WO2015007184A1 - 多应用智能卡及智能卡多应用管理方法 - Google Patents

多应用智能卡及智能卡多应用管理方法 Download PDF

Info

Publication number
WO2015007184A1
WO2015007184A1 PCT/CN2014/082025 CN2014082025W WO2015007184A1 WO 2015007184 A1 WO2015007184 A1 WO 2015007184A1 CN 2014082025 W CN2014082025 W CN 2014082025W WO 2015007184 A1 WO2015007184 A1 WO 2015007184A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
security domain
application security
verification
smart card
Prior art date
Application number
PCT/CN2014/082025
Other languages
English (en)
French (fr)
Inventor
严翔翔
周钰
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2015007184A1 publication Critical patent/WO2015007184A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3574Multiple applications on card

Definitions

  • the present invention relates to a smart card and smart card management method, and more particularly to a multi-application smart card and a smart card multi-application management method. Background technique
  • the management platform of the multi-application smart card is based on the security domain, that is, each application in the smart card has a corresponding security domain (which is the owner of the application (ie, the service provider) on the card.
  • the representative in other words, is the agent of the card-out entity on the card, which can provide an operational management environment and resources for the application of the particular service provider, for example, it can perform loading, installation and deletion operations of the application).
  • Such smart cards contain a primary security domain (eg, created by the primary card issuer) and a secondary security domain (eg, a child security domain established by other service providers within the primary security domain or a secondary security domain established through a proxy) From the security domain attached to the primary security domain, that is, the permissions from the security domain are granted by the primary security domain, which leads to the following results:
  • Each application security domain is not an equal relationship, and for a smart card, multiple service providers cannot As an equal issue card body.
  • the present invention proposes a multi-application smart card and a smart card multi-application capable of making each application security domain on the smart card have an equal relationship and multiple service providers can serve as equal issuers. Management method.
  • a multi-application smart card includes an application security domain management module and at least An existing application security domain, each of the at least one existing application security domain being associated with a different application provider,
  • the application security domain management module receives an application security domain creation instruction from a new application provider, and constructs an application security domain creation verification request based on the received application security domain creation instruction and creates the application security domain.
  • the verification request is transmitted to an associated existing application security domain, which then performs a decision operation based on the verification result transmitted back by the associated existing application security domain, and if the result of the decision operation is "Allow creation", then create a new application security domain associated with the new application provider, if the result of the decision operation is "not allowed to create”, then no creation is associated with the new application provider a new application security domain, each of the at least one existing application security domain performing a verification operation upon receiving the application security domain creation verification request, and transmitting the verification result back to the application security Domain management module.
  • the application security domain management module performs the decision operation based on a predetermined arbitration rule.
  • the application security domain management module receives the respectively sent by the new application provider Configuring a plurality of application security domain creation instructions of the plurality of existing application security domains, and respectively constructing a verification request based on each of the plurality of application security domain creation instructions and creating the plurality of application security domains
  • the application security domain creates each of the authentication requests to the corresponding existing application security domain.
  • the application security domain creation instruction includes the following items: a verification agent application security domain name, an application security security pre-name to be built, an application security domain space size to be built, and an application security domain verification to be built. Capability indication and application security domain authentication information to be built.
  • the application security domain creation verification request includes the to-be-established application security domain verification information, and the application security domain management module creates an application security domain according to the authenticator application security domain name.
  • the verification request is delivered to the appropriate application security domain.
  • the related existing application security domain performs a verification operation based on the to-be-established application security domain verification information, and transmits the verification result back to the application security domain management module.
  • the predetermined decision rule is that the result of the following decision rule is "verification pass", and the result of the decision operation is "allow creation”; (2) as long as all existing applications are secure If half of the verification results or more than half of the verification results transmitted by the domain are "verified by”, the result of the decision operation is "allow creation”; (3) only transmitted back in all existing application security domains.
  • the result of the judgment operation in the case where the verification result is "verification pass” is "allow creation".
  • the initial at least one application security domain is created by the initial issuer when the multi-application smart card is issued.
  • each of the existing application security domains can only be deleted by the application provider associated with it without the consent of any other existing application security domains.
  • a smart card multi-application management method comprising the following steps: (1) receiving an application security domain creation instruction from a new application provider, and constructing an application based on the received application security domain creation instruction The security domain creates an authentication request and transmits the application security domain creation verification request to an associated existing application security domain, wherein each of the existing application security domains is associated with a different application provider;
  • each of the associated existing application security domains performs a verification operation after receiving the application security domain creation verification request, and transmits the verification result back; and if the result of the decision operation is "allowed Create ", then create a new application security domain associated with the new application provider, if the result of the decision operation is "not allowed to create", then no association with the new application provider is created New application security domain.
  • the multi-application smart card and the smart card multi-application management method disclosed by the invention have the following advantages: (1) enabling each application security domain on the smart card to have an equal relationship; (2) multiple service providers can be substantially equal.
  • the card issuing body can significantly reduce secondary card issuance, thereby reducing costs.
  • FIG. 1 is a schematic structural diagram of a multi-application smart card according to an embodiment of the present invention.
  • FIG. 2 is a flow chart of a smart card multi-application management method in accordance with an embodiment of the present invention. detailed description
  • the multi-application smart card disclosed by the present invention includes an application security domain management module 1 and at least one existing application security domain 2, each of the at least one existing application security domain 2 being different from each other.
  • the application provider is associated.
  • the application security domain management module 1 receives an application provider (ie, a service provider) from a new application provider (ie, a new application security domain is to be created on the smart card, the application provider is different from the at least An application security domain creation instruction of each associated application provider in an existing application security domain 2, and constructing an application security domain creation verification request based on the received application security domain creation instruction and creating the verification request
  • the security domain creation verification request is transmitted to the associated existing application security domain 2, which then performs a decision operation based on the verification result transmitted back by the associated existing application security domain 2, and if The result of the decision operation is "allow creation", then a new application security domain 2 associated with the new application provider is created, and if the result of the decision operation is "not allowed to create", then no creation is created.
  • a new application security domain 2 associated with the new application provider Each of the at least one existing application security domain 2 performs a verification operation in response to receiving the application security domain creation verification request, and transmits the verification result back to the application security domain management module 1.
  • the application security domain management module 1 performs the decision operation based on a predetermined decision rule (exemplarily, the predetermined decision rule is issued at an initial issuer) It is set when multiple smart cards are applied, and is not changeable afterwards).
  • a predetermined decision rule exemplarily, the predetermined decision rule is issued at an initial issuer
  • the application security domain management module 1 receives the new application provider to send Creating instructions for a plurality of application security domains of the plurality of existing application security domains 2 involved, and respectively constructing verification requests based on each of the plurality of application security domain creation instructions And each of the plurality of application security domains creates an authentication request Go to the corresponding existing application security domain 2.
  • the application security domain creation instruction includes the following items: a verification agent application security domain name, an application security security pre-name to be built, an application security domain space size to be built, and an application to be built.
  • the security domain verification capability indication and the application security domain verification information to be built indicates whether the new application security domain to be built has the capability of performing a verification operation.
  • the application security domain creation verification request includes the to-be-established application security domain verification information, and the application security domain management module 1 according to the authenticator application security domain name
  • the application security domain creation verification request is transmitted to the corresponding application security domain 2 (ie, the application security domain 2 indicated by the authenticator application security domain name).
  • the related existing application security domain 2 performs a verification operation based on the to-be-established application security domain verification information, and transmits the verification result back to the application security domain.
  • Management module 1 Exemplarily, the application security domain verification information to be built is in the form of a verification code.
  • the predetermined decision rule is one of the following decision rules: (1) As long as there is one verification in the verification result transmitted back by all existing application security domains 2 The result is "verification pass”, then the result of the decision operation is "allow creation” (ie one vote is passed); (2) as long as half of the verification results transmitted by all existing application security domains 2 are more than half of the verification results The result of the verification is "Verification Pass”, and the result of the decision operation is "Allow creation”. The result of the decision operation is "Allow creation" (ie, full ticket pass).
  • the initial at least one application security domain is preferably, in the multi-application smart card disclosed by the present invention.
  • each of the existing application security domains 2 can only be deleted by the application provider associated with it without the consent of any other existing application security domains 2. .
  • the multi-application smart card disclosed by the present invention has the following advantages: (1) enables each application security domain on the smart card to have an equal relationship; (2) multiple service providers can substantially act as Equal issuance of the card body, which can significantly reduce secondary card issuance, thereby reducing costs.
  • the smart card multi-application management method disclosed by the present invention includes the following steps: 1) receiving an application provider from a new application provider (ie, creating a new application security domain on the smart card) And applying an application security domain creation instruction based on the received application security domain creation instruction, and transmitting the application security domain creation verification request to the related existing application security domain, wherein Each of the existing application security domains is associated with a different application provider; 2) each of the associated existing application security domains receives an authentication request from the application security domain Performing a verification operation and transmitting back the verification result; (A3) based on the result of the operation being "allow creation", creating a new application security domain associated with the new application provider, if the result of the decision operation Is "not allowed to create", then no new application security domain associated with the new application provider is created.
  • the decision operation is performed based on a predetermined decision rule (exemplarily, the predetermined decision rule is set when the initial issuer issues the multi-application smart card Fixed, and then unchangeable).
  • the new application provider is received in the step (A1). Sending, respectively, a plurality of application security domain creation instructions for the plurality of existing application security domains involved, and respectively constructing a verification request based on each of the plurality of application security domain creation instructions And transmitting each of the plurality of application security domain creation verification requests to a corresponding existing application security domain.
  • the application security domain creation instruction includes the following items: a verification agent application security domain name, an application security security pre-name to be built, an application security domain space size to be built, and a to-be-built
  • the application security domain verification capability indication and the application security domain verification information to be built are established.
  • the "application security domain verification capability indication to be built" indicates whether the new application security domain to be built has the capability of performing a verification operation.
  • the application security domain is created.
  • the verification request includes the application security domain verification information to be built, and the application security domain creation verification request is transmitted to the corresponding application security domain according to the authenticator application security domain name in step (A1) (ie, the verification party App security domain indicated by the application security domain name).
  • the related existing application security domain performs a verification operation based on the to-be-established application security domain verification information.
  • the to-be-built application security domain verification information is in the form of a verification code.
  • the predetermined decision rule is one of the following decision rules: (1) as long as one of the verification results transmitted back by all existing application security domains exists The result of the verification is "verification pass”, then the result of the decision operation is "allow creation” (ie one vote is passed); (2) as long as half of the verification results transmitted by all existing application security domains are more than half of the verification results The result of the verification is "Verification Pass”, and the result of the decision operation is "Allow Yes" to verify the result of the decision operation is "Allow creation” (ie, full ticket pass).
  • the initial at least one application security domain is created by the initial card issuer when the multi-application smart card is issued (which subsequently assists in creating subsequent applications by performing a verification operation).
  • Security domain is created by the initial card issuer when the multi-application smart card is issued (which subsequently assists in creating subsequent applications by performing a verification operation).
  • each of the existing application security domains can only be deleted by the associated application provider without the consent of any other existing application security domains. .
  • the smart card multi-application management method disclosed by the present invention has the following advantages: (1) enabling each application security domain on the smart card to have an equal relationship; (2) multiple service providers can be substantially equal.
  • the card issuing body can significantly reduce the secondary card issuance, thereby reducing the cost.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种多应用智能卡及智能卡多应用管理方法。其中,所述多应用智能卡包括应用安全域管理模块以及至少一个已存在的应用安全域,所述至少一个已存在的应用安全域中的每个各自与不同的应用提供方相关联,并且其中,所述至少一个已存在的应用安全域协助所述应用安全域管理模块创建新的应用安全域。上述多应用智能卡及智能卡多应用管理方法能够使智能卡上的每个应用安全域具有平等的关系并且多个服务提供方可以作为平等的发卡主体。

Description

多应用智能卡及智能卡多应用管理方法 技术领域
本发明涉及智能卡及智能卡管理方法, 更具体地, 涉及多应用智能卡及智 能卡多应用管理方法。 背景技术
目前,随着计算机和网络应用的日益广泛以及不同领域的业务种类的日益 丰富, 对多应用智能卡的管理变得越来越重要。
在现有的技术方案中, 多应用智能卡的管理平台是基于安全域的,即智能 卡中的每个应用都具有相应的安全域(其是该应用的拥有者 (即服务提供方) 在卡上的代表, 换句话说, 其是卡外实体在卡上的代理, 其能够为特定的服务 提供方的应用提供运行管理环境及资源, 例如, 其可以执行应用的装载、 安装 及删除操作)。
然而,这样的智能卡包含主安全域(例如由主发卡方创建)和从安全域(例 如由其他服务提供方在所述主安全域内的建立的的子安全域或通过代理建立 的辅助安全域), 从安全域依附于主安全域, 即从安全域的权限由主安全域赋 予, 这导致如下结果: 各个应用安全域不是平等的关系, 并且针对一张智能卡 而言, 多个服务提供方不能作为平等的发卡主体。
因此,存在如下需求: 提供能够使智能卡上的每个应用安全域具有平等的 关系并且多个服务提供方可以作为平等的发卡主体的多应用智能卡及智能卡 多应用管理方法。 发明内容
为了解决上述现有技术方案所存在的问题,本发明提出了能够使智能卡上 的每个应用安全域具有平等的关系并且多个服务提供方可以作为平等的发卡 主体的多应用智能卡及智能卡多应用管理方法。
本发明的目的是通过以下技术方案实现的:
一种多应用智能卡,所述多应用智能卡包括应用安全域管理模块以及至少 一个已存在的应用安全域,所述至少一个已存在的应用安全域中的每个各自与 不同的应用提供方相关联,
其中,所述应用安全域管理模块接收来自新的应用提供方的应用安全域创 建指令,以及基于接收到的所述应用安全域创建指令构造应用安全域创建验证 请求并将所述应用安全域创建验证请求传送到相关的已存在的应用安全域,所 述应用安全域管理模块随后基于所述相关的已存在的应用安全域传送回的验 证结果执行判决操作, 并且如果所述判决操作的结果是 "允许创建", 则创建 与所述新的应用提供方相关联的新的应用安全域,如果所述判决操作的结果是 "不允许创建", 则不创建与所述新的应用提供方相关联的新的应用安全域, 所述至少一个已存在的应用安全域中的每个在接收到所述应用安全域创 建验证请求的情况下执行验证操作,并将验证结果传送回所述应用安全域管理 模块。
在上面所公开的方案中,优选地, 所述应用安全域管理模块基于预定的判 决规则执行所述判决操作。
在上面所公开的方案中,优选地,如果所述预定的判决规则涉及多个已存 在的应用安全域,则所述应用安全域管理模块接收所述新的应用提供方发送来 的分别针对所涉及的多个已存在的应用安全域的多个应用安全域创建指令,并 且分别基于所述多个应用安全域创建指令中的每个构造多个应用安全域创建 验证请求并将所述多个应用安全域创建验证请求中的每个传送到相应的已存 在的应用安全域。
在上面所公开的方案中, 优选地, 所述应用安全域创建指令包括下列项: 验证方应用安全域名称、 待建应用安全预名称、 待建应用安全域空间大小、 待 建应用安全域验证能力指示以及待建应用安全域验证信息。
在上面所公开的方案中,优选地,应用安全域创建验证请求包含所述待建 应用安全域验证信息,并且所述应用安全域管理模块根据所述验证方应用安全 域名称将应用安全域创建验证请求传送到相应的应用安全域。
在上面所公开的方案中,优选地, 所述相关的已存在的应用安全域基于所 述待建应用安全域验证信息执行验证操作,并将验证结果传送回所述应用安全 域管理模块。 在上面所公开的方案中,优选地, 所述预定的判决规则是下列判决规则中 结果是 "验证通过", 则判决操作的结果是 "允许创建"; ( 2 )只要所有已存在 的应用安全域传送回的验证结果中一半的验证结果或多于一半的验证结果是 "验证通过", 则判决操作的结果是 "允许创建"; ( 3 )仅在所有已存在的应用 安全域传送回的验证结果均是 "验证通过" 的情况下判决操作的结果是 "允许 创建"。
在上面所公开的方案中,优选地,初始的至少一个应用安全域由初始发卡 方在发行所述多应用智能卡时创建。
在上面所公开的方案中,优选地, 已存在的应用安全域中的每个仅能够被 与其相关联的应用提供方删除, 而无需任何其他已存在的应用安全域的同意。
本发明的目的也可以通过以下技术方案实现:
一种智能卡多应用管理方法, 所述智能卡多应用管理方法包括下列步骤: ( A1 )接收来自新的应用提供方的应用安全域创建指令, 并基于接收到的 所述应用安全域创建指令构造应用安全域创建验证请求并将所述应用安全域 创建验证请求传送到相关的已存在的应用安全域, 其中, 所述已存在的应用安 全域中的每个各自与不同的应用提供方相关联;
( A2 )所述相关的已存在的应用安全域中的每个在接收到所述应用安全域 创建验证请求后执行验证操作, 并传送回验证结果; 且如果所述判决操作的结果是 "允许创建", 则创建与所述新的应用提供方相 关联的新的应用安全域, 如果所述判决操作的结果是 "不允许创建", 则不创 建与所述新的应用提供方相关联的新的应用安全域。
本发明所公开的多应用智能卡及智能卡多应用管理方法具有以下优点: ( 1 )能够使智能卡上的每个应用安全域具有平等的关系; (2 )多个服务提供方 可以实质上作为平等的发卡主体,从而能够显著地减少二次发卡, 由此降低了 成本。 附图说明 结合附图, 本发明的技术特征以及优点将会被本领域技术人员更好地理 解, 其中:
图 1是根据本发明的实施例的多应用智能卡的示意性结构图;
图 2是根据本发明的实施例的智能卡多应用管理方法的流程图。 具体实施方式
图 1是根据本发明的实施例的多应用智能卡的示意性结构图。 如图 1所示, 本发明所公开的多应用智能卡包括应用安全域管理模块 1以及至少一个已存在 的应用安全域 2,所述至少一个已存在的应用安全域 2中的每个各自与不同的应 用提供方相关联。 其中, 所述应用安全域管理模块 1接收来自新的应用提供方 (即要在该智能卡上创建新的应用安全域的应用提供方(即服务提供方), 该应 用提供方不同于所述至少一个已存在的应用安全域 2中的每个所关联的应用提 供方)的应用安全域创建指令, 以及基于接收到的所述应用安全域创建指令构 造应用安全域创建验证请求并将所述应用安全域创建验证请求传送到相关的 已存在的应用安全域 2,所述应用安全域管理模块 1随后基于所述相关的已存在 的应用安全域 2传送回的验证结果执行判决操作, 并且如果所述判决操作的结 果是 "允许创建", 则创建与所述新的应用提供方相关联的新的应用安全域 2, 如果所述判决操作的结果是 "不允许创建", 则不创建与所述新的应用提供方 相关联的新的应用安全域 2。所述至少一个已存在的应用安全域 2中的每个在接 收到所述应用安全域创建验证请求的情况下执行验证操作,并将验证结果传送 回所述应用安全域管理模块 1。
优选地, 在本发明所公开的多应用智能卡中, 所述应用安全域管理模块 1 基于预定的判决规则执行所述判决操作(示例性地, 所述预定的判决规则在初 始发卡方发行所述多应用智能卡时被设定, 并且之后是不可改变的)。
优选地,在本发明所公开的多应用智能卡中,如果所述预定的判决规则涉 及多个已存在的应用安全域 2,则所述应用安全域管理模块 1接收所述新的应用 提供方发送来的分别针对所涉及的多个已存在的应用安全域 2的多个应用安全 域创建指令,并且分别基于所述多个应用安全域创建指令中的每个构造多个应 用安全域创建验证请求并将所述多个应用安全域创建验证请求中的每个传送 到相应的已存在的应用安全域 2。
优选地,在本发明所公开的多应用智能卡中, 所述应用安全域创建指令包 括下列项: 验证方应用安全域名称、 待建应用安全预名称、 待建应用安全域空 间大小、 待建应用安全域验证能力指示以及待建应用安全域验证信息。 其中, 所述 "待建应用安全域验证能力指示"指示待建的新的应用安全域是否具有执 行验证操作的能力。
优选地,在本发明所公开的多应用智能卡中,应用安全域创建验证请求包 含所述待建应用安全域验证信息, 并且所述应用安全域管理模块 1根据所述验 证方应用安全域名称将应用安全域创建验证请求传送到相应的应用安全域 2 (即所述验证方应用安全域名称所指示的应用安全域 2 )。
优选地,在本发明所公开的多应用智能卡中, 所述相关的已存在的应用安 全域 2基于所述待建应用安全域验证信息执行验证操作, 并将验证结果传送回 所述应用安全域管理模块 1。 示例性地, 所述待建应用安全域验证信息是验证 码的形式。
示例性地,在本发明所公开的多应用智能卡中, 所述预定的判决规则是下 列判决规则中的一个: (1 )只要所有已存在的应用安全域 2传送回的验证结果 中存在一个验证结果是 "验证通过", 则判决操作的结果是 "允许创建"(即一 票通过); ( 2 )只要所有已存在的应用安全域 2传送回的验证结果中一半的验证 结果或多于一半的验证结果是 "验证通过", 则判决操作的结果是 "允许创建" 证通过" 的情况下判决操作的结果是 "允许创建" (即全票通过)。
优选地,在本发明所公开的多应用智能卡中,初始的至少一个应用安全域
2由初始发卡方在发行所述多应用智能卡时创建(其随后通过执行验证操作的 方式协助所述应用安全域管理模块 1创建后续的应用安全域 2 )。
优选地, 在本发明所公开的多应用智能卡中, 已存在的应用安全域 2中的 每个仅能够被与其相关联的应用提供方删除,而无需任何其他已存在的应用安 全域 2的同意。
由上可见, 本发明所公开的多应用智能卡具有下列优点: (1 )能够使智能 卡上的每个应用安全域具有平等的关系; ( 2 )多个服务提供方可以实质上作为 平等的发卡主体, 从而能够显著地减少二次发卡, 由此降低了成本。
图 2是根据本发明的实施例的智能卡多应用管理方法的流程图。 如图 2所 示, 本发明所公开的智能卡多应用管理方法包括下列步骤: 1 )接收来自新 的应用提供方(即要在该智能卡上创建新的应用安全域的应用提供方(即服务 供方)的应用安全域创建指令, 并基于接收到的所述应用安全域创建指令构造 应用安全域创建验证请求并将所述应用安全域创建验证请求传送到相关的已 存在的应用安全域, 其中, 所述已存在的应用安全域中的每个各自与不同的应 用提供方相关联; 2 ) 所述相关的已存在的应用安全域中的每个在接收到所 述应用安全域创建验证请求后执行验证操作, 并传送回验证结果; (A3 )基于 操作的结果是 "允许创建", 则创建与所述新的应用提供方相关联的新的应用 安全域, 如果所述判决操作的结果是 "不允许创建", 则不创建与所述新的应 用提供方相关联的新的应用安全域。
优选地,在本发明所公开的智能卡多应用管理方法中,基于预定的判决规 则执行所述判决操作(示例性地, 所述预定的判决规则在初始发卡方发行所述 多应用智能卡时被设定, 并且之后是不可改变的)。
优选地,在本发明所公开的智能卡多应用管理方法中,如果所述预定的判 决规则涉及多个已存在的应用安全域, 则在所述步骤(A1 )中接收所述新的应 用提供方发送来的分别针对所涉及的多个已存在的应用安全域的多个应用安 全域创建指令,并且分别基于所述多个应用安全域创建指令中的每个构造多个 应用安全域创建验证请求并将所述多个应用安全域创建验证请求中的每个传 送到相应的已存在的应用安全域。
优选地,在本发明所公开的智能卡多应用管理方法中, 所述应用安全域创 建指令包括下列项: 验证方应用安全域名称、 待建应用安全预名称、 待建应用 安全域空间大小、 待建应用安全域验证能力指示以及待建应用安全域验证信 息。 其中, 所述 "待建应用安全域验证能力指示"指示待建的新的应用安全域 是否具有执行验证操作的能力。
优选地,在本发明所公开的智能卡多应用管理方法中, 所述应用安全域创 建验证请求包含所述待建应用安全域验证信息, 并且在步骤(A1 )中根据所述 验证方应用安全域名称将应用安全域创建验证请求传送到相应的应用安全域 (即所述验证方应用安全域名称所指示的应用安全域)。
优选地,在本发明所公开的智能卡多应用管理方法中, 所述相关的已存在 的应用安全域基于所述待建应用安全域验证信息执行验证操作。 示例性地, 所 述待建应用安全域验证信息是验证码的形式。
示例性地,在本发明所公开的智能卡多应用管理方法中, 所述预定的判决 规则是下列判决规则中的一个: ( 1 )只要所有已存在的应用安全域传送回的验 证结果中存在一个验证结果是 "验证通过", 则判决操作的结果是 "允许创建" (即一票通过); (2 )只要所有已存在的应用安全域传送回的验证结果中一半的 验证结果或多于一半的验证结果是 "验证通过", 则判决操作的结果是 "允许 是 "验证通过" 的情况下判决操作的结果是 "允许创建" (即全票通过)。
优选地,在本发明所公开的智能卡多应用管理方法中,初始的至少一个应 用安全域由初始发卡方在发行所述多应用智能卡时创建(其随后通过执行验证 操作的方式协助创建后续的应用安全域)。
优选地,在本发明所公开的智能卡多应用管理方法中, 已存在的应用安全 域中的每个仅能够被与其相关联的应用提供方删除,而无需任何其他已存在的 应用安全域的同意。
由上可见, 本发明所公开的智能卡多应用管理方法具有下列优点: (1 )能 够使智能卡上的每个应用安全域具有平等的关系; (2 )多个服务提供方可以实 质上作为平等的发卡主体, 从而能够显著地减少二次发卡, 由此降低了成本。
尽管本发明是通过上述的优选实施方式进行描述的,但是其实现形式并不 局限于上述的实施方式。 应该认识到: 在不脱离本发明主旨和范围的情况下,

Claims

权利要求
1. 一种多应用智能卡, 所述多应用智能卡包括应用安全域管理模块以及 至少一个已存在的应用安全域,所述至少一个已存在的应用安全域中的每个各 自与不同的应用提供方相关联,
其中,所述应用安全域管理模块接收来自新的应用提供方的应用安全域创 建指令,以及基于接收到的所述应用安全域创建指令构造应用安全域创建验证 请求并将所述应用安全域创建验证请求传送到相关的已存在的应用安全域,所 述应用安全域管理模块随后基于所述相关的已存在的应用安全域传送回的验 证结果执行判决操作, 并且如果所述判决操作的结果是 "允许创建", 则创建 与所述新的应用提供方相关联的新的应用安全域,如果所述判决操作的结果是 "不允许创建", 则不创建与所述新的应用提供方相关联的新的应用安全域, 所述至少一个已存在的应用安全域中的每个在接收到所述应用安全域创 建验证请求的情况下执行验证操作,并将验证结果传送回所述应用安全域管理 模块。
2. 根据权利要求 1所述的多应用智能卡, 其特征在于, 所述应用安全域管 理模块基于预定的判决规则执行所述判决操作。
3. 根据权利要求 2所述的多应用智能卡, 其特征在于,如果所述预定的判 决规则涉及多个已存在的应用安全域,则所述应用安全域管理模块接收所述新 的应用提供方发送来的分别针对所涉及的多个已存在的应用安全域的多个应 用安全域创建指令,并且分别基于所述多个应用安全域创建指令中的每个构造 多个应用安全域创建验证请求并将所述多个应用安全域创建验证请求中的每 个传送到相应的已存在的应用安全域。
4. 根据权利要求 3所述的多应用智能卡, 其特征在于, 所述应用安全域创 建指令包括下列项: 验证方应用安全域名称、 待建应用安全预名称、 待建应用 安全域空间大小、 待建应用安全域验证能力指示以及待建应用安全域验证信 息。
5. 根据权利要求 4所述的多应用智能卡, 其特征在于,应用安全域创建验 证请求包含所述待建应用安全域验证信息,并且所述应用安全域管理模块根据 所述验证方应用安全域名称将应用安全域创建验证请求传送到相应的应用安 全域。
6. 根据权利要求 5所述的多应用智能卡, 其特征在于, 所述相关的已存在 的应用安全域基于所述待建应用安全域验证信息执行验证操作,并将验证结果 传送回所述应用安全域管理模块。
7. 根据权利要求 6所述的多应用智能卡, 其特征在于, 所述预定的判决规 则是下列判决规则中的一个: ( 1 )只要所有已存在的应用安全域传送回的验证 结果中存在一个验证结果是 "验证通过", 则判决操作的结果是 "允许创建"; ( 2 )只要所有已存在的应用安全域传送回的验证结果中一半的验证结果或多于 一半的验证结果是 "验证通过", 则判决操作的结果是 "允许创建"; (3 )仅在 所有已存在的应用安全域传送回的验证结果均是 "验证通过"的情况下判决操 作的结果是 "允许创建"。
8. 根据权利要求 7所述的多应用智能卡, 其特征在于,初始的至少一个应 用安全域由初始发卡方在发行所述多应用智能卡时创建。
9. 根据权利要求 8所述的多应用智能卡, 其特征在于, 已存在的应用安全 域中的每个仅能够被与其相关联的应用提供方删除,而无需任何其他已存在的 应用安全域的同意。
10. —种智能卡多应用管理方法,所述智能卡多应用管理方法包括下列步 骤:
( A1 )接收来自新的应用提供方的应用安全域创建指令, 并基于接收到的 所述应用安全域创建指令构造应用安全域创建验证请求并将所述应用安全域 创建验证请求传送到相关的已存在的应用安全域, 其中, 所述已存在的应用安 全域中的每个各自与不同的应用提供方相关联;
( A2 )所述相关的已存在的应用安全域中的每个在接收到所述应用安全域 创建验证请求后执行验证操作, 并传送回验证结果; 作, 并且如果所述判决操作的结果是 "允许创建", 则创建与所述新的应 用提供方相关联的新的应用安全域, 如果所述判决操作的结果是 "不允 许创建", 则不创建与所述新的应用提供方相关联的新的应用安全域。
PCT/CN2014/082025 2013-07-15 2014-07-11 多应用智能卡及智能卡多应用管理方法 WO2015007184A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310295226.4 2013-07-15
CN201310295226.4A CN104301284A (zh) 2013-07-15 2013-07-15 多应用智能卡及智能卡多应用管理方法

Publications (1)

Publication Number Publication Date
WO2015007184A1 true WO2015007184A1 (zh) 2015-01-22

Family

ID=52320856

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/082025 WO2015007184A1 (zh) 2013-07-15 2014-07-11 多应用智能卡及智能卡多应用管理方法

Country Status (2)

Country Link
CN (1) CN104301284A (zh)
WO (1) WO2015007184A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203578B (zh) * 2015-05-08 2019-03-01 北京数码视讯科技股份有限公司 一种智能卡、智能卡应用的安全服务调用方法及装置
CN106789074B (zh) * 2016-12-27 2020-08-25 广州智慧城市发展研究院 一种Java卡的应用身份验证方法及验证系统
CN108304716A (zh) * 2017-01-13 2018-07-20 国民技术股份有限公司 多应用智能卡及其应用管理方法、通信系统及通信方法
CN109885351B (zh) * 2019-01-22 2021-09-28 飞天诚信科技股份有限公司 一种多应用智能卡及其建立主从应用关系的方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101164086A (zh) * 2005-03-07 2008-04-16 诺基亚公司 能够使用无线网络实现信用卡个人化的方法、系统和移动设备
CN101511051A (zh) * 2008-12-31 2009-08-19 北京握奇数据系统有限公司 电信智能卡的应用业务下载方法、系统及设备
CN102025710A (zh) * 2009-09-11 2011-04-20 中国银联股份有限公司 多应用智能卡及智能卡多应用管理系统和方法
CN102118385A (zh) * 2010-12-14 2011-07-06 北京握奇数据系统有限公司 安全域的管理方法和装置
WO2012078570A2 (en) * 2010-12-06 2012-06-14 Interdigital Patent Holdings, Inc. Smart card with domain-trust evaluation and domain policy management functions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101164086A (zh) * 2005-03-07 2008-04-16 诺基亚公司 能够使用无线网络实现信用卡个人化的方法、系统和移动设备
CN101511051A (zh) * 2008-12-31 2009-08-19 北京握奇数据系统有限公司 电信智能卡的应用业务下载方法、系统及设备
CN102025710A (zh) * 2009-09-11 2011-04-20 中国银联股份有限公司 多应用智能卡及智能卡多应用管理系统和方法
WO2012078570A2 (en) * 2010-12-06 2012-06-14 Interdigital Patent Holdings, Inc. Smart card with domain-trust evaluation and domain policy management functions
CN102118385A (zh) * 2010-12-14 2011-07-06 北京握奇数据系统有限公司 安全域的管理方法和装置

Also Published As

Publication number Publication date
CN104301284A (zh) 2015-01-21

Similar Documents

Publication Publication Date Title
JP7236992B2 (ja) ブロックチェーンにより実現される方法及びシステム
CN110457875B (zh) 基于区块链的数据授权方法及装置
TWI534731B (zh) 用於資產之安全元件交易及管理之裝置及方法
US9934014B2 (en) Automatic purposed-application creation
US8621203B2 (en) Method and apparatus for authenticating a mobile device
JP5624681B2 (ja) アプリケーション使用ポリシーの施行
JP5823467B2 (ja) 鍵供託サービスを使用してユーザーが安全なサービスプロバイダの中から選択できるようにすること
WO2019050527A1 (en) SYSTEM AND METHOD FOR GENERATING TRUSTED TOKENS
US10536271B1 (en) Silicon key attestation
US20140259004A1 (en) System for trusted application deployment
US9191212B2 (en) Controlling application access to mobile device functions
US20200228320A1 (en) Method and apparatus for providing service using kiosk
US20140259003A1 (en) Method for trusted application deployment
TW201843635A (zh) 基於區塊鏈智能合約的kyc資料共享系統及其方法
WO2015007184A1 (zh) 多应用智能卡及智能卡多应用管理方法
TW201913529A (zh) 基於區塊鏈智能合約的函證系統及其方法
CN105743651A (zh) 芯片安全域的卡应用使用方法、装置和应用终端
US20140150116A1 (en) Controlling release of secure data
Akram et al. A novel consumer-centric card management architecture and potential security issues
WO2022100658A1 (zh) 一种更改安全模块中密钥的方法及系统
WO2014063632A1 (zh) 多应用智能卡管理系统及方法
KR101581663B1 (ko) 공인인증기관 연동 인증 및 부인 방지 방법 및 시스템
WO2020119477A1 (zh) 一种基于区块链的身份认证方法及终端设备
KR102419311B1 (ko) 신뢰실행 환경 및 블록체인 기반 프라이버시 강화 자기주권 신원증명 시스템 및 방법
KR102393537B1 (ko) 신뢰실행환경에 기반한 소프트웨어 라이선스 관리 방법 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14826800

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/05/2016)

122 Ep: pct application non-entry in european phase

Ref document number: 14826800

Country of ref document: EP

Kind code of ref document: A1