WO2019206202A1 - 终端应用激活方法、装置及系统 - Google Patents
终端应用激活方法、装置及系统 Download PDFInfo
- Publication number
- WO2019206202A1 WO2019206202A1 PCT/CN2019/084163 CN2019084163W WO2019206202A1 WO 2019206202 A1 WO2019206202 A1 WO 2019206202A1 CN 2019084163 W CN2019084163 W CN 2019084163W WO 2019206202 A1 WO2019206202 A1 WO 2019206202A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- security module
- applications
- data channel
- information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/45—Security arrangements using identity modules using multiple identity modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
Definitions
- the present invention relates to the field of intelligent terminal technologies, and in particular, to a terminal application activation method, apparatus, and system.
- the current secure smart platform can support a removable subscriber identity module (SIM) card, an embedded SIM (eSIM) and an integrated SIM.
- SIM subscriber identity module
- eSIM embedded SIM
- an integrated SIM is a secure element that can be remotely managed by a plurality of communication carriers. It can be inserted into the terminal by plugging and soldering.
- eUICC embedded universal integrated circuit card
- the integrated SIM card can also be referred to as an integrated universal integrated circuit card (iUICC).
- the integrated SIM card is integrated in the terminal in an internet protocol (IP) manner or a chip stacking manner.
- IP internet protocol
- the SSP can install multiple applications, including accessing the profile of the carrier network and other applications under the profile.
- the same SSP does not support simultaneous activation of multiple profiles.
- the terminal can release the activated profile, thereby activating the target profile.
- the terminal is implemented by using a dual-card dual-standby or multi-card multi-standby terminal. If the future SSP is integrated into the chip, for the sake of cost, only one SSP will be integrated, and dual card dual standby or multi-card multi-standby will not be realized.
- the profile is not at the same level as other applications under the profile, when a profile of a communication carrier is activated, the application (App) under the profile is activated.
- the application (App) under the profile is activated.
- the SIM card when using the SIM card to activate the profile of China Mobile, the mobile and package under China Mobile, the mobile online business hall and other apps can be selected for activation, and if you want to use China Unicom's app, you need to re-select China. App under Unicom Profile.
- applications and profiles can be at the same level on the new SSP platform.
- the embodiment of the present application provides a method, an apparatus, and a system for activating a terminal application, so as to implement different apps in the security module.
- an embodiment of the present application provides a terminal application activation method, where a terminal includes a main chip and a security module, where the security module is connected to the main chip through at least two data channels, and the method includes: the main Obtaining, by the chip, application information of the security module, where the application information includes information of at least two applications to be activated; the master chip activates the at least two applications, and allocates to each of the at least two applications After the corresponding data channel, the main chip performs data communication with the at least two applications through the data channels corresponding to the at least two applications.
- Embodiments of the present application can effectively solve only one profile and the profile in the existing solution by assigning a corresponding data channel to each of the at least two applications when at least two applications need to be activated.
- Multiple apps unable to activate multiple profiles and unable to activate a profile with other profiles installed on the security module alongside the profile. Therefore, not only the multi-card multi-standby function but also the hardware cost can be saved.
- the acquiring, by the master chip, application information of the security module includes: when the security module is powered on, the main chip sends an initialization request message to the security module; the security module And sending, by the main chip, an initialization response message that includes the application information; and the primary chip receives the initialization response message, where the initialization response message further includes a first indication message, where the first indication message includes And at least one of indicating that the security module supports capability information for simultaneously activating at least two applications and maximum number of data channels supported by the security module.
- the interaction between the main chip and the security module not only enables the main chip to learn that the security module supports the capability of simultaneously activating at least two applications, but also establishes the main chip and the Communication connections between security modules to facilitate subsequent allocation of data channels to different App.
- the method further includes: the primary chip sends second indication information to the security module, where the second indication information includes At least one of the capability information indicating that the at least two applications are simultaneously activated and the maximum number of data channels supported by the main chip are supported by the master chip.
- the main chip sends the second indication information to the security module, so that the security module can learn that the main chip supports the capability of simultaneously activating at least two applications, and achieve mutual confirmation.
- the assigning a corresponding data channel to each of the at least two applications includes: if the first quantity is less than or equal to the second quantity, the at least two Each of the applications allocates a corresponding data channel; wherein the first number is the number of the at least two applications, and the second number is a maximum number of the data channels supported by the security module.
- the first quantity is less than or equal to the second quantity
- by allocating a corresponding data channel for each of the at least two applications to be activated not only multi-card multi-standby but also multi-card multi-standby can be implemented.
- Ability to isolate different applications because the transmission and reception relationships between different applications are independent, the problem of interference and misreception can be solved, and the security of the physical connection is improved.
- the assigning a corresponding data channel to each of the at least two applications includes: if the first quantity is greater than the second quantity, from the Determining, by the at least two applications, a first application, and assigning, to each application in the first application, a corresponding data channel; wherein, the priority of the first application is higher than a reference priority, and the first application is The number is less than or equal to the second amount.
- the at least two applications include a second application, where each application of the at least two applications is allocated a corresponding data channel, including: the data channel is allocated In the case of the third application, releasing the third application, assigning the data channel to the second application; wherein the second application has a higher priority than the third application, The third application does not belong to the application in the at least two applications.
- the data channel is a data channel between the security module and a modem.
- the data channel is a data channel between the security module and the central processor.
- the processing task amount of the modem can be effectively reduced.
- the first indication information further includes at least one of quantity information of an installed version of the security module and a maximum quantity information of the security module capable of installing an application.
- the method further includes: the main chip expanding at least two logical channels based on the data channel.
- the main chip may further extend the data by extending at least two logical channels for the corresponding data channel of each application. The amount of concurrency, and the processing speed of the data.
- the embodiment of the present application further provides a terminal application activation method, where the method is applied to a security module, where the security module is connected to a main chip by using at least two data channels, and the method includes: Sending, by the chip, the application information of the security module; after the primary chip allocates a corresponding data channel for each of the at least two applications, the security module respectively passes the data channel corresponding to the at least two applications Performing a data channel with the main chip; wherein the application information includes information of at least two applications to be activated, the application information is used to indicate that a corresponding data channel is allocated for each of the at least two applications .
- the method before the sending the application information of the security module to the main chip, the method further includes: when the security module is powered on, the security module receives from the main An initialization request message of the chip; the sending the application information of the security module to the main chip, the security module sending an initialization response message including the application information to the main chip; wherein the initialization response message
- the first indication information further includes at least one of indicating that the security module supports capability information for simultaneously activating at least two applications and maximum information of the data channel supported by the security module.
- the security module after the security module sends an initialization response message to the primary chip, and before the security module performs data communication with the primary chip through data channels corresponding to at least two applications, respectively.
- the method further includes: the security module receiving second indication information from the main chip, the second indication information including capability information indicating that the main chip supports simultaneous activation of at least two applications, and the main chip At least one of the maximum number of information of the supported data channels.
- the embodiment of the present application further provides a terminal application activation method, where the method is applied to a main chip, where the main chip is connected to a security module by using at least two data channels, and the method includes: the main chip Acquiring application information of the security module; wherein the application information includes information of at least two applications to be activated; the main chip activates the at least two applications, and each application of the at least two applications Allocating corresponding data channels; the main chip respectively performs data communication with the at least two applications through data channels corresponding to the at least two applications.
- the acquiring, by the main chip, the application information of the security module includes: when the security module is powered on, the main chip sends an initialization request message to the security module; the main chip And receiving, by the security module, an initialization response message that includes the application information, where the initialization response message further includes first indication information, where the first indication information is used to indicate that the security module supports simultaneous activation at least At least one of capability information of the two applications and maximum number of data channels supported by the security module.
- the method further includes: the primary chip sends second indication information to the security module, where the second indication information includes At least one of the capability information indicating that the at least two applications are simultaneously activated and the maximum number of data channels supported by the main chip are supported by the master chip.
- the assigning a corresponding data channel to each of the at least two applications includes: if the first quantity is less than or equal to the second quantity, the at least two Each of the applications allocates a corresponding data channel; wherein the first number is the number of the at least two applications, and the second number is a maximum number of the data channels supported by the security module.
- the assigning a corresponding data channel to each of the at least two applications includes: if the first quantity is greater than the second quantity, from the Determining, by the at least two applications, a first application, and assigning, to each application in the first application, a corresponding data channel; wherein, the priority of the first application is higher than a reference priority, and the first application is The number is less than or equal to the second amount.
- the at least two applications include a second application, where each application of the at least two applications is allocated a corresponding data channel, including: the data channel is allocated In the case of the third application, releasing the third application, assigning the data channel to the second application; wherein the second application has a higher priority than the third application, The third application does not belong to the application in the at least two applications.
- the data channel is a data channel between the security module and a modem; or in the second application In the case of non-NAA, the data channel is a data channel between the security module and the central processor.
- the first indication information further includes at least one of quantity information of an installed version of the security module and a maximum quantity information of the security module capable of installing an application.
- the method further includes: the main chip expanding at least two logical channels based on the data channel.
- the embodiment of the present application provides a terminal application activation system, where the system includes a main chip and a security module, where the security module is connected to the main chip through at least two data channels; wherein the main chip And the application information of the security module is obtained, where the application information includes information of at least two applications to be activated; and the main chip is further configured to activate the at least two applications, and the at least two Each of the applications allocates a corresponding data channel; and the master chip is further configured to perform data communication with the at least two applications through data channels corresponding to the at least two applications, respectively.
- the main chip is further configured to send an initialization request message to the security module when the security module is powered on, where the security module is configured to send the inclusion to the main chip.
- the initialization response message of the application information wherein the initialization response message further includes first indication information, where the first indication information includes capability information and a location for indicating that the security module supports simultaneous activation of at least two applications At least one of the maximum number of data channels supported by the security module; the main chip is further configured to receive the initialization response message.
- the main chip is further configured to send, to the security module, second indication information, where the second indication information is used to indicate that the main chip supports simultaneous activation of at least two applications. At least one of capability information and maximum number of data channels supported by the main chip.
- the main chip is specifically configured to allocate a corresponding data channel for each of the at least two applications if the first quantity is less than or equal to the second quantity;
- the first quantity is the number of the at least two applications, and the second quantity is a maximum number of the data channels supported by the security module.
- the main chip is specifically configured to determine, by the at least two applications, the first application, where the first quantity is greater than the second quantity, Each application in an application allocates a corresponding data channel; wherein the first application has a higher priority than a reference priority, and the number of the first applications is less than or equal to the second number.
- the at least two applications include a second application, where the primary chip is specifically configured to release the third application if the data channel has been allocated to a third application. Allocating the data channel to the second application; wherein the second application has a higher priority than the third application, and the third application does not belong to the at least two applications .
- the data channel is a data channel between the security module and a modem; or in the second application In the case of non-NAA, the data channel is a data channel between the security module and the central processor.
- the first indication information further includes at least one of quantity information of an installed application in the security module and maximum quantity information of an application that the security module can install.
- the main chip is further configured to expand at least two logical channels based on the data channel.
- the embodiment of the present application further provides a security module, including a sending unit, configured to send application information of the security module to the primary chip, where the application information includes at least two applications to be activated. Information, the application information is used to indicate that the data channel is allocated to the at least two applications, and the communication unit is configured to: after the main chip allocates a corresponding data channel for each of the at least two applications, Data communication with the main chip through data channels corresponding to the at least two applications.
- a security module including a sending unit, configured to send application information of the security module to the primary chip, where the application information includes at least two applications to be activated. Information, the application information is used to indicate that the data channel is allocated to the at least two applications, and the communication unit is configured to: after the main chip allocates a corresponding data channel for each of the at least two applications, Data communication with the main chip through data channels corresponding to the at least two applications.
- the security module further includes: a receiving unit, configured to receive an initialization request message from the main chip when the security module is powered on; the sending unit is specifically configured to The main chip sends an initialization response message that includes the application information, where the initialization response message further includes first indication information, where the first indication information includes instructions for indicating that the security module supports simultaneous activation of at least two applications. At least one of capability information and maximum number of data channels supported by the security module.
- the receiving unit is further configured to receive second indication information from the main chip, where the second indication information is used to indicate that the main chip supports simultaneous activation of at least two applications. At least one of capability information and maximum information of the data channel supported by the main chip.
- the embodiment of the present application further provides a main chip, including: an obtaining unit, configured to acquire application information of a security module, where the application information includes information of at least two applications to be activated; and an activation unit, configured to: Activating the at least two applications; an allocating unit, configured to allocate a corresponding data channel for each of the at least two applications; and a communication unit, configured to respectively use the data channel corresponding to the at least two applications Said at least two applications for data communication.
- a main chip including: an obtaining unit, configured to acquire application information of a security module, where the application information includes information of at least two applications to be activated; and an activation unit, configured to: Activating the at least two applications; an allocating unit, configured to allocate a corresponding data channel for each of the at least two applications; and a communication unit, configured to respectively use the data channel corresponding to the at least two applications Said at least two applications for data communication.
- the acquiring unit includes: a sending subunit, configured to send an initialization request message to the security module when the security module is powered on; and a receiving subunit, configured to receive the security module
- the initialization response message including the application information, the initialization response message further includes first indication information, where the first indication information includes capability information and a location for indicating that the security module supports simultaneous activation of at least two applications At least one of the maximum number of data channels supported by the security module.
- the sending subunit is further configured to send, to the security module, second indication information, where the second indication information is used to indicate that the main chip supports simultaneous activation of at least two applications. At least one of capability information and maximum information of the data channel supported by the main chip.
- the allocating unit is configured to allocate a corresponding data channel for each of the at least two applications, where the first quantity is less than or equal to the second quantity.
- the first quantity is the number of the at least two applications
- the second quantity is the maximum number of the data channels supported by the security module.
- the allocating unit is configured to determine, in the at least two applications, that the first application is the first one, where the first quantity is greater than the second quantity
- Each application in the application allocates a corresponding data channel; wherein the first application has a higher priority than the reference priority, and the number of the first applications is less than or equal to the second number.
- the at least two applications include a second application, where the allocating unit is specifically configured to release the third application if the data channel has been allocated to a third application. Allocating the data channel to the second application, the second application has a higher priority than the third application, and the third application does not belong to the application in the at least two applications.
- the data channel is a data channel between the security module and a modem; or in the second application In the case of non-NAA, the data channel is a data channel between the security module and the central processor.
- the first indication information further includes at least one of quantity information of an installed application in the security module and maximum quantity information of an application that the security module can install.
- the main chip further includes: an expansion unit, configured to expand at least two logical channels based on the data channel.
- the embodiment of the present application further provides a security module, where the terminal application activation method is implemented, where the security module includes a processor, a memory, and a communication interface, and the processor and the memory and the communication interface pass a line connection, the memory, for storing a program; the processor, configured to execute a program stored in the memory, to cause the processor to perform a corresponding function in the method described in the first aspect and the second aspect;
- the communication interface is used to support communication between the security module and other network elements.
- the embodiment of the present application further provides a main chip, which can implement the foregoing terminal application activation method, where the main chip includes a processor, a memory, and a communication interface, and the processor and the memory and the communication interface pass a line connection, the memory, for storing a program; the processor, configured to execute a program stored in the memory, to cause the processor to perform a corresponding function in the method described in the first aspect and the third aspect;
- the communication interface is used to support communication between the security module and other network elements.
- the embodiment of the present application further provides a terminal, including a main chip and a security module, where the main chip is configured to perform a corresponding function in the method as described in the first aspect and the third aspect; A module for performing the corresponding function in the method as described in the first aspect and the second aspect.
- the master chip may also be a master chip as described in the sixth aspect, and the security module may also be a security module as described in the fifth aspect.
- the embodiment of the present application further provides a computer readable storage medium, where the computer readable storage medium stores program instructions, when the program instructions are run on a computer, causing the computer to perform the foregoing aspects. The method described.
- the embodiment of the present application further provides a computer program product including instructions.
- the instructions When the instructions are run on a computer, the computer is caused to perform the methods described in the various aspects above.
- 1 is a schematic structural diagram of a protocol stack of an SSP according to an embodiment of the present application
- FIG. 2a is a schematic structural diagram of a terminal according to an embodiment of the present application.
- 2b is a schematic structural diagram of a terminal according to an embodiment of the present application.
- FIG. 3 is a schematic structural diagram of a terminal application activation system according to an embodiment of the present application.
- FIG. 3b is a schematic structural diagram of a terminal application activation system according to an embodiment of the present disclosure.
- FIG. 4 is a schematic flowchart of a terminal application activation method according to an embodiment of the present application.
- FIG. 5 is a schematic flowchart of a terminal application activation method according to an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a security module according to an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of a main chip according to an embodiment of the present application.
- FIG. 8 is a schematic structural diagram of an acquiring unit according to an embodiment of the present disclosure.
- FIG. 9 is a schematic structural diagram of another main chip according to an embodiment of the present application.
- FIG. 10 is a schematic diagram of an architecture of a terminal application activation system according to an embodiment of the present application.
- the SSP may be an operating platform of the security module, and multiple applications may be installed in the SSP platform.
- the applications may be profiles of the operator network, payment applications, licenses, and the like.
- Network-related apps car networking related apps, mobile health related apps, wearable apps, artificial intelligence related apps, and more.
- These apps can be activated simultaneously on the SSP platform. That is to say, on the new SSP platform, the App and the profile can belong to the same level of App, that is, the App and the profile can be run in parallel. Compared with the App in the profile, only the profile is activated, and the App can be activated.
- the same level of App and profile means that the App and profile can be activated at the same time. For example, at least two profiles can be activated at the same time, at least one profile and at least one App can be activated at the same time, and at least two App can be activated at the same time.
- the profile may be a collective name for a series of files and data related to a mobile network operator (MNO) within the security module.
- MNO mobile network operator
- FIG. 1 is a schematic diagram of a protocol stack architecture of an SSP according to an embodiment of the present application, including a physical layer, a data link layer, a transport layer, and an application layer.
- the physical layer can provide a physical interface between the SSP and the terminal, for example, supporting an international organization for standardization (ISO) 7816, a serial peripheral interface (SPI), an inter-integrated circuit (I2C), Interface protocols such as single wire protocol (SWP).
- the data link layer supports protocols such as ISO 7816.
- the transport layer can support an application protocol data unit (APDU), an HCP protocol, and the like.
- the application layer supports ISO-7816, APDU protocol, hyper text transfer protocol (HTTP) and constrained application protocol (CoAP).
- the terminal may include a main chip 210 and a security module 220.
- the security module 220 can be embedded in the main chip 210 as shown in FIG. 2a; or, the security module 220 can be independent of the main chip 210 as shown in FIG. 2b.
- the specific form of the main chip and the security module is not limited in the embodiment of the present application.
- the terminal in the present application may be a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), etc., and the specific implementation manner of the terminal is not limited in this embodiment. It can be understood that the terminal in the embodiment of the present application may also be referred to as a terminal device or the like.
- FIG. 3 is a schematic structural diagram of a terminal application activation system according to an embodiment of the present application. As shown in FIG. 3a, the system includes a main chip 210 and a security module 220, which can be connected to the security module 220 via at least two data channels.
- the master chip can include a processor 211 and a memory 212.
- the memory 212 can be used to store programs that can be used to execute programs stored in memory.
- the master chip can also include a communication interface 213.
- the main chip can interact with the security module through the communication interface 213, such as performing data transmission, and performing instruction transmission and the like. It can be understood that the communication interface 213 can also interact with other devices, etc., which is not limited in this embodiment.
- the security module can include a processor 221 and a memory 222 that can be used to store programs that can be used to execute programs stored by the memory.
- the security module can also include a communication interface 223.
- the security module interacts with the host chip via the communication interface 223, and the like. It can be understood that the specific implementation manner of the communication interface is not limited by the embodiment of the present application.
- the data channel can also be understood as a physical channel, which can be used to transfer data and/or instructions between the security module and the main chip, and the data channel is allocated to an application running independently in the security module (eg, at least two to be activated) The application in the application is used exclusively and physically isolated from other applications, ie the application does not share a data channel with other applications.
- the main chip may also extend at least two logical channels on each data channel, and different logical channels in the same data channel of the extended may be allocated for use by sub-applications in the same application. That is to say, taking the two data channels shown in FIG. 3a as an example, the main chip can respectively extend at least two logical channels on the two data channels.
- the logic channel can also be used to transfer data and/or instructions between the security module and the main chip.
- the main chip can allocate different logical channels for different data according to the type of data, or according to the type of the instruction. Different instructions allocate different logical channels. For example, if the application is a profile, after the data channel is allocated for the profile, the main chip can expand two logical channels, which can be used for transmitting dedicated files, basic files, and sub-applications carried in the profile. And other information. It is to be understood that the above is only an example and should not be construed as limiting the embodiments of the present application.
- the main chip can be the main chip in FIG. 2a and FIG. 2b.
- the security module can be installed in the device for various forms of SIM card, SSP, secure element (SE), system on chip (SoC), system in package (SIP), and the like.
- Hardware module or software module can install at least one carrier profile that connects to the network and communicates using the network.
- the security module can also install other apps at the level of the profile, such as payment apps, licenses, and other identity-related apps, and home networks. App, Internet related apps, mobile health related apps, wearable apps, artificial intelligence related apps, and more.
- the security module provided by the embodiment of the present application may be a separate module, or may be integrated into the terminal.
- FIG. 3b is a schematic diagram of a specific architecture of a terminal application activation system according to an embodiment of the present application.
- the main chip may include a central processing unit (CPU), a media processor, a low power micro controller unit (LPMCU), peripherals, and a modem ( Modem), controller, non-volatile memory (NVM), dynamic random access memory (DRAM) and other components.
- CPU central processing unit
- LPMCU low power micro controller unit
- modem modem
- controller non-volatile memory
- DRAM dynamic random access memory
- the main CPU or the media processor can be used to couple with the memory to execute program instructions and the like stored in the memory.
- the main CPU can perform the steps of step 402 shown in FIG. 4 and the like.
- Peripherals may include input and output devices, external memories, analog to digital converters, digital to analog converters, and peripheral processors, such as touch screens, cameras, fingerprint acquisition, near field communication components, sensors, and the like. .
- the specific device included in the peripheral device is not limited in this embodiment.
- the controller may include a controller 1 and a controller 2, which is connected to the NVM, and the controller 2 is connected to the DRAM.
- the security module may include a CPU, a read-only memory (ROM), a random access memory (RAM), a memory management unit (MMU), and a one-time programmable (OTP) , true random number generator (TRNG), encryption engine (such as crypto), sensors, peripherals, signal input/output connections between the security module and the main chip, and so on.
- ROM read-only memory
- RAM random access memory
- MMU memory management unit
- OTP true random number generator
- RNG true random number generator
- crypto true random number generator
- the ROM and the RAM shown in the embodiment of the present application are only an example. In a specific implementation, other types of memory may be included in the security module, which is not limited in this embodiment.
- the MMU can be used to manage virtual memory systems.
- OTP also known as dynamic passwords
- OTP can generate a time-dependent, unpredictable random number combination every 60 seconds based on a specialized algorithm, and each password can only be used once.
- the encryption engine can effectively improve the data security of the security module.
- the security module may be an isolated security subsystem, and communicates with a component such as a main chip through a bus, and the bus may communicate through a mailbox, such as a proprietary mailbox, or the bus.
- the other embodiments may be used to communicate with other components, such as a universal bus bridge.
- the bus can include multiple physical connections such that the master chip can assign security modules to different data channels, thereby enabling multi-card multi-standby and data parallel processing.
- the data transmitted through the data channel can be stored in the external NVM, and the data can be stored in the SoC or the security module in other manners.
- main chip and the security module shown above are only one example provided by the embodiments of the present application, and the main chip and/or the security module may have more or less components than the components shown, and two combinations may be combined. More or more components, or may have different configurations of components.
- system provided by the embodiment of the present application can be integrated into the terminal, thereby facilitating the user to use the terminal.
- FIG. 4 is a schematic flowchart of a terminal application activation method according to an embodiment of the present application, where the terminal application activation method may include the following steps.
- the main chip acquires application information of the security module, where the application information includes information of at least two applications to be activated.
- the application may be an application in the security module, where the application may include an operator's profile, and other applications at the level of the profile, such as a payment application, an identity application, an artificial intelligence application, and the like.
- the security module may include N applications, N is greater than or equal to 2.
- the application to be activated may be M, and the M is less than or equal to N. It can be understood that the number of the at least two applications to be activated is not limited.
- the master chip can activate the four applications by acquiring the application information of the security module.
- the application information acquired by the master chip includes information of the at least two applications to be activated.
- information about all the applications installed in the security module may be included in the application information acquired by the main chip, and then the priority of the main chip according to each application (the installed application in the security module) Determining at least two applications to be activated as described above.
- the security module determines the at least two applications to be activated according to the priority of each application (the installed application in the security module). .
- the embodiment of the present application provides two specific methods for obtaining application information, as follows:
- the method for obtaining the application information of the security module is as follows: when the security module is powered on, the main chip sends an initialization request message to the security module; and the security module sends an initialization including the application information to the main chip. Response message; the above main chip receives the initialization response message.
- the foregoing initialization response message further includes first indication information, where the first indication information includes capability information for indicating that the security module supports simultaneous activation of at least two applications, and maximum information of the data channel supported by the security module. At least one of them.
- the first indication information may further include at least one of quantity information of the installed application in the security module and maximum information of the application that the security module can install.
- the quantity information of the installed application in the security module can be used to obtain the number of applications that the security module may activate at the same time.
- the quantity information of the installed application in the security module can also be used to determine whether the maximum number of data channels supported by the main chip can be satisfied.
- the maximum number of applications that the security module can install can be used by the master chip to determine the number of applications that the security module is likely to install and activate at the same time, so as to determine whether the maximum data channel supported by the master chip can meet the security module and possibly activate and activate. The number of applications that achieve the benefits of accurately allocating data channels to enhance the experience.
- the security module sends application information including the at least two applications to be activated to the main chip by determining at least two applications to be activated, so that the main chip can not only directly from the initialization response message sent by the security module.
- Obtaining the application information that is, directly obtaining information of at least two applications to be activated.
- the master chip knows exactly how many applications can be activated. That is to say, how many applications can be activated by the main chip, which can be determined according to the maximum number of data channels supported by the security module.
- the acquiring, by the main chip, the application information of the security module includes: when the security module is powered on, the main chip sends an initialization request message to the security module; and the security module sends an initialization response message to the main chip; The chip receives the initialization response message and determines the application information according to the initialization response message.
- the first initialization information includes the first indication information, where the first indication information includes information about an installed application in the security module.
- the foregoing first indication information may further include at least one of the following information: the capability information used to indicate that the security module supports simultaneous activation of the at least two applications, the maximum number information of the foregoing data channels supported by the security module, and The maximum number of applications that the security module can install.
- the master chip after receiving the initialization response message sent by the security module, the master chip can determine which applications are activated according to the initialization response message, so that the master chip can determine how many applications to activate according to its processing capability.
- the security module can cause the main chip to confirm whether the security module supports multiple data channels by indicating to the main chip that the security module supports the capability information of simultaneously activating at least two applications, and the maximum number of data channels supported by the security module, and The maximum number of data channels that can be supported.
- the determining method may be determined according to the priority level, and may be specifically determined according to the frequency of use of each application. Certainly, the embodiment of the present application does not uniquely define the determination method.
- the method further includes:
- the master chip sends the second indication information to the security module, where the second indication information includes: the capability information used to indicate that the main chip supports simultaneous activation of at least two applications, and the maximum number information of the data channels supported by the main chip. At least one.
- the main chip may further send the second indication information to the security module, so as to further determine whether the main chip supports simultaneous activation of at least two applications. It can be understood that, in the embodiment of the present application, since the security module needs to be connected to the main chip through the data channel, the maximum number of data channels supported by the security module is the same as the maximum number of data channels supported by the main chip.
- the foregoing main chip activates the at least two applications, and allocates a corresponding data channel for each of the at least two applications.
- the main chip may allocate one data channel for each of at least two applications. If the number of applications to be activated included in the application information is M, the master chip may respectively allocate one data channel (ie, M data channels) for the M applications.
- the main chip activation application may specifically establish a communication channel with the application, read the application data, and send the application data to the corresponding processing module to complete the service in the application.
- the method for activating the application by the main chip is only an example. It should not be construed as limiting the embodiments of the present application.
- the embodiment of the present application also provides two scenarios for allocating data channels, as follows:
- the foregoing assigning a corresponding data channel to each of the at least two applications includes: assigning a corresponding to each of the at least two applications when the first quantity is less than or equal to the second quantity The data channel; wherein the first quantity is the quantity of the at least two applications, and the second quantity is the maximum number of the data channels supported by the security module.
- the second number is also the maximum number of data channels supported by the main chip.
- the master chip can allocate a data channel for each application included in at least two applications to be activated.
- Scenario 2 the foregoing assigning a corresponding data channel to each of the at least two applications, including: determining, by using the at least two applications, the first application, where the first quantity is greater than the second quantity, Each application in the foregoing first application allocates a corresponding data channel; wherein, the priority of the first application is higher than a reference priority, and the number of the first application is less than or equal to the second quantity.
- the master chip since the master chip cannot allocate a data channel for each of the at least two applications to be activated, the master chip may first determine an application whose priority is higher than the reference priority, that is, the first application, thereby A corresponding data channel is allocated for each application in the first application.
- the first application may be one or at least two, which is not limited in the embodiment of the present application.
- the reference priority may be set by the master chip, and the reference priority may be dynamically updated according to the maximum number of data channels supported by the main chip. The embodiment of the present application does not limit how to set the reference priority.
- the embodiment of the present application also provides a method for allocating a data channel, as follows:
- the at least two applications include a second application, where the foregoing assigning a corresponding data channel to each of the at least two applications includes: releasing the third application if the data channel is allocated to the third application And allocating the foregoing data channel to the second application; wherein, the priority of the second application is higher than the priority of the third application, and the third application does not belong to the application of the at least two applications.
- the scenario 1 and the scenario 2 are shown in the scenario where the data channel is not allocated to other applications, and the embodiment of the present application is shown in the scenario where the data channel has been allocated to other applications.
- the main chip needs to allocate a data channel, such as a first data channel, to the second application, and when the main chip is allocated, detecting that the first data channel has been allocated to the first data channel
- the primary chip may release the third application, thereby allocating the first data channel to the second application.
- the above first data channel is only an example and does not represent a sequence.
- the main chip may temporarily switch the first data channel to be used by the second application when the third application has no service data; and when the third application is used
- the service data of the second application is temporarily cached, and the first data channel is switched to the third application until the third application no longer has service data transmission, and the cache is read.
- the second application of the business data and switches the first data channel for use by the second application.
- comparison principle of the above priorities may be compared according to the frequency of use of the application, or may be compared according to the preference of the user, or may be compared according to the usage duration of the user, etc., which is not limited in the embodiment of the present application.
- the main chip allocates a corresponding data channel for each of the at least two applications, the identifier of the data channel can also be carried, so that the correspondence between the data channel and the application can be effectively distinguished, so that the data transmission efficiency is higher.
- the main chip performs data communication with the at least two applications by using data channels corresponding to the at least two applications.
- the main chip can perform data communication with the at least two applications through data channels corresponding to at least two applications to be activated. If the at least two applications to be activated include the second application and the fourth application, the main chip allocates a data channel, such as a second data channel, to the second application, and allocates a data channel, such as a third data channel, to the fourth application. Thereafter, the master chip can perform data communication with the second application through the second data channel, and perform data communication with the fourth application through the third data channel. It can be understood that the second data channel and the third data channel are only an example, and do not represent a sequence, and the second application and the fourth application are also only an example, and do not represent a sequence.
- the data channel is a data channel between the security module and the modem; or in the case where the second application is non-NAA, the data channel The data channel between the above security module and the central processing unit.
- the application may further determine whether the application is the NAA, and if the second application is the NAA, allocate the data channel between the second application and the modem. If the second application is non-NAA, the second application is allocated a data channel with the CPU.
- a data channel between the security module and the modem may be only one type of data channel in the embodiment of the present application, that is, a data channel between the security module and the modem, or a data channel between the security module and the central processing unit.
- the data channel in the embodiment of the present application can not only transmit the application protocol data unit (application), because the data channel in the embodiment of the present application is a data channel between the main chip and the security module, for example, a data channel supporting the bus protocol.
- the protocol data unit (APDU) instruction can also transmit an abstract syntax notation one (ASN.1) instruction, and can also transmit a start response command and the like.
- the implementation of the embodiment of the present invention can effectively solve the problem that the same security module cannot activate multiple applications or multiple profiles at the same time, which not only enables the security module to implement multi-card multi-standby and multi-application functions, but also fundamentally solves the hardware cost.
- the activated applications are connected to the main chip through respective data channels, thereby achieving security isolation, and closing one data channel does not affect other data channels, and congestion of one data channel, and does not affect the transmission and reception of other data channels. .
- the terminal application activation method shown in FIG. 4 can be applied not only to the initialization process of the main chip and the security module, but also to an application such as the fifth application (application in the security module), such as the main chip;
- the security module further includes a sixth application, where the security module requires the main chip to activate the sixth application, and the main chip can also activate the sixth application by acquiring application information of the security module, and allocate a data channel for the sixth application.
- the application to be activated by the main chip may be one in this scenario, since the final state of the main chip also activates two applications (ie, the fifth application and the sixth application), the simultaneous activation security is also implemented.
- the functionality of the different applications in the module may be one in this scenario, since the final state of the main chip also activates two applications (ie, the fifth application and the sixth application), the simultaneous activation security is also implemented. The functionality of the different applications in the module.
- FIG. 5 is a schematic flowchart of a terminal application activation method according to an embodiment of the present application.
- the terminal includes a main chip and a security module, and the terminal application activation method includes at least the following steps.
- the main chip When the security module is powered on, the main chip sends an initialization request message to the security module.
- the specific mode of powering on the security module may be that the main chip supplies power to the security module.
- the security module After receiving the power supply voltage of the main chip, the security module starts to work, and performs a security module initialization process, such as starting an operating system in the security module, and reading Take security module capability information, installed application information, and so on.
- the security module is powered on, and can be powered initially. It can be reset, hot restart, or cold boot.
- the security module may also allocate resources such as a data line and an address line.
- the main chip and the security module may also be connected through at least one basic data channel, so that the main chip and the security module complete the initialization process through the basic data channel, and the initialization process may include the main chip to the security.
- the master chip can perform other operations with the security module through the basic data channel, such as whether a new data channel or the like needs to be allocated for a specific application, such as at least two applications to be activated. It can be understood that the role of the basic data channel is not limited by the embodiment of the present application.
- the security module receives an initialization request message, and sends an initialization response message to the primary chip.
- the initialization response message includes not only application information, but also first indication information.
- the application information includes information of at least two applications to be activated
- the first indication information includes capability information for indicating that the security module supports simultaneous activation of at least two App, and may further include maximum quantity information of the supported data channels.
- the first indication information may further carry the installed quantity information of the security module.
- the initialization response message may be a power-on response response message, an answer to reset (ATR) command, an initialization command message supported by a system bus protocol, and the like. It can be understood that the specific form of the initialization response message is not limited in this embodiment of the present application.
- the primary chip receives an initialization response message, and sends a second indication information to the security module.
- the second indication information may be used to indicate capability information of the device where the main chip and/or the main chip are located, such as including capability information for indicating that the main chip supports simultaneous activation of at least two applications, specifically, the main chip is indicated.
- the capability information supporting the simultaneous activation of at least two applications may indicate that the device in which the main chip and/or the main chip are located may support simultaneous opening of multiple data channels for different App in the security module, wherein the App in the security module is a parallel App of the same level.
- the second indication information may further include a maximum quantity information of the data channel supported by the main chip.
- the maximum number of data channels supported by the master chip may indicate the maximum number of data channels supported by the master chip and/or the device on which the master chip resides.
- the main chip supports a 16-bit to 128-bit data bus width.
- the address between the main chip and the security module is assigned to each App by the address line. When the App is found, the address line is used to find the address. The address assigned by the app, and then the App data is read through the data line.
- the data line can transfer the CPU data to the specified App in the security module, and can also transfer the specified App data in the security module to the CPU.
- the 16-bit data line can transmit 16-bit data in turn, and the 16-address line can select the 64K CPU addressing range. Therefore, it is possible to distinguish different apps by address, and realize simultaneous activation, addressing, and The purpose of the main chip communication.
- the main chip determines, according to the application information included in the initialization response message, whether the at least two applications to be activated included in the application information include a valid App. If the valid App is not included, step 505 is performed. In the case of a valid App, step 506 is performed.
- the master chip may determine whether there is an active operator profile in the at least two applications to be activated. By judging whether there is a profile, it is convenient for the main chip to determine whether it is currently required to camp on the network.
- the master chip may allocate a corresponding data channel to the at least two applications according to the obtained at least two applications to be activated.
- the embodiment of the present application provides three possible scenarios for allocating corresponding data channels for at least two applications, which may be specifically as follows:
- the main chip may allocate a corresponding data channel for each of the at least two applications to be activated. For example, if 10 apps are installed in the security module, but only 4 apps are activated at the same time, only the data channels are allocated for the 4 activated apps.
- the master chip can allocate a data channel for each application to be activated. This scenario maximizes the needs of the application and assigns a data channel to each application to be activated.
- the main chip can dynamically allocate data channels according to the number of at least two applications to be activated and the maximum number of data channels currently supported. For example, if the current processing capability of the main chip is limited, or the security module can only allocate 2 data channels, the main chip can allocate corresponding data channels for the two App to be activated, thereby transmitting the two App through the corresponding data channel.
- the main chip can dynamically allocate data channels according to the number of at least two applications to be activated and the maximum number of data channels currently supported. For example, if the current processing capability of the main chip is limited, or the security module can only allocate 2 data channels, the main chip can allocate corresponding data channels for the two App to be activated, thereby transmitting the two App through the corresponding data channel.
- Scenario 2 Compared with the scenario 1, by dynamically allocating the data channel, the processing capability of the main chip or the security module can be effectively matched, and the processing efficiency of the main chip or the security module is improved.
- the main chip can dynamically allocate data channels according to the priority of at least two applications to be activated and the maximum number of data channels currently supported. For example, when the number of App to be activated by the main chip is greater than the number of supported data channels, the main chip preferentially allocates data channels according to the App whose priority is higher than the reference priority.
- the master chip dynamically allocates data channels for the application to be activated according to the priority of the application and the processing capability.
- the scenario three-phase can effectively allocate the data channel according to the priority of the application, thereby avoiding the allocation of the data channel due to the very small service data of the application to be activated or the application frequency of the user is not high. Improve the utilization of data channels.
- the main chip may also determine whether the application is allocated on the new data channel, and if yes, perform an allocation operation; if not, first release the priority according to the priority Applications that are low or temporarily unused (such as legacy applications on the data channel), and then assign data channels to the applications to be activated.
- the corresponding App1 when it is judged that a new data channel is allocated for the new App1, the corresponding App1 is activated on the data channel 1, and when it is determined that the new App2 is activated on the existing data channel 2, for example, the low priority or the temporary is released.
- the corresponding App2 is activated on Data Channel 2 without using Data Channel 3 of App3.
- the activation of the selected App2 on data channel 2 can be performed, for example, by '04' UICC reset in the refresh command.
- the master file (MF), the dedicated file (DF), and the elementary file (EF) of the profiled application are opened by the select command or the manage channel command to open the logical channel, such as in the logic.
- the application protocol data unit (APDU) command is transmitted on the channel.
- the embodiment of the present application provides a method for simultaneously activating multiple App in a security module.
- information communication between multiple App and the main chip in a security module, the parameters are transmitted, and the technical effect of the instruction is transmitted.
- the embodiment of the present application can solve the situation that two SIM cards need to be deployed in the terminal when the dual card dual standby is implemented.
- the profiles of multiple SIM cards installed in the security module and other App can be activated at the same time. There is no longer a need to deploy multiple security modules.
- FIG. 6 is a schematic structural diagram of a security module according to an embodiment of the present disclosure.
- the security module is applicable to the terminal application activation method. As shown in FIG. 6, the security module includes:
- the sending unit 601 is configured to send the application information of the security module to the foregoing main chip, where the application information includes information of at least two applications to be activated, and the application information is used to indicate that the data channel is allocated for the at least two applications;
- the communication unit 602 is configured to perform data communication with the main chip by using the data channel corresponding to the at least two applications after the main chip allocates a corresponding data channel for each of the at least two applications.
- the communication interface of the security module shown in FIG. 3a can be used to perform a specific implementation of the sending unit 601, and can also be used to perform the specific implementation of step 502. It can be understood that the sending unit 601 can send an initialization response message to the main chip through the basic data channel described in FIG. 5.
- the processor of the security module shown in FIG. 3a or the CPU in the security module shown in FIG. 3b may be used to implement an implementation of the communication unit 603 that corresponds to the processor.
- the communication interface shown in FIG. 3a or the peripheral device shown in FIG. 3b can also be used to implement an implementation in communication unit 603.
- the specific component of the hardware component corresponding to the communication unit 603 can be determined according to the specific implementation of the communication unit 603. The embodiment of the present application is not limited.
- the security module shown in FIG. 6 further includes: a receiving unit 603, configured to receive an initialization request message from the main chip when the security module is powered on;
- the sending unit 601 is configured to send an initialization response message that includes the application information to the primary chip, where the initialization response message further includes first indication information, where the first indication information includes At least one of capability information of at least two applications and maximum information of the foregoing data channels supported by the security module is activated.
- the receiving unit 603 can receive the initialization request message from the main chip through the basic data channel described in FIG. 5.
- the receiving unit 603 is further configured to receive second indication information from the main chip, where the second indication information includes capability information for indicating that the main chip supports simultaneous activation of at least two applications. And at least one of the maximum number information of the above data channels supported by the above main chip.
- FIG. 7 is a schematic structural diagram of a main chip according to an embodiment of the present disclosure.
- the main chip can be applied to the terminal application activation method. As shown in FIG. 7, the main chip includes at least:
- the obtaining unit 701 is configured to acquire application information of the security module, where the application information includes information of at least two applications to be activated;
- the allocating unit 703 is configured to allocate a corresponding data channel for each of the at least two applications
- the communication unit 704 is configured to perform data communication with the at least two applications by using data channels corresponding to the at least two applications.
- the processor of the main chip shown in FIG. 3a and the main CPU of the main chip shown in FIG. 3b can be used to implement a specific implementation of the activation unit 702 and the allocation unit 703.
- the processor of the main chip shown in FIG. 3a can also be used to execute a specific implementation manner of the obtaining unit 701, or a communication interface of the main chip shown in FIG. 3a, to implement a specific implementation manner of the obtaining unit 701. There is no limitation on the specific implementation.
- the foregoing obtaining unit 701 includes:
- the sending subunit 7011 is configured to send an initialization request message to the security module when the security module is powered on;
- the receiving sub-unit 7012 is configured to receive an initialization response message that includes the foregoing application information from the security module, where the initialization response message further includes first indication information, where the first indication information is used to indicate that the security module supports simultaneous activation of at least two At least one of the capability information of the application and the maximum number of data channels supported by the security module.
- the sending subunit 7011 is further configured to send the second indication information to the security module, where the second indication information includes capability information for indicating that the main chip supports simultaneous activation of at least two applications. And at least one of the maximum number information of the above data channels supported by the above main chip.
- the foregoing allocating unit 703 is configured to allocate a corresponding data channel to each of the at least two applications, where the first quantity is less than or equal to the second quantity, where The quantity is the quantity of the at least two applications, and the second quantity is the maximum number of the data channels supported by the security module.
- the foregoing allocating unit 703 is configured to determine, in the foregoing at least two applications, that the first application is the first one of the first applications, where the first quantity is greater than the second quantity.
- the application allocates a corresponding data channel; wherein the first application has a higher priority than the reference priority, and the number of the first application is less than or equal to the second quantity.
- the at least two applications include a second application, where the foregoing allocating unit 703 is configured to release the third application when the data channel is allocated to the third application.
- the second application allocates the foregoing data channel, and the priority of the second application is higher than the priority of the third application, and the third application does not belong to the application of the at least two applications.
- the data channel is a data channel between the security module and the modem; or the second application is a non-NAA.
- the data channel is a data channel between the security module and the central processing unit.
- the first indication information further includes at least one of the quantity information of the installed application in the security module and the maximum quantity information of the security module capable of installing the application.
- the foregoing main chip further includes: an expansion unit 705, configured to expand at least two logical channels based on the data channel.
- processor of the main chip shown in FIG. 3a and the main CPU of the main chip shown in FIG. 3b can be used to implement a specific implementation of the extension unit 705.
- FIG. 10 is a schematic diagram of an architecture of a terminal application activation system according to an embodiment of the present application.
- the following is an example in which two types of profiles are installed in a security module, that is, in a security module, Two issuer security domain profiles (ISD-P) 1 and ISD-P2, and the profiles of the two operators are respectively installed in the corresponding ISD-P1 and ISD-P2, wherein each ISD-P is distinguished by different application identifiers (AIDs).
- a 0-32-bit bus can correspond to 0-32 data channels for transmitting hardware signals, a different data storage area is allocated for different hardware signals in a mailbox, and one mailbox corresponds to one data channel.
- Multiple mailboxes correspond to corresponding multiple data channels and are assigned to apps in different security modules. For example, App 1 occupies the first data channel, App 2 occupies the second data channel, and different mailbox addresses are assigned to distinguish different data channels.
- Further main chip and security module can distinguish between uplink and downlink data, logical address, and physical through different mailbox addresses. Addresses, etc.; and memory management unit (MMU) mapped addresses can also be used to distinguish between data channels.
- MMU memory management unit
- the main chip and the security module can be notified by the interrupt mechanism to fetch data in the mailbox, such as an external interrupt (hardware interrupt) or an internal interrupt (software interrupt).
- an external interrupt hardware interrupt
- an internal interrupt software interrupt
- Different interrupt sources correspond to interrupt service subroutines, are stored in different allocated storage areas, and are assigned an interrupt source identifier, and different App can also assign different interrupt priorities to achieve data channel establishment.
- connection between the main chip and the security module can be implemented by using the I2C method as a data channel allocated to different App in the security module to transmit information and instructions of different App.
- connection between the main chip and the security module may be implemented through a serial peripheral interface (SPI) manner, as a data channel allocated to different App in the security module, to transmit information of different App and instruction.
- SPI serial peripheral interface
- the embodiment of the present application provides a terminal, where the terminal includes a main chip and a security module, and the main chip is connected to the security module through at least two data channels.
- the main chip is configured to acquire application information of the security module, activate the at least two applications, and allocate corresponding data channels for each of the at least two applications; and respectively correspond to the at least two applications.
- the data channel is in data communication with the at least two applications; wherein the application information includes information of at least two applications to be activated.
- the foregoing main chip is further configured to send an initialization request message to the security module when the security module is powered on, where the security module is configured to send an initialization response message that includes the application information to the primary chip, where The foregoing initialization response message further includes first indication information, where the first indication information includes at least one of the capability information for indicating that the security module supports simultaneous activation of at least two applications and the maximum number of data channels supported by the security module.
- the above main chip is further configured to receive the initialization response message.
- the foregoing main chip is further configured to send the second indication information to the security module, where the second indication information includes: the capability information used to indicate that the main chip supports simultaneous activation of at least two applications, and the foregoing supported by the main chip. At least one of the maximum number of data channels.
- the foregoing main chip is configured to allocate a corresponding data channel for each of the at least two applications when the first quantity is less than or equal to the second quantity; wherein the first quantity is the foregoing The number of at least two applications, the second quantity being the maximum number of the data channels supported by the security module.
- the foregoing main chip is configured to determine, according to the foregoing first quantity that is greater than the second quantity, a first application from the at least two applications, and assign a corresponding to each application in the first application. a data channel; wherein the priority of the first application is higher than a reference priority, and the number of the first application is less than or equal to the second quantity.
- the at least two applications include the second application, where the primary chip is specifically configured to release the third application and allocate the data to the second application when the data channel is allocated to the third application.
- a channel wherein the priority of the second application is higher than the priority of the third application, and the third application does not belong to the application of the at least two applications.
- the data channel is a data channel between the security module and the modem; or in the case that the second application is non-NAA, the data channel The data channel between the above security module and the central processing unit.
- the first indication information further includes the number of installed applications in the security module and/or the maximum number of applications that the security module can install.
- the foregoing main chip is further configured to extend at least two logical channels based on the foregoing data channel.
- the disclosed systems, devices, and methods may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the computer program product includes one or more computer instructions.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer instructions can be stored in or transmitted by a computer readable storage medium.
- the computer instructions may be from a website site, computer, server or data center via a wired (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.) Another website site, computer, server, or data center for transmission.
- the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
- the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a digital versatile disc (DVD)), or a semiconductor medium (eg, a solid state disk (SSD)). )Wait.
- the foregoing storage medium includes: a read-only memory (ROM) or a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program code.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Stored Programmes (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Communication Control (AREA)
Abstract
Description
Claims (30)
- 一种终端应用激活方法,其特征在于,终端包括主芯片和安全模块,所述安全模块通过至少两个数据通道与所述主芯片连接,所述方法包括:所述主芯片获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;所述主芯片激活所述至少两个应用,为所述至少两个应用中的每个应用分配对应的数据通道;所述主芯片分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
- 根据权利要求1所述的方法,其特征在于,所述主芯片获取所述安全模块的应用信息,包括:所述安全模块上电时,所述主芯片向所述安全模块发送初始化请求消息;所述安全模块向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项;所述主芯片接收所述初始化响应消息。
- 根据权利要求2所述的方法,其特征在于,所述主芯片接收所述初始化响应消息之后,所述方法还包括:所述主芯片向所述安全模块发送第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
- 根据权利要求2或3所述的方法,其特征在于,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在第一数量小于或等于第二数量的情况下,为所述至少两个应用中的每个应用分配对应的数据通道;其中,所述第一数量为所述至少两个应用的数量,所述第二数量为所述安全模块支持的所述数据通道的最大数量。
- 根据权利要求4所述的方法,其特征在于,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在所述第一数量大于所述第二数量的情况下,从所述至少两个应用中确定第一应用,为所述第一应用中的每个应用分配对应的数据通道;其中,所述第一应用的优先级高于参考优先级,且所述第一应用的数量小于或等于所述第二数量。
- 根据权利要求1至5任意一项所述的方法,其特征在于,所述至少两个应用中包括第二应用,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在所述数据通道已分配给第三应用的情况下,释放所述第三应用,为所述第二应用分配所述数据通道;其中,所述第二应用的优先级高于所述第三应用的优先级,所述第三应用不属于所述至少两个应用中的应用。
- 根据权利要求6所述的方法,其特征在于,在所述第二应用为网络接入应用NAA的情况下,所述数据通道为所述安全模块与调制解调器之间的数据通道;或在所述第二应用为非NAA的情况下,所述数据通道为所述安全模块与中央处理器之 间的数据通道。
- 根据权利要求2至7任意一项所述的方法,其特征在于,所述第一指示信息中还包括所述安全模块中已安装的应用的数量信息和所述安全模块能够安装的应用的最大数量信息中的至少一项。
- 根据权利要求1至8任意一项所述的方法,其特征在于,所述方法还包括:所述主芯片基于所述数据通道扩展至少两个逻辑通道。
- 一种终端应用激活方法,其特征在于,所述方法应用于安全模块,所述安全模块通过至少两个数据通道与主芯片连接,所述方法包括:向所述主芯片发送所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息,所述应用信息用于指示为所述至少两个应用中的每个应用分配对应的数据通道;在所述主芯片为所述至少两个应用中的每个应用分配对应的数据通道后,所述安全模块分别通过所述至少两个应用对应的数据通道与所述主芯片进行数据通信。
- 根据权利要求10所述的方法,其特征在于,所述向所述主芯片发送所述安全模块的应用信息之前,所述方法还包括:在所述安全模块上电时,所述安全模块接收来自所述主芯片的初始化请求消息;所述向所述主芯片发送所述安全模块的应用信息包括:所述安全模块向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
- 根据权利要求10或11所述的方法,其特征在于,所述安全模块向所述主芯片发送初始化响应消息之后,以及所述安全模块分别通过至少两个应用对应的数据通道与所述主芯片进行数据通信之前,所述方法还包括:所述安全模块接收来自所述主芯片的第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
- 一种终端应用激活方法,其特征在于,所述方法应用于主芯片,所述主芯片通过至少两个数据通道与安全模块连接,所述方法包括:所述主芯片获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;所述主芯片激活所述至少两个应用,为所述至少两个应用中的每个应用分配对应的数据通道;所述主芯片分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
- 根据权利要求13所述的方法,其特征在于,所述主芯片获取所述安全模块的应用信息,包括:所述安全模块上电时,所述主芯片向所述安全模块发送初始化请求消息;所述主芯片接收来自所述安全模块的包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全 模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
- 一种终端应用激活系统,其特征在于,所述系统包括主芯片和安全模块,所述安全模块通过至少两个数据通道与所述主芯片连接;其中,所述主芯片,用于获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;所述主芯片,还用于激活所述至少两个应用,为所述至少两个应用中的每个应用分配对应的数据通道;所述主芯片,还用于分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
- 根据权利要求15所述的系统,其特征在于,所述主芯片,还用于在所述安全模块上电时,向所述安全模块发送初始化请求消息;所述安全模块,用于向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项;所述主芯片,还用于接收所述初始化响应消息。
- 根据权利要求16所述的系统,其特征在于,所述主芯片,还用于向所述安全模块发送第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
- 根据权利要求16或17所述的系统,其特征在于,所述主芯片,具体用于在第一数量小于或等于第二数量的情况下,为所述至少两个应用中的每个应用分配对应的数据通道;其中,所述第一数量为所述至少两个应用的数量,所述第二数量为所述安全模块支持的所述数据通道的最大数量。
- 根据权利要求18所述的系统,其特征在于,所述主芯片,具体用于在所述第一数量大于所述第二数量的情况下,从所述至少两个应用中确定第一应用,为所述第一应用中的每个应用分配对应的数据通道;其中,所述第一应用的优先级高于参考优先级,且所述第一应用的数量小于或等于所述第二数量。
- 根据权利要求15至19任意一项所述的系统,其特征在于,所述至少两个应用中包括第二应用,所述主芯片,具体用于在所述数据通道已分配给第三应用的情况下,释放所述第三应用,为所述第二应用分配所述数据通道;其中,所述第二应用的优先级高于所述第三应用的优先级,所述第三应用不属于所述至少两个应用中的应用。
- 根据权利要求20所述的系统,其特征在于,在所述第二应用为网络接入应用NAA的情况下,所述数据通道为所述安全模块与调制解调器之间的数据通道;或在所述第二应用为非NAA的情况下,所述数据通道为所述安全模块与中央处理器之间的数据通道。
- 根据权利要求16至21任意一项所述的系统,其特征在于,所述第一指示信息中还包括所述安全模块中已安装的应用的数量和/或所述安全模块能够安装的应用的最 大数量。
- 根据权利要求15至22任意一项所述的系统,其特征在于,所述主芯片,还用于基于所述数据通道扩展至少两个逻辑通道。
- 一种安全模块,其特征在于,所述安全模块通过至少两个数据通道与主芯片连接,所述安全模块包括:发送单元,用于向所述主芯片发送所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息,所述应用信息用于指示为所述至少两个应用中的每个应用分配对应的数据通道;通信单元,用于在所述主芯片为所述至少两个应用中的每个应用分配对应的数据通道后,分别通过所述至少两个应用对应的数据通道与所述主芯片进行数据通道。
- 根据权利要求24所述的安全模块,其特征在于,所述安全模块还包括:接收单元,用于在所述安全模块上电时,接收来自所述主芯片的初始化请求消息;所述发送单元,具体用于向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
- 根据权利要求25所述的安全模块,其特征在于,所述接收单元,还用于接收来自所述主芯片的第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
- 一种主芯片,其特征在于,所述主芯片通过至少两个数据通道与安全模块连接,所述主芯片包括:获取单元,用于获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;激活单元,用于激活所述至少两个应用;分配单元,用于为所述至少两个应用中的每个应用分配对应的数据通道;通信单元,用于分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通道。
- 根据权利要求27所述的主芯片,其特征在于,所述获取单元包括:发送子单元,用于在所述安全模块上电时,向所述安全模块发送初始化请求消息;接收子单元,用于接收来自所述安全模块的包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
- 一种终端应用激活装置,其特征在于,包括:处理器、存储器和通信接口,所述处理器、所述存储器和所述通信接口通过线路互联,所述存储器中存储有程序指令;所述程序指令被所述处理器执行时,使所述终端应用激活装置执行如权利要求1至14任意一项所述的方法中相应的功能。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有程序指令,所述程序指令被终端应用激活装置的处理器执行时,使所述处理器执行如权利要求1至14任意一项所述的方法。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/050,297 US20210235245A1 (en) | 2018-04-26 | 2019-04-25 | Terminal Application Activation Method, Apparatus, and System |
EP19793310.4A EP3780900A4 (en) | 2018-04-26 | 2019-04-25 | TERMINAL, DEVICE AND SYSTEM APPLICATION ACTIVATION PROCESS |
JP2020559415A JP7241770B2 (ja) | 2018-04-26 | 2019-04-25 | 端末アプリケーション起動方法、装置、およびシステム |
KR1020207033462A KR102478936B1 (ko) | 2018-04-26 | 2019-04-25 | 단말 애플리케이션 활성화 방법, 장치 및 시스템 |
KR1020227043823A KR102571100B1 (ko) | 2018-04-26 | 2019-04-25 | 단말 애플리케이션 활성화 방법, 장치 및 시스템 |
JP2022196115A JP7540639B2 (ja) | 2018-04-26 | 2022-12-08 | 端末アプリケーション起動方法、装置、およびシステム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810391848.X | 2018-04-26 | ||
CN201810391848.XA CN110430574B (zh) | 2018-04-26 | 2018-04-26 | 终端应用激活方法、装置、系统及存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019206202A1 true WO2019206202A1 (zh) | 2019-10-31 |
Family
ID=68294400
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/084163 WO2019206202A1 (zh) | 2018-04-26 | 2019-04-25 | 终端应用激活方法、装置及系统 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20210235245A1 (zh) |
EP (1) | EP3780900A4 (zh) |
JP (2) | JP7241770B2 (zh) |
KR (2) | KR102571100B1 (zh) |
CN (1) | CN110430574B (zh) |
WO (1) | WO2019206202A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11937080B2 (en) * | 2017-07-28 | 2024-03-19 | Huawei Technologies Co., Ltd. | Method for updating network access application authentication information, terminal, and server |
WO2020167063A1 (en) * | 2019-02-14 | 2020-08-20 | Samsung Electronics Co., Ltd. | Method and apparatus for downloading bundle to smart secure platform by using activation code |
CN112737789A (zh) * | 2020-12-23 | 2021-04-30 | 上海芯钛信息科技有限公司 | 基于双路spi并发实现车载通信网关高速密码运算的方法 |
CN114786169B (zh) * | 2022-03-02 | 2024-07-05 | 北京握奇数据股份有限公司 | 一种终端切换Profile的方法、eSIM卡及终端 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104883674A (zh) * | 2014-02-28 | 2015-09-02 | 华为终端有限公司 | 一种Profile关联管理的方法及装置 |
CN106987274A (zh) * | 2017-05-02 | 2017-07-28 | 上海五伦化工科技有限公司 | 一种脱芳石蜡及其制备方法 |
WO2017164500A1 (ko) * | 2016-03-21 | 2017-09-28 | 삼성전자 주식회사 | 전자 장치 및 전자 장치의 제어 방법 |
CN108769983A (zh) * | 2018-05-16 | 2018-11-06 | 北京握奇智能科技有限公司 | 一种单sim双号双待机的方法和系统 |
CN108777863A (zh) * | 2018-05-16 | 2018-11-09 | 北京握奇智能科技有限公司 | 一种定义第二接口的单sim双号双待机的方法和系统 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE0700002L (sv) * | 2007-01-02 | 2008-07-03 | Hi3G Access Ab | Mobiltelefon för användning i ett mobiltelefonnät |
EP1978772A1 (en) * | 2007-04-02 | 2008-10-08 | British Telecommunications Public Limited Company | Authentication policy |
CN101686531B (zh) * | 2008-09-24 | 2012-08-29 | 中国移动通信集团公司 | 多模终端选择网络的方法及多模终端 |
EP2219346A1 (en) * | 2009-02-16 | 2010-08-18 | Gemalto SA | Method of managing an application embedded in a telecom device |
CN105934970B (zh) * | 2014-02-19 | 2019-08-02 | 宇龙计算机通信科技(深圳)有限公司 | 网络数据通道的分配方法和分配装置、终端 |
US9439062B2 (en) | 2014-05-30 | 2016-09-06 | Apple Inc. | Electronic subscriber identity module application identifier handling |
DE102015209400B4 (de) | 2014-05-30 | 2022-05-12 | Apple Inc. | Handhabung von Anwendungsidentifikatoren elektronischer Teilnehmeridentitätsmodule |
WO2016127435A1 (zh) * | 2015-02-15 | 2016-08-18 | 华为技术有限公司 | 一种profile下载和激活方法、集成电路卡及系统 |
US9760728B2 (en) * | 2015-04-22 | 2017-09-12 | Gemalto Sa | System and method for managing logical channels for accessing several virtual profiles in a secure element |
WO2016201398A1 (en) * | 2015-06-11 | 2016-12-15 | Giesecke & Devrient America, Inc. | Managing multiple active subscriber identity module profiles |
CN105101294A (zh) * | 2015-07-10 | 2015-11-25 | 努比亚技术有限公司 | 数据传输装置和方法 |
FR3046011B1 (fr) * | 2015-12-22 | 2019-05-10 | Idemia France | Procede de controle d'un module d'identite de souscripteur embarque |
US9607449B1 (en) * | 2016-01-22 | 2017-03-28 | General Motors Llc | Control of wireless communication channels for a vehicle telematics unit |
-
2018
- 2018-04-26 CN CN201810391848.XA patent/CN110430574B/zh active Active
-
2019
- 2019-04-25 KR KR1020227043823A patent/KR102571100B1/ko active IP Right Grant
- 2019-04-25 US US17/050,297 patent/US20210235245A1/en active Pending
- 2019-04-25 WO PCT/CN2019/084163 patent/WO2019206202A1/zh unknown
- 2019-04-25 EP EP19793310.4A patent/EP3780900A4/en active Pending
- 2019-04-25 KR KR1020207033462A patent/KR102478936B1/ko active IP Right Grant
- 2019-04-25 JP JP2020559415A patent/JP7241770B2/ja active Active
-
2022
- 2022-12-08 JP JP2022196115A patent/JP7540639B2/ja active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104883674A (zh) * | 2014-02-28 | 2015-09-02 | 华为终端有限公司 | 一种Profile关联管理的方法及装置 |
WO2017164500A1 (ko) * | 2016-03-21 | 2017-09-28 | 삼성전자 주식회사 | 전자 장치 및 전자 장치의 제어 방법 |
CN106987274A (zh) * | 2017-05-02 | 2017-07-28 | 上海五伦化工科技有限公司 | 一种脱芳石蜡及其制备方法 |
CN108769983A (zh) * | 2018-05-16 | 2018-11-06 | 北京握奇智能科技有限公司 | 一种单sim双号双待机的方法和系统 |
CN108777863A (zh) * | 2018-05-16 | 2018-11-09 | 北京握奇智能科技有限公司 | 一种定义第二接口的单sim双号双待机的方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
CN110430574B (zh) | 2020-12-25 |
KR102571100B1 (ko) | 2023-08-24 |
JP7241770B2 (ja) | 2023-03-17 |
JP2023051930A (ja) | 2023-04-11 |
EP3780900A1 (en) | 2021-02-17 |
CN110430574A (zh) | 2019-11-08 |
KR20210005653A (ko) | 2021-01-14 |
EP3780900A4 (en) | 2021-06-09 |
KR20230003620A (ko) | 2023-01-06 |
US20210235245A1 (en) | 2021-07-29 |
JP7540639B2 (ja) | 2024-08-27 |
KR102478936B1 (ko) | 2022-12-16 |
JP2021520746A (ja) | 2021-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019206202A1 (zh) | 终端应用激活方法、装置及系统 | |
US10292027B2 (en) | Zero-touch Wi-Fi | |
US9072035B2 (en) | Method and system for task mapping based on corresponding virtual modem identifiers in an operating system for virtual modems within a multi-SIM multi-standby communication device | |
CN111480350A (zh) | 嵌入式sim卡的数据访问的方法和设备 | |
US10361970B2 (en) | Automated instantiation of wireless virtual private networks | |
CN107925978B (zh) | 网络、基于云的服务器以及针对服务的注册方法 | |
US10324883B2 (en) | Computer system, data-processing apparatus, bus-data transferring method, and computer-readable recording medium for transferring data flowing through system bus | |
US10387219B2 (en) | Enabling multiple secure elements in a card computing device | |
JP5854138B2 (ja) | 情報処理システム,情報処理方法,通信装置 | |
CN114363295B (zh) | 一种租户服务器的管理方法及装置 | |
TWI565251B (zh) | 用於nfc的電子裝置、系統以及方法 | |
CN109445801A (zh) | 一种探测裸机网卡信息的方法和装置 | |
KR102045662B1 (ko) | 보안 요소 내의 수 개의 가상 프로파일에 액세스하기 위한 논리 채널을 관리하는 시스템 및 방법 | |
CN109857464B (zh) | 用于平台部署与操作移动操作系统的系统及其方法 | |
US11457346B2 (en) | Electronic device and method for managing an IC card with multiple SIM profiles | |
JP2019500664A (ja) | セキュアエレメント内のアプリケーションを管理する方法 | |
WO2014146229A1 (zh) | Nfc设备通信方法、装置和nfc设备 | |
WO2023273799A1 (zh) | 外接设备的通信方法、装置、电子设备和存储介质 | |
US20240323229A1 (en) | Method, apparatuses and computer program product to provide wireless configuration | |
KR20240117496A (ko) | 임베디드 범용 집적 회로 카드와 관련된 하나 이상의 정적 리소스를 확장하는 방법 | |
KR101907901B1 (ko) | 저전력 무선 네트워크 설정 장치, 방법 및 시스템 | |
CN116647536A (zh) | 一种拨号上网的方法、装置、设备及存储介质 | |
CN117295047A (zh) | 一种通信方法及装置 | |
CN118860633A (zh) | 一种集群的部署方法及计算设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19793310 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2020559415 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019793310 Country of ref document: EP Effective date: 20201109 Ref document number: 20207033462 Country of ref document: KR Kind code of ref document: A |