WO2019104989A1 - 终端和通信方法 - Google Patents
终端和通信方法 Download PDFInfo
- Publication number
- WO2019104989A1 WO2019104989A1 PCT/CN2018/090212 CN2018090212W WO2019104989A1 WO 2019104989 A1 WO2019104989 A1 WO 2019104989A1 CN 2018090212 W CN2018090212 W CN 2018090212W WO 2019104989 A1 WO2019104989 A1 WO 2019104989A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security subsystem
- data
- command
- bidirectional bus
- processing
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/40—Bus structure
- G06F13/4004—Coupling between buses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/14—Two-way operation using the same type of signal, i.e. duplex
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/04—Interfaces between hierarchically different network devices
- H04W92/08—Interfaces between hierarchically different network devices between user and terminal device
Definitions
- the present application relates to the field of communications technologies, and in particular, to a terminal and a communication method.
- the terminal usually includes a smart card and a communication processor, where the smart card stores at least one of data related to the identity of the user and data related to the network security, such as communication parameters, authentication data, etc., which may be stored.
- the device can communicate with the smart card to read data stored in the smart card.
- the smart card is connected to the communication processor through the contact contact, and the smart card and the communication processor communicate according to the ISO7816 protocol.
- the communication processor is in an active position, and the smart card is in a subordinate state, that is, the communication between the communication processor and the smart card can only be initiated by the communication processor, but cannot be initiated by the smart card, and the smart card can only respond.
- the smart card can only rely on the communication processor to read the data stored by it, and cannot actively transmit the data to the communication processor. That is, if the smart card needs to transmit data to the communication processor, it needs to wait.
- the data transmission can be performed only after receiving the read command transmitted by the communication processor, thereby resulting in low communication flexibility between the smart card and the communication processor, and the communication rate is low.
- the present application provides a terminal and a communication method, which can solve the problem of low communication flexibility and low communication rate between the security subsystem and the processing main system in the related art.
- the technical solution is as follows:
- a terminal comprising: a security subsystem, a processing host system, and a first bidirectional bus coupled between the security subsystem and the processing host system;
- the security subsystem is configured to manage at least one of data related to a user identity and data related to network security in wireless communication, and exchange the data with the processing host system through the first bidirectional bus;
- the processing main system is configured to exchange the data with the security subsystem through the first bidirectional bus, and use the data to implement wireless communication.
- the security subsystem is a securely isolated subsystem whose internal components are not visible to the outside, that is, the functional components external to the security subsystem 1 can only access the security subsystem through a specific interface.
- the security subsystem can It is a Subscriber Identity Module (SIM) card, etc., and may be an embedded SIM (eSIM) card or the like.
- the processing main system is used to process various data in the terminal, and it can be used to implement the wireless communication function of the terminal, that is, the processing main system can be responsible for the execution of all communication software in the terminal, for example, the processing main system can It is a Communication Processor (CP) (also known as a Baseband Processor (BP)), a Central Processing Unit (CPU), or the like.
- CP Communication Processor
- BP Baseband Processor
- CPU Central Processing Unit
- the security subsystem and the processing main system in the case that the security subsystem and the processing main system are connected through the first bidirectional bus, the security subsystem and the processing main system will be in the same position, that is, the security subsystem can actively take the data.
- the processing main system can also actively transmit data to the security subsystem through the first bidirectional bus, thereby improving the communication flexibility between the security subsystem and the processing main system.
- the transmission rate of the first bidirectional bus is relatively fast, when the data is transmitted between the security subsystem and the processing main system through the first bidirectional bus, the data transmission rate between the security subsystem and the processing main system is high, thereby The rate of communication between the security subsystem and the processing host system can be increased.
- the first subsystem is used to communicate with the processing host system in a full duplex manner using the first bidirectional bus.
- the security subsystem transmits data to the processing main system through the first bidirectional bus, and the processing main system can also transmit data to the security subsystem through the first bidirectional bus.
- the security subsystem and the processing main system Both can receive data while transmitting data, thereby further increasing the communication rate between the security subsystem and the processing host system.
- the security subsystem includes at least two physical interfaces
- the at least two physical interfaces are all connected to the first bidirectional bus, and the security subsystem and the processing main system simultaneously exchange the data in parallel through the at least two physical interfaces.
- At least two physical interfaces are connected to the first bidirectional bus, that is, at least two physical channels are established between the first bidirectional bus and the security subsystem, and the main system is actually processed.
- At least two physical channels are established with the security subsystem.
- the processing main system can simultaneously transmit data to the security subsystem through the at least two physical channels, and the security subsystem can simultaneously transmit data to the processing main system through the at least two physical channels.
- the processing main system passes While the at least two physical channels transmit data to the security subsystem, the security subsystem may also transmit data to the processing host system through the at least two physical channels. That is, the security subsystem and the processing host system can simultaneously perform different operations through the first bidirectional bus and different physical interfaces.
- the parallel transmission mode between the security subsystem and the processing main system is further improved. The rate of communication between the security subsystem and the processing host system.
- the security subsystem includes a plurality of components and a second bidirectional bus
- a connection is established between the plurality of components through the second bidirectional bus to enable transmission of data between the plurality of components.
- any one of the multiple components can actively transmit data to other components through the second bidirectional bus, and other components can actively take data. Transfer to the component via the second bidirectional bus.
- the transmission rate of the second bidirectional bus is relatively fast, when data is transmitted between the plurality of components included in the security subsystem through the second bidirectional bus, the data transmission rate between the plurality of components is high, thereby improving security. The data processing efficiency of the subsystem.
- At least two of the plurality of components are the at least two physical interfaces.
- each of the at least two physical interfaces may be a bus interface.
- at least two physical interfaces may establish a connection between the first bidirectional bus and the second bidirectional bus, and at least two physical interfaces.
- Between the first bidirectional bus and the second bidirectional bus acts as a "converter", that is, it can complete protocol conversion, data conversion, etc. between the first bidirectional bus and the second bidirectional bus, thereby implementing the first bidirectional bus Communication with the second bidirectional bus, that is, between the first bidirectional bus and the second bidirectional bus, can be transmitted through at least two physical interfaces.
- the second bidirectional bus is used to communicate in a full duplex manner between the plurality of components.
- any one of the multiple components transmits data to other components through the second bidirectional bus
- other components can also transmit data to the component through the second bidirectional bus, and at this time, multiple components can The data is received while transmitting data, thereby further improving the data transmission efficiency between the plurality of components, and further improving the data processing efficiency of the security subsystem.
- the terminal further includes a memory
- a connection is established between the memory and the security subsystem via the first bidirectional bus, and the security subsystem manages data stored in the memory through the first bidirectional bus.
- the memory included in the terminal is a memory external to the security subsystem, when the data managed by the security subsystem is stored in the memory, that is, when the security subsystem can store the managed data in the memory.
- the amount of data that the security subsystem can manage is increased, which extends the range of applications for the security subsystem.
- the security subsystem can be quickly acquired by the security subsystem through the first bidirectional bus. The data.
- a communication method is provided, the communication method being applied to the terminal described in the above first aspect or any of its possible designs, the method comprising:
- the security subsystem sends an interrupt request to the processing host system through the first bidirectional bus, the interrupt request is used to instruct the processing host system to receive a first command sent by the security subsystem, the first Commands are used to instruct the processing host system to perform operations related to data managed by the security subsystem;
- the security subsystem sends the first command to the processing host system via the first bidirectional bus.
- an interrupt response may be performed on the interrupt request to implement receiving the first command, and when the processing main system receives the first When the command is executed, the first command may be executed to obtain a response result of the first command, and the response result of the first command is sent to the security subsystem through the first bidirectional bus.
- the security subsystem included in the terminal and the processing main system are connected through the first bidirectional bus.
- the security subsystem is in the same position as the processing main system, and thus the security subsystem needs to be processed by the main
- the system may actively send an interrupt request to the processing host system through the first bidirectional bus, and then actively send the processing to the processing main system through the first bidirectional bus to implement the operation.
- the first command to instruct the processing main system to complete the operation.
- the communication between the security subsystem and the processing main system is highly flexible, and since the security subsystem can actively send the first command to the processing main system without waiting for the instruction of the main system, the security subsystem and The rate of communication between the processing primary systems is high.
- the method further includes:
- the processing host system sends a second command to the security subsystem via the first bidirectional bus, the second command including a command data header and command data content, the command data header being used to indicate the security subsystem Performing operations related to the content of the command data;
- the security subsystem executes the second command
- the security subsystem sends a response result of the second command to the processing main system through the first bidirectional bus, and the response result includes a processing status and a processed data content.
- the security subsystem and the processing host system transmit the command data header and the command data content at a time, thereby The communication rate between the security subsystem and the processing host system is increased.
- the security subsystem and the processing main system perform the processing status and the processed data content at one time. Transmission, thereby increasing the communication rate between the security subsystem and the processing host system.
- the security subsystem may actively send the first command to the processing main system, and then the processing main system returns the response result of the first command, thereby implementing the operation to be completed by the security subsystem.
- the processing main system can also actively send a second command to the security subsystem, and then the security subsystem returns the response result of the second command, thereby implementing the operation to be completed by the main system. That is, when the security subsystem interacts with the processing main system to perform an operation, the operation can be completed by only two interactions, thereby greatly reducing the number of interactions between the security subsystem and the processing main system when performing an operation. The communication rate between the security subsystem and the processing host system is increased.
- the security subsystem includes at least two physical interfaces; the processing main system sends a second command to the security subsystem by using the first bidirectional bus, including:
- the processing main system selects one physical interface from the at least two physical interfaces as a target physical interface
- the processing host system sends a second command to the security subsystem through the first bidirectional bus and the target physical interface;
- the security subsystem sends the response result of the second command to the processing main system by using the first bidirectional bus, including:
- the security subsystem sends a response result of the second command to the processing host system through the target physical interface and the first bidirectional bus.
- the first bidirectional bus and the security subsystem may be connected through the at least two physical interfaces, so that at least two physical channels are established between the first bidirectional bus and the security subsystem, that is, in the At least two physical channels are established between the processing primary system and the security subsystem.
- the security subsystem and the processing main system can communicate through the at least two physical channels, that is, the security subsystem and the processing main system can simultaneously perform different functions through different physical interfaces through the first bidirectional bus.
- the security subsystem and the processing host system are in parallel transmission mode, thereby improving the communication rate between the security subsystem and the processing host system.
- the length of data transmitted by the security subsystem and the processing main system through the first bidirectional bus is not limited, that is, the maximum data of the single transmission is The length is at least greater than 255 bytes so that the communication rate between the security subsystem and the processing host system can be greatly increased.
- a computer readable storage medium is provided, the instructions being stored in a computer readable storage medium, when executed on a computer or processor, causing the computer or processor to perform the second aspect or any of the above A communication method as described in a possible design.
- a fourth aspect provides a computer program product comprising instructions, when executed on a computer or processor, causing a computer or processor to perform the communication method described in the second aspect above or any of its possible designs .
- the terminal includes a security subsystem, a processing main system, and a first bidirectional bus coupled between the security subsystem and the processing main system.
- the security subsystem is configured to manage at least one of data related to the user identity and data related to the network security in the wireless communication, and exchange the data with the processing main system through the first bidirectional bus, and the processing main system is used to pass
- the first bidirectional bus exchanges the data with the security subsystem and uses the data for wireless communication. Since the security subsystem establishes a connection with the processing main system through the first bidirectional bus, the security subsystem is in the same position as the processing main system, that is, the security subsystem can actively transmit data to the processing main system through the first bidirectional bus, and process the main system.
- the transmission rate of the first bidirectional bus is relatively fast, when the data is transmitted between the security subsystem and the processing main system through the first bidirectional bus, the data transmission rate between the security subsystem and the processing main system is high, thereby The rate of communication between the security subsystem and the processing host system can be increased.
- FIG. 1A is a schematic structural diagram of a first terminal according to an embodiment of the present application.
- 1B is a schematic structural diagram of a second terminal provided by an embodiment of the present application.
- FIG. 1C is a schematic structural diagram of a third terminal according to an embodiment of the present application.
- 1D is a schematic structural diagram of a fourth terminal provided by an embodiment of the present application.
- 1E is a schematic structural diagram of a fifth terminal provided by an embodiment of the present application.
- 1F is a schematic structural diagram of a sixth terminal provided by an embodiment of the present application.
- 1G is a schematic structural diagram of a seventh terminal provided by an embodiment of the present application.
- 1H is a schematic structural diagram of an eighth terminal provided by an embodiment of the present application.
- 2A is a flowchart of a communication method provided by an embodiment of the present application.
- 2B is a flowchart of another communication method provided by an embodiment of the present application.
- 2C is a schematic diagram of a parallel transmission manner according to an embodiment of the present application.
- 1 security subsystem
- 1a physical interface
- 11 component
- 12 second bidirectional bus
- 2 processing main system
- 3 first bidirectional bus
- 4 memory.
- Security subsystem is a security-isolated subsystem whose internal components are not visible to the outside, that is, the functional components outside the security subsystem can only access the security subsystem through a specific interface.
- the security subsystem can be a smart card (Smart card) (also known as an integrated circuit (IC) card, microchip card, etc.).
- the security subsystem may be configured to manage at least one of data related to the identity of the user and data related to the network security in the wireless communication, and the data related to the identity of the user may include an International Mobile Subscriber Identification Number (IMSI).
- IMSI International Mobile Subscriber Identification Number
- At least one of a key identifier (Ki), a personal identification number (PIN), a unlocking code (Personal Unlock Key, PUK), etc., and data related to network security may include location area identification.
- LAI Location Area Identity
- TMSI Temporary Mobile Subscriber Identity
- FPLMN Forbidden Public Land Mobile Network
- Processing main system for processing various data in the terminal, which can realize the wireless communication function of the terminal, that is, the processing main system can be responsible for the execution of all communication software in the terminal, for example, the processing main system can be CP (also called BP) ), CPU, etc.
- the processing host system can exchange data managed by the security subsystem with the security subsystem and wirelessly communicate using the data obtained by the exchange.
- Two-way bus A common communication trunk used for transmitting data between various functional components included in a terminal, which is a transmission harness composed of wires, that is, various functional components can be connected and communicated through a bidirectional bus.
- the bidirectional bus has a bidirectional transmission capability, that is, any of a plurality of functional components connected to the bidirectional bus can selectively transmit data to other functional components, and can also selectively receive data transmitted by other functional components.
- the bidirectional bus may be an Inter-Integrated Circuit (I2C), a Serial Peripheral Interface (SPI) bus, or the like.
- the embodiment of the present application is applied to a communication scenario between a security subsystem included in a terminal and a processing main system.
- the security subsystem included in the terminal is generally a smart card
- the processing main system included is generally a communication processor
- the smart card and the communication processor are connected through contact contacts and communicate according to the ISO7816 protocol.
- the smart card communicates with the communication processor according to the ISO7816 protocol, the following situations exist:
- the communication between the smart card and the communication processor can only be initiated by the communication processor, but not by the smart card, and the smart card can only respond to commands transmitted by the communication processor.
- the maximum length of data transmitted between the smart card and the communication processor is 255 bytes. When the data to be transmitted exceeds the maximum length, it needs to be divided into multiple transmissions.
- the communication processor transmits a command to the smart card, the command data header and the command data content need to be transmitted to the smart card in a divided manner, and after the smart card executes the command, the processing state and the processed data content need to be transmitted to the communication processing in a divided manner.
- the communication processor and the smart card communicate in a half-duplex manner, that is, the communication processor and the smart card can only transmit data at one time, and the other party can only wait until the data transmitted by the other party is received before continuing the data transmission. .
- the clock of the smart card can only be controlled by the communication processor, but cannot be controlled by itself, that is, the clock of the smart card can only be controlled by the communication processor, or the clock recovery of the smart card can be controlled.
- the embodiment of the present application changes the contact type connection manner between the security subsystem included in the terminal and the processing main system to a bidirectional bus connection manner, so that after the connection mode is changed, the security subsystem and the processing main system are made.
- the communication between the two can break through the limitations of the ISO7816 protocol and obtain a new communication method, thereby improving the communication flexibility and communication rate between the security subsystem and the processing host system.
- FIG. 1A is a schematic structural diagram of a terminal according to an embodiment of the present application.
- the terminal includes: a security subsystem 1, a processing main system 2, and a first bidirectional bus 3 coupled between the security subsystem 1 and the processing main system 2;
- a security subsystem 1 for managing at least one of data related to a user identity and data related to network security in wireless communication, and exchanging the data with the processing main system 2 through the first bidirectional bus 3;
- the main system 2 is processed for exchanging the data with the security subsystem 1 via the first bidirectional bus 3 and using the data for wireless communication.
- the security subsystem 1 is a securely isolated subsystem whose internal components are not visible to the outside, that is, the functional components external to the security subsystem 1 can only access the security subsystem 1 through a specific interface, for example, a security device.
- System 1 can be a smart card and can be an eSIM card or the like.
- the security subsystem 1 may manage at least one of data related to a user identity and data related to network security in wireless communication, and the data related to the identity of the user may include at least one of IMSI, Ki, PIN, PUK, and the like, and
- the network security related data may include at least one of LAI, TMSI, FPLMN, and the like.
- the security subsystem 1 can be independent of the processing main system 2, such as a pluggable SIM card; optionally, the security subsystem 1 can be integrated with the processing main system 2 on the same chip, such as Both the security subsystem 1 and the processing host system 2 can be included in the system on chip (SOC) of the terminal.
- SOC system on chip
- the processing main system 2 is configured to process various data in the terminal, and it can be used to implement the wireless communication function of the terminal, that is, the processing main system 2 can be responsible for the execution of all communication software in the terminal, for example, processing the main
- the system can be a CP, a CPU, or the like.
- the processing main system 2 can exchange the data managed by the security subsystem 1 with the security subsystem 1, and implement wireless communication using the data obtained by the exchange.
- the first bidirectional bus 3 has a bidirectional transmission capability, which may be a common channel between a plurality of functional components included in the terminal, and the plurality of functional components may be connected to the first bidirectional bus 3 to implement A connection between the plurality of functional components, at which time the plurality of functional components can transmit data to each other through the first bidirectional bus 3.
- the plurality of functional components may include a security subsystem 1, a processing main system 2, an application processor, a multimedia processor, a low power controller, peripheral devices (such as Bluetooth, a keyboard, a screen, etc.). Etc., the plurality of functional components can transmit data to each other through the first bidirectional bus 3.
- the transmission rate of the first bidirectional bus 3 is relatively fast, usually greater than the transmission rate of the contact contacts.
- the first bidirectional bus 3 can be an I2C, an SPI bus or the like.
- the first bidirectional bus 3 can be a high speed bus, and the transfer rate of the high speed bus is faster than that of the ordinary bus.
- the first bidirectional bus 3 can be quickly interconnected for peripheral components ( Peripheral Component Interconnect Express, PCIe) bus, Hyper Transport (HT) bus and other high-speed bus.
- peripheral components Peripheral Component Interconnect Express, PCIe
- HT Hyper Transport
- the security subsystem 1 and the processing main system 2 are connected through the first bidirectional bus 3, the security subsystem 1 and the processing main system 2 will be in the same position, that is, the security subsystem 1
- the data can be actively transmitted to the processing main system 2 through the first bidirectional bus 3, and the processing main system 2 can also actively transmit data to the security subsystem 1 through the first bidirectional bus 3, thereby improving the security subsystem 1 and the processing main system. 2 communication flexibility.
- the transmission rate of the first bidirectional bus 3 is relatively fast, when the data is transmitted between the security subsystem 1 and the processing main system 2 through the first bidirectional bus 3, the data between the security subsystem 1 and the processing main system 2 The transmission rate is high, so that the communication rate between the security subsystem 1 and the processing main system 2 can be increased.
- the first bidirectional bus 3 can communicate with the processing main system 2 in a full duplex mode, that is, the security subsystem 1 transmits data to the processing main system 2 through the first bidirectional bus 3.
- the processing main system 2 can also transmit data to the security subsystem 1 through the first bidirectional bus 3.
- both the security subsystem 1 and the processing main system 2 can receive data while transmitting data, thereby further improving the security subsystem 1 The rate of communication with the processing host system 2.
- the security subsystem 1 includes at least two physical interfaces 1a.
- At least two physical interfaces 1a are connected to the first bidirectional bus 3, and the data managed by the security subsystem 1 is simultaneously exchanged between the security subsystem 1 and the processing main system 2 through at least two physical interfaces 1a.
- At least two physical interfaces 1a may receive data from the first bidirectional bus 3 or may transmit data to the first bidirectional bus 3, that is, the security subsystem 1 may be from the first bidirectional bus 3 through at least two physical interfaces 1a.
- Receiving data, data can also be transmitted to the first bidirectional bus 3 via at least two physical interfaces 1a.
- At least two physical channels are established between the first bidirectional bus 3 and the security subsystem 1, and actually the main system 2 is also processed.
- At least two physical channels are established between the security subsystems 1.
- the processing main system 2 can simultaneously transmit data to the security subsystem 1 through the at least two physical channels
- the security subsystem 1 can simultaneously transmit data to the processing main system 2 through the at least two physical channels.
- the security subsystem 1 can also transmit data to the processing main system 2 through the at least two physical channels.
- the security subsystem 1 and the processing host system 2 can simultaneously perform different operations through the first bidirectional bus 3 and the different physical interfaces 1a. At this time, the security subsystem 1 and the processing main system 2 are in parallel.
- the transmission mode further increases the communication rate between the security subsystem 1 and the processing main system 2.
- the security subsystem 1 includes a plurality of components 11 and a second bidirectional bus 12;
- a connection is established between the plurality of components 11 via the second bidirectional bus 12 to effect transmission of data between the plurality of components 11.
- the second bidirectional bus 12 has a bidirectional transmission capability, which can be a common channel between the plurality of components 11, and the plurality of components 11 can transmit data to each other through the second bidirectional bus 12.
- the plurality of components 11 may be a CPU 11 1 , a read-only memory (ROM) 11 2 , a random access memory (RAM) 11 3 , and a memory management unit (Memory).
- Management Unit (MMU) 11 4 Random Number Generator (TRNG) 11 5 , Sensor (SENSOR) 11 6 and the like, and a plurality of components 11 can transfer data to each other through the second bidirectional bus 12.
- TRNG Random Number Generator
- SENSOR Sensor
- the transmission rate of the second bidirectional bus 12 is relatively fast, and is generally greater than the transmission rate of the ordinary connection.
- the second bidirectional bus 12 can be an I2C, an SPI bus, or the like.
- the second bidirectional bus 12 can be a high speed bus.
- the transmission rate of the high speed bus is faster than that of the ordinary bus.
- the second bidirectional bus 12 can be a PCIe bus, an HT bus, or the like. High speed bus.
- the transmission rate of the second bidirectional bus 12 is relatively fast, when data is transmitted between the plurality of components 11 included in the security subsystem 1 through the second bidirectional bus 12, the data transmission rate between the plurality of components 11 is higher. High, so that the data processing efficiency of the security subsystem 1 can be improved.
- the plurality of components 11 can communicate in a full duplex manner using the second bidirectional bus 12, that is, any one of the plurality of components 11 x transmits data to the other components 11 y through the second bidirectional bus 12
- other components 11 y can also transmit data to the component 11 x through the second bidirectional bus 12, and at this time, the plurality of components 11 can receive data while transmitting data, thereby further improving the relationship between the plurality of components 11. Data transmission efficiency, and further improve the data processing efficiency of the security subsystem 1.
- each of the at least two physical interfaces 1a may be a bus interface, for example, at least two physical interfaces 1a may be a mailbox or the like.
- at least two physical interfaces 1a can establish a connection between the first bidirectional bus 3 and the second bidirectional bus 12, and at least two physical interfaces 1a play between the first bidirectional bus 3 and the second bidirectional bus 12.
- the function of the converter that is, it can complete protocol conversion, data conversion, etc. between the first bidirectional bus 3 and the second bidirectional bus 12, thereby implementing communication between the first bidirectional bus 3 and the second bidirectional bus 12, That is, data can be transmitted between the first bidirectional bus 3 and the second bidirectional bus 12 through at least two physical interfaces 1a.
- any of the at least two physical interfaces in one physical interface 1a 1a X may include a bus bridge, the interrupt signal manager, memory and other components.
- the processing main system 2 can write the data to the memory in the physical interface 1a x through the bus bridge in the physical interface 1a x and trigger the interrupt signal through the interrupt signal manager in the physical interface 1a x to notify the security subsystem. Processing is performed, after which the security subsystem 1 can read data from the memory and process it. Similarly, the security subsystem 1 can write data to the memory and trigger an interrupt signal through the interrupt signal manager to notify the processing main system 2 to perform processing, after which the processing main system 2 can read from the memory through the bus bridge. Take the data and process it.
- At least two physical interfaces 1a either a physical interface for the transmission rate of the transmission X 1a embodiment faster data transmission, using a contact-type contact is typically greater than the transmission rate for transmission of data transmission, e.g., by When the mailbox performs data transmission, the transmission rate can reach 3.6 Mb/s (megabits/second) or more, which is several times the transmission rate of the original data transmission through the contact contacts.
- the terminal may further include a memory 4;
- a connection is established between the memory 4 and the security subsystem 1 via the first bidirectional bus 3, and the security subsystem 1 manages the data stored in the memory 4 via the first bidirectional bus 3.
- the memory 4 is a security subsystem 1 and a memory external to the processing main system 2, and the memory 4 can be used to store data managed by the security subsystem 1, and can also be used to store data managed by the processing main system 2. This embodiment of the present application does not limit this.
- the memory 4 may be a memory inside the SOC, or may be a memory external to the SOC, for example, the memory 4 may be external to the SOC.
- NVM Non-volatile memory
- DRAM dynamic random access memory
- the memory 4 can be connected to the first bidirectional bus 3 through a controller (CONTROLLER) included in the SOC.
- the data managed by the security subsystem 1 when the data managed by the security subsystem 1 is stored in the memory 4, that is, when the security subsystem 1 can store the data it manages in the memory 4, the data that the security subsystem 1 can manage The amount will be increased, so that the application range of the safety subsystem 1 can be expanded.
- the security subsystem 1 In the case where the memory 4 and the security subsystem 1 are connected through the first bidirectional bus 3, since the transmission rate of the first bidirectional bus 3 is fast, the security subsystem 1 can be relatively quickly passed through the first bidirectional bus 3. The data managed by the security subsystem 1 is acquired in the memory 4.
- the terminal includes a security subsystem, a processing main system, and a first bidirectional bus coupled between the security subsystem and the processing main system.
- the security subsystem is configured to manage at least one of data related to the user identity and data related to the network security in the wireless communication, and exchange the data with the processing main system through the first bidirectional bus, and the processing main system is used to pass
- the first bidirectional bus exchanges the data with the security subsystem and uses the data for wireless communication. Since the security subsystem establishes a connection with the processing main system through the first bidirectional bus, the security subsystem is in the same position as the processing main system, that is, the security subsystem can actively transmit data to the processing main system through the first bidirectional bus, and process the main system.
- the transmission rate of the first bidirectional bus is relatively fast, when the data is transmitted between the security subsystem and the processing main system through the first bidirectional bus, the data transmission rate between the security subsystem and the processing main system is high, thereby The rate of communication between the security subsystem and the processing host system can be increased.
- the communication method includes:
- Step 201 The security subsystem sends an interrupt request to the processing host system through the first bidirectional bus.
- the security subsystem when the security subsystem needs to implement an operation that cannot be completed by itself, that is, when the security subsystem needs to implement an operation that can be completed by processing the participation of the primary system, the security subsystem can generate a A command, and simultaneously sending an interrupt request to the processing host system through the first bidirectional bus, so that the subsequent processing main system can normally receive the first command according to the interrupt request.
- the first command is used to instruct the processing main system to perform operations related to data managed by the security subsystem, and the operation may be an operation requiring information prompting, an operation requiring communication with the server, and the like.
- the security subsystem can start the timer itself, and then prompt the timeout event (such as expiration of the reminder number package, expiration of the identification number, etc.) by processing the main system when the timer expires.
- the security subsystem needs to communicate with the server to complete functions such as data synchronization and data backup, and the data channel between the server and the server can be established by processing the main system to complete data communication with the server.
- the interrupt request is used to instruct the processing main system to receive the first command sent by the security subsystem, and the interrupt request can wake up the processing main system, or let the processing main system suspend the currently running program, and then execute the interrupt.
- the interrupt service program indicated by the request ie, the program receiving the first command).
- the interrupt request is a hardware signal mechanism, so reliability and timeliness can be ensured.
- the interrupt request can be a level signal inside the chip.
- the interrupt request can also be other forms of signals, such as a pulse signal. The embodiment of the present application does not limit this.
- Step 202 The security subsystem sends a first command to the processing host system through the first bidirectional bus.
- connection manner between the security subsystem and the processing main system is changed from the contact type contact connection to the first bidirectional bus connection, so that the security subsystem and the processing are changed through the connection mode change.
- the communication mode between the main systems is changed, that is, the security subsystem is in the same position as the processing main system during the communication process, and the data can be actively transmitted to each other through the first bidirectional bus.
- the interrupt request can be actively sent to the processing host system through the first bidirectional bus, and then actively pass the first bidirectional bus. Send the first command to the processing host system.
- Step 203 When the processing main system receives the interrupt request, interrupting the interrupt request to implement receiving the first command.
- the interrupt response of the interrupt request may include suspending a program currently running, and executing a program that receives the first command, and thus, after processing the main system to interrupt the interrupt request, the first command may be implemented. Normal reception.
- Step 204 When the processing main system receives the first command, execute the first command.
- the response result of the first command may be obtained, and the response result of the first command is used to indicate the completion of the operation to be completed by the security subsystem.
- processing main system may further send a response result of the first command to the security subsystem through the first bidirectional bus, so that the security subsystem can timely know the completion status of the operation to be implemented according to the response result of the first command.
- the security subsystem included in the terminal and the processing main system are connected through the first bidirectional bus.
- the security subsystem is in the same position as the processing main system, and thus the security subsystem needs to be processed by the main
- the system may actively send an interrupt request to the processing host system through the first bidirectional bus, and then actively send the processing to the processing main system through the first bidirectional bus to implement the operation.
- the first command to instruct the processing main system to complete the operation.
- the communication between the security subsystem and the processing main system is highly flexible, and since the security subsystem can actively send the first command to the processing main system without waiting for the instruction of the main system, the security subsystem and The rate of communication between the processing primary systems is high.
- the foregoing embodiment describes the process in which the security subsystem actively sends the first command to the processing primary system.
- the following describes the process of processing the primary system to actively send the second command to the security subsystem.
- FIG. 2B is a flowchart of a communication method provided by an embodiment of the present application. Referring to FIG. 2B, the method includes:
- Step 2011 The processing main system sends a second command to the security subsystem through the first bidirectional bus.
- the processing subsystem can generate a first implementation for the operation.
- the second command sends the second command to the security subsystem over the first bidirectional bus.
- the second command is used to instruct the security subsystem to perform operations related to data managed by the security subsystem, and the operation may be to read data managed by the security subsystem, update data managed by the security subsystem, and request security.
- the subsystem uses the managed data to calculate and return the calculation results.
- the processing main system may perform an authentication calculation through the security subsystem to obtain an authentication result, so as to perform an authentication operation according to the authentication result.
- the processing host system can read the IMSI from the security subsystem to access the network based on the IMSI.
- the processing host system may also pass the second command while generating the second command, that is, before sending the second command to the security subsystem through the first bidirectional bus.
- a bidirectional bus sends an interrupt request to the security subsystem.
- the interrupt request is used to instruct the security subsystem to receive a second command sent by the processing host system, and the interrupt request can both wake up the security subsystem and suspend the security subsystem to suspend the currently running program.
- Execute the interrupt service routine indicated by the interrupt request ie, the program that receives the second command).
- the interrupt request is a hardware signal mechanism, so reliability and timeliness can be ensured.
- the interrupt request can be a level signal inside the chip.
- the interrupt request can also be other forms of signals, such as a pulse signal. The embodiment of the present application does not limit this.
- Step 2012 When the security subsystem receives the second command, executing the second command.
- the operation of receiving the second command by the security subsystem may be implemented according to the interrupt request sent by the processing host system. Specifically, when the security subsystem receives the interrupt request, the security request may be interrupted by the interrupt request. Achieve the receipt of the second command.
- the interrupt response of the interrupt request may include suspending a program currently running, and executing a program that receives the second command, and thus the security subsystem may perform an interrupt response to the interrupt request, and may implement the second command. Normal reception.
- the response result of the second command may be obtained, and the response result of the second command is used to indicate the completion of the operation to be completed by the processing main system.
- Step 2013 The security subsystem sends a response result of the second command to the processing main system through the first bidirectional bus.
- the processing main system may receive the response result of the second command, and at this time, process the response result of the main system according to the second command. You can know in time the completion of the operations you want to complete.
- the commands used by the security subsystem and the processing host system may be an Application Protocol Data Unit (APDU) format.
- APDU Application Protocol Data Unit
- the commands of the present application may be used in other embodiments.
- the first command or the second command may carry a command data header, where the command data header is used to indicate an operation to be performed by the command, such as an information prompt operation, a communication operation with a server, a data read operation, etc., and
- the first command or the second command may also carry the command data content, and the command data header is used to indicate the operation related to the data content of the command. .
- the command data header carried in the first command may be used to indicate that the information prompting operation is performed.
- the content of the command data carried in the first command includes information that needs to be prompted, and the first command is used for the command carried by the first command.
- the information contained in the data content is prompted.
- the command data header carried in the second command may be used to perform a data reading operation, and the command data content carried in the second command is a storage location of the data to be read, and the second command is used for the second command.
- the data stored in the storage location contained in the command data content is read.
- the response result of the first command or the response result of the second command may carry a processing status, where the processing status is used to indicate a processing status of the command, and the processing status may include a normal end, a command not supported, and a command error.
- the parameter or the like, and when some data is obtained after processing the first command or the second command, the response result of the first command or the response result of the second command may further carry the processed data content.
- the processing status carried in the response result of the first command may be a normal end.
- the processing status carried in the response result of the second command may be a normal end, and the data content obtained by the processing carried in the response result of the second command may be the read data, such as IMSI, etc., and then the main system is processed.
- Wireless communication can be implemented based on the read data.
- the security subsystem and the processing host system transmit the command data header and the command data content at a time, thereby The communication rate between the security subsystem and the processing host system is increased.
- the security subsystem and the processing main system perform the processing status and the processed data content at one time. Transmission, thereby increasing the communication rate between the security subsystem and the processing host system.
- the command data header and the command data content need to be transmitted to the security subsystem in stages, and the security subsystem executes the command.
- the processing status and the processed data content need to be transmitted to the processing main system in a divided manner, so that multiple interactions between the processing main system and the security subsystem are required, and it is assumed that the processing main system needs to transmit a selection file to the security subsystem.
- the command, the file identifier (that is, the command data content) is 2 bytes
- the file information that is, the processed data content
- the operation of selecting the file requires a total of 74 bytes to be transmitted.
- the operation of selecting the file only needs 59 bytes. .
- the security subsystem may actively send the first command to the processing main system, and then the processing main system returns the response result of the first command, thereby implementing the operation to be completed by the security subsystem.
- the processing main system can also actively send a second command to the security subsystem, and then the security subsystem returns the response result of the second command, thereby implementing the operation to be completed by the main system. That is, when the security subsystem interacts with the processing main system to perform an operation, the operation can be completed by only two interactions, thereby greatly reducing the number of interactions between the security subsystem and the processing main system when performing an operation. The communication rate between the security subsystem and the processing host system is increased.
- the security subsystem may include at least two physical interfaces, the at least two physical interfaces being connected to the first bidirectional bus, thereby establishing at least two physical channels between the security subsystem and the first bidirectional bus, and actually At least two physical channels are established between the security subsystem and the processing main system, and the security subsystem and the processing main system can communicate through the at least two physical channels, that is, between the security subsystem and the processing main system.
- different operations are performed through the first bidirectional bus and different physical interfaces.
- the security subsystem and the processing main system are in parallel transmission mode, thereby improving the communication rate between the security subsystem and the processing main system.
- step 202 when the security subsystem sends the first command to the processing host system through the first bidirectional bus, the security subsystem may first select one physical interface from the at least two physical interfaces as the target physical interface, and then pass the target. The physical interface and the first bidirectional bus send a first command to the processing host system.
- step 204 when the processing main system sends the response result of the first command to the security subsystem through the first bidirectional bus, the processing main system may send the first command to the security subsystem through the first bidirectional bus and the target physical interface. Response result.
- step 2011 when the processing main system sends the second command to the security subsystem through the first bidirectional bus, the processing main system may first select one physical interface from the at least two physical interfaces as the target physical interface, and then pass the The first bidirectional bus and the target physical interface send a second command to the security subsystem; correspondingly, in step 2013, when the security subsystem sends the response result of the second command to the processing main system through the first bidirectional bus, the security subsystem may The response result of the second command is sent to the processing host system through the target physical interface and the first bidirectional bus.
- the processing main system may receive at least two commands simultaneously through the at least two physical interfaces, and the security subsystem may also pass the at least two The two physical interfaces receive at least two commands simultaneously.
- the processing main system or the security subsystem may sequentially execute the at least two commands in descending order of priority of at least two commands received at the same time.
- the security subsystem may receive other commands through a physical interface during the execution of a certain command.
- the processing host system may also perform some During the process of a command, other commands are received through a physical interface.
- the security subsystem or the processing host system may continue to execute the command when the priority of the command is higher than the priority of the other command, and execute the other command after executing the command; and when the command is executed When the priority of the command is lower than the priority of the other command, the execution of the command is interrupted, and the other command is executed, and after the other command is executed, the command is resumed.
- the parallel transmission mode may include the following steps 01-11.
- Step 01 The processing main system generates a second command for acquiring a short message
- Step 02 The processing main system sends the second command for acquiring the short message to the security subsystem through the first bidirectional bus and the first physical interface;
- Step 03 When the security subsystem receives the second command for acquiring a short message, executing the second command for acquiring the short message to obtain the short message;
- Step 04 The processing main system generates a second command for obtaining authentication data.
- Step 05 The processing main system sends the second command for obtaining the authentication data to the security subsystem through the first bidirectional bus and the second physical interface;
- Step 06 When the security subsystem receives the second command for obtaining the authentication data, assuming that the second command for obtaining the authentication data has a higher priority than the second command for acquiring the short message, The security subsystem interrupts execution of the second command for acquiring the short message, and then executes the second command for obtaining the authentication data to perform authentication calculation to obtain the authentication data;
- Step 07 The security subsystem sends the response result of the second command carrying the authentication data and the processing status to the processing main system through the second physical interface and the first bidirectional bus;
- Step 08 processing the authentication data when the processing main system receives the response result of the second command carrying the authentication data and the processing status;
- Step 09 The security subsystem continues to execute the second command for acquiring the short message to obtain the short message.
- Step 10 The security subsystem sends the response result of the second command carrying the short message and the processing status to the processing main system through the first physical interface and the first bidirectional bus;
- Step 11 When the processing main system receives the response result of the second command carrying the short message and the processing status, the short message is processed.
- connection mode between the security subsystem and the processing main system may also cause other changes in the communication modes of the two.
- the length of data transmitted between the security subsystem and the processing host system through the first bidirectional bus is not limited, that is, a single time.
- the maximum length of data transmitted is at least greater than 255 bytes, which greatly increases the communication rate between the security subsystem and the processing host system.
- the maximum length of data transmitted between the security subsystem and the processing host system is 255 bytes.
- the data to be transmitted exceeds the maximum length, it needs to be divided into multiple transmissions. Suppose you want to transfer 500 bytes of data, you need to send two commands, a total of 517 bytes.
- the length of data transmitted by the security subsystem and the processing host system through the first bidirectional bus is not limited, only one transmission is required, and only 508 bytes are needed.
- the security subsystem can control its own clock, that is, the security subsystem can control its own clock stop, and can also control its own clock recovery. Without waiting for the instructions of the main system to be controlled, not only the clock control efficiency of the security subsystem can be improved, but also the communication resources for processing the main system can be saved.
- the security subsystem can acquire the managed data from the memory more quickly through the first bidirectional bus, thereby not affecting the security subsystem.
- the amount of data that the security subsystem can manage is increased.
- the security subsystem and the processing main system are connected through the first bidirectional bus.
- the security subsystem as a peer role for processing the main system may have a larger application range.
- the change of the communication mode brought by the connection mode can not only improve the reading speed of the data managed by the security subsystem, but also improve the communication rate between the processing main system and the security subsystem, and process the main system and security.
- the performance of the terminal such as boot speed, search speed, etc.
- the embodiment of the present application also provides a computer readable storage medium having instructions stored therein that, when executed on a computer, cause the computer to perform one or more of the steps described above.
- the constituent modules of the above signal processing device may be stored in the computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
- the computer readable storage medium may be a non-power-down volatile memory, such as an EMMC (Embedded Multi Media Card), UFS (Universal Flash Storage), or a read-only memory (Read). -Only Memory, ROM), or other types of static storage devices that can store static information and instructions.
- RAM Random Access Memory
- EEPROM electrically erasable programmable read-only memory
- CD-ROM Compact Disc Read-Only Memory
- optical disc storage including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
- the embodiment of the present application further provides a computer program product including instructions, and the technical solution of the present application may contribute to the prior art or all or part of the technical solution may be a software product.
- the computer software product is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor therein to perform various embodiments of the present application. All or part of the steps of the method.
- the instructions may be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
- wire eg, coaxial cable, fiber optic, Digital Subscriber Line (DSL)
- wireless eg, infrared, wireless, microwave, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Small-Scale Networks (AREA)
- Bus Control (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请公开了一种终端和通信方法,属于通信技术领域。所述终端包括:安全子系统、处理主系统和耦合在安全子系统与处理主系统之间的第一双向总线;安全子系统,用于管理无线通信中与用户身份相关的数据和与网络安全相关的数据中的至少一项,并通过第一双向总线与处理主系统交换所述数据;处理主系统,用于通过第一双向总线与安全子系统交换所述数据,并使用所述数据实现无线通信。本申请中安全子系统与处理主系统处于同等地位,即安全子系统和通信主系统之间可以互相主动通过第一双向总线传输数据,从而提高了安全子系统与处理主系统之间的通信灵活度,且由于第一双向总线的传输速率较快,所以可以提高安全子系统与处理主系统之间的通信速率。
Description
本申请要求于2017年11月30日提交中国国家知识产权局、申请号为201711240720.5、申请名称为“终端和通信方法”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信技术领域,特别涉及一种终端和通信方法。
随着通信技术的发展,诸如手机、平板电脑等终端已经成为人们日常生活中不可或缺的一部分。终端中通常包括有智能卡和通信处理器,该智能卡中存储有与用户身份相关的数据和与网络安全相关的数据中的至少一项,如可以存储有通信参数、鉴权数据等,该通信处理器可以与该智能卡进行通信,以读取存储在该智能卡中的数据。
相关技术中,智能卡通过接触式触点与通信处理器进行连接,此时智能卡与通信处理器根据ISO7816协议进行通信。在ISO7816协议的规定中,通信处理器处于主动地位,智能卡处于从属地位,即通信处理器与智能卡之间的通信只能由通信处理器发起,而不能由智能卡发起,智能卡只能进行应答。
这种情况下,智能卡只能依赖于通信处理器对其存储的数据进行读取,而无法主动将数据传输给通信处理器,也即是,智能卡如果需要传输数据给通信处理器,则需要等待至接收到通信处理器传输的读取命令后才能进行数据传输,因而导致智能卡与通信处理器之间的通信灵活度较低,通信速率较低。
发明内容
本申请提供了一种终端和通信方法,可以解决相关技术中安全子系统与处理主系统之间的通信灵活度较低,且通信速率较低的问题。所述技术方案如下:
第一方面,提供了一种终端,所述终端包括:安全子系统、处理主系统和耦合在所述安全子系统与所述处理主系统之间的第一双向总线;
所述安全子系统,用于管理无线通信中与用户身份相关的数据和与网络安全相关的数据中的至少一项,并通过所述第一双向总线与所述处理主系统交换所述数据;
所述处理主系统,用于通过所述第一双向总线与所述安全子系统交换所述数据,并使用所述数据实现无线通信。
需要说明的是,安全子系统是一个安全隔离的子系统,其内部组件对外不可见,即安全子系统1外部的功能部件只能通过特定的接口来访问安全子系统,例如,安全子系统可以为用户识别模块(Subscriber Identity Module,SIM)卡等,且可以为嵌入式SIM(embedded SIM,eSIM)卡等。
另外,处理主系统用于处理该终端中的各种数据,且其可以用于实现该终端的无线通 信功能,即处理主系统可以负责该终端中所有通讯软件的执行,例如,处理主系统可以为通信处理器(Communication Processor,CP)(也称为基带处理器(Baseband Processor,BP))、中央处理单元(Central Processing Unit,CPU)等。
在本申请实施例中,在安全子系统与处理主系统之间通过第一双向总线进行连接的情况下,安全子系统与处理主系统将处于同等地位,也即,安全子系统可以主动将数据通过第一双向总线传输到处理主系统,处理主系统也可以主动将数据通过第一双向总线传输到安全子系统,从而提高了安全子系统与处理主系统之间的通信灵活度。另外,由于第一双向总线的传输速率较快,所以当安全子系统与处理主系统之间通过第一双向总线传输数据时,安全子系统与处理主系统之间的数据传输速率较高,从而可以提高安全子系统与处理主系统之间的通信速率。
在一种可能的设计中,所述安全子系统与所述处理主系统之间使用所述第一双向总线以全双工方式进行通信。
在本申请实施例中,安全子系统通过第一双向总线向处理主系统传输数据的同时,处理主系统也可以通过第一双向总线向安全子系统传输数据,此时安全子系统和处理主系统均能在传输数据的同时接收数据,从而进一步提高了安全子系统与处理主系统之间的通信速率。
在一种可能的设计中,所述安全子系统中包括至少两个物理接口;
所述至少两个物理接口均连接至所述第一双向总线,所述安全子系统与所述处理主系统之间同时通过所述至少两个物理接口并行交换所述数据。
在本申请实施例中,将至少两个物理接口均与第一双向总线进行连接,即是在第一双向总线与安全子系统之间建立了至少两个物理通道,实际上也是在处理主系统与安全子系统之间建立了至少两个物理通道。在此情况下,处理主系统可以同时通过该至少两个物理通道向安全子系统传输数据,安全子系统也可以同时通过该至少两个物理通道向处理主系统传输数据,当然,处理主系统通过该至少两个物理通道向安全子系统传输数据的同时,安全子系统也可以通过该至少两个物理通道向处理主系统传输数据。也即,安全子系统与处理主系统之间可以同时通过第一双向总线和不同的物理接口来执行不同的操作,此时,安全子系统与处理主系统之间为并行传输方式,从而进一步提高了安全子系统与处理主系统之间的通信速率。
在一种可能的设计中,所述安全子系统中包括多个组件和第二双向总线;
所述多个组件之间通过所述第二双向总线建立连接,以实现所述多个组件之间数据的传输。
在本申请实施例中,多个组件之间通过第二双向总线进行连接后,多个组件中的任一组件可以主动将数据通过第二双向总线传输到其它组件,其它组件也可以主动将数据通过第二双向总线传输到该组件。另外,由于第二双向总线的传输速率较快,所以当安全子系统包括的多个组件之间通过第二双向总线传输数据时,多个组件之间的数据传输速率较高,从而可以提高安全子系统的数据处理效率。
在一种可能的设计中,所述多个组件中的至少两个组件为所述至少两个物理接口。
这种情况下,至少两个物理接口中的每个物理接口可以为总线接口,此时,至少两个物理接口可以建立第一双向总线与第二双向总线之间的连接,至少两个物理接口在第一双 向总线与第二双向总线之间起着“转换器”的作用,即其可以完成第一双向总线与第二双向总线之间的协议转换、数据转换等,从而实现第一双向总线与第二双向总线之间的通信,也即,第一双向总线与第二双向总线之间可以通过至少两个物理接口传输数据。
在一种可能的设计中,所述多个组件之间使用所述第二双向总线以全双工方式进行通信。
在本申请实施例中,多个组件中的任一组件通过第二双向总线向其它组件传输数据的同时,其它组件也可以通过第二双向总线向该组件传输数据,此时多个组件均能够在传输数据的同时接收数据,从而进一步提高了多个组件之间的数据传输效率,且进一步提高了安全子系统的数据处理效率。
在一种可能的设计中,所述终端中还包括存储器;
所述存储器与所述安全子系统之间通过所述第一双向总线建立连接,所述安全子系统通过所述第一双向总线管理所述存储器中存储的数据。
在本申请实施例中,终端包括的存储器为安全子系统外部的存储器,当该存储器中存储有被安全子系统所管理的数据时,也即,当安全子系统可以将管理的数据存储于该存储器中时,安全子系统能够管理的数据量将得以增加,从而可以扩大安全子系统的应用范围。而在该存储器与安全子系统通过第一双向总线进行连接的情况下,由于第一双向总线的传输速率较快,所以安全子系统通过第一双向总线将能够较为快速地获取安全子系统所管理的数据。
第二方面,提供了一种通信方法,所述通信方法应用于上述第一方面或者其任一种可能的设计中所述的终端,所述方法包括:
所述安全子系统通过所述第一双向总线向所述处理主系统发送中断请求,所述中断请求用于指示所述处理主系统接收所述安全子系统发送的第一命令,所述第一命令用于指示所述处理主系统进行与所述安全子系统管理的数据相关的操作;
所述安全子系统通过所述第一双向总线向所述处理主系统发送所述第一命令。
进一步地,当所述处理主系统接收到所述中断请求时,可以对所述中断请求进行中断响应,以实现对所述第一命令的接收,且当所述处理主系统接收到所述第一命令时,可以执行所述第一命令,得到第一命令的响应结果,并通过所述第一双向总线向所述安全子系统发送所述第一命令的响应结果。
在本申请实施例中,终端包括的安全子系统与处理主系统之间通过第一双向总线进行连接,此时,安全子系统与处理主系统处于同等地位,因而当安全子系统需要经由处理主系统进行与安全子系统管理的数据相关的操作时,可以主动通过第一双向总线向处理主系统发送中断请求,并在其后主动通过第一双向总线向处理主系统发送用于实现该操作的第一命令,来指示处理主系统完成该操作。在此情况下,安全子系统与处理主系统之间的通信灵活度较高,且由于安全子系统无需等待处理主系统的指示即可主动向处理主系统发送第一命令,所以安全子系统与处理主系统之间的通信速率较高。
在一种可能的设计中,所述方法还包括:
所述处理主系统通过所述第一双向总线向所述安全子系统发送第二命令,所述第二命令包括命令数据头和命令数据内容,所述命令数据头用于指示所述安全子系统进行与所述 命令数据内容相关的操作;
所述安全子系统执行所述第二命令;
所述安全子系统通过所述第一双向总线向所述处理主系统发送所述第二命令的响应结果,所述响应结果包括处理状态和处理得到的数据内容。
值得说明的是,当第一命令或第二命令中同时携带有命令数据头和命令数据内容时,安全子系统与处理主系统之间是一次性对命令数据头和命令数据内容进行传输,从而提高了安全子系统与处理主系统之间的通信速率。当第一命令的响应结果或第二命令的响应结果中同时携带有处理状态和处理得到的数据内容时,安全子系统与处理主系统之间是一次性对处理状态和处理得到的数据内容进行传输,从而提高了安全子系统与处理主系统之间的通信速率。
在本申请实施例中,安全子系统可以主动向处理主系统发送第一命令,然后由处理主系统返回第一命令的响应结果,从而实现安全子系统所要完成的操作。且处理主系统也可以主动向安全子系统发送第二命令,然后由安全子系统返回第二命令的响应结果,从而实现处理主系统所要完成的操作。也即,安全子系统与处理主系统在交互执行某个操作时,只需两次交互即可完成该操作,从而大大减少了安全子系统与处理主系统在执行某个操作时的交互次数,提高了安全子系统与处理主系统之间的通信速率。
在一种可能的设计中,所述安全子系统中包括至少两个物理接口;所述处理主系统通过所述第一双向总线向所述安全子系统发送第二命令,包括:
所述处理主系统从所述至少两个物理接口中选择一个物理接口作为目标物理接口;
所述处理主系统通过所述第一双向总线和所述目标物理接口向所述安全子系统发送第二命令;
相应地,所述安全子系统通过所述第一双向总线向所述处理主系统发送所述第二命令的响应结果,包括:
所述安全子系统通过所述目标物理接口和所述第一双向总线向所述处理主系统发送所述第二命令的响应结果。
在本申请实施例中,第一双向总线和安全子系统可以通过该至少两个物理接口进行连接,从而在第一双向总线和安全子系统之间建立了至少两个物理通道,也即,在处理主系统与安全子系统之间建立了至少两个物理通道。此时,安全子系统与处理主系统之间可以通过该至少两个物理通道进行通信,也即,安全子系统与处理主系统之间可以同时通过第一双向总线与不同的物理接口来执行不同的操作,此时,安全子系统与处理主系统之间为并行传输方式,从而提高了安全子系统与处理主系统之间的通信速率。
在一种可能的设计中,所述安全子系统与所述处理主系统之间通过所述第一双向总线单次传输的数据的长度将不受限制,即所述单次传输的数据的最大长度至少大于255字节,从而可以大大提高所述安全子系统与所述处理主系统之间的通信速率。
第三方面,提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机或处理器上运行时,使得计算机或处理器执行上述第二方面或者其任一种可能的设计中所述的通信方法。
第四方面,提供了一种包含指令的计算机程序产品,当其在计算机或处理器上运行时,使得计算机或处理器执行上述第二方面或者其任一种可能的设计中所述的通信方法。
上述第三方面和第四方面所获得的技术效果与上述第二方面中对应的技术手段获得的技术效果近似,在这里不再赘述。
本申请提供的技术方案带来的有益效果是:终端中包括安全子系统、处理主系统和耦合在安全子系统与处理主系统之间的第一双向总线。其中,安全子系统用于管理无线通信中与用户身份相关的数据和与网络安全相关的数据中的至少一项,并通过第一双向总线与处理主系统交换该数据,处理主系统用于通过第一双向总线与安全子系统交换该数据,并使用该数据实现无线通信。由于安全子系统通过第一双向总线与处理主系统建立连接,因而安全子系统与处理主系统处于同等地位,即安全子系统可以主动将数据通过第一双向总线传输到处理主系统,处理主系统也可以主动将数据通过第一双向总线传输到安全子系统,从而提高了安全子系统与处理主系统之间的通信灵活度。另外,由于第一双向总线的传输速率较快,所以当安全子系统与处理主系统之间通过第一双向总线传输数据时,安全子系统与处理主系统之间的数据传输速率较高,从而可以提高安全子系统与处理主系统之间的通信速率。
图1A是本申请实施例提供的第一种终端的结构示意图;
图1B是本申请实施例提供的第二种终端的结构示意图;
图1C是本申请实施例提供的第三种终端的结构示意图;
图1D是本申请实施例提供的第四种终端的结构示意图;
图1E是本申请实施例提供的第五种终端的结构示意图;
图1F是本申请实施例提供的第六种终端的结构示意图;
图1G是本申请实施例提供的第七种终端的结构示意图;
图1H是本申请实施例提供的第八种终端的结构示意图;
图2A是本申请实施例提供的一种通信方法的流程图;
图2B是本申请实施例提供的另一种通信方法的流程图;
图2C为本申请实施例提供的一种并行传输方式的示意图;
附图标记:
1:安全子系统;1a:物理接口;11:组件;12:第二双向总线;2:处理主系统;3:第一双向总线;4:存储器。
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请的实施方式作进一步地详细描述。
在对本申请实施例进行详细地解释说明之前,对本申请实施例涉及的名词和应用场景予以说明。
首先,对本申请实施例涉及的名词进行说明。
安全子系统:是一个安全隔离的子系统,其内部组件对外不可见,即安全子系统外部的功能部件只能通过特定的接口来访问安全子系统,例如,安全子系统可以为智能卡(Smart card)(也称为集成电路(Integrated Circuit,IC)卡、微芯片卡等)等。安全子系统可以用于管理无线通信中与用户身份相关的数据和与网络安全相关的数据中的至少一项,与用户身份相关的数据可以包括国际移动用户识别码(International Mobile Subscriber Identification Number,IMSI)、鉴权密钥(Key identifier,Ki)、个人识别码(Personal Identification Number,PIN)、解锁码(Personal Unlock Key,PUK)等中的至少一个,与网络安全相关的数据可以包括位置区域识别码(Location Area Identity,LAI)、移动用户暂时识别码(Temporary Mobile Subscriber Identity,TMSI)、禁用公共陆地移动网络号(Forbidden Public Land Mobile Network,FPLMN)等中的至少一个。
处理主系统:用于处理终端中的各种数据,其可以实现终端的无线通信功能,即处理主系统可以负责终端中所有通讯软件的执行,例如,处理主系统可以为CP(也称为BP)、CPU等。处理主系统可以与安全子系统交换安全子系统管理的数据,并使用交换得到的数据实现无线通信。
双向总线:为终端包括的各种功能部件之间传输数据时使用的公共通信干线,其是由导线组成的传输线束,也即,各种功能部件之间可以通过双向总线进行连接并通信。双向总线具有双向传输能力,即连接双向总线的多个功能部件中的任一功能部件可以选择性地向其它功能部件传输数据,也可以选择性地接收其它功能部件传输的数据。例如,双向总线可以为集成电路总线(Inter-Integrated Circuit,I2C)、串行外设接口(Serial Peripheral Interface,SPI)总线等。
然后,对本申请实施例涉及的应用场景进行说明。
本申请实施例应用于终端包括的安全子系统与处理主系统之间的通信场景。目前,终端包括的安全子系统一般为智能卡,包括的处理主系统一般为通信处理器,且智能卡与通信处理器都是通过接触式触点进行连接,并根据ISO7816协议进行通信。然而,智能卡与通信处理器之间根据ISO7816协议进行通信时存在以下情形:
1.智能卡与通信处理器之间的通信只能由通信处理器发起,而不能由智能卡发起,智能卡只能对通信处理器传输的命令进行应答。
2.智能卡与通信处理器之间传输的数据的最大长度为255字节,当所要传输的数据超过该最大长度时,需要分成多次传输。另外,通信处理器向智能卡传输命令时,需要将命令数据头和命令数据内容分次传输给智能卡,而智能卡执行该命令后,也需要将处理状态和处理得到的数据内容分次传输给通信处理器。
3.通信处理器与智能卡之间以半双工方式进行通信,即通信处理器和智能卡同时只能有一方传输数据,另一方只能等待至接收到对方传输的数据后,才能继续进行数据传输。
4.智能卡的时钟只能由通信处理器进行控制,而不能由自身进行控制,也即,只能由通信处理器控制智能卡的时钟停止,或者控制智能卡的时钟恢复。
在上述情形下,智能卡与通信处理器之间的通信灵活度和通信速率均较低。为此,本申请实施例将终端中包括的安全子系统与处理主系统之间的接触式触点连接方式改变为双向总线连接方式,从而在连接方式改变之后,使得安全子系统与处理主系统之间的通信可以突破ISO7816协议的限制,得到新的通信方式,进而以此提高安全子系统与处理主系统 之间的通信灵活度和通信速率。
接下来对本申请实施例提供的终端进行详细地解释说明。
图1A是本申请实施例提供的一种终端的结构示意图。参见图1A,该终端包括:安全子系统1、处理主系统2和耦合在安全子系统1与处理主系统2之间的第一双向总线3;
安全子系统1,用于管理无线通信中与用户身份相关的数据和与网络安全相关的数据中的至少一项,并通过第一双向总线3与处理主系统2交换该数据;
处理主系统2,用于通过第一双向总线3与安全子系统1交换该数据,并使用该数据实现无线通信。
需要说明的是,安全子系统1是一个安全隔离的子系统,其内部组件对外不可见,即安全子系统1外部的功能部件只能通过特定的接口来访问安全子系统1,例如,安全子系统1可以为智能卡,且可以为eSIM卡等。安全子系统1可以管理无线通信中与用户身份相关的数据和与网络安全相关的数据中的至少一项,与用户身份相关的数据可以包括IMSI、Ki、PIN、PUK等中的至少一个,与网络安全相关的数据可以包括LAI、TMSI、FPLMN等中的至少一个。可选的,安全子系统1可以独立于处理主系统2之外,如可以是可插拔的SIM卡;可选的,安全子系统1可以与处理主系统2集成在同一个芯片上,如安全子系统1和处理主系统2均可以包括于该终端的系统级芯片(System On Chip,SOC)中。
另外,处理主系统2用于处理该终端中的各种数据,且其可以用于实现该终端的无线通信功能,即处理主系统2可以负责该终端中所有通讯软件的执行,例如,处理主系统可以为CP、CPU等。处理主系统2可以与安全子系统1交换安全子系统1管理的数据,并使用交换得到的数据实现无线通信。
需要说明的是,第一双向总线3具有双向传输能力,其可以为该终端包括的多个功能部件之间的公共通道,该多个功能部件均可以与第一双向总线3进行连接,以实现该多个功能部件之间的连接,此时该多个功能部件互相之间可以通过第一双向总线3来传输数据。例如,如图1B所示,该多个功能部件可以包括安全子系统1、处理主系统2、应用处理器、多媒体处理器、低功耗控制器、外围设备(如蓝牙、键盘、屏幕等)等,该多个功能部件互相之间可以通过第一双向总线3来传输数据。
另外,第一双向总线3的传输速率较快,通常大于接触式触点的传输速率,例如,第一双向总线3可以为I2C、SPI总线等。在一种可选的方案中,第一双向总线3可以为高速总线,高速总线的传输速率相比于普通总线的传输速率更快,例如,第一双向总线3可以为外围部件快速互连(Peripheral Component Interconnect Express,PCIe)总线、超传输(Hyper Transport,HT)总线等高速总线。
值得说明的是,在安全子系统1与处理主系统2之间通过第一双向总线3进行连接的情况下,安全子系统1与处理主系统2将处于同等地位,也即,安全子系统1可以主动将数据通过第一双向总线3传输到处理主系统2,处理主系统2也可以主动将数据通过第一双向总线3传输到安全子系统1,从而提高了安全子系统1与处理主系统2之间的通信灵活度。
另外,由于第一双向总线3的传输速率较快,所以当安全子系统1与处理主系统2之间通过第一双向总线3传输数据时,安全子系统1与处理主系统2之间的数据传输速率较高,从而可以提高安全子系统1与处理主系统2之间的通信速率。
其中,安全子系统1与处理主系统2之间可以使用第一双向总线3以全双工方式进行通信,也即,安全子系统1通过第一双向总线3向处理主系统2传输数据的同时,处理主系统2也可以通过第一双向总线3向安全子系统1传输数据,此时安全子系统1和处理主系统2均能在传输数据的同时接收数据,从而进一步提高了安全子系统1与处理主系统2之间的通信速率。
其中,参见图1C,安全子系统1中包括至少两个物理接口1a。
至少两个物理接口1a均连接至第一双向总线3,安全子系统1与处理主系统2之间同时通过至少两个物理接口1a并行交换安全子系统1管理的数据。
需要说明的是,至少两个物理接口1a为安全子系统1与第一双向总线3之间的硬件接口,例如,至少两个物理接口1a中的任一物理接口1a
x可以为I2C接口、SPI接口等。至少两个物理接口1a可以从第一双向总线3中接收数据,也可以向第一双向总线3传输数据,也即,安全子系统1可以通过至少两个物理接口1a从第一双向总线3中接收数据,也可以通过至少两个物理接口1a向第一双向总线3传输数据。
另外,至少两个物理接口1a均连接至第一双向总线3后,即是在第一双向总线3与安全子系统1之间建立了至少两个物理通道,实际上也是在处理主系统2与安全子系统1之间建立了至少两个物理通道。在此情况下,处理主系统2可以同时通过该至少两个物理通道向安全子系统1传输数据,安全子系统1也可以同时通过该至少两个物理通道向处理主系统2传输数据,当然,处理主系统2通过该至少两个物理通道向安全子系统1传输数据的同时,安全子系统1也可以通过该至少两个物理通道向处理主系统2传输数据。也即,安全子系统1与处理主系统2之间可以同时通过第一双向总线3和不同的物理接口1a来执行不同的操作,此时,安全子系统1与处理主系统2之间为并行传输方式,从而进一步提高了安全子系统1与处理主系统2之间的通信速率。
其中,参见图1D,安全子系统1中包括多个组件11和第二双向总线12;
多个组件11之间通过第二双向总线12建立连接,以实现多个组件11之间数据的传输。
需要说明的是,第二双向总线12具有双向传输能力,其可以为多个组件11之间的公共通道,多个组件11互相之间可以通过第二双向总线12传输数据。例如,如图1E所示,多个组件11可以为CPU11
1、只读存储器(Read-Only Memory,ROM)11
2、随机存取存储器(random access memory,RAM)11
3、内存管理单元(Memory Management Unit,MMU)11
4、随机数发生器(TRNG)11
5、传感器(SENSOR)11
6等,多个组件11互相之间可以通过第二双向总线12来传输数据。
另外,第二双向总线12的传输速率较快,通常大于普通连线的传输速率,例如,第二双向总线12可以为I2C、SPI总线等。在一种可选的方案中,第二双向总线12可以为高速总线,高速总线的传输速率相比于普通总线的传输速率更快,例如,第二双向总线12可以为PCIe总线、HT总线等高速总线。
值得说明的是,多个组件11之间通过第二双向总线12建立连接后,多个组件11中的任一组件11
x可以主动将数据通过第二双向总线12传输到其它组件11
y,其它组件11
y也可以主动将数据通过第二双向总线12传输到该组件11
x。
另外,由于第二双向总线12的传输速率较快,所以当安全子系统1中包括的多个组件11之间通过第二双向总线12传输数据时,多个组件11之间的数据传输速率较高,从而可 以提高安全子系统1的数据处理效率。
其中,多个组件11之间可以使用第二双向总线12以全双工方式进行通信,也即,多个组件11中的任一组件11
x通过第二双向总线12向其它组件11
y传输数据的同时,其它组件11
y也可以通过第二双向总线12向该组件11
x传输数据,此时多个组件11均能够在传输数据的同时接收数据,从而进一步提高了多个组件11之间的数据传输效率,且进一步提高了安全子系统1的数据处理效率。
其中,参见图1F,多个组件11中的至少两个组件11
z为至少两个物理接口1a。
这种情况下,至少两个物理接口1a中的每个物理接口1a可以为总线接口,如至少两个物理接口1a均可以为邮箱(mailbox)等。此时,至少两个物理接口1a可以建立第一双向总线3与第二双向总线12之间的连接,至少两个物理接口1a在第一双向总线3与第二双向总线12之间起着“转换器”的作用,即其可以完成第一双向总线3与第二双向总线12之间的协议转换、数据转换等,从而实现第一双向总线3与第二双向总线12之间的通信,也即,第一双向总线3与第二双向总线12之间可以通过至少两个物理接口1a传输数据。
另外,至少两个物理接口1a中的任一物理接口1a
x中可以包括总线桥、中断信号管理器、存储器等部件。此时,处理主系统2可以将数据通过物理接口1a
x中的总线桥写入物理接口1a
x中的存储器,并通过物理接口1a
x中的中断信号管理器触发中断信号,以通知安全子系统1进行处理,之后,安全子系统1可以从该存储器中读取数据并处理。同样,安全子系统1可以将数据写入该存储器,并通过该中断信号管理器触发中断信号,以通知处理主系统2进行处理,之后,处理主系统2可以通过该总线桥从该存储器中读取数据并处理。
再者,使用至少两个物理接口1a中的任一物理接口1a
x进行数据传输的传输方式的传输速率较快,通常大于使用接触式触点进行数据传输的传输方式的传输速率,例如,通过mailbox进行数据传输时的传输速率可以达到3.6Mb/s(兆比特/秒)以上,是原有的通过接触式触点进行数据传输时的传输速率的几十倍。
进一步地,参见图1G,该终端中还可以包括存储器4;
存储器4与安全子系统1之间通过第一双向总线3建立连接,安全子系统1通过第一双向总线3管理存储器4中存储的数据。
需要说明的是,存储器4为安全子系统1和处理主系统2外部的存储器,且存储器4可以用于存储由安全子系统1管理的数据,也可以用于存储由处理主系统2管理的数据,本申请实施例对此不作限定。
另外,当安全子系统1和处理主系统2均包括于该终端的SOC中时,存储器4可以为该SOC内部的存储器,也可以为该SOC外部的存储器,如存储器4可以为该SOC外部的非易失性存储器(Non-volatile Memory,NVM)、动态随机存取存储器(Dynamic Random Access Memory,DRAM)等。当存储器4为该SOC外部的存储器时,如图1H所示,存储器4可以通过该SOC中包括的控制器(CONTROLLER)连接到第一双向总线3。
值得说明的是,当存储器4中存储有由安全子系统1管理的数据时,也即,当安全子系统1可以将其管理的数据存储于存储器4中时,安全子系统1能够管理的数据量将得以增加,从而可以扩大安全子系统1的应用范围。而在存储器4与安全子系统1通过第一双向总线3建立连接的情况下,由于第一双向总线3的传输速率较快,所以安全子系统1通过第一双向总线3将能够较为快速地从存储器4中获取安全子系统1所管理的数据。
在本申请实施例中,终端中包括安全子系统、处理主系统和耦合在安全子系统与处理主系统之间的第一双向总线。其中,安全子系统用于管理无线通信中与用户身份相关的数据和与网络安全相关的数据中的至少一项,并通过第一双向总线与处理主系统交换该数据,处理主系统用于通过第一双向总线与安全子系统交换该数据,并使用该数据实现无线通信。由于安全子系统通过第一双向总线与处理主系统建立连接,因而安全子系统与处理主系统处于同等地位,即安全子系统可以主动将数据通过第一双向总线传输到处理主系统,处理主系统也可以主动将数据通过第一双向总线传输到安全子系统,从而提高了安全子系统与处理主系统之间的通信灵活度。另外,由于第一双向总线的传输速率较快,所以当安全子系统与处理主系统之间通过第一双向总线传输数据时,安全子系统与处理主系统之间的数据传输速率较高,从而可以提高安全子系统与处理主系统之间的通信速率。
接下来对应用于该终端的通信方法进行详细地解释说明。
图2A是本申请实施例提供的一种通信方法的流程图,该方法可以应用于上述图1A-图1H任一所示的终端。参见图2A,该通信方法包括:
步骤201:安全子系统通过第一双向总线向处理主系统发送中断请求。
实际应用中,当安全子系统需要实现无法由自身独立完成的操作时,即当安全子系统需要实现经由处理主系统的参与才能完成的操作时,安全子系统可以生成用于实现该操作的第一命令,并同时通过第一双向总线向处理主系统发送中断请求,以便后续处理主系统可以根据该中断请求对第一命令进行正常接收。
需要说明的是,第一命令用于指示处理主系统进行与安全子系统管理的数据相关的操作,且该操作可以为需要进行信息提示的操作、需要与服务器进行通信的操作等。例如,安全子系统可以自己启动定时器,然后在定时器超时的时候通过处理主系统提示该超时事件(如提示号码套餐过期、身份标识号过期等)。又例如,安全子系统需要与服务器进行通信,完成数据同步、数据备份等功能,则可以通过处理主系统实现与服务器之间的数据通道的建立,完成与服务器的数据通信。
另外,该中断请求用于指示处理主系统接收安全子系统发送的第一命令,该中断请求既可以唤醒处理主系统,也可以让处理主系统挂起当前正在运行的程序,转而执行该中断请求所指示的中断服务程序(即接收第一命令的程序)。该中断请求为硬件信号机制,因而可以保证可靠性和及时性,例如,该中断请求可以为芯片内部的一个电平信号,当然,该中断请求也可以是其它形式的信号,如可以为脉冲信号,或为一组信号的组合等,本申请实施例对此不作限定。
步骤202:安全子系统通过第一双向总线向处理主系统发送第一命令。
值得说明的是,本申请实施例中将安全子系统与处理主系统之间的连接方式由接触式触点连接改变为第一双向总线连接,从而通过连接方式的改变,使得安全子系统与处理主系统之间的通信方式得以改变,也即,使得通信过程中安全子系统与处理主系统处于同等地位,能够通过第一双向总线互相主动传输数据。在此情况下,当安全子系统需要实现经由处理主系统的参与才能完成的操作时,即可主动通过第一双向总线向处理主系统发送该中断请求,并在其后主动通过第一双向总线向处理主系统发送第一命令。
步骤203:当处理主系统接收到该中断请求时,对该中断请求进行中断响应,以实现对 第一命令的接收。
需要说明的是,该中断请求的中断响应可以包括挂起当前正在运行的程序,并执行接收第一命令的程序,因而处理主系统对该中断请求进行中断响应后,可以实现对第一命令的正常接收。
步骤204:当处理主系统接收到第一命令时,执行第一命令。
需要说明的是,处理主系统执行第一命令后,可以得到第一命令的响应结果,第一命令的响应结果用于指示安全子系统所要完成的操作的完成情况。
进一步地,处理主系统还可以通过第一双向总线向安全子系统发送第一命令的响应结果,以使安全子系统根据第一命令的响应结果可以及时获知其所要实现的操作的完成情况。
在本申请实施例中,终端包括的安全子系统与处理主系统之间通过第一双向总线进行连接,此时,安全子系统与处理主系统处于同等地位,因而当安全子系统需要经由处理主系统进行与安全子系统管理的数据相关的操作时,可以主动通过第一双向总线向处理主系统发送中断请求,并在其后主动通过第一双向总线向处理主系统发送用于实现该操作的第一命令,来指示处理主系统完成该操作。在此情况下,安全子系统与处理主系统之间的通信灵活度较高,且由于安全子系统无需等待处理主系统的指示即可主动向处理主系统发送第一命令,所以安全子系统与处理主系统之间的通信速率较高。
上述实施例对安全子系统主动向处理主系统发送第一命令的过程进行了说明,下面对处理主系统主动向安全子系统发送第二命令的过程进行说明。
图2B是本申请实施例提供的一种通信方法的流程图。参见图2B,该方法包括:
步骤2011:处理主系统通过第一双向总线向安全子系统发送第二命令。
实际应用中,当处理主系统需要实现无法由自身独立完成的操作时,即当处理主系统需要实现经由安全子系统的参与才能完成的操作时,处理子系统可以生成用于实现该操作的第二命令,并将第二命令通过第一双向总线发送给安全子系统。
需要说明的是,第二命令用于指示安全子系统进行与安全子系统管理的数据相关的操作,且该操作可以为读取安全子系统管理的数据、更新安全子系统管理的数据、请求安全子系统使用管理的数据进行计算并返回计算结果等。例如,处理主系统可以通过安全子系统进行鉴权计算得到鉴权结果,以根据该鉴权结果进行鉴权操作。又例如,处理主系统可以从安全子系统中读取IMSI,以根据IMSI进行入网。
进一步地,为了便于后续安全子系统可以对第二命令进行正常接收,处理主系统在生成第二命令的同时,即在通过第一双向总线向安全子系统发送第二命令之前,还可以通过第一双向总线向安全子系统发送中断请求。
需要说明的是,该中断请求用于指示安全子系统接收处理主系统发送的第二命令,该中断请求既可以唤醒安全子系统,也可以让安全子系统挂起当前正在运行的程序,转而执行该中断请求所指示的中断服务程序(即接收第二命令的程序)。该中断请求为硬件信号机制,因而可以保证可靠性和及时性,例如,该中断请求可以为芯片内部的一个电平信号,当然,该中断请求也可以是其它形式的信号,如可以为脉冲信号,或为一组信号的组合等,本申请实施例对此不作限定。
步骤2012:当安全子系统接收到第二命令时,执行第二命令。
其中,安全子系统对第二命令进行接收的操作可以根据处理主系统发送的该中断请求来实现,具体地,当安全子系统接收到该中断请求时,可以对该中断请求进行中断响应,以实现对第二命令的接收。
需要说明的是,该中断请求的中断响应可以包括挂起当前正在运行的程序,并执行接收第二命令的程序,因而安全子系统对该中断请求进行中断响应后,可以实现对第二命令的正常接收。
进一步地,安全子系统执行第二命令后,可以得到第二命令的响应结果,第二命令的响应结果用于指示处理主系统所要完成的操作的完成情况。
步骤2013:安全子系统通过第一双向总线向处理主系统发送第二命令的响应结果。
进一步地,安全子系统通过第一双向总线向处理主系统发送第二命令的响应结果后,处理主系统可以对第二命令的响应结果进行接收,此时处理主系统根据第二命令的响应结果可以及时获知其所要完成的操作的完成情况。
需要说明的是,本申请实施例中安全子系统与处理主系统之间交互时所使用的命令(即第一命令和第二命令)可以为应用协议数据单元(Application Protocol Data Unit,APDU)格式的命令,当然,实际应用中也可以为其它格式的命令,本申请实施例对此不作限定。
另外,第一命令或第二命令中可以携带有命令数据头,该命令数据头用于指示命令所要执行的操作,如信息提示操作、与服务器的通信操作、数据读取操作等,且当第一命令或第二命令需要某些数据才能进行执行时,第一命令或第二命令中还可以携带有命令数据内容,此时该命令数据头即用于指示进行与该命令数据内容相关的操作。
例如,第一命令中携带的命令数据头可以用于指示进行信息提示操作,第一命令中携带的命令数据内容中包含需要进行提示的信息,此时第一命令即用于对其携带的命令数据内容中包含的信息进行提示。又例如,第二命令中携带的命令数据头可以用于进行数据读取操作,第二命令中携带的命令数据内容为需要读取的数据的存储位置,此时第二命令即用于对其携带的命令数据内容中包含的存储位置上的数据进行读取。
需要说明的是,第一命令的响应结果或第二命令的响应结果中可以携带有处理状态,该处理状态用于指示命令的处理情况,该处理状态可以包括正常结束、命令不支持、命令错误参数等,且当在处理第一命令或第二命令后会得到某些数据时,第一命令的响应结果或第二命令的响应结果中还可以携带有处理得到的数据内容。
例如,第一命令的响应结果中携带的处理状态可以为正常结束。又例如,第二命令的响应结果中携带的处理状态可以为正常结束,第二命令的响应结果中携带的处理得到的数据内容可以为读取到的数据,如IMSI等,之后处理主系统即可根据读取到的数据实现无线通信。
值得说明的是,当第一命令或第二命令中同时携带有命令数据头和命令数据内容时,安全子系统与处理主系统之间是一次性对命令数据头和命令数据内容进行传输,从而提高了安全子系统与处理主系统之间的通信速率。当第一命令的响应结果或第二命令的响应结果中同时携带有处理状态和处理得到的数据内容时,安全子系统与处理主系统之间是一次性对处理状态和处理得到的数据内容进行传输,从而提高了安全子系统与处理主系统之间的通信速率。
例如,原有的接触式触点的连接方式下,处理主系统向安全子系统传输命令时,需要 将命令数据头和命令数据内容分次传输给安全子系统,而安全子系统执行该命令后,也需要将处理状态和处理得到的数据内容分次传输给处理主系统,因而处理主系统和安全子系统之间需要多次交互,假设处理主系统需要向安全子系统传输一个用于选择文件的命令,文件标识(即命令数据内容)为2字节,文件信息(即处理得到的数据内容)为50字节,则完成选择文件这一操作一共需要传输74字节。而本申请实施例中由于可以一次性对命令数据头和命令数据内容进行传输,且可以一次性对处理状态和处理得到的数据内容进行传输,因而完成选择文件这一操作就只需要59字节。
在本申请实施例中,安全子系统可以主动向处理主系统发送第一命令,然后由处理主系统返回第一命令的响应结果,从而实现安全子系统所要完成的操作。且处理主系统也可以主动向安全子系统发送第二命令,然后由安全子系统返回第二命令的响应结果,从而实现处理主系统所要完成的操作。也即,安全子系统与处理主系统在交互执行某个操作时,只需两次交互即可完成该操作,从而大大减少了安全子系统与处理主系统在执行某个操作时的交互次数,提高了安全子系统与处理主系统之间的通信速率。
下面对安全子系统与处理主系统之间的并行传输方式进行说明。
安全子系统中可以包括至少两个物理接口,该至少两个物理接口均与第一双向总线连接,从而在安全子系统与第一双向总线之间建立了至少两个物理通道,实际上也是在安全子系统与处理主系统之间建立了至少两个物理通道,安全子系统与处理主系统之间可以通过该至少两个物理通道进行通信,也即,安全子系统与处理主系统之间可以同时通过第一双向总线与不同的物理接口来执行不同的操作,此时,安全子系统与处理主系统之间为并行传输方式,从而提高了安全子系统与处理主系统之间的通信速率。
例如,在步骤202中,安全子系统通过第一双向总线向处理主系统发送第一命令时,安全子系统可以先从该至少两个物理接口中选择一个物理接口作为目标物理接口,再通过目标物理接口和第一双向总线向处理主系统发送第一命令。相应地,在步骤204中,处理主系统通过第一双向总线向安全子系统发送第一命令的响应结果时,处理主系统可以通过第一双向总线和目标物理接口向安全子系统发送第一命令的响应结果。
又例如,在步骤2011中,处理主系统通过第一双向总线向安全子系统发送第二命令时,处理主系统可以先从该至少两个物理接口中选择一个物理接口作为目标物理接口,再通过第一双向总线和目标物理接口向安全子系统发送第二命令;相应地,在步骤2013中,安全子系统通过第一双向总线向处理主系统发送第二命令的响应结果时,安全子系统可以通过目标物理接口和第一双向总线向处理主系统发送第二命令的响应结果。
进一步地,在安全子系统与处理主系统之间为并行传输方式时,处理主系统可能会通过该至少两个物理接口同时接收到至少两个命令,同样,安全子系统也可能会通过该至少两个物理接口同时接收到至少两个命令。在此情况下,处理主系统或安全子系统可以按照同时接收到的至少两个命令的优先级由高到底的顺序,依次执行该至少两个命令。
在安全子系统与处理主系统之间为并行传输方式时,安全子系统可能会在执行某一命令的过程中通过某一物理接口接收到其它命令,同样,处理主系统也可能会在执行某一命令的过程中通过某一物理接口接收到其它命令。在此情况下,安全子系统或处理主系统可以当该命令的优先级高于该其它命令的优先级时,继续执行该命令,并在执行完该命令后 执行该其它命令;而当该命令的优先级低于该其它命令的优先级时,先打断该命令的执行,转而执行该其它命令,在执行完该其它命令后,再返回继续执行该命令。
下面结合图2C对上述并行传输方式进行举例说明。参见图2C,该并行传输方式可以包括如下步骤01-步骤11。
步骤01:处理主系统生成用于获取短信的第二命令;
步骤02:处理主系统将该用于获取短信的第二命令通过第一双向总线和第一物理接口发送给安全子系统;
步骤03:当安全子系统接收到该用于获取短信的第二命令时,执行该用于获取短信的第二命令来获取短信;
步骤04:处理主系统生成用于获取鉴权数据的第二命令;
步骤05:处理主系统将该用于获取鉴权数据的第二命令通过第一双向总线和第二物理接口发送给安全子系统;
步骤06:当安全子系统接收到该用于获取鉴权数据的第二命令时,假设该用于获取鉴权数据的第二命令的优先级高于该用于获取短信的第二命令,则安全子系统打断该用于获取短信的第二命令的执行,转而执行该用于获取鉴权数据的第二命令来进行鉴权计算得到鉴权数据;
步骤07:安全子系统将携带有鉴权数据和处理状态的第二命令的响应结果通过第二物理接口和第一双向总线发送给处理主系统;
步骤08:当处理主系统接收到携带有鉴权数据和处理状态的第二命令的响应结果时,对鉴权数据进行处理;
步骤09:安全子系统继续执行该用于获取短信的第二命令来获取短信;
步骤10:安全子系统将携带有短信和处理状态的第二命令的响应结果通过第一物理接口和第一双向总线发送给处理主系统;
步骤11:当处理主系统接收到携带有短信和处理状态的第二命令的响应结果时,对短信进行处理。
需要说明的是,安全子系统与处理主系统之间的连接方式的改变,还会使得两者的通信方式出现其它方面的改变。
例如,由于安全子系统与处理主系统之间通过第一双向总线进行连接,所以安全子系统与处理主系统之间通过第一双向总线单次传输的数据的长度将不受限制,即单次传输的数据的最大长度至少大于255字节,从而可以大大提高安全子系统与处理主系统之间的通信速率。例如,原有的接触式触点的连接方式下,安全子系统与处理主系统之间传输的数据的最大长度为255字节,当所要传输的数据超过该最大长度时,需要分成多次传输,假设想要传输500字节的数据,就需要发送两次命令,一共需要517字节。而本申请实施例中由于安全子系统与处理主系统之间通过第一双向总线单次传输的数据的长度不受限制,因而只需要一次传输,就只需要508字节。
又例如,在安全子系统与处理主系统处于同等地位的情况下,安全子系统将可以对自身的时钟进行控制,也即,安全子系统可以控制自身的时钟停止,也可以控制自身的时钟恢复,而无需等待处理主系统的指示来进行控制,从而不仅可以提高安全子系统的时钟控 制效率,而且可以节省处理主系统的通信资源。
再例如,当安全子系统管理的数据存储于安全子系统外部的存储器中时,安全子系统可以通过第一双向总线较为快速地从该存储器中获取所管理的数据,从而在不影响安全子系统的数据获取速度的情况下,增加了安全子系统能够管理的数据量。
在本申请实施例中,安全子系统与处理主系统之间通过第一双向总线进行连接,此时安全子系统作为处理主系统的对等角色,将可以具有更大的应用范围。另外,由此连接方式带来的通信方式的改变,不仅可以提高安全子系统管理的数据的读取速度,还可以提高处理主系统与安全子系统之间的通信速率,在处理主系统与安全子系统之间的通信速率提高的情况下,该终端的性能(如开机速度、搜网速度等)也将得以提升。
本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述任一个方法中的一个或多个步骤。上述信号处理装置的各组成模块如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在所述计算机可读取存储介质中。所述计算机可读取存储介质可以是可以是非掉电易失性存储器,例如是EMMC(Embedded Multi Media Card,嵌入式多媒体卡)、UFS(Universal Flash Storage,通用闪存存储)或只读存储器(Read-Only Memory,ROM),或者是可存储静态信息和指令的其他类型的静态存储设备,还可以是掉电易失性存储器(volatile memory),例如随机存取存储器(Random Access Memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的程序代码并能够由计算机存取的任何其他计算机可读存储介质,但不限于此。
基于这样的理解,本申请实施例还提供一种包含指令的计算机程序产品,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或其中的处理器执行本申请各个实施例所述方法的全部或部分步骤。所述若干指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如:同轴电缆、光纤、数据用户线(Digital Subscriber Line,DSL))或无线(例如:红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意结合来实现。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。例如,装置实施例中的一些具体操作可以参考之前的方法实施例。
Claims (14)
- 一种终端,其特征在于,所述终端包括:安全子系统、处理主系统和耦合在所述安全子系统与所述处理主系统之间的第一双向总线;所述安全子系统,用于管理无线通信中与用户身份相关的数据和与网络安全相关的数据中的至少一项,并通过所述第一双向总线与所述处理主系统交换所述数据;所述处理主系统,用于通过所述第一双向总线与所述安全子系统交换所述数据,并使用所述数据实现无线通信。
- 如权利要求1所述的终端,其特征在于,所述与用户身份相关的数据包括国际移动用户识别码、鉴权密钥、个人识别码和解锁码中的至少一个,所述与网络安全相关的数据包括位置区域识别码、移动用户暂时识别码和禁用公共陆地移动网络号中的至少一个。
- 如权利要求1或2所述的终端,其特征在于,所述安全子系统中包括至少两个物理接口;所述至少两个物理接口均连接至所述第一双向总线,所述安全子系统与所述处理主系统之间同时通过所述至少两个物理接口并行交换所述数据。
- 如权利要求1-3任一项所述的终端,其特征在于,所述安全子系统与所述处理主系统之间使用所述第一双向总线以全双工方式进行通信。
- 如权利要求3所述的终端,其特征在于,所述安全子系统中包括多个组件和第二双向总线,所述多个组件中的至少两个组件为所述至少两个物理接口;所述多个组件之间通过所述第二双向总线建立连接,以实现所述多个组件之间数据的传输。
- 如权利要求5所述的方法,其特征在于,所述多个组件之间使用所述第二双向总线以全双工方式进行通信。
- 如权利要求1所述的终端,其特征在于,所述终端中还包括存储器;所述存储器与所述安全子系统之间通过所述第一双向总线建立连接,所述安全子系统通过所述第一双向总线管理所述存储器中存储的数据。
- 如权利要求1-7任一项所述的终端,其特征在于,所述安全子系统为嵌入式用户识别模块eSIM。
- 一种通信方法,其特征在于,所述通信方法应用于权利要求1-8任一项所述的终端,所述方法包括:所述安全子系统通过所述第一双向总线向所述处理主系统发送中断请求,所述中断请求 用于指示所述处理主系统接收所述安全子系统发送的第一命令,所述第一命令用于指示所述处理主系统进行与所述安全子系统管理的数据相关的操作;所述安全子系统通过所述第一双向总线向所述处理主系统发送所述第一命令。
- 如权利要求9所述的方法,其特征在于,所述方法还包括:所述处理主系统通过所述第一双向总线向所述安全子系统发送第二命令,所述第二命令包括命令数据头和命令数据内容,所述命令数据头用于指示所述安全子系统进行与所述命令数据内容相关的操作;所述安全子系统执行所述第二命令;所述安全子系统通过所述第一双向总线向所述处理主系统发送所述第二命令的响应结果,所述响应结果包括处理状态和处理得到的数据内容。
- 如权利要求10所述的方法,其特征在于,所述安全子系统中包括至少两个物理接口;所述处理主系统通过所述第一双向总线向所述安全子系统发送第二命令,包括:所述处理主系统从所述至少两个物理接口中选择一个物理接口作为目标物理接口;所述处理主系统通过所述第一双向总线和所述目标物理接口向所述安全子系统发送第二命令;相应地,所述安全子系统通过所述第一双向总线向所述处理主系统发送所述第二命令的响应结果,包括:所述安全子系统通过所述目标物理接口和所述第一双向总线向所述处理主系统发送所述第二命令的响应结果。
- 如权利要求9-11任一项所述的方法,其特征在于,所述安全子系统与所述处理主系统之间通过所述第一双向总线单次传输的数据的最大长度大于255字节。
- 一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机或处理器上运行时,使得所述计算机或处理器执行如权利要求9-12任一项所述的方法。
- 一种包含指令的计算机程序产品,当所述计算机程序产品在计算机或处理器上运行时,使得所述计算机或处理器执行如权利要求9-12任一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22184294.1A EP4149130B1 (en) | 2017-11-30 | 2018-06-07 | Wireless terminal comprising system on chip (soc) with security subsystem |
EP18882795.0A EP3706451A4 (en) | 2017-11-30 | 2018-06-07 | TERMINAL DEVICE AND COMMUNICATION PROCEDURE |
US16/881,793 US11487910B2 (en) | 2017-11-30 | 2020-05-22 | Terminal and communication method |
US17/883,695 US20220382920A1 (en) | 2017-11-30 | 2022-08-09 | Terminal and communication method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711240720.5A CN109862553B (zh) | 2017-11-30 | 2017-11-30 | 终端和通信方法 |
CN201711240720.5 | 2017-11-30 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/881,793 Continuation US11487910B2 (en) | 2017-11-30 | 2020-05-22 | Terminal and communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019104989A1 true WO2019104989A1 (zh) | 2019-06-06 |
Family
ID=66663766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/090212 WO2019104989A1 (zh) | 2017-11-30 | 2018-06-07 | 终端和通信方法 |
Country Status (4)
Country | Link |
---|---|
US (2) | US11487910B2 (zh) |
EP (2) | EP4149130B1 (zh) |
CN (2) | CN115065966B (zh) |
WO (1) | WO2019104989A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115065966B (zh) * | 2017-11-30 | 2024-04-09 | 华为技术有限公司 | 终端和通信方法 |
CN110990066B (zh) * | 2019-11-26 | 2023-12-05 | 江苏嘉则信息技术有限公司 | 一种通信终端的睡眠唤醒方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2381073Y (zh) * | 1999-06-17 | 2000-05-31 | 上海孚韦科技有限公司 | 基于公众全球数字移动通信网络平台双向数传主控模块 |
CN101388912A (zh) * | 2007-09-14 | 2009-03-18 | 美商矽储科技股份有限公司 | 可移动卡和移动无线通信设备 |
US20120159149A1 (en) * | 2010-12-20 | 2012-06-21 | Philippe Martin | Methods, systems, and computer readable media for designating a security level for a communications link between wireless devices |
CN105493538A (zh) * | 2013-09-24 | 2016-04-13 | 英特尔公司 | 用于安全元件中心式nfc架构的nfc访问控制的系统和方法 |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5062059A (en) * | 1986-12-08 | 1991-10-29 | Sunriver Corporation | Apparatus and method for communication between host CPU and remote terminal |
FR2767011B1 (fr) * | 1997-08-04 | 1999-09-24 | Alsthom Cge Alcatel | Procede d'adaptation du fonctionnement d'un module d'identification d'abonne a une ou des interface(s) d'un terminal mobile de radio-communication, module d'identification d'abonne et terminal mobile correspondants |
US6067595A (en) * | 1997-09-23 | 2000-05-23 | Icore Technologies, Inc. | Method and apparatus for enabling high-performance intelligent I/O subsystems using multi-port memories |
US6363439B1 (en) * | 1998-12-07 | 2002-03-26 | Compaq Computer Corporation | System and method for point-to-point serial communication between a system interface device and a bus interface device in a computer system |
US7289741B2 (en) * | 2003-08-26 | 2007-10-30 | Ricoh Company Ltd. | Image forming apparatus, unit for installation in the image forming apparatus, and administration system monitoring use state of the image forming apparatus |
EP1605359A1 (en) * | 2004-06-11 | 2005-12-14 | Axalto SA | Hiding information transmitted on a data bus |
EP1619572A1 (en) * | 2004-07-23 | 2006-01-25 | Texas Instruments Incorporated | System and method of identifying and preventing security violations within a computing system |
CN101754448B (zh) * | 2008-11-28 | 2012-11-07 | 爱思开电讯投资(中国)有限公司 | 一种用于移动通信的双核智能卡及其数据传输处理方法 |
CN102194292B (zh) * | 2010-03-10 | 2013-07-24 | 航天信息股份有限公司 | 开票服务器、抄税系统和抄税方法 |
CN201622594U (zh) * | 2010-03-30 | 2010-11-03 | 深圳市江波龙电子有限公司 | 一种非接触式智能存储卡 |
US20110252172A1 (en) * | 2010-04-09 | 2011-10-13 | Jun Sun | System and method for concurrent operation of dual interfaces between uicc and mobile device |
CN101984729A (zh) * | 2010-11-15 | 2011-03-09 | 中兴通讯股份有限公司 | 一种双网双待终端进行通讯的方法和装置 |
CN102467479A (zh) * | 2010-11-17 | 2012-05-23 | 英业达股份有限公司 | 主机间数据的传输方法 |
CN102033828B (zh) * | 2010-11-24 | 2015-06-03 | 中兴通讯股份有限公司 | 外接卡的访问方法和系统 |
US9450759B2 (en) * | 2011-04-05 | 2016-09-20 | Apple Inc. | Apparatus and methods for controlling distribution of electronic access clients |
CN102368878A (zh) * | 2011-09-19 | 2012-03-07 | 中兴通讯股份有限公司 | 一种多模终端与sim卡信息传输系统及方法 |
US8769615B2 (en) * | 2011-12-19 | 2014-07-01 | International Business Machines Corporation | Key storage and retrieval in a breakout component at the edge of a mobile data network |
US9026688B2 (en) * | 2012-06-21 | 2015-05-05 | Breakingpoint Systems, Inc. | Systems and methods for programming configurable logic devices via USB |
CN102831450A (zh) * | 2012-08-14 | 2012-12-19 | 东信和平科技股份有限公司 | 一种基于iso/iec7816-3接口实现读写sd卡的方法及系统 |
US9501666B2 (en) * | 2013-04-29 | 2016-11-22 | Sri International | Polymorphic computing architectures |
US9798901B2 (en) * | 2013-04-30 | 2017-10-24 | Nxp Usa, Inc. | Device having a security module |
CN103747011A (zh) * | 2014-01-23 | 2014-04-23 | 成都卡诺维科技有限公司 | 一种高带宽网络安全系统 |
CN104021104B (zh) * | 2014-06-12 | 2017-11-07 | 国家电网公司 | 一种基于双总线结构的协同系统及其通信方法 |
CN104778794B (zh) * | 2015-04-24 | 2017-06-20 | 华为技术有限公司 | 移动支付装置和方法 |
JP6335205B2 (ja) * | 2016-03-16 | 2018-05-30 | 株式会社東芝 | 無線通信装置および無線通信方法 |
BR112018073991A2 (pt) * | 2016-08-09 | 2019-02-26 | Huawei Technologies Co., Ltd. | sistema em chip e dispositivo de processamento |
CN115065966B (zh) * | 2017-11-30 | 2024-04-09 | 华为技术有限公司 | 终端和通信方法 |
-
2017
- 2017-11-30 CN CN202210503407.0A patent/CN115065966B/zh active Active
- 2017-11-30 CN CN201711240720.5A patent/CN109862553B/zh active Active
-
2018
- 2018-06-07 EP EP22184294.1A patent/EP4149130B1/en active Active
- 2018-06-07 EP EP18882795.0A patent/EP3706451A4/en not_active Withdrawn
- 2018-06-07 WO PCT/CN2018/090212 patent/WO2019104989A1/zh unknown
-
2020
- 2020-05-22 US US16/881,793 patent/US11487910B2/en active Active
-
2022
- 2022-08-09 US US17/883,695 patent/US20220382920A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2381073Y (zh) * | 1999-06-17 | 2000-05-31 | 上海孚韦科技有限公司 | 基于公众全球数字移动通信网络平台双向数传主控模块 |
CN101388912A (zh) * | 2007-09-14 | 2009-03-18 | 美商矽储科技股份有限公司 | 可移动卡和移动无线通信设备 |
US20120159149A1 (en) * | 2010-12-20 | 2012-06-21 | Philippe Martin | Methods, systems, and computer readable media for designating a security level for a communications link between wireless devices |
CN105493538A (zh) * | 2013-09-24 | 2016-04-13 | 英特尔公司 | 用于安全元件中心式nfc架构的nfc访问控制的系统和方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3706451A4 |
Also Published As
Publication number | Publication date |
---|---|
CN109862553A (zh) | 2019-06-07 |
EP4149130B1 (en) | 2024-05-22 |
US20220382920A1 (en) | 2022-12-01 |
CN115065966A (zh) | 2022-09-16 |
CN115065966B (zh) | 2024-04-09 |
EP4149130A2 (en) | 2023-03-15 |
EP3706451A1 (en) | 2020-09-09 |
US11487910B2 (en) | 2022-11-01 |
EP3706451A4 (en) | 2021-03-31 |
CN109862553B (zh) | 2022-07-12 |
US20200285781A1 (en) | 2020-09-10 |
EP4149130A3 (en) | 2023-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240073088A1 (en) | Electronic device for supporting access to wireless media using target wake time (twt) defined in ieee 802.11 standard | |
US10165613B2 (en) | Control method for bluetooth communication and bluetooth low energy communication | |
EP3116161B1 (en) | Security unit management method and terminal | |
US9019878B2 (en) | Phone supporting mode conversion | |
US20220382920A1 (en) | Terminal and communication method | |
US20160103716A1 (en) | Method for using shared device in apparatus capable of operating two operating systems | |
CN103209007A (zh) | 一种蓝牙设备快速配对的方法及蓝牙设备 | |
WO2018058862A1 (zh) | 一种基于spi的数据传输方法及装置 | |
US20130223361A1 (en) | Terminal and method for establishing wireless access channel | |
TWI565251B (zh) | 用於nfc的電子裝置、系統以及方法 | |
KR102566247B1 (ko) | 무선 랜을 위한 서비스 셋을 제어하기 위한 방법 및 그 장치 | |
KR20160149759A (ko) | 멤버십 카드 대여 서비스 방법 및 이를 위한 장치 | |
JP6480082B2 (ja) | 加入者識別モジュール(sim)アクセスプロファイル(sap)の改善 | |
US20190089738A1 (en) | Establishing a proprietary link layer connection with a proprietary device | |
CN109408127B (zh) | 芯片系统加载方法及芯片卡 | |
EP3000025B1 (en) | Remote update of a portable storage device | |
CN111385795B (zh) | 用户识别卡的鉴权方法及移动终端、计算机可读存储介质 | |
WO2019011328A1 (zh) | 无线接入方法和装置 | |
KR20150132547A (ko) | Uicc에 의한 비동기식 커맨드 프로세싱을 지원하는 액세스 단말 내의 uicc와 프로세서 사이에 인터페이스를 제공하기 위한 방법 및 장치 | |
JP5600740B2 (ja) | 応答装置とその集積回路、応答方法、および応答システム | |
EP3041281A1 (en) | A method for accessing a shared wireless device using a client wireless communications device, and devices for the same . | |
US20240090053A1 (en) | Electronic device wireless connections | |
GB2517762A (en) | Communications system | |
CN113301542A (zh) | 配对连接方法、装置、存储介质及电子设备 | |
WO2012136162A2 (zh) | 一种访问用户卡信息的方法及移动Wi-Fi设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18882795 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2018882795 Country of ref document: EP Effective date: 20200602 |