CN117997382A - Intelligent card selecting method and device and electronic equipment - Google Patents

Intelligent card selecting method and device and electronic equipment Download PDF

Info

Publication number
CN117997382A
CN117997382A CN202311862887.0A CN202311862887A CN117997382A CN 117997382 A CN117997382 A CN 117997382A CN 202311862887 A CN202311862887 A CN 202311862887A CN 117997382 A CN117997382 A CN 117997382A
Authority
CN
China
Prior art keywords
card
near field
field communication
communication controller
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311862887.0A
Other languages
Chinese (zh)
Inventor
李�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Goodix Technology Co Ltd
Original Assignee
Shenzhen Goodix Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Goodix Technology Co Ltd filed Critical Shenzhen Goodix Technology Co Ltd
Priority to CN202311862887.0A priority Critical patent/CN117997382A/en
Publication of CN117997382A publication Critical patent/CN117997382A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the disclosure provides an intelligent card selecting method, an intelligent card selecting device and electronic equipment, and relates to the technical field of near field communication. The specific implementation mode of the method comprises the following steps: the method is applied to an electronic device comprising a secure element and a near field communication controller; the method comprises the following steps: the security element inputs the card selection data set into the intelligent card selection model, selects a first target card from a first recommendation table output by the intelligent card selection model, reads a first non-access protocol parameter of the first target card, and writes the first non-access protocol parameter into the near field communication controller; the near field communication controller receives a first card swiping request triggered by card reading equipment; the near field communication controller responds to the first card swiping request with a first non-access protocol parameter. The embodiment can cut the card with high efficiency and sensitive response, and can cut the card intelligently even in the power-off state, thereby improving the convenience and experience of cutting the card for users and having wide application fields.

Description

Intelligent card selecting method and device and electronic equipment
Technical Field
The disclosure relates to the technical field of near field communication, and in particular relates to an intelligent card selecting method, an intelligent card selecting device and electronic equipment.
Background
Near Field Communication (NFC) refers to short-distance Communication by using electromagnetic waves close to an electromagnetic field, and common working modes include a card reader type, a point-to-point type and a card mode, wherein the card reader type is used for reading information in a tag close to the read tag, the point-to-point type is used for data interaction between different near field Communication devices, and the card mode is used for realizing non-contact business processing such as consumption, access control and the like by interaction between the near field Communication devices and the card reading device.
Taking a near field communication device, a terminal as an example, wherein the terminal comprises a system-level chip, a card management application, a near field communication controller and a safety element, when non-contact service is processed, a user usually manually selects a target card from the card management application, and notifies the near field communication controller and the safety element to switch; or the system-on-chip determines the target card using the geofence technique, informs the near field communication controller and the secure element to switch.
However, with the diversification of use scenes, the manual card selection mode needs to be frequently switched, so that users are excessively uncomfortable and tedious to use, and the use experience is reduced; the processing of the system-level chip is limited by the use scene, and the updating timeliness of the position information is often not guaranteed, so that the target card is long in determining time consumption and low in efficiency, near-field communication cannot be used once power is turned off or power is turned off due to failure, the response is slow, the card cannot be cut due to the fact that the user experience is poor, and a plurality of inconveniences are brought to the use of the user.
Disclosure of Invention
In view of the above, the embodiments of the present disclosure provide an intelligent card selecting method, apparatus and electronic device, which can solve the problem that manual card selecting is too uncomfortable and complicated, so that the user experience is poor; the system-level chip has slow response, low efficiency, slow response and poor user experience caused by the fact that the card cannot be cut off when the system-level chip is shut down, and various inconvenient problems are brought to the user.
To achieve the above object, according to an aspect of the present disclosure, there is provided a smart card selecting method applied to an electronic device including a secure element and a near field communication controller; the intelligent card selecting method comprises the following steps:
the security element inputs a card selection data set into an intelligent card selection model, selects a first target card from a first recommendation table output by the intelligent card selection model, reads a first non-access protocol parameter of the first target card, and writes the first non-access protocol parameter into the near field communication controller;
the near field communication controller receives a first card swiping request triggered by card reading equipment;
the near field communication controller responds to the first card swiping request with the first non-access protocol parameter.
In some possible implementations, the near field communication controller receives an anti-collision verification result returned by the card reading device for performing anti-collision verification on the first non-access protocol parameter; the near field communication controller judges whether the anti-collision check result is successful or not, and judges whether the anti-collision check result comprises a check instruction or not under the condition that the anti-collision check result is successful; and under the condition that the anti-collision check result is that the check fails, the near field communication controller issues an intelligent card selection instruction to the safety element.
In some possible implementations, the determining whether the anti-collision check result includes a check instruction further includes:
If the anti-collision check result comprises a check instruction, the near field communication controller sends the check instruction to the safety element; and if the anti-collision verification result does not comprise a verification instruction, the near field communication controller determines that the card swiping result of the first card swiping request is successful card swiping.
In some possible implementations, the secure element receives the check instruction and determines a type of the check instruction; if the verification instruction is a service instruction, the security element is matched with a target application identifier, and service parameters of the target application identifier are read to respond to the service instruction;
If the verification instruction is an authentication instruction, the security element generates an element random number in response to the authentication instruction, and authentication verification is performed through interaction between the near field communication controller and the card reading device.
In some possible implementations, the secure element matches a target application identifier, reads a service parameter of the target application identifier in response to the service instruction, and further includes:
The security element receives the service instruction, judges whether the card selection data set is updated, inputs the updated card selection data set into the intelligent card selection model under the condition that the card selection data set is updated, and obtains a second recommendation table output by the intelligent card selection model, and the security element searches a target application identifier from the second recommendation table;
If the card selecting data set is not updated, the secure element searches the first recommendation table for the target application identifier;
and reading the service parameters of the target application identifier, and sending the service parameters to the card reading equipment through the near field communication controller so as to respond to the service instruction.
In some possible implementation manners, the near field communication controller receives a service verification result returned by the card reading device for performing service verification on the service parameter, and judges the service verification result;
If the service verification result is verification failure, the near field communication controller sends the service verification result to the safety element;
Responding to the service verification result of the verification failure, and triggering false departure operation by the safety element;
and if the service verification result is successful, determining that the card swiping result of the first card swiping request is successful.
In some possible implementations, in response to a service verification result that the verification fails, the secure element triggers a false departure operation, further including:
The safety element judges that the reason that the service verification result is verification failure is irrelevant to the first non-access protocol parameter; the near field communication controller receives a second card swiping request triggered by the card reading device after the false departure operation; the near field communication controller responds to the second swipe request with the first contactless protocol parameter.
In some possible implementations, in response to a service verification result that the verification fails, the secure element triggers a false departure operation, further including: the security element judges that the reason that the service verification result is verification failure is related to the first non-access protocol parameter; the secure element updates the first non-access protocol parameters and sends the updated first non-access protocol parameters to the near field communication controller; the near field communication controller receives a second card swiping request triggered by the card reading device after the false departure operation; and the near field communication controller responds to the second card swiping request by utilizing the updated first non-access protocol parameter.
In some possible implementations, the secure element searches the first recommendation table for the target application identifier, and further includes: the security element judges whether the application identifier corresponding to each card comprises a local application identifier; if the local application identifier is included, the secure element searches the first recommendation table for the application identifier matched with the local application identifier as the target application identifier; or if the local application identifier is not included, the secure element searches a default application identifier from the first recommendation table as the target application identifier.
In some possible implementations, the secure element searches for a target application identifier from the second recommendation table, and further includes: the security element judges whether the application identifier corresponding to each card comprises a local application identifier; if the local application identifier is included, the secure element searches the second recommendation table for the application identifier matched with the local application identifier as the target application identifier; or if the local application identifier is not included, the secure element searches a default application identifier from the second recommendation table as the target application identifier.
In some possible implementations, the secure element generates an element random number, and interacts with the card reading device through the near field communication controller to perform authentication verification, and further includes: the secure element sends the element random number to the card reading device through the near field communication controller; the near field communication controller receives an encryption result returned by the card reading device and sends the encryption result to the safety element; and the security element performs authentication verification on the encryption result to determine the card swiping result of the first card swiping request.
In some possible implementations, the authenticating and verifying the encryption result, determining the card swiping result of the first card swiping request further includes: the secure element decrypts the encryption result by using an application identifier corresponding to the first non-access protocol parameter, the element random number and the agreed element key to obtain an encrypted ciphertext and a decrypted random number; the security element performs data operation on the decrypted random number to obtain an operation result, and judges whether the operation result is identical to the encrypted ciphertext; under the condition that the operation result is the same as the encrypted ciphertext, the security element determines that the card swiping result of the first card swiping request is successful card swiping; and under the condition that the operation result and the encrypted ciphertext are different, triggering false departure operation by the safety element.
In some possible implementations, the secure element triggers a false departure operation, further comprising:
The secure element updates the first non-access protocol parameters and sends the updated first non-access protocol parameters to the near field communication controller; the near field communication controller receives a second card swiping request triggered by the card reading device after the false departure operation; and the near field communication controller responds to the second card swiping request by utilizing the updated first non-access protocol parameter.
In some possible implementations, in a case that the anti-collision check result is that the check fails, the near field communication controller issues a smart card selecting instruction to the secure element, and further includes: and the security element searches a second target card which is different from the first target card from the first recommendation table, reads a second non-access protocol parameter of the second target card, and covers the near field communication controller by utilizing the second non-access protocol parameter to perform intelligent card selection and card swiping circulation.
In some possible implementations, in a case that the anti-collision check result is that the check fails, the near field communication controller issues a smart card selecting instruction to the secure element, and further includes:
The safety element judges whether the card selecting data set is updated or not in response to the intelligent card selecting instruction, and the updated card selecting data set is input into the intelligent card selecting model under the condition that the card selecting data set is updated, so that a second recommendation table output by the intelligent card selecting model is obtained; and the security element searches a second target card which is different from the first target card from the second recommendation table, reads a second non-access protocol parameter of the second target card, and covers the near field communication controller by utilizing the second non-access protocol parameter to perform intelligent card selection and card swiping circulation.
In some possible implementations, the card selection dataset includes signal frequency, signal envelope, signal phase, signal radio frequency power, geographic location, geomagnetism, acquisition time, and card pool.
In some possible implementations, the determining of the card pool includes:
The safety element receives a card adding instruction or a card deleting instruction sent by a card management application; the card adding instruction comprises a card identifier of a virtual card to be added, and the card deleting instruction comprises a card identifier of the virtual card to be deleted; in response to the card adding instruction or the card deleting instruction, the secure element adds the card identification of the virtual card to be added to the card pool or deletes the card identification of the virtual card to be deleted from the card pool.
In some possible implementations, in a case that the card swipe is successful, the method further includes:
generating a card swiping record, wherein the card swiping record comprises card swiping signal frequency, card swiping signal envelope lines, card swiping signal phases, card swiping signal radio frequency power, card swiping geographic positions, card swiping geomagnetism, card swiping time and card swiping identifications.
In some possible implementations, the secure element is provided with a first smart card switch flag bit and the near field communication controller is provided with a second smart card switch flag bit; before the smart card selection, the method further comprises:
The secure element and the near field communication controller receive an open instruction; in response to the open instruction, the secure element sets the state value of the first smart card switch flag bit to open and the near field communication controller sets the state value of the second smart card switch flag bit to open.
In some possible implementations, the secure element and the near field communication controller receive an open instruction, including:
The security element and the near field communication controller receive an opening instruction issued by a card management application; or the near field communication controller receives an opening instruction issued by a card management application and sends the opening instruction to the security element; or the security element receives an opening instruction issued by the card management application and sends the opening instruction to the near field communication controller.
According to another aspect of the present disclosure, there is provided a smart card selecting apparatus applied to an electronic device including a secure element and a near field communication controller; the intelligent card cutting device comprises:
The intelligent card selecting module of the safety element is used for inputting a card selecting data set into an intelligent card selecting model, selecting a first target card from a first recommending table output by the intelligent card selecting model, reading a first non-access protocol parameter of the first target card, and writing the first non-access protocol parameter into the near field communication controller;
the receiving module of the near field communication controller is used for receiving a first card swiping request triggered by the card reading equipment;
And the card cutting module of the near field communication controller is used for responding to the first card swiping request by utilizing the first non-access protocol parameter.
According to a further aspect of the present disclosure, an electronic device is provided comprising a secure element and a near field communication controller for performing the smart card method.
According to yet another aspect of the disclosed embodiments, there is provided a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the smart card selection method.
According to the technical scheme provided by the embodiment of the application, the card switching of near field communication is realized through the safety element and the near field communication controller, so that the technical effects of high card cutting efficiency, sensitive response, intelligent card cutting even in a shutdown state, convenience in card cutting for users and card cutting experience are improved, and the application scene is wide.
Drawings
Further details, features and advantages of the present disclosure are disclosed in the following description of exemplary embodiments, with reference to the following drawings, wherein:
FIG. 1 illustrates a flow chart of a smart card method according to an exemplary embodiment of the present disclosure;
FIG. 2 illustrates a schematic diagram of a smart card selection system in accordance with an exemplary embodiment of the present disclosure;
FIG. 3 illustrates a flow chart of a method of managing a pool of cards according to an exemplary embodiment of the present disclosure;
FIG. 4 illustrates a flowchart of a method of processing an anti-collision check result according to an exemplary embodiment of the present disclosure;
FIG. 5 illustrates a flowchart of a method of processing a check instruction according to an exemplary embodiment of the present disclosure;
FIG. 6 illustrates a flow chart of a method of processing a business instruction according to an exemplary embodiment of the present disclosure;
FIG. 7 illustrates a flow chart of a method of responding to a false departure operation of a business instruction according to an exemplary embodiment of the present disclosure;
FIG. 8 illustrates a flowchart of a method of processing an authentication instruction according to an exemplary embodiment of the present disclosure;
FIG. 9 illustrates a flow chart of a response method of a false departure operation of an authentication instruction according to an example embodiment of the present disclosure;
FIG. 10 illustrates a flowchart of a method of processing a smart card selection instruction according to an exemplary embodiment of the present disclosure;
FIG. 11 illustrates a flowchart of a method of opening a smart card switch in accordance with an exemplary embodiment of the present disclosure;
FIG. 12 shows a schematic block diagram of a smart card selection device according to an exemplary embodiment of the present disclosure;
Fig. 13 illustrates a block diagram of an exemplary electronic device that can be used to implement embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure have been shown in the accompanying drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but are provided to provide a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "including" and variations thereof as used herein are intended to be open-ended, i.e., including, but not limited to. The term "based on" is based at least in part on. The term "in embodiments of the present disclosure" means "at least one embodiment"; the term "another exemplary embodiment" means "at least one additional embodiment". Related definitions of other terms will be given in the description below. It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
Near field communication: NEAR FIELD Communication, i.e., NFC, "near field" refers to electromagnetic waves adjacent to an electromagnetic field, the electric field and magnetic field of the near field being independent of each other, the magnetic field of the electromagnetic waves adjacent to the electromagnetic field being utilized for short-range Communication, i.e., so-called near field Communication.
And (3) a terminal: device Host, DH, includes cell phones, hand rings, etc.
Safety element: the Secure Element, SE, is an encryption/decryption logic circuit developed to prevent external malicious parsing attacks on the terminal and to protect data security.
SoC: the System on Chip, i.e. a System on Chip, generally refers to the Chip integration of the core of the terminal information System, and integrates a microprocessor, an analog IP (Intellectual Property) core, a digital IP core and a memory on a single Chip, so that the function of a whole micro electronic System can be completed by the single Chip.
Near field communication controller: NEAR FIELD Communication Controller, NFCC, also known as NFC Controller or NFC.
RF signal: radio Frequency Signal, i.e. radio frequency signals, the card reader device will transmit RF signals to the close terminal.
False departure operation: the operation of the security element triggering the card reading device to assume that the security element re-enters the signal field of the card reading device after leaving the signal field of the card reading device.
In the existing card mode, a plurality of virtual cards are installed on a terminal, and frequent manual card cutting operation is long and tedious, so that the user experience is poor; when the geofence technology is used for selecting cards, the system-on-chip SOC of the terminal needs to interact with the security element, the card management application and the near field communication controller in multiple ways, the consumed time and the cost are high, the response is slow, the card cutting performance is poor, and the updating timeliness of the geographic information can not be guaranteed, or the positioning and the actual use situation are inconsistent (for example, a user wants to use a B card, but the user position is in an A card fence and can be identified as an A card), so that the accuracy of judging the associated card by the SOC is low, the reliability of card selection is low, and a plurality of inconveniences are brought to the user.
Furthermore, once the electronic device or the intelligent terminal is shut down due to insufficient power or failure, the manual card selection or the geofence card selection fails, and the card cutting operation cannot be performed.
Aspects of the present disclosure are described below with reference to the accompanying drawings.
Fig. 1 shows a flowchart of a smart card selecting method according to an exemplary embodiment of the present disclosure, and as shown in fig. 1, the smart card selecting method of the present disclosure includes:
In an embodiment of the present disclosure, as shown in fig. 2, the smart card selection method of the present disclosure is performed by a smart card selection system including a secure element and a near field communication controller, where the smart card selection system uses an electronic device as a carrier.
Step S101, the security element inputs a card selection data set into an intelligent card selection model, selects a first target card from a first recommendation table output by the intelligent card selection model, reads a first non-access protocol parameter of the first target card, and writes the first non-access protocol parameter into the near field communication controller.
In the disclosed embodiment, the secure element stores a card selection data set for storing various information related to the smart card selection model, including signal frequency, signal envelope, signal slope, signal phase, signal radio frequency power, geographic location, geomagnetism, acquisition time, card pool, etc., wherein:
Acquiring signal frequency, signal envelope, signal slope, signal phase, signal radio frequency power and corresponding acquisition time from a near field communication controller, acquiring signal information of an RF signal once from a radio frequency signal field of the RF signal transmitted by the card reading equipment every time the near field communication controller approaches the card reading equipment, wherein the signal information comprises the information of the signal frequency, the signal envelope, the signal slope, the signal phase, the signal radio frequency power, the acquisition time and the like, and synchronizing the information to a safety element;
the geographic position, geomagnetism and corresponding acquisition time are acquired from the terminal, and the card management application of the terminal acquires information such as the geographic position, geomagnetism and acquisition time of the position at regular or irregular intervals and synchronizes the information to the safety element;
The card pool is added, deleted and other operations by the user through the card management application of the terminal, and the secure element manages the card pool according to the instruction of the card management application, as shown in fig. 3, and the card pool management method comprises the following steps:
In an embodiment of the present disclosure, a method of managing a pool of cards is performed by a secure element.
Step S301, receiving a card adding instruction or a card deleting instruction; the card adding instruction comprises a card identifier of the virtual card to be added, and the card deleting instruction comprises a card identifier of the virtual card to be deleted.
In the embodiment of the disclosure, the card management application displays an application interface through the front end of the electronic device, the application interface includes card identifiers, card names, card schematics and the like of a plurality of virtual cards to be added or deleted, a user can select part or all of the virtual cards in the application interface, trigger a card adding instruction or a card deleting instruction, the card management application sends the card adding instruction or the card deleting instruction to the security element, and the security element receives the card adding instruction or the card deleting instruction.
Further, the card pool can be managed in a reverse selection mode, and the user selects part of the virtual cards to be added in the application interface and does not add the virtual cards to be added in the card pool, or the user selects part of the virtual cards to be deleted and does not delete the virtual cards from the card pool, and the virtual cards are selected according to the actual interface display condition.
Step S302, in response to the card adding instruction or the card deleting instruction, adding the card identifier and the card information of the virtual card to be added to the card pool in the local cache, or deleting the card identifier and the card information of the virtual card to be deleted from the card pool in the local cache.
In the embodiment of the disclosure, in response to a card adding instruction, the secure element adds part or all of card identifications and card information of virtual cards to be added selected by a user to a card pool in a local cache; in response to the delete instruction, the secure element deletes the card identification and card information of some or all of the virtual cards selected by the user from the locally cached card pool. Wherein the card information includes card type, card balance, etc.
Further, in the case of counter selection, the secure element adds the card identification and card information of the portion of the virtual card to be added that is not selected by the user to the card pool in the local cache; or the secure element deletes the card identification and card information of the part of the virtual card to be deleted, which is not selected by the user, from the locally cached card pool.
According to the card pool management method, the safety element can manage the locally cached card pool, add cards or delete cards, and then card selection recommendation can be performed on the basis of the preselected card pool, so that efficient management of the cards is achieved, and card selection efficiency is improved.
Further, the card pool can be updated periodically or aperiodically according to the requirement of the user; or the card pool can be updated according to the card swiping result of the card reading device, for example, if the card swiping result of all the card identifications in the card selection recommendation table is card swiping failure, the user may need to manually add a new card matched with the card reading device, and trigger a card adding instruction to adjust the card pool by the security element.
In the embodiment of the disclosure, the intelligent card selecting model can be used for selecting cards for users in advance, automatically realizing card switching, reducing time consumption of card swiping of users, and improving card swiping experience of the users.
Further, before the user uses the electronic device, the security element inputs the signal frequency, the signal envelope, the signal slope, the signal phase, the radio frequency power, the geographic position, the geomagnetism, the acquisition time and the card pool of the card selection data set into a pre-trained smart card selection model, selects a first card identifier from a first recommendation table output by the smart card selection model as a first target card, reads a first non-access protocol parameter of the first target card, and writes the first non-access protocol parameter into the near field communication controller.
Further, the algorithm of the smart card selecting model can be a weighted calculation method such as a weighted average method, a weighted voting method, a weighted sorting method and the like. In the training process of the intelligent card selection model, a sample card selection data set is used as input, the ordering labels of all virtual cards are used as output, and the intelligent card selection model is subjected to iterative training to obtain a pre-trained intelligent card selection model.
Step S102, the near field communication controller receives a first card swiping request triggered by a card reading device.
In the embodiment of the disclosure, after the secure element pre-selects a card and writes the first non-access protocol parameter into the near field communication controller, the user approaches the electronic device to the card reading device, the card reading device triggers a first card swiping request and transmits an RF signal, and the near field communication controller receives the first card swiping request triggered by the card reading device, and simultaneously acquires signal information from a signal field of the RF signal and synchronizes the signal information to the secure element.
In step S103, the near field communication controller responds to the first card swiping request with the first non-access protocol parameter.
In the embodiment of the disclosure, after receiving the first card swiping request, the near field communication controller responds to the first card swiping request by using the first non-access protocol parameter, so that the card reading device performs anti-collision verification on the first non-access protocol parameter and returns an anti-collision verification result to the near field communication controller.
In the embodiment of the disclosure, through the intelligent card selection method, the safety element pre-selects the card to provide the non-access protocol parameters of the anti-collision check for the near field communication controller, so that the complexity of manual card selection can be avoided, the use experience of a user is improved, the system-level chip processing is not needed, and the response sensitivity and the card cutting efficiency are improved; moreover, the intelligent card selection can be realized through the cooperation of the safety element and the near field communication controller, and because the near field communication controller can supply power for the safety element, the intelligent card selection method disclosed by the disclosure can be executed even in a shutdown state, the use experience of a user is improved, and the convenience of card cutting is improved.
Further, the card types of the various cards in the card pool include a first type card, a second type card and a third type card, wherein the first type card can be a service card for various service functions such as consumption, payment, transfer and the like, the second type card can be an encrypted access control card, and the third type card can be a common non-encrypted access control card. The card swiping process of the first type card comprises anti-collision check and business check, the card swiping process of the second type card comprises anti-collision check and authentication check, and the card swiping process of the third type card only comprises anti-collision check. Therefore, the card swiping processes of different types of cards are different, and the three types of cards only need to carry out anti-collision verification, and the anti-collision verification result is the card swiping result; the first type card and the second type card comprise two rounds of verification, the anti-collision verification is used as a first round of verification, and the anti-collision verification result can only be used as a judgment basis for whether the second round of verification can be entered.
Further, when the first non-access protocol parameter anti-collision verification fails, it can be determined that the card swiping result of the first type card and the second type card cannot enter the second round of verification and the third type card is the card swiping failure, so that the near field communication controller issues the intelligent card selecting instruction again to perform intelligent card selecting; when the first non-access protocol parameter conflict prevention verification is successful, the first type card and the second type card can enter the second round of verification, and then a card swiping result is determined according to the verification result of the second round of verification, and the third type card can directly determine that the card swiping result is successful, namely, as shown in fig. 4, the processing method of the conflict prevention verification result of the disclosure comprises the following steps:
In an embodiment of the present disclosure, a method for processing an anti-collision check result of the present disclosure is performed by a near field communication controller.
Step S401, receiving an anti-collision check result returned by the card reading device.
In the embodiment of the disclosure, the near field communication controller receives an anti-collision check result obtained by anti-collision checking the first non-access protocol parameter returned by the card reading device.
Step S402, judging whether the anti-collision check result is successful, if so, turning to step S403; if not, go to step S406.
In the embodiment of the disclosure, for the first type card and the second type card, the anti-collision verification result of successful verification includes a verification instruction for the security element to perform a second round of verification; for the three types of cards, the anti-collision verification result with successful verification can directly determine that the card swiping result is successful card swiping.
Step S403, judging whether the anti-collision check result carries a check instruction, if so, turning to step S404; if not, go to step S405.
In the embodiment of the disclosure, under the condition that the anti-collision check result is that the check is successful, the near field communication controller judges whether to enter a second round of check according to whether the anti-collision check result carries a check instruction.
Further, under the condition that the anti-collision check result carries a check instruction, the card type corresponding to the card reading equipment is a first type card or a second type card, and the near field communication controller sends the check instruction to the safety element for processing.
Step S404, transmitting the verification instruction to the secure element.
In the embodiment of the disclosure, in the case that the anti-collision check result carries a check instruction, the near field communication controller sends the check instruction to the secure element, and the secure element performs a second round of check.
Step S405, determining that the card swiping result of the first card swiping request is successful card swiping.
In the embodiment of the disclosure, under the condition that the anti-collision check result is that the check is successful and the check instruction is not carried, the card type corresponding to the card reading device is a three-type card, and the near field communication controller can directly determine that the card swiping result of the first card swiping request is that the card swiping is successful.
Further, after the three-type card is successfully swiped, the method further comprises the following steps:
Generating a card swiping record of a first card swiping request, wherein the card swiping record comprises card swiping signal frequency, card swiping signal envelope curves, card swiping signal phases, card swiping signal radio frequency power, card swiping geographic positions, card swiping geomagnetism, card swiping time and card swiping identifiers.
Step S406, issuing a smart card selecting instruction to the security element.
In the embodiment of the disclosure, under the condition that the anti-collision check result is that the check fails, the near field communication controller issues an intelligent card selection instruction to the security element, so that the security element reselects a card.
In the embodiment of the disclosure, the processing method of the anti-collision check result of the disclosure responds to different types of cards in different modes so as to adapt to diversified use scenes, the application expansibility of the card selection method is strong, the response sensitivity and efficiency of card cutting under different scenes are enhanced, and the user experience and the card cutting convenience are improved.
In the embodiment of the present disclosure, after receiving a verification instruction, the secure element processes the verification instruction according to the type of the verification instruction in different verification manners, where the type of the verification instruction includes a service instruction and an authentication instruction, as shown in fig. 5, a method for processing the verification instruction of the present disclosure includes the following steps:
In an embodiment of the present disclosure, a method of processing a check instruction of the present disclosure is performed by a secure element.
In step S501, a check instruction is received.
In an embodiment of the disclosure, the secure element receives a verification instruction sent by the near field communication controller.
Step S502, judging whether the checking instruction is a business instruction, if so, turning to step S503; if not, go to step S504.
Step S503, matching the target application identifier, and reading the service parameter of the target application identifier to respond to the service instruction.
In the embodiment of the present disclosure, the verification instruction is a service instruction, which indicates that the card type corresponding to the card reading device is a type one card, that is, a service card, and the security element responds to the service instruction by using a service parameter identified by the target application, as shown in fig. 6, a processing method of the service instruction of the present disclosure includes the following steps:
in step S601, the secure element receives a service instruction.
In the embodiment of the disclosure, in the case that the verification instruction is a service instruction, the card type corresponding to the card reading device is a type one card.
Step S602, the secure element determines whether the card selection data set has an update, and if yes, goes to step S603; if not, go to step S610.
In the embodiment of the disclosure, the security element can determine that the card selection data set is updated as long as any one of the signal frequency, the signal envelope, the signal slope, the signal phase, the signal radio frequency power, the geographic location, the geomagnetism, and the card pool is changed.
In step S603, the secure element inputs the updated card selection data set into the smart card selection model, so as to obtain a second recommendation table output by the smart card selection model.
In the embodiment of the disclosure, in the case that the card selection data set is updated, the security element inputs the updated card selection data set into the intelligent card selection model to obtain the second recommendation table.
In step S604, the secure element matches a target application identifier from the second recommendation table.
In the embodiment of the disclosure, one card may correspond to at least one application identifier, and in the case that one card corresponds to a plurality of application identifiers, application parameters corresponding to the plurality of application identifiers in the secure element are the same, where the application parameters include a non-access protocol parameter, a service parameter, and the like. Therefore, in the case where one card corresponds to a plurality of application identifications, one is generally selected from the plurality of application identifications as the application identification corresponding to the card identification.
Further, the secure element determines whether to look up a default application identifier from the second recommendation table as a target application identifier or to look up an application identifier matching the local application identifier of the service instruction from the second recommendation table as a target application identifier according to whether the service instruction includes the local application identifier. The default application identifier is pre-selected and can be selectively set according to the use frequency of the card, different use scenes and the like.
Further, when the service instruction does not include the local application identifier, the secure element searches the default application identifiers from the second recommendation table as target application identifiers, and uses the default application identifiers found from the application identifiers corresponding to the card identifiers in the second recommendation table as target application identifiers one by one.
Or when the service instruction comprises the local application identifier, the safety element searches the second recommendation table for the application identifier matched with the local application identifier of the service instruction as a target application identifier, compares the local application identifier with the application identifiers corresponding to the card identifiers of the second recommendation table one by one, judges whether the local application identifier can be locally matched with each application identifier corresponding to the second recommendation table, and takes the application identifier which can be locally matched, namely comprises the local application identifier as the target application identifier. For example, the application identifiers corresponding to the card identifiers are 000, 225637, 551, 565637, 452, 458612, the local application identifier is 5637, and then 000, 225637, 551, 565637 are individually used as the target application identifier, and 452, 458612 is not used as the target application identifier.
In the embodiment of the disclosure, the secure element directly determines that the card swiping result of the first card swiping request is card swiping failure under the condition that the application identifier corresponding to each card identifier of the second recommendation table is determined to have no default application identifier or cannot be matched with the local application identifier locally.
Further, a prompt of ' default application identification does not exist ', card swiping failure ' or ' local application identification matching failure ' is fed back to the front end of the electronic equipment, and a user resets the default application identification or adds a new card matched with the card reading equipment to the card pool so as to facilitate smooth card cutting.
Step S605, the secure element reads the service parameter of the target application identifier, and sends the service parameter to the card reading device through the near field communication controller.
In the embodiment of the disclosure, the security element sends the first service parameter to the near field communication controller, and then the near field communication controller sends the first service parameter to the card reading device, so that the security element can transmit the first service parameter to the card reading device through the near field communication controller.
Step S606, the near field communication controller receives a service verification result returned by the card reading device for performing service verification on the service parameter, determines whether the service verification result is successful, and if yes, goes to step S607; if not, go to step S608.
In step S607, the near field communication controller determines that the card swiping result of the first card swiping request is successful card swiping.
In the embodiment of the disclosure, under the condition that the service verification result is verification success, the card reading device is forbidden, and the card swiping of the first card swiping is successful, so that the near field communication controller can directly determine that the card swiping result of the first card swiping request is the card swiping success.
Further, after the card is successfully swiped, the method further comprises the following steps:
Generating a card swiping record of a first card swiping request, wherein the card swiping record comprises card swiping signal frequency, card swiping signal envelope curves, card swiping signal phases, card swiping signal radio frequency power, card swiping geographic positions, card swiping geomagnetism, card swiping time and card swiping identifiers.
In step S608, the near field communication controller sends the service verification result to the secure element.
In the embodiment of the present disclosure, in the case that the first service verification result is verification failure, card re-selection is required, so that the near field communication controller sends the first service verification result that the verification fails to the secure element.
In step S609, the secure element triggers a false departure operation.
In the embodiment of the disclosure, under the condition that the card reading device is forbidden and the card swiping is successful, the near field communication controller can directly determine the card swiping result of the card swiping success without sending the card swiping result to the security element, so the security element only receives the service verification result of the verification failure, and the security element triggers the false-off-site operation in response to the service verification result of the verification failure, so that the card reading device leaves the signal field of the card reading device for the electronic device, and then the electronic device enters the signal field of the card reading device, and at the moment, the card reading device can initiate a second card swiping request to the electronic device after the false-off-site operation again.
Further, in the case that the service verification result is not received, the secure element may directly determine that the card swiping result of the first card swiping request is successful.
In step S610, the secure element matches the target application identifier from the first recommendation table, and goes to step S605.
In the embodiment of the disclosure, in the case that no update exists in the card selection data set, the security element matches a default application identifier from the first recommendation table as a target application identifier, or matches an application identifier matched with the local application identifier of the service instruction from the first recommendation table as a target application identifier. The method for matching the target application identifier in the first recommendation table is the same as the method for matching the target application identifier in the second recommendation table, and will not be described herein.
In the embodiment of the disclosure, by the processing method of the service instruction of the disclosure, the security element decides whether to match the target application identifier in the recommendation table before or after updating according to whether the card selection data set is updated, further reads the corresponding service parameter to respond to the service instruction, decides whether to trigger the false leaving operation according to the service check result of the card reading device, and re-accepts the card swiping request of the card reading device, and re-performs the anti-collision check by using the first non-access protocol parameter which is checked successfully, so as to reciprocate until the final card swiping result of a card is determined, thereby realizing intelligent card cutting, improving the card selection efficiency and improving the card cutting performance.
In the embodiment of the present disclosure, after the verification result of the service verification is that the verification fails, the security element triggers the false departure operation, according to whether the reason generated by the service verification result of the verification failure is related to the first non-access protocol parameter, the security element and the near field communication controller trigger different response actions, as shown in fig. 7, the response method of the false departure operation of the service instruction of the present disclosure includes the following steps:
Step S701, the security element determines whether the verification result of the service verification is that the reason of the verification failure is related to the first non-access protocol parameter, and if so, goes to step S702; if not, go to step S705.
In step S702, the secure element updates the first non-access protocol parameter and sends the updated first non-access protocol parameter to the nfc controller.
In the embodiment of the disclosure, when the secure element determines that the reason for the verification failure of the service verification is related to the first non-access protocol parameter, the first non-access protocol parameter needs to be updated, and the updated first non-access protocol parameter is sent to the near field communication controller to respond to the card reading device.
Further, the secure element determines an updated first non-access protocol parameter based on whether the card selection data set is updated, wherein:
Under the condition that the card selection data set is updated, the safety element inputs the updated card selection data set into the intelligent card selection model, reselects a second target card which is different from the first target card from a second recommendation table output by the intelligent card selection model, and reads the non-access protocol parameters of the second target card as updated first non-access protocol parameters;
Or under the condition that the card selection data set is not updated, reselecting a second target card which is different from the first target card from the first recommendation table, and reading the non-access protocol parameters of the second target card as updated first non-access protocol parameters.
In step S703, the near field communication controller receives a second card swiping request triggered by the card reading device after the false off-field operation.
In step S704, the nfc controller responds to the second card swiping request with the updated first non-access protocol parameter.
Step S705, the near field communication controller receives a second card swiping request triggered by the card reading device after the false off-field operation.
In the embodiment of the disclosure, when the security element determines that the reason of the service verification failure is unrelated to the first non-access protocol parameter, the first non-access protocol parameter is not required to be updated, and the near field communication controller still responds to the card reading device by using the first non-access protocol parameter which is successfully subjected to the previous anti-collision verification, so that the consumption of time, communication and other costs for requesting the non-access protocol parameter from the security element again is avoided, and the card cutting performance is improved.
In step S706, the near field communication controller responds to the second card swiping request with the first non-access protocol parameter.
In the embodiment of the disclosure, when the first non-access protocol parameter which is successful in the previous anti-collision verification is used for responding to the second card swiping request again, the verification result of the anti-collision verification is necessarily successful, so that the near field communication controller directly and thoroughly transmits the service instruction carried in the anti-collision verification result to the security element again, and the service verification process is repeated until the card swiping is successful.
In the embodiment of the disclosure, by the response method of the false departure operation of the service instruction, for the false departure operation triggered by the security element, according to whether the reason of the false departure is related to the first non-access protocol parameter, different operations such as updating the first non-access protocol parameter or responding to the card reading equipment by using the old first non-access protocol parameter are executed, so that the success of service verification is ensured, the quick response and the card selection success rate of the card cutting are realized, and the card cutting performance is improved.
Step S504, in response to the authentication instruction, the secure element generates an element random number, and performs authentication verification through interaction between the near field communication controller and the card reading device.
In the embodiment of the present disclosure, the verification instruction is an authentication instruction, which indicates that the card type corresponding to the card reading device is a two-type card, i.e. an encrypted access card, and the secure element generates an element random number in response to the authentication instruction, and performs authentication verification by interaction between the near field communication controller and the card reading device, as shown in fig. 8, the processing method of the authentication instruction of the present disclosure includes the following steps:
Step S801, the secure element receives the authentication instruction.
In the embodiment of the disclosure, the encrypted access card needs authentication verification, so after the anti-collision verification is successful, the card reading device issues an authentication instruction to the security element.
Step S802, the secure element generates an element random number, and sends the element random number to the card reading device through the near field communication controller.
In an embodiment of the present disclosure, in response to the authentication instruction, the secure element generates an element random number and transmits the element random number to the card reading device through the near field communication controller. Wherein, the element random number is an integer, the value range is-2147483648 ~ 2147483647 (namely-2 31~231 -1), and 4 bytes (namely 32 bits) are occupied.
In step S803, the near field communication controller receives the encryption result returned by the card reading device, and sends the encryption result to the secure element.
In the embodiment of the disclosure, when the card reading device issues the authentication instruction, the card reading device generates a card reading random number, and performs data operation on the card reading random number to obtain an encrypted ciphertext.
Further, the data operation refers to the subsequent function calculation of 64 bits on the card reading random number.
Further, after receiving the element random number, the card reading device encrypts the encrypted ciphertext by using the card reading random number, the element random number, the card reading key and the application identifier of the first non-access protocol parameter which corresponds to the authentication instruction and is successfully checked, so as to obtain an encryption result.
In step S804, the secure element performs authentication verification on the encryption result.
In the embodiment of the present disclosure, the essence of authentication verification is essentially the inverse operation of the encryption operation of the card reading device.
And S8041, decrypting the encryption result by using the application identifier corresponding to the first non-access protocol parameter, the element random number and the agreed element key to obtain an encrypted ciphertext and a decrypted random number.
In the embodiment of the disclosure, the application identifier to which the first non-access protocol parameter corresponding to the authentication instruction is successfully subjected to the anti-collision verification is known by both the secure element and the card reading device, the secure element is known when writing to the near field communication controller, and the card reading device is known when performing the anti-collision verification, so that the secure element decrypts the encryption result by using the agreed element key, the application identifier corresponding to the first non-access protocol parameter and the element random number, and then the encrypted ciphertext and the decrypted random number can be obtained.
Further, the decryption algorithm of the secure element is the same as the encryption algorithm of the card reading device, and the card reading device and the secure element pre-agree on encryption/decryption keys, and store the card reading key and the element key in the card reading device and the secure element respectively.
Step S8042, data operation is carried out on the decrypted random number, and an operation result is obtained.
In the embodiment of the disclosure, the secure element performs data operation on the decrypted random number obtained by decryption to obtain an operation result.
Step S8043, judging whether the operation result is the same as the encrypted ciphertext, if so, turning to step S8044; if not, go to step S8045.
Step S8044, determining that the verification result of the authentication verification is verification success. In the embodiment of the disclosure, under the condition that the operation result is the same as the encrypted ciphertext, the decrypted random number is the same as the card reading random number, and the verification result of the authentication verification of the secure element is verification success.
Step S8045, determining that the verification result of the authentication verification is verification failure.
In the embodiment of the disclosure, under the condition that the operation result and the encrypted ciphertext are different, the fact that the decryption random number and the card reading random number are different is indicated, and the security element determines that the verification result of the authentication verification is verification failure.
Step S805, determining whether the verification result of the authentication verification is successful, and if yes, going to step S806; if not, go to step S807.
In step S806, the secure element determines that the first card swipe result of the first card swipe request is successful.
In the embodiment of the disclosure, under the condition that the verification result of the authentication verification is verification success, determining that the card swiping result of the first card swiping request is card swiping success.
Further, since the authentication instruction corresponds to the second type card, after the second type card is successfully swiped, the method further comprises:
Generating a card swiping record of a first card swiping request, wherein the card swiping record comprises card swiping signal frequency, card swiping signal envelope curves, card swiping signal phases, card swiping signal radio frequency power, card swiping geographic positions, card swiping geomagnetism, card swiping time and card swiping identifiers.
Further, the secure element performs 96-bit subsequent function calculation on the decrypted random number, and sends the calculation result to the card reading device through the near field communication controller. The card reading device performs 96-bit subsequent function operation on the card reading random number, and the obtained result is compared with the calculated result to determine whether to disable or disable
In step S807, the secure element triggers a false departure operation.
In the embodiment of the disclosure, when the verification result of the authentication verification is that the verification fails, the security element triggers a false departure operation, so that the card reading device considers that the security element enters the signal field of the card reading device again after leaving the signal field of the card reading device, and the operations such as a second card swiping request are continuously triggered again.
In the embodiment of the disclosure, the security element processes the authentication instruction of the card reading device through the processing method of the authentication instruction, and the card reading result of the first card reading request can be determined through decryption, data operation and the like, so that the authentication verification of the second card is realized, and the card selecting efficiency and the card cutting performance are improved.
Further, after the verification result of the authentication verification is that the verification fails and the secure element triggers the false departure operation, as shown in fig. 9, the response method of the false departure operation of the authentication instruction of the present disclosure includes the following steps:
in step S901, the secure element updates the first non-access protocol parameter, and sends the updated first non-access protocol parameter to the near field communication controller.
Further, the security element updates the first non-access protocol parameters in the same manner as in step S702, and will not be described here again.
In step S902, the near field communication controller receives a second card swiping request triggered by the card reading device after the false off-field operation.
In step S903, the nfc controller responds to the second card swiping request with the updated first non-access protocol parameter.
In the embodiment of the disclosure, by the response method of the fake departure operation of the authentication instruction, for the fake departure operation triggered by the safety element, different operations such as updating the first non-access protocol parameter to respond to the card reading equipment are executed, so that the success of authentication verification is ensured, the quick response and the card selection success rate of the card cutting are realized, and the card cutting performance is improved.
In an embodiment of the present disclosure, as shown in fig. 10, a processing method of a smart card selection instruction of the present disclosure includes the following steps:
In step S1001, the secure element receives the smart card selection instruction.
Step S1002, the secure element determines whether the card selection data set has an update, and if yes, goes to step S1003; if not, go to step S1008.
In step S1003, the secure element inputs the updated card selection data set into the smart card selection model, so as to obtain a second recommendation table output by the smart card selection model.
In step S1004, the secure element searches the second recommendation table for a second target card different from the first target card.
In the embodiment of the disclosure, when the anti-collision verification result is that verification fails and the card selection data set is updated, the security element inputs the updated card selection data set into the intelligent card selection model to obtain a second recommendation table, searches a second target card different from the first target card from the second recommendation table, and responds to the intelligent card selection instruction.
In step S1005, the secure element reads a second non-access protocol parameter of the second target card, and overlays the near field communication controller with the second non-access protocol parameter.
In step S1006, the near field communication controller receives a second card swiping request triggered by the card reading device.
In an embodiment of the disclosure, after the secure element covers the near field communication controller with the second non-access protocol parameter, the near field communication controller waits for a second swipe request triggered by the card reading device.
In step S1007, the near field communication controller responds to the second card swiping request with the second non-access protocol parameter.
In step S1008, the secure element searches for a second target card different from the first target card from the first recommendation table, and goes to step S1005.
In the embodiment of the disclosure, when the anti-collision check result is that the check fails and the card selection data set is not updated, the security element searches a second target card different from the first target card from the first recommendation table, and responds to the intelligent card selection instruction.
In the embodiment of the disclosure, by the processing method of the intelligent card selection instruction, for the situation that the collision-proof verification of the initially selected non-access protocol parameter fails, the security element responds to the intelligent card selection instruction to select a new target card again according to the updating situation of the card selection data set so as to respond to the card swiping request, thereby improving the card selection efficiency and the card cutting performance, being sensitive in response and improving the card cutting experience of a user.
In the embodiment of the disclosure, the security element is provided with a first intelligent card selecting switch marking bit, the near field communication controller is provided with a second intelligent card selecting switch marking bit, and under the condition that the first intelligent card selecting switch marking bit and the second intelligent card selecting switch marking bit are both on, the security element and the near field communication controller can cooperate to realize the intelligent card selecting method of the disclosure, so that the electronic equipment can realize intelligent card cutting no matter in a startup state or a shutdown state.
Further, the security element and the near field communication controller may change the state values of the first smart card switch flag bit and the second smart card switch flag bit only when the electronic device is in a power-on state, the state values including on and off. Before the electronic equipment is shut down, if the first intelligent card selecting switch marking bit and the first intelligent card selecting switch marking bit of the safety element and the near field communication controller are not started, the safety element and the near field communication controller still cannot realize intelligent card cutting after the electronic equipment is shut down. The electronic device may be a terminal.
Further, as shown in fig. 11, the method for opening the smart card selector switch of the present disclosure includes the following steps:
Step S1101, the secure element and the near field communication controller receive an on command.
In the embodiment of the present disclosure, the issuing of the opening instruction includes three ways:
mode one: the secure element and the near field communication controller receive an opening instruction issued by the card management application.
In the embodiment of the disclosure, the electronic device further includes a card management application, the card management application issues an opening instruction to the secure element through the SPI or Apdu Gate, and the card management application issues the opening instruction to the near field communication controller through a near field communication controller interface (NFC Controller Interface, abbreviated as NCI).
Mode two: the near field communication controller receives an opening instruction issued by the card management application and sends the opening instruction to the secure element.
In an embodiment of the present disclosure, the near field communication controller sends an open instruction to the secure element via the SSPI.
Mode three: the secure element receives an opening instruction issued by the card management application and sends the opening instruction to the near field communication controller. The opening instruction is triggered by a user through an application interface of the card management application.
In step S1102, in response to the on command, the secure element sets the state value of the first smart card selecting switch flag bit to on, and the near field communication controller sets the state value of the second smart card selecting switch flag bit to on.
In the embodiment of the disclosure, through the opening method of the intelligent card selecting switch, communication of opening instructions under different interaction modes among the card management application, the safety element and the near field communication controller can be realized, so that the intelligent card selecting system better fits actual use scenes of electronic equipment, and card cutting efficiency and user use experience under different use scenes are improved.
In an embodiment of the present disclosure, before the secure element inputs the card selection data set into the smart card selection model, the method further includes:
Judging whether the state values of the first intelligent card selecting switch marking bit and the second intelligent card selecting switch marking bit are on or not, and executing the intelligent card selecting method under the condition that the state values of the first intelligent card selecting switch marking bit and the second intelligent card selecting switch marking bit are on.
In the embodiment of the disclosure, whether the intelligent card selecting method is executed is determined by judging whether the mark bit of the intelligent card selecting switch is opened or not, so that the card cutting accuracy and the card cutting performance are improved. Under the condition that the first intelligent card selecting switch marking bit and the second intelligent card selecting switch marking bit are both on, the intelligent card selecting method is utilized for intelligent card cutting.
Fig. 12 is a schematic diagram of main modules of a smart card apparatus according to an embodiment of the present disclosure, and as shown in fig. 12, a smart card apparatus 1200 of the present disclosure includes:
The smart card selecting module 1201 of the secure element is configured to input a card selecting data set into a smart card selecting model, select a first target card from a first recommendation table output by the smart card selecting model, read a first non-access protocol parameter of the first target card, and write the first non-access protocol parameter into the near field communication controller.
The receiving module 1202 of the near field communication controller is configured to receive a first card swiping request triggered by a card reading device.
The card cutting module 1203 of the near field communication controller is configured to respond to the first card swiping request with the first non-access protocol parameter.
The present disclosure also provides an electronic device comprising a secure element and a near field communication controller for performing a method according to an embodiment of the present disclosure.
Further, the electronic device also includes a card management application.
The present disclosure also provides a non-transitory computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor of a computer, is for causing the computer to perform a method according to an embodiment of the present disclosure.
The present disclosure also provides a computer program product comprising a computer program, wherein the computer program, when executed by a processor of a computer, is for causing the computer to perform a method according to embodiments of the disclosure.
Referring to fig. 13, a block diagram of an electronic device 1300, which may be a server or a client of the present disclosure, will now be described, which is an example of a hardware device that may be applied to aspects of the present disclosure. Electronic devices are intended to represent various forms of digital electronic computer devices, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other suitable computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 13, the electronic device 1300 includes a computing unit 1301 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 1302 or a computer program loaded from a storage unit 1308 into a Random Access Memory (RAM) 1303. In the RAM1303, various programs and data required for the operation of the device 1300 can also be stored. The computing unit 1301, the ROM1302, and the RAM1303 are connected to each other through a bus 1304. An input/output (I/O) interface 1305 is also connected to bus 1304.
Various components in electronic device 1300 are connected to I/O interface 1305, including: an input unit 1306, an output unit 1307, a storage unit 1308, and a communication unit 1309. The input unit 1306 may be any type of device capable of inputting information to the electronic device 1300, and the input unit 1306 may receive input numeric or character information and generate key signal inputs related to user settings and/or function controls of the electronic device. The output unit 1307 may be any type of device capable of presenting information and may include, but is not limited to, a display, speakers, video/audio output terminals, vibrators, and/or printers. The storage unit 1304 may include, but is not limited to, magnetic disks, optical disks. The communication unit 1309 allows the electronic device 1300 to exchange information/data with other devices through computer networks such as the internet and/or various telecommunication networks, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication transceivers and/or chipsets, such as bluetooth (TM) devices, wiFi devices, wiMax devices, cellular communication devices, and/or the like.
The computing unit 1301 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 1301 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 1301 performs the respective methods and processes described above. For example, in some embodiments, the methods of fig. 1-11 may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as storage unit 1308. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 1300 via the ROM1302 and/or the communication unit 1309. In some embodiments, computing unit 1301 may be configured to perform the methods of fig. 1-11 by any other suitable means (e.g., by means of firmware).
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
As used in this disclosure, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.

Claims (23)

1. A smart card selection method, characterized in that the method is applied to an electronic device comprising a secure element and a near field communication controller; the intelligent card selecting method comprises the following steps:
the security element inputs a card selection data set into an intelligent card selection model, selects a first target card from a first recommendation table output by the intelligent card selection model, reads a first non-access protocol parameter of the first target card, and writes the first non-access protocol parameter into the near field communication controller;
the near field communication controller receives a first card swiping request triggered by card reading equipment;
the near field communication controller responds to the first card swiping request with the first non-access protocol parameter.
2. The smart card selection method of claim 1, further comprising:
the near field communication controller receives an anti-collision verification result returned by the card reading device for carrying out anti-collision verification on the first non-access protocol parameter;
The near field communication controller judges whether the anti-collision check result is successful or not, and judges whether the anti-collision check result comprises a check instruction or not under the condition that the anti-collision check result is successful;
And under the condition that the anti-collision check result is that the check fails, the near field communication controller issues an intelligent card selection instruction to the safety element.
3. The smart card selecting method as claimed in claim 2, wherein said determining whether the anti-collision check result includes a check instruction further includes:
If the anti-collision check result comprises a check instruction, the near field communication controller sends the check instruction to the safety element;
And if the anti-collision verification result does not comprise a verification instruction, the near field communication controller determines that the card swiping result of the first card swiping request is successful card swiping.
4. The smart card selection method of claim 3, further comprising:
The safety element receives the checking instruction and judges the type of the checking instruction;
If the verification instruction is a service instruction, the security element is matched with a target application identifier, and service parameters of the target application identifier are read to respond to the service instruction;
If the verification instruction is an authentication instruction, the security element generates an element random number in response to the authentication instruction, and authentication verification is performed through interaction between the near field communication controller and the card reading device.
5. The smart card method of claim 4, wherein the secure element matches a target application identifier, reads a service parameter of the target application identifier in response to the service instruction, and further comprising:
The security element receives the service instruction, judges whether the card selection data set is updated, inputs the updated card selection data set into the intelligent card selection model under the condition that the card selection data set is updated, and obtains a second recommendation table output by the intelligent card selection model, and the security element searches a target application identifier from the second recommendation table;
If the card selecting data set is not updated, the secure element searches the first recommendation table for the target application identifier;
and reading the service parameters of the target application identifier, and sending the service parameters to the card reading equipment through the near field communication controller so as to respond to the service instruction.
6. The smart card selection method of claim 5, further comprising:
The near field communication controller receives a service verification result returned by the card reading device for carrying out service verification on the service parameters and judges the service verification result;
If the service verification result is verification failure, the near field communication controller sends the service verification result to the safety element;
Responding to the service verification result of the verification failure, and triggering false departure operation by the safety element;
and if the service verification result is successful, determining that the card swiping result of the first card swiping request is successful.
7. The smart card selection method of claim 6, wherein in response to a service verification result of the verification failure, the secure element triggers a false departure operation, further comprising:
the safety element judges that the reason that the service verification result is verification failure is irrelevant to the first non-access protocol parameter;
the near field communication controller receives a second card swiping request triggered by the card reading device after the false departure operation;
the near field communication controller responds to the second swipe request with the first contactless protocol parameter.
8. The smart card selection method of claim 6, wherein in response to a service verification result of the verification failure, the secure element triggers a false departure operation, further comprising:
the security element judges that the reason that the service verification result is verification failure is related to the first non-access protocol parameter;
the secure element updates the first non-access protocol parameters and sends the updated first non-access protocol parameters to the near field communication controller;
the near field communication controller receives a second card swiping request triggered by the card reading device after the false departure operation;
and the near field communication controller responds to the second card swiping request by utilizing the updated first non-access protocol parameter.
9. The smart card method of claim 5, wherein said secure element looks up said target application identification from said first recommendation table, further comprising:
the security element judges whether the application identifier corresponding to each card comprises a local application identifier;
If the local application identifier is included, the secure element searches the first recommendation table for the application identifier matched with the local application identifier as the target application identifier;
Or alternatively
And if the local application identifier is not included, the secure element searches a default application identifier from the first recommendation table as the target application identifier.
10. The smart card method of claim 5, wherein said secure element looks up a target application identification from said second recommendation table, further comprising:
the security element judges whether the application identifier corresponding to each card comprises a local application identifier;
if the local application identifier is included, the secure element searches the second recommendation table for the application identifier matched with the local application identifier as the target application identifier;
Or alternatively
And if the local application identifier is not included, the secure element searches a default application identifier from the second recommendation table as the target application identifier.
11. The smart card selection method of claim 4, wherein the secure element generates an element random number, and the authentication check is performed by the near field communication controller interacting with the card reading device, further comprising:
The secure element sends the element random number to the card reading device through the near field communication controller;
The near field communication controller receives an encryption result returned by the card reading device and sends the encryption result to the safety element;
and the security element performs authentication verification on the encryption result to determine the card swiping result of the first card swiping request.
12. The smart card selecting method as claimed in claim 11, wherein said performing authentication verification on said encryption result, determining a card swiping result of said first card swiping request, further comprises:
The secure element decrypts the encryption result by using an application identifier corresponding to the first non-access protocol parameter, the element random number and the agreed element key to obtain an encrypted ciphertext and a decrypted random number;
The security element performs data operation on the decrypted random number to obtain an operation result, and judges whether the operation result is identical to the encrypted ciphertext;
Under the condition that the operation result is the same as the encrypted ciphertext, the security element determines that the card swiping result of the first card swiping request is successful card swiping;
and under the condition that the operation result and the encrypted ciphertext are different, triggering false departure operation by the safety element.
13. The smart card method of claim 12, wherein the secure element triggers a false departure operation, further comprising:
the secure element updates the first non-access protocol parameters and sends the updated first non-access protocol parameters to the near field communication controller;
the near field communication controller receives a second card swiping request triggered by the card reading device after the false departure operation;
and the near field communication controller responds to the second card swiping request by utilizing the updated first non-access protocol parameter.
14. The smart card selecting method as claimed in claim 2, wherein in case the anti-collision check result is a check failure, the near field communication controller issues a smart card selecting instruction to the secure element, further comprising:
and the security element searches a second target card which is different from the first target card from the first recommendation table, reads a second non-access protocol parameter of the second target card, and covers the near field communication controller by utilizing the second non-access protocol parameter to perform intelligent card selection and card swiping circulation.
15. The smart card selecting method as claimed in claim 2, wherein in case the anti-collision check result is a check failure, the near field communication controller issues a smart card selecting instruction to the secure element, further comprising:
the safety element judges whether the card selecting data set is updated or not in response to the intelligent card selecting instruction, and the updated card selecting data set is input into the intelligent card selecting model under the condition that the card selecting data set is updated, so that a second recommendation table output by the intelligent card selecting model is obtained;
And the security element searches a second target card which is different from the first target card from the second recommendation table, reads a second non-access protocol parameter of the second target card, and covers the near field communication controller by utilizing the second non-access protocol parameter to perform intelligent card selection and card swiping circulation.
16. The smart card selection method of any one of claims 1-15, wherein the card selection dataset includes signal frequency, signal envelope, signal phase, signal radio frequency power, geographic location, geomagnetism, acquisition time, and card pool.
17. The smart card selection method of claim 16, wherein the determining of the card pool comprises:
the safety element receives a card adding instruction or a card deleting instruction sent by a card management application; the card adding instruction comprises a card identifier of a virtual card to be added, and the card deleting instruction comprises a card identifier of the virtual card to be deleted;
In response to the card adding instruction or the card deleting instruction, the secure element adds the card identification of the virtual card to be added to the card pool or deletes the card identification of the virtual card to be deleted from the card pool.
18. A smart card method as claimed in any one of claims 1 to 17, further comprising, in the event of successful swipe:
generating a card swiping record, wherein the card swiping record comprises card swiping signal frequency, card swiping signal envelope lines, card swiping signal phases, card swiping signal radio frequency power, card swiping geographic positions, card swiping geomagnetism, card swiping time and card swiping identifications.
19. The smart card method of claim 1, wherein the secure element is provided with a first smart card switch flag bit and the near field communication controller is provided with a second smart card switch flag bit; before the smart card selection, the method further comprises:
the secure element and the near field communication controller receive an open instruction;
in response to the open instruction, the secure element sets the state value of the first smart card switch flag bit to open and the near field communication controller sets the state value of the second smart card switch flag bit to open.
20. The smart card method of claim 19, wherein the secure element and the near field communication controller receive an on command, comprising:
The security element and the near field communication controller receive an opening instruction issued by a card management application;
Or alternatively
The near field communication controller receives an opening instruction issued by a card management application and sends the opening instruction to the security element;
Or alternatively
The secure element receives an opening instruction issued by the card management application and sends the opening instruction to the near field communication controller.
21. A smart card selection device, characterized in that the device is applied to an electronic apparatus comprising a secure element and a near field communication controller; the intelligent card selecting device comprises:
The intelligent card selecting module of the safety element is used for inputting a card selecting data set into an intelligent card selecting model, selecting a first target card from a first recommending table output by the intelligent card selecting model, reading a first non-access protocol parameter of the first target card, and writing the first non-access protocol parameter into the near field communication controller;
the receiving module of the near field communication controller is used for receiving a first card swiping request triggered by the card reading equipment;
And the card cutting module of the near field communication controller is used for responding to the first card swiping request by utilizing the first non-access protocol parameter.
22. An electronic device comprising a secure element and a near field communication controller for performing the smart card method of any of claims 1-20.
23. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the smart card method of any one of claims 1-20.
CN202311862887.0A 2023-12-29 2023-12-29 Intelligent card selecting method and device and electronic equipment Pending CN117997382A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311862887.0A CN117997382A (en) 2023-12-29 2023-12-29 Intelligent card selecting method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311862887.0A CN117997382A (en) 2023-12-29 2023-12-29 Intelligent card selecting method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN117997382A true CN117997382A (en) 2024-05-07

Family

ID=90898454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311862887.0A Pending CN117997382A (en) 2023-12-29 2023-12-29 Intelligent card selecting method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN117997382A (en)

Similar Documents

Publication Publication Date Title
RU2611241C2 (en) Method of routing in mobile terminal, emulating contactless payment card
CN101755291B (en) Method, system and trusted service manager for securely transmitting an application to a mobile phone
EP1770533A1 (en) Information management device and information management method
EP2472923B1 (en) Remote control method and system for smart card
JP4681314B2 (en) Wireless communication system, reader / writer device, key management method, and computer program
JP2009146193A (en) Wireless communication terminal, method for protecting data of wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program
EP2835997B1 (en) Cell phone data encryption method and decryption method
JP6923582B2 (en) Information processing equipment, information processing methods, and programs
CN112508554B (en) Transaction processing method and device based on near field communication
KR20150085821A (en) Nfc device comprising configurable notification means
US20230252451A1 (en) Contactless card with multiple rotating security keys
EP3336790A1 (en) Payment authentication method and device for mobile terminal, and mobile terminal
CN104899496A (en) Data reading method and terminal for same
CN114239015A (en) Data security management method and device, data cloud platform and storage medium
CN110866580B (en) Preprocessing method and device for configuring NFC smart card
KR100629036B1 (en) Device control system
CN112989851A (en) NFC card activation method and device and electronic equipment
US20140351364A1 (en) System, method, and apparatus for using a virtual bucket to transfer electronic data
CN117997382A (en) Intelligent card selecting method and device and electronic equipment
CN106685931B (en) Smart card application management method and system, terminal and smart card
CN103699853A (en) Smart SD (secure digital memory card) and control system and control method thereof
CN103052060A (en) Method for improving information security of mobile terminal and mobile terminal
JP4976891B2 (en) IC card system, its division information / secret information generation terminal, program
JP5960865B2 (en) Portable information terminal and control method thereof
JP5882637B2 (en) Thin client type reading device, communication system, control method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination