WO2019206202A1 - 终端应用激活方法、装置及系统 - Google Patents

终端应用激活方法、装置及系统 Download PDF

Info

Publication number
WO2019206202A1
WO2019206202A1 PCT/CN2019/084163 CN2019084163W WO2019206202A1 WO 2019206202 A1 WO2019206202 A1 WO 2019206202A1 CN 2019084163 W CN2019084163 W CN 2019084163W WO 2019206202 A1 WO2019206202 A1 WO 2019206202A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
security module
applications
data channel
information
Prior art date
Application number
PCT/CN2019/084163
Other languages
English (en)
French (fr)
Inventor
范姝男
祝锂
于小博
龙水平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to US17/050,297 priority Critical patent/US20210235245A1/en
Priority to EP19793310.4A priority patent/EP3780900A4/en
Priority to JP2020559415A priority patent/JP7241770B2/ja
Priority to KR1020207033462A priority patent/KR102478936B1/ko
Priority to KR1020227043823A priority patent/KR102571100B1/ko
Publication of WO2019206202A1 publication Critical patent/WO2019206202A1/zh
Priority to JP2022196115A priority patent/JP7540639B2/ja

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/45Security arrangements using identity modules using multiple identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices

Definitions

  • the present invention relates to the field of intelligent terminal technologies, and in particular, to a terminal application activation method, apparatus, and system.
  • the current secure smart platform can support a removable subscriber identity module (SIM) card, an embedded SIM (eSIM) and an integrated SIM.
  • SIM subscriber identity module
  • eSIM embedded SIM
  • an integrated SIM is a secure element that can be remotely managed by a plurality of communication carriers. It can be inserted into the terminal by plugging and soldering.
  • eUICC embedded universal integrated circuit card
  • the integrated SIM card can also be referred to as an integrated universal integrated circuit card (iUICC).
  • the integrated SIM card is integrated in the terminal in an internet protocol (IP) manner or a chip stacking manner.
  • IP internet protocol
  • the SSP can install multiple applications, including accessing the profile of the carrier network and other applications under the profile.
  • the same SSP does not support simultaneous activation of multiple profiles.
  • the terminal can release the activated profile, thereby activating the target profile.
  • the terminal is implemented by using a dual-card dual-standby or multi-card multi-standby terminal. If the future SSP is integrated into the chip, for the sake of cost, only one SSP will be integrated, and dual card dual standby or multi-card multi-standby will not be realized.
  • the profile is not at the same level as other applications under the profile, when a profile of a communication carrier is activated, the application (App) under the profile is activated.
  • the application (App) under the profile is activated.
  • the SIM card when using the SIM card to activate the profile of China Mobile, the mobile and package under China Mobile, the mobile online business hall and other apps can be selected for activation, and if you want to use China Unicom's app, you need to re-select China. App under Unicom Profile.
  • applications and profiles can be at the same level on the new SSP platform.
  • the embodiment of the present application provides a method, an apparatus, and a system for activating a terminal application, so as to implement different apps in the security module.
  • an embodiment of the present application provides a terminal application activation method, where a terminal includes a main chip and a security module, where the security module is connected to the main chip through at least two data channels, and the method includes: the main Obtaining, by the chip, application information of the security module, where the application information includes information of at least two applications to be activated; the master chip activates the at least two applications, and allocates to each of the at least two applications After the corresponding data channel, the main chip performs data communication with the at least two applications through the data channels corresponding to the at least two applications.
  • Embodiments of the present application can effectively solve only one profile and the profile in the existing solution by assigning a corresponding data channel to each of the at least two applications when at least two applications need to be activated.
  • Multiple apps unable to activate multiple profiles and unable to activate a profile with other profiles installed on the security module alongside the profile. Therefore, not only the multi-card multi-standby function but also the hardware cost can be saved.
  • the acquiring, by the master chip, application information of the security module includes: when the security module is powered on, the main chip sends an initialization request message to the security module; the security module And sending, by the main chip, an initialization response message that includes the application information; and the primary chip receives the initialization response message, where the initialization response message further includes a first indication message, where the first indication message includes And at least one of indicating that the security module supports capability information for simultaneously activating at least two applications and maximum number of data channels supported by the security module.
  • the interaction between the main chip and the security module not only enables the main chip to learn that the security module supports the capability of simultaneously activating at least two applications, but also establishes the main chip and the Communication connections between security modules to facilitate subsequent allocation of data channels to different App.
  • the method further includes: the primary chip sends second indication information to the security module, where the second indication information includes At least one of the capability information indicating that the at least two applications are simultaneously activated and the maximum number of data channels supported by the main chip are supported by the master chip.
  • the main chip sends the second indication information to the security module, so that the security module can learn that the main chip supports the capability of simultaneously activating at least two applications, and achieve mutual confirmation.
  • the assigning a corresponding data channel to each of the at least two applications includes: if the first quantity is less than or equal to the second quantity, the at least two Each of the applications allocates a corresponding data channel; wherein the first number is the number of the at least two applications, and the second number is a maximum number of the data channels supported by the security module.
  • the first quantity is less than or equal to the second quantity
  • by allocating a corresponding data channel for each of the at least two applications to be activated not only multi-card multi-standby but also multi-card multi-standby can be implemented.
  • Ability to isolate different applications because the transmission and reception relationships between different applications are independent, the problem of interference and misreception can be solved, and the security of the physical connection is improved.
  • the assigning a corresponding data channel to each of the at least two applications includes: if the first quantity is greater than the second quantity, from the Determining, by the at least two applications, a first application, and assigning, to each application in the first application, a corresponding data channel; wherein, the priority of the first application is higher than a reference priority, and the first application is The number is less than or equal to the second amount.
  • the at least two applications include a second application, where each application of the at least two applications is allocated a corresponding data channel, including: the data channel is allocated In the case of the third application, releasing the third application, assigning the data channel to the second application; wherein the second application has a higher priority than the third application, The third application does not belong to the application in the at least two applications.
  • the data channel is a data channel between the security module and a modem.
  • the data channel is a data channel between the security module and the central processor.
  • the processing task amount of the modem can be effectively reduced.
  • the first indication information further includes at least one of quantity information of an installed version of the security module and a maximum quantity information of the security module capable of installing an application.
  • the method further includes: the main chip expanding at least two logical channels based on the data channel.
  • the main chip may further extend the data by extending at least two logical channels for the corresponding data channel of each application. The amount of concurrency, and the processing speed of the data.
  • the embodiment of the present application further provides a terminal application activation method, where the method is applied to a security module, where the security module is connected to a main chip by using at least two data channels, and the method includes: Sending, by the chip, the application information of the security module; after the primary chip allocates a corresponding data channel for each of the at least two applications, the security module respectively passes the data channel corresponding to the at least two applications Performing a data channel with the main chip; wherein the application information includes information of at least two applications to be activated, the application information is used to indicate that a corresponding data channel is allocated for each of the at least two applications .
  • the method before the sending the application information of the security module to the main chip, the method further includes: when the security module is powered on, the security module receives from the main An initialization request message of the chip; the sending the application information of the security module to the main chip, the security module sending an initialization response message including the application information to the main chip; wherein the initialization response message
  • the first indication information further includes at least one of indicating that the security module supports capability information for simultaneously activating at least two applications and maximum information of the data channel supported by the security module.
  • the security module after the security module sends an initialization response message to the primary chip, and before the security module performs data communication with the primary chip through data channels corresponding to at least two applications, respectively.
  • the method further includes: the security module receiving second indication information from the main chip, the second indication information including capability information indicating that the main chip supports simultaneous activation of at least two applications, and the main chip At least one of the maximum number of information of the supported data channels.
  • the embodiment of the present application further provides a terminal application activation method, where the method is applied to a main chip, where the main chip is connected to a security module by using at least two data channels, and the method includes: the main chip Acquiring application information of the security module; wherein the application information includes information of at least two applications to be activated; the main chip activates the at least two applications, and each application of the at least two applications Allocating corresponding data channels; the main chip respectively performs data communication with the at least two applications through data channels corresponding to the at least two applications.
  • the acquiring, by the main chip, the application information of the security module includes: when the security module is powered on, the main chip sends an initialization request message to the security module; the main chip And receiving, by the security module, an initialization response message that includes the application information, where the initialization response message further includes first indication information, where the first indication information is used to indicate that the security module supports simultaneous activation at least At least one of capability information of the two applications and maximum number of data channels supported by the security module.
  • the method further includes: the primary chip sends second indication information to the security module, where the second indication information includes At least one of the capability information indicating that the at least two applications are simultaneously activated and the maximum number of data channels supported by the main chip are supported by the master chip.
  • the assigning a corresponding data channel to each of the at least two applications includes: if the first quantity is less than or equal to the second quantity, the at least two Each of the applications allocates a corresponding data channel; wherein the first number is the number of the at least two applications, and the second number is a maximum number of the data channels supported by the security module.
  • the assigning a corresponding data channel to each of the at least two applications includes: if the first quantity is greater than the second quantity, from the Determining, by the at least two applications, a first application, and assigning, to each application in the first application, a corresponding data channel; wherein, the priority of the first application is higher than a reference priority, and the first application is The number is less than or equal to the second amount.
  • the at least two applications include a second application, where each application of the at least two applications is allocated a corresponding data channel, including: the data channel is allocated In the case of the third application, releasing the third application, assigning the data channel to the second application; wherein the second application has a higher priority than the third application, The third application does not belong to the application in the at least two applications.
  • the data channel is a data channel between the security module and a modem; or in the second application In the case of non-NAA, the data channel is a data channel between the security module and the central processor.
  • the first indication information further includes at least one of quantity information of an installed version of the security module and a maximum quantity information of the security module capable of installing an application.
  • the method further includes: the main chip expanding at least two logical channels based on the data channel.
  • the embodiment of the present application provides a terminal application activation system, where the system includes a main chip and a security module, where the security module is connected to the main chip through at least two data channels; wherein the main chip And the application information of the security module is obtained, where the application information includes information of at least two applications to be activated; and the main chip is further configured to activate the at least two applications, and the at least two Each of the applications allocates a corresponding data channel; and the master chip is further configured to perform data communication with the at least two applications through data channels corresponding to the at least two applications, respectively.
  • the main chip is further configured to send an initialization request message to the security module when the security module is powered on, where the security module is configured to send the inclusion to the main chip.
  • the initialization response message of the application information wherein the initialization response message further includes first indication information, where the first indication information includes capability information and a location for indicating that the security module supports simultaneous activation of at least two applications At least one of the maximum number of data channels supported by the security module; the main chip is further configured to receive the initialization response message.
  • the main chip is further configured to send, to the security module, second indication information, where the second indication information is used to indicate that the main chip supports simultaneous activation of at least two applications. At least one of capability information and maximum number of data channels supported by the main chip.
  • the main chip is specifically configured to allocate a corresponding data channel for each of the at least two applications if the first quantity is less than or equal to the second quantity;
  • the first quantity is the number of the at least two applications, and the second quantity is a maximum number of the data channels supported by the security module.
  • the main chip is specifically configured to determine, by the at least two applications, the first application, where the first quantity is greater than the second quantity, Each application in an application allocates a corresponding data channel; wherein the first application has a higher priority than a reference priority, and the number of the first applications is less than or equal to the second number.
  • the at least two applications include a second application, where the primary chip is specifically configured to release the third application if the data channel has been allocated to a third application. Allocating the data channel to the second application; wherein the second application has a higher priority than the third application, and the third application does not belong to the at least two applications .
  • the data channel is a data channel between the security module and a modem; or in the second application In the case of non-NAA, the data channel is a data channel between the security module and the central processor.
  • the first indication information further includes at least one of quantity information of an installed application in the security module and maximum quantity information of an application that the security module can install.
  • the main chip is further configured to expand at least two logical channels based on the data channel.
  • the embodiment of the present application further provides a security module, including a sending unit, configured to send application information of the security module to the primary chip, where the application information includes at least two applications to be activated. Information, the application information is used to indicate that the data channel is allocated to the at least two applications, and the communication unit is configured to: after the main chip allocates a corresponding data channel for each of the at least two applications, Data communication with the main chip through data channels corresponding to the at least two applications.
  • a security module including a sending unit, configured to send application information of the security module to the primary chip, where the application information includes at least two applications to be activated. Information, the application information is used to indicate that the data channel is allocated to the at least two applications, and the communication unit is configured to: after the main chip allocates a corresponding data channel for each of the at least two applications, Data communication with the main chip through data channels corresponding to the at least two applications.
  • the security module further includes: a receiving unit, configured to receive an initialization request message from the main chip when the security module is powered on; the sending unit is specifically configured to The main chip sends an initialization response message that includes the application information, where the initialization response message further includes first indication information, where the first indication information includes instructions for indicating that the security module supports simultaneous activation of at least two applications. At least one of capability information and maximum number of data channels supported by the security module.
  • the receiving unit is further configured to receive second indication information from the main chip, where the second indication information is used to indicate that the main chip supports simultaneous activation of at least two applications. At least one of capability information and maximum information of the data channel supported by the main chip.
  • the embodiment of the present application further provides a main chip, including: an obtaining unit, configured to acquire application information of a security module, where the application information includes information of at least two applications to be activated; and an activation unit, configured to: Activating the at least two applications; an allocating unit, configured to allocate a corresponding data channel for each of the at least two applications; and a communication unit, configured to respectively use the data channel corresponding to the at least two applications Said at least two applications for data communication.
  • a main chip including: an obtaining unit, configured to acquire application information of a security module, where the application information includes information of at least two applications to be activated; and an activation unit, configured to: Activating the at least two applications; an allocating unit, configured to allocate a corresponding data channel for each of the at least two applications; and a communication unit, configured to respectively use the data channel corresponding to the at least two applications Said at least two applications for data communication.
  • the acquiring unit includes: a sending subunit, configured to send an initialization request message to the security module when the security module is powered on; and a receiving subunit, configured to receive the security module
  • the initialization response message including the application information, the initialization response message further includes first indication information, where the first indication information includes capability information and a location for indicating that the security module supports simultaneous activation of at least two applications At least one of the maximum number of data channels supported by the security module.
  • the sending subunit is further configured to send, to the security module, second indication information, where the second indication information is used to indicate that the main chip supports simultaneous activation of at least two applications. At least one of capability information and maximum information of the data channel supported by the main chip.
  • the allocating unit is configured to allocate a corresponding data channel for each of the at least two applications, where the first quantity is less than or equal to the second quantity.
  • the first quantity is the number of the at least two applications
  • the second quantity is the maximum number of the data channels supported by the security module.
  • the allocating unit is configured to determine, in the at least two applications, that the first application is the first one, where the first quantity is greater than the second quantity
  • Each application in the application allocates a corresponding data channel; wherein the first application has a higher priority than the reference priority, and the number of the first applications is less than or equal to the second number.
  • the at least two applications include a second application, where the allocating unit is specifically configured to release the third application if the data channel has been allocated to a third application. Allocating the data channel to the second application, the second application has a higher priority than the third application, and the third application does not belong to the application in the at least two applications.
  • the data channel is a data channel between the security module and a modem; or in the second application In the case of non-NAA, the data channel is a data channel between the security module and the central processor.
  • the first indication information further includes at least one of quantity information of an installed application in the security module and maximum quantity information of an application that the security module can install.
  • the main chip further includes: an expansion unit, configured to expand at least two logical channels based on the data channel.
  • the embodiment of the present application further provides a security module, where the terminal application activation method is implemented, where the security module includes a processor, a memory, and a communication interface, and the processor and the memory and the communication interface pass a line connection, the memory, for storing a program; the processor, configured to execute a program stored in the memory, to cause the processor to perform a corresponding function in the method described in the first aspect and the second aspect;
  • the communication interface is used to support communication between the security module and other network elements.
  • the embodiment of the present application further provides a main chip, which can implement the foregoing terminal application activation method, where the main chip includes a processor, a memory, and a communication interface, and the processor and the memory and the communication interface pass a line connection, the memory, for storing a program; the processor, configured to execute a program stored in the memory, to cause the processor to perform a corresponding function in the method described in the first aspect and the third aspect;
  • the communication interface is used to support communication between the security module and other network elements.
  • the embodiment of the present application further provides a terminal, including a main chip and a security module, where the main chip is configured to perform a corresponding function in the method as described in the first aspect and the third aspect; A module for performing the corresponding function in the method as described in the first aspect and the second aspect.
  • the master chip may also be a master chip as described in the sixth aspect, and the security module may also be a security module as described in the fifth aspect.
  • the embodiment of the present application further provides a computer readable storage medium, where the computer readable storage medium stores program instructions, when the program instructions are run on a computer, causing the computer to perform the foregoing aspects. The method described.
  • the embodiment of the present application further provides a computer program product including instructions.
  • the instructions When the instructions are run on a computer, the computer is caused to perform the methods described in the various aspects above.
  • 1 is a schematic structural diagram of a protocol stack of an SSP according to an embodiment of the present application
  • FIG. 2a is a schematic structural diagram of a terminal according to an embodiment of the present application.
  • 2b is a schematic structural diagram of a terminal according to an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a terminal application activation system according to an embodiment of the present application.
  • FIG. 3b is a schematic structural diagram of a terminal application activation system according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic flowchart of a terminal application activation method according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a terminal application activation method according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a security module according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a main chip according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of an acquiring unit according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of another main chip according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of an architecture of a terminal application activation system according to an embodiment of the present application.
  • the SSP may be an operating platform of the security module, and multiple applications may be installed in the SSP platform.
  • the applications may be profiles of the operator network, payment applications, licenses, and the like.
  • Network-related apps car networking related apps, mobile health related apps, wearable apps, artificial intelligence related apps, and more.
  • These apps can be activated simultaneously on the SSP platform. That is to say, on the new SSP platform, the App and the profile can belong to the same level of App, that is, the App and the profile can be run in parallel. Compared with the App in the profile, only the profile is activated, and the App can be activated.
  • the same level of App and profile means that the App and profile can be activated at the same time. For example, at least two profiles can be activated at the same time, at least one profile and at least one App can be activated at the same time, and at least two App can be activated at the same time.
  • the profile may be a collective name for a series of files and data related to a mobile network operator (MNO) within the security module.
  • MNO mobile network operator
  • FIG. 1 is a schematic diagram of a protocol stack architecture of an SSP according to an embodiment of the present application, including a physical layer, a data link layer, a transport layer, and an application layer.
  • the physical layer can provide a physical interface between the SSP and the terminal, for example, supporting an international organization for standardization (ISO) 7816, a serial peripheral interface (SPI), an inter-integrated circuit (I2C), Interface protocols such as single wire protocol (SWP).
  • the data link layer supports protocols such as ISO 7816.
  • the transport layer can support an application protocol data unit (APDU), an HCP protocol, and the like.
  • the application layer supports ISO-7816, APDU protocol, hyper text transfer protocol (HTTP) and constrained application protocol (CoAP).
  • the terminal may include a main chip 210 and a security module 220.
  • the security module 220 can be embedded in the main chip 210 as shown in FIG. 2a; or, the security module 220 can be independent of the main chip 210 as shown in FIG. 2b.
  • the specific form of the main chip and the security module is not limited in the embodiment of the present application.
  • the terminal in the present application may be a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), etc., and the specific implementation manner of the terminal is not limited in this embodiment. It can be understood that the terminal in the embodiment of the present application may also be referred to as a terminal device or the like.
  • FIG. 3 is a schematic structural diagram of a terminal application activation system according to an embodiment of the present application. As shown in FIG. 3a, the system includes a main chip 210 and a security module 220, which can be connected to the security module 220 via at least two data channels.
  • the master chip can include a processor 211 and a memory 212.
  • the memory 212 can be used to store programs that can be used to execute programs stored in memory.
  • the master chip can also include a communication interface 213.
  • the main chip can interact with the security module through the communication interface 213, such as performing data transmission, and performing instruction transmission and the like. It can be understood that the communication interface 213 can also interact with other devices, etc., which is not limited in this embodiment.
  • the security module can include a processor 221 and a memory 222 that can be used to store programs that can be used to execute programs stored by the memory.
  • the security module can also include a communication interface 223.
  • the security module interacts with the host chip via the communication interface 223, and the like. It can be understood that the specific implementation manner of the communication interface is not limited by the embodiment of the present application.
  • the data channel can also be understood as a physical channel, which can be used to transfer data and/or instructions between the security module and the main chip, and the data channel is allocated to an application running independently in the security module (eg, at least two to be activated) The application in the application is used exclusively and physically isolated from other applications, ie the application does not share a data channel with other applications.
  • the main chip may also extend at least two logical channels on each data channel, and different logical channels in the same data channel of the extended may be allocated for use by sub-applications in the same application. That is to say, taking the two data channels shown in FIG. 3a as an example, the main chip can respectively extend at least two logical channels on the two data channels.
  • the logic channel can also be used to transfer data and/or instructions between the security module and the main chip.
  • the main chip can allocate different logical channels for different data according to the type of data, or according to the type of the instruction. Different instructions allocate different logical channels. For example, if the application is a profile, after the data channel is allocated for the profile, the main chip can expand two logical channels, which can be used for transmitting dedicated files, basic files, and sub-applications carried in the profile. And other information. It is to be understood that the above is only an example and should not be construed as limiting the embodiments of the present application.
  • the main chip can be the main chip in FIG. 2a and FIG. 2b.
  • the security module can be installed in the device for various forms of SIM card, SSP, secure element (SE), system on chip (SoC), system in package (SIP), and the like.
  • Hardware module or software module can install at least one carrier profile that connects to the network and communicates using the network.
  • the security module can also install other apps at the level of the profile, such as payment apps, licenses, and other identity-related apps, and home networks. App, Internet related apps, mobile health related apps, wearable apps, artificial intelligence related apps, and more.
  • the security module provided by the embodiment of the present application may be a separate module, or may be integrated into the terminal.
  • FIG. 3b is a schematic diagram of a specific architecture of a terminal application activation system according to an embodiment of the present application.
  • the main chip may include a central processing unit (CPU), a media processor, a low power micro controller unit (LPMCU), peripherals, and a modem ( Modem), controller, non-volatile memory (NVM), dynamic random access memory (DRAM) and other components.
  • CPU central processing unit
  • LPMCU low power micro controller unit
  • modem modem
  • controller non-volatile memory
  • DRAM dynamic random access memory
  • the main CPU or the media processor can be used to couple with the memory to execute program instructions and the like stored in the memory.
  • the main CPU can perform the steps of step 402 shown in FIG. 4 and the like.
  • Peripherals may include input and output devices, external memories, analog to digital converters, digital to analog converters, and peripheral processors, such as touch screens, cameras, fingerprint acquisition, near field communication components, sensors, and the like. .
  • the specific device included in the peripheral device is not limited in this embodiment.
  • the controller may include a controller 1 and a controller 2, which is connected to the NVM, and the controller 2 is connected to the DRAM.
  • the security module may include a CPU, a read-only memory (ROM), a random access memory (RAM), a memory management unit (MMU), and a one-time programmable (OTP) , true random number generator (TRNG), encryption engine (such as crypto), sensors, peripherals, signal input/output connections between the security module and the main chip, and so on.
  • ROM read-only memory
  • RAM random access memory
  • MMU memory management unit
  • OTP true random number generator
  • RNG true random number generator
  • crypto true random number generator
  • the ROM and the RAM shown in the embodiment of the present application are only an example. In a specific implementation, other types of memory may be included in the security module, which is not limited in this embodiment.
  • the MMU can be used to manage virtual memory systems.
  • OTP also known as dynamic passwords
  • OTP can generate a time-dependent, unpredictable random number combination every 60 seconds based on a specialized algorithm, and each password can only be used once.
  • the encryption engine can effectively improve the data security of the security module.
  • the security module may be an isolated security subsystem, and communicates with a component such as a main chip through a bus, and the bus may communicate through a mailbox, such as a proprietary mailbox, or the bus.
  • the other embodiments may be used to communicate with other components, such as a universal bus bridge.
  • the bus can include multiple physical connections such that the master chip can assign security modules to different data channels, thereby enabling multi-card multi-standby and data parallel processing.
  • the data transmitted through the data channel can be stored in the external NVM, and the data can be stored in the SoC or the security module in other manners.
  • main chip and the security module shown above are only one example provided by the embodiments of the present application, and the main chip and/or the security module may have more or less components than the components shown, and two combinations may be combined. More or more components, or may have different configurations of components.
  • system provided by the embodiment of the present application can be integrated into the terminal, thereby facilitating the user to use the terminal.
  • FIG. 4 is a schematic flowchart of a terminal application activation method according to an embodiment of the present application, where the terminal application activation method may include the following steps.
  • the main chip acquires application information of the security module, where the application information includes information of at least two applications to be activated.
  • the application may be an application in the security module, where the application may include an operator's profile, and other applications at the level of the profile, such as a payment application, an identity application, an artificial intelligence application, and the like.
  • the security module may include N applications, N is greater than or equal to 2.
  • the application to be activated may be M, and the M is less than or equal to N. It can be understood that the number of the at least two applications to be activated is not limited.
  • the master chip can activate the four applications by acquiring the application information of the security module.
  • the application information acquired by the master chip includes information of the at least two applications to be activated.
  • information about all the applications installed in the security module may be included in the application information acquired by the main chip, and then the priority of the main chip according to each application (the installed application in the security module) Determining at least two applications to be activated as described above.
  • the security module determines the at least two applications to be activated according to the priority of each application (the installed application in the security module). .
  • the embodiment of the present application provides two specific methods for obtaining application information, as follows:
  • the method for obtaining the application information of the security module is as follows: when the security module is powered on, the main chip sends an initialization request message to the security module; and the security module sends an initialization including the application information to the main chip. Response message; the above main chip receives the initialization response message.
  • the foregoing initialization response message further includes first indication information, where the first indication information includes capability information for indicating that the security module supports simultaneous activation of at least two applications, and maximum information of the data channel supported by the security module. At least one of them.
  • the first indication information may further include at least one of quantity information of the installed application in the security module and maximum information of the application that the security module can install.
  • the quantity information of the installed application in the security module can be used to obtain the number of applications that the security module may activate at the same time.
  • the quantity information of the installed application in the security module can also be used to determine whether the maximum number of data channels supported by the main chip can be satisfied.
  • the maximum number of applications that the security module can install can be used by the master chip to determine the number of applications that the security module is likely to install and activate at the same time, so as to determine whether the maximum data channel supported by the master chip can meet the security module and possibly activate and activate. The number of applications that achieve the benefits of accurately allocating data channels to enhance the experience.
  • the security module sends application information including the at least two applications to be activated to the main chip by determining at least two applications to be activated, so that the main chip can not only directly from the initialization response message sent by the security module.
  • Obtaining the application information that is, directly obtaining information of at least two applications to be activated.
  • the master chip knows exactly how many applications can be activated. That is to say, how many applications can be activated by the main chip, which can be determined according to the maximum number of data channels supported by the security module.
  • the acquiring, by the main chip, the application information of the security module includes: when the security module is powered on, the main chip sends an initialization request message to the security module; and the security module sends an initialization response message to the main chip; The chip receives the initialization response message and determines the application information according to the initialization response message.
  • the first initialization information includes the first indication information, where the first indication information includes information about an installed application in the security module.
  • the foregoing first indication information may further include at least one of the following information: the capability information used to indicate that the security module supports simultaneous activation of the at least two applications, the maximum number information of the foregoing data channels supported by the security module, and The maximum number of applications that the security module can install.
  • the master chip after receiving the initialization response message sent by the security module, the master chip can determine which applications are activated according to the initialization response message, so that the master chip can determine how many applications to activate according to its processing capability.
  • the security module can cause the main chip to confirm whether the security module supports multiple data channels by indicating to the main chip that the security module supports the capability information of simultaneously activating at least two applications, and the maximum number of data channels supported by the security module, and The maximum number of data channels that can be supported.
  • the determining method may be determined according to the priority level, and may be specifically determined according to the frequency of use of each application. Certainly, the embodiment of the present application does not uniquely define the determination method.
  • the method further includes:
  • the master chip sends the second indication information to the security module, where the second indication information includes: the capability information used to indicate that the main chip supports simultaneous activation of at least two applications, and the maximum number information of the data channels supported by the main chip. At least one.
  • the main chip may further send the second indication information to the security module, so as to further determine whether the main chip supports simultaneous activation of at least two applications. It can be understood that, in the embodiment of the present application, since the security module needs to be connected to the main chip through the data channel, the maximum number of data channels supported by the security module is the same as the maximum number of data channels supported by the main chip.
  • the foregoing main chip activates the at least two applications, and allocates a corresponding data channel for each of the at least two applications.
  • the main chip may allocate one data channel for each of at least two applications. If the number of applications to be activated included in the application information is M, the master chip may respectively allocate one data channel (ie, M data channels) for the M applications.
  • the main chip activation application may specifically establish a communication channel with the application, read the application data, and send the application data to the corresponding processing module to complete the service in the application.
  • the method for activating the application by the main chip is only an example. It should not be construed as limiting the embodiments of the present application.
  • the embodiment of the present application also provides two scenarios for allocating data channels, as follows:
  • the foregoing assigning a corresponding data channel to each of the at least two applications includes: assigning a corresponding to each of the at least two applications when the first quantity is less than or equal to the second quantity The data channel; wherein the first quantity is the quantity of the at least two applications, and the second quantity is the maximum number of the data channels supported by the security module.
  • the second number is also the maximum number of data channels supported by the main chip.
  • the master chip can allocate a data channel for each application included in at least two applications to be activated.
  • Scenario 2 the foregoing assigning a corresponding data channel to each of the at least two applications, including: determining, by using the at least two applications, the first application, where the first quantity is greater than the second quantity, Each application in the foregoing first application allocates a corresponding data channel; wherein, the priority of the first application is higher than a reference priority, and the number of the first application is less than or equal to the second quantity.
  • the master chip since the master chip cannot allocate a data channel for each of the at least two applications to be activated, the master chip may first determine an application whose priority is higher than the reference priority, that is, the first application, thereby A corresponding data channel is allocated for each application in the first application.
  • the first application may be one or at least two, which is not limited in the embodiment of the present application.
  • the reference priority may be set by the master chip, and the reference priority may be dynamically updated according to the maximum number of data channels supported by the main chip. The embodiment of the present application does not limit how to set the reference priority.
  • the embodiment of the present application also provides a method for allocating a data channel, as follows:
  • the at least two applications include a second application, where the foregoing assigning a corresponding data channel to each of the at least two applications includes: releasing the third application if the data channel is allocated to the third application And allocating the foregoing data channel to the second application; wherein, the priority of the second application is higher than the priority of the third application, and the third application does not belong to the application of the at least two applications.
  • the scenario 1 and the scenario 2 are shown in the scenario where the data channel is not allocated to other applications, and the embodiment of the present application is shown in the scenario where the data channel has been allocated to other applications.
  • the main chip needs to allocate a data channel, such as a first data channel, to the second application, and when the main chip is allocated, detecting that the first data channel has been allocated to the first data channel
  • the primary chip may release the third application, thereby allocating the first data channel to the second application.
  • the above first data channel is only an example and does not represent a sequence.
  • the main chip may temporarily switch the first data channel to be used by the second application when the third application has no service data; and when the third application is used
  • the service data of the second application is temporarily cached, and the first data channel is switched to the third application until the third application no longer has service data transmission, and the cache is read.
  • the second application of the business data and switches the first data channel for use by the second application.
  • comparison principle of the above priorities may be compared according to the frequency of use of the application, or may be compared according to the preference of the user, or may be compared according to the usage duration of the user, etc., which is not limited in the embodiment of the present application.
  • the main chip allocates a corresponding data channel for each of the at least two applications, the identifier of the data channel can also be carried, so that the correspondence between the data channel and the application can be effectively distinguished, so that the data transmission efficiency is higher.
  • the main chip performs data communication with the at least two applications by using data channels corresponding to the at least two applications.
  • the main chip can perform data communication with the at least two applications through data channels corresponding to at least two applications to be activated. If the at least two applications to be activated include the second application and the fourth application, the main chip allocates a data channel, such as a second data channel, to the second application, and allocates a data channel, such as a third data channel, to the fourth application. Thereafter, the master chip can perform data communication with the second application through the second data channel, and perform data communication with the fourth application through the third data channel. It can be understood that the second data channel and the third data channel are only an example, and do not represent a sequence, and the second application and the fourth application are also only an example, and do not represent a sequence.
  • the data channel is a data channel between the security module and the modem; or in the case where the second application is non-NAA, the data channel The data channel between the above security module and the central processing unit.
  • the application may further determine whether the application is the NAA, and if the second application is the NAA, allocate the data channel between the second application and the modem. If the second application is non-NAA, the second application is allocated a data channel with the CPU.
  • a data channel between the security module and the modem may be only one type of data channel in the embodiment of the present application, that is, a data channel between the security module and the modem, or a data channel between the security module and the central processing unit.
  • the data channel in the embodiment of the present application can not only transmit the application protocol data unit (application), because the data channel in the embodiment of the present application is a data channel between the main chip and the security module, for example, a data channel supporting the bus protocol.
  • the protocol data unit (APDU) instruction can also transmit an abstract syntax notation one (ASN.1) instruction, and can also transmit a start response command and the like.
  • the implementation of the embodiment of the present invention can effectively solve the problem that the same security module cannot activate multiple applications or multiple profiles at the same time, which not only enables the security module to implement multi-card multi-standby and multi-application functions, but also fundamentally solves the hardware cost.
  • the activated applications are connected to the main chip through respective data channels, thereby achieving security isolation, and closing one data channel does not affect other data channels, and congestion of one data channel, and does not affect the transmission and reception of other data channels. .
  • the terminal application activation method shown in FIG. 4 can be applied not only to the initialization process of the main chip and the security module, but also to an application such as the fifth application (application in the security module), such as the main chip;
  • the security module further includes a sixth application, where the security module requires the main chip to activate the sixth application, and the main chip can also activate the sixth application by acquiring application information of the security module, and allocate a data channel for the sixth application.
  • the application to be activated by the main chip may be one in this scenario, since the final state of the main chip also activates two applications (ie, the fifth application and the sixth application), the simultaneous activation security is also implemented.
  • the functionality of the different applications in the module may be one in this scenario, since the final state of the main chip also activates two applications (ie, the fifth application and the sixth application), the simultaneous activation security is also implemented. The functionality of the different applications in the module.
  • FIG. 5 is a schematic flowchart of a terminal application activation method according to an embodiment of the present application.
  • the terminal includes a main chip and a security module, and the terminal application activation method includes at least the following steps.
  • the main chip When the security module is powered on, the main chip sends an initialization request message to the security module.
  • the specific mode of powering on the security module may be that the main chip supplies power to the security module.
  • the security module After receiving the power supply voltage of the main chip, the security module starts to work, and performs a security module initialization process, such as starting an operating system in the security module, and reading Take security module capability information, installed application information, and so on.
  • the security module is powered on, and can be powered initially. It can be reset, hot restart, or cold boot.
  • the security module may also allocate resources such as a data line and an address line.
  • the main chip and the security module may also be connected through at least one basic data channel, so that the main chip and the security module complete the initialization process through the basic data channel, and the initialization process may include the main chip to the security.
  • the master chip can perform other operations with the security module through the basic data channel, such as whether a new data channel or the like needs to be allocated for a specific application, such as at least two applications to be activated. It can be understood that the role of the basic data channel is not limited by the embodiment of the present application.
  • the security module receives an initialization request message, and sends an initialization response message to the primary chip.
  • the initialization response message includes not only application information, but also first indication information.
  • the application information includes information of at least two applications to be activated
  • the first indication information includes capability information for indicating that the security module supports simultaneous activation of at least two App, and may further include maximum quantity information of the supported data channels.
  • the first indication information may further carry the installed quantity information of the security module.
  • the initialization response message may be a power-on response response message, an answer to reset (ATR) command, an initialization command message supported by a system bus protocol, and the like. It can be understood that the specific form of the initialization response message is not limited in this embodiment of the present application.
  • the primary chip receives an initialization response message, and sends a second indication information to the security module.
  • the second indication information may be used to indicate capability information of the device where the main chip and/or the main chip are located, such as including capability information for indicating that the main chip supports simultaneous activation of at least two applications, specifically, the main chip is indicated.
  • the capability information supporting the simultaneous activation of at least two applications may indicate that the device in which the main chip and/or the main chip are located may support simultaneous opening of multiple data channels for different App in the security module, wherein the App in the security module is a parallel App of the same level.
  • the second indication information may further include a maximum quantity information of the data channel supported by the main chip.
  • the maximum number of data channels supported by the master chip may indicate the maximum number of data channels supported by the master chip and/or the device on which the master chip resides.
  • the main chip supports a 16-bit to 128-bit data bus width.
  • the address between the main chip and the security module is assigned to each App by the address line. When the App is found, the address line is used to find the address. The address assigned by the app, and then the App data is read through the data line.
  • the data line can transfer the CPU data to the specified App in the security module, and can also transfer the specified App data in the security module to the CPU.
  • the 16-bit data line can transmit 16-bit data in turn, and the 16-address line can select the 64K CPU addressing range. Therefore, it is possible to distinguish different apps by address, and realize simultaneous activation, addressing, and The purpose of the main chip communication.
  • the main chip determines, according to the application information included in the initialization response message, whether the at least two applications to be activated included in the application information include a valid App. If the valid App is not included, step 505 is performed. In the case of a valid App, step 506 is performed.
  • the master chip may determine whether there is an active operator profile in the at least two applications to be activated. By judging whether there is a profile, it is convenient for the main chip to determine whether it is currently required to camp on the network.
  • the master chip may allocate a corresponding data channel to the at least two applications according to the obtained at least two applications to be activated.
  • the embodiment of the present application provides three possible scenarios for allocating corresponding data channels for at least two applications, which may be specifically as follows:
  • the main chip may allocate a corresponding data channel for each of the at least two applications to be activated. For example, if 10 apps are installed in the security module, but only 4 apps are activated at the same time, only the data channels are allocated for the 4 activated apps.
  • the master chip can allocate a data channel for each application to be activated. This scenario maximizes the needs of the application and assigns a data channel to each application to be activated.
  • the main chip can dynamically allocate data channels according to the number of at least two applications to be activated and the maximum number of data channels currently supported. For example, if the current processing capability of the main chip is limited, or the security module can only allocate 2 data channels, the main chip can allocate corresponding data channels for the two App to be activated, thereby transmitting the two App through the corresponding data channel.
  • the main chip can dynamically allocate data channels according to the number of at least two applications to be activated and the maximum number of data channels currently supported. For example, if the current processing capability of the main chip is limited, or the security module can only allocate 2 data channels, the main chip can allocate corresponding data channels for the two App to be activated, thereby transmitting the two App through the corresponding data channel.
  • Scenario 2 Compared with the scenario 1, by dynamically allocating the data channel, the processing capability of the main chip or the security module can be effectively matched, and the processing efficiency of the main chip or the security module is improved.
  • the main chip can dynamically allocate data channels according to the priority of at least two applications to be activated and the maximum number of data channels currently supported. For example, when the number of App to be activated by the main chip is greater than the number of supported data channels, the main chip preferentially allocates data channels according to the App whose priority is higher than the reference priority.
  • the master chip dynamically allocates data channels for the application to be activated according to the priority of the application and the processing capability.
  • the scenario three-phase can effectively allocate the data channel according to the priority of the application, thereby avoiding the allocation of the data channel due to the very small service data of the application to be activated or the application frequency of the user is not high. Improve the utilization of data channels.
  • the main chip may also determine whether the application is allocated on the new data channel, and if yes, perform an allocation operation; if not, first release the priority according to the priority Applications that are low or temporarily unused (such as legacy applications on the data channel), and then assign data channels to the applications to be activated.
  • the corresponding App1 when it is judged that a new data channel is allocated for the new App1, the corresponding App1 is activated on the data channel 1, and when it is determined that the new App2 is activated on the existing data channel 2, for example, the low priority or the temporary is released.
  • the corresponding App2 is activated on Data Channel 2 without using Data Channel 3 of App3.
  • the activation of the selected App2 on data channel 2 can be performed, for example, by '04' UICC reset in the refresh command.
  • the master file (MF), the dedicated file (DF), and the elementary file (EF) of the profiled application are opened by the select command or the manage channel command to open the logical channel, such as in the logic.
  • the application protocol data unit (APDU) command is transmitted on the channel.
  • the embodiment of the present application provides a method for simultaneously activating multiple App in a security module.
  • information communication between multiple App and the main chip in a security module, the parameters are transmitted, and the technical effect of the instruction is transmitted.
  • the embodiment of the present application can solve the situation that two SIM cards need to be deployed in the terminal when the dual card dual standby is implemented.
  • the profiles of multiple SIM cards installed in the security module and other App can be activated at the same time. There is no longer a need to deploy multiple security modules.
  • FIG. 6 is a schematic structural diagram of a security module according to an embodiment of the present disclosure.
  • the security module is applicable to the terminal application activation method. As shown in FIG. 6, the security module includes:
  • the sending unit 601 is configured to send the application information of the security module to the foregoing main chip, where the application information includes information of at least two applications to be activated, and the application information is used to indicate that the data channel is allocated for the at least two applications;
  • the communication unit 602 is configured to perform data communication with the main chip by using the data channel corresponding to the at least two applications after the main chip allocates a corresponding data channel for each of the at least two applications.
  • the communication interface of the security module shown in FIG. 3a can be used to perform a specific implementation of the sending unit 601, and can also be used to perform the specific implementation of step 502. It can be understood that the sending unit 601 can send an initialization response message to the main chip through the basic data channel described in FIG. 5.
  • the processor of the security module shown in FIG. 3a or the CPU in the security module shown in FIG. 3b may be used to implement an implementation of the communication unit 603 that corresponds to the processor.
  • the communication interface shown in FIG. 3a or the peripheral device shown in FIG. 3b can also be used to implement an implementation in communication unit 603.
  • the specific component of the hardware component corresponding to the communication unit 603 can be determined according to the specific implementation of the communication unit 603. The embodiment of the present application is not limited.
  • the security module shown in FIG. 6 further includes: a receiving unit 603, configured to receive an initialization request message from the main chip when the security module is powered on;
  • the sending unit 601 is configured to send an initialization response message that includes the application information to the primary chip, where the initialization response message further includes first indication information, where the first indication information includes At least one of capability information of at least two applications and maximum information of the foregoing data channels supported by the security module is activated.
  • the receiving unit 603 can receive the initialization request message from the main chip through the basic data channel described in FIG. 5.
  • the receiving unit 603 is further configured to receive second indication information from the main chip, where the second indication information includes capability information for indicating that the main chip supports simultaneous activation of at least two applications. And at least one of the maximum number information of the above data channels supported by the above main chip.
  • FIG. 7 is a schematic structural diagram of a main chip according to an embodiment of the present disclosure.
  • the main chip can be applied to the terminal application activation method. As shown in FIG. 7, the main chip includes at least:
  • the obtaining unit 701 is configured to acquire application information of the security module, where the application information includes information of at least two applications to be activated;
  • the allocating unit 703 is configured to allocate a corresponding data channel for each of the at least two applications
  • the communication unit 704 is configured to perform data communication with the at least two applications by using data channels corresponding to the at least two applications.
  • the processor of the main chip shown in FIG. 3a and the main CPU of the main chip shown in FIG. 3b can be used to implement a specific implementation of the activation unit 702 and the allocation unit 703.
  • the processor of the main chip shown in FIG. 3a can also be used to execute a specific implementation manner of the obtaining unit 701, or a communication interface of the main chip shown in FIG. 3a, to implement a specific implementation manner of the obtaining unit 701. There is no limitation on the specific implementation.
  • the foregoing obtaining unit 701 includes:
  • the sending subunit 7011 is configured to send an initialization request message to the security module when the security module is powered on;
  • the receiving sub-unit 7012 is configured to receive an initialization response message that includes the foregoing application information from the security module, where the initialization response message further includes first indication information, where the first indication information is used to indicate that the security module supports simultaneous activation of at least two At least one of the capability information of the application and the maximum number of data channels supported by the security module.
  • the sending subunit 7011 is further configured to send the second indication information to the security module, where the second indication information includes capability information for indicating that the main chip supports simultaneous activation of at least two applications. And at least one of the maximum number information of the above data channels supported by the above main chip.
  • the foregoing allocating unit 703 is configured to allocate a corresponding data channel to each of the at least two applications, where the first quantity is less than or equal to the second quantity, where The quantity is the quantity of the at least two applications, and the second quantity is the maximum number of the data channels supported by the security module.
  • the foregoing allocating unit 703 is configured to determine, in the foregoing at least two applications, that the first application is the first one of the first applications, where the first quantity is greater than the second quantity.
  • the application allocates a corresponding data channel; wherein the first application has a higher priority than the reference priority, and the number of the first application is less than or equal to the second quantity.
  • the at least two applications include a second application, where the foregoing allocating unit 703 is configured to release the third application when the data channel is allocated to the third application.
  • the second application allocates the foregoing data channel, and the priority of the second application is higher than the priority of the third application, and the third application does not belong to the application of the at least two applications.
  • the data channel is a data channel between the security module and the modem; or the second application is a non-NAA.
  • the data channel is a data channel between the security module and the central processing unit.
  • the first indication information further includes at least one of the quantity information of the installed application in the security module and the maximum quantity information of the security module capable of installing the application.
  • the foregoing main chip further includes: an expansion unit 705, configured to expand at least two logical channels based on the data channel.
  • processor of the main chip shown in FIG. 3a and the main CPU of the main chip shown in FIG. 3b can be used to implement a specific implementation of the extension unit 705.
  • FIG. 10 is a schematic diagram of an architecture of a terminal application activation system according to an embodiment of the present application.
  • the following is an example in which two types of profiles are installed in a security module, that is, in a security module, Two issuer security domain profiles (ISD-P) 1 and ISD-P2, and the profiles of the two operators are respectively installed in the corresponding ISD-P1 and ISD-P2, wherein each ISD-P is distinguished by different application identifiers (AIDs).
  • a 0-32-bit bus can correspond to 0-32 data channels for transmitting hardware signals, a different data storage area is allocated for different hardware signals in a mailbox, and one mailbox corresponds to one data channel.
  • Multiple mailboxes correspond to corresponding multiple data channels and are assigned to apps in different security modules. For example, App 1 occupies the first data channel, App 2 occupies the second data channel, and different mailbox addresses are assigned to distinguish different data channels.
  • Further main chip and security module can distinguish between uplink and downlink data, logical address, and physical through different mailbox addresses. Addresses, etc.; and memory management unit (MMU) mapped addresses can also be used to distinguish between data channels.
  • MMU memory management unit
  • the main chip and the security module can be notified by the interrupt mechanism to fetch data in the mailbox, such as an external interrupt (hardware interrupt) or an internal interrupt (software interrupt).
  • an external interrupt hardware interrupt
  • an internal interrupt software interrupt
  • Different interrupt sources correspond to interrupt service subroutines, are stored in different allocated storage areas, and are assigned an interrupt source identifier, and different App can also assign different interrupt priorities to achieve data channel establishment.
  • connection between the main chip and the security module can be implemented by using the I2C method as a data channel allocated to different App in the security module to transmit information and instructions of different App.
  • connection between the main chip and the security module may be implemented through a serial peripheral interface (SPI) manner, as a data channel allocated to different App in the security module, to transmit information of different App and instruction.
  • SPI serial peripheral interface
  • the embodiment of the present application provides a terminal, where the terminal includes a main chip and a security module, and the main chip is connected to the security module through at least two data channels.
  • the main chip is configured to acquire application information of the security module, activate the at least two applications, and allocate corresponding data channels for each of the at least two applications; and respectively correspond to the at least two applications.
  • the data channel is in data communication with the at least two applications; wherein the application information includes information of at least two applications to be activated.
  • the foregoing main chip is further configured to send an initialization request message to the security module when the security module is powered on, where the security module is configured to send an initialization response message that includes the application information to the primary chip, where The foregoing initialization response message further includes first indication information, where the first indication information includes at least one of the capability information for indicating that the security module supports simultaneous activation of at least two applications and the maximum number of data channels supported by the security module.
  • the above main chip is further configured to receive the initialization response message.
  • the foregoing main chip is further configured to send the second indication information to the security module, where the second indication information includes: the capability information used to indicate that the main chip supports simultaneous activation of at least two applications, and the foregoing supported by the main chip. At least one of the maximum number of data channels.
  • the foregoing main chip is configured to allocate a corresponding data channel for each of the at least two applications when the first quantity is less than or equal to the second quantity; wherein the first quantity is the foregoing The number of at least two applications, the second quantity being the maximum number of the data channels supported by the security module.
  • the foregoing main chip is configured to determine, according to the foregoing first quantity that is greater than the second quantity, a first application from the at least two applications, and assign a corresponding to each application in the first application. a data channel; wherein the priority of the first application is higher than a reference priority, and the number of the first application is less than or equal to the second quantity.
  • the at least two applications include the second application, where the primary chip is specifically configured to release the third application and allocate the data to the second application when the data channel is allocated to the third application.
  • a channel wherein the priority of the second application is higher than the priority of the third application, and the third application does not belong to the application of the at least two applications.
  • the data channel is a data channel between the security module and the modem; or in the case that the second application is non-NAA, the data channel The data channel between the above security module and the central processing unit.
  • the first indication information further includes the number of installed applications in the security module and/or the maximum number of applications that the security module can install.
  • the foregoing main chip is further configured to extend at least two logical channels based on the foregoing data channel.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in or transmitted by a computer readable storage medium.
  • the computer instructions may be from a website site, computer, server or data center via a wired (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.) Another website site, computer, server, or data center for transmission.
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a digital versatile disc (DVD)), or a semiconductor medium (eg, a solid state disk (SSD)). )Wait.
  • the foregoing storage medium includes: a read-only memory (ROM) or a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Stored Programmes (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Communication Control (AREA)

Abstract

本申请提供了一种终端应用激活方法、装置及系统,其中,终端包括主芯片和安全模块,且该安全模块通过至少两个数据通道与该主芯片连接,方法包括:主芯片获取安全模块的应用信息,该应用信息包括待激活的至少两个应用的信息;该主芯片激活该至少两个应用,并为该至少两个应用中的每个应用分配对应的数据通道;然后该主芯片分别通过该至少两个应用对应的数据通道与该至少两个应用进行数据通信。相应地,还提供一种安全模块、主芯片以及系统。实施本申请实施例,可同时激活安全模块中的不同应用。

Description

终端应用激活方法、装置及系统 技术领域
本申请涉及智能终端技术领域,尤其涉及一种终端应用激活方法、装置及系统。
背景技术
当前的智能安全平台(secure smart platform,SSP)可支持可移除式用户识别模块(subscriber identity module,SIM)卡,嵌入式SIM卡(embedded SIM,eSIM)和集成式SIM等。其中,可移除式SIM卡,即用户在通信运营商处购买SIM卡后,将该SIM卡插入到终端中,从而使用该通信运营商提供的通信服务。eSIM卡也可称为嵌入式通用集成电路卡(embedded universal integrated circuit card,eUICC)。eSIM卡是一种可由多个通信运营商远程管理签约用户的安全元件。其可通过插拔式和焊接式放入到终端中。集成式SIM卡也可称为集成式通用集成电路卡(integrated UICC,iUICC)。该集成式SIM卡是以网络协议(internet protocol,IP)方式或芯片堆叠方式集成在终端中。其中,SSP可安装多个应用,包括访问运营商网络的配置文件(profile)和该profile下的其他应用。
目前,同一个SSP不支持实现多个profile同时激活。当要激活一个目标profile时,而如果终端中已经有一个被激活的profile,则该终端可释放该被激活的profile,从而激活目标profile。而若用户需要同时使用不同通信运营商提供的通信服务时,即同时激活多个profile时,是通过使用支持双卡双待或多卡多待的终端来实现。而未来SSP如果集成到芯片中,为了成本考虑,将只集成一个SSP,将无法实现双卡双待或多卡多待。同时,由于profile与该profile下的其他应用不是位于同一个级别,当一个通信运营商的profile被激活时,该profile下的应用程序(application,App)则被激活。举例来说,在使用SIM卡时激活了中国移动的profile,则中国移动下的移动和包,移动网上营业厅等App可以被选中激活,而如果想用中国联通的App,则需要重新选中中国联通Profile下的App。目前,在新型SSP平台上,应用与profile可属于同一级别。
如何同时激活同一个运营商或不同运营商下的多个应用(包括profile)是目前需要解决的问题。
发明内容
本申请实施例提供了一种终端应用激活方法、装置及系统,以实现激活安全模块中的不同App。
第一方面,本申请实施例提供了一种终端应用激活方法,终端包括主芯片和安全模块,所述安全模块通过至少两个数据通道与所述主芯片连接,所述方法包括:所述主芯片获取所述安全模块的应用信息,所述应用信息包括待激活的至少两个应用的信息;所述主芯片激活所述至少两个应用,为所述至少两个应用中的每个应用分配对应的数据通道后,所述主芯片分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
实施本申请实施例,在需要激活至少两个应用时,通过为该至少两个应用中的每个应用分配对应的数据通道,可有效解决现有方案中只能激活一个profile以及该profile下 的多个App,而无法激活多个profile以及无法激活一个profile与该profile并列的安装在安全模块上的其他App的问题。从而不仅可实现多卡多待的功能,还节省了硬件成本。
在一种可能的实现方式中,所述主芯片获取所述安全模块的应用信息,包括:所述安全模块上电时,所述主芯片向所述安全模块发送初始化请求消息;所述安全模块向所述主芯片发送包含所述应用信息的初始化响应消息;以及所述主芯片接收所述初始化响应消息;其中,所述初始化响应消息中还包括第一指示消息,所述第一指示消息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
实施本申请实施例,主芯片通过与安全模块之间的交互,不仅可使得该主芯片得知该安全模块支持同时激活至少两个应用的能力,还可以通过该交互,建立该主芯片与该安全模块之间的通信连接,以便于后续为不同的App分配数据通道。
在一种可能的实现方式中,所述主芯片接收所述初始化响应消息之后,所述方法还包括:所述主芯片向所述安全模块发送第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
实施本申请实施例,主芯片通过向安全模块发送第二指示信息,可使得安全模块得知该主芯片支持同时激活至少两个应用的能力,达到互相确认的效果。
在一种可能的实现方式中,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在第一数量小于或等于第二数量的情况下,为所述至少两个应用中的每个应用分配对应的数据通道;其中,所述第一数量为所述至少两个应用的数量,所述第二数量为所述安全模块支持的所述数据通道的最大数量。
实施本申请实施例,在第一数量小于或等于第二数量的情况下,通过为待激活的至少两个应用中的每个应用都分配对应的数据通道,不仅可实现多卡多待,还能够隔离不同的应用。其中,由于不同应用之间的收发关系独立,因此可解决干扰和误收的问题,提高物理连接的安全性。
在一种可能的实现方式中,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在所述第一数量大于所述第二数量的情况下,从所述至少两个应用中确定第一应用,为所述第一应用中的每个应用分配对应的数据通道;其中,所述第一应用的优先级高于参考优先级,且所述第一应用的数量小于或等于所述第二数量。
实施本申请实施例,在安全模块与主芯片之间的数据通道的数量大于安全模块中的数量的情况下,通过为优先级高的应用优先分配数据通道,可提高用户满意度,避免为优先级低的应用分配数据通道,而使得用户满意度低下。
在一种可能的实现方式中,所述至少两个应用中包括第二应用,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在所述数据通道已分配给第三应用的情况下,释放所述第三应用,为所述第二应用分配所述数据通道;其中,所述第二应用的优先级高于所述第三应用的优先级,所述第三应用不属于所述至少两个应用中的应用。
在一种可能的实现方式中,在所述第二应用为网络接入应用(network access application,NAA)的情况下,所述数据通道为所述安全模块与调制解调器(modem)之间的数据通道;或在所述第二应用为非NAA的情况下,所述数据通道为所述安全模块与中央处理器之间的数据通道。
实施本申请实施例,根据应用是否为NAA,从而建立安全模块与调制解调器或中央处理器之间的数据通道,可以有效减少调制解调器的处理任务量。
在一种可能的实现方式中,所述第一指示信息中还包括所述安全模块中已安装的应用的数量信息和所述安全模块能够安装应用的最大数量信息中的至少一项。
在一种可能的实现方式中,所述方法还包括:所述主芯片基于所述数据通道扩展至少两个逻辑通道。
实施本申请实施例,在主芯片为待激活的至少两个应用中的每个应用分配对应的数据通道后,还可以为该每个应用对应的数据通道扩展至少两个逻辑通道,从而提高数据的并发量,和数据的处理速度。
第二方面,本申请实施例还提供了一种终端应用激活方法,所述方法应用于安全模块,所述安全模块通过至少两个数据通道与主芯片连接,所述方法包括:向所述主芯片发送所述安全模块的应用信息;在所述主芯片为所述至少两个应用中的每个应用分配对应的数据通道后,所述安全模块分别通过所述至少两个应用对应的数据通道与所述主芯片进行数据通道;其中,所述应用信息包括待激活的至少两个应用的信息,所述应用信息用于指示为所述至少两个应用中的每个应用分配对应的数据通道。
在一种可能的实现方式中,所述向所述主芯片发送所述安全模块的应用信息之前,所述方法还包括:在所述安全模块上电时,所述安全模块接收来自所述主芯片的初始化请求消息;所述向所述主芯片发送所述安全模块的应用信息包括:所述安全模块向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,所述安全模块向所述主芯片发送初始化响应消息之后,以及所述安全模块分别通过至少两个应用对应的数据通道与所述主芯片进行数据通信之前,所述方法还包括:所述安全模块接收来自所述主芯片的第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
第三方面,本申请实施例还提供了一种终端应用激活方法,所述方法应用于主芯片,所述主芯片通过至少两个数据通道与安全模块连接,所述方法包括:所述主芯片获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;所述主芯片激活所述至少两个应用,为所述至少两个应用中的每个应用分配对应的数据通道;所述主芯片分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
在一种可能的实现方式中,所述主芯片获取所述安全模块的应用信息,包括:所述安全模块上电时,所述主芯片向所述安全模块发送初始化请求消息;所述主芯片接收来自所述安全模块的包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,所述主芯片接收所述初始化响应消息之后,所述方法还包括:所述主芯片向所述安全模块发送第二指示信息,所述第二指示信息包括用于指示 所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在第一数量小于或等于第二数量的情况下,为所述至少两个应用中的每个应用分配对应的数据通道;其中,所述第一数量为所述至少两个应用的数量,所述第二数量为所述安全模块支持的所述数据通道的最大数量。
在一种可能的实现方式中,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在所述第一数量大于所述第二数量的情况下,从所述至少两个应用中确定第一应用,为所述第一应用中的每个应用分配对应的数据通道;其中,所述第一应用的优先级高于参考优先级,且所述第一应用的数量小于或等于所述第二数量。
在一种可能的实现方式中,所述至少两个应用中包括第二应用,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:在所述数据通道已分配给第三应用的情况下,释放所述第三应用,为所述第二应用分配所述数据通道;其中,所述第二应用的优先级高于所述第三应用的优先级,所述第三应用不属于所述至少两个应用中的应用。
在一种可能的实现方式中,在所述第二应用为网络接入应用NAA的情况下,所述数据通道为所述安全模块与调制解调器之间的数据通道;或在所述第二应用为非NAA的情况下,所述数据通道为所述安全模块与中央处理器之间的数据通道。
在一种可能的实现方式中,所述第一指示信息中还包括所述安全模块中已安装的应用的数量信息和所述安全模块能够安装应用的最大数量信息中的至少一项。
在一种可能的实现方式中,所述方法还包括:所述主芯片基于所述数据通道扩展至少两个逻辑通道。
第四方面,本申请实施例提供了一种终端应用激活系统,所述系统包括主芯片和安全模块,所述安全模块通过至少两个数据通道与所述主芯片连接;其中,所述主芯片,用于获取所述安全模块的应用信息,所述应用信息包括待激活的至少两个应用的信息;以及所述主芯片,还用于激活所述至少两个应用,并为所述至少两个应用中的每个应用分配对应的数据通道;以及所述主芯片,还用于分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
在一种可能的实现方式中,所述主芯片,还用于在所述安全模块上电时,向所述安全模块发送初始化请求消息;所述安全模块,用于向所述主芯片发送包含所述应用信息的初始化响应消息,其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项;所述主芯片,还用于接收所述初始化响应消息。
在一种可能的实现方式中,所述主芯片,还用于向所述安全模块发送第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,所述主芯片,具体用于在第一数量小于或等于第二数量的情况下,为所述至少两个应用中的每个应用分配对应的数据通道;其中,所述第一数量为所述至少两个应用的数量,所述第二数量为所述安全模块支持的所述数据通道的最大数量。
在一种可能的实现方式中,所述主芯片,具体用于在所述第一数量大于所述第二数量的情况下,从所述至少两个应用中确定第一应用,为所述第一应用中的每个应用分配对应的数据通道;其中,所述第一应用的优先级高于参考优先级,且所述第一应用的数量小于或等于所述第二数量。
在一种可能的实现方式中,所述至少两个应用中包括第二应用,所述主芯片,具体用于在所述数据通道已分配给第三应用的情况下,释放所述第三应用,为所述第二应用分配所述数据通道;其中,所述第二应用的优先级高于所述第三应用的优先级,所述第三应用不属于所述至少两个应用中的应用。
在一种可能的实现方式中,在所述第二应用为网络接入应用NAA的情况下,所述数据通道为所述安全模块与调制解调器之间的数据通道;或在所述第二应用为非NAA的情况下,所述数据通道为所述安全模块与中央处理器之间的数据通道。
在一种可能的实现方式中,所述第一指示信息中还包括所述安全模块中已安装的应用的数量信息和所述安全模块能够安装的应用的最大数量信息中的至少一项。
在一种可能的实现方式中,所述主芯片,还用于基于所述数据通道扩展至少两个逻辑通道。
第五方面,本申请实施例还提供了一种安全模块,包括发送单元,用于向所述主芯片发送所述安全模块的应用信息;其中所述应用信息包括待激活的至少两个应用的信息,所述应用信息用于指示为所述至少两个应用分配数据通道;通信单元,用于在所述主芯片为所述至少两个应用中的每个应用分配对应的数据通道后,分别通过所述至少两个应用对应的数据通道与所述主芯片进行数据通信。
在一种可能的实现方式中,所述安全模块还包括:接收单元,用于在所述安全模块上电时,接收来自主芯片的初始化请求消息;所述发送单元,具体用于向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,所述接收单元,还用于接收来自所述主芯片的第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
第六方面,本申请实施例还提供了一种主芯片,包括:获取单元,用于获取安全模块的应用信息,所述应用信息包括待激活的至少两个应用的信息;激活单元,用于激活所述至少两个应用;分配单元,用于为所述至少两个应用中的每个应用分配对应的数据通道;通信单元,用于分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
在一种可能的实现方式中,所述获取单元包括:发送子单元,用于在所述安全模块上电时,向所述安全模块发送初始化请求消息;接收子单元,用于接收来自安全模块的包含所述应用信息的初始化响应消息,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,所述发送子单元,还用于向所述安全模块发送第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信 息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,所述分配单元,具体用于在第一数量小于或等于第二数量的情况下,为所述至少两个应用中的每个应用分配对应的数据通道,所述第一数量为所述至少两个应用的数量,所述第二数量为所述安全模块支持的所述数据通道的最大数量。
在一种可能的实现方式中,所述分配单元,具体用于在所述第一数量大于所述第二数量的情况下,所述至少两个应用中确定第一应用,为所述第一应用中的每个应用分配对应的数据通道;其中,所述第一应用的优先级高于参考优先级,且所述第一应用的数量小于或等于所述第二数量。
在一种可能的实现方式中,所述至少两个应用中包括第二应用,所述分配单元,具体用于在所述数据通道已分配给第三应用的情况下,释放所述第三应用,为所述第二应用分配所述数据通道,所述第二应用的优先级高于所述第三应用的优先级,所述第三应用不属于所述至少两个应用中的应用。
在一种可能的实现方式中,在所述第二应用为网络接入应用NAA的情况下,所述数据通道为所述安全模块与调制解调器之间的数据通道;或在所述第二应用为非NAA的情况下,所述数据通道为所述安全模块与中央处理器之间的数据通道。
在一种可能的实现方式中,所述第一指示信息中还包括所述安全模块中已安装的应用的数量信息和所述安全模块能够安装的应用的最大数量信息中的至少一项。
在一种可能的实现方式中,所述主芯片还包括:扩展单元,用于基于所述数据通道扩展至少两个逻辑通道。
第七方面,本申请实施例还提供了一种安全模块,可以实现上述终端应用激活方法,该安全模块包括处理器、存储器和通信接口,所述处理器与所述存储器、所述通信接口通过线路连接,所述存储器,用于存储程序;所述处理器,用于执行所述存储器中存储的程序,使所述处理器执行第一方面和第二方面所描述的方法中相应的功能;所述通信接口用于支持所述安全模块与其他网元之间的通信。
第八方面,本申请实施例还提供了一种主芯片,可以实现上述终端应用激活方法,该主芯片包括处理器、存储器和通信接口,所述处理器与所述存储器、所述通信接口通过线路连接,所述存储器,用于存储程序;所述处理器,用于执行所述存储器中存储的程序,使所述处理器执行第一方面和第三方面所描述的方法中相应的功能;所述通信接口用于支持所述安全模块与其他网元之间的通信。
第九方面,本申请实施例还提供了一种终端,包括主芯片和安全模块,所述主芯片,用于执行如第一方面和第三方面所描述的方法中相应的功能;所述安全模块,用于执行如第一方面和第二方面所描述的方法中相应的功能。其中,所述主芯片也可为如第六方面所描述的主芯片,所述安全模块也可为如第五方面所描述的安全模块。
第十方面,本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有程序指令,当所述程序指令在计算机上运行时,使得计算机执行上述各方面所述的方法。
第十一方面,本申请实施例还提供了一种包含指令的计算机程序产品。当所述指令在计算机上运行时,使得计算机执行上述各方面所述的方法。
附图说明
图1是本申请实施例提供的一种SSP的协议栈架构示意图;
图2a是本申请实施例提供的一种终端的结构示意图;
图2b是本申请实施例提供的一种终端的结构示意图;
图3a是本申请实施例提供的一种终端应用激活系统的架构示意图;
图3b是本申请实施例提供的一种终端应用激活系统的具体架构示意图;
图4是本申请实施例提供的一种终端应用激活方法的流程示意图;
图5是本申请实施例提供的一种终端应用激活方法的具体流程示意图;
图6是本申请实施例提供的一种安全模块的结构示意图;
图7是本申请实施例提供的一种主芯片的结构示意图;
图8是本申请实施例提供的一种获取单元的结构示意图;
图9是本申请实施例提供的另一种主芯片的结构示意图;
图10是本申请实施例提供的一种终端应用激活系统的架构场景图。
具体实施方式
下面结合本申请实施例中的附图对本申请实施例进行描述。
本申请实施例中,SSP可以为安全模块的运行平台,SSP平台中可以安装多个App,这些App可以是访问运营商网络的profile,也可以是支付类App、驾照等身份标识类App、家庭网络相关App、车联网相关App、移动健康相关App、可穿戴类App、人工智能相关App等等。这些App可以在SSP平台上同时被激活。也就是说,在新型SSP平台上,App与profile可属于同一级别的App,即App和profile可并列运行,相比于profile中的App,只有profile被激活后,其中的App才可以激活,因此App和profile同一级别意味着App和profile可以同时被激活,如可同时激活至少两个profile,也可同时激活至少一个profile和至少一个App,也可同时激活至少两个App等等。
其中,profile可为安全模块内部与某个移动网络运营商(mobile network operator,MNO)相关的一系列文件、数据的统称。可理解,这里所描述的profile仅为一种示例,在其他实现方式中,可能为其他描述,因为,不应理解为该profile的描述对本申请的限定。
如图1所示,图1是本申请实施例提供的一种SSP的协议栈架构示意图,包括物理层、数据链路层、传输层和应用层。其中物理层可以提供SSP与终端的物理接口,例如支持国际标准化组织(international organization for standardization,ISO)7816,序列外部接口(serial peripheral interface,SPI),内部集成电路(inter-integrated circuit,I2C),单线协议(single wire protocol,SWP)等接口协议。数据链路层可支持ISO 7816等协议。传输层可支持应用协议数据单元(application protocol data unit,APDU)、HCP协议等。应用层支持ISO-7816,APDU协议,超文本传输协议(hyper text transfer protocol,HTTP)和受限应用协议(constrained application protocol,CoAP)等等。
图2a和图2b是以终端为例提供的一种实现方式的结构框图,如图所示,终端可包括主芯片210和安全模块220。可理解,该安全模块220可嵌入到该主芯片210中如图2a所示;或者,该安全模块220可以与该主芯片210相互独立如图2b所示。本申请实施 例对于该主芯片和该安全模块的具体形式不作限定。
本申请中的终端可为手机、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)等,本申请实施例对于该终端的具体实现方式不作限定。可理解,本申请实施例中的终端也可称为终端设备等。
图3a是本申请实施例提供的一种终端应用激活系统的架构示意图。如图3a所示,该系统包括主芯片210和安全模块220,该主芯片210可通过至少两个数据通道与安全模块220连接。
如图3a所示,该主芯片可包括处理器211和存储器212。该存储器212可用于存储程序,该处理器211可用于执行存储器存储的程序。以及该主芯片还可包括通信接口213。该主芯片可通过该通信接口213与安全模块进行交互,如进行数据传输,又如进行指令传输等等。可理解,该通信接口213还可与其他设备进行交互等,本申请实施例不作限定。
具体地,该安全模块可包括处理器221和存储器222,该存储器222可用于存储程序,该处理器221可用于执行该存储器存储的程序。以及该安全模块也可包括通信接口223。安全模块通过该通信接口223与主芯片进行交互等等。可理解,本申请实施例对于该通信接口的具体实现方式不作唯一性限定。
具体地,该数据通道也可理解为物理通道,可用于安全模块与主芯片之间传输数据和/或指令,数据通道将分配给独立运行于安全模块中的应用(如待激活的至少两个应用中的应用)专门使用,与其他应用物理隔离,即该应用不与其他应用共享使用一个数据通道。进一步地,主芯片还可在每个数据通道上扩展出至少两个逻辑通道,该扩展的同一个数据通道中的不同逻辑通道可分配给为同一个应用中的子应用使用。也就是说,以图3a所示出的两个数据通道为例,该主芯片可分别在该两个数据通道上扩展至少两个逻辑通道。该逻辑通道,也可用于安全模块与主芯片之间传输数据和/或指令,所不同的是,主芯片可根据数据的类型为不同的数据分配不同的逻辑通道,也可根据指令的类型为不同的指令分配不同的逻辑通道。如以应用为profile为例,在为该profile分配数据通道后,主芯片可扩展出两个逻辑通道,该两个逻辑通道可分别用于传输专用文件、基本文件及该profile中携带的子应用等信息。可理解,以上仅为一种示例,不应理解为对本申请实施例的限定。
其中,该主芯片可为图2a和图2b中的主芯片。该安全模块可以为各种形式的SIM卡、SSP、硬件安全元件(secure element,SE)、系统级芯片(system on chip,SoC)、系统级封装(system in package,SIP)等安装在设备中的硬件模块或软件模块。该安全模块可至少安装一个连接网络并使用网络进行通信的运营商profile,同时该安全模块还可安装与profile并列级别的其他App,例如支付类App、驾照等身份标识类App、家庭网络相关的App、车联网相关的App、移动健康相关App、可穿戴类App、人工智能相关App等等。
可理解,本申请实施例所提供的安全模块可为单独的模块,也可以整合于终端中。
为了更形象地理解本申请实施例所提供的系统,如图3b所示,图3b是本申请实施例提供的一种终端应用激活的系统具体架构示意图。其中主芯片可包括主中央处理器(central processing unit,CPU),媒体处理器(media processor),低功耗微控制器单元(low power micro controller unit,LPMCU),外围设备(peripherals),调制解调器(modem), 控制器(controller),非易失内存(non-volatile memory,NVM),动态随机存取存储器(dynamic random access memory,DRAM)等元件。其中,主CPU或媒体处理器可用于与存储器耦合,从而执行存储器中存储的程序指令等。如主CPU可执行图4所示的步骤402的步骤等等。外围设备可包括输入和输出设备、外存储器、模数转换器、数模转换器和外围处理机等等设备,如该外围设备可包括触摸屏、摄像头、指纹采集、近场通信元件和传感器等等。本申请实施例对于该外围设备所包含的具体设备不作限定。其中,控制器可包括控制器1和控制器2,该控制器1与NVM连接,控制器2与DRAM连接。
安全模块可包括CPU,只读存储器(read-only memory,ROM),随机存储器(random access memory,RAM),内存管理单元MMU(memory management unit),一次性可编程芯片(one time programmable,OTP),真随机数生成器(true random number generator,TRNG),加密引擎(如crypto),传感器(sensors),外围设备,安全模块与主芯片之间的信号输入/输出连接线等等元件。
其中,本申请实施例所示出的ROM和RAM仅为一种示例,在具体实现中,安全模块中还可包括其他类型的存储器,本申请实施例不作限定。其中MMU可用于管理虚拟内存系统。
OTP,也可称为动态口令,可以根据专门的算法每隔60秒生成一个与时间相关的、不可预测的随机数字组合,且每个口令只能使用一次。加密引擎可有效提高安全模块的数据安全性。
具体地,本申请实施例所提供的系统架构中,安全模块可为隔离的安全子系统,通过总线与主芯片等元件通信,总线可通过如专有的邮箱(mailbox)方式通信,或总线也可采用通用总线桥等其他方式与其他元件通信,本申请实施例不作限定。总线可以包括多个物理连接,从而可使得主芯片为安全模块分配给不同数据通道,从而实现多卡多待以及数据并行处理。通过数据通道传输的数据可存储到外部NVM中,也可采用其他方式将数据存储在SoC或安全模块内部等,本申请实施例不作限定。
可理解,以上所示的主芯片和安全模块仅为本申请实施例提供的一个例子,且主芯片和/或安全模块可具有比示出的部件更多或更少的部件,可以组合两个或更多个部件,或者可具有部件的不同配置实现。
可理解,本申请实施例所提供的系统可整合于终端中,从而方便用户使用终端。
图4是本申请实施例提供的一种终端应用激活方法的流程示意图,该终端应用激活方法可包括以下步骤。
401、主芯片获取安全模块的应用信息,该应用信息包括待激活的至少两个应用的信息。
本申请实施例中,应用可为安全模块中的应用,该应用可包括运营商的profile,以及与该profile并列级别的其他应用,如支付类应用,身份标识类应用,人工智能类应用等等。如该安全模块中可能包括N个应用,N大于或等于2。其中,待激活的应用可为M个,该M小于或等于N。可理解,该待激活的至少两个应用具体为多少个,本申请实施例不作限定。
如安全模块中安装了10个应用,而该10个应用不一定都需要与主芯片进行数据通信,如在当前阶段,可能只需要4个应用与主芯片进行数据通信。因此,主芯片通过获取安全模块的应用信息,可激活该4个应用。
其中,主芯片获取到的应用信息包括该待激活的至少两个应用的信息。作为一种可能的实现方式,如主芯片获取到的应用信息中可以包括安全模块中已安装的所有应用的信息,然后该主芯片根据每个应用(安全模块中已安装的应用)的优先级确定上述待激活的至少两个应用。作为另一种可能的实现方式,根据该安全模块中已安装的所有应用的信息,该安全模块根据每个应用(安全模块中已安装的应用)的优先级确定上述待激活的至少两个应用。
作为一种可能的实现方式,本申请实施例提供了两种获取应用信息的具体方法,如下所示:
实现方式一、上述主芯片获取上述安全模块的应用信息,包括:上述安全模块上电时,上述主芯片向上述安全模块发送初始化请求消息;上述安全模块向上述主芯片发送包含上述应用信息的初始化响应消息;上述主芯片接收上述初始化响应消息。其中,上述初始化响应消息中还包括第一指示信息,上述第一指示信息包括用于指示上述安全模块支持同时激活至少两个应用的能力信息和上述安全模块支持的上述数据通道的最大数量信息中的至少一项。
可选地,上述第一指示信息还可包括上述安全模块中已安装的应用的数量信息和上述安全模块能够安装的应用的最大数量信息的至少一项。其中安全模块中已安装的应用的数量信息可用于获取安全模块可能同时激活的应用数量,该安全模块中已安装的应用的数量信息还可用于判断主芯片所支持的最大数据通道数量是否能满足安全模块已安装的应用的数量。其中安全模块能够安装的应用的最大数量信息,可用于主芯片判断安全模块有可能安装并同时激活的应用数量,以便判断主芯片所支持的最大数据通道是否能满足安全模块有可能安装并同时激活的应用数量,达到精确分配数据通道提升使用体验的有益效果。
对于实现方式一,安全模块通过确定待激活的至少两个应用,从而向主芯片发送包含该待激活的至少两个应用的应用信息,使得主芯片不仅可以从安全模块发送的初始化响应消息中直接获取到应用信息,即直接获取到待激活的至少两个应用的信息。而且还能够得知安全模块可支持的数据通道的最大数量,从而使得主芯片明确得知可激活多少个应用。也就是说,主芯片具体能够激活多少个应用,可根据安全模块支持的数据通道的最大数量来确定。
实现方式二、上述主芯片获取上述安全模块的应用信息,包括:上述安全模块上电时,上述主芯片向上述安全模块发送初始化请求消息;上述安全模块向上述主芯片发送初始化响应消息;上述主芯片接收上述初始化响应消息,并根据上述初始化响应消息确定上述应用信息。其中,上述初始化响应消息中包括第一指示信息,上述第一指示信息包括上述安全模块中已安装的应用的信息。
可选地,上述第一指示信息还可包括以下信息中的至少一项:用于指示上述安全模块支持同时激活至少两个应用的能力信息、上述安全模块支持的上述数据通道的最大数量信息和上述安全模块能够安装的应用的最大数量信息。
对于实现方式二,主芯片在接收到安全模块发送的初始化响应消息后,可根据该初始化响应消息自主确定激活哪些应用,从而可使得主芯片根据自己的处理能力来确定激活多少个应用。
具体地,安全模块通过向主芯片指示该安全模块支持同时激活至少两个应用的能力 信息,以及安全模块支持的数据通道的最大数量信息,可使得主芯片确认安全模块是否支持多数据通道,以及能够支持的数据通道的最大数量。
可理解,不管是安全模块来确定待激活的至少两个应用,还是主芯片确定待激活的至少两个应用,其确定方法可根据优先级的高低来确定,具体可根据各个应用的使用频率来确定等等,本申请实施例对于该确定方法不作唯一性限定。
作为一种可能的实现方式,在上述提供的两种获取应用信息的具体方法的基础上,上述主芯片接收上述初始化响应消息之后,上述方法还包括:
上述主芯片向上述安全模块发送第二指示信息,上述第二指示信息包括用于指示上述主芯片支持同时激活至少两个应用的能力信息和上述主芯片支持的上述数据通道的最大数量信息中的至少一项。
本申请实施例中,在主芯片接收到安全模块的第一指示信息之后,该主芯片还可向安全模块发送第二指示信息,从而进一步确定该主芯片是否支持同时激活至少两个应用。可理解,本申请实施例中,由于安全模块需要通过数据通道与主芯片连接,因此安全模块支持的数据通道的最大数量与主芯片支持的数据通道的最大数量相同。
402、上述主芯片激活上述至少两个应用,为上述至少两个应用中的每个应用分配对应的数据通道。
本申请实施例中,主芯片可为至少两个应用中的每个应用都分配一个数据通道。如应用信息中包括的待激活的应用为M个,则该主芯片可为该M个应用分别分配一个数据通道(即M个数据通道)。
其中,主芯片激活应用具体可以为与该应用建立通信通道,读取应用数据,将应用数据发送给对应的处理模块完成应用中的服务,当然,该主芯片激活应用的方法仅为一种示例,不应理解为对本申请实施例的限定。
作为一种可能的实现方式,本申请实施例还提供了两种分配数据通道的场景,如下所示:
场景一、上述为上述至少两个应用中的每个应用分配对应的数据通道,包括:在第一数量小于或等于第二数量的情况下,为上述至少两个应用中的每个应用分配对应的数据通道;其中,上述第一数量为上述至少两个应用的数量,上述第二数量为上述安全模块支持的上述数据通道的最大数量。
可理解,第二数量也为主芯片支持的数据通道的最大数量。该场景下,主芯片可为待激活的至少两个应用中所包含的每个应用都分配一个数据通道。
场景二、上述为上述至少两个应用中的每个应用分配对应的数据通道,包括:在上述第一数量大于上述第二数量的情况下,从上述至少两个应用中确定第一应用,为上述第一应用中的每个应用分配对应的数据通道;其中,上述第一应用的优先级高于参考优先级,且上述第一应用的数量小于或等于上述第二数量。
该场景下,由于主芯片无法为待激活的至少两个应用中的每个应用都分配一个数据通道,因此,主芯片可先确定出优先级高于参考优先级的应用即第一应用,从而为该第一应用中的每个应用分配对应的数据通道。可理解,该第一应用可为一个,也可至少为两个,本申请实施例不作限定。其中,参考优先级可由主芯片自主设置,该参考优先级也可根据主芯片支持的数据通道的最大数量动态更新等等,本申请实施例对于该参考优先级如何设置不作限定。
作为一种可能的实现方式,在以上所描述的实施例的基础上,如以上所描述的获取应用信息的两种实现方式的基础上,又如在以上所描述的分配数据通道的两种场景的基础上,本申请实施例还提供了一种分配数据通道的方法,如下所示:
上述至少两个应用中包括第二应用,上述为上述至少两个应用中的每个应用分配对应的数据通道,包括:在上述数据通道已分配给第三应用的情况下,释放上述第三应用,为上述第二应用分配上述数据通道;其中,上述第二应用的优先级高于上述第三应用的优先级,上述第三应用不属于上述至少两个应用中的应用。
其中,场景一和场景二是在数据通道未分配给其他应用的场景下示出的,而本申请实施例则是在数据通道已分配给其他应用的场景下示出的。其中,如待激活的至少两个应用中包括第二应用,主芯片需要为该第二应用分配数据通道如第一数据通道,在该主芯片分配时,检测到第一数据通道已分配给第三应用,则在第二应用的优先级大于第三应用的优先级的情况下,该主芯片便可以释放第三应用,从而为第二应用分配该第一数据通道。可理解,以上第一数据通道仅为一种示例,不代表先后顺序。
可理解,在第二应用的优先级小于第三应用的优先级的情况下,主芯片可在第三应用没有业务数据时,暂时切换第一数据通道给第二应用使用;而当第三应用有业务数据时,不管第二应用是否在传输业务数据,则临时缓存第二应用的业务数据,切换第一数据通道给第三应用,直至第三应用不再有业务数据传输时,读取缓存的第二应用的业务数据,并切换第一数据通道给第二应用使用。
可理解,以上优先级的比较原则,可根据应用的使用频率来比较,也可根据用户的喜好程度来比较,也可根据用户的使用时长来比较等等,本申请实施例不作限定。
可理解,在主芯片为至少两个应用中的每个应用分配对应的数据通道时,还可携带数据通道的标识,这样可以有效区分数据通道与应用的对应关系,使得数据传输效率更高。
403、上述主芯片分别通过上述至少两个应用对应的数据通道与上述至少两个应用进行数据通信。
本申请实施例中,主芯片可分别通过待激活的至少两个应用对应的数据通道与该至少两个应用进行数据通信。如待激活的至少两个应用中包括第二应用和第四应用,主芯片为该第二应用分配一个数据通道如第二数据通道,以及为该第四应用分配一个数据通道如第三数据通道后,该主芯片便可通过该第二数据通道与该第二应用进行数据通信,以及通过第三数据通道与该第四应用进行数据通信。可理解,第二数据通道和第三数据通道仅为一种示例,不代表先后顺序,以及第二应用和第四应用也仅为一种示例,不代表先后顺序。
作为一种可能的实现方式,在上述第二应用为NAA的情况下,上述数据通道为上述安全模块与调制解调器之间的数据通道;或在上述第二应用为非NAA的情况下,上述数据通道为上述安全模块与中央处理器之间的数据通道。
也就是说,本申请实施例中的数据通道可有两种,一种可为安全模块与modem之间的数据通道,另一种可为安全模块与CPU之间的数据通道。在主芯片为待激活的至少两个应用分配数据通道时,可进一步判断应用如第二应用是否为NAA,若该第二应用为NAA,则为该第二应用分配与modem之间的数据通道;若该第二应用为非NAA,则为该第二应用分配与CPU之间的数据通道。
或者,本申请实施例中的数据通道也可只有一种,即为上述安全模块与调制解调器之间的数据通道,或者为上述安全模块与中央处理器之间的数据通道。
具体地,由于本申请实施例中的数据通道为主芯片与安全模块之间的数据通道,例如支持总线协议的数据通道,因此本申请实施例中的数据通道不仅可传输应用协议数据单元(application protocol data unit,APDU)指令,也可传输抽象语法标记(abstract syntax notation one,ASN.1)指令,还可传输启动应答指令等等。
实施本申请实施例,可有效解决同一个安全模块无法同时激活多个应用或多个profile的问题,不仅使得安全模块实现多卡多待,多应用功能,从根本上解决了硬件成本。而且激活的应用之间通过各自的数据通道与主芯片连接,实现了安全隔离,且关闭一个数据通道,不会影响其他数据通道,以及一个数据通道的拥塞,也不会影响其他数据通道的收发。
可理解,图4所示的终端应用激活方法不仅可应用于主芯片与安全模块初始化过程中,也可应用于如主芯片已激活了一个应用如第五应用(安全模块中的应用);且安全模块中还包括第六应用,该安全模块需要主芯片激活该第六应用,则该主芯片也可通过获取安全模块的应用信息,激活该第六应用,为该第六应用分配数据通道。尽管该场景下,主芯片所获取到的待激活的应用可能为一个,但是由于主芯片最终的状态也是同时激活两个应用(即第五应用和第六应用),因此同样实现了同时激活安全模块中的不同应用的功能。
以下将结合具体的实施例说明本申请所提供的终端应用激活方法,如图5所示,图5是本申请实施例提供的一种终端应用激活方法的具体流程示意图,该方法可应用于终端,该终端包括主芯片和安全模块,该终端应用激活方法至少包括以下步骤。
501、在安全模块上电时,主芯片向该安全模块发送初始化请求消息。
其中,安全模块上电的具体方式可以如主芯片为安全模块提供电源供电,安全模块接收到主芯片的供电电压后,开始工作,执行安全模块初始化流程,例如启动安全模块中的操作系统,读取安全模块能力信息,安装的应用信息等。其中安全模块上电,可以为初始供电,可以为复位重启,热启动,冷启动等情况。
具体地,主芯片在向安全模块发送初始化请求消息时,还可以为该安全模块分配数据线和地址线等资源。
本申请实施例中,主芯片与安全模块之间还可以通过至少一个基础数据通道连接,从而可使得主芯片与安全模块通过该基础数据通道来完成初始化过程,该初始化过程可包括主芯片向安全模块发送的初始化请求消息,以及后续所描述的初始化响应消息等等。或者,该主芯片可与该安全模块通过该基础数据通道完成其他操作,如是否需要为某个具体应用(如待激活的至少两个应用)分配新的数据通道等。可理解,对于该基础数据通道的作用本申请实施例不作唯一性限定。
502、安全模块接收初始化请求消息,向主芯片发送初始化响应消息。
其中,该初始化响应消息中不仅包括应用信息,还可包括第一指示信息。该应用信息包括待激活的至少两个应用的信息,该第一指示信息中包括用于指示安全模块支持同时激活至少两个App的能力信息,并可进一步包括支持的数据通道的最大数量信息。该第一指示信息中还可进一步携带该安全模块中已安装的App数量信息。
具体地,该初始化响应消息可为上电应答响应消息、复位应答(answer to reset,ATR) 命令以及系统总线协议所支持的初始化命令消息等等。可理解,本申请实施例对于该初始化响应消息的具体形式不作限定。
503、主芯片接收初始化响应消息,向安全模块发送第二指示信息。
其中,该第二指示信息可用于指示主芯片和/或主芯片所在设备的能力信息,如包括用于指示主芯片支持同时激活至少两个应用的能力信息,具体地,该用于指示主芯片支持同时激活至少两个应用的能力信息可表示主芯片和/或主芯片所在设备可支持为安全模块中不同的App同时打开多数据通道,其中安全模块中的App为并列的同级别App。
进一步,该第二指示信息中还可包括该主芯片支持的数据通道的最大数量信息。该主芯片支持的数据通道的最大数量信息可表示主芯片和/或主芯片所在设备支持的最多数据通道的数目。其中数据通道的实现举例,主芯片支持16位-128位数据总线宽度,其中主芯片与安全模块之间用地址线为每个App分配所使用的地址,当查找App时,通过地址线找到该App分配的地址,再通过数据线执行App数据读取。数据线可以把CPU数据传送到安全模块中的指定App,也可将安全模块中指定App数据传送到CPU。16位的数据线则依次可以传16位数据,16根地址线则可以选址64K的CPU寻址范围,因此可实现通过地址来区分不同的App,实现App的同时激活,寻址,及与主芯片通信的目的。
504、主芯片根据初始化响应消息中所包含的应用信息,判断应用信息中所包含的待激活的至少两个应用中是否包含有效App,在未包含有效App的情况下,执行步骤505;在包含有效App的情况下,执行步骤506。
其中,在主芯片判断待激活的至少两个应用中是否包含有效App时,如可判断该待激活的至少两个应用中是否有可激活的运营商的profile。通过判断是否有profile,可方便主芯片判断当前是否需要驻留网络。
505、执行无卡紧急呼叫。
506、主芯片可根据获取的待激活的至少两个应用,为该至少两个应用分配对应的数据通道。
其中,本申请实施例提供了三种可能的为至少两个应用分配对应的数据通道的场景,具体可如下所示:
场景一、主芯片可为该待激活的至少两个应用中的每个应用分配对应的数据通道。例如,安全模块中安装了10个App,但只有4个App同时激活,则只为这4个激活的App分配数据通道。
该场景下,主芯片在确定待激活的应用后,可为每一个待激活的应用分配一个数据通道。该场景可最大限度地满足应用的需求,为每个待激活的应用分配数据通道。
场景二、主芯片可根据待激活的至少两个应用的数目,及当前所支持的数据通道的最大数目,动态分配数据通道。例如主芯片当前处理能力有限,或该安全模块当前只能分配2个数据通道,则主芯片可为待激活的2个App分配对应的数据通道,从而通过对应的数据通道传递该2个App的相关参数及指令。
该场景下,主芯片需要根据当前的处理能力,动态地为待激活的应用分配数据通道。场景二,相对于场景一来说,通过动态分配数据通道,可有效匹配主芯片或安全模块的处理能力,提高主芯片或安全模块的处理效率。
场景三、主芯片可根据待激活的至少两个应用的优先级,以及当前所支持的数据通 道的最大数目,动态分配数据通道。如当主芯片待激活的App数目大于支持的数据通道数目时,主芯片根据优先级为优先级高于参考优先级的App优先分配数据通道。
该场景下,主芯片可根据应用的优先级,以及处理能力,动态地为待激活的应用分配数据通道。场景三相对于场景二来说,可有效地根据应用的优先级来动态分配数据通道,避免由于待激活的应用的业务数据非常少,或者用户的应用频率不高而为其分配数据通道,从而提高数据通道的利用率。
具体地,在为至少两个应用分配对应的数据通道时,主芯片还可判断是否是在新的数据通道上分配应用,若是,则执行分配操作;若否,则先根据优先级释放优先级低或暂时不使用的应用(如在数据通道上原有的应用),然后为待激活的应用分配数据通道。
例如,当判断通过为新的App1分配新的数据通道时,则在数据通道1上激活对应的App1;当判断是在已有数据通道2上激活新的App2时,例如释放低优先级或暂时不使用App3的数据通道3,在数据通道2上激活对应的App2。例如可通过refresh命令中的’04‘UICC reset来执行选中的App2在数据通道2上的激活。
507、在至少两个应用对应的数据通道上,在对应的数据通道上扩展逻辑通道(logical channel)。
例如通过select命令或manage channel命令选择该具有profile的App下的主文件(master file,MF)、专用文件(dedicated file,DF)和基本文件(elementary file,EF)打开逻辑通道,如可以在逻辑通道上来传输应用协议数据单元(application protocol data unit,APDU)命令。当激活的App中包含profile时,便可以完成profile的激活及网络附着流程。
本申请实施例提供一种在安全模块中同时激活多个App的方法,通过本申请实施例,可以实现一个安全模块中多个App与主芯片的信息通信,传递参数,传递指令的技术效果。本申请实施例,可以解决实现双卡双待时,需要在终端部署两个SIM卡的情况,通过本申请实施例可以将安全模块中安装的多个SIM卡的profile,以及其他App同时激活,不再需要部署多个安全模块。以及通过总线方式实现一个安全模块中同时激活的profile和App与主芯片之间的信息通信,参数传递,指令传递,不仅降低成本,同时各App之间独立的数据通道,更加安全,传输速度和效率更高,提升用户的安全体验。
以下将具体描述本申请实施例提供的装置。
图6是本申请实施例提供的一种安全模块的结构示意图,该安全模块可应用于上述终端应用激活方法,如图6所示,该安全模块包括:
发送单元601,用于向上述主芯片发送上述安全模块的应用信息;其中,上述应用信息包括待激活的至少两个应用的信息,上述应用信息用于指示为上述至少两个应用分配数据通道;
通信单元602,用于在上述主芯片为上述至少两个应用中的每个应用分配对应的数据通道后,分别通过上述至少两个应用对应的数据通道与上述主芯片进行数据通信。
具体地,图3a所示的安全模块的通信接口可用于执行发送单元601的具体实现方式,还可用于执行步骤502的具体实现方式。可理解,发送单元601可通过图5所描述的基础数据通道向主芯片发送初始化响应消息。
可选地,图3a所示的安全模块的处理器或图3b所示的安全模块中的CPU可用于执行通信单元603中与处理器相对应的实现方式。可选的,图3a所示的通信接口或图3b 所示的外围设备也可用于执行通信单元603中的实现方式。至于该通信单元603对应的硬件元件具体为哪一种元件,可根据该通信单元603具体实现的动作来确定,本申请实施例不作唯一性限定。
在一种可能的实现方式中,图6所示的安全模块还包括:接收单元603,用于在上述安全模块上电时,接收来自主芯片的初始化请求消息;
上述发送单元601,具体用于向上述主芯片发送包含上述应用信息的初始化响应消息;其中,上述初始化响应消息中还包括第一指示信息,上述第一指示信息包括用于指示上述安全模块支持同时激活至少两个应用的能力信息和上述安全模块支持的上述数据通道的最大数量信息中的至少一项。
可理解,接收单元603可通过图5所描述的基础数据通道接收来自主芯片的初始化请求消息。
在一种可能的实现方式中,上述接收单元603,还用于接收来自上述主芯片的第二指示信息,上述第二指示信息包括用于指示上述主芯片支持同时激活至少两个应用的能力信息和上述主芯片支持的上述数据通道的最大数量信息中的至少一项。
图7是本申请实施例提供的一种主芯片的结构示意图,该主芯片可应用于上述终端应用激活方法,如图7所示,该主芯片至少包括:
获取单元701,用于获取安全模块的应用信息,上述应用信息包括待激活的至少两个应用的信息;
激活单元702,用于激活上述至少两个应用;
分配单元703,用于为上述至少两个应用中的每个应用分配对应的数据通道;
通信单元704,用于分别通过上述至少两个应用对应的数据通道与上述至少两个应用进行数据通信。
可理解,图3a所示的主芯片的处理器,以及图3b所示的主芯片的主CPU可用于执行激活单元702、分配单元703的具体实现方式。图3a所示的主芯片的处理器,也可用于执行获取单元701的具体实现方式,或者,图3a所示的主芯片的通信接口,来执行获取单元701的具体实现方式,本申请实施例对于具体的实现不作限定。
在一种可能的实现方式中,如图8所示,上述获取单元701包括:
发送子单元7011,用于在上述安全模块上电时,向上述安全模块发送初始化请求消息;
接收子单元7012,用于接收来自安全模块的包含上述应用信息的初始化响应消息,上述初始化响应消息中还包括第一指示信息,上述第一指示信息包括用于指示上述安全模块支持同时激活至少两个应用的能力信息和上述安全模块支持的上述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,上述发送子单元7011,还用于向上述安全模块发送第二指示信息,上述第二指示信息包括用于指示上述主芯片支持同时激活至少两个应用的能力信息和上述主芯片支持的上述数据通道的最大数量信息中的至少一项。
在一种可能的实现方式中,上述分配单元703,具体用于在第一数量小于或等于第二数量的情况下,为上述至少两个应用中的每个应用分配对应的数据通道,上述第一数量为上述至少两个应用的数量,上述第二数量为上述安全模块支持的上述数据通道的最大数量。
在一种可能的实现方式中,上述分配单元703,具体用于在上述第一数量大于上述第二数量的情况下,上述至少两个应用中确定第一应用,为上述第一应用中的每个应用分配对应的数据通道;其中,上述第一应用的优先级高于参考优先级,且上述第一应用的数量小于或等于上述第二数量。
在一种可能的实现方式中,上述至少两个应用中包括第二应用,上述分配单元703,具体用于在上述数据通道已分配给第三应用的情况下,释放上述第三应用,为上述第二应用分配上述数据通道,上述第二应用的优先级高于上述第三应用的优先级,上述第三应用不属于上述至少两个应用中的应用。
在一种可能的实现方式中,在上述第二应用为网络接入应用NAA的情况下,上述数据通道为上述安全模块与调制解调器之间的数据通道;或在上述第二应用为非NAA的情况下,上述数据通道为上述安全模块与中央处理器之间的数据通道。
在一种可能的实现方式中,上述第一指示信息中还包括上述安全模块中已安装的应用的数量信息和上述安全模块能够安装应用的最大数量信息中的至少一项。
在一种可能的实现方式中,如图9所示,上述主芯片还包括:扩展单元705,用于基于上述数据通道扩展至少两个逻辑通道。
可理解,图3a所示的主芯片的处理器,以及图3b所示的主芯片的主CPU可用于执行扩展单元705的具体实现方式。
其中,对于图6所示的安全模块,以及图7至图9所示的主芯片的具体实现方式,还可参考图4和图5中的具体实现方式,这里不再赘述。
图10是本申请实施例提供的一种终端应用激活系统的架构场景图,如图10所示,以下以安全模块中安装了两个类型为profile的App为例,即在安全模块中,创建两个发行者安全域profile(issuer security domain profile,ISD-P)1和ISD-P2,并将两个运营商的profile分别安装到相对应的ISD-P1和ISD-P2中,其中,每个ISD-P通过不同的应用标识(application identifier,AID)来区分。
例如,当通过mailbox实现时,0-32位总线可对应0-32个数据通道,用于传输硬件信号,mailbox中为不同硬件信号分配不同的数据存储区域,1个mailbox对应1个数据通道,多个mailbox对应相应的多个数据通道,并分配给不同的安全模块中的App使用。例如App 1占用第一数据通道,App 2占用第二数据通道;分配不同的mailbox地址来区分不同数据通道,进一步的主芯片与安全模块还可通过不同mailbox地址区分上下行数据,逻辑地址,物理地址等;以及内存管理单元(memory management unit,MMU)映射地址也可用来进行数据通道的区分。可选的,还可通过中断机制来通知主芯片与安全模块来取mailbox中的数据,例如外部中断(硬件中断)或内部中断(软件中断)。不同的中断源对应中断服务子程序,存放在不同分配的存储区域中,并分配一个中断源标识,以及不同App还可分配不同的中断优先级来实现数据通道的建立。
可选的,还可通过I2C方式实现主芯片与安全模块之间的连接,作为分配给安全模块中不同App的数据通道,来传递不同App的信息和指令。
可选的,还可通过串行外设接口(serial peripheral interface,SPI)方式实现主芯片与安全模块之间的连接,作为分配给安全模块中不同App的数据通道,来传递不同App的信息和指令。可理解,本申请实施例对于以上各方式不作唯一性限定。
基于以上对主芯片和安全模块的描述,本申请实施例提供了一种终端,该终端包括主芯片和安全模块,且该主芯片通过至少两个数据通道与安全模块连接。
其中,上述主芯片,用于获取上述安全模块的应用信息;激活上述至少两个应用,为上述至少两个应用中的每个应用分配对应的数据通道;以及分别通过上述至少两个应用对应的数据通道与上述至少两个应用进行数据通信;其中,上述应用信息包括待激活的至少两个应用的信息。
可选的,上述主芯片,还用于在上述安全模块上电时,向上述安全模块发送初始化请求消息;上述安全模块,用于向上述主芯片发送包含上述应用信息的初始化响应消息;其中,上述初始化响应消息中还包括第一指示信息,上述第一指示信息包括用于指示上述安全模块支持同时激活至少两个应用的能力信息和上述安全模块支持的上述数据通道的最大数量信息中的至少一项;以及上述主芯片,还用于接收上述初始化响应消息。
可选的,上述主芯片,还用于向上述安全模块发送第二指示信息,上述第二指示信息包括用于指示上述主芯片支持同时激活至少两个应用的能力信息和上述主芯片支持的上述数据通道的最大数量信息中的至少一项。
可选的,上述主芯片,具体用于在第一数量小于或等于第二数量的情况下,为上述至少两个应用中的每个应用分配对应的数据通道;其中,上述第一数量为上述至少两个应用的数量,上述第二数量为上述安全模块支持的上述数据通道的最大数量。
可选的,上述主芯片,具体用于在上述第一数量大于上述第二数量的情况下,从上述至少两个应用中确定第一应用,为上述第一应用中的每个应用分配对应的数据通道;其中,上述第一应用的优先级高于参考优先级,且上述第一应用的数量小于或等于上述第二数量。
可选的,上述至少两个应用中包括第二应用,上述主芯片,具体用于在上述数据通道已分配给第三应用的情况下,释放上述第三应用,为上述第二应用分配上述数据通道;其中,上述第二应用的优先级高于上述第三应用的优先级,上述第三应用不属于上述至少两个应用中的应用。
可选的,在上述第二应用为网络接入应用NAA的情况下,上述数据通道为上述安全模块与调制解调器之间的数据通道;或在上述第二应用为非NAA的情况下,上述数据通道为上述安全模块与中央处理器之间的数据通道。
可选的,上述第一指示信息中还包括上述安全模块中已安装的应用的数量和/或上述安全模块能够安装的应用的最大数量。
可选的,上述主芯片,还用于基于上述数据通道扩展至少两个逻辑通道。
可理解,本申请实施例的具体实现方式可参考图4和图5所描述的具体实现方式,这里不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,数字通用光盘(digital versatile disc,DVD))、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:只读存储器(read-only memory,ROM)或随机存储存储器(random access memory,RAM)、磁碟或者光盘等各种可存储程序代码的介质。

Claims (30)

  1. 一种终端应用激活方法,其特征在于,终端包括主芯片和安全模块,所述安全模块通过至少两个数据通道与所述主芯片连接,所述方法包括:
    所述主芯片获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;
    所述主芯片激活所述至少两个应用,为所述至少两个应用中的每个应用分配对应的数据通道;
    所述主芯片分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
  2. 根据权利要求1所述的方法,其特征在于,所述主芯片获取所述安全模块的应用信息,包括:
    所述安全模块上电时,所述主芯片向所述安全模块发送初始化请求消息;
    所述安全模块向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项;
    所述主芯片接收所述初始化响应消息。
  3. 根据权利要求2所述的方法,其特征在于,所述主芯片接收所述初始化响应消息之后,所述方法还包括:
    所述主芯片向所述安全模块发送第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
  4. 根据权利要求2或3所述的方法,其特征在于,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:
    在第一数量小于或等于第二数量的情况下,为所述至少两个应用中的每个应用分配对应的数据通道;其中,所述第一数量为所述至少两个应用的数量,所述第二数量为所述安全模块支持的所述数据通道的最大数量。
  5. 根据权利要求4所述的方法,其特征在于,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:
    在所述第一数量大于所述第二数量的情况下,从所述至少两个应用中确定第一应用,为所述第一应用中的每个应用分配对应的数据通道;其中,所述第一应用的优先级高于参考优先级,且所述第一应用的数量小于或等于所述第二数量。
  6. 根据权利要求1至5任意一项所述的方法,其特征在于,所述至少两个应用中包括第二应用,所述为所述至少两个应用中的每个应用分配对应的数据通道,包括:
    在所述数据通道已分配给第三应用的情况下,释放所述第三应用,为所述第二应用分配所述数据通道;其中,所述第二应用的优先级高于所述第三应用的优先级,所述第三应用不属于所述至少两个应用中的应用。
  7. 根据权利要求6所述的方法,其特征在于,在所述第二应用为网络接入应用NAA的情况下,所述数据通道为所述安全模块与调制解调器之间的数据通道;或
    在所述第二应用为非NAA的情况下,所述数据通道为所述安全模块与中央处理器之 间的数据通道。
  8. 根据权利要求2至7任意一项所述的方法,其特征在于,所述第一指示信息中还包括所述安全模块中已安装的应用的数量信息和所述安全模块能够安装的应用的最大数量信息中的至少一项。
  9. 根据权利要求1至8任意一项所述的方法,其特征在于,所述方法还包括:
    所述主芯片基于所述数据通道扩展至少两个逻辑通道。
  10. 一种终端应用激活方法,其特征在于,所述方法应用于安全模块,所述安全模块通过至少两个数据通道与主芯片连接,所述方法包括:
    向所述主芯片发送所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息,所述应用信息用于指示为所述至少两个应用中的每个应用分配对应的数据通道;
    在所述主芯片为所述至少两个应用中的每个应用分配对应的数据通道后,所述安全模块分别通过所述至少两个应用对应的数据通道与所述主芯片进行数据通信。
  11. 根据权利要求10所述的方法,其特征在于,所述向所述主芯片发送所述安全模块的应用信息之前,所述方法还包括:
    在所述安全模块上电时,所述安全模块接收来自所述主芯片的初始化请求消息;
    所述向所述主芯片发送所述安全模块的应用信息包括:
    所述安全模块向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
  12. 根据权利要求10或11所述的方法,其特征在于,所述安全模块向所述主芯片发送初始化响应消息之后,以及所述安全模块分别通过至少两个应用对应的数据通道与所述主芯片进行数据通信之前,所述方法还包括:
    所述安全模块接收来自所述主芯片的第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
  13. 一种终端应用激活方法,其特征在于,所述方法应用于主芯片,所述主芯片通过至少两个数据通道与安全模块连接,所述方法包括:
    所述主芯片获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;
    所述主芯片激活所述至少两个应用,为所述至少两个应用中的每个应用分配对应的数据通道;
    所述主芯片分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
  14. 根据权利要求13所述的方法,其特征在于,所述主芯片获取所述安全模块的应用信息,包括:
    所述安全模块上电时,所述主芯片向所述安全模块发送初始化请求消息;
    所述主芯片接收来自所述安全模块的包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全 模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
  15. 一种终端应用激活系统,其特征在于,所述系统包括主芯片和安全模块,所述安全模块通过至少两个数据通道与所述主芯片连接;其中,
    所述主芯片,用于获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;
    所述主芯片,还用于激活所述至少两个应用,为所述至少两个应用中的每个应用分配对应的数据通道;
    所述主芯片,还用于分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通信。
  16. 根据权利要求15所述的系统,其特征在于,
    所述主芯片,还用于在所述安全模块上电时,向所述安全模块发送初始化请求消息;
    所述安全模块,用于向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项;
    所述主芯片,还用于接收所述初始化响应消息。
  17. 根据权利要求16所述的系统,其特征在于,
    所述主芯片,还用于向所述安全模块发送第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
  18. 根据权利要求16或17所述的系统,其特征在于,
    所述主芯片,具体用于在第一数量小于或等于第二数量的情况下,为所述至少两个应用中的每个应用分配对应的数据通道;其中,所述第一数量为所述至少两个应用的数量,所述第二数量为所述安全模块支持的所述数据通道的最大数量。
  19. 根据权利要求18所述的系统,其特征在于,
    所述主芯片,具体用于在所述第一数量大于所述第二数量的情况下,从所述至少两个应用中确定第一应用,为所述第一应用中的每个应用分配对应的数据通道;其中,所述第一应用的优先级高于参考优先级,且所述第一应用的数量小于或等于所述第二数量。
  20. 根据权利要求15至19任意一项所述的系统,其特征在于,所述至少两个应用中包括第二应用,
    所述主芯片,具体用于在所述数据通道已分配给第三应用的情况下,释放所述第三应用,为所述第二应用分配所述数据通道;其中,所述第二应用的优先级高于所述第三应用的优先级,所述第三应用不属于所述至少两个应用中的应用。
  21. 根据权利要求20所述的系统,其特征在于,在所述第二应用为网络接入应用NAA的情况下,所述数据通道为所述安全模块与调制解调器之间的数据通道;或
    在所述第二应用为非NAA的情况下,所述数据通道为所述安全模块与中央处理器之间的数据通道。
  22. 根据权利要求16至21任意一项所述的系统,其特征在于,所述第一指示信息中还包括所述安全模块中已安装的应用的数量和/或所述安全模块能够安装的应用的最 大数量。
  23. 根据权利要求15至22任意一项所述的系统,其特征在于,
    所述主芯片,还用于基于所述数据通道扩展至少两个逻辑通道。
  24. 一种安全模块,其特征在于,所述安全模块通过至少两个数据通道与主芯片连接,所述安全模块包括:
    发送单元,用于向所述主芯片发送所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息,所述应用信息用于指示为所述至少两个应用中的每个应用分配对应的数据通道;
    通信单元,用于在所述主芯片为所述至少两个应用中的每个应用分配对应的数据通道后,分别通过所述至少两个应用对应的数据通道与所述主芯片进行数据通道。
  25. 根据权利要求24所述的安全模块,其特征在于,所述安全模块还包括:
    接收单元,用于在所述安全模块上电时,接收来自所述主芯片的初始化请求消息;
    所述发送单元,具体用于向所述主芯片发送包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
  26. 根据权利要求25所述的安全模块,其特征在于,
    所述接收单元,还用于接收来自所述主芯片的第二指示信息,所述第二指示信息包括用于指示所述主芯片支持同时激活至少两个应用的能力信息和所述主芯片支持的所述数据通道的最大数量信息中的至少一项。
  27. 一种主芯片,其特征在于,所述主芯片通过至少两个数据通道与安全模块连接,所述主芯片包括:
    获取单元,用于获取所述安全模块的应用信息;其中,所述应用信息包括待激活的至少两个应用的信息;
    激活单元,用于激活所述至少两个应用;
    分配单元,用于为所述至少两个应用中的每个应用分配对应的数据通道;
    通信单元,用于分别通过所述至少两个应用对应的数据通道与所述至少两个应用进行数据通道。
  28. 根据权利要求27所述的主芯片,其特征在于,所述获取单元包括:
    发送子单元,用于在所述安全模块上电时,向所述安全模块发送初始化请求消息;
    接收子单元,用于接收来自所述安全模块的包含所述应用信息的初始化响应消息;其中,所述初始化响应消息中还包括第一指示信息,所述第一指示信息包括用于指示所述安全模块支持同时激活至少两个应用的能力信息和所述安全模块支持的所述数据通道的最大数量信息中的至少一项。
  29. 一种终端应用激活装置,其特征在于,包括:处理器、存储器和通信接口,所述处理器、所述存储器和所述通信接口通过线路互联,所述存储器中存储有程序指令;所述程序指令被所述处理器执行时,使所述终端应用激活装置执行如权利要求1至14任意一项所述的方法中相应的功能。
  30. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有程序指令,所述程序指令被终端应用激活装置的处理器执行时,使所述处理器执行如权利要求1至14任意一项所述的方法。
PCT/CN2019/084163 2018-04-26 2019-04-25 终端应用激活方法、装置及系统 WO2019206202A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US17/050,297 US20210235245A1 (en) 2018-04-26 2019-04-25 Terminal Application Activation Method, Apparatus, and System
EP19793310.4A EP3780900A4 (en) 2018-04-26 2019-04-25 TERMINAL, DEVICE AND SYSTEM APPLICATION ACTIVATION PROCESS
JP2020559415A JP7241770B2 (ja) 2018-04-26 2019-04-25 端末アプリケーション起動方法、装置、およびシステム
KR1020207033462A KR102478936B1 (ko) 2018-04-26 2019-04-25 단말 애플리케이션 활성화 방법, 장치 및 시스템
KR1020227043823A KR102571100B1 (ko) 2018-04-26 2019-04-25 단말 애플리케이션 활성화 방법, 장치 및 시스템
JP2022196115A JP7540639B2 (ja) 2018-04-26 2022-12-08 端末アプリケーション起動方法、装置、およびシステム

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810391848.X 2018-04-26
CN201810391848.XA CN110430574B (zh) 2018-04-26 2018-04-26 终端应用激活方法、装置、系统及存储介质

Publications (1)

Publication Number Publication Date
WO2019206202A1 true WO2019206202A1 (zh) 2019-10-31

Family

ID=68294400

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/084163 WO2019206202A1 (zh) 2018-04-26 2019-04-25 终端应用激活方法、装置及系统

Country Status (6)

Country Link
US (1) US20210235245A1 (zh)
EP (1) EP3780900A4 (zh)
JP (2) JP7241770B2 (zh)
KR (2) KR102571100B1 (zh)
CN (1) CN110430574B (zh)
WO (1) WO2019206202A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11937080B2 (en) * 2017-07-28 2024-03-19 Huawei Technologies Co., Ltd. Method for updating network access application authentication information, terminal, and server
WO2020167063A1 (en) * 2019-02-14 2020-08-20 Samsung Electronics Co., Ltd. Method and apparatus for downloading bundle to smart secure platform by using activation code
CN112737789A (zh) * 2020-12-23 2021-04-30 上海芯钛信息科技有限公司 基于双路spi并发实现车载通信网关高速密码运算的方法
CN114786169B (zh) * 2022-03-02 2024-07-05 北京握奇数据股份有限公司 一种终端切换Profile的方法、eSIM卡及终端

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883674A (zh) * 2014-02-28 2015-09-02 华为终端有限公司 一种Profile关联管理的方法及装置
CN106987274A (zh) * 2017-05-02 2017-07-28 上海五伦化工科技有限公司 一种脱芳石蜡及其制备方法
WO2017164500A1 (ko) * 2016-03-21 2017-09-28 삼성전자 주식회사 전자 장치 및 전자 장치의 제어 방법
CN108769983A (zh) * 2018-05-16 2018-11-06 北京握奇智能科技有限公司 一种单sim双号双待机的方法和系统
CN108777863A (zh) * 2018-05-16 2018-11-09 北京握奇智能科技有限公司 一种定义第二接口的单sim双号双待机的方法和系统

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE0700002L (sv) * 2007-01-02 2008-07-03 Hi3G Access Ab Mobiltelefon för användning i ett mobiltelefonnät
EP1978772A1 (en) * 2007-04-02 2008-10-08 British Telecommunications Public Limited Company Authentication policy
CN101686531B (zh) * 2008-09-24 2012-08-29 中国移动通信集团公司 多模终端选择网络的方法及多模终端
EP2219346A1 (en) * 2009-02-16 2010-08-18 Gemalto SA Method of managing an application embedded in a telecom device
CN105934970B (zh) * 2014-02-19 2019-08-02 宇龙计算机通信科技(深圳)有限公司 网络数据通道的分配方法和分配装置、终端
US9439062B2 (en) 2014-05-30 2016-09-06 Apple Inc. Electronic subscriber identity module application identifier handling
DE102015209400B4 (de) 2014-05-30 2022-05-12 Apple Inc. Handhabung von Anwendungsidentifikatoren elektronischer Teilnehmeridentitätsmodule
WO2016127435A1 (zh) * 2015-02-15 2016-08-18 华为技术有限公司 一种profile下载和激活方法、集成电路卡及系统
US9760728B2 (en) * 2015-04-22 2017-09-12 Gemalto Sa System and method for managing logical channels for accessing several virtual profiles in a secure element
WO2016201398A1 (en) * 2015-06-11 2016-12-15 Giesecke & Devrient America, Inc. Managing multiple active subscriber identity module profiles
CN105101294A (zh) * 2015-07-10 2015-11-25 努比亚技术有限公司 数据传输装置和方法
FR3046011B1 (fr) * 2015-12-22 2019-05-10 Idemia France Procede de controle d'un module d'identite de souscripteur embarque
US9607449B1 (en) * 2016-01-22 2017-03-28 General Motors Llc Control of wireless communication channels for a vehicle telematics unit

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883674A (zh) * 2014-02-28 2015-09-02 华为终端有限公司 一种Profile关联管理的方法及装置
WO2017164500A1 (ko) * 2016-03-21 2017-09-28 삼성전자 주식회사 전자 장치 및 전자 장치의 제어 방법
CN106987274A (zh) * 2017-05-02 2017-07-28 上海五伦化工科技有限公司 一种脱芳石蜡及其制备方法
CN108769983A (zh) * 2018-05-16 2018-11-06 北京握奇智能科技有限公司 一种单sim双号双待机的方法和系统
CN108777863A (zh) * 2018-05-16 2018-11-09 北京握奇智能科技有限公司 一种定义第二接口的单sim双号双待机的方法和系统

Also Published As

Publication number Publication date
CN110430574B (zh) 2020-12-25
KR102571100B1 (ko) 2023-08-24
JP7241770B2 (ja) 2023-03-17
JP2023051930A (ja) 2023-04-11
EP3780900A1 (en) 2021-02-17
CN110430574A (zh) 2019-11-08
KR20210005653A (ko) 2021-01-14
EP3780900A4 (en) 2021-06-09
KR20230003620A (ko) 2023-01-06
US20210235245A1 (en) 2021-07-29
JP7540639B2 (ja) 2024-08-27
KR102478936B1 (ko) 2022-12-16
JP2021520746A (ja) 2021-08-19

Similar Documents

Publication Publication Date Title
WO2019206202A1 (zh) 终端应用激活方法、装置及系统
US10292027B2 (en) Zero-touch Wi-Fi
US9072035B2 (en) Method and system for task mapping based on corresponding virtual modem identifiers in an operating system for virtual modems within a multi-SIM multi-standby communication device
CN111480350A (zh) 嵌入式sim卡的数据访问的方法和设备
US10361970B2 (en) Automated instantiation of wireless virtual private networks
CN107925978B (zh) 网络、基于云的服务器以及针对服务的注册方法
US10324883B2 (en) Computer system, data-processing apparatus, bus-data transferring method, and computer-readable recording medium for transferring data flowing through system bus
US10387219B2 (en) Enabling multiple secure elements in a card computing device
JP5854138B2 (ja) 情報処理システム,情報処理方法,通信装置
CN114363295B (zh) 一种租户服务器的管理方法及装置
TWI565251B (zh) 用於nfc的電子裝置、系統以及方法
CN109445801A (zh) 一种探测裸机网卡信息的方法和装置
KR102045662B1 (ko) 보안 요소 내의 수 개의 가상 프로파일에 액세스하기 위한 논리 채널을 관리하는 시스템 및 방법
CN109857464B (zh) 用于平台部署与操作移动操作系统的系统及其方法
US11457346B2 (en) Electronic device and method for managing an IC card with multiple SIM profiles
JP2019500664A (ja) セキュアエレメント内のアプリケーションを管理する方法
WO2014146229A1 (zh) Nfc设备通信方法、装置和nfc设备
WO2023273799A1 (zh) 外接设备的通信方法、装置、电子设备和存储介质
US20240323229A1 (en) Method, apparatuses and computer program product to provide wireless configuration
KR20240117496A (ko) 임베디드 범용 집적 회로 카드와 관련된 하나 이상의 정적 리소스를 확장하는 방법
KR101907901B1 (ko) 저전력 무선 네트워크 설정 장치, 방법 및 시스템
CN116647536A (zh) 一种拨号上网的方法、装置、设备及存储介质
CN117295047A (zh) 一种通信方法及装置
CN118860633A (zh) 一种集群的部署方法及计算设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19793310

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020559415

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019793310

Country of ref document: EP

Effective date: 20201109

Ref document number: 20207033462

Country of ref document: KR

Kind code of ref document: A