CN117915298A - Card application processing method, device, equipment and storage medium - Google Patents

Card application processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN117915298A
CN117915298A CN202410070346.2A CN202410070346A CN117915298A CN 117915298 A CN117915298 A CN 117915298A CN 202410070346 A CN202410070346 A CN 202410070346A CN 117915298 A CN117915298 A CN 117915298A
Authority
CN
China
Prior art keywords
card
identifier
application
card application
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410070346.2A
Other languages
Chinese (zh)
Inventor
杨庆友
尹少春
王君珂
靳慧芳
常成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202410070346.2A priority Critical patent/CN117915298A/en
Publication of CN117915298A publication Critical patent/CN117915298A/en
Pending legal-status Critical Current

Links

Abstract

The application provides a card application processing method, device, equipment and storage medium. Applied to a first server, the method comprises: receiving an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user; determining a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first subscriber identity card; inquiring the opening state of the first card application identifier in a preset card application state database according to the failure request, and sending a service request to a second server when the opening state of the first card application identifier is in an effective state so that the second server executes service operation according to the service request to obtain an execution result; the execution result indicates that the opening state of the first card application identifier is a failure state, and the service request comprises the first card application identifier; and receiving an execution result returned by the second server. The method of the application can reduce the risks of property loss, information leakage and the like of users.

Description

Card application processing method, device, equipment and storage medium
Technical Field
The present application relates to the field of smart cards, and in particular, to a card application processing method, device, apparatus, and storage medium.
Background
A national cipher Near Field Communication (NFC) subscriber identity (subscriber identity module, SIM) card (hereinafter referred to as a national cipher SIM card) is a new generation SIM card supporting technical capabilities of hardware encryption of a national cipher algorithm, NFC near field communication, JAVA card application presetting, idle transmission, and the like, and the national cipher SIM card may also be referred to as a 5G national cipher NFC SIM card or super SIM card. Compared with the traditional SIM card, the national-density SIM card can integrate various innovative applications, such as a digital RMB SIM wallet, an SIM digital identity, a public transport application, a campus application, an access control application and the like, and various daily life applications of a user are integrated into one SIM card, and when the SIM card is used, the user can finish operations such as authentication, payment and the like only by the NFC touching function of the mobile phone (the power-off and network-off states can be used), so that unprecedented convenient experience is brought to the daily life of the user.
At present, when a user needs to sell or pass a national-density SIM card, or when the user loses or changes the national-density SIM card, the business such as selling, passing, reporting loss, replacing the card and the like can be transacted through an operator system, the operator system can correspondingly process the mobile phone number of the user, close the services such as voice, flow, short message and the like corresponding to the mobile phone number of the user, and cancel the corresponding binding relation between the mobile phone number of the user and the national-density SIM card.
However, after the mobile phone number of the user is processed in this way, risks such as property loss and information leakage of the user are still high.
Disclosure of Invention
The application provides a card application processing method, device, equipment and storage medium, which are used for solving the technical problems of higher risks such as property loss and information leakage of users when a national security SIM card is lost.
In a first aspect, the present application provides a card application processing method, applied to a first server, where the method includes:
receiving an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user;
determining a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first user identification card installed in the user terminal;
Inquiring the opening state of the first card application identifier in a preset card application state database according to the failure request, and sending a service request to a second server when the opening state of the first card application identifier is in an effective state so that the second server executes service operation according to the service request to obtain an execution result; the execution result indicates that the opening state of the first card application identifier is a failure state, and the service request comprises the first card application identifier;
and receiving an execution result returned by the second server.
In one possible implementation, determining the first card application identifier according to the communication identifier and the application information includes:
and acquiring the card identifier of the first user identification card according to the communication identifier, and acquiring the first card application identifier according to the card identifier of the first user identification card and the application information.
In one possible implementation manner, the service request further includes a card identifier of the second subscriber identity card, the execution result further includes a second card application identifier, the communication identifier corresponding to the first subscriber identity card is the same as the communication identifier corresponding to the second subscriber identity card, and after receiving the execution result returned by the second server, the method further includes:
Writing a second card application identifier into a second user identification card;
storing the card identifier of the second user identification card, the second card application identifier, the communication identifier and the second target corresponding relation to a preset card application state database, wherein the second target corresponding relation is the corresponding relation among the card identifier of the second user identification card, the second card application identifier and the communication identifier;
Updating the opening state of the first card application identifier in the preset card application state database to be a failure state, and recording the opening state of the second card application identifier to be a valid state.
In one possible implementation, before receiving the invalidation request sent by the user through the user terminal, the method further includes:
Receiving a first card application identifier sent by a second server, and acquiring a communication identifier and a card identifier of a first user identification card;
writing a first card application identifier into a first user identification card;
Storing a card identifier of the first user identification card, a first card application identifier, a communication identifier and a first target corresponding relation to a preset card application state database, wherein the first target corresponding relation is a corresponding relation among the card identifier of the first user identification card, the first card application identifier and the communication identifier;
And recording the opening state of the first card application identifier in the preset card application state database as an effective state.
In a second aspect, the present application provides a card application processing method, applied to a second server, the method including:
Receiving a service request sent by a first server, wherein the service request comprises a first card application identifier, the opening state of the first card application identifier is an effective state, and the first card application is an application installed in a first user identification card;
executing the service operation according to the service request to obtain an execution result, wherein the execution result indicates that the opening state of the first card application identifier is a failure state;
and sending the execution result to the first server.
In one possible implementation manner, the service request further includes a card identifier of the second subscriber identity module, and the service operation is executed according to the service request, so as to obtain an execution result, where the method includes:
performing invalidation processing on the first card application identifier;
Acquiring user information according to the first card application identifier;
Determining a second card application identifier according to the user information and the card identifier of the second user identification card, wherein the opening state of the second card application identifier is a valid state; the communication identification corresponding to the first subscriber identity card is the same as the communication identification corresponding to the second subscriber identity card.
In one possible implementation, determining the second card application identifier according to the user information and the card identifier of the second user identification card includes:
And encrypting the user information and the card identifier of the second user identification card through a preset encryption algorithm to obtain a second card application identifier.
In a third aspect, the present application provides a card application processing apparatus, applied to a first server, the apparatus including a first receiving module, a determining module, a first transmitting module, and a second receiving module, wherein,
The first receiving module is used for receiving an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user;
The determining module is used for determining a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first user identification card installed in the user terminal;
The first sending module is used for inquiring the opening state of the first card application identifier in the preset card application state database according to the failure request, and sending a service request to the second server when the opening state of the first card application identifier is in an effective state so as to enable the second server to execute service operation according to the service request to obtain an execution result; the execution result indicates that the opening state of the first card application identifier is a failure state, and the service request comprises the first card application identifier;
and the second receiving module is used for receiving the execution result returned by the second server.
In one possible implementation manner, the determining module is specifically configured to:
and acquiring the card identifier of the first user identification card according to the communication identifier, and acquiring the first card application identifier according to the card identifier of the first user identification card and the application information.
In one possible implementation manner, the service request further includes a card identifier of the second subscriber identity card, the execution result further includes a second card application identifier, the communication identifier corresponding to the first subscriber identity card is the same as the communication identifier corresponding to the second subscriber identity card, and the apparatus further includes:
the first writing module is used for writing the second card application identifier into the second user identification card;
The first storage module is used for storing the card identifier of the second user identification card, the second card application identifier, the communication identifier and the second target corresponding relation to the preset card application state database, wherein the second target corresponding relation is the corresponding relation among the card identifier of the second user identification card, the second card application identifier and the communication identifier; updating the opening state of the first card application identifier in the preset card application state database to be a failure state, and recording the opening state of the second card application identifier to be a valid state.
In one possible implementation, the apparatus further includes:
The fourth receiving module is used for receiving the first card application identifier sent by the second server and obtaining the communication identifier and the card identifier of the first user identification card;
the first writing module is used for writing the first card application identifier into the first user identification card;
The second storage module is used for storing the card identifier of the first user identification card, the first card application identifier, the communication identifier and the first target corresponding relation to the preset card application state database, wherein the first target corresponding relation is the corresponding relation among the card identifier of the first user identification card, the first card application identifier and the communication identifier; and recording the opening state of the first card application identifier in the preset card application state database as an effective state.
In a fourth aspect, the present application provides a card application processing apparatus, applied to a second server, including a third receiving module, an executing module, and a second transmitting module, wherein,
The third receiving module is used for receiving a service request sent by the first server, wherein the service request comprises a first card application identifier, the opening state of the first card application identifier is an effective state, and the first card application is an application installed in the first user identification card;
The execution module is used for executing the service operation according to the service request to obtain an execution result, and the execution result indicates that the opening state of the first card application identifier is a failure state;
and the second sending module is used for sending the execution result to the first server.
In one possible implementation manner, the execution module is specifically configured to:
performing invalidation processing on the first card application identifier;
Acquiring user information according to the first card application identifier;
Determining a second card application identifier according to the user information and the card identifier of the second user identification card, wherein the opening state of the second card application identifier is a valid state; the communication identification corresponding to the first subscriber identity card is the same as the communication identification corresponding to the second subscriber identity card.
In one possible implementation manner, the execution module is specifically configured to:
And encrypting the user information and the card identifier of the second user identification card through a preset encryption algorithm to obtain a second card application identifier.
In a fifth aspect, the present application provides an electronic device, comprising: a processor and a memory communicatively coupled to the processor; the memory stores computer-executable instructions; the processor executes computer-executable instructions stored in the memory, causing the processor to perform the card application processing method as described in the first or second aspect.
In a sixth aspect, the present application provides a computer readable storage medium having stored therein computer executable instructions for implementing a card application processing method as described in the first or second aspect when the computer executable instructions are executed by a processor.
In a seventh aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements a card application processing method as described in the first or second aspect.
In an eighth aspect, the present application provides a chip on which a computer program is stored which, when executed by the chip, implements a card application processing method as described in the first or second aspect.
In one possible implementation, the chip is a chip in a chip module.
The method receives a failure request sent by a user through a user terminal by a first server, wherein the failure request carries a communication identifier and application information of the user; determining a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first user identification card installed in the user terminal; inquiring the opening state of the first card application identifier in a preset card application state database according to the invalidation request, and sending a service request to a second server when the opening state of the first card application identifier is an effective state; the second server receives a service request sent by the first server, wherein the service request comprises a first card application identifier, and the opening state of the first card application identifier is an effective state; executing the business operation according to the business request to obtain an execution result; sending an execution result to a first server; and the first server receives an execution result returned by the second server. The first card application identifier of the user is processed based on the invalidation request of the user, so that the first card application identifier of the user is invalidated, and the corresponding card application in the first user identification card of the user is invalidated, therefore, even if a hacker acquires the user identification card of the user, the hacker cannot use various funds, identities and other applications in the first user identification card through the NFC bump function, and therefore risks of property loss, information leakage and the like of the user can be reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic diagram of a card application processing network architecture according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating a card application processing method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a card application provisioning process according to an embodiment of the present application;
FIG. 4 is a second flow chart of a card application processing method according to an embodiment of the present application;
FIG. 5 is a flowchart illustrating a card application processing method according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a card application processing device according to an embodiment of the present application;
FIG. 7 is a schematic diagram II of a card application processing device according to an embodiment of the present application;
Fig. 8 is a schematic hardware structure of an electronic device according to an embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with related laws and regulations and standards, and provide corresponding operation entries for the user to select authorization or rejection.
A national cipher Near Field Communication (NFC) subscriber identity (subscriber identity module, SIM) card (hereinafter referred to as a national cipher SIM card) is a new generation SIM card supporting technical capabilities of hardware encryption of a national cipher algorithm, NFC near field communication, JAVA card application presetting, idle transmission, and the like, and the national cipher SIM card may also be referred to as a 5G national cipher NFC SIM card or super SIM card. Compared with the traditional SIM card, the national-density SIM card can integrate various innovative applications, such as a digital RMB SIM wallet application, a SIM digital identity application, a public transport application, a campus application, an access control application and the like, and various daily life applications of a user are integrated into one SIM card, and when the SIM card is used, the user can finish operations such as authentication, payment and the like only by the NFC touch (power-off and network-off state can be used) function of the mobile phone, so that unprecedented convenient experience is brought to the daily life of the user.
Illustratively, a digital Renminbi SIM wallet is taken as an example. After a user claims a digital RMB wallet (called soft wallet for short) through the digital RMB application (application) of the RMB, the soft wallet can be written into the national secret SIM card of the user, namely, the digital RMB SIM wallet is opened. After opening, the digital RMB payment can be realized by using the NFC bump of the mobile phone.
At present, when a user needs to sell or pass a national-density SIM card, or when the user loses or changes the national-density SIM card, the business such as selling, passing, reporting loss, replacing the card and the like can be transacted through an operator system, the operator system can correspondingly process the mobile phone number of the user, close the services such as voice, flow, short message and the like corresponding to the mobile phone number of the user, and cancel the corresponding binding relation between the mobile phone number of the user and the national-density SIM card.
However, such processing of the mobile phone number of the user does not involve invalidating the card application integrated in the national-security SIM card, and if a "hacker" (a name of a person other than the user to whom the national-security SIM card belongs) obtains the national-security SIM card unbound to the mobile phone number of the user, the "hacker" may install the national-security SIM card in the terminal device having the NFC function and use the "NFC bump-and-bump" function to occupy the rights and interests of the card application integrated in the national-security SIM card of the user.
For example, if the national security SIM card is integrated with an access control application, a "hacker" may use the "NFC bump-and-bump" function to impersonate the user to which the national security SIM card belongs to access the relevant places; for another example, if the national-security SIM card has a wallet application integrated therein, a "hacker" may pay by swiping the funds of the user to whom the national-security SIM card belongs using the "NFC bump-and-bump" function. Therefore, only the mobile phone number of the user is processed, but a mode of invalidating the card application integrated in the national security SIM card is not involved, so that risks of property loss, information leakage and the like of the user are still high.
In view of this, an embodiment of the present application provides a card application processing method, where when a user needs, a card application identifier in a national security SIM card is invalidated to invalidate a corresponding card application, and after the card application is invalidated, even if a "hacker" obtains the national security SIM card, the "hacker" cannot use applications such as various funds, identities, etc. in the SIM card through a "NFC bump-and-bump" function, so that risks such as property loss, information leakage, etc. of the user can be reduced.
Fig. 1 is a schematic diagram of a card application processing network architecture according to an embodiment of the present application. As shown in fig. 1, the network architecture schematic includes a first server 100, a second server 200, and a user terminal 300. The first server 100, the second server 200 and the user terminal 300 are communicatively connected to each other.
In the embodiment of the present application, the UE 300 may also be called a terminal (terminal), a User Equipment (UE), a terminal device, a Mobile Station (MS), a Mobile Terminal (MT), etc. The user terminal 300 may be, but is not limited to, a mobile phone, a personal computer (personal computer, PC), a wearable device, a tablet (pad), a computer with wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, and the like. The user terminal 300 may be configured to send a failure request to the first server 100 in response to a related operation of the user's trigger card application failure, and the user terminal 300 may be configured to send an activation request to the second server 200 in response to a related operation of the user's trigger card application.
In the embodiment of the present application, the first server 100 may be understood as a server on which an operator system is installed, and the second server 200 may be understood as an application server providing an application service for a user terminal. The second server 200 may be, for example, a digital rmb application platform, a public security identity authentication platform, a public transportation informatization platform, a campus informatization platform, a cell informatization platform, etc. The number of the user terminals 300, the first server 100, and the second server 200 may be any number greater than or equal to 1 according to actual needs.
The first server 100 may be configured to receive an invalidation request sent by a user through the user terminal 300, where the invalidation request carries a communication identifier and application information of the user; determining a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first subscriber identity card installed in the user terminal 300; inquiring the opening state of the first card application identifier in a preset card application state database according to the invalidation request, and sending a service request to the second server 200 when the opening state of the first card application identifier is an effective state; the second server 200 may be configured to receive a service request sent by the first server 100, where the service request includes a first card application identifier, and an on state of the first card application identifier is a valid state; executing the business operation according to the business request to obtain an execution result; transmitting the execution result to the first server 100; the first server 100 receives the execution result returned from the second server 200. The card application identifier of the user is processed based on the invalidation request of the user, so that the card application identifier of the user is invalidated, and even if a hacker acquires the user identification card of the user, the hacker cannot use various funds, identities and other applications in the user identification card through the NFC bump function, so that risks of property loss, information leakage and the like of the user can be reduced.
In the embodiment of the present application, the first server 100 or the second server 200 may be, for example, an independent physical server, or may be a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, a content distribution network (content delivery network, CDN), and basic cloud computing services such as big data and an artificial intelligence platform.
In addition, the network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided by the embodiments of the present application, and as a person of ordinary skill in the art can know, with evolution of the network architecture and occurrence of a new service scenario, the technical solution provided by the embodiments of the present application is also applicable to similar technical problems.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart illustrating a card application processing method according to an embodiment of the present application. As shown in fig. 2, the method may include:
s201, a first server receives an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user.
In the embodiment of the application, the invalidation request can be used for indicating the first server to invalidate the first card application identifier corresponding to the communication identifier and the application information when the first server performs the related service, wherein the related service can be any one of the services of loss reporting, user selling, household passing, card supplementing, card changing and the like.
Wherein the communication identification can be used for identifying the user, and the communication identifications of different users are different. The communication identity may be, for example, a mobile phone number of the user.
The application information can be used for indicating card applications to be disabled by a user, and the application information corresponding to different applications is different. The application information may be a character string composed of one or more of numbers, letters, and symbols.
S202, a first server determines a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first subscriber identity card installed in the user terminal.
In the embodiment of the present application, the first card application identifier may be an identifier of a card application to be invalidated by a user written in the first user identification card. For example, assuming that the application information indicates that the card application to be disabled by the user is an access control application, the first card application identifier may be an access control ID of the user; assuming that the application information indicates that the card application to be invalidated by the user is a wallet application, the first card application identification may be a wallet ID of the user; assuming that the application information indicates that the card application that the user wants to disable is a SIM digital identity application, the first card application identification may be a user's on-card function credential (cyber trusted identity, CTID).
Wherein the first subscriber identity card is a smart card in which one or more card applications may be installed. The first subscriber identity card may be, for example, a national-security SIM card. It will be appreciated that at least one first subscriber identity card may be installed in the subscriber terminal.
In a possible implementation, the first server may determine the first subscriber identity card according to the communication identifier, and determine a first card application identifier in the first subscriber identity card according to the application information.
For example, the first server may determine, according to the mobile phone number, which of the cryptographic SIM cards in the user terminal needs to be disabled, and determine, according to the application information, which of the cryptographic SIM cards needs to be disabled.
S203, the first server inquires an opening state of the first card application identifier in a preset card application state database according to the failure request, and when the opening state of the first card application identifier is in an effective state, a service request is sent to the second server, so that the second server executes service operation according to the service request, and an execution result is obtained; the execution result indicates that the opening state of the first card application identifier is a failure state; the service request includes a first card application identifier.
In the embodiment of the application, the opening state of the first card application identifier can be an effective state or an invalid state, and when the opening state of the first card application identifier can be the effective state, the user identification card is characterized in that the application corresponding to the first card application identifier is in a state capable of being normally used; and when the opening state of the first card application identifier can be an invalid state, characterizing that the application corresponding to the first card application identifier is in an unusable state in the user identification card.
For example, the preset card application state database may store an on state of the first card application identifier, and the valid state and the invalid state may be represented by different characters, fields or numbers. For example, when the on state is "1", it indicates that the on state is a valid state; when the on state is "0", it indicates that the on state is an invalid state.
It should be understood that when the on state of the first card application identifier is the valid state, the application corresponding to the first card application identifier may be normally used regardless of whether the first subscriber identity card is in any of the normal, off, unbinding with the communication identifier, etc.
In the embodiment of the application, the service request can be used for indicating the second server to change the open state of the first card application identifier from the valid state to the invalid state.
In a possible implementation, after receiving the invalidation request, the first server queries the opening state of the first card application identifier in the preset card application state database, and when the opening state of the first card application identifier is queried to be an effective state, sends a service request to the second server so as to change the opening state of the first card application identifier from the effective state to the invalidation state.
When the open state of the first card application identifier is queried to be in an invalid state, the first server can return a processing result to the user terminal, wherein the processing result indicates that the open state of the first card application identifier is in the invalid state.
S204, the second server receives a service request sent by the first server, wherein the service request comprises a first card application identifier, and the opening state of the first card application identifier is an effective state.
S205, the second server executes the service operation according to the service request to obtain an execution result, and the execution result indicates that the opening state of the first card application identifier is a failure state.
In the embodiment of the application, the service operation may include performing failure processing on the first card application identifier, so that the open state of the first card application identifier is changed from the valid state to the failure state; the business operations may further include invalidating the first card application identification and encrypting the card identifications of the other subscriber identity cards.
In a possible implementation, when the service request includes the first card application identifier, the second server may perform a service operation on the first card application identifier according to the service request, obtain an execution result that the open state of the first card application identifier is a failure state, and send the execution result to the first server; when the service request includes the first card application identifier and the card identifiers of other user identification cards, the second server can execute service operation on the first card application identifier and the card identifiers of the other user identification cards according to the service request, obtain an execution result that the opening state including the first card application identifier is in a failure state, and send the execution result to the first server.
S206, the first server receives an execution result returned by the second server.
In the embodiment of the application, after receiving the execution result returned by the second server, the first server can update the opening state of the first card application identifier in the preset card application state database to the failure state.
In the embodiment of the application, a first server receives an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user; determining a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first user identification card installed in the user terminal; inquiring the opening state of the first card application identifier in a preset card application state database according to the invalidation request, and sending a service request to a second server when the opening state of the first card application identifier is an effective state; the second server receives a service request sent by the first server, wherein the service request comprises a first card application identifier, and the opening state of the first card application identifier is an effective state; executing the business operation according to the business request to obtain an execution result; sending an execution result to a first server; and the first server receives an execution result returned by the second server. The first card application identifier of the user is processed based on the invalidation request of the user, so that the first card application identifier of the user is invalidated, and the corresponding card application in the first user identification card of the user is invalidated, therefore, even if a hacker acquires the user identification card of the user, the hacker cannot use various funds, identities and other applications in the first user identification card through the NFC bump function, and therefore risks of property loss, information leakage and the like of the user can be reduced.
It may be understood that, before receiving the invalidation request sent by the user through the user terminal, the on state of the first card application identifier in the preset card application state database may be a valid state.
Next, a process of opening the first card application or a process of making the opening state of the first card application identifier be an effective state will be described.
Fig. 3 is a schematic diagram of a card application provisioning process according to an embodiment of the present application. As shown in fig. 3, the process may include:
S301, a user sends an opening request to a second server through a user terminal, wherein the opening request can carry user information and a card identifier of a first user identification card in the user terminal.
S302, the second server determines a first card application identifier according to the user information in the opening request and the card identifier of the first user identification card.
In the embodiment of the application, the opening request can carry the user information and the card identifier of the first user identification card in the user terminal, and the opening request can be used for indicating the second server to generate the first card application identifier.
The user information can be used for uniquely identifying the user, and the user information of the same user can be different for different card applications, and the user information can be a character string formed by one or more of numbers, letters and symbols. For example, when the first card application is a digital rmb SIM wallet application, the user information may include a user's bank account number; when the first card application is a SIM digital identity application, the user information may include an identification card number of the user; when the first card application is a campus application, the user information may include a student number, class information, etc. of the user; when the first card application is an access control application, the user information may include housing information of the user, and the like.
Wherein the card identification of the first subscriber identity card may be used to uniquely identify the first subscriber identity card. Illustratively, when the first subscriber identity card is a national-code SIM card, the card identification of the first subscriber identity card may be an integrated circuit card identification code (INTEGRATE CIRCUIT CARD IDENTITY, ICCID) of the national-code SIM card.
In a possible implementation, the second server may obtain the first card application identifier by encrypting the user information in the open request and the card identifier of the first user identification card.
The second server may obtain the SIM card hard wallet ID by encrypting the bank account number of the user in the service request and the ICCID of the national secret SIM card, for example.
S303, the second server sends the first card application identifier to the first server.
S304, the first server receives the first card application identifier sent by the second server, and acquires the communication identifier and the card identifier of the first user identification card;
in a possible implementation, the first server may decrypt the application identifier of the first card to obtain a card identifier of the first subscriber identity card, and obtain, according to the card identifier of the first subscriber identity card, a pre-recorded communication identifier corresponding to the card identifier. The prerecorded identification of the card may be understood as being recorded in the first server when the user transacts the first user identification card. For example, when handling a national-code SIM card for a user, the operator system may record the ICCID and corresponding phone number of the national-code SIM card.
S305, the first server writes the first card application identifier into the first user identification card.
The first user identification card can be installed in the user terminal, and after the first card application identifier is written into the first user identification card, a user can use the card application corresponding to the first card application identifier on the first user identification card by utilizing the NFC (near field communication) touch function of the user terminal.
S306, the first server stores the card identification of the first user identification card, the first card application identification, the communication identification and the first target corresponding relation to a preset card application state database, wherein the first target corresponding relation is the corresponding relation among the card identification of the first user identification card, the first card application identification and the communication identification; and recording the opening state of the first card application identifier in the preset card application state database as an effective state.
S307, the first server may return a first processing result to the user terminal, where the first processing result may indicate that the on state of the first card application identifier is a valid state.
In the embodiment of the application, in the process of opening the first card application, synchronously or asynchronously storing the card identifier of the first user identification card, the first card application identifier, the communication identifier and a first target corresponding relationship to a preset card application state database, wherein the first target corresponding relationship is the corresponding relationship among the card identifier of the first user identification card, the first card application identifier and the communication identifier; and recording the opening state of the first card application identifier in the preset card application state database as an effective state, and providing a query condition for invalidating processing of the first card application when a user applies for services such as loss reporting, family selling, family passing, card supplementing, card changing and the like to the first user identification card.
Based on the foregoing embodiments, in one possible implementation, the invalidation request may be any service such as loss reporting, user selling, user passing, etc. of the first subscriber identity module, where the service request sent by the first server may carry the first card application identifier.
The technical scheme of the application is described below by taking the first card application identifier as the SIM card hard wallet ID and taking the invalidation request as a request for any business such as loss reporting, selling, passing and the like of the first user identification card as an example. Fig. 4 illustrates a second flowchart of a card application processing method according to an embodiment of the present application. As shown in fig. 4, the method may include:
S401, a first server receives an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user.
In the embodiment of the application, the invalidation request can be any service such as loss reporting, user selling, user passing and the like of the first user identification card.
S402, the first server acquires the card identification of the first user identification card according to the communication identification.
For example, the operator system determines the ICCID of the national security SIM card corresponding to the mobile phone number according to the mobile phone number provided by the user terminal.
Optionally, if the mobile phone number corresponds to a plurality of national secret SIM cards, the invalidation request may also carry card information, where the card information is used to indicate which SIM card the user needs to perform any service such as loss reporting, selling, passing, etc. The card information may include, for example, information such as a date and a specific time when the user opened the national-density SIM card.
S403, the first server acquires the first card application identifier according to the card identifier of the first user identification card and the application information.
For example, the operator system determines which national-code SIM card the card to be invalidated is applied to according to the ICCID of the national-code SIM card corresponding to the mobile phone number provided by the user terminal, and determines which card application identifier on the national-code SIM card is the first card application identifier (e.g., SIM card hard wallet ID) to be invalidated according to the application information.
In the embodiment of the application, the card identifier of the first user identification card is obtained according to the communication identifier, and the first card application identifier is obtained according to the card identifier of the first user identification card and the application information.
S404, the first server inquires whether the opening state of the first card application identifier is in a valid state in a preset card application state database, if so, step S405 is performed; if not, step S409 is performed.
S405, the first server sends a service request to the second server.
In the embodiment of the application, the service request can carry the first card application identifier.
S406, the second server receives the service request, and performs invalidation processing on the first card application identifier to obtain an execution result, wherein the execution result can indicate that the opening state of the first card application identifier is an invalidation state.
For example, the second server performs invalidation processing on the SIM card hard wallet ID so that the on state of the SIM card hard wallet ID is changed from the valid state to the invalidation state.
And S407, the second server sends the execution result to the first server.
S408, the first server receives an execution result sent by the second server, and updates the first card application identifier opening state in the preset card application state database to a failure state.
S409, the first server returns a second processing result to the user terminal, wherein the second processing result can indicate that the open state of the first card application identifier is in an invalid state.
In the embodiment of the application, when the invalidation request is a request for any service such as loss reporting, loss selling, passing and the like on the first user identification card, or when the user applies for any service such as loss reporting, loss selling, passing and the like on the first user identification card, the first server judges the opening state of the first card application identifier which is invalid by the user request, and when the invalidation request is judged to be in an effective state, the service request is sent to the third server, so that the third server carries out invalidation processing on the first card application identifier which is in the effective state, thereby enabling the first card application to be in the invalidation state, and even if a hacker obtains the first user identification card of the user, the hacker cannot use the first card application in the first user identification card to carry out services such as card swiping, payment and the like through the NFC touch function, thereby reducing risks such as property loss and information leakage of the user.
In another possible implementation, the invalidation request may be a request for performing services such as card supplementing or card changing on the first subscriber identity card, where the service request sent by the first server may carry the first card application identifier and the card identifier of the second subscriber identity card. In the embodiment of the application, the first user identification card can be understood as an old card before the replacement, and the second user identification card can be understood as a new card after the replacement, and the communication identifications corresponding to the first user identification card and the second user identification card are the same.
The technical scheme of the application is described below by taking the first card application identifier as the SIM card hard wallet ID and taking the invalidation request as the service of requesting to carry out card supplementing or card changing and the like on the first user identification card as an example. Fig. 5 illustrates a flowchart of a card application processing method according to an embodiment of the present application. As shown in fig. 5, the method may include:
s501, a first server receives an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user.
In the embodiment of the application, the invalidation request can be a request for carrying out services such as card supplementing or card changing on the first user identification card.
S502, the first server acquires the card identification of the first user identification card according to the communication identification.
S503, the first server obtains a first card application identifier according to the card identifier of the first user identification card and the application information.
Steps S502 to S503 may be referred to above steps S402 to S403, and will not be described here again.
S504, the first server inquires whether the opening state of the first card application identifier is in a valid state in a preset card application state database, if so, step S505 is carried out; if not, step S512 is performed.
S505, the first server sends a service request to the second server.
In the embodiment of the application, the service request can carry the first card application identifier and the card identifier of the second user identification card allocated for the user by the first server.
It should be appreciated that the second subscriber identification card assigned to the user by the first server may be pre-configured with a corresponding card application. For example, a digital RMB SIM wallet application is preset so that the subsequent SIM card hard wallet ID can be written into the second subscriber identity card for normal use.
S506, the second server receives the service request and performs invalidation processing on the first card application identifier.
S507, the second server obtains user information according to the first card application identifier.
S508, the second server determines a second card application identifier according to the user information and the card identifier of the second user identification card, wherein the opening state of the second card application identifier is a valid state; the communication identification corresponding to the first subscriber identity card is the same as the communication identification corresponding to the second subscriber identity card.
Optionally, the second server encrypts the user information and the card identifier of the second user identification card through a preset encryption algorithm to obtain a second card application identifier.
The preset encryption algorithm may be any one of national encryption algorithms such as SM1 (SCB 2), SM2, SM3, SM4, SM7, SM9, and zu encryption algorithm (ZUC).
Illustratively, the digital rmb application platform (the second server) performs invalidation processing on the SIM card hard wallet ID (the first card application identifier) in the first national cryptographic SIM card (i.e., the national cryptographic SIM card that needs to be replaced or complemented), so that the on state of the SIM card hard wallet ID in the first national cryptographic SIM card is in an invalidation state. Meanwhile, the digital RMB application platform decrypts the SIM card hard wallet ID in the first national secret SIM card to obtain the bank account corresponding to the SIM card hard wallet ID. The digital RMB application platform encrypts a bank account corresponding to the SIM card hard wallet ID and a card identifier of a second country-secret SIM card (namely, the country-secret SIM card which is allocated by an operator system for a user and is used for replacing the first country-secret SIM card, the telephone number corresponding to the first country-secret SIM card is the same as the telephone number corresponding to the second country-secret SIM card) through a country-secret algorithm, so that the SIM card hard wallet ID (second card application identifier) in the second country-secret SIM card is obtained, and the opening state of the SIM card hard wallet ID in the second country-secret SIM card is an effective state. And then, the digital RMB application platform returns an execution result to the operator system, wherein the execution result can be used for indicating that the opening state of the SIM card hard wallet ID in the first national cipher SIM card is in a failure state, and can also indicate that the opening state of the SIM card hard wallet ID in the second national cipher SIM card is in a valid state.
In the embodiment of the application, when the invalidation request is a request for carrying out services such as card supplementing or card changing and the like on the first user identification card, or when a user applies for carrying out services such as card supplementing or card changing and the like on the first user identification card, the first server judges the opening state of the application identifier of the first card, which is invalid, requested by the user, and when the invalidation request is judged to be in an effective state, the service request is sent to the third server, so that the third server carries out invalidation processing on the application identifier of the first card in the effective state, thereby reducing risks such as property loss, information leakage and the like possibly occurring due to the loss of the old card. In addition, in the process of supplementing the card, the card application which is invalid in the old card user identification card (first user identification card) is opened in the new user identification card (second user identification card), the user is not required to input user information again to open the card application in the new user identification card (second user identification card), the user operation is reduced, and the user experience is improved.
S509, the second server returns an execution result to the first server.
In the embodiment of the application, the execution result can be used for indicating that the opening state of the first card application identifier is in a failure state and also indicating that the opening state of the second card application identifier is in an effective state.
S510, the first server receives the execution result and writes the second card application identifier into the second user identification card.
S511, the first server stores the card identifier of the second user identification card, the second card application identifier, the communication identifier and a second target corresponding relation to a preset card application state database, wherein the second target corresponding relation is the corresponding relation among the card identifier of the second user identification card, the second card application identifier and the communication identifier; updating the opening state of the first card application identifier in the preset card application state database to be a failure state, and recording the opening state of the second card application identifier to be a valid state.
In the embodiment of the application, in the process of card replacement, synchronously or asynchronously storing the card identifier of the second user identification card, the second card application identifier, the communication identifier and the second target corresponding relationship into a preset card application state database, wherein the second target corresponding relationship is the corresponding relationship among the card identifier of the second user identification card, the second card application identifier and the communication identifier; updating the opening state of the first card application identifier in the preset card application state database to be an invalid state, and recording the opening state of the second card application identifier to be an effective state, so as to provide inquiry conditions for invalidating the second card application when the user applies for services such as loss reporting, user selling, user passing, card supplementing, card changing and the like to the second user identification card.
S512, the first server returns a third processing result to the user terminal, wherein the third processing result can indicate that the opening state of the first card application identifier is in an invalid state, and the opening state of the second card application identifier is in an valid state.
In the embodiment of the application, the first card application identifier of the first user identification card is subjected to invalidation treatment in the card replacement process, so that risks of property loss, information leakage and the like possibly occurring due to the loss of the old card are reduced. And meanwhile, generating a second card application identifier for the second user identification card, updating the opening state of the first card application identifier in a preset card application state database into an invalid state, recording the opening state of the second card application identifier into an effective state, and providing inquiry conditions for invalidating the second card application when the user applies for services such as reporting loss, selling, passing, supplementing card, changing card and the like to the second user identification card.
Fig. 6 is a schematic structural diagram of a card application processing device according to an embodiment of the present application. Referring to fig. 6, the apparatus 60 includes a first receiving module 601, a determining module 602, a first transmitting module 603, and a second receiving module 604, wherein,
The first receiving module 601 is configured to receive an invalidation request sent by a user through a user terminal, where the invalidation request carries a communication identifier and application information of the user;
A determining module 602, configured to determine a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first user identification card installed in the user terminal;
The first sending module 603 is configured to query an on state of the first card application identifier in a preset card application state database according to the failure request, and send a service request to the second server when the on state of the first card application identifier is an active state, so that the second server performs a service operation according to the service request, and an execution result is obtained; the execution result indicates that the opening state of the first card application identifier is a failure state, and the service request comprises the first card application identifier;
and the second receiving module 604 is configured to receive an execution result returned by the second server.
In one possible implementation, the determining module 602 is specifically configured to:
and acquiring the card identifier of the first user identification card according to the communication identifier, and acquiring the first card application identifier according to the card identifier of the first user identification card and the application information.
In one possible implementation manner, the service request further includes a card identifier of the second subscriber identity card, the execution result further includes a second card application identifier, the communication identifier corresponding to the first subscriber identity card is the same as the communication identifier corresponding to the second subscriber identity card, and the apparatus 60 further includes:
the first writing module is used for writing the second card application identifier into the second user identification card;
The first storage module is used for storing the card identifier of the second user identification card, the second card application identifier, the communication identifier and the second target corresponding relation to the preset card application state database, wherein the second target corresponding relation is the corresponding relation among the card identifier of the second user identification card, the second card application identifier and the communication identifier; updating the opening state of the first card application identifier in the preset card application state database to be a failure state, and recording the opening state of the second card application identifier to be a valid state.
In one possible implementation, the apparatus 60 further includes:
The fourth receiving module is used for receiving the first card application identifier sent by the second server and obtaining the communication identifier and the card identifier of the first user identification card;
the first writing module is used for writing the first card application identifier into the first user identification card;
The second storage module is used for storing the card identifier of the first user identification card, the first card application identifier, the communication identifier and the first target corresponding relation to the preset card application state database, wherein the first target corresponding relation is the corresponding relation among the card identifier of the first user identification card, the first card application identifier and the communication identifier; and recording the opening state of the first card application identifier in the preset card application state database as an effective state.
Fig. 7 is a schematic diagram of a card application processing device according to a second embodiment of the present application. Referring to fig. 7, the apparatus 70 includes a third receiving module 701, an executing module 702, and a second transmitting module 703, wherein,
A third receiving module 701, configured to receive a service request sent by a first server, where the service request includes a first card application identifier, an on state of the first card application identifier is an active state, and the first card application is an application installed in a first subscriber identity card;
the execution module 702 is configured to execute a service operation according to the service request, and obtain an execution result, where the execution result indicates that an on state of the first card application identifier is a failure state;
the second sending module 703 is configured to send the execution result to the first server.
In one possible implementation, the execution module 702 is specifically configured to:
performing invalidation processing on the first card application identifier;
Acquiring user information according to the first card application identifier;
Determining a second card application identifier according to the user information and the card identifier of the second user identification card, wherein the opening state of the second card application identifier is a valid state; the communication identification corresponding to the first subscriber identity card is the same as the communication identification corresponding to the second subscriber identity card.
In one possible implementation, the execution module 702 is specifically configured to:
And encrypting the user information and the card identifier of the second user identification card through a preset encryption algorithm to obtain a second card application identifier.
The card application processing device provided by the embodiment of the application can be used for executing the method embodiment, and the implementation principle and the technical effect are similar, and the embodiment of the application is not repeated here.
It will be appreciated that the device embodiments described above are merely illustrative and that the device of the application may be implemented in other ways. For example, the division of the units/modules in the above embodiments is merely a logic function division, and there may be another division manner in actual implementation. For example, multiple units, modules, or components may be combined, or may be integrated into another system, or some features may be omitted or not performed.
An embodiment of the present application provides an electronic device, and fig. 8 is a schematic hardware structure of the electronic device provided by the embodiment of the present application.
As shown in fig. 8, the electronic device 80 includes: a processor 801 and a memory 802; memory 802 stores computer-executable instructions; processor 801 executes computer-executable instructions stored in memory 802 to cause electronic device 80 to perform the methods described above.
When the memory 802 is provided separately, the electronic device 80 further comprises a bus 803 for connecting the memory 802 and the processor 801.
The electronic device 80 shown in the embodiment of fig. 8 may perform the steps in the embodiment of the method described above, and the implementation principle and the advantages are similar, and will not be described herein.
The embodiment of the application provides a chip. The chip comprises a processor for invoking a computer program in a memory to perform the technical solutions in the above embodiments. The principle and technical effects of the present application are similar to those of the above-described related embodiments, and will not be described in detail herein.
The embodiment of the application also provides a computer readable storage medium. The computer-readable storage medium stores a computer program. The computer program realizes the above method when being executed by a processor. The methods described in the above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer readable media can include computer storage media and communication media and can include any medium that can transfer a computer program from one place to another. The storage media may be any target media that is accessible by a computer.
In one possible implementation, the computer readable medium may include RAM, ROM, a compact disk-read only memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium targeted for carrying or storing the desired program code in the form of instructions or data structures and accessible by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (digital subscriber line, DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes optical disc, laser disc, optical disc, digital versatile disc (DIGITAL VERSATILEDISC, DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
Embodiments of the present application provide a computer program product comprising a computer program which, when executed, causes a computer to perform the above-described method.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing unit of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing detailed description of the invention has been presented for purposes of illustration and description, and it should be understood that the foregoing is by way of illustration and description only, and is not intended to limit the scope of the invention.

Claims (11)

1. A card application processing method, applied to a first server, the method comprising:
Receiving an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user;
Determining a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first user identification card, and the first user identification card is installed in the user terminal;
Inquiring the opening state of the first card application identifier in a preset card application state database according to the failure request, and sending a service request to a second server when the opening state of the first card application identifier is in an effective state so that the second server executes service operation according to the service request to obtain an execution result; the execution result indicates that the opening state of the first card application identifier is a failure state, and the service request comprises the first card application identifier;
and receiving an execution result returned by the second server.
2. The method of claim 1, wherein said determining a first card application identification from said communication identification and said application information comprises:
And acquiring the card identifier of the first user identification card according to the communication identifier, and acquiring the first card application identifier according to the card identifier of the first user identification card and the application information.
3. The method according to claim 2, wherein the service request further includes a card identifier of a second subscriber identity card, the execution result further includes a second card application identifier, the communication identifier corresponding to the first subscriber identity card is the same as the communication identifier corresponding to the second subscriber identity card, and after the receiving the execution result returned by the second server, the method further includes:
Writing the second card application identifier into the second user identification card;
Storing the card identifier of the second user identification card, the second card application identifier, the communication identifier and a second target corresponding relation to the preset card application state database, wherein the second target corresponding relation is a corresponding relation among the card identifier of the second user identification card, the second card application identifier and the communication identifier;
And updating the opening state of the first card application identifier in the preset card application state database to be a failure state, and recording the opening state of the second card application identifier to be a valid state.
4. A method according to any one of claims 1 to 3, characterized in that before said receiving a invalidation request sent by a user through a user terminal, the method further comprises:
Receiving a first card application identifier sent by the second server, and acquiring the communication identifier and the card identifier of the first user identification card;
writing the first card application identifier into the first user identification card;
Storing the card identifier of the first subscriber identity card, the first card application identifier, the communication identifier and a first target corresponding relation to the preset card application state database, wherein the first target corresponding relation is a corresponding relation among the card identifier of the first subscriber identity card, the first card application identifier and the communication identifier;
and recording the opening state of the first card application identifier in the preset card application state database as an effective state.
5. A card application processing method, applied to a second server, comprising:
Receiving a service request sent by a first server, wherein the service request comprises a first card application identifier, the opening state of the first card application identifier is an effective state, and the first card application is an application installed in a first user identification card;
Executing service operation according to the service request to obtain an execution result, wherein the execution result indicates that the opening state of the first card application identifier is a failure state;
and sending the execution result to the first server.
6. The method of claim 5, wherein the service request further includes a card identifier of a second subscriber identity card, and the performing the service operation according to the service request, to obtain an execution result, includes:
performing failure processing on the first card application identifier;
Acquiring user information according to the first card application identifier;
determining a second card application identifier according to the user information and the card identifier of the second user identification card, wherein the opening state of the second card application identifier is an effective state; the communication identification corresponding to the first user identification card is the same as the communication identification corresponding to the second user identification card.
7. The method of claim 6, wherein said determining a second card application identification based on said user information and a card identification of said second subscriber identification card comprises:
And encrypting the user information and the card identifier of the second user identification card through a preset encryption algorithm to obtain the second card application identifier.
8. A card application processing device is characterized by being applied to a first server and comprising a first receiving module, a determining module, a first sending module and a second receiving module, wherein,
The first receiving module is used for receiving an invalidation request sent by a user through a user terminal, wherein the invalidation request carries a communication identifier and application information of the user;
The determining module is used for determining a first card application identifier according to the communication identifier and the application information; the first card application is an application installed in a first user identification card, and the first user identification card is installed in the user terminal;
the first sending module is configured to query an opening state of the first card application identifier in a preset card application state database according to the failure request, and send a service request to a second server when the opening state of the first card application identifier is an effective state, so that the second server executes a service operation according to the service request to obtain an execution result; the execution result indicates that the opening state of the first card application identifier is a failure state, and the service request comprises the first card application identifier;
the second receiving module is used for receiving an execution result returned by the second server.
9. A card application processing device is characterized by being applied to a second server and comprising a third receiving module, an executing module and a second sending module, wherein,
The third receiving module is configured to receive a service request sent by a first server, where the service request includes a first card application identifier, an on state of the first card application identifier is an active state, and the first card application is an application installed in a first subscriber identity module;
The execution module is used for executing the service operation according to the service request to obtain an execution result, and the execution result indicates that the opening state of the first card application identifier is a failure state;
The second sending module is configured to send the execution result to the first server.
10. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of claims 1 to 4 or the method of any one of claims 5 to 7.
11. A computer-readable storage medium having stored therein computer-executable instructions for implementing the method of any one of claims 1 to 4 or the method of any one of claims 5 to 7 when executed by a processor.
CN202410070346.2A 2024-01-17 2024-01-17 Card application processing method, device, equipment and storage medium Pending CN117915298A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410070346.2A CN117915298A (en) 2024-01-17 2024-01-17 Card application processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410070346.2A CN117915298A (en) 2024-01-17 2024-01-17 Card application processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117915298A true CN117915298A (en) 2024-04-19

Family

ID=90697345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410070346.2A Pending CN117915298A (en) 2024-01-17 2024-01-17 Card application processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117915298A (en)

Similar Documents

Publication Publication Date Title
US10594498B2 (en) Method and service-providing server for secure transmission of user-authenticating information
CN101035146B (en) Wireless communication device, MAC address management system, wireless communication method, and program
US11049092B2 (en) Global secure service provider directory
KR102321781B1 (en) Processing electronic tokens
TW449988B (en) Computing device for enabling conformance to legislative requirements for mobile devices and a method for controlling the same
US10250613B2 (en) Data access method based on cloud computing platform, and user terminal
CN109314635A (en) Resource management based on block chain
US10567959B2 (en) System and method for managing application data of contactless card applications
EP2985969A1 (en) Multi-dimensional framework for defining criteria that indicate when authentication should be revoked
CN111723385B (en) Data information processing method, device, electronic equipment and storage medium
CN110599342B (en) Block chain-based identity information authorization method and device
CN108876593A (en) A kind of online transaction method and apparatus
KR20210103227A (en) Operation method of blockchain currency remittance service system and electronic wallet for currency remittance
KR102633664B1 (en) Method and apparatus for authenticating address of virtual asset
CN110533128B (en) Encryption-based anti-counterfeiting traceability data processing method, device, system and medium
CN117371011A (en) Data hiding query method, electronic device and readable storage medium
CN117915298A (en) Card application processing method, device, equipment and storage medium
CN105743883B (en) A kind of the identity attribute acquisition methods and device of network application
CN114826772A (en) Data integrity verification system
US10318951B2 (en) Transaction management
CN115438037A (en) Data processing method, device, system and storage medium thereof
KR20220094549A (en) An apparatus for providing user confirmation information relaying services and a method for operating it
KR20110035759A (en) Method and system for issuing of mobile application
CN1554203B (en) Method of accessing a specific service offered by a virtual operator and the chip card for a corresponding device
CN104123636A (en) Processing object processing method, system and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination