CN115941833A - Method, system, equipment and storage medium for activating traffic card optimization - Google Patents

Method, system, equipment and storage medium for activating traffic card optimization Download PDF

Info

Publication number
CN115941833A
CN115941833A CN202211456668.8A CN202211456668A CN115941833A CN 115941833 A CN115941833 A CN 115941833A CN 202211456668 A CN202211456668 A CN 202211456668A CN 115941833 A CN115941833 A CN 115941833A
Authority
CN
China
Prior art keywords
card
instruction
result
opening
empty
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211456668.8A
Other languages
Chinese (zh)
Inventor
胡政
赵晨曦
姜波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Snowball Technology Co ltd
Original Assignee
Shenzhen Snowball Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Snowball Technology Co ltd filed Critical Shenzhen Snowball Technology Co ltd
Priority to CN202211456668.8A priority Critical patent/CN115941833A/en
Publication of CN115941833A publication Critical patent/CN115941833A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application relates to the technical field of computers, in particular to a method, a system, equipment and a storage medium for opening traffic card optimization, which comprises the following steps: acquiring a relevant instruction of clicking to obtain a card; displaying a collar card page and synchronously executing the operation of pre-installing empty cards by using the acquired related instructions; utilizing the display collar card page to perform ordering payment operation; and writing personal data and activating by using the result of the ordering payment operation and the result of the pre-installed empty card to obtain a card opening result. According to the method and the device, the problem that unnecessary serial execution time of each step is too long when the user opens the card is solved by performing the empty card preassembling through synchronous execution, and the card opening experience and the order success rate of the user are improved.

Description

Method, system, equipment and storage medium for activating traffic card optimization
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, a system, a device, and a storage medium for activating a traffic card optimization.
Background
At present, opening a traffic card in a mobile wallet needs three steps: the first step is as follows: selecting a traffic card and paying; the second step is that: executing the instruction to open an empty traffic card in the mobile phone chip; the third step: the user personalization data is written on this open empty card and activated.
The three steps are serial, the basic overall consumption time is about half a minute, most users usually can patiently wait on the page until the card adding is successful and activated, and some users can wait for a while but do not patiently and directly return or quit to cause the card adding interruption failure, thereby also influencing the order success rate.
In the prior art, when the traffic card is opened, the card opening step is based on serial operation, and the time consumed for opening the empty card by executing the instruction is long, so that the order success rate and the user experience are influenced.
Disclosure of Invention
In order to overcome the problems that in the related art, when a traffic card is opened, the card opening step is based on serial operation, the time consumed for opening an empty card is long when an instruction is executed, and the order success rate and the user experience are influenced, the method, the system, the equipment and the storage medium for optimizing the opening of the traffic card are provided.
The scheme of the application is as follows:
in a first aspect, the present application provides a method for opening traffic card optimization, the method including:
acquiring a relevant instruction of clicking to obtain a card;
displaying a collar card page and synchronously executing the operation of pre-loading empty cards by using the acquired related instruction;
utilizing the display collar card page to perform ordering payment operation;
writing personal data and activating by using the result of the ordering payment operation and the result of the pre-installed empty card to obtain a card opening result;
the step of pre-loading the empty card comprises the following steps:
executing pre-opening card assembly data and executing opening card;
the execution step of the pre-opening card assembly data comprises the following steps:
acquiring the city card type and the service channel of the traffic card by the user by using the acquired related instruction;
the city card type and the service channel where the traffic card is located are obtained by the user, 16-system conversion is carried out after encryption based on a preset apple certificate public key and an applet nonce base64, 16-system conversion is carried out after encryption of a signature base64 of the applet nonce, and a pre-opening card related parameter set is obtained;
and obtaining the id of the unique identification card and the equipment association and the assembly encryption password data based on the related parameter set of the pre-opened card, and returning a public key.
Further, the executing step of executing card opening includes:
based on the id and the assembled encrypted password data of the unique identification card and the equipment, issuing a first 8050 instruction of GP authentication to a security domain authorized and managed in a mobile wallet;
after the execution result of the first 8050 instruction is obtained, a key management service is requested to calculate a card cipher generation 8482 instruction and a key replacement instruction;
based on the result generated by calculating the secret key, sending a GP (GP) instruction for authenticating the 8482 instruction and the instruction for replacing the secret key to the mobile wallet, and requesting to encrypt and install the auxiliary security domain;
based on the execution result of the request for encrypting and installing the auxiliary security domain, issuing an instruction for installing the auxiliary security domain and the replacement key to the mobile wallet;
and receiving and executing an instruction for installing an auxiliary security domain and the replacement key issued by the mobile wallet to obtain a result of pre-installing an empty card.
Further, the receiving and executing an instruction for installing an auxiliary security domain and the replacement key issued by the mobile wallet to obtain a result of pre-installing an empty card includes:
receiving an instruction of issuing an auxiliary security domain and the replacement key by the mobile wallet, calling a key management service to encrypt according to a corresponding instruction level to generate a loading packet instruction and returning a generated result;
calling a mobile wallet to issue the loading packet instruction and returning an execution result;
based on the returned execution result, requesting the key management service to install the application and migrate to the auxiliary security domain, and returning a packed instruction;
and based on the returned and packaged instruction, the mobile wallet issues an instruction for installing and transferring the application and returns the instruction to obtain a result of pre-installing the empty card.
Further, the writing and activating of personal data based on the result of ordering payment and the result of pre-loading the empty card to obtain the result of card opening comprises:
and after the synchronous execution of the payment is finished, issuing an enabling instruction, writing personal data and activating the personal data based on the result of pre-installing the empty card to obtain a card opening result.
Further, after the synchronous execution payment is completed, an enabling instruction is issued, including:
after a successful payment result pushed by the payment channel is received, the personalized instruction is issued to the mobile wallet and executed;
based on the execution result, calling an encryption service by the card to request the enabling instruction signature and returning the execution result;
signing and returning an execution result based on the enabling instruction, issuing the enabling instruction to a mobile wallet, executing and returning a card passing result;
and based on the returned card passing result, the card passing returns the final card opening result of the wallet according to the enabling instruction result.
In a second aspect, the present application provides a system for opening traffic card optimization, the system comprising:
the acquisition module is used for acquiring relevant instructions of clicking to obtain the card;
the pre-installed empty card module is used for pre-installing the empty card by synchronous execution by utilizing the acquired related instruction to obtain a result of pre-installing the empty card;
the payment module is used for making ordering payment by displaying a debit card page by using the acquired related instruction;
and the card opening module is used for writing personal data and activating the personal data based on the result of ordering payment and the result of pre-loading the empty card to obtain a card opening result.
In a third aspect, the present application provides a device for opening traffic card optimization, where the device includes:
a memory having an executable program stored thereon;
a processor for executing the executable program in the memory to implement the steps of any of the above methods.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon computer instructions for causing a computer to perform the steps of any of the methods described above. The technical scheme provided by the application can comprise the following beneficial effects:
the method comprises the steps of obtaining relevant instructions of clicking to get the card; pre-installing the empty card by synchronous execution by using the acquired related instruction to obtain a result of pre-installing the empty card; ordering payment is carried out through a display card receiving page by utilizing the obtained related instruction; and writing personal data and activating to obtain a card opening result based on the result of ordering payment and the result of pre-installing the empty card. The card opening experience and the order success rate of the user are improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic flow chart illustrating a method for activating traffic card optimization according to an embodiment of the present disclosure;
FIG. 2 is a diagram of a system component for providing traffic card optimization according to another embodiment of the present disclosure;
FIG. 3 is a diagram of an apparatus for providing traffic card optimization according to yet another embodiment of the present application;
FIG. 4 is a flow chart illustrating an optimization for provisioning a traffic card according to yet another embodiment of the present application;
fig. 5 is a flowchart illustrating a method of opening an original mode of a traffic card optimization application according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
At present, opening a traffic card in a mobile wallet needs three steps: the first step is as follows: selecting a traffic card and paying; the second step is that: executing the instruction to open an empty traffic card in the mobile phone chip; the third step: writing user personalized data in the opened empty card and activating the user personalized data, as shown in fig. 5, a user selects a traffic card, and originally, when clicking a button to pick up, the user jumps to a card opening amount list, selects amount and then pays for a bill, and executes a card opening instruction after the payment is verified.
The three steps are serial, the basic overall consumption time is about half a minute, most users usually wait patiently on the page until the card adding is successful and activated, and some users may wait for a while without patience and directly return or exit to cause the card adding interruption failure! The order success rate is also affected. Based on the idea, a new technical scheme that the empty card is pre-installed in the mobile phone chip is designed to improve the speed of the whole card opening process, and because the time consumed for opening the empty card by executing the instruction in the steps is the most, the time can be effectively shortened by about half by a preset mode, so that the user experience is better. And finally, the success rate of the order is improved.
Since the three steps are performed serially only when the user triggers the card opening action in the wallet, the three steps are also indispensable, the time required for each step is also certain, and particularly, the second card opening step is about half of the total flow time. Therefore, the steps can be adjusted to reach certain optimization, the user opens the empty card data in advance and writes the empty card data into a chip of a mobile phone of the user after triggering certain conditions, for example, the user executes a second step in parallel when selecting a traffic card click to get order payment by the applet, the card data are also opened synchronously after the payment is finished, and whether the user data are written in or not is judged according to the payment condition of the user and the user data are activated. Even if the payment fails or the payment is abandoned, the open empty card is normally opened and pre-installed to the mobile phone of the user, and the next card opening activation can be waited or reserved, so that the completeness on the flow is met, and the waiting time for instant card opening can be greatly shortened.
Example one
Referring to fig. 1, fig. 1 is a schematic flow chart of a method for activating traffic card optimization according to an embodiment of the present application, where the method includes:
s1, acquiring a relevant instruction of clicking to obtain a card;
s2, displaying a collar card page and synchronously executing an empty card preassembling operation by using the acquired related instruction;
s3, utilizing the display collar card page to perform ordering payment operation;
s4, writing personal data and activating by using the result of the ordering payment operation and the result of the pre-installed empty card to obtain a card opening result;
according to the step S1, in an embodiment, the obtaining of the instruction related to the click to get the card includes:
when the user selects the traffic card to click to get the card, the synchronous execution of the card opening instruction can be triggered, and as shown in fig. 4, the relevant instruction of clicking to get the card is obtained.
According to step S2, in an embodiment, the displaying a collar card page and synchronously executing a pre-empty card operation by using the obtained related instruction includes:
in the embodiment of the application, the first step is synchronously executed: pre-opening card assembly data:
1. the client obtains the city card type and the business channel according to the city traffic card selected by the user
2. Encrypting a preset apple certificate public key and applet nonce base64, and then carrying out 16-system encryption, signing the applet nonce, and carrying out 16-system encryption after encrypting the base 64;
3. obtaining the id of the unique identification card and the equipment association and the assembly encryption password data according to the parameters, and returning the public key to carry out the next card opening process;
in the concrete implementation, the second step is synchronously executed: executing card opening:
1. the service issues a GP (Global Platform, which is a first 8050 instruction for promoting implementation of cross-industry smart card Global organization) authentication to a security Domain (AMSD) Authorized and managed in a mobile wallet;
2. after obtaining the instruction execution result, the service request key management service calculates a card cipher generation 8482 instruction and a putKey (replacement key) instruction;
3. the service issues a GP authentication second strip 8482 and an instruction for replacing an AMSD key to the mobile wallet;
4. after the execution result of the key replacing instruction is obtained, the service request encrypts and installs the auxiliary security domain; (complementary Secure Domain, hereinafter referred to as auxiliary security Domain) instruction and putKey (substitute key) generation instruction;
5. the service issues an instruction of installing an auxiliary security domain and a putKey (replacing a key) to the mobile wallet and returns an execution result;
6. the obtained result calls a key management service to encrypt according to the corresponding instruction level to generate a loading packet instruction and return the loading packet instruction;
7. transferring the mobile phone wallet to issue a loading packet instruction and returning an execution result;
8. requesting the key management service to install the application and migrate to the auxiliary security domain, and returning a packed instruction;
9. and the mobile wallet issues an instruction for installing and transferring the application and returns the instruction until the empty card is preloaded.
According to step S4, in an embodiment, the writing and activating of the personal data based on the result of the order payment and the result of pre-loading the empty card to obtain the card-opening result includes:
and after the synchronous execution payment is finished, issuing an enabling instruction, writing personal data based on the result of the pre-installed empty card, and activating to obtain a card opening result.
Specifically, after the synchronous execution payment is completed, an enabling instruction is issued, including:
after a successful payment result pushed by the payment channel is received, the personalized instruction is issued to the mobile wallet and executed;
based on the execution result, calling an encryption service by the card to request the enabling instruction signature and returning the execution result;
signing and returning an execution result based on the enabling instruction, issuing the enabling instruction to a mobile wallet, and returning a card passing result after the enabling instruction is executed;
and based on the returned card passing result, the card passing returns the final card opening result of the wallet according to the enabling instruction result.
It should be noted that, the method for implementing the pre-installed empty card is synchronously executed when the card is picked up,
the invention solves the problem that the unnecessary serial execution time of each step is too long when the user opens the card. The card opening experience and the order success rate of the user are improved; the optimized technical scheme also decouples the processes of ordering payment and opening the card for the user.
Example two
Referring to fig. 2, fig. 2 is a block diagram of a system for activating traffic card optimization according to another embodiment of the present application, where the system includes:
the acquisition module 101 is used for acquiring a relevant instruction of clicking to obtain a card;
a pre-installed empty card module 102, configured to perform pre-installation of an empty card through synchronous execution by using the obtained related instruction, so as to obtain a result of pre-installing the empty card;
the payment module 103 is used for making ordering payment by displaying a debit card page by using the acquired related instruction;
and the card opening module 104 is used for writing personal data and activating the personal data based on the result of the order payment and the result of the pre-installed empty card to obtain a card opening result.
EXAMPLE III
Referring to fig. 3, fig. 3 is a block diagram of an apparatus for activating traffic card optimization according to another embodiment of the present application, where the apparatus includes:
a memory 31 having an executable program stored thereon;
a processor 32 for executing the executable program in the memory 31 to implement the steps of any of the above methods.
Further, the present application provides a computer readable storage medium having stored thereon computer instructions for causing a computer to perform the steps of any of the methods described above. The storage medium may be a magnetic Disk, an optical Disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD) or a Solid State Drive (Solid-State Drive, auxiliary security domain), and the like; the storage medium may also comprise a combination of memories of the kind described above.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (8)

1. A method for opening traffic card optimization, the method comprising:
acquiring a relevant instruction of clicking to obtain a card;
displaying a collar card page and synchronously executing the operation of pre-loading empty cards by using the acquired related instruction;
utilizing the display collar card page to perform ordering payment operation;
writing personal data and activating by using the result of the ordering payment operation and the result of the pre-installed empty card to obtain a card opening result;
the step of pre-loading the empty card comprises the following steps:
executing pre-opening card assembly data and executing opening card;
the execution step of the pre-opening card assembly data comprises the following steps:
acquiring the city card type and the service channel of the traffic card by the user by using the acquired related instruction;
the city card type and the service channel where the traffic card is located are obtained by the user, 16-system conversion is carried out after encryption based on a preset apple certificate public key and an applet nonce base64, 16-system conversion is carried out after encryption of a signature base64 of the applet nonce, and a pre-opening card related parameter set is obtained;
and obtaining the id of the unique identification card and the equipment association and the assembly encryption password data based on the pre-opening card related parameter set, and returning a public key.
2. The method of claim 1, wherein the executing step of executing the card opening comprises:
based on the id and the assembled encrypted password data of the unique identification card and the equipment, issuing a first 8050 instruction of GP authentication to a security domain authorized and managed in a mobile wallet;
after the execution result of the first 8050 instruction is obtained, a key management service is requested to calculate a card cipher generation 8482 instruction and a key replacement instruction;
based on the result generated by calculating the secret key, sending an instruction for GP to authenticate the 8482 instruction and the substitute secret key to the mobile wallet, and requesting to encrypt and install the auxiliary security domain;
based on the execution result of the request for encrypting and installing the auxiliary security domain, issuing an instruction for installing the auxiliary security domain and the replacement key to the mobile wallet;
and receiving and executing an instruction for installing an auxiliary security domain and the replacement key issued by the mobile wallet to obtain a result of pre-installing an empty card.
3. The method of claim 2, wherein the receiving and executing the instruction issued by the mobile wallet for installing the auxiliary security domain and the replacement key to obtain a result of pre-installing an empty card comprises:
receiving an instruction of installing an auxiliary security domain and replacing the secret key issued by the mobile wallet, calling a secret key management service to encrypt according to a corresponding instruction level to generate a loading packet instruction and returning a generated result;
calling a mobile wallet to issue the loading packet instruction and returning an execution result;
based on the returned execution result, requesting the key management service to install the application and migrate to the auxiliary security domain, and returning a packed instruction;
and based on the returned and packaged instruction, the mobile wallet issues an instruction for installing and transferring the application and returns the instruction to obtain a result of pre-installing the empty card.
4. The method of claim 1, wherein writing personal data and activating based on the result of ordering payment and the result of pre-loading an empty card, and obtaining a card-opening result comprises:
and after the synchronous execution payment is finished, issuing an enabling instruction, writing personal data based on the result of the pre-installed empty card, and activating to obtain a card opening result.
5. The method of claim 4, wherein issuing an enabling instruction after the synchronous execution payment is completed comprises:
after a successful payment result pushed by the payment channel is received, the personalized instruction is issued to the mobile wallet and executed;
based on the execution result, calling an encryption service by the card to request the enabling instruction signature and returning the execution result;
signing and returning an execution result based on the enabling instruction, issuing the enabling instruction to a mobile wallet, executing and returning a card passing result;
and based on the returned card passing result, the card passing returns the final card opening result of the wallet according to the enabling instruction result.
6. A system for provisioning traffic card optimizations, the system comprising:
the acquisition module is used for acquiring relevant instructions of clicking to obtain the card;
the pre-installed empty card module is used for pre-installing the empty card by synchronous execution by utilizing the acquired related instruction to obtain a result of pre-installing the empty card;
the payment module is used for making order payment by displaying a card receiving page by using the acquired related instruction;
and the card opening module is used for writing personal data and activating the personal data based on the ordering payment result and the result of the pre-installed empty card to obtain a card opening result.
7. An apparatus for provisioning traffic card optimizations, the apparatus comprising:
a memory having an executable program stored thereon;
a processor for executing the executable program in the memory to implement the steps of the method of any one of claims 1-5.
8. A computer-readable storage medium having stored thereon computer instructions for causing a computer to perform the steps of the method of any one of claims 1 to 5.
CN202211456668.8A 2022-11-21 2022-11-21 Method, system, equipment and storage medium for activating traffic card optimization Pending CN115941833A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211456668.8A CN115941833A (en) 2022-11-21 2022-11-21 Method, system, equipment and storage medium for activating traffic card optimization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211456668.8A CN115941833A (en) 2022-11-21 2022-11-21 Method, system, equipment and storage medium for activating traffic card optimization

Publications (1)

Publication Number Publication Date
CN115941833A true CN115941833A (en) 2023-04-07

Family

ID=86699718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211456668.8A Pending CN115941833A (en) 2022-11-21 2022-11-21 Method, system, equipment and storage medium for activating traffic card optimization

Country Status (1)

Country Link
CN (1) CN115941833A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150348025A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Apparatuses and Methods for Using a Primary User Device to Provision Credentials onto a Secondary User Device
WO2016045042A1 (en) * 2014-09-25 2016-03-31 华为技术有限公司 Method and device for managing content in secure element
US20160150410A1 (en) * 2014-11-25 2016-05-26 Google Inc. Securely Accessing Secure Elements
CN107862514A (en) * 2017-11-06 2018-03-30 北京小米移动软件有限公司 Mass transit card management method, apparatus and system, storage medium
KR20180078668A (en) * 2016-12-30 2018-07-10 한국철도공사 Payment System for HCE Mobile Advance Payment Type Traffic Card using minimum balance and Payment Method thereof
CN110086609A (en) * 2019-03-27 2019-08-02 华为技术有限公司 The method and electronic equipment of data safety backup and security recovery
CN113508411A (en) * 2021-02-05 2021-10-15 深圳市汇顶科技股份有限公司 Virtual electronic card management method and system, security chip, terminal and storage medium
CN114390508A (en) * 2021-12-28 2022-04-22 天翼物联科技有限公司 User asynchronous activation method, system, device and storage medium
CN115278646A (en) * 2022-07-26 2022-11-01 无锡融卡科技有限公司 Embedded SIM card, terminal and method for selecting, downloading and installing application program

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150348025A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Apparatuses and Methods for Using a Primary User Device to Provision Credentials onto a Secondary User Device
WO2016045042A1 (en) * 2014-09-25 2016-03-31 华为技术有限公司 Method and device for managing content in secure element
US20160150410A1 (en) * 2014-11-25 2016-05-26 Google Inc. Securely Accessing Secure Elements
KR20180078668A (en) * 2016-12-30 2018-07-10 한국철도공사 Payment System for HCE Mobile Advance Payment Type Traffic Card using minimum balance and Payment Method thereof
CN107862514A (en) * 2017-11-06 2018-03-30 北京小米移动软件有限公司 Mass transit card management method, apparatus and system, storage medium
CN110086609A (en) * 2019-03-27 2019-08-02 华为技术有限公司 The method and electronic equipment of data safety backup and security recovery
CN113508411A (en) * 2021-02-05 2021-10-15 深圳市汇顶科技股份有限公司 Virtual electronic card management method and system, security chip, terminal and storage medium
CN114390508A (en) * 2021-12-28 2022-04-22 天翼物联科技有限公司 User asynchronous activation method, system, device and storage medium
CN115278646A (en) * 2022-07-26 2022-11-01 无锡融卡科技有限公司 Embedded SIM card, terminal and method for selecting, downloading and installing application program

Similar Documents

Publication Publication Date Title
CN108604345B (en) Method and device for adding bank card
KR101463586B1 (en) Local trusted services manager for a contactless smart card
AU2011343546B2 (en) Writing application data to a secure element
US9973583B2 (en) Method for accessing a service, corresponding device and system
CN110855791B (en) Block link point deployment method and related equipment
CN108595970A (en) Configuration method, device, terminal and the storage medium of processing component
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
CN106471768A (en) Method and apparatus for setting up secure communication channel
MX2014009822A (en) Mobile apparatus supporting a plurality of access control clients, and corresponding methods.
CN105900104A (en) Applet migration in a secure element
CA2698890A1 (en) Presenting web pages through mobile host devices
CN104683972A (en) Methods And Apparatus For Delivering Electronic Identification Components Over A Wireless Network
CN108353278A (en) The management method and device of universal embedded integrated circuit card eUICC
CN105308907B (en) Installation package authorization method and device
US11887109B1 (en) Service composition in a mobile communication device application framework
CN108288168A (en) Borrow or lend money register method, terminal and the computer readable storage medium of service account
EP2705455B1 (en) Determination of apparatus configuration and programming data
Ahmad et al. Enhancing the security of mobile applications by using TEE and (U) SIM
JP2016012902A (en) Electronic data utilization system, portable terminal device, and method for electronic data utilization system
CN101841806A (en) Service card information processing method, device and system and communication terminal
CN108200052B (en) Digital signature method and device based on mobile terminal and mobile terminal
CN115941833A (en) Method, system, equipment and storage medium for activating traffic card optimization
CN103905192B (en) A kind of encrypted authentication method, apparatus and system
KR102026279B1 (en) How to manage your application
CN108668267B (en) Smart card generation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination