CN115278646A - Embedded SIM card, terminal and method for selecting, downloading and installing application program - Google Patents

Embedded SIM card, terminal and method for selecting, downloading and installing application program Download PDF

Info

Publication number
CN115278646A
CN115278646A CN202210883498.5A CN202210883498A CN115278646A CN 115278646 A CN115278646 A CN 115278646A CN 202210883498 A CN202210883498 A CN 202210883498A CN 115278646 A CN115278646 A CN 115278646A
Authority
CN
China
Prior art keywords
application
security domain
application program
bound
configuration file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210883498.5A
Other languages
Chinese (zh)
Inventor
陈方良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Rongka Technology Co ltd
Original Assignee
Wuxi Rongka Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Rongka Technology Co ltd filed Critical Wuxi Rongka Technology Co ltd
Priority to CN202210883498.5A priority Critical patent/CN115278646A/en
Publication of CN115278646A publication Critical patent/CN115278646A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method for selecting, downloading and installing an embedded SIM card, a terminal and an application program. The embedded SIM card comprises a first domain management unit, a second domain management unit and a third domain management unit, wherein the first domain management unit is used for managing a first application program; a private primary security domain unit for managing a second application or an auxiliary security domain; wherein the first application is bound to a user profile and the second application is independent of the user profile; the first application and the second application are distinguished by different application identifiers. According to the terminal and the method for selecting, downloading and installing the application programs, the application programs are divided into two types of processing which are bound with the configuration files and are not bound with the configuration files. According to the embedded SIM card, the terminal and the selection, downloading and installation method of the application program, the application scene of the embedded SIM card is expanded, and the safety of the application data of the user can be further protected.

Description

Embedded SIM card, terminal and method for selecting, downloading and installing application program
Technical Field
The invention relates to the technical field of communication, in particular to a method for selecting, downloading and installing an embedded SIM card, a terminal and an application program.
Background
The Embedded SIM card (Embedded SIM, eSIM card) supports the remote configuration of SIM card data in the air, is initially applied to the field of Internet of things, gradually develops to the field of consumer electronics in recent years, has the characteristics of small physical size, adaptability to severe working environment, long service life, capability of effectively ensuring the stability of mobile communication and the safety of equipment, capability of dynamically and remotely downloading SIM card data, convenience for a user to actively trigger downloading/managing card data or dynamically replacing card data, flexibility in selecting a signing operator and the like. Therefore, the embedded SIM card is widely used in devices such as public instruments (water, electricity, gas, etc.), monitoring cameras, vehicle-mounted devices, consumer electronics (e.g., watches, bracelets, mobile phones), and the like.
The embedded SIM card is essentially a programmable SIM card and is a java SIM card conforming to the GP platform. The Profile (user configuration file) can be edited after leaving The factory, and supports The remote configuration of The SIM card through OTA (Over The Air, over The Air technology), so as to realize The downloading, installation, activation, deactivation and deletion of The Profile. In the prior art, card applications (Applets) need to be bound with a user profile, once the bound user profile is deactivated or deleted, the related card applications are also deactivated and deleted, and the downloading of the user profile and the downloading of the applications both need to pass through an operator, all the downloaded applications are bound with the user profile, so that the applications cannot be used along with the deactivation or deletion of the user profile. However, many application scenarios, such as a bracelet supporting eSIM, an application supporting one-card access, an M1 access control application, and the like, all require that the application can be used normally all the time. However, in the prior art, once the user switches the operator, many applications of the user need to be re-opened, which not only needs to pay additional cost, but also may cause loss of existing data, funds, and the like.
Therefore, it is desirable to have a new embedded SIM card, terminal, application selection, download and installation method, which can overcome the above problems.
Disclosure of Invention
In view of the foregoing problems, an object of the present invention is to provide an embedded SIM card, a terminal, and a method for selecting, downloading, and installing an application program, so as to reduce the dependence on operators and extend the usage scenarios of the embedded SIM card.
According to an aspect of the present invention, there is provided an embedded SIM card, including: a first domain management unit for managing a first application; a master private master security domain unit for managing a second application or an auxiliary security domain; wherein the first application is bound to a user profile and the second application is independent of the user profile; the first application and the second application are distinguished by using different application identifiers.
Optionally, a private master security domain application identifier is configured in the private master security domain unit, and at least one private master security domain is configured in the private master security domain unit; the private primary security domain has no secondary security domain, and the private primary security domain directly manages all of the second applications; or at least one secondary security domain in the private primary security domain, where the secondary security domain and the private primary security domain respectively manage all or part of the second application and/or the secondary security domain, and the private primary security domain and/or different secondary security domain application identifiers correspond to different second applications.
Optionally, the first domain management unit includes at least a part of a user profile unit, and the at least a part of the user profile unit is used for configuration of the user profile.
Optionally, the embedded SIM card further comprises an operating system unit for selection and/or download installation of the first application program and the second application program.
According to another aspect of the present invention, there is provided a terminal including an embedded SIM card as described above.
According to another aspect of the present invention, there is provided an application program selection method applied to a terminal including an embedded SIM card, the method including receiving an application program selection instruction; judging whether the application program pointed by the application program selection instruction is bound with a configuration file or not; under the condition that the application program is not bound with the configuration file, selecting the application program and returning a response result; and under the condition that the application program is bound with the configuration file, traversing the application program bound with the currently activated configuration file, and under the condition that the application program is found, selecting the application program and returning a response result, wherein the application program which is not bound with the configuration file is managed by the security domain.
Optionally, the security domain is one of a private primary security domain or a secondary security domain.
Optionally, a security domain application identifier is configured in the security domain, and different security domain application identifiers correspond to different application programs; the judging whether the application program pointed by the application program selection instruction is bound with the configuration file comprises the following steps: determining whether an application identifier in the application selection instruction matches the security domain application identifier; in the event that the application identifier matches the security domain application identifier, determining that the application program is not bound to a configuration file.
According to another aspect of the present invention, a method for downloading and installing an application program is provided, which is applied to a terminal including an embedded SIM card, and includes receiving an application program downloading instruction; judging whether a security domain pointed by the application program downloading instruction is bound with a configuration file or not; under the condition that the application program is not bound with the configuration file, downloading and installing the application program and returning an instruction processing result; and under the condition that the application program is bound with the configuration file, after the application program is downloaded and installed, the application program is bound with the configuration file bound with the security domain.
Optionally, the application is downloaded through a trusted service management platform; the application program comprises a card application.
According to the embedded SIM card, the terminal and the selection, downloading and installation method of the application program, the private main security domain is applied to the embedded SIM card and is used for application management, so that the dependence on operators can be reduced, and the use scene of the embedded SIM card can be expanded.
Further, from the relationship of application management, applications are divided into applications bound with the user configuration file and applications not bound with the user configuration file, and the application not bound with the user configuration file is conveniently and systematically effectively managed in the life cycle through the introduction of the private main security domain.
Furthermore, the application which is not bound with the user configuration file is introduced, so that the problems that the application cannot be used and data is lost when the user configuration file is deactivated or deleted are solved, and the data and property safety of the user is protected.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent from the following description of embodiments of the present invention with reference to the accompanying drawings, in which:
FIG. 1 shows a schematic diagram of a framework for an embedded SIM card according to an embodiment of the invention;
fig. 2 shows a schematic logical structure diagram of an embedded SIM card according to an embodiment of the present invention;
FIG. 3 illustrates a method flow diagram of a method of selection of an application according to an embodiment of the invention;
FIG. 4 is a flow chart diagram illustrating a method of selecting an application according to an embodiment of the invention;
FIG. 5 illustrates a method flow diagram of a method of downloading an application program according to an embodiment of the present invention;
fig. 6 is a flowchart illustrating a downloading method of an application according to an embodiment of the present invention.
Detailed Description
Various embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Like elements in the various figures are denoted by the same or similar reference numerals. For purposes of clarity, the various features in the drawings are not drawn to scale. Moreover, certain well-known elements may not be shown in the figures.
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. In the following description, numerous specific details of the invention, such as structure, materials, dimensions, processing techniques and techniques of components, are set forth in order to provide a more thorough understanding of the invention. However, as will be understood by those skilled in the art, the present invention may be practiced without these specific details.
It will be understood that when a layer, region or layer is referred to as being "on" or "over" another layer, region or layer in describing the structure of the component, it can be directly on the other layer, region or layer or intervening layers or regions may also be present. Also, if the component is turned over, one layer or region may be "under" or "beneath" another layer or region.
Fig. 1 shows a schematic diagram of a framework of an embedded SIM card according to an embodiment of the present invention. As shown in fig. 1, the embedded SIM card according to an embodiment of the present invention includes a first domain management unit 100 and a private master security domain unit 200.
Specifically, the first domain management unit 100 serves to manage the first application. The private primary security domain unit 200 may have only a second application thereunder, and may also contain one or more secondary security domains. When the auxiliary security domain does not exist below the private main security domain, the private main security domain manages all the second application programs; when one or more auxiliary security domains are arranged below the private main security domain, the private main security domain and/or the auxiliary security domain respectively manage all or part of the second application program and/or the auxiliary security domain. The first application program is bound with the user configuration file, the second application program is independent of the user configuration file, and the first application program and the second application program are distinguished by different Application Identifiers (AIDs).
Optionally, the private master security domain unit 200 is configured with a private master security domain application identifier, the private master security domain should have an identifier for identifying a different second application, and the different application identifiers in the private master security domain correspond to different second applications. Optionally, the private master security domain application identifier in the private master security domain is a non-standard application identifier, which cannot be the same as a common application identifier in a Java card, and the private master security domain application identifier may be a special setting, a custom setting, or the like. The private main security domain is used for managing applications which are automatically downloaded and installed by a client (such as an M1 application, a one-card application and the like downloaded through a trusted service management platform or other modes) and applications customized by a manufacturer (applications which cannot be deleted).
Optionally, the first domain management unit comprises at least a part of a user profile unit, the at least a part of the user profile unit being used for configuration of the user profile.
When the embedded SIM card according to the embodiment of the invention is used, the operating system also needs to adjust the processing logic of application selection and application downloading and installing instructions. In the embedded SIM card of the embodiment of the present invention, the applications are divided into two categories: applications bound to the user profile and applications not bound to the user profile.
Fig. 2 shows a schematic diagram of a logical structure of an embedded SIM card according to an embodiment of the present invention. As shown in fig. 2, the embedded SIM card according to the embodiment of the present invention includes a first domain management unit 100, a private master security domain unit 200, an issuer root security domain unit 300, a control authority security domain unit 400, a policy control execution unit 500, and the like.
In particular, the first domain management unit 100 includes an activated user profile sub-unit 101 and an inactivated user profile sub-unit 102. Optionally, the activated user Profile sub-unit 101 and the inactivated user Profile sub-unit 102 respectively include a user Profile Security Domain (ISD-P), a Mobile Network Operator Security Domain (MNO-SD), a file system (file system), an authentication parameter (NAA/NAAs), a Network access application, a policy rule (pol), other applications (application), a connection parameter (connection parameters), and the like.
Optionally, an application and/or Secondary Security Domain (SSD) is disposed under the private primary Security Domain (ISD) unit 200.
Optionally, the embedded SIM card further includes an Issuer Root Security Domain (ISD-R) unit 300 and an ECASD (eUICC Controlling Authority Security Domain) unit 400 of the eUICC (embedded UICC).
In an alternative embodiment of the invention, the embedded SIM card further comprises an operating system unit. The operating system unit is used for selection and/or installation of the first application program and the second application program. Optionally, the operating system unit is an EUICC operating system, which includes a telecommunications framework and a platform management service. The platform management service includes a policy control enforcement unit 500.
The embedded SIM Card according to the embodiment of the invention is a Java Card, is realized according to GSMA standard, and conforms to GP (Global Platform International organization) specification and Sun's Java Card API (Application Programming Interface) specification.
According to another aspect of the present invention, a terminal is provided. The terminal comprises an embedded SIM card as described above. The terminal can be a public instrument, vehicle-mounted equipment, a mobile phone, a bracelet and the like.
According to the embedded SIM card provided by the embodiment of the invention, a private main security domain is added for managing third-party applications, the applications are not influenced by user configuration files, can be used normally all the time, and can reduce the dependence on operators, and the applications can be downloaded and installed through a third-party platform, for example, an equipment/product manufacturer manages the private main security domain, and the applications are downloaded to the embedded SIM card through a trusted service management platform; and the application scene of the embedded SIM card can be expanded, and the requirements that part of applications need to be used all the time (such as one-card application, M1 application and the like) are met.
Fig. 3 shows a method flowchart of a selection method of an application according to an embodiment of the invention. As shown in fig. 3, the method for selecting an application according to an embodiment of the present invention is applied to a terminal including an embedded SIM card, and includes the following steps:
in step S101, an application selection instruction is received;
an application selection instruction is received. The user selects a particular application, for example, on the terminal, makes an application selection, and the terminal receives the application selection instruction.
In step S102, determining whether the application program pointed by the application program selection instruction is bound to a configuration file;
judging whether the application program (i.e. the specific application program selected by the user) pointed by the application program selection instruction is bound with the configuration file, and executing the step S103 under the condition that the application program and the specific application program are bound; in the case where the two are not bound, step S104 is performed.
In step S103, traversing the application program bound to the currently activated configuration file, and if the application program is found, selecting the application program and returning a response result;
and under the condition that the application program is bound with the configuration file, traversing the application program bound with the currently activated configuration file in the terminal, and under the condition that the application program (namely the specific application program selected by the user and corresponding to the first application program) is found, selecting the application program and returning a response result.
In step S104, the application is selected and a response result is returned.
In case the application is not bound to the configuration file, the application (i.e. the specific application selected by the user, corresponding to the second application above) is selected and a response result is returned. Wherein applications that are not bound to the configuration file are managed by the security domain.
In an alternative embodiment of the invention, the security domain is one of a private primary security domain or a secondary security domain. Optionally, a security domain application identifier is configured in the security domain. The security domain application identifiers are used to identify different application programs, with different security domain application identifiers corresponding to different ones of the application programs. When the application program pointed by the application program selection instruction is judged to be bound with the configuration file, whether the application identifier in the application program selection instruction is matched with the security domain application identifier is judged. In the event that the application identifier matches the security domain application identifier, it is determined that the application program is not bound to the configuration file.
Fig. 4 is a flowchart illustrating an application selection method according to an embodiment of the present invention. As shown in fig. 4, the method for selecting an application according to an embodiment of the present invention includes the steps of:
in step S201, a selection instruction is applied;
and the embedded SIM card receives an application selection instruction, and the application selection instruction points to a specific application program.
In step S202, it is determined whether the application identifier in the application selection instruction is an application in the first domain management unit or an application in the private master security domain unit;
it is determined whether the application identifier in the application selection instruction is an application in the first domain management unit of fig. 1 or belongs to an application in the private master security domain unit 200.
The EUICC (embedded UICC) operating system determines whether the application identifier is an ISD-R (Issuer Root Security Domain), an ISD-P, ECASD (EUICC Controlling Security Domain), or a private main Security Domain ISD (issued Security Domain) according to the application identifier in the application selection instruction. If yes, executing step S203 to select the application; in case of no judgment, step S204 is executed, and the application is searched, for example, whether the application is searched in the first domain management unit 100 in fig. 1 or the private master security domain unit 200 is searched in accordance with the application retrieval priority.
Taking the first domain management unit 100 as an example, if the application in the selection instruction is associated with the currently activated user profile, finding and selecting the application, and returning a response result; if the application in the selection instruction is not associated with the currently activated user configuration file, searching in the private main security domain unit 200, finding and selecting the application, and simultaneously returning a corresponding result, if the application cannot be found, returning an abnormal response code of the application which cannot be found; if the retrieval priority is set as the private main security domain unit 200, when an instruction for selecting an application is received, searching in the private main security domain unit 200, finding and selecting the application, and simultaneously returning a corresponding result, if the application cannot be found, continuously searching in the first domain management unit 100, if the application in the instruction is selected to be associated with the currently activated user configuration file, finding and selecting the application, and returning a response result, and if the application cannot be found or is not associated with the currently activated user configuration file, returning an abnormal response code of the application cannot be found; the priority of application retrieval is determined by the developer's preference or the actual application scenario.
Fig. 5 illustrates a method flowchart of a downloading method of an application according to an embodiment of the present invention. As shown in fig. 5, the method for downloading an application according to an embodiment of the present invention is applied to a terminal including an embedded SIM card, and includes the following steps:
in step S301, an application download instruction is received;
and receiving an application program downloading instruction. The user selects a specific application program for downloading, for example, on the terminal, and the terminal receives the application program downloading instruction.
In step S302, determining whether the security domain pointed by the application program download instruction is bound to a configuration file;
judging whether the security domain pointed by the application program downloading instruction is bound with the configuration file, and executing the step S303 under the condition that the security domain pointed by the application program downloading instruction is bound with the configuration file; in the case where the two are not bound, step S304 is performed.
In step S303, after the downloading of the application program is executed, binding the application program with the configuration file bound to the security domain;
in the case where the application is bound to the profile, performing the downloading of the application (corresponding to the first application above); after the download of the application program is performed, the application program is bound with the configuration file to which the security domain is bound.
In step S304, the downloading of the application program is performed and the instruction processing result is returned.
And in the case that the application program is not bound with the configuration file, downloading the application program (corresponding to the second application program above) and returning an instruction processing result.
Optionally, the application is downloaded through a trusted service management platform (TSM). The application program may include a card application.
Fig. 6 is a flowchart illustrating a downloading method of an application according to an embodiment of the present invention. As shown in fig. 6, the method for downloading an application according to an embodiment of the present invention includes the steps of:
in step S401, the application downloads an installation instruction;
and the embedded SIM card receives an application downloading and installing instruction.
In step S402, it is determined whether the currently selected SD binds profile;
and judging whether the currently selected Security Domain (SD) is bound with a user profile (profile). In the case of no judgment, step S403 is executed; in a case where the determination is yes, step S404 is executed.
In step S403, executing an application download installation instruction flow;
and executing an application downloading and installing instruction flow under the condition that the currently selected security domain is judged not to be bound with the user configuration file, and then executing the step S405.
In step S404, executing the application download installation instruction, and binding the profile bound to the currently selected SD;
under the condition that the user configuration file bound to the currently selected security domain is judged, an application downloading and installing instruction flow is executed firstly, then the application is bound to the user configuration file bound to the currently selected security domain, and then the step S405 is executed.
In step S405, an instruction processing result is returned.
And after the application downloading and installing instruction is finished, returning an instruction processing result.
In the embodiment of the invention, the user application is divided into two applications which are bound with the user configuration file and independently exist without being bound with the user configuration file from the belonging relation of application management, and the application bound with the user configuration file continues to use the existing embedded SIM card design logic, thereby meeting the requirements of the application scene of the conventional embedded SIM card technology; the application which is not bound with the user configuration file conveniently and systematically manages the life cycle of the application by introducing the private main security domain, can greatly expand the use scene of the embedded SIM card, and is convenient for the popularization of the embedded SIM card series technical scheme and products.
From the downloading approach of the application, the application under the private main security domain can be downloaded from a third party (such as a trusted service management platform of a manufacturer), and the application does not need to be downloaded from an operator (a subscription operator and an MNO-SD manager), so that the dependence on the operator is reduced, and thus, data related to network authentication can be downloaded through a user profile of the operator, and the application can be downloaded from the third party platform.
Due to the introduction of the application which is not bound with the user configuration file, the problems that the application cannot be used when the user configuration file is deactivated or deleted and the data loss is generated when the user configuration file is deleted are avoided, the safety of the user application data is protected, and the property loss of a user can be avoided for specific applications (such as applications of one-card and entrance guard).
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
While embodiments in accordance with the invention have been described above, these embodiments are not intended to be exhaustive or to limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. The invention is limited only by the claims and their full scope and equivalents.

Claims (10)

1. An embedded SIM card, comprising:
a first domain management unit for managing a first application;
a private primary security domain unit for managing a second application or an auxiliary security domain;
wherein the first application is bound to a user profile and the second application is independent of the user profile;
the first application and the second application are distinguished by different application identifiers.
2. The embedded SIM card of claim 1, wherein the private master security domain unit is configured with a private master security domain application identifier, and there is one and only one private master security domain;
the private primary security domain has no secondary security domain, and the private primary security domain directly manages all the second applications; or
At least one secondary security domain in the private primary security domain, the secondary security domain and the private primary security domain respectively managing all or part of the second application and/or the secondary security domain,
wherein the private primary security domain and/or the different secondary security domain application identifiers correspond to different second applications.
3. The embedded SIM card of claim 1, wherein the first domain management unit comprises at least a portion of a user profile unit, the at least a portion of the user profile unit being used for configuration of the user profile.
4. The embedded SIM card of claim 1, further comprising:
and the operating system unit is used for selecting and/or downloading and installing the first application program and the second application program.
5. A terminal characterized in that it comprises an embedded SIM card according to any one of claims 1 to 4.
6. A method for selecting an application program is applied to a terminal containing an embedded SIM card, and is characterized by comprising the following steps:
receiving an application program selection instruction;
judging whether the application program pointed by the application program selection instruction is bound with a configuration file or not;
under the condition that the application program is not bound with the configuration file, selecting the application program and returning a response result;
traversing the application program bound with the currently activated configuration file under the condition that the application program is bound with the configuration file, selecting the application program and returning a response result under the condition that the application program is found,
wherein applications that are not bound to the configuration file are managed by the security domain.
7. The method of selecting as recited in claim 6, wherein the security domain is one of a private primary security domain or a secondary security domain.
8. The method of selecting as claimed in claim 7, wherein a security domain application identifier is configured in the security domain, different security domain application identifiers corresponding to different said application programs;
the judging whether the application program pointed by the application program selection instruction is bound with the configuration file comprises the following steps:
determining whether an application identifier in the application selection instruction matches the security domain application identifier;
in the event that the application identifier matches the security domain application identifier, determining that the application program is not bound to a configuration file.
9. A downloading and installing method of an application program is applied to a terminal containing an embedded SIM card, and is characterized by comprising the following steps:
receiving an application program downloading instruction;
judging whether a security domain pointed by the application program downloading instruction is bound with a configuration file;
under the condition that the application program is not bound with the configuration file, downloading and installing the application program and returning an instruction processing result;
and under the condition that the application program is bound with the configuration file, after the application program is downloaded and installed, the application program is bound with the configuration file bound with the security domain.
10. The downloading method of claim 9, wherein the application program is downloaded through a trusted service management platform; the application program comprises a card application.
CN202210883498.5A 2022-07-26 2022-07-26 Embedded SIM card, terminal and method for selecting, downloading and installing application program Pending CN115278646A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210883498.5A CN115278646A (en) 2022-07-26 2022-07-26 Embedded SIM card, terminal and method for selecting, downloading and installing application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210883498.5A CN115278646A (en) 2022-07-26 2022-07-26 Embedded SIM card, terminal and method for selecting, downloading and installing application program

Publications (1)

Publication Number Publication Date
CN115278646A true CN115278646A (en) 2022-11-01

Family

ID=83769486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210883498.5A Pending CN115278646A (en) 2022-07-26 2022-07-26 Embedded SIM card, terminal and method for selecting, downloading and installing application program

Country Status (1)

Country Link
CN (1) CN115278646A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941833A (en) * 2022-11-21 2023-04-07 深圳市雪球科技有限公司 Method, system, equipment and storage medium for activating traffic card optimization

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103747443A (en) * 2013-11-29 2014-04-23 厦门盛华电子科技有限公司 Multi-security domain device based on mobile phone user identification card and authentication method thereof
CN110430575A (en) * 2019-08-06 2019-11-08 恒宝股份有限公司 A kind of security domain space management
CN112312387A (en) * 2020-10-20 2021-02-02 大唐微电子技术有限公司 Method and device for realizing connection processing
CN113127852A (en) * 2021-03-25 2021-07-16 东信和平科技股份有限公司 SE application management method and device based on chip card and storage medium
CN113225733A (en) * 2020-01-19 2021-08-06 中国移动通信有限公司研究院 User identification module, certificate acquisition method, device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103747443A (en) * 2013-11-29 2014-04-23 厦门盛华电子科技有限公司 Multi-security domain device based on mobile phone user identification card and authentication method thereof
CN110430575A (en) * 2019-08-06 2019-11-08 恒宝股份有限公司 A kind of security domain space management
CN113225733A (en) * 2020-01-19 2021-08-06 中国移动通信有限公司研究院 User identification module, certificate acquisition method, device and storage medium
CN112312387A (en) * 2020-10-20 2021-02-02 大唐微电子技术有限公司 Method and device for realizing connection processing
CN113127852A (en) * 2021-03-25 2021-07-16 东信和平科技股份有限公司 SE application management method and device based on chip card and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941833A (en) * 2022-11-21 2023-04-07 深圳市雪球科技有限公司 Method, system, equipment and storage medium for activating traffic card optimization

Similar Documents

Publication Publication Date Title
USRE49465E1 (en) Method and apparatus for setting profile
US8806478B2 (en) Customizing operating system based on detected carrier
US7743407B2 (en) Using permissions to allocate device resources to an application
JP4106020B2 (en) Systems and methods for improving security in handset reprovisioning and reprogramming
EP3537329B1 (en) Access control method and system, electronic device, and computer storage medium
US9038060B2 (en) Automatically installing operating system specific to a detected network
CN100458689C (en) Controlling settings for mobile telecommunications apparatus
CN105335187A (en) Application processing method and apparatus
CN105095788A (en) Method, device and system for private data protection
JP4142287B2 (en) Communication terminal, content use restriction method, and program execution restriction method
KR20080057255A (en) Customisation of mobile stations
CN105631311A (en) Application program authority management method and device as well as terminal
CN105718809A (en) Mobile communication terminal, data security monitoring method and device thereof
CN101854624A (en) Dynamic loading software authentication method, monitoring method and device for mobile terminal
CN110413292B (en) Light application installation method of application program, mobile terminal and storage medium
US20220006841A1 (en) Remote management of a user device
GB2353918A (en) Access rights in a mobile communications system
CN115278646A (en) Embedded SIM card, terminal and method for selecting, downloading and installing application program
JP2002049434A (en) Application management method, network management center, terminal, application management system, and computer readable recording medium stored with application management program
CN105163303A (en) Sim card application management method and user terminal
CN109657455B (en) Application real-time switching method, device, storage medium and apparatus
CN108062483B (en) Method, device and terminal for accessing system resources by application
KR100781136B1 (en) System and method of managing application in the universal subscriber identity module card
EP1303153B1 (en) Apparatus and method for selecting software modules in a mobile terminal
JP4358478B2 (en) COMMUNICATION TERMINAL ACCESS CONTROL METHOD, CONTENT PROVIDING METHOD, COMMUNICATION SYSTEM, AND RELAY DEVICE

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination