WO2017080351A1 - 动态加载应用的系统和方法 - Google Patents

动态加载应用的系统和方法 Download PDF

Info

Publication number
WO2017080351A1
WO2017080351A1 PCT/CN2016/102841 CN2016102841W WO2017080351A1 WO 2017080351 A1 WO2017080351 A1 WO 2017080351A1 CN 2016102841 W CN2016102841 W CN 2016102841W WO 2017080351 A1 WO2017080351 A1 WO 2017080351A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
application
wearable smart
service management
management platform
Prior art date
Application number
PCT/CN2016/102841
Other languages
English (en)
French (fr)
Inventor
王根平
Original Assignee
国民技术股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 国民技术股份有限公司 filed Critical 国民技术股份有限公司
Publication of WO2017080351A1 publication Critical patent/WO2017080351A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Definitions

  • the present invention relates to wearable smart devices and, more particularly, to systems and methods for dynamically loading applications for wearable smart devices.
  • Wearable smart devices can be used for health monitoring, motion detection, location location, telephone communication, subway bus cards, payment authentication, etc., so wearable devices are more and more popular.
  • the security of the application especially the security of the pipeline and management of dynamic downloading in the financial related field must be guaranteed.
  • the invention provides a system and a method for dynamically loading an application, which can implement dynamic loading and security management of an application for a wearable smart device configured with a low-end hardware.
  • a system for dynamically loading an application includes: a wearable smart device; a terminal device for downloading an application for the wearable smart device; and a trusted service management platform connected to the terminal device through the network, Trust service management platform is used to set up the terminal An application is available.
  • the wearable smart device communicates with the terminal device via Bluetooth, WiFi (Wireless Fidelity), ZigBee, USB (Universal Serial Bus) or ISO7816 (Standard Protocol) channels.
  • WiFi Wireless Fidelity
  • ZigBee Wireless Fidelity
  • USB Universal Serial Bus
  • ISO7816 Standard Protocol
  • the wearable smart device includes: a communication module for communicating with the terminal device; a storage module for storing the application downloaded by the terminal device; and a security module for completing the authentication of the wearable smart device by the trusted service management platform operating.
  • the trust service management platform includes: an application release management device for managing an application provider, an application provided by an application provider, and an application-related service for the user; and a security module management device for controlling and managing the trust service management The security of application data in the platform.
  • a method for dynamically loading an application includes: establishing a connection between a wearable smart device and a terminal device; transmitting, by the terminal device, a request to download an application to a trusted service management platform; The smart device performs verification; and in the case where the authentication is passed, the terminal device downloads the application from the trusted service management platform.
  • the establishing, by the wearable smart device, the connection with the terminal device comprises: the terminal device sending a connection request to the wearable smart device; and the wearable smart device replying to the connection request to establish a connection with the terminal device, wherein the wearable smart device passes the Bluetooth, WiFi (Wireless Fidelity), ZigBee, USB (Universal Serial Bus) or ISO7816 (Standard Protocol) channels communicate with the terminal device.
  • WiFi Wireless Fidelity
  • ZigBee ZigBee
  • USB Universal Serial Bus
  • ISO7816 Standard Protocol
  • the trust service management platform performs verification on the wearable smart device, including: the trust service management platform sends a security authentication request to the terminal device; the terminal device sends the security authentication request to the wearable smart device; the wearable smart device processes the authentication request and The terminal device provides the authentication information; the terminal device sends the authentication information to the trusted service management platform; the trusted service management platform processes the authentication information and feeds back the authentication result to the terminal device; and in the case that the authentication is passed, the trusted service management platform and the terminal device Establish a download channel.
  • the authentication information includes a security domain key, personal identity authentication information, device security information, and device storage resource information of each trust service management platform.
  • the downloading, by the terminal device, the application from the trusted service management platform comprises: sending, by the terminal device, the downloading application identifier to the trusted service management platform; the trusted service management platform transmitting the response to the terminal device And the terminal device transmits the application data to the wearable smart device.
  • the method further includes: the wearable smart device receives the application data; and the wearable smart device returns the result of the application loading to the terminal device and the trusted service management platform.
  • the present invention downloads an application for a wearable smart device through a terminal device, and can implement dynamic loading and security management of an application for a wearable smart device configured with a low-end hardware.
  • FIG. 1 is a block diagram of a system for dynamically loading an application in accordance with the present invention.
  • FIG. 2 is a schematic diagram of a system for dynamically loading an application using a smart wristband and a mobile phone as an example in accordance with the present invention.
  • FIG. 3 is a flow chart of a method of dynamically loading an application in accordance with the present invention.
  • FIG. 4 is a flow chart showing in detail a method of dynamically loading an application according to an embodiment of the present invention.
  • 1 is a block diagram of a system for dynamically loading an application in accordance with the present invention.
  • 2 is a schematic diagram of a system for dynamically loading an application using a smart wristband and a mobile phone as an example in accordance with the present invention.
  • the dynamic loading application system 10 of the present invention includes: a wearable smart device 12; a terminal device 14 for downloading an application for the wearable smart device 10; and a trusted service management platform 16, through the network and the terminal device 14
  • a TSM (Trusted Service Management) 16 is used to provide an application to the terminal device 14.
  • the wearable smart device referred to herein can communicate with the terminal device through a wireless channel (such as Bluetooth, WiFi, ZigBee channel, etc.) and a wired channel (such as USB, ISO7816 channel, etc.).
  • a wireless channel such as Bluetooth, WiFi, ZigBee channel, etc.
  • a wired channel such as USB, ISO7816 channel, etc.
  • the terminal device referred to herein may be a terminal device such as a mobile phone, a tablet computer, a desktop computer, a notebook computer, or the like, but is not limited thereto, and any terminal device applicable to the system and method of the present invention is included in the scope of the present invention.
  • the wearable smart device mentioned in this article can be a smart watch, a smart bracelet, and multiple functions. It is possible to use a java card or the like, but is not limited thereto, and any wearable smart device applicable to the present invention is included in the scope of the present invention.
  • the smart bracelet is used as a wearable smart device and the mobile phone is used as a terminal device to illustrate the system of the present invention.
  • the TSM can transmit the application to the mobile terminal through the network, and the mobile terminal downloads the application to the smart bracelet through a communication channel such as Bluetooth or WiFi or ZigBee.
  • the internal program architecture of the wearable smart device (such as a smart watch/bracelet, multi-function java card) is from bottom to top: chip processor, java virtual machine, java API interface. And java applications, where the java application is the dynamically loaded application mentioned in the present invention.
  • the wearable smart device has a communication module, a storage module, and a power module connected to the main control chip in addition to the main control chip, wherein the power module supplies power to other modules.
  • the frequency of the main control module can be as low as several tens of MHz to run the architecture;
  • the communication module can communicate with the terminal device, and can use Bluetooth, WiFi (Wireless Fidelity), ZigBee (Zibe), USB Communication method such as (Universal Serial Bus) or ISO7816 (standard protocol);
  • the storage module stores stored programs, applications, authentication information, etc., and the program and multiple applications such as virtual machines can be realized within 1MByte. Storage management.
  • the wearable smart device further includes a security module, configured to complete an authentication operation of the wearable smart device by the trusted service management platform, for example, receiving an authentication request from the TSM platform when downloading the application, processing the authentication request, and providing the authentication information.
  • Terminal devices (such as mobile phones, mobile terminals such as PADs, or non-mobile terminals such as desktop computers and notebook computers) serve as intermediate hubs for interface management and communication of human-computer interaction, and can communicate with wearable smart devices under the pair.
  • the TSM platform communicates and can also be managed with an application control management application as an interpersonal interface.
  • the TSM platform provides a direct security bridge between various service providers and users, and includes: application release management devices for managing application providers, auditing applications provided by application providers, and providing application-related services to users; and security modules.
  • a management device for controlling and managing the security of application data in the trusted service management platform.
  • the application release management device is used as a third-party management platform, which mainly provides access to the service platform, registers, audits, and configures the application provider, and is responsible for reviewing the legality, security, and application of the application provided by the application provider.
  • Normative providing management and security domain management Management and distribution, and also provide users with the responsibility of registration, cancellation, exit, and application data query, backup, loss reporting, and re-issuance.
  • the security module management device has the following functions: controlling and managing the master key of the security application; loading, installing, or deleting the application data and supporting account data in the security module by means of over-the-air downloading; and performing security module application information Unified management, including data information management, secure channel management, and secure application management.
  • the method proposed by the present invention is: after the terminal device establishes a connection with the wearable smart terminal, the application management program APP of the terminal device issues a request for downloading the application, and the wearable smart terminal sends the authentication data to the TSM platform through the terminal device.
  • the TSM platform obtains the authentication information and downloads the application authorization to the terminal device after the authentication succeeds.
  • the terminal device sends the logo of the downloaded application to the TSM platform, and the TSM platform transmits the corresponding application to the terminal device according to the application identifier, and then the terminal device downloads the application again. Go to the wearable smart terminal.
  • FIG. 3 is a flow chart of a method of dynamically loading an application in accordance with the present invention.
  • the dynamic loading application method includes: Step S30, the wearable smart device establishes a connection with the terminal device; S32, the terminal device sends a request for downloading the application to the trusted service management platform; S34, the trusted service management platform The wearable smart device is authenticated; and S36, in the case that the authentication is passed, the terminal device downloads the application from the trusted service management platform.
  • establishing, by the wearable smart device, the connection with the terminal device includes: the terminal device sends a connection request to the wearable smart device; and the wearable smart device answers the connection request to establish a connection with the terminal device, wherein the wearable smart device passes the Bluetooth, the WiFi ( Channels such as Wireless Fidelity, ZigBee, USB (Universal Serial Bus), or ISO7816 (Standard Protocol) communicate with end devices.
  • the wearable smart device passes the Bluetooth, the WiFi ( Channels such as Wireless Fidelity, ZigBee, USB (Universal Serial Bus), or ISO7816 (Standard Protocol) communicate with end devices.
  • the trust service management platform performs verification on the wearable smart device, including: the trust service management platform sends a security authentication request to the terminal device; the terminal device sends the security authentication request to the wearable smart device; the wearable smart device processes the authentication request and sends the authentication request to the terminal
  • the device provides the authentication information; the terminal device sends the authentication information to the trusted service management platform; the trusted service management platform processes the authentication information and feeds back the authentication result to the terminal device; and, in the case of the authentication, between the trusted service management platform and the terminal device Create a download channel.
  • the wearable smart device processes the authentication request, including decrypting the authentication request, determining which authentication information is needed by the TSM platform, and the like. This is well known to those skilled in the art and therefore will not be described in detail.
  • the authentication information mentioned herein includes the security domain key of each trust service management platform, personal identity authentication information, device security information, device storage resource information, etc., and the authentication information is pre-stored in the wearable smart device. .
  • the terminal device downloading the application from the trust service management platform includes: the terminal device sends a download application flag to the trust service management platform; the trust service management platform sends the application data to the terminal device; and the terminal device sends the application data to the wearable smart device.
  • the method further includes: the wearable smart device receives the application data; and the wearable smart device returns the result of the application loading to the terminal device and the trusted service management platform.
  • the wearable smart device needs to store and process the application data after receiving the application data, and the processing herein includes processing the application data, storing it at the relevant address, etc., which is known to those skilled in the art. It is well known and therefore will not be described in detail.
  • FIG. 4 is a flow chart showing in detail a method of dynamically loading an application according to an embodiment of the present invention, including the following steps:
  • the first step the terminal device establishes a connection with the wearable smart device
  • the second step the application management program APP of the terminal device sends a request for downloading the application to the TSM, and after receiving the request, the TSM sends a security authentication request for the wearable smart device;
  • the third step through the terminal device transparent transmission, the wearable smart device receives the authentication request and processes the authentication request, and then sends the relevant authentication information to the TSM;
  • Step 4 TSM authenticates the legality and security of the wearable smart device, and feeds back the result to the terminal device. If the authentication passes, the entire download channel is established.
  • Step 5 The terminal device sends a download application identifier corresponding to the downloaded application to the TSM platform, and the TSM responds to the download application request to find the relevant application data, and sends the relevant application data to the terminal device;
  • Step 6 The terminal device transmits the data to the wearable smart device, and the wearable smart device receives, stores, and processes the related application.
  • the backhaul response information may be added after the sixth step, that is, the wearable smart device sends the result of the application loading to the terminal device and the TSM.
  • the terminal needs to be The download channel between the device and the TSM is authenticated, which can be implemented in any applicable manner in the prior art, and will not be described again here.
  • the authentication information sent in the third step may include information such as each TSM security domain key, personal identity authentication information, device security information, and device storage resource information. Also, the second step and the third step can be repeated for authentication of different contents, so that different contents are verified each time.
  • the present invention can implement dynamic loading and security management of an application for a wearable smart device configured with a low-end hardware by downloading an application for the wearable smart device using the terminal device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明提供了动态加载应用的系统和方法。该系统包括:穿戴式智能设备;终端设备,用于为穿戴式智能设备下载应用;以及信任服务管理平台,通过网络与终端设备连接,信任服务管理平台用于为终端设备提供所述应用。通过本发明的技术方案,能够为低端硬件配置的穿戴式智能设备实现应用的动态加载和安全管理。

Description

动态加载应用的系统和方法 技术领域
本发明涉及穿戴式智能设备,更具体地,涉及用于穿戴式智能设备的动态加载应用的系统和方法。
背景技术
穿戴式智能设备(诸如智能手表、智能手环等)可用于健康监测、运动检测、位置定位、电话通讯、地铁公交卡、支付认证等用途,因此穿戴式设备越来越受到人们的喜爱。随着穿戴式智能设备的应用范围越来越广,需支持的应用越来越多,并且每个领域的应用都在日新月异的变化着,因此应用实时下载、动态更新的需求变得越来越急迫。此外,应用的安全性,特别是支付金融相关领域的动态下载的管道和管理的安全性必须得到保障。
目前,穿戴式智能设备现有的应用加载模式有两种。一种如Apple Watch一样,其带有小型的操作系统,可以通过其APP store(应用商店)来下载应用,然而这种模式对硬件设备和系统要求较高,并且应用管理的安全性得不到保障。另一种是出厂的时候就已经加载完成(例如小米手环等),因此不能再动态新增应用,从而这种模式限制了产品的应用范围,使得产品功能有限。
因此,对于低端硬件配置的穿戴式智能设备,需要一种能够解决实时动态加载应用和安全应用管理的问题的技术。
发明内容
本发明提出了可动态加载应用的系统和方法,能够针对于低端硬件配置的穿戴式智能设备实现应用的动态加载和安全管理。
根据本发明的一个方面,提供了一种动态加载应用的系统,包括:穿戴式智能设备;终端设备,用于为穿戴式智能设备下载应用;以及信任服务管理平台,通过网络与终端设备连接,信任服务管理平台用于为终端设 备提供应用。
优选地,穿戴式智能设备通过蓝牙、WiFi(Wireless Fidelity,无线保真)、ZigBee(紫蜂)、USB(Universal Serial Bus,通用串行总线)或ISO7816(标准协议)通道与终端设备进行通信。
此外,穿戴式智能设备包括:通信模块,用于与终端设备进行通信;存储模块,用于存储由终端设备下载的应用;以及安全模块,用于完成信任服务管理平台对穿戴式智能设备的认证操作。
此外,信任服务管理平台包括:应用发行管理装置,用于管理应用提供商、审核应用提供商提供的应用,并面向用户提供应用相关服务;以及安全模块管理装置,用于控制和管理信任服务管理平台中的应用数据的安全。
根据本发明的另一方面,提供了一种动态加载应用的方法,包括:穿戴式智能设备与终端设备建立连接;终端设备向信任服务管理平台发送下载应用的请求;信任服务管理平台对穿戴式智能设备进行验证;以及在认证通过的情况下,终端设备从信任服务管理平台下载应用。
优选地,穿戴式智能设备与所述终端设备建立连接包括:终端设备向穿戴式智能设备发送连接请求;以及穿戴式智能设备答复连接请求来与终端设备建立连接,其中穿戴式智能设备通过蓝牙、WiFi(Wireless Fidelity,无线保真)、ZigBee(紫蜂)、USB(Universal Serial Bus,通用串行总线)或ISO7816(标准协议)通道与终端设备进行通信。
优选地,信任服务管理平台对穿戴式智能设备进行验证包括:信任服务管理平台向终端设备发送安全认证请求;终端设备将安全认证请求发送给穿戴式智能设备;穿戴式智能设备处理认证请求并向终端设备提供认证信息;终端设备将认证信息发送给信任服务管理平台;信任服务管理平台处理认证信息并向终端设备反馈认证结果;以及在认证通过的情况下,在信任服务管理平台和终端设备之间建立下载通道。
优选地,认证信息包括各信任服务管理平台的安全域密钥、个人身份认证信息、设备安全信息、设备存储资源信息。
优选地,终端设备从信任服务管理平台下载应用包括:终端设备向信任服务管理平台发送下载应用标志;信任服务管理平台向终端设备发送应 用数据;以及终端设备将所述应用数据发送供给穿戴式智能设备。
此外,在移动终端将应用数据发送给穿戴式智能设备之后,该方法还包括:穿戴式智能设备接收应用数据;以及穿戴式智能设备向终端设备和信任服务管理平台回传应用加载的结果。
如上所述,本发明通过终端设备为穿戴式智能设备下载应用,能够针对于低端硬件配置的穿戴式智能设备实现应用的动态加载和安全管理。
附图说明
图1是根据本发明的动态加载应用的系统的框图。
图2是根据本发明的以智能手环和手机为例的动态加载应用的系统的示意图。
图3是根据本发明的动态加载应用的方法的流程图。
图4是详细示出根据本发明实施例的动态加载应用的方法的流程图。
具体实施方式
以下结合附图详细描述本发明。
图1是根据本发明的动态加载应用的系统的框图。图2是根据本发明的以智能手环和手机为例的动态加载应用的系统的示意图。
如图1所示,本发明的动态加载应用系统10包括:穿戴式智能设备12;终端设备14,用于为穿戴式智能设备10下载应用;以及信任服务管理平台16,通过网络与终端设备14连接,TSM(Trusted Service Management,信任服务管理平台)16用于为终端设备14提供应用。
本文所说的穿戴式智能设备可以通过无线通道(诸如蓝牙、WiFi、ZigBee通道等)和有线通道(诸如USB、ISO7816通道等)与终端设备进行通信。但本领域技术人员应该明白,可应用于本发明的系统和方法的任何通道方式均包括在本发明的范围内。
此外,本文所说的终端设备可以为手机、平板电脑、台式电脑、笔记本电脑等终端设备但不限于此,可应用于本发明的系统和方法的任何终端设备均包括在本发明的范围内。
此外,本文所说的穿戴式智能设备可以为智能手表、智能手环、多功 能java卡片等但不限于此,任何可应用于本发明的穿戴式智能设备均包括在本发明的范围内。
如图2所示,将智能手环作为穿戴式智能设备以及将手机作为终端设备示出了本发明的系统。在这种情况下,TSM可以通过网络传输应用给移动终端,移动终端再把应用通过蓝牙或WiFi或ZigBee等通讯通道下载到智能手环。
具体来说,如本领域技术人员所公知的,穿戴式智能设备(如智能手表/手环,多功能java卡片)的内部程序架构从下到上为:芯片处理器、java虚拟机、javaAPI接口和java应用,其中java应用就是本发明中所提到的动态加载的应用。此外,穿戴式智能设备在硬件结构上除了主控芯片之外,还具有与主控芯片相连的通讯模块、存储模块、电源模块,其中电源模块给其他模块供电。主控模块的频率可低至几十MHz即可运行该套架构;通讯模块可以与终端设备进行连接通讯,并且可以使用蓝牙、WiFi(Wireless Fidelity,无线保真)、ZigBee(紫蜂)、USB(Universal Serial Bus,通用串行总线)或ISO7816(标准协议)等通信方式;存储模块中存储有存储程序、应用、认证信息等,其空间在1MByte以内就可实现虚拟机等程序和多个应用的存储管理。此外,该穿戴式智能设备还包括安全模块,用于完成信任服务管理平台对穿戴式智能设备的认证操作,例如在下载应用时接收来自TSM平台的认证请求,处理该认证请求并提供认证信息。
终端设备(例如手机、PAD等移动终端,或者台式电脑、笔记本电脑等非移动终端)作为人机交互的界面管理和通讯的中间枢纽,对下可以与穿戴式智能设备进行通讯,对上可以与TSM平台进行通讯,并且还可以带有应用控制管理APP来作为人际交互界面的管理。
TSM平台提供了是各类服务商与用户直接的安全桥梁,并且包括:应用发行管理装置,用于管理应用提供商、审核应用提供商提供的应用,并面向用户提供应用相关服务;以及安全模块管理装置,用于控制和管理信任服务管理平台中的应用数据的安全。
具体地,应用发行管理装置作为第三方管理平台,主要提供受理业务平台的接入,对应用提供商进行注册、审核和配置管理,同时负责审核应用提供商提供的应用的合法性、安全性和规范性,提供应用及安全域的管 理与发行,并且还面向用户提供注册、注销、退网、以及应用数据的查询、备份、挂失、补办等职责。
安全模块管理装置具有以下功能:控制和管理安全应用的主控密钥;通过空中下载等技术方式在安全模块中加载、安装、或删除应用数据和配套的帐户数据;以及对安全模块应用信息进行统一管理,包括数据信息管理、安全通道管理以及安全应用管理等。
基于上述架构,本发明提出的方法是:终端设备与穿戴式智能终端在建立连接之后,终端设备的应用管理程序APP发出下载应用的请求,穿戴式智能终端发送认证资料通过终端设备给到TSM平台,TSM平台获取认证信息并在认证成功后给终端设备下载应用授权,终端设备发送下载应用的标志给TSM平台,TSM平台根据应用标志给终端设备下传对应的应用,然后终端设备再把应用下载到穿戴式智能终端中。
以下结合图3和图4详细描述本发明的方法。
图3是根据本发明的动态加载应用的方法的流程图。
如图3所示,根据本发明的动态加载应用方法包括:步骤S30,穿戴式智能设备与终端设备建立连接;S32,终端设备向信任服务管理平台发送下载应用的请求;S34,信任服务管理平台对穿戴式智能设备进行验证;以及S36,在认证通过的情况下,终端设备从信任服务管理平台下载应用。
具体地,穿戴式智能设备与终端设备建立连接包括:终端设备向穿戴式智能设备发送连接请求;以及穿戴式智能设备答复连接请求来与终端设备建立连接,其中穿戴式智能设备通过蓝牙、WiFi(Wireless Fidelity,无线保真)、ZigBee(紫蜂)、USB(Universal Serial Bus,通用串行总线)或ISO7816(标准协议)等通道与终端设备进行通信。
此外,信任服务管理平台对穿戴式智能设备进行验证包括:信任服务管理平台向终端设备发送安全认证请求;终端设备将安全认证请求发送给穿戴式智能设备;穿戴式智能设备处理认证请求并向终端设备提供认证信息;终端设备将认证信息发送给信任服务管理平台;信任服务管理平台处理认证信息并向终端设备反馈认证结果;以及在认证通过的情况下,在信任服务管理平台和终端设备之间建立下载通道。其中,穿戴式智能设备处理认证请求包括对认证请求进行解密、确定TSM平台需要哪些认证信息等, 这对于本领域技术人员来说是公知的,因此不再进行详细描述。
应该注意,这里所说的认证信息包括各信任服务管理平台的安全域密钥、个人身份认证信息、设备安全信息、设备存储资源信息等,这些认证信息都是预先存储在穿戴式智能设备中的。
具体地,终端设备从信任服务管理平台下载应用包括:终端设备向信任服务管理平台发送下载应用标志;信任服务管理平台向终端设备发送应用数据;以及终端设备将应用数据发送供给穿戴式智能设备。
此外,在移动终端将应用数据发送给穿戴式智能设备之后,该方法还包括:穿戴式智能设备接收应用数据;以及穿戴式智能设备向终端设备和信任服务管理平台回传应用加载的结果。此外,穿戴式智能设备在接收到应用数据之后还需要存储和处理应用数据,这里所说的处理包括对应用数据进行解密、将其存储在相关地址处等处理,这对于本领域技术人员来说是公知的,因此不再进行详细描述。
图4是详细示出根据本发明实施例的动态加载应用的方法的流程图,包括以下步骤:
第一步:终端设备与穿戴式智能设备建立连接;
第二步:终端设备的应用管理程序APP向TSM发出下载应用的请求,TSM在接收到请求后,发送对穿戴式智能设备的安全认证请求;
第三步:通过终端设备透传,穿戴式智能设备接收该认证请求并处理认证请求,然后发送相关的认证信息给TSM;
第四步:TSM认证穿戴式智能设备的合法性、安全性,并将结果反馈给终端设备,如果认证通过,则完成整个下载通道建立;
第五步:终端设备发送对应于所下载应用的下载应用标志给TSM平台,TSM响应下载应用请求来找到相关应用数据,并将相关应用数据调出发送给终端设备;
第六步:终端设备将数据传给穿戴式智能设备,穿戴式智能设备接收、储存并处理相关的应用。
此外,在第六步之后可以增加回传响应信息,即穿戴式智能设备发送应用加载的结果给终端设备和TSM。
此外,除了需要对穿戴式智能设备进行安全认证之外,还需要对终端 设备和TSM之间的下载通道进行认证,这可以通过现有技术中任何可应用的方式来实现,这里不再进行赘述。
此外,第三步中发送的认证信息可以包含各TSM安全域密钥、个人身份认证信息、设备安全信息、设备存储资源信息等信息。并且,对于不同内容的认证可以重复第二步和第三步,使得每次验证不一样的内容。
如上所述,本发明通过使用终端设备为穿戴式智能设备下载应用,能够针对于低端硬件配置的穿戴式智能设备实现应用的动态加载和安全管理。
需要说明的是,以上参照附图所描述的各个实施例仅用以说明本发明而非限制本发明的范围,本领域的普通技术人员应当理解,在不脱离本发明的精神和范围的前提下对本发明进行的修改或者等同替换,均应涵盖在本发明的范围之内。此外,除上下文另有所指外,以单数形式出现的词包括复数形式,反之亦然。另外,除非特别说明,那么任何实施例的全部或一部分可结合任何其它实施例的全部或一部分来使用。

Claims (10)

  1. 一种动态加载应用的系统,其特征在于,所述系统包括:
    穿戴式智能设备;
    终端设备,用于为所述穿戴式智能设备下载应用;以及
    信任服务管理平台,通过网络与所述终端设备连接,所述信任服务管理平台用于为所述终端设备提供所述应用。
  2. 根据权利要求1所述的系统,其特征在于,所述穿戴式智能设备通过蓝牙、WiFi、ZigBee、USB或ISO7816通道与所述终端设备进行通信。
  3. 根据权利要求1所述的系统,其特征在于,所述穿戴式智能设备包括:
    通信模块,用于与所述终端设备进行通信;
    存储模块,用于存储由所述终端设备下载的应用;以及
    安全模块,用于完成所述信任服务管理平台对所述穿戴式智能设备的认证操作。
  4. 根据权利要求1所述的系统,其特征在于,所述信任服务管理平台包括:
    应用发行管理装置,用于管理应用提供商、审核所述应用提供商提供的应用,并面向用户提供应用相关服务;以及
    安全模块管理装置,用于控制和管理所述信任服务管理平台中的应用数据的安全。
  5. 一种动态加载应用的方法,其特征在于,所述方法包括:
    穿戴式智能设备与终端设备建立连接;
    所述终端设备向信任服务管理平台发送下载应用的请求;
    所述信任服务管理平台对所述穿戴式智能设备进行验证;以及
    在认证通过的情况下,所述终端设备从所述信任服务管理平台下载应用。
  6. 根据权利要求5所述的方法,其特征在于,所述穿戴式智能设备与所述终端设备建立连接包括:
    所述终端设备向所述穿戴式智能设备发送连接请求;以及
    所述穿戴式智能设备答复所述连接请求来与所述终端设备建立连接,
    其中,所述穿戴式智能设备通过蓝牙、WiFi、ZigBee、USB或ISO7816通道与所述终端设备进行通信。
  7. 根据权利要求5所述的方法,其特征在于,所述信任服务管理平台对所述穿戴式智能设备进行验证包括:
    所述信任服务管理平台向所述终端设备发送安全认证请求;
    所述终端设备将所述安全认证请求发送给所述穿戴式智能设备;
    所述穿戴式智能设备处理所述认证请求并向所述终端设备提供认证信息;
    所述终端设备将所述认证信息发送给所述信任服务管理平台;
    所述信任服务管理平台处理所述认证信息并向所述终端设备反馈认证结果;以及
    在认证通过的情况下,在所述信任服务管理平台和所述终端设备之间建立下载通道。
  8. 根据权利要求7所述的方法,其特征在于,所述认证信息包括各信任服务管理平台的安全域密钥、个人身份认证信息、设备安全信息、设备存储资源信息。
  9. 根据权利要求5所述的方法,其特征在于,所述终端设备从所述信任服务管理平台下载应用包括:
    所述终端设备向所述信任服务管理平台发送下载应用标志;
    所述信任服务管理平台向所述终端设备发送应用数据;以及
    所述终端设备将所述应用数据发送供给所述穿戴式智能设备。
  10. 根据权利要求9所述的方法,其特征在于,在所述移动终端将所述应用数据发送给所述穿戴式智能设备之后,所述方法还包括:
    所述穿戴式智能设备接收所述应用数据;以及
    所述穿戴式智能设备向所述终端设备和所述信任服务管理平台回传应用加载的结果。
PCT/CN2016/102841 2015-11-12 2016-10-21 动态加载应用的系统和方法 WO2017080351A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510770378.4 2015-11-12
CN201510770378.4A CN106709317A (zh) 2015-11-12 2015-11-12 动态加载应用的系统和方法

Publications (1)

Publication Number Publication Date
WO2017080351A1 true WO2017080351A1 (zh) 2017-05-18

Family

ID=58694436

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/102841 WO2017080351A1 (zh) 2015-11-12 2016-10-21 动态加载应用的系统和方法

Country Status (3)

Country Link
CN (1) CN106709317A (zh)
TW (1) TWI632506B (zh)
WO (1) WO2017080351A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789968A (zh) * 2010-01-08 2010-07-28 深圳市沟通科技有限公司 安全的企业移动办公应用交付方法
CN103823702A (zh) * 2014-03-10 2014-05-28 联想(北京)有限公司 一种应用安装方法及电子设备
CN103875003A (zh) * 2011-10-17 2014-06-18 迈克菲股份有限公司 用于在移动网络环境中把应用列入白名单的系统和方法
CN103985036A (zh) * 2014-05-09 2014-08-13 杭州晟元芯片技术有限公司 一种带生物特征的二维码支付方法
CN104063243A (zh) * 2014-06-17 2014-09-24 成都雅鲁科技有限公司 一种应用于智能穿戴设备的应用商店解决方案

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100965151B1 (ko) * 2003-05-29 2010-06-23 주식회사 비즈모델라인 스마트 카드(또는 아이씨 카드)를 이용한 애플리케이션(또는 데이터) 트랜스퍼 시스템
US8289162B2 (en) * 2008-12-22 2012-10-16 Wimm Labs, Inc. Gesture-based user interface for a wearable portable device
CN101820613B (zh) * 2009-02-27 2014-03-19 中兴通讯股份有限公司 一种应用下载的系统和方法
WO2013096954A1 (en) * 2011-12-23 2013-06-27 The Trustees Of Dartmouth College Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric
CN104765627A (zh) * 2014-01-07 2015-07-08 联发科技(新加坡)私人有限公司 智能设备、可穿戴式设备及其应用程序安装及卸载方法
TWM489622U (en) * 2014-06-20 2014-11-11 Ke Yu-Hao Single hand-wearable physiological signal measurer combined with smart handheld device
CN104361304A (zh) * 2014-12-03 2015-02-18 东信和平科技股份有限公司 一种智能卡应用程序的下载方法及装置
CN104750515A (zh) * 2015-03-03 2015-07-01 惠州Tcl移动通信有限公司 固件版本升级的方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789968A (zh) * 2010-01-08 2010-07-28 深圳市沟通科技有限公司 安全的企业移动办公应用交付方法
CN103875003A (zh) * 2011-10-17 2014-06-18 迈克菲股份有限公司 用于在移动网络环境中把应用列入白名单的系统和方法
CN103823702A (zh) * 2014-03-10 2014-05-28 联想(北京)有限公司 一种应用安装方法及电子设备
CN103985036A (zh) * 2014-05-09 2014-08-13 杭州晟元芯片技术有限公司 一种带生物特征的二维码支付方法
CN104063243A (zh) * 2014-06-17 2014-09-24 成都雅鲁科技有限公司 一种应用于智能穿戴设备的应用商店解决方案

Also Published As

Publication number Publication date
TWI632506B (zh) 2018-08-11
CN106709317A (zh) 2017-05-24
TW201719396A (zh) 2017-06-01

Similar Documents

Publication Publication Date Title
US10223096B2 (en) Logging operating system updates of a secure element of an electronic device
US10469462B2 (en) Apparatus and method for managing virtual subscriber indentity module
EP3075096B1 (en) Method and system for encrypted communications
KR102216877B1 (ko) 전자장치에서 생체 정보를 이용한 인증 방법 및 장치
US20160253664A1 (en) Attestation by proxy
US20150089586A1 (en) Systems and methods for nfc access control in a secure element centric nfc architecture
CN105393490B (zh) 用于安全服务的基于介质的认证和授权的方法、系统及介质
US9860738B2 (en) Method for processing multiple pieces of SIM information and electronic device thereof
US11539399B2 (en) System and method for smart card based hardware root of trust on mobile platforms using near field communications
US20100043052A1 (en) Apparatus and method for security management of user terminal
KR20100058527A (ko) 비접촉 데이터 송신 또는 수신에 대한 응답으로 nfc 시스템 내에서 애플리케이션 데이터를 관리하는 방법 및 장치
US9591434B1 (en) Virtual private network (VPN) tunneling in a user equipment (UE) brokered by a radio frequency identity (RFID) chip communicatively coupled to the user equipment
US11563730B2 (en) Method and electronic device for managing digital keys
US20100261464A1 (en) Mobile terminal, associated storage devices and methods of using the same
US20140215585A1 (en) System and method for synchronizing connection credentials
US20230180007A1 (en) Electronic device and method for electronic device to provide ranging-based service
KR102480627B1 (ko) 전자 장치 및 전자 장치의 eSIM 관리 방법
US20140380046A1 (en) Collaborative streaming system for protected media
EP3413600B1 (en) Communication device and method of managing profiles
US20160196134A1 (en) Secure storage synchronization
CN105681256A (zh) 音频通信方法以及音频通信应用设备
US20180152307A1 (en) Device to provide trusted time assurance
US11297488B2 (en) Electronic device in which profile is installed and operating method for electronic device
TWI632506B (zh) System and method for dynamically loading an application
TW201531144A (zh) 無線雙向式資料傳輸系統及其傳輸方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16863528

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16863528

Country of ref document: EP

Kind code of ref document: A1