and the application can normally run under the condition that no active profile or the profile is switched;
Profile: user profile, also called attribute parameter set;
MNOSD; a mobile operator security domain;
CAP: a CAP file, converted Applet (CAP) file.
Before understanding the embodiments of the present invention, it may be appreciated that:
SE region: refers to an area independent of the profile, the content of which can be accessed by all profiles; SE application: the SE application is an application which is installed on the EUICC card and is irrelevant to the profiles, and the application can be normally used when switching between different profiles; profile application: the profile application is an application installed on the EUICC card, which is related to the profile, belongs to and only belongs to one profile, and can be normally used only when the profile is activated. If the profile is switched, the application cannot be normally used, and from the perspective of a user, the profile application does not exist under the currently activated profile; SE CAP: the CAP is downloaded on the EUICC card and is irrelevant to the profiles, and can be normally used when switching between different profiles; profile CAP: the CAP related to the profile is downloaded on the EUICC card, belongs to and only belongs to one profile, can be normally used only when the profile is activated, and cannot be normally used if the profile is switched, and does not exist under the currently activated profile from the perspective of a user; SE CAP information table: packet related information of all SE CAPs in the registration card is represented by a packet ID. Any one SE CAP download/delete operation requires modification of the information table; profile CAP information table: the packet related information of all profile CAPs related to the profile in the registration card is represented by a packet ID. Any download/delete operation of the CAP belonging to the profile requires modification of the information table.
Referring to fig. 1, fig. 1 is a flow chart of a method according to an embodiment of the present invention, including:
constructing a main security area framework of the smart card, wherein the framework comprises a first area and a plurality of second areas, the data in the second areas are mutually independent, and the data in the second areas can access the data in the first area;
Receiving a file loading command, judging whether an execution area of the file loading command is a first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic;
the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format. The present invention is not limited thereto, and all forms capable of characterizing the file are within the scope of the present invention.
It should be noted that, by dividing the main security area of the smart card into a first area and a plurality of second areas, where the first area may be used as an SE area, the second area may be used as a profile area, specifically, may be an independent area applied by each operator, and the data of the second area are independent of each other, and the data of the first area may be accessed through the data of the second area, it may be understood that by this policy, a process that after the operator is activated by switching, the SE application associated with the operator needs to be migrated again may be solved, and in the case that no operator is activated, it is not necessary to search all profiles by traversal, so as to affect the efficiency of selecting the application.
Furthermore, the execution area is judged for the loaded file, and the format of the loaded file is further defined, so that the files in the two areas can be further and clearly managed, the management efficiency of the files is improved, and the file calling, deleting and searching speeds in the future are greatly facilitated.
In some embodiments of the invention, the method further comprises the steps of:
Receiving a file loading command, judging whether an execution area of the file loading command is a second area, and if the execution area is the second area, setting the loaded file as a file with a second format characteristic;
The second format feature includes a second file name, a second file identification, or a second file format.
In a specific embodiment of the present invention, the file with the first format characteristic is a file with the identifier cap_se, and the file with the second format characteristic is a file with the identifier cap_profile.
FIG. 2 is a flow chart of an executable loading file downloading method according to an embodiment of the present invention, where a file is loaded, it is determined that the file is loaded in that area, in the drawing, it may be determined according to the selection MNOSD, if in the SE area, MNOSD _SE, if in the profile area, MNOSD _profile, and according to the selected loading area, the executable loading file is downloaded, the downloaded file is respectively identified according to different areas, if in the SE area, CAP_SE is identified, if in the profile area, CAP_profile is identified
In some embodiments of the present invention, the file having the first format feature is an executable loading file, and the first application can be generated through instantiation, and the first application is set as an application having the first application format feature;
The file with the second format characteristic is an executable loading file, a second application can be generated through instantiation, and the second application is set as an application with the second application format characteristic;
the first application format feature comprises a first application name, a first application identifier or a first application format; the second application format feature includes a second application name, a second application identification, or a second application format.
In a specific embodiment of the present invention, the first application is an application with an identifier of application_se, and the second application is an application with an identifier of application_profile.
Fig. 3 is a flow chart of a method for installing an application according to an embodiment of the present invention, where, as shown in the drawing, according to a selection MNOSD, it may be determined that an area where the application is installed is in that area, if in an SE area, MNOSD _se, if in a profile area, MNOSD _profile, according to the selected installation area, the application is installed, and the installed application is respectively identified according to different areas, if in an SE area, application_se is identified, if in a profile area, application_profile is identified.
In some embodiments of the present invention, the method further includes a file deletion process, including:
Receiving a file deleting command, judging whether an execution area of the file deleting command is a first area, and deleting a file with a first format characteristic if the execution area is the first area;
And receiving a file deleting command, judging whether an execution area of the file deleting command is a second area, and deleting the file with the second format characteristic if the execution area is the second area.
Referring to fig. 4, fig. 4 is a flowchart of a method for deleting files according to an embodiment of the present invention, as shown in the fig. 4, according to a selection MNOSD, it can be determined in which area the file to be deleted is, if in the SE area, MNOSD _se, if in the profile area, MNOSD _profile, and according to the selected deletion area, deleting the file with the identifier cap_se in the SE area or deleting the file with the identifier cap_profile in the profile area.
In some embodiments of the present invention, the method further includes an application deletion process, including:
Receiving an application deleting command, judging whether an execution area of the application deleting command is a first area, and deleting an application with a first application format characteristic if the execution area is the first area;
And receiving an application deleting command, judging whether an execution area of the application deleting command is a second area, and deleting the application with the second application format characteristic if the execution area is the second area.
Fig. 5 is a flowchart of a method for deleting an application according to an embodiment of the present invention, where according to a selection MNOSD, it may be determined in which area an application to be deleted is, if in an SE area, MNOSD _se, if in a profile area, MNOSD _profile, and according to a selection delete area, deleting a file in an SE area having a identifier of application_se, or deleting a file in a profile area having a identifier of application_profile.
Referring to fig. 6, fig. 6 is a flowchart of a method for searching for an application according to an embodiment of the present invention, including:
Receiving an application searching instruction, wherein the application related in the application searching instruction comprises a first application and/or a second application;
judging whether activated profile exists on the current smart card;
If the activated profile exists, setting the activated profile as a searching target, and searching for an application in the activated profile;
judging whether an application is found in the activated profile;
if the application is found in the activated profile, returning to the position of the application and executing the application;
If the activated profile does not exist currently or the application is not found in the activated profile, setting a first area as a finding target, and finding the application in the first area;
if the application is found in the first area, returning to the position of the application and executing the application;
if no application is found in the first region, the return application does not exist.
Fig. 7 shows a schematic structural diagram of a main security area of an EUICC card according to an embodiment of the present invention, where, as shown in fig. 7, the main security area of the EUICC card is ISD-R, and is divided into an SE area and a plurality of profile areas, and the plurality of profile areas are numbered as profile1, profile2, profile3, etc., where, it can be understood that the number of profile areas is equal to the number of second areas, and may represent the number of operators supported by the smart card, that is, the profiles are set in the second areas, and the profiles and the second areas are in one-to-one correspondence and equal in number, and the profile areas include MNOSD _profile, key_profile, application_profile, and cap_profile.
Referring to fig. 7, the first area is a SE area including MNOSD _se, key_se, application_se, and cap_se.
Fig. 8 shows a block schematic diagram of an apparatus according to an embodiment of the present invention, configured to implement the above-described SE application management method based on a chip card, including:
the intelligent card main safety area framework construction module is used for constructing an intelligent card main safety area framework, the framework comprises a first area and a plurality of second areas, the data in the second areas are mutually independent, and the data in the second areas can access the data in the first areas;
the file loading module is used for receiving a file loading command, judging whether an execution area of the file loading command is a first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic;
the loaded file is an executable loaded file, and the first format feature comprises a first file name, a first file identifier or a first file format.
Embodiments of the present invention also include a computer-readable storage medium, characterized in that the computer-readable storage medium includes a stored computer program; the computer program, when run, controls the device in which the computer-readable storage medium resides to perform the chip card based SE application management method.
The scheme defines relevant rules for distinguishing SE application from profile application, the rules follow GP specification, any security domain in EUICC card has its corresponding associated security domain according to GP specification description, and any executable loading file has its corresponding associated security domain.
According to the SE application management method based on the chip card, when the profile is subjected to the failure activation operation, the SE application can be directly accessed without special operation, when the SE application is selected under the condition of no activation of the profile, the SE application is directly positioned in the SE area, the efficiency of the selection application is high, the life cycle code of the SE application completely accords with the GP standard, no special treatment is carried out, no additional rule constraint is carried out on a profile operator, and the implementation is more flexible and efficient.
Although specific embodiments are described herein, those of ordinary skill in the art will recognize that many other modifications or alternative embodiments are also within the scope of the present disclosure. For example, any of the functions and/or processing capabilities described in connection with a particular device or component may be performed by any other device or component. In addition, while various exemplary implementations and architectures have been described in terms of embodiments of the present disclosure, those of ordinary skill in the art will recognize that many other modifications of the exemplary implementations and architectures herein are also within the scope of the present disclosure.
Certain aspects of the present disclosure are described above with reference to block diagrams and flowchart illustrations of systems, methods, systems and/or computer program products according to example embodiments. It will be understood that one or more blocks of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by executing computer-executable program instructions. Also, some of the blocks in the block diagrams and flowcharts may not need to be performed in the order shown, or may not need to be performed in their entirety, according to some embodiments. In addition, additional components and/or operations beyond those shown in blocks of the block diagrams and flowcharts may be present in some embodiments.
Accordingly, blocks of the block diagrams and flowchart illustrations support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special purpose hardware and computer instructions.
Program modules, applications, etc. herein may include one or more software components including, for example, software objects, methods, data structures, etc. Each such software component may include computer-executable instructions that, in response to execution, cause at least a portion of the functions herein (e.g., one or more operations of the exemplary methods herein) to be performed.
The software components may be encoded in any of a variety of programming languages. An exemplary programming language may be a low-level programming language, such as an assembly language associated with a particular hardware architecture and/or operating system platform. Software components including assembly language instructions may need to be converted into executable machine code by an assembler prior to execution by a hardware architecture and/or platform. Another exemplary programming language may be a higher level programming language that may be portable across a variety of architectures. Software components, including higher-level programming languages, may need to be converted to an intermediate representation by an interpreter or compiler before execution. Other examples of programming languages include, but are not limited to, a macro language, a shell or command language, a job control language, a scripting language, a database query or search language, or a report writing language. In one or more exemplary embodiments, a software component containing instructions of one of the programming language examples described above may be executed directly by an operating system or other software component without first converting to another form.
The software components may be stored as files or other data storage constructs. Software components having similar types or related functionality may be stored together, such as in a particular directory, folder, or library. The software components may be static (e.g., preset or fixed) or dynamic (e.g., created or modified at execution time).
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of one of ordinary skill in the art without departing from the spirit of the present invention.

Claims (9)

1. A SE application management method based on a chip card, comprising the steps of:
Constructing a main security area framework of the smart card, wherein the framework comprises a first area and a plurality of second areas, the data in the second areas are mutually independent, and the data in the second areas can access the data in the first area;
Receiving a file loading command, judging whether an execution area of the file loading command is the first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic;
the loaded file is an executable loaded file, and the first format characteristic comprises a first file name, a first file identifier or a first file format;
the method also comprises a search flow of the application, which comprises the following steps:
Receiving an application searching instruction, wherein the application related in the application searching instruction comprises a first application and/or a second application;
judging whether activated profile exists on the current smart card;
If the activated profile exists, setting the activated profile as a searching target, and searching the application in the activated profile;
judging whether the application is found in the activated profile;
If the application is found in the activated profile, returning to the position of the application and executing the application;
if the activated profile does not exist currently or the application is not found in the activated profile, setting the first area as a finding target, and finding the application in the first area;
If the application is found in the first area, returning to the position of the application and executing the application;
And if the application is not found in the first area, returning that the application does not exist.
2. The chip card based SE application management method of claim 1, further comprising the steps of:
receiving a file loading command, judging whether an execution area of the file loading command is the second area, and if the execution area is the second area, setting the loaded file as a file with a second format characteristic;
the second format feature includes a second file name, a second file identification, or a second file format.
3. The method for chip card based SE application management as recited in claim 2, wherein,
The file with the first format characteristic can generate a first application through instantiation, and the first application is set to be an application with the first application format characteristic;
the file with the second format characteristic can generate a second application through instantiation, and the second application is set to be an application with the second application format characteristic;
the first application format feature comprises a first application name, a first application identifier or a first application format; the second application format feature includes a second application name, a second application identification, or a second application format.
4. The SE application management method based on a chip card as claimed in claim 3, further comprising a file deletion process comprising:
Receiving a file deleting command, judging whether an execution area of the file deleting command is the first area, and deleting a file with the first format characteristic if the execution area is the first area;
and receiving a file deleting command, judging whether an execution area of the file deleting command is the second area, and deleting the file with the second format characteristic if the execution area is the second area.
5. The SE application management method based on a chip card as claimed in claim 3, further comprising an application deletion process comprising:
receiving an application deleting command, judging whether an execution area of the application deleting command is the first area, and deleting an application with the first application format characteristic if the execution area is the first area;
and receiving an application deleting command, judging whether an execution area of the application deleting command is the second area, and deleting the application with the second application format characteristic if the execution area is the second area.
6. The SE application management method based on a chip card of claim 1, wherein profiles are set in the second area, the profiles are in one-to-one correspondence with the second area and have the same number, and the second area includes MNOSD _profile, key_profile, application_profile, and cap_profile.
7. The method for chip card based SE application management as described in any of claims 1 to 6, wherein,
The first region is a SE region including MNOSD _SE, key_SE, application_SE, and CAP_SE.
8. A chip card based SE application management apparatus for implementing the chip card based SE application management method of any one of claims 1-7, comprising:
the intelligent card main safety area framework construction module is used for constructing an intelligent card main safety area framework, the framework comprises a first area and a plurality of second areas, the data in the second areas are mutually independent, and the data in the second areas can access the data in the first area;
The file loading module is used for receiving a file loading command, judging whether an execution area of the file loading command is the first area, and if the execution area is the first area, setting the loaded file as a file with a first format characteristic;
the loaded file is an executable loaded file, and the first format characteristic comprises a first file name, a first file identifier or a first file format;
The file loading module is also used for realizing the searching flow of the application.
9. A computer readable storage medium, wherein the computer readable storage medium comprises a stored computer program; the computer program, when run, controls a device in which the computer-readable storage medium is located to perform the chip card based SE application management method as claimed in any one of claims 1 to 7.
CN202110317083.7A 2021-03-25 2021-03-25 SE application management method and device based on chip card and storage medium Active CN113127852B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110317083.7A CN113127852B (en) 2021-03-25 2021-03-25 SE application management method and device based on chip card and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110317083.7A CN113127852B (en) 2021-03-25 2021-03-25 SE application management method and device based on chip card and storage medium

Publications (2)

Publication Number Publication Date
CN113127852A CN113127852A (en) 2021-07-16
CN113127852B true CN113127852B (en) 2024-04-30

Family

ID=76773885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110317083.7A Active CN113127852B (en) 2021-03-25 2021-03-25 SE application management method and device based on chip card and storage medium

Country Status (1)

Country Link
CN (1) CN113127852B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115278646A (en) * 2022-07-26 2022-11-01 无锡融卡科技有限公司 Embedded SIM card, terminal and method for selecting, downloading and installing application program

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105451214A (en) * 2015-12-04 2016-03-30 中国联合网络通信集团有限公司 Card application access method and device
CN105704702A (en) * 2016-04-20 2016-06-22 中国联合网络通信集团有限公司 Applet downloading method and device
CN106664112A (en) * 2015-01-04 2017-05-10 华为技术有限公司 Data updating method and apparatus, and embedded universal integrated circuit card
CN108702386A (en) * 2017-06-14 2018-10-23 华为技术有限公司 A kind of management method and device of universal embedded integrated circuit card configuration file
CN108924821A (en) * 2018-08-10 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of method and its eUICC card managing application unrelated with operator
CN111417109A (en) * 2020-03-17 2020-07-14 江苏恒宝智能系统技术有限公司 eSIM card and its operator file management method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106664112A (en) * 2015-01-04 2017-05-10 华为技术有限公司 Data updating method and apparatus, and embedded universal integrated circuit card
CN105451214A (en) * 2015-12-04 2016-03-30 中国联合网络通信集团有限公司 Card application access method and device
CN105704702A (en) * 2016-04-20 2016-06-22 中国联合网络通信集团有限公司 Applet downloading method and device
CN108702386A (en) * 2017-06-14 2018-10-23 华为技术有限公司 A kind of management method and device of universal embedded integrated circuit card configuration file
CN108924821A (en) * 2018-08-10 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of method and its eUICC card managing application unrelated with operator
CN111417109A (en) * 2020-03-17 2020-07-14 江苏恒宝智能系统技术有限公司 eSIM card and its operator file management method and system

Also Published As

Publication number Publication date
CN113127852A (en) 2021-07-16

Similar Documents

Publication Publication Date Title
KR100984895B1 (en) System and method for improved security in a handset reprovisioning and reprogramming
CN111131352B (en) Theme switching method and device
CN110874236B (en) Cross-platform application device, terminal and storage medium
CN105335187A (en) Application processing method and apparatus
CN108121594B (en) Process management method and device
EP3028155A1 (en) Managing configurations of computing terminals
KR970700970A (en) Generic Service Coordination Mechanism
WO2018108132A1 (en) Access control method and system, electronic device, and computer storage medium
CN110569250B (en) Management method and device for analysis library of Internet of things network element
CN105630518A (en) Method and device for updating resources of Android application software
CN101895883B (en) Smart card supporting authentication arithmetic update and method for updating authentication arithmetic
CN110267256B (en) SIM card resource management scheduling device, communication terminal and system
CN104699503A (en) Method and device for replacing function execution logic in Android system
CN109195157B (en) Application management method and device and terminal
CN113127852B (en) SE application management method and device based on chip card and storage medium
CN104731622A (en) Application program loading method and device and mobile terminal
CN109005198A (en) A kind of controller attack protection security strategy generation method and system
CN114090475A (en) USB device redirection method, system, electronic device and storage medium
CN102377589B (en) Right management control method and terminal
CN103677933A (en) Patching method and system for smart card
CN113127075B (en) Method and device for managing registration table of smart card and storage medium
CN115374083A (en) Data source switching method and device, electronic equipment and storage medium
CN104572218A (en) Application operation control method and system and terminal
CN101536561B (en) Policy execution in communication device
CN112783573A (en) SELinux strategy configuration system and method for multiple user-defined services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant