WO2014032471A1 - 用于移动终端的安全通信方法及移动终端 - Google Patents
用于移动终端的安全通信方法及移动终端 Download PDFInfo
- Publication number
- WO2014032471A1 WO2014032471A1 PCT/CN2013/078449 CN2013078449W WO2014032471A1 WO 2014032471 A1 WO2014032471 A1 WO 2014032471A1 CN 2013078449 W CN2013078449 W CN 2013078449W WO 2014032471 A1 WO2014032471 A1 WO 2014032471A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- nfc card
- nfc
- application function
- card
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
Definitions
- the present invention relates to a mobile communication terminal, and in particular to a secure communication method for a mobile terminal and a mobile terminal.
- NFC Near Field Communication
- NFC function cards commonly used on the market, such as passenger cards, employee cards, and consumer cards, have been widely used and are easily available, but these NFC function cards are read-only for ordinary users, and data need not be considered during use. Encrypt or protect the issue. As more and more mobile terminals also have built-in NFC chips, ordinary users also need to consider the data security used by mobile terminals. How to use the existing technology NFC function card to solve the data security of the mobile terminal is also a problem that the mobile terminal user needs to consider.
- the present invention solves the deficiencies and shortcomings of the prior art, and proposes a secure communication method for a mobile terminal and a mobile terminal implemented by using an NFC card, and the method and the mobile terminal can implement
- the NFC card is used to trigger the mobile terminal to activate the corresponding function of the terminal to protect data security in the terminal.
- a secure communication method for a mobile terminal is provided, the mobile terminal having an NFC function for executing an application in the mobile terminal by using an NFC card, the method comprising the steps of:
- the NFC card is compatible with the mobile terminal, the NFC card is paired with the mobile terminal, and if the NFC card is incompatible with the mobile terminal, the NFC card is prompted to be unavailable;
- the mobile terminal When the mobile terminal is used to activate the application function or use the NFC card to trigger the mobile terminal, the mobile terminal is used to read the data identifier of the NFC card, and query whether the data identifier of the NFC card exists. In the mobile terminal, if not present, the mobile terminal does not activate the application function; if present, the mobile terminal starts and executes the application function.
- a secure communication method for a mobile terminal the mobile terminal having an NFC function for executing an application in the mobile terminal by using an NFC card, the method comprising the steps of:
- the mobile terminal When the mobile terminal is used to activate the application function or use the NFC card to trigger the mobile terminal, the mobile terminal is used to read the data identifier of the NFC card, and query whether the data identifier of the NFC card exists. In the mobile terminal, if not present, the mobile terminal does not activate the application function; if present, the mobile terminal starts and executes the application function.
- a mobile terminal is further provided, and the mobile terminal is configured to perform an application in the mobile terminal by using an NFC card, where the mobile terminal includes:
- An NFC card pairing module configured to perform pairing connection between the NFC card and the mobile terminal
- An NFC card function setting module configured to store a data identifier of the NFC card and a correspondingly executed application function into the mobile terminal;
- a mobile terminal integrated management module configured to use the mobile terminal to read a data identifier of the NFC card, and query the NFC when the mobile terminal is used to start a corresponding application function or use the NFC card to trigger the mobile terminal Whether the data identification of the card exists in the mobile terminal, if not present, the mobile terminal does not activate the application function; if present, the mobile terminal starts and executes the application function.
- the method for secure communication of the mobile terminal of the present invention and the mobile terminal use the NFC card common in the prior art to obtain the access authority of the terminal, and only the NFC card matched with the terminal can initiate the corresponding application function;
- the mobile terminal may be a common mobile communication device such as a smart phone or a tablet computer with an NFC function, and the NFC card is also a common ordinary card with an NFC chip, such as a passenger card, a consumer card, an employee card, etc.; the method and the mobile terminal of the present invention
- the NFC card can be used to trigger a mobile terminal such as a smart phone to activate the mobile phone browser, unlock the mobile phone screen, view the mobile phone short message or login interface, and the like, and only open the smart phone after identifying the NFC card with the set permission.
- the function of the NFC card itself only needs to perform the reading operation, and the operation of not writing the data not only realizes the low-cost, convenient and fast protection of the data security of the mobile terminal, but also has no influence on the internal
- FIG. 1 is a process flow diagram of a secure communication method for a mobile terminal of the present invention.
- FIG. 2 is a process flow diagram of a preferred embodiment of the secure communication method for a mobile terminal of the present invention.
- FIG. 3 is a flow chart showing a process of pairing an NFC card with a smartphone in a preferred embodiment of the secure communication method for a mobile terminal of the present invention.
- FIG. 4 is a block diagram showing the structure of a preferred embodiment of the mobile terminal of the present invention.
- FIG. 5 is a structural block diagram of an NFC card function setting module of a preferred embodiment of the mobile terminal of the present invention.
- the embodiment of the present invention provides a mobile terminal with an NFC function, which can be used to implement a secure communication method for a mobile terminal according to an embodiment of the present invention.
- the mobile terminal includes a memory, and one or more A program, wherein one or more programs are stored in a memory, and configured to perform a secure communication method for a mobile terminal of an embodiment of the present invention by one or more processors.
- the secure communication method for the mobile terminal in the embodiment of the present invention can also be applied to other NFC-enabled mobile electronic terminals, including but not limited to smart phones, tablets, e-book readers, and MP4 (Moving Picture Experts Group Audio Layer). IV, dynamic imaging experts compress standard audio layers 4) players and more.
- the method of the present invention utilizes a unique invariant data identifier (ie, the physical card number UID of the NFC card) in any NFC card to protect or activate an application in the mobile terminal or access data therein instead of a password or key interaction.
- the NFC card referred to in the method of the present invention refers to a card having an NFC function, such as a common NFC card such as a passenger card, an employee card or a consumer card; and the mobile terminal also has an NFC function built in, and the NFC card and the mobile are implemented by the NFC technology.
- the communication of the terminal thereby realizing the function of using the mobile terminal by the NFC card instead of the password or the key.
- the mobile terminal may be a smart phone or a tablet computer.
- FIG. 1 is a process flow diagram of a secure communication method for a mobile terminal of the present invention, the method comprising the following steps:
- the NFC card is paired with the mobile terminal;
- the paired connection here refers to establishing a pairing relationship between the NFC card and the mobile terminal, that is, establishing a communication connection between the NFC card and the mobile terminal, and before using the pairing connection, also triggering the movement by using the NFC card.
- the terminal enables the mobile terminal to perform a compatibility check on the NFC card through the detection algorithm.
- the compatibility check mainly ensures the correct identification of the NFC card. For an NFC card that includes an NFC chip, it is necessary to ensure that the UID is stable.
- the mobile terminal repeatedly reads the UID in the same NFC card, and determines whether the NFC card is compatible according to whether the acquired UID is consistent.
- the NFC card may be compatible with the secure communication method of the embodiment of the present invention; otherwise the NFC card is not compatible with the secure communication method of the embodiment of the present invention;) such that some card types using random numbers may be excluded.
- the detection algorithm of the compatibility check of the NFC card is prior art, and is not described here. After passing the compatibility check, the NFC card can trigger the mobile terminal to record the UID of the NFC card to the mobile terminal.
- S101 Store the UID of the NFC card and the corresponding executed application function into the mobile terminal; this step includes establishing a database table in the mobile terminal, and the mobile terminal user can perform the pairing connection between the NFC card and the mobile terminal, and then in the database table.
- the application functions performed by the mobile terminal corresponding to the NFC card are set, and the executed application functions include an application of the mobile terminal, system settings, execution actions, and additional parameters.
- the database table may adopt the format shown in Table 1.
- the fields of Table-A include NFC_UID, Name, Module, Action, and Parameter, that is, the UID, NFC card name, application name, execution action, and additional parameters of the NFC card are respectively saved. .
- the card is a passenger card, and the application name of the application with which the relationship is established is called "short message", and the execution actions include reading and playing;
- the NFC card with the UID of 8F0E1240 is the consumer card.
- the application of the application with which the relationship is established is called “screen lock”, and the execution action is allowed to open;
- the fourth line is the multiplication of UID 8F0E1140.
- the car card, the corresponding application application name is "browser", the action is allowed to open, and the additional parameter records the website address "http://www.xx.com” opened by the browser.
- the application functions executed by the mobile terminal corresponding to the above NFC card can be set by the user.
- step S102 Use a mobile terminal to start an application function or use an NFC card to trigger a mobile terminal; after completing step S101, a relationship between the NFC card and the mobile terminal is established, when the mobile terminal needs to start a corresponding application function, or when the NFC card triggers the mobile terminal
- the action triggered here includes the NFC card being close to the mobile terminal. Since the NFC is short-distance communication, the NFC card can communicate with the mobile terminal by touching or approaching it. This is a prior art, and the working principle is not described.
- the mobile terminal system Prompting that a correct NFC card is needed to execute the application here, the NFC card can be implemented as a substitute for a password or a key to protect the security of the mobile terminal;
- step S103 determining whether the UID of the NFC card is read by the mobile terminal, if yes, executing step S104, otherwise performing step S105; determining whether the UID exists in the mobile terminal, specifically the UID of the read NFC card, and then In the database table of the mobile terminal, it is queried whether the UID exists.
- the mobile terminal starts and executes the application function.
- the step is to start and execute the application function according to an application name, an execution action, and an additional parameter corresponding to the UID in the database table of the mobile terminal.
- the UID of the read NFC card is 8F0E1140, and the mobile terminal can activate the functions of short message, email, browser, music player and video playing for the user;
- the mobile terminal does not activate the application function. If the UID of the NFC card is not in the database table of the mobile terminal, the mobile terminal does not activate the application function for the user to use.
- FIG. 2 is a process flow diagram of a preferred embodiment of a secure communication method for a mobile terminal according to the present invention.
- the mobile terminal in the preferred embodiment is described by using a smart phone, and the preferred embodiment of the present invention is described in conjunction with FIG.
- the preferred embodiment is implemented based on the above method, and the concepts therein all adopt the concepts in the above method, and are explained here.
- the NFC card triggers the smart phone (as mentioned above, the trigger can be implemented by proximity or touch), so that the smart phone can read the UID of the NFC card;
- step S212 the smart phone determines whether the UID exists according to the database table; if yes, the subsequent step S216 is performed; otherwise, step S213 is sequentially performed;
- the smart phone detects whether the NFC card is compatible, that is, the compatibility detection in the above method is used, the purpose and implementation process of the compatibility detection are not described here; if it is compatible, step S214 is performed; otherwise, step S217 is performed;
- the smart phone saves the name, application name, execution action and additional parameters of the set NFC card to the database table, and saves the NFC UID, NFC card name, application name, execution action and additional parameters to the smartphone.
- the smart phone prompts that the NFC card is unavailable, and does not record the NFC card information
- the NFC card After the NFC card is paired with the smart phone, the NFC card can be used to implement secure communication with the smart phone.
- the specific implementation process is as follows:
- Step S200 using the NFC card to trigger the smart phone; after performing this step, step S204 is performed in sequence;
- Step S201 the smart phone is powered on, short message, encrypted or using other functions; after performing this step, step S202 is performed in sequence;
- step S200 or S201 can be selectively performed, that is, the processing flow of the preferred embodiment is initiated by a certain step of the two steps, or the smart phone is triggered by the NFC card, or the function is used by the smart phone, including Function applications such as power-on, short-message reading and writing, or data encryption, depending on the user's ability to use the NFC card when the NFC card is paired with the smart phone, it is not limited here, and can be determined according to the needs of the user. .
- Step S202 the smart phone prompts the need for the correct NFC card; when the user uses the smart phone application, at this time, the smart phone system prompts the use of the application needs to have the correct NFC card to open; then step S203 is performed in sequence;
- Step S203 using the NFC card to trigger the smart phone, and then performing step S204;
- Step S204 the smart phone reads the UID of the NFC card; then step S205 is performed in sequence;
- Step S205 the smart phone query whether there is a UID corresponding to the NFC card, specifically to query whether there is a UID corresponding to the NFC card in the database table in the smart phone; if there is a corresponding UID, step S206 is performed in sequence, otherwise step S207 is performed;
- Step S206 the smart phone performs an application function corresponding to the NFC card, that is, the smart phone performs an application function corresponding to the smart phone corresponding to the UID of the NFC card in the database table;
- Step S207 ending.
- the smart phone By storing the UID of the NFC card and its corresponding application functions in the database table in the smart phone, when the smart phone uses any application function, it needs to be performed by the NFC card recognized by the smart phone, because NFC is near field communication.
- NFC near field communication
- the smart phone user can also define the function of the NFC card through different combinations of settings, so that the user is more convenient to use.
- the invention also provides a mobile terminal, the structure of which is shown in FIG.
- the mobile terminal 40 includes:
- the NFC card pairing module 41 is configured to perform a pairing connection between the NFC card and the mobile terminal 40;
- the NFC card function setting module 42 is configured to store the UID of the NFC card and the corresponding executed application function into the database table 45 of the mobile terminal 40;
- the NFC card compatibility detecting module 43 is configured to perform a compatibility check on the NFC card by using a detection algorithm in the mobile terminal 40;
- the mobile terminal integrated management module 44 is configured to use the mobile terminal 40 to read the UID of the NFC card when the mobile terminal 40 is used to activate the corresponding application function or use the NFC card to trigger the mobile terminal 40, and query whether the UID of the NFC card exists in the mobile terminal 40. In the database table 45, if not present, the mobile terminal 40 does not activate the application function; if present, the mobile terminal 40 activates and executes the application function.
- FIG. 5 is a structural block diagram of an NFC card function setting module of a preferred embodiment of the mobile terminal of the present invention.
- the NFC card function setting module 42 includes a reading unit 421, a setting unit 422, and an establishing unit 423.
- the reading unit 421 is configured to read the data identifier of the NFC card;
- the setting unit 422 is configured to set an application function performed by the mobile terminal corresponding to the NFC card;
- the establishing unit 423 is configured to establish a data identifier for storing the NFC card and corresponding to the NFC card.
- the database table of the mapping relationship of the application functions executed by the mobile terminal, and the data identifier of the NFC card and the application function executed by the corresponding mobile terminal are stored in the database table.
- the mobile terminal includes, but is not limited to, a smartphone and a tablet.
- the working principle of the mobile terminal is the same as that described in the specific embodiment of the foregoing secure communication method for the mobile terminal, and details are not described herein.
- the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory (Read-Only) Memory, ROM) or Random Access Memory (RAM).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
一种用于移动终端的安全通信方法及移动终端,该移动终端具备NFC功能,用于通过NFC卡来执行移动终端中的应用。该方法包括:将NFC卡与移动终端进行配对连接;再将NFC卡的UID及相应执行的应用功能存储到移动终端中;启动应用功能或NFC卡触发移动终端吋,移动终端读取NFC卡的UID,并査询该数据标识是否存在于移动终端中,如果存在,则移动终端启动并执行应用功能。本发明方法及移动终端釆用普通NFC卡片来获得终端的访问权限,只有通过与移动终端匹配的NFC卡才能启动相应的应用功能;对NFC卡本身仅需要进行读取操作,没有写入数据的操作。
Description
本发明涉及移动通信终端,尤其涉及一种用于移动终端的安全通信方法及移动终端。
目前,采用近场通讯(Near Field
Communication,NFC)标准的近距离无线通信技术已经广泛应用在各个领域,其独立芯片的载体通常表现为一张卡片。现有技术通过NFC进行加密的技术是使用专用设备对NFC芯片内部数据区进行读写,存入密钥等特殊数据,使用时再由使用设备的应用程序读出数据进行校验匹配,以获得使用设备数据的访问权限。
目前市场上常见的NFC功能卡片,例如乘车卡、员工卡、消费卡等已经广泛使用,并且容易获得,但这些NFC功能卡片对普通用户而言是只读的,使用过程中无需考虑数据的加密或者保护问题。随着越来越多的移动终端也内置了NFC芯片,普通用户也需要考虑移动终端使用的数据安全。如何利用现有技术NFC功能卡片来解决移动终端数据安全也是移动终端用户需要考虑的问题。
因此,现有技术还有待于改进和发展。
鉴于上述现有技术的不足之处,本发明为解决现有技术的缺陷和不足,提出一种利用NFC卡来实现的用于移动终端的安全通信方法及移动终端,该方法及移动终端能够实现通过NFC卡触发移动终端启动终端相应的功能,保护终端中的数据安全。
提供一种用于移动终端的安全通信方法,所述移动终端具有NFC功能,用于通过NFC卡来执行所述移动终端中的应用,该方法包括步骤:
使用所述NFC卡触发所述移动终端,使所述移动终端通过检测算法对所述NFC卡片进行兼容性检查;
如所述NFC卡片与所述移动终端兼容,将所述NFC卡与所述移动终端进行配对连接,如所述NFC卡片与所述移动终端不兼容,则提示所述NFC卡不可用;
将所述NFC卡的数据标识及相应执行的应用功能存储到所述移动终端中;以及
使用所述移动终端启动所述应用功能或使用所述NFC卡触发所述移动终端时,使用所述移动终端读取所述NFC卡的数据标识,并查询所述NFC卡的数据标识是否存在于所述移动终端中,如果不存在,则所述移动终端不启动所述应用功能;如果存在,则所述移动终端启动并执行所述应用功能。
还提供一种用于移动终端的安全通信方法,所述移动终端具有NFC功能,用于通过NFC卡来执行所述移动终端中的应用,该方法包括步骤:
将所述NFC卡与所述移动终端进行配对连接;
将所述NFC卡的数据标识及相应执行的应用功能存储到所述移动终端中;以及
使用所述移动终端启动所述应用功能或使用所述NFC卡触发所述移动终端时,使用所述移动终端读取所述NFC卡的数据标识,并查询所述NFC卡的数据标识是否存在于所述移动终端中,如果不存在,则所述移动终端不启动所述应用功能;如果存在,则所述移动终端启动并执行所述应用功能。
还提供一种移动终端,所述移动终端具备NFC功能,用于通过NFC卡来执行所述移动终端中的应用,所述移动终端包括:
NFC卡片配对模块,用于将所述NFC卡与所述移动终端进行配对连接;
NFC卡片功能设置模块,用于将所述NFC卡的数据标识及相应执行的应用功能存储到所述移动终端中;以及
移动终端综合管理模块,用于使用所述移动终端启动相应应用功能或使用所述NFC卡触发所述移动终端时,使用所述移动终端读取所述NFC卡的数据标识,并查询所述NFC卡的数据标识是否存在于所述移动终端中,如果不存在,则所述移动终端不启动所述应用功能;如果存在,则所述移动终端启动并执行所述应用功能。
与现有技术相比较,本发明用于移动终端的安全通信方法及移动终端采用现有技术常见的NFC卡片来获得终端的访问权限,只有通过与终端匹配的NFC卡才能启动相应的应用功能;移动终端可以是常见的具有NFC功能的智能手机、平板电脑等移动通信设备,NFC卡也是常见的具有NFC芯片的普通卡片,诸如乘车卡、消费卡、员工卡等;本发明方法及移动终端可以通过NFC卡片触发诸如智能手机的移动终端来启动手机浏览器、解除手机屏幕的锁定界面、查看手机短信或登录界面等功能模块,在只有通过识别设定权限的NFC卡后才能打开智能手机相应的功能,对NFC卡本身仅需要进行读取操作,没有写入数据的操作,不仅实现了低成本、方便快捷的保护移动终端的数据安全,对NFC卡的内部数据也没有任何影响。
图1是本发明的用于移动终端的安全通信方法的处理流程图。
图2是本发明的用于移动终端的安全通信方法的优选实施例的处理流程图。
图3是本发明的用于移动终端的安全通信方法的优选实施例中NFC卡与智能手机进行配对的处理流程图。
图4是本发明的移动终端的优选实施例的结构原理框图;
图5是本发明的移动终端的优选实施例的NFC卡片功能设置模块的结构原理框图。
为使本发明的目的、技术方案及优点更加清楚、明确,以下参照附图并举实施例对本发明进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例提供一具有NFC功能的移动终端,可以用于实施本发明实施例的用于移动终端的安全通信方法,具体在本实施例中,移动终端包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行本发明实施例的用于移动终端的安全通信方法。当然本发明实施例的用于移动终端的安全通信方法也可用于其他具有NFC功能的移动电子终端,其包括但不限于智能手机、平板电脑、电子书阅读器以及MP4(Moving
Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器等等。
本发明方法是利用任意NFC卡片中唯一不变的数据标识(即NFC卡片的物理卡号UID)来替代口令或者密钥交互的方式来保护或启动移动终端中的应用或访问其中的数据。本发明方法中所指的NFC卡片是指具有NFC功能的卡片,诸如常见的乘车卡、员工卡或消费卡等NFC卡;且移动终端也内置了NFC功能,通过NFC技术实现NFC卡与移动终端的通信,进而实现由NFC卡代替口令或者密钥使用移动终端的功能。本发明方法及系统实施例中,移动终端可以是智能手机或平板电脑。
图1是本发明的用于移动终端的安全通信方法的处理流程图,该方法包括以下步骤:
S100,将NFC卡与移动终端进行配对连接;这里的配对连接是指将NFC卡与移动终端建立配对关系,即将NFC卡与移动终端建立通信连接,在配对连接前,还包括使用NFC卡触发移动终端,使移动终端通过检测算法对NFC卡片进行兼容性检查的步骤,兼容性检查主要是确保NFC卡的正确识别。对于包含NFC芯片的NFC卡而言,必须要确保其UID是稳定不变的,使用移动终端反复读取同一张NFC卡中的UID,根据每次获取的UID是否一致来确定该NFC卡的兼容性(如一致,则该NFC卡可兼容于本发明实施例的安全通信方法;否则该NFC卡不兼容与本发明实施例的安全通信方法);这样可以排除一些使用随机数的卡片类型。NFC卡片的兼容性检查的检测算法为现有技术,此处不做赘述。在通过兼容性检测后,NFC卡即可触发移动终端将NFC卡的UID记录到移动终端中。
S101,将NFC卡的UID及相应执行的应用功能存储到移动终端中;此步骤包括在移动终端中建立数据库表,移动终端用户在将NFC卡与移动终端进行配对连接后,即可在数据库表中设置NFC卡所对应的移动终端执行的各种应用功能,该执行的应用功能包括移动终端的应用程序、系统设置、执行动作以及附加参数等。数据库表具体可采用表1所示的格式,其Table-A的字段包括NFC_UID、Name、Module、Action和Parameter,即分别保存NFC卡的UID、NFC卡名称、应用程序名、执行动作以及附加参数。如该表中第一行记录了UID为8F0E1140的NFC卡,该卡为乘车卡,与之建立关系的应用程序的应用程序名为“短信息”的使用,执行动作包括阅读和播放;又如表中第三行记录了UID为8F0E1240的NFC卡为消费卡,与之建立关系的应用程序的应用程序名为“屏幕锁”,执行动作为允许打开;第四行是UID为8F0E1140的乘车卡,对应的应用程序的应用程序名为“浏览器”,执行动作为允许打开,附加参数记录了浏览器打开的网站地址“http://www.xx.com”。以上NFC卡对应的移动终端执行的应用功能,均可以通过用户来自行设定。
S102,使用移动终端启动应用功能或使用NFC卡触发移动终端;完成步骤S101后,即建立了NFC卡与移动终端的关系,当移动终端需要启动相应的应用功能时,或者当NFC卡触发移动终端时(这里触发的动作包括NFC卡靠近移动终端,由于NFC是短距离通信,NFC卡与移动终端触碰或靠近均可实现通信,此为现有技术,不赘述其工作原理),移动终端系统提示需要正确的NFC卡来执行应用,此处,即可实现NFC卡作为口令或密钥的替代来保护移动终端的安全;
S103,判断移动终端读取NFC卡的UID是否存在于移动终端中,如果存在,执行步骤S104,否则执行步骤S105;判断UID是否存在于移动终端中具体为读取到的NFC卡的UID,然后在移动终端的数据库表中查询是否有该UID存在。
S104,移动终端启动并执行该应用功能;该步骤是根据移动终端的数据库表中UID对应的应用程序名、执行动作以及附加参数来启动并执行该应用功能。例如,读取到的NFC卡的UID为8F0E1140,移动终端则可启动短信息、电子邮件、浏览器、音乐播放器和视频播放的功能供用户使用;
S105,移动终端不启动该应用功能。如果NFC卡的UID不在移动终端的数据库表中,则移动终端不启动该应用功能供用户使用。
表1 移动终端的数据库表Table-A示例
图2所示为本发明用于移动终端的安全通信方法的优选实施例的处理流程图,本优选实施例中的移动终端采用智能手机来进行说明,同时结合图3来说明本优选实施例的中NFC卡与智能手机进行配对的处理流程。本优选实施例是基于上述方法来实现的,其中的概念均采用上述方法中的概念,特此说明。
首先通过图3的流程图来说明NFC卡与智能手机配对及设置相应执行的应用功能的过程。
S211,NFC卡触发智能手机(如前所述,触发可采用靠近或触碰实现),以使智能手机能够读取NFC卡的UID;
S212,智能手机根据数据库表判断UID是否存在;如果存在,则执行后续的步骤S216,否则,顺序执行步骤S213;
S213,智能手机检测NFC卡片是否兼容可用,即采用上述方法中的兼容性检测来完成,兼容性检测的目的和实现过程此处不赘述;如果兼容,则执行步骤S214,否则,执行步骤S217;
S214,设置NFC卡的名称、应用程序名、执行动作以及附加参数;
S215,智能手机将设置的NFC卡的名称、应用程序名、执行动作以及附加参数保存至数据库表中,即将NFC的UID、NFC卡的名称、应用程序名、执行动作和附加参数保存至智能手机中设置的数据库表中;
S216,结束配对过程;
S217,智能手机提示NFC卡不可用,且不记录NFC卡信息;
S218,重新选择NFC卡片,智能手机提示用户重新选择一张NFC卡片进行配对。
在通过上述NFC卡与智能手机配对处理后,即可以通过NFC卡来实现与智能手机的安全通信,具体实现流程如下:
步骤S200,使用NFC卡触发智能手机;执行该步骤后,依序执行步骤S204;
步骤S201,智能手机开机、短信息、加密或使用其他功能;执行该步骤后,依序执行步骤S202;
以上步骤S200或S201可以选择执行,也即本优选实施例处理流程是由该两个步骤中某一步骤来启动的,或者是由NFC卡触发智能手机,或者是由智能手机使用其功能,包括开机、短信息读写或数据加密等功能应用,这取决于NFC卡与智能手机进行配对时,用户对NFC卡可使用功能的设定,在此不做限定,可根据用户的需要来进行确定。
步骤S202,智能手机提示需要正确的NFC卡;当用户使用智能手机的应用时,此时,智能手机系统提示使用该应用需要有正确的NFC卡来打开;然后依序执行步骤S203;
步骤S203,使用NFC卡触发智能手机,然后依序执行步骤S204;
步骤S204,智能手机读取NFC卡的UID;然后依序执行步骤S205;
步骤S205,智能手机查询是否有对应NFC卡的UID,具体为查询智能手机中数据库表中是否有对应NFC卡的UID;如果有对应的UID,则依序执行步骤S206,否则执行步骤S207;
步骤S206,智能手机执行NFC卡相应执行的应用功能,即智能手机执行数据库表中NFC卡的UID对应的智能手机相应执行的应用功能;
步骤S207,结束。
通过将NFC卡的UID及其对应执行的应用功能存储到智能手机中的数据库表中,当智能手机使用任何应用功能时,均需通过智能手机识别的NFC卡来进行,由于NFC为近场通讯技术,利用NFC卡来打开智能手机相应的应用功能,确保了智能手机中数据的安全,智能手机用户还可通过不同的设置组合来对NFC卡的功能进行限定,使用户使用起来更加方便。
本发明还提供了一种移动终端,其结构如图4所示。该移动终端40包括:
NFC卡片配对模块41,用于将NFC卡与移动终端40进行配对连接;
NFC卡片功能设置模块42,用于将NFC卡的UID及相应执行的应用功能存储到移动终端40的数据库表45中;
NFC卡兼容性检测模块43,用于通过移动终端40中的检测算法对NFC卡片进行兼容性检查;以及
移动终端综合管理模块44,用于使用移动终端40启动相应应用功能或使用NFC卡触发移动终端40时,使用移动终端40读取NFC卡的UID,并查询NFC卡的UID是否存在于移动终端40的数据库表45中,如果不存在,则移动终端40不启动该应用功能;如果存在,则移动终端40启动并执行该应用功能。
请参照图5,图5是本发明的移动终端的优选实施例的NFC卡片功能设置模块的结构原理框图。该NFC卡片功能设置模块42包括读取单元421、设置单元422以及建立单元423。读取单元421用于读取NFC卡的数据标识;设置单元422用于设置NFC卡所对应移动终端执行的应用功能;建立单元423用于建立用于存储NFC卡的数据标识与NFC卡所对应移动终端执行的应用功能的映射关系的数据库表,并述NFC卡的数据标识及所对应移动终端执行的应用功能存储到数据库表中。
该移动终端包括但不限于智能手机以及平板电脑。
该移动终端的工作原理与上述用于移动终端的安全通信方法的具体实施例中的描述相同,此处不赘述。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only
Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
应当理解的是,以上所述仅为本发明的较佳实施例而已,并不足以限制本发明的技术方案,对本领域普通技术人员来说,在本发明的精神和原则之内,可以根据上述说明加以增减、替换、变换或改进,而所有这些增减、替换、变换或改进后的技术方案,都应属于本发明所附权利要求的保护范围。
Claims (17)
- 一种用于移动终端的安全通信方法,所述移动终端具有近场通讯(Near Field Communication,NFC)功能,用于通过NFC卡来执行所述移动终端中的应用,该方法包括步骤:使用所述NFC卡触发所述移动终端,使所述移动终端通过检测算法对所述NFC卡片进行兼容性检查;如所述NFC卡片与所述移动终端兼容,将所述NFC卡与所述移动终端进行配对连接,如所述NFC卡片与所述移动终端不兼容,则提示所述NFC卡不可用;将所述NFC卡的数据标识及相应执行的应用功能存储到所述移动终端中;以及使用所述移动终端启动所述应用功能或使用所述NFC卡触发所述移动终端时,使用所述移动终端读取所述NFC卡的数据标识,并查询所述NFC卡的数据标识是否存在于所述移动终端中,如果不存在,则所述移动终端不启动所述应用功能;如果存在,则所述移动终端启动并执行所述应用功能。
- 根据权利要求1所述的用于移动终端的安全通信方法,其中所述兼容性检查包括:使用所述移动终端反复读取同一张NFC卡中的数据标识,根据每次获取的数据标识确定所述NFC卡的兼容性。
- 根据权利要求1所述的用于移动终端的安全通信方法,其中所述将所述NFC卡的数据标识及相应执行的应用功能存储到所述移动终端中的步骤包括:读取所述NFC卡的数据标识;设置所述NFC卡所对应移动终端执行的应用功能;以及建立用于存储所述NFC卡的数据标识与所述NFC卡所对应移动终端执行的应用功能的映射关系的数据库表,并将所述NFC卡的数据标识及所对应移动终端执行的应用功能存储到所述数据库表中。
- 根据权利要求3所述的用于移动终端的安全通信方法,其中所述数据库表的字段包括所述NFC卡的数据标识、NFC卡名称、应用程序名、执行动作以及附加参数。
- 根据权利要求1所述的用于移动终端的安全通信方法,其中所述移动终端包括智能手机或平板电脑。
- 一种用于移动终端的安全通信方法,所述移动终端具有NFC功能,用于通过NFC卡来执行所述移动终端中的应用,该方法包括步骤:将所述NFC卡与所述移动终端进行配对连接;将所述NFC卡的数据标识及相应执行的应用功能存储到所述移动终端中;以及使用所述移动终端启动所述应用功能或使用所述NFC卡触发所述移动终端时,使用所述移动终端读取所述NFC卡的数据标识,并查询所述NFC卡的数据标识是否存在于所述移动终端中,如果不存在,则所述移动终端不启动所述应用功能;如果存在,则所述移动终端启动并执行所述应用功能。
- 根据权利要求6所述的用于移动终端的安全通信方法,其中所述将所述NFC卡与所述移动终端进行配对连接的步骤之前还包括步骤:使用所述NFC卡触发所述移动终端,使所述移动终端通过检测算法对所述NFC卡片进行兼容性检查。
- 根据权利要求7所述的用于移动终端的安全通信方法,其中所述兼容性检查具体为使用所述移动终端反复读取同一张NFC卡中的数据标识,根据每次获取的数据标识确定所述NFC卡的兼容性。
- 根据权利要求6所述的用于移动终端的安全通信方法,其中所述将所述NFC卡的数据标识及相应执行的应用功能存储到所述移动终端中的步骤包括:读取所述NFC卡的数据标识;设置所述NFC卡所对应移动终端执行的应用功能;以及建立用于存储所述NFC卡的数据标识与所述NFC卡所对应移动终端执行的应用功能的映射关系的数据库表,并将所述NFC卡的数据标识及所对应移动终端执行的应用功能存储到所述数据库表中。
- 根据权利要求9所述的用于移动终端的安全通信方法,其中所述数据库表的字段包括所述NFC卡的数据标识、NFC卡名称、应用程序名、执行动作以及附加参数。
- 根据权利要求6所述的用于移动终端的安全通信方法,其中所述移动终端包括智能手机或平板电脑。
- 一种移动终端,所述移动终端具备NFC功能,用于通过NFC卡来执行所述移动终端中的应用,所述移动终端包括:NFC卡片配对模块,用于将所述NFC卡与所述移动终端进行配对连接;NFC卡片功能设置模块,用于将所述NFC卡的数据标识及相应执行的应用功能存储到所述移动终端中;以及移动终端综合管理模块,用于使用所述移动终端启动相应应用功能或使用所述NFC卡触发所述移动终端时,使用所述移动终端读取所述NFC卡的数据标识,并查询所述NFC卡的数据标识是否存在于所述移动终端中,如果不存在,则所述移动终端不启动所述应用功能;如果存在,则所述移动终端启动并执行所述应用功能。
- 根据权利要求12所述的移动终端,其还包括:NFC卡兼容性检测模块,用于通过所述移动终端中的检测算法对所述NFC卡片进行兼容性检查。
- 根据权利要求13所述的移动终端,其中所述兼容性检查具体为使用所述移动终端反复读取同一张NFC卡中的数据标识,根据每次获取的数据标识确定所述NFC卡的兼容性。
- 根据权利要求12所述的移动终端,其中所述NFC卡片功能设置模块包括:读取单元,用于读取所述NFC卡的数据标识;设置单元,用于设置所述NFC卡所对应移动终端执行的应用功能;以及建立单元,用于建立用于存储所述NFC卡的数据标识与所述NFC卡所对应移动终端执行的应用功能的映射关系的数据库表,并将所述NFC卡的数据标识及所对应移动终端执行的应用功能存储到所述数据库表中。
- 根据权利要求15所述的移动终端,其中所述数据库表的字段包括所述NFC卡的数据标识、NFC卡名称、应用程序名、执行动作以及附加参数。
- 根据权利要求12所述的移动终端,其中所述移动终端包括智能手机或平板电脑。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210317718.4 | 2012-08-31 | ||
CN2012103177184A CN102883047A (zh) | 2012-08-31 | 2012-08-31 | 实现智能移动终端数据安全的方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014032471A1 true WO2014032471A1 (zh) | 2014-03-06 |
Family
ID=47484178
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/078449 WO2014032471A1 (zh) | 2012-08-31 | 2013-06-28 | 用于移动终端的安全通信方法及移动终端 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102883047A (zh) |
WO (1) | WO2014032471A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104834880A (zh) * | 2015-05-07 | 2015-08-12 | 惠州Tcl移动通信有限公司 | 一种基于nfc移动终端的卡检测方法及系统 |
CN111654848A (zh) * | 2020-05-27 | 2020-09-11 | 惠州Tcl移动通信有限公司 | Nfc卡检测方法、装置、存储介质及移动终端 |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102883047A (zh) * | 2012-08-31 | 2013-01-16 | 惠州Tcl移动通信有限公司 | 实现智能移动终端数据安全的方法及系统 |
CN103390140A (zh) * | 2013-06-20 | 2013-11-13 | 上海鼎为通讯电子有限公司 | 一种移动终端以及其信息安全控制方法 |
JP6344891B2 (ja) * | 2013-07-12 | 2018-06-20 | キヤノン株式会社 | 制御装置、電子機器、制御方法、及びプログラム |
CN103326867B (zh) * | 2013-07-15 | 2019-03-29 | 上海果壳电子有限公司 | 一种具有短距离身份认证能力的智能戒指 |
CN103457641B (zh) * | 2013-07-19 | 2015-08-12 | 金硕澳门离岸商业服务有限公司 | 多功能nfc实现方法和装置 |
CN103577220A (zh) * | 2013-08-31 | 2014-02-12 | 成都西可科技有限公司 | 一种通过nfc标签开启私密应用或数据的系统及方法 |
CN103530553A (zh) * | 2013-10-22 | 2014-01-22 | 山东神思电子技术股份有限公司 | 一种具有授权卡的移动终端及授权方法 |
CN105427106B (zh) * | 2014-09-17 | 2021-07-20 | 苏州海博智能系统有限公司 | 电子现金数据的授权处理方法、支付处理方法及虚拟卡 |
CN105516111A (zh) * | 2015-12-02 | 2016-04-20 | 成都汇合乾元科技有限公司 | 智能设备实时数据交互方法 |
CN106023370A (zh) * | 2016-05-20 | 2016-10-12 | 北京小米移动软件有限公司 | Nfc设备的解锁方法及装置 |
CN106708512B (zh) * | 2016-11-29 | 2020-09-29 | 维沃移动通信有限公司 | 一种移动终端的otg功能的开启方法及移动终端 |
CN107528889A (zh) * | 2017-07-28 | 2017-12-29 | 深圳前海弘稼科技有限公司 | 一种安全操作的控制方法及系统 |
CN110059776A (zh) * | 2018-01-15 | 2019-07-26 | 北京五洲全景信息技术有限公司 | Nfc移动数据采集方案 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010011055A2 (en) * | 2008-07-20 | 2010-01-28 | Samsung Electronics Co., Ltd. | Method and system for managing multiple applications in near field communication |
CN102143493A (zh) * | 2011-01-26 | 2011-08-03 | 惠州Tcl移动通信有限公司 | 一种具有用户管理功能的移动通信终端及其用户管理方法 |
CN102883047A (zh) * | 2012-08-31 | 2013-01-16 | 惠州Tcl移动通信有限公司 | 实现智能移动终端数据安全的方法及系统 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8014721B2 (en) * | 2008-10-20 | 2011-09-06 | Sony Ericsson Mobile Communications Ab | Setting mobile device operating mode using near field communication |
US8346210B2 (en) * | 2009-02-27 | 2013-01-01 | Nokia Corporation | Method and apparatus for managing services using bearer tags |
CN101674367A (zh) * | 2009-09-17 | 2010-03-17 | 宇龙计算机通信科技(深圳)有限公司 | 一种nfc移动终端的解锁方法及系统 |
CN101790183A (zh) * | 2010-01-25 | 2010-07-28 | 中兴通讯股份有限公司 | 模式选择方法、移动终端及系统 |
US20120139690A1 (en) * | 2010-12-06 | 2012-06-07 | Microsoft Corporation | Context dependent computer operation |
-
2012
- 2012-08-31 CN CN2012103177184A patent/CN102883047A/zh active Pending
-
2013
- 2013-06-28 WO PCT/CN2013/078449 patent/WO2014032471A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010011055A2 (en) * | 2008-07-20 | 2010-01-28 | Samsung Electronics Co., Ltd. | Method and system for managing multiple applications in near field communication |
CN102143493A (zh) * | 2011-01-26 | 2011-08-03 | 惠州Tcl移动通信有限公司 | 一种具有用户管理功能的移动通信终端及其用户管理方法 |
CN102883047A (zh) * | 2012-08-31 | 2013-01-16 | 惠州Tcl移动通信有限公司 | 实现智能移动终端数据安全的方法及系统 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104834880A (zh) * | 2015-05-07 | 2015-08-12 | 惠州Tcl移动通信有限公司 | 一种基于nfc移动终端的卡检测方法及系统 |
CN104834880B (zh) * | 2015-05-07 | 2017-09-05 | 惠州Tcl移动通信有限公司 | 一种基于nfc移动终端的卡检测方法及系统 |
CN111654848A (zh) * | 2020-05-27 | 2020-09-11 | 惠州Tcl移动通信有限公司 | Nfc卡检测方法、装置、存储介质及移动终端 |
CN111654848B (zh) * | 2020-05-27 | 2023-11-10 | 拉萨金领腾电子科技有限公司 | Nfc卡检测方法、装置、存储介质及移动终端 |
Also Published As
Publication number | Publication date |
---|---|
CN102883047A (zh) | 2013-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014032471A1 (zh) | 用于移动终端的安全通信方法及移动终端 | |
US10078599B2 (en) | Application access control method and electronic apparatus implementing the same | |
WO2017034312A1 (en) | Apparatus and method for trusted execution environment based secure payment transactions | |
TWI546749B (zh) | 提高電子支付安全性的方法及裝置 | |
TWI537765B (zh) | 板上小型應用程式移轉 | |
WO2017041599A1 (zh) | 业务处理方法及电子设备 | |
US20160286391A1 (en) | Spoofing protection for secure-element identifiers | |
WO2015180281A1 (zh) | 移动终端的基于指纹识别用户权限的判别方法和判断系统 | |
WO2020253804A1 (zh) | 一种解锁方法及电子设备 | |
WO2017071329A1 (zh) | 密码管理方法、密码管理系统及终端设备 | |
WO2016000311A1 (zh) | 移动终端的基于虹膜识别技术的用户模式控制方法及系统 | |
WO2012065557A1 (zh) | 保护设备中存储的数据的方法和相应的设备 | |
WO2017122980A1 (en) | Electronic device and method for authenticating identification information thereof | |
WO2019184740A1 (zh) | 数据加密、解密方法及装置 | |
CN107196901A (zh) | 一种身份注册及认证的方法及装置 | |
WO2018018781A1 (zh) | Sim卡信息传输方法及装置、计算机存储介质 | |
CN112165704A (zh) | 信息共享方法、耳机盒及计算机可读存储介质 | |
US20210288797A1 (en) | Encrypted photographing method and system based on fingerprint recognition | |
US20230075275A1 (en) | Secure pairing and pairing lock for accessory devices | |
CN112636914A (zh) | 一种身份验证方法、身份验证装置及智能卡 | |
WO2020190099A1 (en) | Electronic device for managing personal information and operating method thereof | |
CN106600768A (zh) | 智能门锁验证方法、装置和终端 | |
US20240064519A1 (en) | Method and apparatus for verifying personal identification number pin code | |
US11238136B2 (en) | Detecting unauthorized access to secure devices | |
CN115623486A (zh) | 个人身份识别码pin码的处理方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13833355 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13833355 Country of ref document: EP Kind code of ref document: A1 |