WO2010096994A1 - 一种应用下载的系统和方法 - Google Patents

一种应用下载的系统和方法 Download PDF

Info

Publication number
WO2010096994A1
WO2010096994A1 PCT/CN2009/075506 CN2009075506W WO2010096994A1 WO 2010096994 A1 WO2010096994 A1 WO 2010096994A1 CN 2009075506 W CN2009075506 W CN 2009075506W WO 2010096994 A1 WO2010096994 A1 WO 2010096994A1
Authority
WO
WIPO (PCT)
Prior art keywords
management platform
smart card
application
card
mobile terminal
Prior art date
Application number
PCT/CN2009/075506
Other languages
English (en)
French (fr)
Inventor
贾倩
马景旺
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US13/202,231 priority Critical patent/US9037857B2/en
Priority to JP2011550402A priority patent/JP5513527B2/ja
Priority to EP09840662.2A priority patent/EP2388968B1/en
Publication of WO2010096994A1 publication Critical patent/WO2010096994A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3229Use of the SIM of a M-device as secure element
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/356Aspects of software for card payments
    • G06Q20/3563Software being resident on card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/68Payment of value-added services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits

Definitions

  • the present invention relates to the field of communications, and more particularly to systems and methods for application downloading in electronic payment for mobile terminals. Background technique
  • NFC Near Field Communication
  • J radio frequency identification
  • IC contactless integrated circuit
  • an electronic payment application is placed in a smart card, and the electronic payment application is usually preset in the smart card by the card merchant when the smart card is shipped.
  • Multiple electronic payment applications can be installed on a smart card.
  • the smart card adopts the Global Platform Card Specification V2.1/V2.2 specification, and the smart card is divided into several independent security domains to ensure the isolation and independence of multiple electronic payment applications.
  • the Issuer Security Domain also known as the Issuer Security Domain, is the card issuer's primary, mandatory card representative that contains secure domain keys for supporting secure channel protocol operations and card content management. .
  • the Supplementary Security Domain is an optional, optional card representative of an application provider or card issuer or their agent. It stores the electronic payment application managed by the application provider and the application provider. Managed electronic payment application, the control party of the security domain can operate and maintain the stored electronic payment application, as follows New electronic payment applications, electronic payment application upgrades and deletions.
  • the main object of the present invention is to provide a system and method for application downloading, which facilitates quick and convenient application downloading.
  • the present invention provides a method for downloading an application, including: an out-of-card entity management platform establishes a connection with a smart card through an over-the-air (OTA) server and a mobile terminal;
  • OTA over-the-air
  • the application is downloaded to the smart card based on the secure channel.
  • the card external entity management platform is: a card issuer management platform, or an application provider management platform.
  • the platform includes a card issuer management platform and an application provider management platform, and the method includes: the card issuer management platform establishes a connection with the smart card through the OTA server and the mobile terminal, and receives an application download request sent by the smart card;
  • the application provider management platform selects the slave security domain on the smart card responsible for the application download, establishes a secure channel between the card publisher management platform, the OTA server, and the mobile terminal and the smart card, and downloads the application to the smart card based on the secure channel.
  • the method further includes:
  • the user selects an application download through a smart card user identification application development tool (STK) menu; or, based on the smart card web server, the user selects an application download through web browsing, and initiates a smart card with the mobile terminal, the OTA server, and the card external entity management platform. Connection, After the connection is established, the smart card initiates an application download request.
  • STK smart card user identification application development tool
  • a secure channel is established between the card external entity management platform and the smart card, specifically: the card external entity management platform performs identity authentication according to a predetermined secure channel protocol and a smart card, and establishes a secure channel; the predetermined secure channel protocol is based on a symmetric key or a non- Symmetric key mechanism.
  • the card issuer management platform or the application provider management platform establishes a connection with the smart card through the OTA server and the mobile terminal, and specifically includes: establishing a connection between the connection mode and the predetermined protocol;
  • the OTA server and the smart card in the mobile terminal establish a connection through a mobile data service channel or a short message channel.
  • the command or response is attached as data body to the mobile data service channel data or to the short message data information.
  • the predetermined command is sent to the smart card by: loading, sending to the smart card in the mobile terminal by using the OTA server; the smart card receiving the encapsulated predetermined command by using a bearer-independent protocol (BIP) command, parsing, and performing corresponding operations according to the predetermined command ;
  • BIP bearer-independent protocol
  • the downlink short message of the OTA server is sent to the smart card, and the smart card receives the predetermined command from the downlink short message, and performs a corresponding operation according to the predetermined command.
  • the method further includes: sending, by the smart card, a response of the predetermined command by:
  • the smart card After performing the corresponding operation, the smart card encapsulates the response command of the predetermined command according to the data format of the BIP command, and sends the response command to the mobile terminal; the mobile terminal sends the predetermined life through the OTA server, and after the smart card performs the corresponding operation, the short message of the above line
  • the form transmits a response of the predetermined command to the mobile terminal, and the mobile terminal transmits a response of the predetermined command to the card issuer management platform or the application provider management platform through the OTA server.
  • the smart card executes the application download after receiving the predetermined command.
  • the application provider management platform sends a token request to the card issuer management platform, and receives the token key sent by the card issuer management platform;
  • the application provider management platform And sending, by the application provider management platform, the predetermined command to the smart card, specifically: the application provider management platform generates a predetermined command including the loading token, and sends the smart card to the smart terminal in the mobile terminal through the OTA server.
  • the establishing a connection between the smart card and the smart card by using the OTA server and the mobile terminal includes: establishing a BIP connection between the smart card and the mobile terminal, and establishing a connection between the mobile terminal and the OTA server by using a predetermined protocol;
  • the mobile terminal transparently transmits data between the smart card and the OTA server, and the command or response of the interaction between the card issuer management platform or the application provider management platform and the smart card is added as channel data of the active command supported by the BIP. in.
  • the command or response is added to the channel data of the active command supported by the BIP as a data body.
  • the data format is encapsulated and sent to the mobile terminal through the OTA server.
  • the smart card receives the data available from the mobile terminal. After using the received data (RECEIVE DATA ) command to receive data, parse the data, get the command, and perform the corresponding operation according to the command;
  • the smart card After the operation is completed, the smart card encapsulates the response to the command according to the channel data of the SEND DATA command, sends it to the mobile terminal, and sends the security domain responsible for the application download on the selected smart card through the OTA server.
  • the card issuer management platform selects a primary security domain on the smart card, or the card issuer management platform creates a secondary security zone for the application, and selects the secondary security domain;
  • the card issuer management platform selects the primary security domain, and establishes a relationship with the smart card.
  • a secure channel created from the security domain, generated from the security domain initial key, and sent the slave security domain initial key to the application provider management platform; the application provider management platform selects the slave security domain responsible for application download, based on security The channel is updated from the security domain key; if the application has been created from the security domain, the application provider management platform selects the slave security domain that is responsible for the application download, based on the secure channel update from the security domain key.
  • the invention also provides an application downloading system, which comprises a smart card, a mobile terminal, an OTA server and an out-of-card entity management platform, wherein:
  • the external card management platform is configured to establish a connection through the OTA server and the mobile terminal and the smart card, receive an application download request sent by the smart card, select a security domain on the smart card that is responsible for the application download, and establish a secure channel with the smart card, based on the security Channel, download the app to the smart card;
  • An OTA server configured to establish a secure connection with an off-card entity management platform, connect with a mobile terminal, and provide a download service for a smart card in the mobile terminal;
  • a smart card located in the mobile terminal, for using a mobile terminal and an OTA server and card
  • the external entity management platform establishes a secure channel and completes the application download operation through the secure channel.
  • the card external entity management platform is: a card issuer management platform, or an application provider management platform. Publisher management platform, where
  • the application provider management platform includes:
  • An application module configured to send a request for creating a security domain from the card issuer management platform when the slave security domain is not created for the application;
  • a receiving module configured to receive a slave domain initial key sent by the card issuer management platform; and an update module, configured to update the slave security domain key through the secure channel;
  • the card issuer management platform includes: a creation and delivery module, configured to receive a request from a security domain to create an application provider management platform, create a slave security domain, generate and send a key from the security domain to the application provider management platform. Taiwan, among them,
  • the card issuer management platform is configured to establish a connection through an OTA server, a mobile terminal, and a smart card, and receive an application download request sent by the smart card;
  • the application provider management platform is configured to select a security domain on the smart card that is responsible for application downloading, and after establishing a secure channel with the smart card, download the application to the smart card based on the secure channel.
  • the card issuer management platform includes: a creation and delivery module, configured to create a slave security domain, generate a slave domain security key, and create the slave domain security key when no slave domain is created for the application Send to the application provider management platform;
  • the application provider management platform includes:
  • a receiving module configured to receive an initial key from the security domain
  • An update module that is used to update the security domain key from a secure channel.
  • the smart card further includes an STK menu module, configured to provide an application download menu for the user, and select an application download;
  • the system further includes a smart card web server for providing an application download option web page to the user, and selecting an application download.
  • the application provider management platform or the card issuer management platform further includes an authentication and establishing module, configured to perform identity authentication according to a predetermined secure channel protocol and a smart card, and establish a secure channel, where the predetermined secure channel protocol is based on a symmetric key or an asymmetric Key mechanism. Connection mode and predetermined agreement to establish a connection;
  • the smart card in the OTA server and the mobile terminal establishes a connection through a mobile data service channel or a short message channel.
  • the card issuer management platform or the application provider management platform further includes: a package module, configured to generate a predetermined command, attach the predetermined command as a data body to the mobile service data channel data, or attach the predetermined command to the downlink of the OTA server. a short message; a sending module, configured to send the encapsulated predetermined command to the smart card by using the OTA server and the mobile terminal;
  • the smart card further includes:
  • a receiving and parsing module configured to receive the encapsulated predetermined command by using a BIP command, parse the predetermined command, or receive a predetermined command from the downlink short message;
  • An execution module configured to perform a corresponding operation according to the predetermined command
  • the application provider management platform further includes: a token application module, configured to send a token request to the card issuer management platform, and receive a token key sent by the card issuer management platform;
  • the card issuer management platform further includes: a token sending module, configured to send a token key to the application provider management platform after receiving the token application of the application provider management platform;
  • the encapsulating module is configured to generate a predetermined command that includes a loading token.
  • the smart card and the mobile terminal are specifically used to establish a BIP connection, and the mobile terminal and the OTA server are specifically configured to establish a connection by using a predetermined protocol, and the mobile terminal is used for transparently transmitting data between the smart card and the OTA server.
  • the card issuer management platform or the application provider management platform further includes: a package module, configured to encapsulate the command as data according to a predetermined data format, and add a predetermined command as a data body to the mobile service data channel data; the smart card further includes:
  • the receiving and parsing module is configured to: after receiving the data available event sent by the mobile terminal, use the receive data command to receive the data, and parse the data to obtain a predetermined command;
  • An execution module configured to perform a corresponding operation according to a predetermined command
  • the response module is configured to, after the operation is completed, encapsulate the response to the predetermined command in the form of channel data of the send data command, send the data to the mobile terminal, and send the data to the card issuer management platform or the application provider management platform through the OTA server. .
  • the beneficial effects of the present invention are as follows:
  • the system and method for application downloading proposed by the present invention can download an application to a smart card through a mobile communication network in a high speed, real time, convenient and secure manner, thereby improving the user experience.
  • FIG. 1 is a schematic structural diagram of an application downloading system according to the present invention.
  • FIG. 2 is another schematic structural diagram of an application downloading system in the present invention
  • 3 is a schematic flowchart of application downloading in the present invention
  • a schematic diagram of a detailed signaling process a schematic diagram of a detailed signaling process using download and installation;
  • FIG. 1 is a schematic structural diagram of an application downloading system according to the present invention.
  • a card issuer management platform 10 an application provider management platform 12, an over-the-air (OTA) server 14, and an OTA server 16 are provided.
  • a mobile terminal 18 including a smart card and a mobile communication network 20.
  • the card issuer management platform 10 is mainly responsible for the issuance and management of smart cards, and manages the resources and lifecycles, keys, certificates and applications of the smart cards.
  • the card issuer management platform 10 is configured to establish a connection with the smart card in the mobile terminal 18, and select a security domain, and after establishing a secure channel with the smart card, download the application to the smart card through the secure channel; further, it can also be used to create the slave The security domain and the generated slave domain initial key; further, the token key, such as the issuer token key, may be sent to the application provider after receiving the token request from the application provider management platform 12 Platform 12.
  • the application provider management platform 12 is configured to establish a connection with the smart card in the mobile terminal 18, and send a request to create a security domain from the card issuer management platform 10, after obtaining the security domain initial key from the card issuer management platform 10. After selecting a secure channel from the security domain and the smart card in the mobile terminal 18, the security domain key is updated and the application is downloaded to the smart card through the secure channel.
  • the application provider management platform 12 is configured to apply to the card issuer management platform 10 for a token for application download, and generate a predetermined command including a load token (Load Token).
  • the application is downloaded to the smart card by the card issuer management platform 10 and its OTA server 14 establishing a secure channel with the smart card in the mobile terminal 18.
  • the card issuer management platform 10 and/or the application provider management platform 12 is referred to as an off-card entity management platform.
  • the OTA server 14 is used to establish a secure connection with the card issuer management platform 10, to connect with the mobile terminal 18, and to provide a download service for the smart card in the mobile terminal 18.
  • the OTA server 16 is used to establish a secure connection with the application provider management platform 12, to connect with the mobile terminal 18, and to provide download services for the smart cards in the mobile terminal 18.
  • the OTA server 14 and the OTA server 16 can be combined into one OTA server 22.
  • the OTA server 22 is used to establish a secure connection with the card issuer management platform 10 and/or the application provider management platform 12, and to move.
  • the terminal 18 makes a connection and provides a download service for the smart card in the mobile terminal 18.
  • the mobile terminal 18 participates in establishing a connection between the smart card and the OTA server 14/16, and is responsible for transparently transmitting data between the OTA server 14/16 and the smart card.
  • the smart card is located in the mobile terminal 18, and is installed on the mobile terminal for establishing identity through the mobile terminal 18 and the OTA server 14/16, and then the card issuer management platform 10 or the application provider management platform 12 to establish a secure channel. And complete the application download via a secure channel.
  • the physical interface for data transmission between the mobile terminal and the smart card may be a conventional 7816 interface; if both the mobile terminal and the smart card support the USB interface, in order to obtain a higher transmission rate, a USB interface may also be employed.
  • the interaction between the mobile terminal and the smart card supports the 7-bit Bearer Independent Protocol (BIP) command, and adopts a higher-speed and more secure universal wireless packet in data transmission.
  • BIP Bearer Independent Protocol
  • GPRS General Packet Radio Service
  • UMTS Universal Mobile Telecommunications System
  • different protocols can be used between the mobile terminal 18 and the OTA server 14/16, and the use of bearer-independent protocols is transparent to the OTA server 14/16.
  • the mobile communication network 20 is configured to provide an over-the-air data channel to ensure communication between the mobile terminal 18 and the OTA server 14/16.
  • the data transmission between the OTA server 14/16 and the mobile terminal 18 containing the smart card may be based on two methods, one being through a GPRS gateway of the mobile communication network 20 or another 3G gateway such as UMTS (ie, via a mobile data service channel), Based on BIP implementation, this method can ensure high-speed data transmission and reliability and integrity of data transmission; another way is through the short message gateway of mobile communication network 20, data communication between OTA server 14/16 and smart card Application downloading is performed by means of short messages. In the case that the mobile terminal does not support mobile data services or the mobile terminal or the smart card does not support BIP, the application can be downloaded by using a short message channel.
  • the card issuer management platform further includes:
  • a create and send module configured to receive a request from a security domain to create an application provider management platform or create a slave security domain from a security domain, generate and send an initial key from the secure domain to the application provider Management platform.
  • the application provider management platform further includes:
  • An application module configured to send a request for creating a security domain from the card issuer management platform when the slave security domain is not created for the application; a receiving module, configured to receive a slave domain security key sent by the card issuer management platform; and an update module, configured to update the slave security domain key through the secure channel.
  • the smart card further includes a user identification application development tool (STK, SIM TOOL KIT) menu module, configured to provide an application download menu for the user, and select an application download; or, the application download system further includes a smart card web server (SCWS, Smart Card) Web Server), used to provide users with an application download option web page, select application download.
  • STK user identification application development tool
  • SCWS Smart Card
  • the application provider management platform or the card issuer management platform further includes an authentication and establishing module, configured to perform identity authentication according to a predetermined secure channel protocol and a smart card, and establish a secure channel, where the predetermined secure channel protocol is based on a symmetric key or an asymmetric Key mechanism.
  • the card issuer management platform or the application provider management platform further includes: a package module, configured to generate a predetermined command, attach the predetermined command as a data body to the mobile service data channel data, or attach the predetermined command to the downlink of the OTA server. a short message; a sending module, configured to send the encapsulated predetermined command to the smart card by using the OTA server and the mobile terminal;
  • the smart card further includes:
  • a receiving and parsing module configured to receive the encapsulated predetermined command by using a BIP command, parse the predetermined command, or receive a predetermined command from the downlink short message;
  • An execution module configured to perform a corresponding operation according to the predetermined command
  • a response module configured to send, according to the BIP, the response of the predetermined command to the mobile terminal according to the BIP, after the execution module performs the corresponding operation according to the predetermined command, by the mobile terminal
  • the application provider management platform further includes a token application module, configured to send a token request to the card issuer management platform, and receive a token key sent by the card issuer management platform;
  • the card issuer management platform further includes a token sending module, configured to send a token key to the application provider management platform after receiving the token application of the application provider management platform;
  • the encapsulation module of the application provider management platform is configured to generate a predetermined command including a load token key.
  • the smart card establishes a BIP connection with the mobile terminal, and the mobile terminal establishes a connection with the OTA server through a predetermined protocol, and the mobile terminal is configured to transparently transmit data between the smart card and the OTA server.
  • the card issuer management platform or the application provider management platform includes: a package module, configured to encapsulate the predetermined command as data according to a predetermined data format, and add the predetermined command as a data body to the mobile service data channel data; the smart card includes :
  • a receiving and parsing module configured to receive data after receiving a Data available event sent by the mobile terminal, and parse the data to obtain a predetermined command
  • An execution module configured to perform a corresponding operation according to a predetermined command
  • the response module is configured to, after the execution of the execution of the module operation, encapsulate the response to the predetermined command in the form of channel data of the send data (SEND DATA) command, send it to the mobile terminal, and send it to the card issuer management platform through the OTA server. Or application provider management platform.
  • FIG. 3 is a schematic flowchart of application downloading in the present invention.
  • the network establishes a connection with the smart card.
  • the security domain responsible for the application download on the smart card is selected, and a secure channel is established with the smart card.
  • the connection between the communication network and the smart card means:
  • the card issuer management platform or the application provider management platform establishes a connection with the mobile terminal and the smart card through the OTA server, and the specific processing includes:
  • a secure connection is established between the card issuer management platform or the application provider management platform and the OTA server through a predetermined connection method (dedicated line or network) and a predetermined protocol;
  • the smart card establishes a connection with the OTA server via a short message channel or a data channel such as GPRS/UMTS.
  • the smart card and the OTA server establish a connection through a data channel such as GPRS/UMTS
  • a data channel such as GPRS/UMTS
  • the smart card establishes a BIP connection with the mobile terminal
  • the mobile terminal establishes a connection with the OTA server by using a predetermined protocol, such as a TCP/IP protocol; responsible for transparent transmission of data between the smart card and the OTA server.
  • a predetermined protocol such as a TCP/IP protocol; responsible for transparent transmission of data between the smart card and the OTA server.
  • a secure connection can be established through a predetermined connection between the two parties (dedicated line or network) and a predetermined protocol.
  • BIP is a connection-oriented transport protocol proposed in the 3rd Generation Partnership Project (3GPP).
  • the high-speed data service channels supported include: GPRS, Enhanced Data Rate GSM Evolution Technology (EDGE) , Enhanced Data Rate for GSM Evolution ) and UMTS; support five active commands and two events, five of which are: OPEN CHANNEL (open channel), CLOSE CHANNEL
  • Data available and Channel status enable the smart card to leverage the mobile terminal's bearer capabilities to establish a connection-oriented data path with the remote OTA server.
  • the smart card can instruct the mobile terminal to pass the BIP OPEN CHANNEL command.
  • the mobile data service channel is connected to the OTA server.
  • the smart card specifies BIP connection parameters, including supported transport protocol types (such as Transmission Control Protocol (TCP), etc.), data buffer size, and OTA server network.
  • TCP Transmission Control Protocol
  • the address, channel number, etc. thereby establishing a connection between the smart card and the OTA server.
  • the method further includes: the user selects an application download menu item through the STK menu of the smart card, or selects an application download based on the SCWS, the user browses through the webpage, initiates management of the smart card and the OTA server and the card issuer.
  • the platform or application provider manages the connection between the platforms.
  • step 301 after the smart card establishes a connection with the card issuer management platform or the application provider management platform through the mobile communication network, an application download request is initiated.
  • the method further includes: the card issuer management platform or the application provider management platform determining whether the smart card is allowed to be downloaded; In the case of the card issuer management platform or the application provider management platform, the security domain responsible for downloading the application on the smart card is selected through the established connection link. For the download of the card issuer's own application, the card issuer may select the primary security domain or create a secondary security domain for the corresponding application download, as determined by the card issuer.
  • the card issuer management platform needs to select the primary security domain first, establish and A secure channel between the smart cards, created from the security domain, generates the initial key from the security domain, and sends the key to the application provider management platform, and the application provider management platform selects the corresponding slave security domain, established between the smart card and the smart card.
  • the application provider management platform selects the corresponding slave security domain, authenticates with the smart card, establishes a secure channel, and updates the slave Secure domain key; for applications hosted by card issuers, corresponding slaves
  • the security domain needs to have Delegated Management Privilege.
  • the card issuer management platform or the application provider management platform and The specific process of establishing a secure channel is as follows: The card issuer management platform or the application provider management platform performs identity authentication with the smart card according to a predetermined secure channel protocol, and establishes a secure channel.
  • the predetermined secure channel protocol can be based on a symmetric key or an asymmetric key mechanism.
  • the foregoing method further includes: a series of commands and responses in the security domain selection and identity authentication and secure channel establishment process are added as data bodies to the channel data of the active command supported by the BIP, or added to the uplink and downlink short messages.
  • the smart card and card step 302 In the data information, in the smart card and card step 302:
  • the app is downloaded to the smart card.
  • the specific process of downloading the application to the smart card by the card issuer management platform or the application provider management platform may be: the predetermined data format is encapsulated, and sent to the smart card through the OTA server;
  • the smart card uses the BIP command to receive the encapsulated predetermined command, parses the data therein, and performs an application download operation according to the obtained command; the smart card encapsulates the response command of the predetermined command according to the data format of the BIP command, and sends the response command to the mobile terminal; The terminal sends a response command to the card issuer management platform or the application provider management platform through the OTA server, and feeds back the download result.
  • the specific process of downloading the application to the smart card by the card issuer management platform or the application provider management platform may also be: sending the downlink short message of the device to the smart card;
  • the smart card receives the predetermined command from the downlink short message, and performs an application download operation according to the obtained predetermined command;
  • the smart card sends a response command of the predetermined command to the mobile terminal in the form of the short message;
  • the mobile terminal sends the response command to the OTA server
  • the card issuer management platform or application provider management platform feedback download results.
  • the predetermined command sent (such as the application download command - INSTALL [for load] ), its specific processing includes: For the card issuer's own application download, the card issuer management platform generates a predetermined command, and through the above-mentioned mobile communication network The established connection and the secure channel are sent to the smart card; for the download of the application controlled by the application provider, the application provider management platform generates a predetermined command and sends it to the smart card through the above-mentioned connection and secure channel established via the mobile communication network; The application download of the application provider hosted by the card issuer requires the application provider management platform to apply for the token for the application download to the card issuer management platform. After receiving the token application, the card issuer management platform will encrypt the token.
  • the key such as the issuer token key
  • the application provider management platform regenerates the application download command including the Load Token and sends it to the smart card through the above-mentioned connection and secure channel established via the mobile communication network.
  • the Token is specifically associated with the hosted application, which is generated by the card issuer and is evidence that the card issuer authorizes the management of the card content.
  • the hosted application which is generated by the card issuer and is evidence that the card issuer authorizes the management of the card content.
  • the card issuer For application downloads by an application provider hosted by a card issuer, only the application provider is authorized by the card issuer, such as the token key provided by the card issuer, to download the new application to the smart card.
  • the card issuer management platform or the application provider management platform may send an application installation command (INSTALL[for install]) to the smart card based on the established secure channel, so that the smart card is applied.
  • installation For Java Card applications, the application install command will invoke the application register() on the smart card to register the payment application instance to the Java Card Runtime Environment (JCRE, Java Card Runtime Environment) and assign the corresponding application instance application identifier to the payment application ( AID, Application IDentifer). After the successful execution of register() on the smart card, the application is successfully installed. After the installation is successful, the smart card.
  • JCRE Java Card Runtime Environment
  • AID Application IDentifer
  • the specific processing method of the command and response in the application downloading process as the data body is attached to the channel data of the active command supported by the BIP includes: the card issuer management platform or the application provider management platform uses the command as the data according to the predetermined data format. Encapsulation, and sending to the mobile terminal through the OTA server, after receiving the Data available event sent by the mobile terminal, the smart card uses the BIP command-RECEIVE DATA to receive data, parses the data, obtains a command, and performs corresponding operations according to the command. After the operation is completed, the response to the command is encapsulated in the form of BIP command-SEND DATA channel data, sent to the mobile terminal, and then sent to the card issuer management platform or the application provider management platform through the OTA server.
  • the commands involved in the application download process include the above-mentioned security domain selection command (SELECT), a series of commands for identity authentication and secure channel establishment, and an application download and install command (INSTALL).
  • FIG. 4 is a schematic diagram of the process. As shown in FIG. 4, the following processing is included:
  • Step 401 The user selects an application download menu item through the STK menu of the smart card, or selects an application download based on the SCWS, the user browses through the webpage, initiates a connection between the smart card and the OTA server and the card issuer management platform, and the smart card sends the BIP. Command an OPEN CHANNEL to the mobile terminal to establish a BIP connection.
  • the smart card specifies BIP connection parameters, including supported transport protocol types (such as TCP, etc.), data buffer size, OTA server network address, channel number, and so on.
  • BIP connection parameters including supported transport protocol types (such as TCP, etc.), data buffer size, OTA server network address, channel number, and so on.
  • Step 402 The mobile terminal establishes a BIP connection with the smart card, and establishes a relationship with the OTA server according to the network address and transmission protocol type of the OTA server in the OPEN CHANNEL command. TCP/IP connection.
  • Step 403 After the TCP/IP connection is established, the smart card initiates an application download request to the card issuer management platform.
  • Step 404 After receiving the application download request, the card issuer management platform determines that the smart card is allowed to download the application, and then selects the smart card primary security domain, including:
  • the card issuer management platform encapsulates the SELECT command according to the command format specified in the Global Platform specification, fills the AID of the primary security domain in the SELECT command, and then sends the encapsulated SELECT command as data to the OTA server;
  • the mobile terminal receives data from the OTA server through a TCP/IP connection, and notifies the smart card (via the ENVELOPE Data available command) with the "Data available event" to retrieve the data, and sends the BIP command a RECEIVE DATA when the smart card drags the data from the mobile terminal; c) The smart card parses the data and selects the primary security domain according to the SELECT command. After executing the command, the smart card sends the SELECT response data through the BIP command SEND DATA, and the mobile terminal sends the data to the OTA server through the previously established TCP/IP connection.
  • Step 405 After receiving the SELECT response, the card issuer management platform establishes a secure channel with the smart card as specified in Global Platform V2.2.
  • the commands used to establish a secure channel are passed in the same way as the SELECT command described above.
  • Step 406 After the security channel is established, the card issuer management platform sends the application download command INSTALL[for load] to the smart card, and may include multiple INSTALL[for load] commands according to the application file size; the smart card completes the download and downloads the feedback result. Give the card issuer management platform; the INSTALL[for load] command is passed in the same way as the SELECT command described above.
  • Step 407 The card issuer management platform sends the application installation command INSTALL[for install] to the smart card; after the smart card completes the installation, the installation result is fed back to the card issuer management platform; the INSTALL[for install] command is transmitted in the same manner as the aforementioned SELECT command.
  • Step 408 After the application is installed, the smart card can send a BIP command-CLOSE.
  • CHANNEL closes the BIP connection between the smart card and the mobile terminal; if there is a subsequent operation based on the mobile communication network, the BIP connection can be closed without further application downloading.
  • Step 409 The TCP/IP connection between the mobile terminal and the OTA server is disconnected.
  • the detailed signaling flow diagram of the download and installation, as shown in Figure 5, includes the following processing:
  • Step 501 The user selects an application download menu item through the STK menu of the smart card, or selects an application download based on the SCWS, the user browses through the webpage, initiates a connection between the smart card and the OTA server and the card issuer management platform, and the smart card sends the BIP.
  • the smart card specifies BIP connection parameters, including supported transport protocol types (such as TCP, etc.), data buffer size, OTA server network address, channel number, etc.
  • Step 502 The mobile terminal establishes a BIP connection with the smart card, and establishes a TCP/IP connection with the OTA server according to the network address and transport protocol type of the OTA server in the OPEN CHANNEL command.
  • Step 503 After the TCP/IP connection is established, the smart card initiates an application download request to the card issuer management platform.
  • Step 504 After receiving the application download request, the card issuer management platform determines that the smart card is allowed to perform the application download, and continues to determine whether the slave security domain has been created for the application. If yes, the card issuer management platform will download the application from the user. The application provider management platform is notified, and then step 507 is performed, otherwise, the smart card primary security domain is selected; the method of selecting the security domain is similar to the processing of the SELECT command and response in step 404 of FIG.
  • Step 505 After receiving the SELECT response, the card issuer management platform establishes a secure channel with the smart card according to the provisions in Global Platform V2.2, and then creates a slave security domain, and generates a slave domain initial key.
  • the command used in the above process is transmitted in a similar manner to the SELECT command and response processing in step 404 of FIG.
  • Step 506 The card issuer management platform sends the secure domain initial key to the application provider management platform. Server, mobile terminal, select the smart card from the secure domain, establish a secure channel with the smart card, and then update the key from the secure domain.
  • the application provider management platform communicates with the card issuer management platform via a predetermined protocol.
  • the communication method between the card issuer management platform and the smart card is similar to the processing of the SELECT command and response in step 404 of FIG.
  • Step 509 The card issuer management platform sends the publisher Token key to the application provider management platform.
  • Step 510 The application provider management platform generates an application download command INSTALL[for load] including a Load Token according to the information such as the publisher Token key, and sends the message to the smart card, which may include multiple INSTALLs according to the application file size.
  • INSTALL[for load] command after the smart card completes the download, the feedback is downloaded to the application provider management platform.
  • the INSTALL[for load] command and its response are passed in a similar manner to the SELECT command and response processing in step 404 of Figure 4.
  • Step 511 The application provider management platform generates an application installation command INSTALL[for install] containing the Load Token according to the information such as the publisher Token key, and sends the application to the smart card. After the smart card completes the installation, the installation result is fed back to the application provider management platform.
  • the INSTALL[for install] command and its response are passed in a similar manner to the SELECT command and response processing in step 404 of Figure 4. If it includes application status, resource occupancy, version status, and so on.
  • Step 513 After the application is installed, the smart card can send a BIP command-CLOSE CHANNEL to close the BIP connection between the smart card and the mobile terminal; if there is a subsequent operation based on the mobile communication network, the BIP connection can be closed without further application downloading.
  • Step 514 A TCP/IP connection between the mobile terminal and the OTA server is disconnected.
  • step 512 There is no sequence relationship between step 512 and step 513.
  • FIG. 6 is a schematic diagram of a detailed signaling flow of application downloading and installation controlled by an application provider according to a preferred embodiment of the present invention. As shown in FIG. 6, the following processing is included:
  • Step 601 The user selects an application download menu item through the STK menu of the smart card, or selects an application download based on the SCWS, the user browses through the webpage, initiates a connection between the smart card and the OTA server and the application provider management platform, and the smart card sends the BIP.
  • the smart card specifies BIP connection parameters, including supported transport protocol types (such as TCP, etc.), data buffer size, OTA server network address, channel number, etc.
  • Step 602 The mobile terminal establishes a BIP connection with the smart card, and establishes a TCP/IP connection with the OTA server according to the network address and transport protocol type of the OTA server in the OPEN CHANNEL command.
  • Step 603 After the TCP/IP connection is established, the smart card initiates an application download request to the application provider management platform.
  • Step 604 If the slave security domain is not created for the application, the application provider management platform issues a request to create a request from the security domain to the card issuer management platform; if the slave security domain has been created for the application, step 607 is directly performed.
  • Step 605 The card issuer management platform establishes a secure channel with the smart card according to the provisions in Global Platform V2.2, and then creates a slave security domain, and generates a slave domain initial key; a similar manner of the command used in the above process is transmitted. 4 The processing of the SELECT command and response in step 404.
  • Step 606 The card issuer management platform sends the secure domain initial key to the application provider management platform.
  • Step 607 The application provider management platform selects through its OTA server, mobile terminal, The smart card establishes a secure channel from the secure domain, with the smart card, and then updates the key from the secure domain.
  • the command used in the above process is transmitted in a similar manner to the SELECT command and response processing in step 404 of FIG.
  • Step 608 The application provider management platform generates an application download command INSTALL[for load], and sends it to the smart card. According to the application file size, it may include multiple INSTALL[for load] commands; after the smart card completes downloading, the feedback download result is sent to the application provider for management. platform.
  • the INSTALL[for load] command and its response are passed in a similar way to the SELECT command and response in step 404 of Figure 4. Send to smart card. After the smart card completes the installation, the installation result is fed back to the application provider management platform.
  • the INSTALL[for install] command and its response are passed in a similar way to the SELECT command and response processing in Figure 404.
  • Step 610 After the application is installed, the smart card can send a BIP command.
  • CLOSE CHANNEL closes the BIP connection between the smart card and the mobile terminal. If there is a subsequent operation based on the mobile communication network, the BIP connection can be closed without further application downloading.
  • Step 611 The TCP/IP connection between the mobile terminal and the OTA server is disconnected.
  • the command or response is added as a data body to the channel data of the active command supported by the BIP; if the mobile terminal does not support the mobile data service channel, or the mobile terminal or smart card does not support BIP, the command or response may be attached to the short
  • the transmission is performed in the message, and the process is similar, and will not be described here.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Description

一种应用下载的系统和方法 技术领域
本发明涉及通信领域, 特别是指应用于移动终端电子支付中的应用下 载的系统和方法。 背景技术
近场通信(NFC, Near Field Communication )技术是工作于 13.56MHz 的一种近距离无线通信技术, 由射频识另 'J ( RFID , Radio Frequency Identification )技术及互连技术融合演变而来。手机等移动终端集成 NFC技 术后, 能够模拟非接触式集成电路 ( IC, Integrated Circuit )卡, 用于电子 支付的有关应用。 移动终端应用于电子支付领域, 会进一步扩大移动终端 的使用范围, 给人们的生活带来便捷, 存在着广阔的应用前景。
在相关技术中, 电子支付应用被放置在智能卡中, 通常在智能卡出厂 时由卡商将电子支付应用预置在智能卡中。 在智能卡中可以安装多个电子 支付应用。为了实现电子支付应用的安全,智能卡采用 Global Platform Card Specification V2.1/V2.2规范, 智能卡被分隔为若干个独立的安全域, 以保 证多个电子支付应用相互之间的隔离以及独立性。
主安全域(ISD, Issuer Security Domain ), 又称为发行者安全域, 是卡 片发行商主要的、 强制的卡上代表, 它包含用于支持安全通道协议运作以 及卡内容管理的安全域密钥。
从安全域(SSD, Supplementary Security Domain )是应用提供商或者 卡片发行商或者他们的代理附加的、 可选的卡上代表, 存放应用提供商自 主管理的电子支付应用以及应用提供商委托卡片发行商管理的电子支付应 用, 该安全域的控制方可以对存放的电子支付应用进行操作和维护, 如下 载新的电子支付应用、 电子支付应用升级和删除。
现有技术中, 对于电子支付应用下载没有提出具体的方案, 因此, 急 需一种能够方便快速的进行应用下载的技术方案。 发明内容
有鉴于此, 本发明的主要目的在于提供一种应用下载的系统和方法, 方便快速的进行应用下载。
为了解决上述技术问题, 本发明提供了一种应用下载的方法, 包括: 卡外实体管理平台通过空中下载 (OTA )服务器及移动终端与智能卡建立 连接;
在收到智能卡的应用下载请求后, 选择智能卡上负责应用下载的安全 域, 与智能卡之间建立安全通道;
基于所述安全通道, 将应用下载到智能卡中。
所述卡外实体管理平台为: 卡片发行商管理平台, 或者, 应用提供商 管理平台。 理平台包括卡片发行商管理平台和应用提供商管理平台, 所述方法包括: 卡片发行商管理平台通过 OTA服务器及移动终端与智能卡建立连接, 接收智能卡发送的应用下载请求;
应用提供商管理平台选择智能卡上负责应用下载的从安全域, 通过卡 片发行商管理平台、 OTA服务器及移动终端与智能卡之间建立安全通道, 基于所述安全通道将应用下载到智能卡中。
所述收到智能卡的应用下载请求之前, 还包括:
用户通过智能卡的用户识别应用开发工具(STK )菜单选择应用下载; 或者, 基于智能卡网络服务器, 用户通过网页浏览的方式选择应用下 载, 发起智能卡与移动终端、 OTA服务器和卡外实体管理平台之间的连接, 在建立连接后, 智能卡发起应用下载请求。
所述卡外实体管理平台与智能卡之间建立安全通道, 具体为: 卡外实 体管理平台按照预定安全信道协议和智能卡进行身份认证, 建立安全通道; 所述预定安全信道协议基于对称密钥或非对称密钥机制。
所述卡片发行商管理平台或应用提供商管理平台通过 OTA服务器及移 动终端与智能卡建立连接, 具体包括: 接方式和预定协议建立连接;
OTA服务器与移动终端中的智能卡通过移动数据业务通道或短消息通 道建立连接。 命令或响应作为数据体附加在移动数据业务通道数据中, 或者附加在短消 息的数据信息中。
在所述应用下载过程中,
通过如下方式发送预定命令给智能卡: 装, 通过 OTA服务器发送到移动终端中的智能卡; 智能卡使用承载无关协 议(BIP )命令接收封装后的所述预定命令, 进行解析, 根据该预定命令执 行相应操作;
OTA服务器的下行短消息发送到智能卡, 智能卡从下行短消息中接收到预 定命令, 根据该预定命令执行相应操作。
所述根据该预定命令执行相应操作之后, 进一步包括: 智能卡通过如 下方式发送预定命令的响应^
台 . 智能卡执行完相应操作后, 根据 BIP命令的数据格式对预定命令的响 应命令进行封装, 并发送到移动终端; 移动终端通过 OTA服务器将预定命 或者, 智能卡执行完相应操作后, 以上行短消息的形式将预定命令的 响应发送给移动终端, 移动终端通过 OTA服务器将预定命令的响应发送给 卡片发行商管理平台或应用提供商管理平台。
所述预定命令为应用下载命令时, 所述智能卡接收到所述预定命令后, 执行应用下载。 应用提供商管理平台向卡片发行商管理平台发送令牌申请, 接收卡片 发行商管理平台发送的令牌密钥;
所述应用提供商管理平台向智能卡发送预定命令, 具体包括: 所述应 用提供商管理平台生成包含装载令牌的预定命令, 通过 OTA服务器发送到 移动终端中的智能卡。
所述通过 OTA服务器及移动终端与智能卡建立连接, 具体包括: 智能 卡与移动终端建立 BIP连接, 移动终端与 OTA服务器之间通过预定协议建 立连接;
所述移动终端在智能卡与 OTA服务器之间透明传输数据, 所述卡片发 行商管理平台或应用提供商管理平台和智能卡之间交互的命令或响应作为 数据体附加在 BIP支持的主动命令的通道数据中。 命令或响应作为数据体附加在 BIP支持的主动命令的通道数据中具体包括: 数据格式进行封装, 并通过 OTA服务器发送给移动终端, 智能卡在收到移 动终端发来的数据可用(Data available )事件后, 使用接收数据( RECEIVE DATA )命令去接收数据, 并对数据进行解析, 得到命令, 根据命令执行相 应操作;
在操作完成后, 智能卡将对命令的响应按发送数据 ( SEND DATA )命 令的通道数据的形式进行封装, 发送到移动终端, 再通过 OTA服务器发送 所述选择智能卡上负责应用下载的安全域具体包括:
所述应用为卡片发行商自有应用时, 卡片发行商管理平台选择智能卡 上的主安全域, 或者, 所述卡片发行商管理平台为该应用创建从安全域, 选择该从安全域;
所述应用为应用提供商自主控制的应用或卡片发行商托管的应用提供 商的应用时, 如果没有为所述应用创建从安全域, 卡片发行商管理平台选 择主安全域, 建立与智能卡之间的安全通道, 创建从安全域, 生成从安全 域初始密钥, 并将该从安全域初始密钥发送给应用提供商管理平台; 应用 提供商管理平台选择负责应用下载的从安全域, 基于安全通道更新从安全 域密钥; 如果已经为所述应用创建从安全域, 所述应用提供商管理平台选 择负责应用下载的从安全域, 基于安全通道更新从安全域密钥。
本发明还提供了一种应用下载系统, 包括智能卡、 移动终端、 OTA服 务器和卡外实体管理平台, 其中:
卡外实体管理平台, 用于通过 OTA服务器及移动终端和智能卡建立连 接, 接收智能卡发来的应用下载请求, 选择智能卡上负责应用下载的安全 域, 在与智能卡建立安全通道后, 基于所述安全通道, 将应用下载到智能 卡中;
OTA服务器, 用于与卡外实体管理平台建立安全连接、 与移动终端进 行连接, 并为移动终端中的智能卡提供下载服务;
智能卡, 位于所述移动终端中, 用于通过移动终端及 OTA服务器和卡 外实体管理平台建立安全通道, 并通过安全通道完成应用下载操作。
所述卡外实体管理平台为: 卡片发行商管理平台, 或者, 应用提供商 管理平台。 发行商管理平台, 其中,
所述应用提供商管理平台包括:
申请模块, 用于在没有为所述应用创建从安全域时, 向卡片发行商管 理平台发送从安全域创建请求;
接收模块, 用于接收卡片发行商管理平台发送的从安全域初始密钥; 更新模块, 用于通过安全通道更新从安全域密钥;
所述卡片发行商管理平台包括: 创建及发送模块, 用于接收应用提供 商管理平台的从安全域创建请求, 创建从安全域, 生成并发送从安全域初 始密钥给应用提供商管理平台。 台, 其中,
所述卡片发行商管理平台, 用于通过 OTA服务器、 移动终端和智能卡 建立连接, 接收智能卡发来的应用下载请求;
所述应用提供商管理平台, 用于选择智能卡上负责应用下载的安全域, 在与智能卡建立安全通道后, 基于所述安全通道, 将应用下载到智能卡中。
所述卡片发行商管理平台包括: 创建和发送模块, 用于在没有为所述 应用创建从安全域时, 创建从安全域, 生成从安全域初始密钥, 并将该从 安全域初始密钥发送给应用提供商管理平台;
所述应用提供商管理平台包括:
接收模块, 用于接收从安全域初始密钥;
更新模块, 用于通过安全通道更新从安全域密钥。 所述智能卡还包含 STK菜单模块, 用于为用户提供应用下载菜单, 选 择应用下载;
或者, 所述系统还包含智能卡网络服务器, 用于为用户提供应用下载 选项网页, 选择应用下载。
所述应用提供商管理平台或卡片发行商管理平台还包括认证和建立模 块, 用于按照预定安全信道协议和智能卡进行身份认证, 建立安全通道, 所述预定安全信道协议基于对称密钥或非对称密钥机制。 接方式和预定协议建立连接;
OTA服务器和移动终端中的智能卡通过移动数据业务通道或短消息通 道建立连接。
所述卡片发行商管理平台或者应用提供商管理平台进一步包括: 封装模块, 用于生成预定命令, 将预定命令作为数据体附加移动业务 数据通道数据中, 或者, 将预定命令附加在 OTA服务器的下行短消息中; 发送模块, 用于通过 OTA服务器和移动终端将封装后的预定命令发送 到智能卡;
所述智能卡进一步包括:
接收和解析模块, 用于使用 BIP命令接收封装后的所述预定命令, 解 析得到预定命令, 或者从下行短消息中接收到预定命令;
执行模块, 用于根据该预定命令执行相应操作;
响应模块,用于在执行模块根据预定命令执行完相应操作后,根据 BIP 者, 以上行短消息的形式将预定命令的响应发送给移动终端, 由移动终端 所述应用提供商管理平台还包括: 令牌申请模块, 用于向卡片发行商 管理平台发送令牌申请, 接收卡片发行商管理平台发送的令牌密钥;
所述卡片发行商管理平台还包括: 令牌发送模块, 用于在收到应用提 供商管理平台的令牌申请后, 发送令牌密钥给应用提供商管理平台;
所述封装模块, 用于生成包含装载令牌的预定命令。
智能卡与移动终端具体用于建立 BIP连接, 移动终端和 OTA服务器具 体用于通过预定协议建立连接, 移动终端用于在智能卡与 OTA服务器之间 透明传输数据。
所述卡片发行商管理平台或者应用提供商管理平台进一步包括: 封装模块, 用于将命令作为数据按照预定数据格式进行封装, 将预定 命令作为数据体附加移动业务数据通道数据中; 智能卡进一步包括:
接收和解析模块, 用于在收到移动终端发来的数据可用事件后, 使用 接收数据命令去接收数据, 并对数据进行解析, 得到预定命令;
执行模块, 用于根据预定命令执行相应操作;
响应模块, 用于在操作完成后, 将对预定命令的响应按发送数据命令 的通道数据的形式进行封装, 发送到移动终端, 再通过 OTA服务器发送到 卡片发行商管理平台或应用提供商管理平台。
本发明的有益效果在于: 通过本发明提出的应用下载的系统和方法, 能够通过移动通信网络高速、 实时、 方便、 安全地将应用下载到智能卡中, 提高了用户体验。 附图说明
图 1为本发明中应用下载系统的结构示意图;
图 2为本发明中应用下载系统的另一结构示意图; 图 3为本发明中应用下载的流程示意图; 详细信令流程示意图; 用下载和安装的详细信令流程示意图;
图 6为根据本发明优选实施例的应用提供商自主控制应用下载和安装 的详细信令流程示意图。 具体实施方式 下面将参考附图并结合实施例, 来详细说明本发明。 以下所说明的附 图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发明的示意 性实施例及其说明只是用于解释本发明, 并不构成对本发明的不当限定。 系统实施例
根据本发明的实施例, 提供了一种应用下载的系统。 图 1 为本发明中 应用下载系统的结构示意图, 如图 1所示, 包括卡片发行商管理平台 10、 应用提供商管理平台 12、 空中下载(OTA, Over The Air )服务器 14、 OTA 服务器 16、 包含智能卡的移动终端 18 以及移动通信网络 20。 应用下载系 统中可存在多个应用提供商管理平台。 下面对上述应用下载系统进行详细 的说明。
卡片发行商管理平台 10主要负责智能卡的发行和管理, 对智能卡的资 源和生命周期、 密钥、 证书及应用等进行管理。 卡片发行商管理平台 10, 用于与移动终端 18中的智能卡建立连接, 并选择安全域, 在与智能卡建立 安全通道后, 通过安全通道将应用下载到智能卡中; 进一步, 还可以用于 创建从安全域及生成从安全域初始密钥; 进一步, 还可以用于接收到应用 提供商管理平台 12的令牌申请后, 将令牌密钥、 如发行商令牌密钥发送给 应用提供商管理平台 12。 应用提供商管理平台 12, 用于与移动终端 18中的智能卡建立连接, 并 向卡片发行商管理平台 10发送从安全域创建请求, 在从卡片发行商管理平 台 10获得从安全域初始密钥后, 选择从安全域, 与移动终端 18中的智能 卡建立安全通道后, 更新从安全域密钥, 并通过安全通道将应用下载到智 能卡。 对于应用由卡片发行商管理平台 10托管的情况, 应用提供商管理平 台 12用于向卡片发行商管理平台 10申请用于应用下载的令牌, 生成包含 装载令牌(Load Token )的预定命令,通过卡片发行商管理平台 10及其 OTA 服务器 14与移动终端 18中的智能卡建立安全通道, 将应用下载到智能卡 中。
卡片发行商管理平台 10和 /或应用提供商管理平台 12称为卡外实体管 理平台。
OTA服务器 14, 用于与卡片发行商管理平台 10建立安全连接、 与移 动终端 18进行连接, 并为移动终端 18中的智能卡提供下载服务。
OTA服务器 16, 用于与应用提供商管理平台 12建立安全连接、 与移 动终端 18进行连接, 并为移动终端 18中的智能卡提供下载服务。
其中, OTA服务器 14和 OTA服务器 16可以合并为一个 OTA服务器 22, 如图 2所示, OTA服务器 22用于与卡片发行商管理平台 10和 /或应用 提供商管理平台 12建立安全连接, 与移动终端 18进行连接, 并为移动终 端 18中的智能卡提供下载服务。
移动终端 18, 参与建立智能卡与 OTA服务器 14/16之间的连接, 并负 责在 OTA服务器 14/16与智能卡之间透明传输数据。
智能卡, 位于移动终端 18中, 如安装在移动终端上, 用于通过移动终 端 18与 OTA服务器 14/16、 进而与卡片发行商管理平台 10或应用提供商 管理平台 12进行身份认证, 建立安全通道, 并通过安全通道完成应用下载 操作。 在本发明中 , 移动终端与智能卡之间数据传输的物理接口可以是传统 的 7816接口; 如果移动终端和智能卡都支持 USB接口, 为了获得更高的 传输速率, 也可采用 USB接口。 在本发明中, 移动终端与智能卡之间的交 互增力口了对 7 载无关十办议 ( BIP, Bearer Independent Protocol )命令的支持, 在数据传输方面采用速率更高、更安全的通用无线分组服务( GPRS , General Packet Radio Service ) 或通用移动通信系统 (UMTS , Universal Mobile Telecommunications System )等移动高速数据业务通道。 并且, 在实际应用 中, 在移动终端 18与 OTA服务器 14/16之间可以使用不同的协议,承载无 关协议的使用对 OTA服务器 14/16透明。
移动通信网络 20, 用于提供空中数据通道, 确保移动终端 18与 OTA 服务器 14/16之间的通信。
OTA服务器 14/16与包含智能卡的移动终端 18之间的数据传输可基于 两种方式, 一种是通过移动通信网络 20的 GPRS网关或 UMTS等其他 3G 网关(即, 通过移动数据业务通道), 基于 BIP实现, 这种方式可保证数据 的高速传输以及数据传输的可靠性和完整性; 另一种方式是通过移动通信 网络 20的短消息网关, OTA服务器 14/16与智能卡之间的数据通信采用短 消息的方式进行应用下载, 在移动终端不支持移动数据业务或移动终端或 智能卡不支持 BIP的情况下, 可以采用短消息通道实现应用下载。
卡片发行商管理平台进一步包括:
创建及发送模块, 用于接收应用提供商管理平台的从安全域创建请求 或在没有为所述应用创建从安全域时, 创建从安全域, 生成并发送从安全 域初始密钥给应用提供商管理平台。
应用提供商管理平台进一步包括:
申请模块, 用于在没有为所述应用创建从安全域时, 向卡片发行商管 理平台发送从安全域创建请求; 接收模块, 用于接收卡片发行商管理平台发送的从安全域初始密钥; 更新模块, 用于通过安全通道更新从安全域密钥。
所述智能卡还包含用户识别应用发展工具(STK, SIM TOOL KIT )菜 单模块, 用于为用户提供应用下载菜单, 选择应用下载; 或者, 所述应用 下载系统还包含智能卡网络服务器(SCWS, Smart Card Web Server ), 用于 为用户提供应用下载选项网页, 选择应用下载。
所述应用提供商管理平台或卡片发行商管理平台还包括认证和建立模 块, 用于按照预定安全信道协议和智能卡进行身份认证, 建立安全通道, 所述预定安全信道协议基于对称密钥或非对称密钥机制。
所述卡片发行商管理平台或者应用提供商管理平台进一步包括: 封装模块, 用于生成预定命令, 将预定命令作为数据体附加移动业务 数据通道数据中, 或者, 将预定命令附加在 OTA服务器的下行短消息中; 发送模块, 用于通过 OTA服务器和移动终端将封装后的预定命令发送 到智能卡;
所述智能卡进一步包括:
接收和解析模块, 用于使用 BIP命令接收封装后的所述预定命令, 解 析得到预定命令, 或者从下行短消息中接收到预定命令;
执行模块, 用于根据该预定命令执行相应操作;
响应模块,用于在执行模块根据预定命令执行完相应操作后,根据 BIP 者, 以上行短消息的形式将预定命令的响应发送给移动终端, 由移动终端
Figure imgf000014_0001
所述应用提供商管理平台还包含令牌申请模块, 用于向卡片发行商管 理平台发送令牌申请, 接收卡片发行商管理平台发送的令牌密钥; 所述卡片发行商管理平台还包括令牌发送模块, 用于在收到应用提供 商管理平台的令牌申请后, 发送令牌密钥给应用提供商管理平台;
应用提供商管理平台的所述封装模块, 用于生成包含装载令牌密钥的 预定命令。
优选地, 智能卡与移动终端建立 BIP连接, 移动终端与 OTA服务器之 间通过预定协议建立连接, 移动终端用于在智能卡与 OTA服务器之间透明 传输数据。 此时所述卡片发行商管理平台或者应用提供商管理平台包括: 封装模块, 用于将预定命令作为数据按照预定数据格式进行封装, 将 预定命令作为数据体附加移动业务数据通道数据中; 智能卡包括:
接收和解析模块,用于在收到移动终端发来的数据可用( Data available ) 事件后, 使用接收数据 ( RECEIVE DATA )命令去接收数据, 并对数据进 行解析, 得到预定命令;
执行模块, 用于根据预定命令执行相应操作;
响应模块, 用于在执行模块操作完成后, 将对预定命令的响应按发送 数据 ( SEND DATA )命令的通道数据的形式进行封装, 发送到移动终端, 再通过 OTA服务器发送到卡片发行商管理平台或应用提供商管理平台。
通过上述应用下载系统, 能方便地通过移动通信网络实现应用的下载 和安装。
方法实施例
根据本发明的实施例, 还提供了一种应用下载的方法, 用于将应用下 载到智能卡中。 图 3为本发明中应用下载的流程示意图, 如图 3所示, 包 括以下处理: 络与智能卡建立连接, 在收到智能卡的应用下载请求后, 选择智能卡上负 责应用下载的安全域, 并与智能卡之间建立安全通道。 通信网络与智能卡建立连接是指: 卡片发行商管理平台或应用提供商管理 平台通过 OTA服务器与移动终端和智能卡建立连接, 具体的处理包括:
1.卡片发行商管理平台或应用提供商管理平台与 OTA服务器之间通过 预定连接方式(专线或网络)和预定协议建立安全连接;
2.智能卡通过短消息通道或 GPRS/UMTS等数据通道建立与 OTA服务 器之间的连接。
当智能卡与 OTA服务器通过 GPRS/UMTS等数据通道建立连接时, 优 选地, 智能卡与移动终端建立 BIP连接, 移动终端与 OTA服务器之间通过 某种预定协议、 如 TCP/IP协议建立连接; 移动终端在智能卡与 OTA服务 器之间负责透明传输数据。 可通过双方预定连接方式(专线或网络)和预定协议建立安全连接。
BIP是在第三代移动通讯伙伴计划 (3GPP, 3rd Generation Partnership Project )规范中提出的一种面向连接的传输协议,可支持的高速数据业务通 道包括: GPRS、增强型数据速率 GSM演进技术( EDGE, Enhanced Data Rate for GSM Evolution ) 以及 UMTS等; 支持五个主动命令及两种事件, 其中 五个主动命令具体为: OPEN CHANNEL (打开信道 )、 CLOSE CHANNEL
(关闭信道)、 RECEIVE DATA (接收数据)、 SEND DATA (发送数据)、 GET CHANNEL STATUS (获取信道状态)),两种事件具体为: Data available
(数据可用 )和 Channel status (信道状态), 使智能卡能利用移动终端的承 载能力建立与远端 OTA服务器之间的面向连接的数据通道。
具体地, 智能卡可通过 BIP的 OPEN CHANNEL命令指示移动终端通 过移动数据业务通道连接到 OTA服务器, 在 OPEN CHANNEL命令中, 智 能卡指定 BIP连接参数, 这些参数包括支持的传输协议类型 (如传输控制 协议(TCP )等)、 数据緩沖区大小、 OTA服务器的网络地址, 信道号等, 从而建立智能卡与 OTA服务器之间的连接。 通信网络与智能卡建立连接之前, 上述方法进一步包括: 用户通过智能卡 的 STK菜单选择应用下载菜单项, 或者, 基于 SCWS、 用户通过网页浏览 的方式选择应用下载, 发起智能卡与 OTA服务器及卡片发行商管理平台或 应用提供商管理平台之间的连接。
在步骤 301 中, 智能卡通过移动通信网络与卡片发行商管理平台或应 用提供商管理平台建立连接之后, 发起应用下载请求。
在步骤 301 中, 卡片发行商管理平台或应用提供商管理平台接收到应 用下载请求后, 上述方法进一步包括: 卡片发行商管理平台或应用提供商 管理平台判断是否允许该智能卡进行下载; 在判断为是的情况下, 卡片发 行商管理平台或应用提供商管理平台通过已建立起来的连接链路选择智能 卡上负责下载应用的安全域。 对于卡片发行商自有应用的下载, 卡片发行 商可选择主安全域, 也可为对应的应用下载建立从安全域, 由卡片发行商 自行决定。 对于应用提供商的应用下载, 不管是由卡片发行商托管的, 还 是由应用提供商自主控制的, 如果没有为应用创建从安全域, 则卡片发行 商管理平台需要首先选择主安全域, 建立与智能卡之间的安全通道, 创建 从安全域, 生成从安全域初始密钥, 并将该密钥发送给应用提供商管理平 台, 应用提供商管理平台选择对应的从安全域, 建立与智能卡之间的安全 通道, 并更新从安全域密钥; 如果已经为应用创建了从安全域, 则应用提 供商管理平台选择对应的从安全域, 与智能卡之间进行身份认证, 建立安 全通道, 并更新从安全域密钥; 对于由卡片发行商托管的应用, 对应的从 安全域需要具有委托管理优先权 ( Delegated Management Privilege )。
在步骤 301 中, 卡片发行商管理平台或应用提供商管理平台与
Figure imgf000018_0001
之间建立安全通道的具体处理为: 卡片发行商管理平台或应用提供商管理 平台按照预定安全通道协议与智能卡进行身份认证, 建立安全通道。 该预 定安全通道协议可基于对称密钥或非对称密钥机制。 台建立连接之后, 上述方法进一步包括: 安全域选择以及身份认证和安全 通道建立过程中的一系列命令和响应作为数据体附加在 BIP支持的主动命 令的通道数据中, 或者附加在上下行短消息的数据信息中, 在智能卡和卡 步骤 302:
应用下载到智能卡中。
在步骤 302 中, 优选地, 卡片发行商管理平台或应用提供商管理平台 将应用下载到智能卡中的具体处理可以为: 预定数据格式进行封装, 并通过 OTA服务器发送到智能卡;
智能卡使用 BIP命令接收封装后的预定命令, 对其中的数据进行解析, 根据得到的命令执行应用下载操作; 智能卡根据 BIP命令的数据格式对预 定命令的响应命令进行封装, 并发送到移动终端; 移动终端通过 OTA服务 器将响应命令发送到卡片发行商管理平台或应用提供商管理平台, 反馈下 载结果。
在步骤 302 中, 优选地, 卡片发行商管理平台或应用提供商管理平台 将应用下载到智能卡中的具体处理也可以为: 器的下行短消息发送到智能卡; 智能卡从下行短消息中接收到预定命令, 根据得到的预定命令执行应 用下载操作; 智能卡以上行短消息的形式, 将预定命令的响应命令发送到 移动终端; 移动终端通过 OTA服务器将响应命令发送到卡片发行商管理平 台或应用提供商管理平台, 反馈下载结果。 发送的预定命令(如应用下载命令一INSTALL[for load] ), 它的具体处理包 括: 对于卡片发行商自有的应用下载, 由卡片发行商管理平台生成预定命 令, 并通过上述经移动通信网络建立的连接和安全通道发送到智能卡; 对 于应用提供商自主控制的应用的下载, 由应用提供商管理平台生成预定命 令, 并通过上述经移动通信网络建立的连接和安全通道发送到智能卡; 对 于由卡片发行商托管的应用提供商的应用下载, 需要应用提供商管理平台 先向卡片发行商管理平台申请用于应用下载的令牌, 卡片发行商管理平台 收到令牌申请后, 将令牌密钥、 如发行商令牌密钥发送给应用提供商管理 平台, 然后,应用提供商管理平台再生成包含 Load Token的应用下载命令, 并通过上述经移动通信网络建立的连接和安全通道发送到智能卡。
令牌(Token )特定地与托管应用相关, 它由卡片发行商生成, 是卡片 发行商授权对卡内容进行管理的一种证据。 对于由卡片发行商托管的应用 提供商的应用下载, 只有应用提供商得到卡片发行商的授权, 如得到卡片 发行商提供的令牌密钥, 才能将新的应用下载到智能卡上。
在步骤 302 中, 应用下载到智能卡上后, 卡片发行商管理平台或应用 提供商管理平台可基于已经建立起的安全通道, 发送应用安装命令 ( INSTALL[for install] )给智能卡,使智能卡进行应用的安装。对于 Java Card 应用, 该应用安装命令将调用智能卡上应用程序 register()将支付应用实例 注册到 Java Card运行环境 ( JCRE, Java Card Runtime Environment ) 中 , 并为支付应用分配对应的应用实例应用标识( AID, Application IDentifer )。 在智能卡上成功执行了 register()后, 应用安装成功。 安装成功后, 智能卡 果。
上述所述应用下载过程中的命令和响应作为数据体附加在 BIP支持的 主动命令的通道数据中的具体处理方法包括: 卡片发行商管理平台或应用 提供商管理平台将命令作为数据按照预定数据格式进行封装, 并通过 OTA 服务器发送给移动终端, 智能卡在收到移动终端发来的 Data available事件 后, 使用 BIP命令一 RECEIVE DATA去接收数据, 并对数据进行解析, 得 到命令, 根据命令执行相应操作, 在操作完成后, 再将对命令的响应按 BIP 命令一 SEND DATA的通道数据的形式进行封装, 发送到移动终端, 再通过 OTA服务器发送到卡片发行商管理平台或应用提供商管理平台。 应用下载 过程中涉及的命令包括上述安全域选择命令(SELECT ), 身份认证和安全 通道建立的一系列命令以及应用下载和安装命令 ( INSTALL )。
下面结合具体实例, 对本发明的上述技术方案进行详细说明, 图 4为 程示意图, 如图 4所示, 包括以下处理:
步骤 401 : 用户通过智能卡的 STK菜单选择应用下载菜单项, 或者, 基于 SCWS、 用户通过网页浏览的方式选择应用下载, 发起智能卡与 OTA 服务器及卡片发行商管理平台之间的连接, 智能卡通过发送 BIP命令一 OPEN CHANNEL给移动终端, 建立 BIP连接。
在 OPEN CHANNEL命令中, 智能卡指定 BIP连接参数, 这些参数包 括支持的传输协议类型 (例如 TCP等)、 数据緩沖区大小、 OTA服务器的 网络地址, 信道号等。
步骤 402:移动终端与智能卡建立 BIP连接,并且按照 OPEN CHANNEL 命令中的 OTA服务器的网络地址和传输协议类型建立与 OTA服务器之间 的 TCP/IP连接。
步骤 403: TCP/IP连接建立后, 智能卡发起应用下载请求给卡片发行 商管理平台。
步骤 404: 卡片发行商管理平台收到应用下载请求后, 判定允许该智能 卡进行应用下载后, 选择智能卡主安全域, 包含:
a )卡片发行商管理平台按照 Global Platform规范中的命令格式规定封 装 SELECT命令, 在 SELECT命令中填充主安全域的 AID, 然后将封装的 SELECT命令作为数据发送给 OTA服务器;
b )移动终端通过 TCP/IP连接从 OTA服务器接收数据, 并用 "Data available事件" 通知智能卡(通过 ENVELOPE Data available命令 )来取数 据, 当智能卡从移动终端拖拽数据时发送 BIP命令一 RECEIVE DATA; c )智能卡对数据进行解析, 按照 SELECT命令选择主安全域。 执行命 令后, 智能卡通过 BIP命令一SEND DATA发送 SELECT响应数据, 移动 终端将该数据通过前面建立的 TCP/IP连接发送给 OTA服务器。
步骤 405: 卡片发行商管理平台接收到 SELECT响应后, 按照 Global Platform V2.2 中的规定建立与智能卡之间的安全通道。 建立安全通道所用 的命令的传递方式同前述的 SELECT命令。
步骤 406: 安全通道建立完成后, 卡片发行商管理平台将应用下载命令 INSTALL[for load]发送给智能卡, 根据应用文件大小, 可能包含多条 INSTALL[for load]命令;智能卡完成下载后反馈下载结果给卡片发行商管理 平台; INSTALL[for load]命令的传递方式同前述的 SELECT命令。
步骤 407: 卡片发行商管理平台将应用安装命令 INSTALL[for install] 发送给智能卡; 智能卡完成安装后反馈安装结果给卡片发行商管理平台; INSTALL[for install]命令的传递方式同前述的 SELECT命令。
步骤 408: 智能卡在应用安装完成后, 可以发送 BIP命令一CLOSE CHANNEL关闭智能卡与移动终端间的 BIP连接; 如有后续的基于移动通 信网络的操作, 可以不关闭 BIP连接, 继续进行其他应用下载。
步骤 409: 移动终端和 OTA服务器断开之间的 TCP/IP连接。 用下载和安装的详细信令流程示意图, 如图 5所示, 包括以下处理:
步骤 501 : 用户通过智能卡的 STK菜单选择应用下载菜单项, 或者, 基于 SCWS、 用户通过网页浏览的方式选择应用下载, 发起智能卡与 OTA 服务器及卡片发行商管理平台之间的连接, 智能卡通过发送 BIP命令一 OPEN CHANNEL给移动终端, 建立 BIP连接。 在 OPEN CHANNEL命令 中, 智能卡指定 BIP连接参数, 这些参数包括支持的传输协议类型 (例如 TCP等)、 数据緩沖区大小、 OTA服务器的网络地址, 信道号等;
步骤 502:移动终端与智能卡建立 BIP连接,并且按照 OPEN CHANNEL 命令中的 OTA服务器的网络地址和传输协议类型建立与 OTA服务器之间 的 TCP/IP连接。
步骤 503: TCP/IP连接建立后, 智能卡发起应用下载请求给卡片发行 商管理平台。
步骤 504: 卡片发行商管理平台收到应用下载请求后, 判定允许该智能 卡进行应用下载后, 继续判断是否已经为应用创建了从安全域, 如果是, 卡片发行商管理平台将用户要下载的应用告知应用提供商管理平台, 然后 执行步骤 507, 否则, 选择智能卡主安全域; 选择安全域的方法类似图 4步 骤 404中的 SELECT命令及响应的处理。
步骤 505: 卡片发行商管理平台接收到 SELECT响应后, 按照 Global Platform V2.2中的规定建立与智能卡之间的安全通道, 然后创建从安全域, 生成从安全域初始密钥。上述过程所用的命令的传递方式类似图 4步骤 404 中的 SELECT命令及响应的处理。 步骤 506:卡片发行商管理平台将从安全域初始密钥发送给应用提供商 管理平台。 务器、 移动终端, 选择智能卡的从安全域、 与智能卡之间建立安全通道, 然后更新从安全域密钥。 应用提供商管理平台与卡片发行商管理平台之间 通过预定协议进行通信。 卡片发行商管理平台与智能卡之间的通信方法类 似图 4步骤 404中的 SELECT命令及响应的处理。
( Token ), 以用于应用下载和安装。
步骤 509:卡片发行商管理平台将发行商 Token密钥发送给应用提供商 管理平台。
步骤 510:应用提供商管理平台根据发行商 Token密钥等信息生成包含 Load Token (装载令牌) 的应用下载命令 INSTALL[for load] , 发送到智能 卡, 根据应用文件大小, 可能包含多条 INSTALL[for load]命令; 智能卡完 成下载后反馈下载结果给应用提供商管理平台。 INSTALL[for load]命令及其 响应的传递方式类似图 4步骤 404中的 SELECT命令及响应的处理。
步骤 511:应用提供商管理平台根据发行商 Token密钥等信息生成包含 Load Token的应用安装命令 INSTALL[for install] ,发送到智能卡。智能卡完 成安装后反馈安装结果给应用提供商管理平台。 INSTALL[for install]命令及 其响应的传递方式类似图 4步骤 404中的 SELECT命令及响应的处理。 果, 包括应用状态、 资源占用情况、 版本情况等。
步骤 513: 智能卡在应用安装完成后, 可以发送 BIP 命令一CLOSE CHANNEL关闭智能卡和移动终端间的 BIP连接; 如有后续的基于移动通 信网络的操作, 可以不关闭 BIP连接, 继续进行其他应用下载。 步骤 514: 移动终端和 OTA服务器断开之间的 TCP/IP连接。
其中, 步骤 512与步骤 513不存在先后顺序关系。
图 6 为根据本发明优选实施例的应用提供商自主控制的应用下载和安 装的详细信令流程示意图, 如图 6所示, 包括以下处理:
步骤 601 : 用户通过智能卡的 STK菜单选择应用下载菜单项, 或者, 基于 SCWS、 用户通过网页浏览的方式选择应用下载, 发起智能卡与 OTA 服务器及应用提供商管理平台之间的连接, 智能卡通过发送 BIP命令一 OPEN CHANNEL给移动终端, 建立 BIP连接。 在 OPEN CHANNEL命令 中, 智能卡指定 BIP连接参数, 这些参数包括支持的传输协议类型 (例如 TCP等)、 数据緩沖区大小、 OTA服务器的网络地址, 信道号等;
步骤 602:移动终端与智能卡建立 BIP连接,并且按照 OPEN CHANNEL 命令中的 OTA服务器的网络地址和传输协议类型建立与 OTA服务器之间 的 TCP/IP连接。
步骤 603: TCP/IP连接建立后, 智能卡向应用提供商管理平台发起应 用下载请求。
步骤 604: 如果没有为该应用创建从安全域,应用提供商管理平台向卡 片发行商管理平台发出从安全域创建申请; 如果已经为该应用创建了从安 全域, 直接执行步骤 607。
步骤 605: 卡片发行商管理平台按照 Global Platform V2.2中的规定建 立与智能卡之间的安全通道, 然后创建从安全域, 生成从安全域初始密钥; 上述过程所用的命令的传递方式类似图 4步骤 404中的 SELECT命令及响 应的处理。
步骤 606:卡片发行商管理平台将从安全域初始密钥发送给应用提供商 管理平台。
步骤 607: 应用提供商管理平台通过其 OTA服务器、 移动终端, 选择 智能卡的从安全域、 与智能卡之间建立安全通道, 然后更新从安全域密钥。 上述过程所用的命令的传递方式类似图 4步骤 404中的 SELECT命令及响 应的处理。
步骤 608: 应用提供商管理平台生成应用下载命令 INSTALL[for load] , 发送到智能卡, 根据应用文件大小, 可能包含多条 INSTALL[for load]命令; 智能卡完成下载后反馈下载结果给应用提供商管理平台。 INSTALL[for load] 命令及其响应的传递方式类似图 4步骤 404中的 SELECT命令及响应的处 理。 发送到智能卡。 智能卡完成安装后反馈安装结果给应用提供商管理平台。 INSTALL[for install]命令及其响应的传递方式类似图 4 步骤 404 中的 SELECT命令及响应的处理。
步骤 610: 智能卡在应用安装完成后, 可以发送 BIP命令一 CLOSE CHANNEL关闭智能卡和移动终端间的 BIP连接; 如有后续的基于移动通 信网络的操作, 可以不关闭 BIP连接, 继续进行其他应用下载。
步骤 611: 移动终端和 OTA服务器断开之间的 TCP/IP连接。 卡之间将命令或响应作为数据体附加在 BIP支持的主动命令的通道数据中; 如果移动终端不支持移动数据业务通道, 或者移动终端或智能卡不支持 BIP, 也可以将命令或响应附加在短消息中进行传输, 流程类似, 此处不再 赘述。
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于 本领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精 神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明 的保护范围之内。

Claims

权利要求书
1、 一种应用下载的方法, 其特征在于, 包括:
卡外实体管理平台通过空中下载 (OTA )服务器及移动终端与智能卡 建立连接;
在收到智能卡的应用下载请求后, 选择智能卡上负责应用下载的安全 域, 与智能卡之间建立安全通道;
基于所述安全通道, 将应用下载到智能卡中。
2、 根据权利要求 1所述的方法, 其特征在于, 所述卡外实体管理平台 为: 卡片发行商管理平台, 或者, 应用提供商管理平台。
3、 根据权利要求 1所述的方法, 其特征在于, 所述应用为卡片发行商 托管的应用提供商的应用时, 所述卡外实体管理平台包括卡片发行商管理 平台和应用提供商管理平台, 所述方法具体包括:
卡片发行商管理平台通过 OTA服务器及移动终端与智能卡建立连接, 接收智能卡发送的应用下载请求;
应用提供商管理平台选择智能卡上负责应用下载的从安全域, 通过卡 片发行商管理平台、 OTA服务器及移动终端与智能卡之间建立安全通道, 基于所述安全通道将应用下载到智能卡中。
4、 根据权利要求 1、 或 2、 或 3所述的方法, 其特征在于, 所述收到 智能卡的应用下载请求之前, 还包括:
用户通过智能卡的用户识别应用开发工具(STK )菜单选择应用下载; 或者, 基于智能卡网络服务器, 用户通过网页浏览的方式选择应用下 载, 发起智能卡与移动终端、 OTA服务器和卡外实体管理平台之间的连接, 在建立连接后, 智能卡发起应用下载请求。
5、 根据权利要求 1、 或 2、 或 3所述的方法, 其特征在于,
所述卡外实体管理平台与智能卡之间建立安全通道, 具体为: 卡外实 体管理平台按照预定安全信道协议和智能卡进行身份认证, 建立安全通道; 所述预定安全信道协议基于对称密钥或非对称密钥机制。
6、 根据权利要求 2或 3所述的方法, 其特征在于, 所述卡片发行商管 接, 具体包括: 接方式和预定协议建立连接;
OTA服务器与移动终端中的智能卡通过移动数据业务通道或短消息通 道建立连接。
7、 根据权利要求 6所述的方法, 其特征在于, 所述卡片发行商管理平 台或应用提供商管理平台与智能卡之间交互的命令或响应作为数据体附加 在移动数据业务通道数据中, 或者附加在短消息的数据信息中。
8、根据权利要求 7所述的方法, 其特征在于,在所述应用下载过程中, 智能卡: 装, 通过 OTA服务器发送到移动终端中的智能卡; 智能卡使用承载无关协 议(BIP )命令接收封装后的所述预定命令, 进行解析, 根据该预定命令执 行相应操作;
OTA服务器的下行短消息发送到智能卡, 智能卡从下行短消息中接收到预 定命令, 根据该预定命令执行相应操作。
9、 根据权利要求 8所述的方法, 其特征在于, 所述根据该预定命令执 行相应操作之后, 进一步包括: 智能卡通过如下方式发送预定命令的响应 智能卡执行完相应操作后, 根据 BIP命令的数据格式对预定命令的响 应命令进行封装, 并发送到移动终端; 移动终端通过 OTA服务器将预定命 或者, 智能卡执行完相应操作后, 以上行短消息的形式将预定命令的 响应发送给移动终端, 移动终端通过 OTA服务器将预定命令的响应发送给 卡片发行商管理平台或应用提供商管理平台。
10、 根据权利要求 8所述的方法, 其特征在于, 所述预定命令为应用 下载命令时, 所述智能卡接收到所述预定命令后, 执行应用下载。
11、 根据权利要求 8所述的方法, 其特征在于, 所述应用为卡片发行 商托管的应用提供商的应用时, 所述方法还包括:
应用提供商管理平台向卡片发行商管理平台发送令牌申请, 接收卡片 发行商管理平台发送的令牌密钥;
所述应用提供商管理平台向智能卡发送预定命令, 具体包括: 所述应 用提供商管理平台生成包含装载令牌的预定命令, 通过 OTA服务器发送到 移动终端中的智能卡。
12、 根据权利要求 6所述的方法, 其特征在于,
所述通过 OTA服务器及移动终端与智能卡建立连接, 具体包括: 智能 卡与移动终端建立 BIP连接, 移动终端与 OTA服务器之间通过预定协议建 立连接;
所述移动终端在智能卡与 OTA服务器之间透明传输数据, 所述卡片发 行商管理平台或应用提供商管理平台和智能卡之间交互的命令或响应作为 数据体附加在 BIP支持的主动命令的通道数据中。
13、 根据权利要求 12所述的方法, 其特征在于, 所述卡片发行商管理 平台或应用提供商管理平台和智能卡之间交互的命令或响应作为数据体附 加在 BIP支持的主动命令的通道数据中具体包括: 数据格式进行封装, 并通过 OTA服务器发送给移动终端, 智能卡在收到移 动终端发来的数据可用(Data available )事件后, 使用接收数据( RECEIVE DATA )命令去接收数据, 并对数据进行解析, 得到命令, 根据命令执行相 应操作;
在操作完成后, 智能卡将对命令的响应按发送数据 ( SEND DATA )命 令的通道数据的形式进行封装, 发送到移动终端, 再通过 OTA服务器发送
14、 根据权利要求 1或 2所述的方法, 其特征在于,
所述选择智能卡上负责应用下载的安全域具体包括:
所述应用为卡片发行商自有应用时, 卡片发行商管理平台选择智能卡 上的主安全域, 或者, 所述卡片发行商管理平台为该应用创建从安全域, 选择该从安全域;
所述应用为应用提供商自主控制的应用或卡片发行商托管的应用提供 商的应用时, 如果没有为所述应用创建从安全域, 卡片发行商管理平台选 择主安全域, 建立与智能卡之间的安全通道, 创建从安全域, 生成从安全 域初始密钥, 并将该从安全域初始密钥发送给应用提供商管理平台; 应用 提供商管理平台选择负责应用下载的从安全域, 基于安全通道更新从安全 域密钥; 如果已经为所述应用创建从安全域, 所述应用提供商管理平台选 择负责应用下载的从安全域, 基于安全通道更新从安全域密钥。
15、 一种应用下载系统, 其特征在于, 包括智能卡、 移动终端、 OTA 服务器和卡外实体管理平台, 其中:
卡外实体管理平台, 用于通过 OTA服务器及移动终端和智能卡建立连 接, 接收智能卡发来的应用下载请求, 选择智能卡上负责应用下载的安全 域, 在与智能卡建立安全通道后, 基于所述安全通道, 将应用下载到智能 卡中;
OTA服务器, 用于与卡外实体管理平台建立安全连接、 与移动终端进 行连接, 并为移动终端中的智能卡提供下载服务;
智能卡, 位于所述移动终端中, 用于通过移动终端及 OTA服务器和卡 外实体管理平台建立安全通道, 并通过安全通道完成应用下载操作。
16、 根据权利要求 15所述的系统, 其特征在于, 所述卡外实体管理平 台为: 卡片发行商管理平台, 或者, 应用提供商管理平台。
17、 根据权利要求 15所述的系统, 其特征在于, 所述卡外实体管理平 台为应用提供商管理平台, 所述系统还包括卡片发行商管理平台, 其中, 所述应用提供商管理平台包括:
申请模块, 用于在没有为所述应用创建从安全域时, 向卡片发行商管 理平台发送从安全域创建请求;
接收模块, 用于接收卡片发行商管理平台发送的从安全域初始密钥; 更新模块, 用于通过安全通道更新从安全域密钥;
所述卡片发行商管理平台包括: 创建及发送模块, 用于接收应用提供 商管理平台的从安全域创建请求, 创建从安全域, 生成并发送从安全域初 始密钥给应用提供商管理平台。
18、 根据权利要求 15所示的系统, 其特征在于, 所述卡外实体管理平 所述卡片发行商管理平台, 用于通过 OTA服务器、 移动终端和智能卡 建立连接, 接收智能卡发来的应用下载请求;
所述应用提供商管理平台, 用于选择智能卡上负责应用下载的安全域, 在与智能卡建立安全通道后, 基于所述安全通道, 将应用下载到智能卡中。
19、 根据权利要求 18所述的系统, 其特征在于,
所述卡片发行商管理平台包括: 创建和发送模块, 用于在没有为所述 应用创建从安全域时, 创建从安全域, 生成从安全域初始密钥, 并将该从 安全域初始密钥发送给应用提供商管理平台;
所述应用提供商管理平台包括:
接收模块, 用于接收从安全域初始密钥;
更新模块, 用于通过安全通道更新从安全域密钥。
20、 根据权利要求 15至 18任一所述的系统, 其特征在于,
所述智能卡还包含 STK菜单模块, 用于为用户提供应用下载菜单, 选 择应用下载;
或者, 所述系统还包含智能卡网络服务器, 用于为用户提供应用下载 选项网页, 选择应用下载。
21、 根据权利要求 16至 19任一所述的系统, 其特征在于, 所述应用 提供商管理平台或卡片发行商管理平台还包括认证和建立模块, 用于按照 预定安全信道协议和智能卡进行身份认证, 建立安全通道, 所述预定安全 信道协议基于对称密钥或非对称密钥机制。
22、 根据权利要求 16至 19任一所述的系统, 其特征在于, 接方式和预定协议建立连接;
OTA服务器和移动终端中的智能卡通过移动数据业务通道或短消息通 道建立连接。
23、 根据权利要求 22所述的系统, 其特征在于,
所述卡片发行商管理平台或者应用提供商管理平台进一步包括: 封装模块, 用于生成预定命令, 将预定命令作为数据体附加移动业务 数据通道数据中, 或者, 将预定命令附加在 OTA服务器的下行短消息中; 发送模块, 用于通过 OTA服务器和移动终端将封装后的预定命令发送 到智能卡; 所述智能卡进一步包括:
接收和解析模块, 用于使用 BIP命令接收封装后的所述预定命令, 解 析得到预定命令, 或者从下行短消息中接收到预定命令;
执行模块, 用于根据该预定命令执行相应操作;
响应模块,用于在执行模块根据预定命令执行完相应操作后,根据 BIP 者, 以上行短消息的形式将预定命令的响应发送给移动终端, 由移动终端 商管理平台。
24、 根据权利要求 23所述的系统, 其特征在于,
所述应用提供商管理平台还包括: 令牌申请模块, 用于向卡片发行商 管理平台发送令牌申请, 接收卡片发行商管理平台发送的令牌密钥;
所述卡片发行商管理平台还包括: 令牌发送模块, 用于在收到应用提 供商管理平台的令牌申请后, 发送令牌密钥给应用提供商管理平台;
所述封装模块, 用于生成包含装载令牌的预定命令。
25、 根据权利要求 22所述的系统, 其特征在于, 智能卡与移动终端具 体用于建立 BIP连接, 移动终端和 OTA服务器具体用于通过预定协议建立 连接, 移动终端用于在智能卡与 OTA服务器之间透明传输数据。
26、 根据权利要求 25所述的系统, 其特征在于, 所述卡片发行商管理 平台或者应用提供商管理平台进一步包括:
封装模块, 用于将命令作为数据按照预定数据格式进行封装, 将预定 命令作为数据体附加移动业务数据通道数据中; 智能卡进一步包括:
接收和解析模块, 用于在收到移动终端发来的数据可用事件后, 使用 接收数据命令去接收数据, 并对数据进行解析, 得到预定命令;
执行模块, 用于根据预定命令执行相应操作;
响应模块, 用于在操作完成后, 将对预定命令的响应按发送数据命令 的通道数据的形式进行封装, 发送到移动终端, 再通过 OTA服务器发送到 卡片发行商管理平台或应用提供商管理平台。
PCT/CN2009/075506 2009-02-27 2009-12-11 一种应用下载的系统和方法 WO2010096994A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/202,231 US9037857B2 (en) 2009-02-27 2009-12-11 System and method for downloading application
JP2011550402A JP5513527B2 (ja) 2009-02-27 2009-12-11 アプリケーションダウンロードシステム及びアプリケーションダウンロード方法
EP09840662.2A EP2388968B1 (en) 2009-02-27 2009-12-11 System and method for downloading application

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910118679.3A CN101820613B (zh) 2009-02-27 2009-02-27 一种应用下载的系统和方法
CN200910118679.3 2009-02-27

Publications (1)

Publication Number Publication Date
WO2010096994A1 true WO2010096994A1 (zh) 2010-09-02

Family

ID=42655506

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/075506 WO2010096994A1 (zh) 2009-02-27 2009-12-11 一种应用下载的系统和方法

Country Status (5)

Country Link
US (1) US9037857B2 (zh)
EP (1) EP2388968B1 (zh)
JP (1) JP5513527B2 (zh)
CN (1) CN101820613B (zh)
WO (1) WO2010096994A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2451135A1 (de) * 2010-11-05 2012-05-09 Deutsche Telekom AG Verfahren und System zur Provisionierung von Anwendungen auf SIM-Karten eines mobilen Endgerätes

Families Citing this family (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11195163B2 (en) 2006-09-01 2021-12-07 Mastercard International Incorporated Methods, systems and computer readable media for over the air (OTA) provisioning of soft cards on devices with wireless communications capabilities
US8620299B2 (en) * 2008-08-12 2013-12-31 Mastercard International Incorporated Methods, systems and computer readable media for electronically delivering a prepaid card to a mobile device
KR20110104480A (ko) 2008-10-06 2011-09-22 비보텍, 인코포레이티드 모바일 장치 사이에서 결제 및 비결제 가상 카드 전송을 위한 시스템, 방법, 및 컴퓨터 판독 가능 매체
EP2199993A1 (en) * 2008-12-17 2010-06-23 Gemalto SA Method and token for managing one processing relating to an application supported or to be supported by a token
US20100174598A1 (en) * 2008-12-31 2010-07-08 Mohammad Khan Methods, systems and computer readable media for redeeming and delivering electronic loyalty reward certificates using a mobile device
US10992817B2 (en) 2009-03-18 2021-04-27 Mastercard International Incorporated Methods, systems and computer readable media for selecting and delivering electronic value certificates using a mobile device
EP2273748A1 (en) * 2009-07-09 2011-01-12 Gemalto SA Method of managing an application embedded in a secured electronic token
US9497632B2 (en) * 2009-10-01 2016-11-15 T-Mobile Usa, Inc. System and method for pairing a UICC card with a particular mobile communications device
WO2012023213A1 (en) * 2010-08-16 2012-02-23 Telefonaktiebolaget L M Ericsson (Publ) Mediation server, control method therefor, communication device, control method therefor, communication system, and computer program
CN101957921A (zh) * 2010-09-21 2011-01-26 中兴通讯股份有限公司 射频识别应用信息的显示方法、装置和系统
EP2453377A1 (en) * 2010-11-15 2012-05-16 Gemalto SA Method of loading data into a portable secure token
CN102111749B (zh) * 2011-02-18 2014-05-07 宇龙计算机通信科技(深圳)有限公司 推送定制应用的方法以及服务器和移动终端
JP5472935B2 (ja) 2011-03-17 2014-04-16 株式会社東芝 携帯可能電子機器及びicカード
CN102236568A (zh) * 2011-07-13 2011-11-09 中国联合网络通信集团有限公司 Java卡应用下载的方法、装置和系统
CN102510391B (zh) * 2011-10-10 2014-07-09 中国联合网络通信集团有限公司 应用管理方法、装置及智能卡
CN102348195B (zh) * 2011-10-13 2018-09-07 中兴通讯股份有限公司 一种无线通信终端及其软件升级方法
US9767452B2 (en) 2011-11-03 2017-09-19 Mastercard International Incorporated Methods, systems, and computer readable media for provisioning and utilizing an aggregated soft card on a mobile device
US9185089B2 (en) * 2011-12-20 2015-11-10 Apple Inc. System and method for key management for issuer security domain using global platform specifications
KR101357949B1 (ko) * 2011-12-21 2014-02-03 에스케이씨앤씨 주식회사 사용자 단말장치의 스마트카드에 서비스 발급 방법 및 이를 적용한 서비스 발급 시스템
KR101419138B1 (ko) 2011-12-30 2014-07-11 에스케이씨앤씨 주식회사 마스터 tsm
WO2013163185A1 (en) * 2012-04-23 2013-10-31 Mastercard International Incorporated Methods, systems and computer readable media for over the air(ota) provisioning of soft cards on devices with wireless communications capabilities
CN102752375B (zh) * 2012-06-21 2015-10-28 惠州Tcl移动通信有限公司 实现智能卡远程操作的方法及系统
CN102724315B (zh) * 2012-06-21 2016-06-08 惠州Tcl云创科技有限公司 基于智能卡网页服务器实现智能卡远程操作的方法及系统
US9058498B2 (en) * 2012-07-12 2015-06-16 Oracle International Corporation Runtime environment management of secure communications on card computing devices
CN102831468A (zh) * 2012-08-06 2012-12-19 中国移动通信集团江苏有限公司 一种移动终端的智能卡芯片及其初始化和使用方法
US9479571B2 (en) * 2012-09-18 2016-10-25 Google Inc. Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
CN103530775B (zh) * 2012-09-28 2020-11-03 深圳市可秉资产管理合伙企业(有限合伙) 用于提供可控的可信服务管理平台的方法和系统
FR2997209B1 (fr) * 2012-10-19 2016-01-01 Titan Germany Ii Gp Systeme et procede de securisation des echanges de donnees, objet portable utilisateur et dispositif distant de telechargement de donnees
US8898769B2 (en) 2012-11-16 2014-11-25 At&T Intellectual Property I, Lp Methods for provisioning universal integrated circuit cards
US8959331B2 (en) 2012-11-19 2015-02-17 At&T Intellectual Property I, Lp Systems for provisioning universal integrated circuit cards
DE102012022875A1 (de) * 2012-11-22 2014-05-22 Giesecke & Devrient Gmbh Verfahren und System zur Applikationsinstallation
US9264413B2 (en) * 2012-12-06 2016-02-16 Qualcomm Incorporated Management of network devices utilizing an authorization token
US9036820B2 (en) 2013-09-11 2015-05-19 At&T Intellectual Property I, Lp System and methods for UICC-based secure communication
US9124573B2 (en) 2013-10-04 2015-09-01 At&T Intellectual Property I, Lp Apparatus and method for managing use of secure tokens
US9208300B2 (en) 2013-10-23 2015-12-08 At&T Intellectual Property I, Lp Apparatus and method for secure authentication of a communication device
US9240994B2 (en) 2013-10-28 2016-01-19 At&T Intellectual Property I, Lp Apparatus and method for securely managing the accessibility to content and applications
US9313660B2 (en) 2013-11-01 2016-04-12 At&T Intellectual Property I, Lp Apparatus and method for secure provisioning of a communication device
US9240989B2 (en) 2013-11-01 2016-01-19 At&T Intellectual Property I, Lp Apparatus and method for secure over the air programming of a communication device
US9413759B2 (en) 2013-11-27 2016-08-09 At&T Intellectual Property I, Lp Apparatus and method for secure delivery of data from a communication device
CN103747019B (zh) * 2014-02-12 2017-11-10 中国联合网络通信集团有限公司 一种数据传输的方法及装置
CN103813321B (zh) * 2014-02-13 2017-04-19 天地融科技股份有限公司 一种基于协商密钥的数据处理方法和手机
CN103944715B (zh) * 2014-04-25 2017-09-19 天地融科技股份有限公司 一种基于协商密钥的数据处理方法
US9713006B2 (en) 2014-05-01 2017-07-18 At&T Intellectual Property I, Lp Apparatus and method for managing security domains for a universal integrated circuit card
US10929843B2 (en) * 2014-05-06 2021-02-23 Apple Inc. Storage of credential service provider data in a security domain of a secure element
CN104093139B (zh) * 2014-07-15 2017-10-03 中国联合网络通信集团有限公司 空中写卡方法、服务器和智能卡
EP3002964A1 (en) * 2014-10-02 2016-04-06 Gemalto Sa Method of sending a data from a secure token to a server
EP3010263A1 (en) * 2014-10-13 2016-04-20 Gemalto Sa Method for downloading subscriptions in secure elements and for packaging subscriptions to be downloaded later into secure elements
EP3007404A1 (en) * 2014-10-10 2016-04-13 Gemalto Sa Remote personalization of secure elements cooperating with telecommunication terminals
WO2016055640A2 (en) * 2014-10-10 2016-04-14 Gemalto Sa Method for downloading subscriptions in secure elements and for packaging subscriptions to be downloaded later into secure elements
EP3241375B1 (en) * 2014-12-30 2019-04-24 STMicroelectronics Srl Methods for providing a response to a scp80 command requesting the execution of a proactive command, related universal integrated circuit card, mobile device, server and computer program product
EP3104635B1 (en) * 2015-06-09 2020-02-12 Deutsche Telekom AG Method for an improved installation of a secure-element-related service application in a secure element being located in a communication device, system and telecommunications network for an improved installation of a secure-element-related service application in a secure element being located in a communication device, program comprising a computer readable program code, and computer program product
FR3037686B1 (fr) 2015-06-17 2017-06-02 Morpho Procede de deploiement d'une application dans un element securise
CN106411522A (zh) * 2015-08-03 2017-02-15 中兴通讯股份有限公司 一种基于智能卡的在线认证方法、智能卡及认证服务器
CN105185002B (zh) * 2015-09-09 2018-06-12 建亿通(北京)数据处理信息有限公司 移动终端、业务平台及卡片业务系统
EP3157272A1 (en) 2015-10-16 2017-04-19 Gemalto Sa Method of managing an application
CN105228130B (zh) * 2015-10-16 2019-01-22 中国联合网络通信集团有限公司 个人数据下载方法、终端和运营商远程管理平台
CN106709317A (zh) * 2015-11-12 2017-05-24 国民技术股份有限公司 动态加载应用的系统和方法
CN106888448B (zh) * 2015-12-15 2020-08-04 中国移动通信集团公司 应用下载方法、安全元件及终端
CN105812370B (zh) * 2016-03-16 2019-02-15 中国联合网络通信集团有限公司 智能卡处理方法、装置及系统
CN107766751A (zh) * 2016-08-18 2018-03-06 中国移动通信有限公司研究院 一种访问控制方法、装置、电子设备及安全芯片
WO2018112525A1 (en) * 2016-12-19 2018-06-28 Xard Group Pty Ltd Digital transaction system and method with a virtual companion card
AU2017381403A1 (en) * 2016-12-19 2019-08-08 Xard Group Pty Ltd Digital transaction apparatus, system, and method with a virtual companion card
CN108664820B (zh) * 2017-03-29 2021-06-18 中移(杭州)信息技术有限公司 一种非接触式ic卡的电子化方法、相关设备及系统
CN107257328A (zh) * 2017-05-26 2017-10-17 深圳市金立通信设备有限公司 一种支付安全部署方法、系统、终端以及身份校验方法
CN109428965B (zh) * 2017-06-30 2020-10-13 北京橙鑫数据科技有限公司 数据通信的方法及其相关装置和系统以及存储介质
CN109246170A (zh) * 2017-07-11 2019-01-18 北京握奇智能科技有限公司 一种应用程序安全下载系统
EP3665633A4 (en) * 2017-08-09 2020-06-17 Xard Group Pty Ltd APPARATUS, SYSTEM AND METHOD FOR OPERATING A DIGITAL TRANSACTION CARD
CN110622536A (zh) * 2018-01-05 2019-12-27 深圳市大疆创新科技有限公司 通信方法、设备和系统
CN109195157B (zh) * 2018-09-04 2021-09-07 中国联合网络通信集团有限公司 应用管理方法、装置及终端
EP3672352A1 (en) * 2018-12-18 2020-06-24 Thales Dis France SA Method for establishing a bidirectional nas signal channel between a secure element cooperating with a terminal and a remote platform
CN114430548B (zh) * 2020-10-15 2023-07-21 中移互联网有限公司 业务处理方法、装置及系统
CN114501416A (zh) * 2020-10-26 2022-05-13 中移互联网有限公司 基于bip网关的sim卡应用处理方法、装置及设备
CN113840274B (zh) * 2021-09-18 2023-06-02 中国联合网络通信集团有限公司 Bip通道状态管理方法、移动设备、uicc和用户终端
KR20230174586A (ko) * 2022-06-21 2023-12-28 현대자동차주식회사 Etcs 단말 및 그 제어 방법

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1431862A2 (en) * 2002-12-18 2004-06-23 Activcard Ireland Limited Uniform framework for security tokens
WO2005076204A1 (en) * 2004-02-09 2005-08-18 Hismartech Co., Ltd. Smart card for containing plural issuer security domain and method for installing plural issuer security domain in a smart card
JP2006079223A (ja) * 2004-09-08 2006-03-23 Nec Corp アプリケーションプログラム管理装置及びそれに用いる管理方法並びにそのプログラム
CN1819513A (zh) * 2006-03-23 2006-08-16 北京易恒信认证科技有限公司 Cpk id证书及其生成方法
CN101164086A (zh) * 2005-03-07 2008-04-16 诺基亚公司 能够使用无线网络实现信用卡个人化的方法、系统和移动设备
CN101374153A (zh) * 2007-08-23 2009-02-25 中国移动通信集团公司 安全激活第三方应用的方法、第三方服务器、终端及系统

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2347684A1 (en) * 1998-10-27 2000-05-04 Visa International Service Association Delegated management of smart card applications
JP2000172808A (ja) * 1998-12-01 2000-06-23 Toshiba Corp Icカードとアプリケーション管理方法
JP3817147B2 (ja) * 2001-04-10 2006-08-30 日本電信電話株式会社 Icカード運用管理方法及びシステム
JP4009131B2 (ja) * 2002-04-23 2007-11-14 日本電信電話株式会社 共通テナント管理者によるicカード相互運用方法及びシステム
ES2221535B1 (es) * 2002-07-31 2006-03-01 Airtel Movil, S.A. Un dispositivo de telefonia movil y un metodo de gestion de datos.
US20040123138A1 (en) 2002-12-18 2004-06-24 Eric Le Saint Uniform security token authentication, authorization and accounting framework
WO2004114125A1 (en) * 2003-06-25 2004-12-29 Nokia Corporation Method for obtaining communication settings using an application descriptor
EP1839282A1 (en) * 2004-12-07 2007-10-03 Philips Intellectual Property & Standards GmbH System and method for application management on multi-application smart cards
CN101340663B (zh) * 2008-05-30 2011-08-31 普天信息技术研究院有限公司 智能存储卡系统以及该系统实现交互的方法
EP2199993A1 (en) * 2008-12-17 2010-06-23 Gemalto SA Method and token for managing one processing relating to an application supported or to be supported by a token

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1431862A2 (en) * 2002-12-18 2004-06-23 Activcard Ireland Limited Uniform framework for security tokens
WO2005076204A1 (en) * 2004-02-09 2005-08-18 Hismartech Co., Ltd. Smart card for containing plural issuer security domain and method for installing plural issuer security domain in a smart card
JP2006079223A (ja) * 2004-09-08 2006-03-23 Nec Corp アプリケーションプログラム管理装置及びそれに用いる管理方法並びにそのプログラム
CN101164086A (zh) * 2005-03-07 2008-04-16 诺基亚公司 能够使用无线网络实现信用卡个人化的方法、系统和移动设备
CN1819513A (zh) * 2006-03-23 2006-08-16 北京易恒信认证科技有限公司 Cpk id证书及其生成方法
CN101374153A (zh) * 2007-08-23 2009-02-25 中国移动通信集团公司 安全激活第三方应用的方法、第三方服务器、终端及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2388968A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2451135A1 (de) * 2010-11-05 2012-05-09 Deutsche Telekom AG Verfahren und System zur Provisionierung von Anwendungen auf SIM-Karten eines mobilen Endgerätes

Also Published As

Publication number Publication date
EP2388968A1 (en) 2011-11-23
CN101820613A (zh) 2010-09-01
JP5513527B2 (ja) 2014-06-04
JP2012518350A (ja) 2012-08-09
US20110296182A1 (en) 2011-12-01
EP2388968A4 (en) 2014-06-04
CN101820613B (zh) 2014-03-19
EP2388968B1 (en) 2017-09-27
US9037857B2 (en) 2015-05-19

Similar Documents

Publication Publication Date Title
WO2010096994A1 (zh) 一种应用下载的系统和方法
US10986487B2 (en) Apparatus and method for profile installation in communication system
EP3055978B1 (en) Systems, methods, and computer program products for managing communications
US9973583B2 (en) Method for accessing a service, corresponding device and system
CN101729247B (zh) 密钥更新方法和系统
WO2010096991A1 (zh) 一种应用下载的系统和方法
JP2012505464A (ja) スマートカード基盤のアプレット設置システム及びその方法
CN111479259B (zh) Sim卡配置分发方法及系统
WO2010051715A1 (zh) 智能卡从安全域初始密钥分发方法、系统及移动终端
WO2008035183A2 (en) Method, server and mobile station for transfering data from the server to the mobile station.
WO2010051714A1 (zh) 智能卡从安全域密钥更新分发方法、系统及移动终端
US10097553B2 (en) Installation of a secure-element-related service application in a secure element in a communication device, system and telecommunications
CN102547661B (zh) 一种Android系统与电信智能卡通信的方法及装置
US10136283B2 (en) Methods for providing a response to a command requesting the execution of a proactive command
KR101528681B1 (ko) 보안 푸시 메시징 제공 방법
KR20100018291A (ko) 인터넷 프로토콜 기반 스마트 카드 통신 시스템 및 그 방법
EP2273758A1 (en) Method of sending messages to an application embedded in a secured electronic token
KR20170042412A (ko) 유심 통합 접근 제어 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09840662

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2011550402

Country of ref document: JP

Ref document number: 13202231

Country of ref document: US

REEP Request for entry into the european phase

Ref document number: 2009840662

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009840662

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE