WO2023169214A1 - 一种安全业务的交易方法及终端 - Google Patents

一种安全业务的交易方法及终端 Download PDF

Info

Publication number
WO2023169214A1
WO2023169214A1 PCT/CN2023/077729 CN2023077729W WO2023169214A1 WO 2023169214 A1 WO2023169214 A1 WO 2023169214A1 CN 2023077729 W CN2023077729 W CN 2023077729W WO 2023169214 A1 WO2023169214 A1 WO 2023169214A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
card
power
module
cards
Prior art date
Application number
PCT/CN2023/077729
Other languages
English (en)
French (fr)
Inventor
李卓斐
张建军
卞仕柱
姚振栋
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202210992941.2A external-priority patent/CN116776332A/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP23765792.9A priority Critical patent/EP4354330A1/en
Publication of WO2023169214A1 publication Critical patent/WO2023169214A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations

Definitions

  • the present application relates to the field of terminals, and in particular, to a transaction method and terminal for security services.
  • terminals such as mobile phones and watches include three-tier application environments, namely Rich Execution Environment (REE), Trusted Execution Environment (TEE) and Secure Element (SE).
  • the terminal deploys corresponding applications in the three-layer application environment according to the security levels of different data in security services (such as bank cards, transportation cards, car keys, etc.).
  • security services such as bank cards, transportation cards, car keys, etc.
  • a security service may have corresponding applications in REE, TEE and SE.
  • This application provides a security service transaction method and terminal, which can switch security services that support transactions after the terminal is shut down, meeting the user's transaction needs in the terminal shutdown scenario.
  • a card switching method is provided, which is applied to a terminal.
  • the terminal includes a first card list, and the first card list includes information about cards that are set to support transactions when the terminal is shut down or when the power of the terminal is less than a preset threshold.
  • the method includes: when the terminal is powered on or when the terminal's power is equal to or greater than a preset threshold, the first card in the terminal is in an inactive state; after the terminal detects a shutdown event or the terminal's power is less than the preset threshold, the terminal determines When the first card is included in the first card list, the first card is switched to the active state. In this way, the first card of the first terminal can perform transactions with the card reading device.
  • the number of first cards is one or more.
  • the first card list includes cards that the user hopes to still perform transactions after the terminal is shut down or after the terminal power is less than a preset threshold.
  • the first card list includes the first card, indicating that the user hopes that the first card can still perform transactions after the terminal is shut down or after the terminal power is less than a preset threshold.
  • the first card list can be set so that after the terminal is shut down, the cards that were in the inactive state before the shutdown are automatically switched to the activated state.
  • the first card can continue to trade after the shutdown, which satisfies the user's needs when the terminal is shut down. subsequent transaction requirements.
  • the terminal further includes a second card; when the terminal is powered on or when the power of the terminal is equal to or greater than a preset threshold, the second card is activated; when the terminal detects a shutdown event or After the power of the terminal is less than the preset threshold, and before the terminal switches the first card to an activated state, the method further includes: the terminal switches the second card to an inactive state, and the first card list does not include the second card.
  • the first card list does not include the second card, indicating that the user hopes that the second card cannot be used for transactions after the terminal is shut down or the terminal power is less than the preset threshold.
  • the second card is a high-security business (such as an access control card for entering a safe area, or electronic documents containing sensitive information, etc.). Then, the terminal can automatically switch the second card to an inactive state before shutting down.
  • the second card is a high-security business (such as an access control card to enter a secure area, or an electronic certificate containing sensitive information, etc.), then transactions can be performed after the phone is shut down, which poses a security risk. Or, if the second card is a card that requires user authentication, then after shutting down, the terminal's REE module and TEE module will not work, user authentication cannot be performed, and the second card will not be available after shutting down. On the other hand, if the contact parameters of the second card conflict with those of the first card that needs to be activated subsequently, subsequent activation of the first card may fail. Therefore, deactivating the second card in the embodiment of the present application is beneficial to ensuring the transaction security of the second card, and is also beneficial to improving the success rate of transactions after the first card is shut down.
  • a high-security business such as an access control card to enter a secure area, or an electronic certificate containing sensitive information, etc.
  • the terminal further includes a second card list, and the second card list includes information about cards that are set to support transactions in a preset mode when the terminal is shut down or when the power of the terminal is less than a preset threshold.
  • the second card list includes the first card; after the terminal detects a shutdown event or the power of the terminal is less than the preset threshold, and before the terminal switches the first card to the active state, the method also includes: the terminal switches the working mode of the first card to Default mode.
  • the terminal may also include some cards with two or more working modes.
  • the terminal can control such cards to be in different working modes when the terminal is turned on and off, so as to meet the different transaction needs of users.
  • the terminal before the terminal automatically switches the first card to the activated state, after the terminal determines that the second card list includes the first card, it will switch the working mode of the first card to the default mode, and then activate the second card.
  • One card It is understandable that before activating the first card, switching the working mode of the first card to the default mode is beneficial to ensuring the transaction security of the first card.
  • the terminal also includes a third card; when the terminal is powered on or when the power of the terminal is equal to or greater than a preset threshold, the third card is activated; the method also includes: when the terminal detects a shutdown event Or after the power of the terminal is less than the preset threshold, the terminal switches the working mode of the third card to the preset mode, and the second card list includes the third card.
  • the third card in the second card list is already activated when the power is turned on or when the terminal's power is greater than or equal to the preset threshold. Then, after a shutdown event is detected or the terminal's power is less than the preset threshold, the card can be directly Just switch the working mode of the third card in the second card list to the default mode.
  • the card set in the second card list is a subset of the card set in the first card list.
  • the first card list and the second card list may be two independent tables, and the first card list includes information about cards that can be traded after the computer is shut down.
  • the second card list includes information about cards that need to be in the preset mode after shutdown. It can be understood that the cards in the first card list include the cards in the second card list.
  • the first card list and the second card list can also be the same list.
  • This list includes all cards that can be traded after shutting down (i.e., the first card list), and marks the cards that need to work in the default mode after shutting down. Cards (i.e. mark cards that belong to the second card list).
  • the embodiment of the present application does not limit the forms of the first card list and the second card list.
  • the method further includes: after the terminal detects a power-on event or the terminal's power is equal to or greater than a preset threshold, the terminal switches the first card to an inactive state. state.
  • each card for example, the first card
  • each card is restored to the state before shutting down, retaining the user's operating habits when turning on the terminal, and avoiding user confusion.
  • the method further includes: the terminal stores a first state of the first card, where the first state is the state of the first card when the terminal is powered on or when the power of the terminal is equal to or greater than a preset threshold; After the terminal detects a power-on event or the terminal's power is equal to or greater than the preset threshold, the terminal switches the first card to an inactive state, including: after the terminal detects a power-on event or the terminal's power is equal to or greater than the preset threshold, the terminal also obtains The second state of the first card, the second state is the state of the first card when the terminal is in the off state or the power of the terminal is less than the preset threshold; when the first state of the first card is the inactive state, and the first card's When the second state is the activated state, the terminal switches the first card to the inactive state. This provides a method for restoring the status of each card after the terminal is powered on again.
  • the method further includes: after the terminal detects a power-on event or the power of the terminal is equal to or greater than a preset threshold, the terminal switches the second card to an activated state. state.
  • the method further includes: after the terminal detects a power-on event or the power of the terminal is equal to or greater than a preset threshold, the terminal switches the first card.
  • the card is not in default mode.
  • the method further includes: after the terminal detects a power-on event or the power of the terminal is equal to or greater than the preset threshold, the terminal switches the third card to the preset mode.
  • the card is not in default mode.
  • the method further includes: the terminal receives the user's first operation, and the terminal performs the operation according to the first operation of the user. One operation determines the first card list.
  • the user's first operation is used to set the first card list.
  • the user can set whether transactions can be performed after the terminal is shut down.
  • various transportation cards for example, various transportation cards, access control cards (or, specifically, access control cards for general areas), keys (for example, car keys), etc.
  • the method further includes: the terminal receives a second operation from the user, and the terminal determines the second card list based on the first card list and the second operation.
  • the terminal can also automatically determine the second card list based on the nature of the card (whether it has multiple working modes), the security of the transaction, etc.
  • the terminal includes a near field communication NFC module; after the terminal detects a shutdown event or the terminal's power is less than a preset threshold, and the terminal switches the first card to the active state, the method further includes: shutting down the terminal or after the terminal power is less than the preset threshold, the terminal receives an instruction from the card reading device to select the first card through the NFC module; in response to the instruction to select the first card, the first card in the terminal performs transaction business with the card reading device.
  • a terminal including: a processor, a memory, a near field communication NFC module and a touch screen, The memory, touch screen, and NFC module are coupled with the processor.
  • the processor includes a secure element SE module.
  • the memory is used to store computer program codes.
  • the computer program codes include computer instructions.
  • a third aspect is to provide a device, which is included in a terminal and has the function of realizing the terminal behavior in any of the above aspects and possible implementation methods.
  • This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
  • the hardware or software includes at least one module or unit corresponding to the above functions. For example, a receiving module or unit, a display module or unit, a processing module or unit, etc.
  • a fourth aspect is to provide a computer-readable storage medium, which includes computer instructions.
  • the terminal is caused to execute the method in the above aspect and any possible implementation manner.
  • a computer program product is provided.
  • the computer program product When the computer program product is run on a computer, it causes the computer to execute the method in the above aspect and any of the possible implementations.
  • a sixth aspect provides a chip system, including a processor.
  • the processor executes instructions, the processor executes the method in the above aspect and any of the possible implementations.
  • Figure 1 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • Figure 2 is a schematic structural diagram of another terminal provided by an embodiment of the present application.
  • Figure 3 is a schematic flowchart of a method for setting a post-shutdown transaction card provided by an embodiment of the present application
  • Figure 4 is a schematic diagram of user interfaces of some terminals provided by embodiments of the present application.
  • Figure 5 is a schematic flowchart of a method for processing security services before the terminal is shut down provided by an embodiment of the present application
  • Figure 6 is a schematic flowchart of a method for processing security services when a terminal is powered on according to an embodiment of the present application
  • Figure 7 is a schematic flow chart of another security service processing method before the terminal is shut down provided by an embodiment of the present application.
  • Figure 8 is a schematic flow chart of another method for processing security services when the terminal is powered on according to an embodiment of the present application
  • FIG. 9 is a schematic structural diagram of a chip system provided by an embodiment of the present application.
  • first and second are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Therefore, features defined as “first” and “second” may explicitly or implicitly include one or more of these features. In the description of the embodiments of this application, unless otherwise specified, "plurality” means two or more.
  • the security service transaction method provided by the embodiment of the present application is applicable to terminals including SE modules.
  • the terminal 100 in the embodiment of the present application can be, for example, a mobile phone, a tablet computer, a personal computer (PC), a personal digital assistant (PDA), a netbook, or a wearable terminal (such as a smart watch, smart phone, etc.) bracelets, etc.), augmented reality technology (augmented reality, AR) equipment, virtual reality (VR) equipment, vehicle-mounted equipment, smart screens, smart cars, smart speakers, etc.
  • augmented reality technology augmented reality, AR
  • VR virtual reality
  • This application does not specify the specific form of the terminal 100 Special restrictions.
  • Figure 1 shows a schematic structural diagram of a terminal 100.
  • the terminal 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen 194, and user Identification module (subscriber identification module, SIM) card interface 195, etc.
  • a processor 110 an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen
  • the sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
  • the structure illustrated in the embodiment of the present invention does not constitute a specific limitation on the terminal 100.
  • the terminal 100 may include more or fewer components than shown in the figures, or some components may be combined, or some components may be separated, or may be arranged differently.
  • the components illustrated may be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units.
  • the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc.
  • application processor application processor, AP
  • modem processor graphics processing unit
  • GPU graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • controller video codec
  • digital signal processor digital signal processor
  • DSP digital signal processor
  • baseband processor baseband processor
  • neural network processor neural-network processing unit
  • the controller can generate operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
  • the processor 110 may also be provided with a memory for storing instructions and data.
  • the memory in processor 110 is cache memory. This memory may store instructions or data that have been recently used or recycled by processor 110 . If the processor 110 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
  • the charging management module 140 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the charging management module 140 may receive charging input from the wired charger through the USB interface 130 .
  • the charging management module 140 may receive wireless charging input through the wireless charging coil of the terminal 100 .
  • the charging management module 140 is the battery 142 While charging, the terminal can also be powered through the power management module 141 .
  • the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the internal memory 121, the display screen 194, the camera 193, the wireless communication module 160, and the like.
  • the power management module 141 can also be used to detect battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
  • the power management module 141 may also be provided in the processor 110 .
  • the power management module 141 and the charging management module 140 may also be provided in the same device.
  • the wireless communication function of the terminal 100 can be implemented through the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in terminal 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • Antenna 1 can be reused as a diversity antenna for a wireless LAN. In other embodiments, antennas may be used in conjunction with tuning switches.
  • the mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G applied to the terminal 100.
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc.
  • the mobile communication module 150 can receive electromagnetic waves through the antenna 1, perform filtering, amplification and other processing on the received electromagnetic waves, and transmit them to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modem processor and convert it into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the mobile communication module 150 may be disposed in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
  • a modem processor may include a modulator and a demodulator.
  • the modulator is used to modulate the low-frequency baseband signal to be sent into a medium-high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
  • the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the application processor outputs sound signals through audio devices (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194.
  • the modem processor may be a stand-alone device.
  • the modem processor may be independent of the processor 110 and may be provided in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide applications on the terminal 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (bluetooth, BT), and global navigation satellite system. (global navigation satellite system, GNSS), frequency modulation (FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • WLAN wireless local area networks
  • BT Bluetooth
  • GNSS global navigation satellite system
  • FM frequency modulation
  • NFC near field communication technology
  • infrared technology infrared, IR
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation
  • the antenna 1 of the terminal 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the terminal 100 can communicate with the network and other devices through wireless communication technology.
  • Wireless communication technologies may include global system for mobile communications, GSM), general packet radio service (GPRS), code division multiple access (CDMA), wideband code division multiple access (WCDMA), time division multiple access address (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR technology, etc.
  • GNSS can include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi-zenith) satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the terminal 100 implements the display function through the GPU, the display screen 194, and the application processor.
  • the GPU is an image processing microprocessor and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
  • the terminal 100 can implement the shooting function through the ISP, camera 193, video codec, GPU, display screen 194, application processor, etc.
  • the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the terminal 100.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to implement the data storage function. Such as storing music, videos, etc. files in external memory card.
  • Internal memory 121 may be used to store computer executable program code, which includes instructions.
  • the internal memory 121 may include a program storage area and a data storage area.
  • the stored program area can store an operating system, at least one application program required for a function (such as a sound playback function, an image playback function, etc.).
  • the storage data area may store data created during use of the terminal 100 (such as audio data, phone book, etc.).
  • the internal memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one disk storage device, flash memory device, universal flash storage (UFS), etc.
  • the processor 110 executes various functional applications and data processing of the terminal 100 by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
  • the terminal 100 can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • Figure 2 is a software structure of a terminal 100 provided by an embodiment of the present application.
  • the terminal 100 includes three application environments: a Rich Execution Environment (REE) module, a Trusted Execution Environment (TEE) module and a Secure Element (SE) module.
  • REE Rich Execution Environment
  • TEE Trusted Execution Environment
  • SE Secure Element
  • the REE module and the TEE module are integrated on one chip, such as an application processor (Application Processor, AP) chip
  • the SE module is integrated on another chip, such as an SE chip.
  • the REE module includes a general operating system (not shown in the figure) running on a general-purpose embedded processor, such as Rich OS or a kernel-based operating system (such as Android system, Hongmeng system, etc.), and the REE module. Application/Service.
  • a general-purpose embedded processor such as Rich OS or a kernel-based operating system (such as Android system, Hongmeng system, etc.)
  • a kernel-based operating system such as Android system, Hongmeng system, etc.
  • REE modules may include application layers and system framework layers.
  • the application layer includes a series of applications (Application, APP), such as business APP (such as wallet APP), which supports adding bank cards, transportation cards, electronic documents, change, membership cards, invoices, as well as community access cards, smart phones, etc. household lock Key cards, smart hotel room cards, etc. can meet security services such as transportation and mobile payment through the terminal.
  • APP Application, APP
  • business APP such as wallet APP
  • the business APP can also receive information on secure businesses (i.e. cards) set by the user that can be transacted after shutdown.
  • the business APP can also receive user-set security business information that requires switching the working mode after shutdown.
  • the system framework layer provides application programming interface (API) and programming framework for APPs in the application layer.
  • the system framework layer includes some predefined functions.
  • the system framework layer includes trigger event detection modules, business management services, etc.
  • the trigger event detection module detects trigger events of the terminal 100, including a first trigger event and a second trigger event.
  • the first triggering event is used to trigger the terminal to start switching the status of the card in the terminal (such as switching the activated state to the inactive state, or switching the inactive state to the activated state).
  • the first triggering event includes a shutdown event and/or an event that the terminal power is less than a preset threshold.
  • the second trigger event is used to trigger the terminal to restore the state of each card in the terminal before the first trigger event is detected (such as the activated state or the inactivated state).
  • the second triggering event includes a power-on event and/or an event that the terminal power is equal to or greater than a preset threshold.
  • the trigger event detection module includes a power-on and power-off service, which is used to detect power-on and power-off events of the terminal 100 and notify the business management service of the detected power-on and power-off events of the terminal 100 .
  • the trigger event detection module may also include a power detection service for detecting the terminal power status of the terminal 100 . When an event is detected that the terminal power of the terminal 100 is less than the preset threshold, or an event that the terminal power is equal to or greater than the preset threshold is detected, the business management service is notified for forwarding the trigger event to the TEE module.
  • the TEE module is an independent operating environment running outside the REE module. It provides security services to the REE module and is isolated from the REE module.
  • the REE module (including the general operating system and its applications) cannot directly access the hardware and software resources of the TEE module.
  • the TEE module provides a trustworthy operating environment for applications in the TEE module, and ensures end-to-end security through confidentiality, integrity protection and data access control.
  • the TEE module runs in parallel with the REE module and interacts with the REE module through a secure Application Programming Interface (API).
  • API Application Programming Interface
  • the TEE module provides a higher security level operating environment than the REE module, but it cannot provide a secure key storage and key operating environment at the hardware isolation level.
  • the application in the TEE module is also called a trusted application (TEE application, TA).
  • the TEE module includes a business management TA, which is used to notify the SE module to activate shutdown or when the terminal power is less than a preset threshold after receiving the first trigger event forwarded by the business management service (such as a shutdown event or an event in which the terminal power is less than a preset threshold).
  • Security services that are tradable after a preset threshold are deactivated (deactivated) are security services that are not tradable after the terminal is shut down or when the terminal power is less than the preset threshold.
  • the business management TA can also notify the SE module to switch the working mode of some security services after receiving the first trigger event forwarded by the business management service.
  • the business management TA is used to notify the SE module to restore the status of each card to the The state and/or operating mode prior to the detection of the first trigger event.
  • the SE module is used to build a trusted and secure key storage and key computing environment. This is because the software system in the SE module is simple and there are relatively few hardware components, so it is easy to establish physical protection and implement security guarantees, thereby improving the security strength of the SE module and thus serving security systems with higher security requirements.
  • the SE module includes a card operating system (Chip Operating System, COS) module (not shown in the figure), a contactless registration service (Contactless Registry service, CRS) module and applications in the SE module (such as card 1 in Figure 2 , card 2, etc.).
  • COS Chip Operating System
  • CRS Contactless Registry service
  • COS is the operating system of the SE chip, which is used to process the received application Protocol Data Unit (Application Protocol Data Unit, APDU) instructions are preprocessed and distributed to corresponding services or applications in the SE for processing.
  • CRS is a system application in the SE module and is responsible for registration and management of applications in the SE module, activating or deactivating (i.e., deactivating) applications in the SE module.
  • Applications in the SE module can also be called Applets or cards. For example, they can be one or more of bank cards, transportation cards, access cards, work cards, electronic documents, car keys, and typical supports (such as AlipayTM , WeChat PayTM ). item.
  • the terminal 100 also includes an NFC module for supporting the terminal 100 to communicate with other NFC devices (such as the card reading device 200).
  • the NFC module includes a contactless front-end (CLF), which is the controller of the NFC module. It can receive APDU instructions from the card reading device 200 and send the received APDU instructions to the COS of the SE chip so that the COS will receive the The received APDU instructions are distributed to the applications in the corresponding SE modules for business transactions.
  • the NFC module can be integrated on another chip independent of the AP chip and SE chip, also called an NFC chip.
  • the terminal 100 when the terminal 100 is turned off, the remaining power of the terminal 100 can power the NFC module and SE module of the terminal 100, that is, the NFC module and SE module of the terminal 100 can still work. Then, after the terminal 100 is shut down, if the card 1 in the SE module is activated, the card 1 can still conduct transactions with the card reading device 200.
  • the shutdown service in the trigger event detection module is specifically used to detect shutdown events and startup events.
  • the terminal can determine the security services (also called cards) that the terminal can conduct transactions after shutting down according to the user's settings or the terminal's default settings, that is, determine the following first card list.
  • the security services also called cards
  • FIG. 3 it is a flowchart of a method for setting up security services that can be used for transactions after the terminal is shut down, as exemplarily provided by the embodiment of the present application. The method includes:
  • the business APP of the REE module receives user settings.
  • the business APP in the REE module can provide a setting interface for the user to set the security business (also called a card) that he hopes to be able to conduct transactions after the terminal 100 is shut down.
  • the security business also called a card
  • the business APP determines a first card list according to user settings.
  • the first card list includes information about cards that support transactions after the terminal 100 is shut down.
  • the business APP can determine the cards that the system allows for transactions after shutdown from the cards that have been added to the terminal based on factors such as the security of card transactions. Generally, for cards in terminals that have lower security requirements and do not require user authentication, the user can set whether transactions can be performed after the terminal is shut down. For example, various types of transportation cards, access control cards (or, specifically, access control cards for general areas), keys (for example, car keys), etc. Then, the business APP provides a user setting interface, which only includes cards that the system allows to be traded after the terminal is shut down, so that the user can set the cards that the user hopes to be able to trade after the terminal is shut down, that is, the first card list is obtained.
  • the user can set all the cards that have been added to the terminal, set the cards that the user hopes to be able to trade after the terminal is shut down, and obtain the card list a.
  • the business APP determines the cards that the system allows to be traded after shutdown, and obtains the card list b. Then, the business APP determines the intersection of the two card lists as the first card list based on card list a and card list b, that is, the user settings are obtained. Set the information of the card that you want to perform transactions after the terminal is shut down.
  • the terminal can also automatically detect whether the card set by the user is on the card list b, that is, whether it is a card that the system allows for transactions after shutting down.
  • the card set by the user is not on the card list b, the user can be prompted to prevent the user from setting the card to be turned off before conducting transactions.
  • the embodiments of this application do not limit the specific implementation of how the business APP determines the first card list.
  • the interface shown in (1) in Figure 4 is the setting interface of the wallet APP.
  • the setting interface includes a "card setting after shutdown” item 401.
  • the terminal In response to detecting that the user operates the "card settings after shutdown” item 401, the terminal displays the detailed settings interface for the card after shutdown as shown in (2) in Figure 4 .
  • the first card list includes transportation cards and car keys.
  • the business APP sends the first card list to the business management TA of the TEE module, and the business management TA stores the first card list.
  • the business APP in the REE module can directly send the first card list to the business management TA in the TEE module, or can send the first card list to the business management TA in the TEE module through the business management service in the REE module.
  • the embodiments of the present application do not limit this.
  • the business management TA returns a response of successful reception of the first card list to the business APP. This step is optional.
  • the business APP can also directly send the card information set by the user to be able to be traded when the terminal is shut down to the business management TA, and the business management TA determines the first card list.
  • the business APP can also directly send the card information set by the user to be able to be traded when the terminal is shut down to the business management service in the REE module, and the business management service determines the first card list. Then, the business management service sends the first card list to the business management TA.
  • how the business management TA in the TEE module or the business management service in the REE module determines the first card list can refer to the method of determining the first card list by the above-mentioned business APP, which will not be described again here.
  • the business APP subscribes to the power on and off event of the terminal to the power on and off service in the REE module. This step is optional.
  • the business management service in the REE module or the business management TA in the TEE module can subscribe to the power on and off events of the terminal from the power on and off service in the REE module.
  • the shutdown events subscribed here include startup events and shutdown events.
  • the subscribed shutdown events include events when the terminal is preparing to shut down, but the terminal is not shut down at this time.
  • the subscribed shutdown events include events in which the user manually shuts down and events in which the terminal automatically shuts down due to low battery or other reasons.
  • the subscribed shutdown events may only include events in which the terminal automatically shuts down due to insufficient power or other reasons, excluding events in which the user manually shuts down the terminal. It should be noted that when the subscribed shutdown events are different, the technical effects achieved by the technical solution of this application are different, which will be explained in detail later and will not be explained here.
  • the power on/off service returns a successful subscription response to the business APP. This step is optional.
  • the business management service in the REE module or the business management TA in the TEE module subscribes to the power on and off event of the terminal from the power on and off service in the REE module, then the corresponding subscriber of the power on and off service (business management The service or business management TA) returns a response of successful subscription.
  • the terminal may also be configured by default to enable transactions after the terminal is shut down. card, or subscribe to the terminal's power on and off events by default. Or, after detecting the power on and off event, the power on and off service automatically broadcasts the power on and off event, and then the business APP can receive the broadcast power on and off event. In other words, the terminal may not perform the above steps S301 to S304.
  • the terminal determines and stores the first card list based on user settings and/or information on each card that has been added to the terminal, and also subscribes to the terminal's power on and off events.
  • the terminal after the terminal determines the first card list and detects a shutdown event of the terminal, the terminal automatically switches the status of each card (including activated status and inactive status) according to the first card list before shutting down. status), so that the cards in the first card list can be traded after the terminal is shut down.
  • FIG. 5 it is a schematic flow chart of a terminal security service transaction method provided by an embodiment of the present application.
  • the method includes:
  • the shutdown service in the REE module sends a shutdown event to the business management service of the REE module.
  • the shutdown service in the REE module When the shutdown service in the REE module detects the shutdown event, it sends the shutdown event to the business management TA in the TEE through the business management service in the REE module.
  • the business management service forwards the shutdown event to the business management TA of the TEE module.
  • Steps S501a to S501b are explained by taking the business management service of the REE module to subscribe to the terminal power-on event from the power-on service as an example.
  • the business management TA of the TEE module can also directly subscribe to the terminal shutdown event from the shutdown service of the REE module. Then, after detecting the shutdown event, the shutdown service of the REE module directly reports to the TEE module. The business management TA of the module sends a shutdown event.
  • the business APP of the REE module subscribes to the terminal shutdown event from the business APP of the REE module. Then, after detecting the shutdown event, the business APP of the REE module sends a shutdown event to the business APP of the REE module. Then, the business APP of the REE module directly forwards the shutdown event to the business management TA of the TEE module, or forwards the shutdown event to the business management TA via the business management service of the REE module.
  • the shutdown event includes a shutdown event after receiving a user shutdown instruction (that is, a user manual shutdown event) and an event that receives an automatic shutdown due to insufficient battery or other reasons (that is, a terminal automatic shutdown event).
  • a user shutdown instruction that is, a user manual shutdown event
  • an event that receives an automatic shutdown due to insufficient battery or other reasons that is, a terminal automatic shutdown event.
  • the transaction scenario of the terminal is the same and the user experience is the same.
  • the shutdown event only includes automatic shutdown events due to insufficient battery or other reasons, and does not include shutdown events after receiving a user shutdown instruction (that is, an event in which the user manually shuts down the device). In other words, when the terminal is shut down for different reasons, the transaction scenarios of the terminal may be different.
  • the terminal automatically shuts down due to insufficient power, and the terminal executes the method provided by the embodiment of the present application, then the cards in the first card list can be used for transactions after the terminal is shut down. In this example, it can be prevented that other users who illegally obtain the terminal can perform some card transactions by actively shutting down the terminal, further improving the security of terminal transactions.
  • the business management TA After receiving the shutdown event, the business management TA queries the CRS of the SE module for the status of each card in the SE module. Among them, the status of the card includes activated status and inactivated status.
  • the CRS returns the status of each card in the SE module to the business management TA.
  • the business management TA stores the status of each card at this time, that is, the status of each card before shutdown.
  • the business management TA of the TEE module can also obtain and store other relevant information, such as default card information, from the CRS or COS.
  • the default card refers to the card activated by default in the SE module.
  • the default card can be a specific card in the SE module (such as transportation card, access control card, etc.), or it can be a smart flash card.
  • smart flash cards can automatically identify scenes based on geographical location, card reading equipment and other conditions, and automatically activate the corresponding card.
  • the business management TA stores the status of each card in the SE module and other related information at this time, which can be used to restore the status of each card in the SE module to the status of each card before the shutdown when the terminal is turned on again.
  • S504. Determine whether the first card exists according to the first card list. If it is determined that the first card exists, the first card is the card currently activated in the SE module, and the first card is not in the first card list, then the business management TA Send the deactivated first card to the CRS.
  • deactivating the first card means canceling the activation status of the first card, making the first card in an inactivated status, and then the first card cannot be traded.
  • the number of first cards is one or more.
  • the business management TA can send deactivation instructions to each first card one by one, that is, the business management TA sends multiple deactivation instructions to the CRS.
  • the business management TA can also send a deactivation instruction for all first cards, and the CRS deactivates each first card one by one according to the deactivation instruction.
  • the embodiments of this application do not limit the specific deactivation process.
  • the business management TA of the TEE module determines the first card based on the status of each card in the SE module and the pre-stored first card list. It can be understood that if the first card is not in the first card list, the first card is a card that the user does not want to be able to trade after the terminal is shut down, but the first card is in an activated state at this time. If the first card is not activated and the first card is still activated after the terminal is shut down, the first card can still perform transactions. On the one hand, if the first card is a high-security business (such as an access control card to enter a secure area, or an electronic certificate containing sensitive information, etc.), then transactions can be performed after the phone is shut down, which poses a security risk.
  • a high-security business such as an access control card to enter a secure area, or an electronic certificate containing sensitive information, etc.
  • the terminal's REE module and TEE module will not work, user authentication cannot be performed, and the first card will not be available after shutting down.
  • the subsequent activation of the second card may fail. Therefore, deactivating the first card in the embodiment of the present application is beneficial to ensuring the transaction security of the first card, and is also beneficial to improving the success rate of transactions after the second card is shut down.
  • the card is a card that the user wants to be able to trade after shutting down. Then, the business management TA does not need to change the status of the card. After the terminal is shut down, the card is active and ready for transactions.
  • step S506 is directly performed.
  • the CRS After deactivating the first card, the CRS returns a response indicating that the first card has been successfully deactivated to the business management TA.
  • S506. Determine whether the second card exists according to the first card list. If it is determined that the second card exists, the second card is a card currently in an inactive state in the SE module, and the first card is in the first card list, the business management TA sends the activated second card to CRS.
  • the business management TA of the TEE module determines the second card based on the status of each card in the SE module and the pre-stored first card list.
  • the number of second cards is one or more.
  • the business management TA can send activation instructions for each second card one by one, that is, the business management TA sends multiple activation instructions to the CRS.
  • the business management TA can also send an activation instruction for all second cards, and the CRS activates each second card one by one according to the activation instruction.
  • the embodiment of the present application does not limit the specific activation process.
  • the CRS returns a response indicating successful activation of the second card to the business management TA.
  • the business management TA returns a response to the shutdown event to the business management service.
  • the business management service returns a response to the shutdown event to the shutdown service.
  • Steps S508a and S508b may be executed before or after step S502, or steps S508a and S508b may not be executed.
  • the cards in the first card list (including the cards that were activated before receiving the shutdown event, and the second cards that were activated after receiving the shutdown event) are in the activated state, then the first card list The cards in are active after the terminal is shut down. It can be understood that when the terminal is turned off, the remaining power of the terminal can power the NFC module and SE module of the terminal, that is, the NFC module and SE module of the terminal can still work. Then, when the terminal is shut down, the NFC module of the terminal can still receive the transaction instructions from the card reading device (such as the instruction to select the first card). After that, the cards in the first card list in the SE module of the terminal can communicate with the card reading device. trade.
  • any card cannot be traded after the terminal is shut down, or only the default card can be traded after the terminal is shut down.
  • the embodiment of the present application enables multiple cards to be traded after the terminal is shut down, meeting the transaction needs of the shutdown scenario. .
  • the embodiment of the present application improves the security of transactions of cards in the first card list after the terminal is shut down.
  • FIG. 6 it is a schematic flow chart of a method for restoring the status of each card before the terminal is turned off after it is turned on again according to the embodiment of the present application.
  • the method includes:
  • the power-on service in the REE module sends a power-on event to the business management service of the REE module.
  • the business management service forwards the power-on event to the business management TA of the TEE module.
  • Steps S601a to S601b are explained by taking the business management service of the REE module to subscribe to the terminal power-on event from the power-on service as an example.
  • the business management TA of the TEE module can also directly subscribe to the terminal power-on event from the power-on service of the REE module. Then, after detecting the power-on event, the power-on service of the REE module directly reports to the TEE module.
  • the business management TA of the module sends a power-on event.
  • the business APP of the REE module subscribes to the terminal power-on event from the business APP of the REE module.
  • the business APP of the REE module sends the power-on event to the business APP of the REE module. Then, the business APP of the REE module directly forwards the power-on event to the business management TA of the TEE module, or forwards the power-on event to the business management TA via the business management service of the REE module.
  • the business management TA obtains the status of each card in the SE module before shutting down. Among them, the status of the card includes activated status and inactivated status.
  • step S503 the business management TA of the TEE module has stored the status of each card in the SE module before shutdown.
  • the business management TA After receiving the power-on event, the business management TA queries the CRS of the SE module for the status of each card in the SE module.
  • step S603 may be executed simultaneously with step S602, or may be executed after or before step S602. This application does not limit the execution order of step S603 and step S602.
  • the CRS returns the status of each card in the SE module to the business management TA.
  • the terminal may determine the status of each card when the terminal is powered off based on the first card list. For example, cards in the first card list are in an activated state when the computer is shut down, and cards that are not in the first card list are in an inactive state when the computer is shut down. In other words, the terminal may not execute step S603 and step S604.
  • the business management TA sends a message to the CRS to deactivate the third card.
  • the third card at this time is the same as the second card in step S506.
  • the CRS returns a response of successful deactivation of the third card to the service management TA.
  • the business management TA sends a message to the CRS to activate the fourth card.
  • the CRS returns a response indicating successful activation of the fourth card to the business management TA.
  • the business management TA returns a response to the power-on event to the business management service.
  • the business management TA after receiving a response from the CRS that the fourth card is successfully activated, the business management TA also clears the status and related information of each card during shutdown stored by the business management TA.
  • the business management service returns a response to the power-on event to the power-on service.
  • Steps S609a and S609b may be executed before or after step S602, or steps S609a and S609b may not be executed.
  • each card in the SE module returns to the state before shutting down, retaining the user's operating habits when turning on the terminal, and avoiding user confusion.
  • Transportation cards, bank cards, car keys, door keys, access cards and payment cards have been added to the terminal.
  • the card currently activated in the terminal is a transportation card.
  • the user sets the cards that can be traded after shutdown as transportation cards and car keys in the interface shown in (2) in Figure 4, that is, the first card list includes transportation cards and car keys.
  • bank cards and payment cards are cards that cannot be traded after the terminal system is shut down by default. If the user sets the bank card or payment card to be a card that can be traded by the terminal after the terminal is shut down, the terminal will issue a prompt to prohibit the bank card or electronic support from being set as a card that can be traded after the terminal is shut down.
  • the terminal When it is detected that the terminal is manually shut down by the user or the terminal is automatically shut down due to insufficient battery or other reasons, the terminal records the card status before shutdown as: the car key is activated and other cards are inactive. If the terminal queries that the currently activated card-the car key is not in the first card list, the activation state of the car key is cancelled. Further, the terminal queries that all the transportation cards in the first card list are in an inactivated state, and then the terminal activates the transportation cards. When the terminal is shut down, the transportation card and car key in the terminal are still activated, and the other cards are inactive. Then, transportation cards and car keys in the terminal can be traded, but other cards cannot be traded.
  • the terminal When the terminal is turned on again, the terminal returns to its original state based on the status of each card stored before the shutdown, that is, the car key is in the activated state and other cards are in the inactive state.
  • Scenario 1 When it is detected that the user manually shuts down the terminal, existing technology can be used for terminal processing, and the technical effect is the same as the existing technology. That is, after the terminal is shut down, only car keys can be traded, and other cards cannot be traded. Alternatively, all cards in the terminal may be untradeable.
  • Scenario 2 When it is detected that the terminal automatically shuts down due to insufficient battery or other reasons, the terminal's processing is the same as technical solution 1, and the technical effect is also the same. That is, when the terminal is turned off, the transportation card and car key in the terminal are still activated, and the other cards are inactive. Then, transportation cards and car keys in the terminal can be traded, but other cards cannot be traded.
  • the terminal When the terminal is turned on again, the terminal returns to its original state based on the status of each card stored before the shutdown, that is, the car key is in the activated state and other cards are in the inactive state.
  • technical solution 2 can prevent other users who illegally obtain the terminal from actively shutting down the terminal to conduct some card transactions after the terminal is shut down, further improving the security of terminal transactions.
  • the SE module may also include some cards with two or more working modes.
  • the terminal can control such cards to be in different working modes when the terminal is turned on and off, so as to meet the different transaction needs of users.
  • a payment card can work in Mode 2 when the terminal is turned on. In Mode 2, the card can conduct large-value transactions under user authentication to ensure transaction security. User authentication methods include face data authentication and fingerprint characteristics. Authentication or password authentication, etc. Payment cards can also work in Mode 1 when the terminal is shut down. In Mode 1, the card can perform small-amount transactions without user authentication. In Mode 1, password-free payments can be made without user authentication, meeting the payment needs of users after the terminal is shut down. .
  • the access control card can work in mode b when the terminal is turned on. In mode b, the access control card can enter the safe area and the general area. The access control card can work in mode a when the terminal is turned off. In mode a, the access control card can only enter the general area.
  • the foyer or lounge can be set as a general area, and the workstation area and conference room can be set as a safe area.
  • the access control card in the mobile phone works in mode b, and the access control card is in an inactive state without user authentication.
  • the phone prompts the user to authenticate.
  • the access card is activated, the access card interacts with the card reader in the lounge, the lounge door is unlocked, and the user can enter the lounge.
  • the access control card returns to the inactive state.
  • the mobile phone When an employee swipes the card reader in the conference room with his mobile phone, the mobile phone prompts the user for authentication. After user authentication, the access card is activated, the access card interacts with the card reader in the conference room, the conference room door is unlocked, and the user can enter the conference room. After the preset time period or after the user exits the business APP, the access control card returns to the inactive state.
  • the access card in the mobile phone works in mode a, without user authentication, and the access card is activated.
  • the access card interacts with the card reader in the break room.
  • the card reader in the break room determines that the access card is working in mode a, the break room door is unlocked, and the user can enter the break room.
  • the access card interacts with the card reader in the conference room.
  • the card reader in the conference room determines that the access card is working in mode a and refuses to unlock the conference room door, and the user cannot enter the conference. room.
  • electronic certificates can work in mode 1 when the terminal is turned on. In mode 1, electronic certificates can provide sensitive information and non-sensitive information. The electronic certificate can work in Mode 2 when the terminal is turned off. In Mode 2, the electronic certificate only provides non-sensitive information.
  • sensitive information includes, for example, the user's name, ID number, bank card number and other information.
  • Non-sensitive information includes, for example, membership card number, user gender, user birthday, card application time and other information.
  • the terminal detects a shutdown event, in addition to activating cards that can be traded after shutdown, the terminal also needs to switch cards with multiple working modes to the preset mode after shutdown.
  • the terminal also needs to store a second card list.
  • the second card list includes information about cards that need to work in the preset mode after shutting down.
  • the cards in the second card list are also cards that can be traded after shutting down, that is, the cards in the first card list. That is to say, the set of cards in the second card list is a subset of the set of cards in the first card list.
  • users can set cards that need to be switched to the default mode after shutting down.
  • the business APP provides the interface shown in (3) in Figure 4. After a card with multiple working modes is set as a card that can be turned off for transactions, the user can set the default mode after the card is turned off.
  • the working mode of the payment card is set to mode 1 after it is shut down, and the working mode of the access control card is set to mode a after it is shut down.
  • the business APP determines the second card list according to the received user settings, and forwards the second card list to the business management TA in the TEE module.
  • the terminal may also automatically determine the second card list. For example, the terminal determines whether there are cards with multiple working modes in the first card list. If there are cards with multiple working modes, it is directly determined that the card needs to be switched to the default mode after shutdown and the default mode of each card after shutdown is determined. It is understandable that the first card list contains cards that can be traded after the card is shut down.
  • the card If the card has multiple working modes, it needs to be switched to the default mode when shutting down. Based on factors such as card transaction security, the card can be selected from the multiple working modes. One mode is determined as the default mode among the working modes, and the default mode meets the transaction requirements after the terminal is shut down. In some examples, a preset mode that meets the transaction requirements after the terminal is shut down may also be called a low-risk mode.
  • the second card list please refer to the description of the relevant contents of the first card list, and will not be described here.
  • the first card list includes transportation cards, car keys, payment cards, and access cards.
  • the second card list includes payment cards and access control cards, and the default mode after the payment card is shut down or the terminal power is less than the preset threshold is mode 1, and the preset mode after the access card is shut down or the terminal power is less than the preset threshold is mode a.
  • first card list and the second card list may be two independent tables, and the first card list includes information on cards that can be traded after the computer is shut down.
  • the second card list includes information about cards that need to be in the preset mode after shutdown.
  • the cards in the first card list include the cards in the second card list.
  • the first card list and the second card list can also be the same list.
  • This list includes all cards that can be traded after shutting down (i.e., the first card list), and marks the cards that need to work in the default mode after shutting down. Cards (i.e. mark cards that belong to the second card list).
  • the embodiment of the present application does not limit the forms of the first card list and the second card list.
  • the first card list and the second card list are two different tables: Example for illustrative explanation.
  • FIG. 7 it is a schematic flow chart of another security business transaction method provided by the embodiment of the present application.
  • the method includes:
  • the shutdown service in the REE module sends a shutdown event to the business management service of the REE module.
  • the business management service forwards the shutdown event to the business management TA of the TEE module.
  • Steps S701a to S701b are explained by taking the business management service of the REE module to subscribe to the terminal power-on event from the power-on service as an example.
  • Steps S501a to S501b please refer to the relevant content of the above steps S501a to S501b.
  • the shutdown event includes a shutdown event after receiving a user shutdown instruction (that is, an event in which the user manually shuts down) and an event in which the user automatically shuts down due to insufficient battery or other reasons.
  • a user shutdown instruction that is, an event in which the user manually shuts down
  • the transaction scenario of the terminal is the same and the user experience is the same.
  • the shutdown event only includes a shutdown event after receiving a user shutdown instruction (that is, an event in which the user manually shuts down the device). In other words, when the terminal is shut down for different reasons, the transaction scenarios of the terminal may be different.
  • the terminal automatically shuts down due to insufficient power, and the terminal executes the method provided by the embodiment of the present application, then the cards in the first card list can be used for transactions after the terminal is shut down. In this example, it can be prevented that other users who illegally obtain the terminal can perform some card transactions by actively shutting down the terminal, further improving the security of terminal transactions.
  • the business management TA After receiving the shutdown event, the business management TA queries the CRS of the SE module for the status of each card in the SE module. Among them, the status of the card includes activated status and inactivated status.
  • the CRS returns the status of each card in the SE module to the business management TA.
  • the business management TA of the TEE module stores the status of each card at this time, that is, it stores the status of each card before shutting down.
  • the service management TA of the TEE module can also obtain and store other relevant information from the SE module, such as default card information.
  • the default card refers to the card activated by default in the SE module.
  • the default card can be a specific card in the SE module (such as transportation card, access control card, etc.), or it can be a smart flash card. Among them, smart flash cards can automatically identify scenes based on geographical location, card reading equipment and other conditions, and automatically activate the corresponding card.
  • the terminal when the terminal obtains the status of each card when performing step S703, it also obtains the mode of each card, which facilitates the terminal to subsequently determine whether it is necessary to switch the card to a specified mode.
  • the business management TA stores the status of each card in the SE module and other related information at this time, which can be used to restore the status of each card in the SE module to the status of each card before shutdown when the machine is subsequently turned on.
  • the business management TA sends a deactivation message to the CRS to deactivate the first card.
  • deactivating the first card means canceling the activation status of the first card, making the first card in an inactivated status, and then the first card cannot be traded.
  • the number of first cards is one or more.
  • the business management TA can send deactivation instructions to each first card one by one, that is, the business management TA sends multiple deactivation instructions to the CRS.
  • the business management TA can also send a deactivation instruction for all first cards, and the CRS deactivates each first card one by one according to the deactivation instruction.
  • the embodiments of this application do not limit the specific deactivation process.
  • step S706 is directly performed.
  • the CRS returns a response of successful deactivation of the first card to the service management TA.
  • the business management TA sends instructions for switching to the preset mode to the CRS one by one for each card in the second card list.
  • the second card list includes one or more cards that need to be switched to the preset mode.
  • the cards in the second card list are in the first card list.
  • the cards in the second card list are cards that can be traded after the computer is turned off.
  • switch the cards in the first card list that need to be switched to the default mode that is, the cards in the second card list
  • the default mode that is, the cards in the second card list
  • card A in the second card list is activated at this time, perform this step to switch card A to the default mode.
  • the terminal is shut down, the card A can be used for transactions.
  • card B in the second card list is in an inactive state at this time, perform this step first to switch card B to the default mode, and then activate card B by performing step S708.
  • the card B can be used for transactions.
  • each card that needs to switch to the preset mode defines its own private switching mode instruction. Then, the business management TA in the TEE module sends corresponding switching to the preset mode one by one for each card in the second card list. Set mode instructions.
  • the terminal if the terminal obtains the status of each card when performing step S703, it also obtains the mode of each card. Then, the terminal can also determine whether each card in the second card list is in the preset mode. For cards in the second card list that are already in the preset mode, the terminal does not need to send an instruction to switch to the preset mode. For cards that are not in the second card list and are not in the preset mode, the terminal needs to send a corresponding instruction to switch to the preset mode.
  • step S706 can also be executed simultaneously with step S704, or after or before step S704.
  • the embodiment of the present application does not limit the execution order of step S706 and step S704.
  • the CRS returns a successful mode switching response to the service management TA.
  • the business management TA sends an instruction to activate the second card to the CRS.
  • the business management TA of the TEE module sends an instruction to activate the second card to the CRS of the SE module.
  • the number of second cards is one or more.
  • the business management TA can send activation instructions for each second card one by one, that is, the business management TA sends multiple activation instructions to the CRS.
  • the business management TA can also send an activation instruction for all second cards, and the CRS activates each second card one by one according to the activation instruction.
  • the embodiment of the present application does not limit the specific activation process.
  • the cards in the first card list that are currently inactive need to be activated. Then, it includes activating cards that are not in the second card list but are in the first card list and are currently in an inactive state; and activating cards that are in the second card list and are currently in an inactive state. That is to say, for the cards in the second card list that are currently inactive, first switch them to the default mode and then activate them. It can be understood that for a card in the second card list that is currently activated, it is only necessary to switch it to a specified mode without performing an activation operation.
  • the CRS returns a response indicating that the second card is successfully activated to the business management TA.
  • the business management TA returns a response to the shutdown event to the business management service.
  • the business management service returns a response to the shutdown event to the shutdown service.
  • Steps S710a and S710b may be executed before or after step S702, or may not be executed. S710a and step S710b.
  • the cards in the second card list are switched to the default mode (the working mode when shut down), which not only ensures that the cards in the second card list can be traded after shutting down, but also passes the second card
  • the cards in the list work in preset modes to ensure the security of card transactions. This embodiment enriches the cards that can be traded after the terminal is shut down to meet the transaction needs of more shutdown scenarios.
  • FIG. 8 it is a schematic flow chart of another method for restoring the status of each card before the terminal is turned off after it is turned on again according to the embodiment of the present application.
  • the method includes:
  • the power-on service in the REE module sends a power-on event to the business management service of the REE module.
  • the business management service forwards the power-on event to the business management TA.
  • Steps S801a to S801b are explained by taking the business management service of the REE module to subscribe to the terminal power-on event from the power-on service as an example.
  • the business management TA of the TEE module can also directly subscribe to the terminal power-on event from the power-on service of the REE module. Then, after detecting the power-on event, the power-on service of the REE module directly reports to the TEE module.
  • the business management TA of the module sends a power-on event.
  • the business APP of the REE module subscribes to the terminal power-on event from the business APP of the REE module.
  • the business APP of the REE module sends the power-on event to the business APP of the REE module. Then, the business APP of the REE module directly forwards the power-on event to the business management TA of the TEE module, or forwards the power-on event to the business management TA via the business management service of the REE module.
  • the business management TA obtains the status of each card in the SE module before shutting down. Among them, the status of the card includes activated status and inactivated status.
  • step S703 the business management TA of the TEE module has stored the status of each card in the SE module before shutdown.
  • the business management TA After receiving the power-on event, the business management TA queries the CRS of the SE module for the status of each card in the SE module.
  • step S803 may be executed simultaneously with step S802, or may be executed after or before step S802. This application does not limit the execution order of step S803 and step S802.
  • the CRS returns the status of each card in the SE module to the business management TA.
  • the terminal may determine the status of each card after the terminal is shut down based on the first card list. For example, cards in the first card list are in an activated state after the computer is turned off, and cards that are not in the first card list are in an inactivated state after the computer is turned off. In other words, the terminal may not execute step S803 and step S804.
  • the business management TA sends an instruction to deactivate the third card to the CRS.
  • the third card at this time is the same as the second card in step S708.
  • the third card is on the first card list, is included in the second card list (that is, the card works in the default mode after shutting down), and is not in the second card list but is in the first card list.
  • the number of third cards is one or more.
  • the CRS returns a response indicating that the third card has been successfully deactivated to the service management TA.
  • the business management TA sends switching mode instructions to the CRS one by one for each card in the second card list.
  • the CRS returns a response of successful mode switching to the service management TA.
  • the business management TA sends an instruction to activate the fourth card to the SE module.
  • the fourth card in this step is the same as the first card in step S704.
  • the fourth card is not in the first card list. Among them, the number of fourth cards is one or more.
  • the CRS returns a response indicating successful activation of the fourth card to the business management TA.
  • the business management TA returns a response to the power-on event to the business management service.
  • the business management TA of the TEE module can also clear the status of each card after shutdown and related information stored by the business management TA of the TEE module. Information etc.
  • the business management service returns a response to the power-on event to the power-on service.
  • Steps S811a and S811b may be executed before or after step S802, or steps S8011a and S8011b may not be executed.
  • each card in the SE module returns to the state before shutting down, retaining the user's operating habits when turning on the terminal, and avoiding user confusion.
  • the cards that have been added to the terminal include transportation cards, bank cards, car keys, door keys, payment cards and access cards.
  • the currently activated cards on the terminal are car keys and access cards.
  • the payment card has multiple modes. One mode supports the large-amount payment function with user authentication, and the other mode supports the small-amount payment function without authentication. Then, the terminal confirms that the payment card needs to switch to the default mode - the authentication-free small payment function mode (mode 1 in the picture) when shutting down.
  • the access control card has multiple modes. One mode supports entry into the safe area and general area, and the other mode supports entry into the general area but cannot enter the safe area. Then, the terminal confirms that the access control card needs to switch to the default mode when shutting down - it supports entry into the general area and cannot enter the safe area (mode a in the picture). That is, the second card list includes payment cards and access cards.
  • the terminal When it is detected that the terminal is manually shut down by the user or the terminal is automatically shut down due to insufficient battery or other reasons, the terminal records the card status before shutting down as: the car key is activated, other cards are inactive, and the access card is in mode b, and the payment card In mode 2. If the terminal queries that the currently activated card-the car key is not in the first card list, the activation state of the car key is cancelled. If the access control card is currently activated, since the access control card is in the first card list, the activation status of the access control card is retained. If the access card is currently inactive, since the access card is in the first card list, there is no need to adjust the activation status of the access card.
  • the terminal switches the payment card mode to a preset mode according to the second card list. That is, the payment card Switch the mode of the chip from mode 2 to mode 1, and switch the mode of the access card from mode b to mode a. Then, the terminal queries the cards that are currently inactive, but the access cards, payment cards, transportation cards and car keys in the first card list are all inactive, then the terminal activates the access cards, payment cards, transportation cards and car key. When the terminal is shut down, the access card, payment card, transportation card and car key in the terminal are still activated, and the payment card is in the preset mode (mode 1), the access card is in the preset mode (mode a), and the other cards are in unused mode. Activation status. Then, the access control card, payment card, transportation card and car key in the terminal can be traded. The payment card can only carry out authentication-free small payment transactions. The access control card only supports entering the general area, and other cards cannot be traded.
  • the terminal When the terminal is turned on again, the terminal returns to its original state based on the status of each card before it was stored and shut down, that is, the car key and access control card are activated, other cards are inactive, and the access control card switches back to mode b, and the payment card switches back Mode 2.
  • Scenario 3 When it is detected that the user manually shuts down the terminal, existing technology can be used for terminal processing, and the technical effect is the same as the existing technology. That is, after the terminal is shut down, only car keys can be traded, and other cards cannot be traded. Alternatively, all cards in the terminal may be untradeable.
  • Scenario 4 When it is detected that the terminal automatically shuts down due to insufficient battery or other reasons, the terminal's processing is the same as that of technical solution 3, and the technical effect is also the same. That is, when the terminal is shut down, the access card, payment card, transportation card and car key in the terminal are still activated, and the payment card is in the preset mode (mode 1), the access card is in the preset mode (mode a), and the other cards is inactive. Then, the access control card, payment card, transportation card and car key in the terminal can be traded. The payment card can only carry out authentication-free small payment transactions. The access control card only supports entering the general area, and other cards cannot be traded.
  • the terminal When the terminal is turned on again, the terminal returns to its original state based on the status of each card before it was stored and shut down.
  • the car key and access control card are in the activated state, and other cards are in the inactive state.
  • the access control card switches back to mode b, and the payment card switches back to mode b. 2.
  • technical solution 4 can prevent other users who illegally obtain the terminal from actively shutting down the terminal to conduct some card transactions after the terminal is shut down, further improving the security of terminal transactions.
  • Technical Solution 3 and Technical Solution 4 compared with Technical Solution 1 and Technical Solution 2, add the processing of switching cards with multiple working modes to preset modes, which further enriches the transaction scenarios of cards in the terminal and meets the needs of More transaction needs after the terminal is shut down.
  • the first triggering event may also be an event that the terminal's power is less than a preset threshold
  • the second triggering event may also be an event that the terminal's power is equal to or greater than the preset threshold.
  • the power detection service in the trigger event detection module can be used to detect the first trigger event and the second trigger event.
  • the terminal can automatically set or determine the first card list according to user settings.
  • the first card list includes information about cards that support transactions when the terminal power is less than a preset threshold. For example, when the terminal power is less than the preset threshold, you can select no cards in the SE module that require user authentication. It is understandable that cards that do not require user authentication do not need to pass through the TEE module and REE module during transactions, which is beneficial to saving terminal power consumption and extending the terminal's standby time.
  • the terminal can also determine a second card list.
  • the second card list includes terminal power less than a preset threshold. The value is information about cards that support transactions in the default mode.
  • the terminal when the power of the terminal is less than the preset threshold, the terminal also needs to switch the working mode of the cards in the second card list to the preset mode.
  • the card set in the second card list is a subset of the first card list set.
  • the terminal When the terminal detects that the terminal power is less than the preset threshold, the terminal deactivates the card that is currently in the activated state but is not in the first card list according to the first card list; and then deactivates the card that is currently in the inactive state but is in the first card list. card activation.
  • the terminal before the terminal activates the cards in the first card list that are currently inactive, the terminal also switches the cards in the second card list to the preset mode according to the second card list.
  • the terminal restores the status of each card to the state before detecting that the terminal power is less than the preset threshold.
  • the working mode of each card is also switched back to the working mode before the terminal power is detected to be less than the preset threshold.
  • the chip system includes at least one processor 1101 and at least one interface circuit 1102.
  • the processor 1101 and the interface circuit 1102 may be interconnected by wires.
  • interface circuitry 1102 may be used to receive signals from other devices, such as the memory of terminal 100.
  • interface circuit 1102 may be used to send signals to other devices (eg, processor 1101).
  • the interface circuit 1102 can read instructions stored in the memory and send the instructions to the processor 1101.
  • the terminal can be caused to perform various steps performed by the terminal 100 (such as a mobile phone) in the above embodiments.
  • the chip system may also include other discrete devices, which are not specifically limited in the embodiments of this application.
  • An embodiment of the present application also provides a device, which is included in a terminal and has the function of realizing the terminal behavior in any of the methods in the above embodiments.
  • This function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
  • the hardware or software includes at least one module or unit corresponding to the above functions. For example, detection module or unit, display module or unit, determination module or unit, and calculation module or unit, etc.
  • Embodiments of the present application also provide a computer storage medium that includes computer instructions.
  • the computer instructions When the computer instructions are run on a terminal, the terminal is caused to perform any of the methods in the above embodiments.
  • Embodiments of the present application also provide a computer program product.
  • the computer program product When the computer program product is run on a computer, it causes the computer to perform any of the methods in the above embodiments.
  • Embodiments of the present application also provide a graphical user interface on a terminal.
  • the terminal has a display screen, a camera, a memory, and one or more processors.
  • the one or more processors are used to execute one or more computers stored in the memory.
  • the program and the graphical user interface include the graphical user interface displayed when the terminal executes any of the methods in the above embodiments.
  • the above-mentioned terminals include hardware structures and/or software modules corresponding to each function.
  • Persons skilled in the art should easily realize that, in conjunction with the units and algorithm steps of each example described in the embodiments disclosed herein, the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving the hardware depends on the specific application and design constraints of the technical solution. Professionals and technicians may use different methods to implement the described functions for each specific application, but such implementations should not be considered to be beyond the scope of the embodiments of the present invention.
  • Embodiments of the present application can divide the above terminals into functional modules according to the above method examples.
  • each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or software function modules. Form realization. It should be noted that the division of modules in the embodiment of the present invention is schematic and is only a logical function division. In actual implementation, there may be other division methods.
  • Each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above integrated units can be implemented in the form of hardware or software functional units.
  • Integrated units may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as independent products. Based on this understanding, the technical solutions of the embodiments of the present application are essentially or contribute to the existing technology, or all or part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage device.
  • the medium includes several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute all or part of the steps of the methods of various embodiments of the present application.
  • the aforementioned storage media include: flash memory, mobile hard disk, read-only memory, random access memory, magnetic disk or optical disk and other media that can store program codes.

Abstract

一种安全业务的交易方法及终端,涉及终端领域,终端关机后可切换支持交易的安全业务,满足用户在终端关机场景中的交易需求,该方法包括:终端包括第一卡片列表,该第一卡片列表中包括被设置为在关机后或终端的电量小于预设阈值时支持交易的卡片的信息,在终端处于开机状态时或者终端的电量等于或大于预设阈值时,第一卡片处于未激活状态,当终端检测到关机事件或者终端的电量小于预设阈值后,终端自动切换第一卡片为激活状态,那么,终端关机后或者终端的电量小于预设阈值后,终端的第一卡片可继续与读卡设备进行交易,第一卡片的数量为一个或多个。

Description

一种安全业务的交易方法及终端
本申请要求于2022年3月9日提交国家知识产权局、申请号为202210223921.9、申请名称为“一种关机后多业务可用的方法”和2022年8月18日提交国家知识产权局、申请号为202210992941.2、申请名称为“一种安全业务的交易方法及终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及终端领域,尤其涉及一种安全业务的交易方法及终端。
背景技术
目前,例如手机、手表等的终端包括三层应用环境,分别是富执行环境(Rich Execution Environment,REE)、可信执行环境(Trusted Execution Environment,TEE)和安全元件(Secure Element,SE)。终端根据安全业务(例如银行卡、交通卡、车钥匙等)中不同数据的安全性级别,分别在三层应用环境中部署相应的应用。也就是说,一个安全业务可能在REE、TEE以及SE均设置有相应的应用。
终端关机后,终端的所有安全业务均不可进行交易,或者,仅终端中默认的一个安全业务能够进行交易,可见现有的技术方案不能满足用户在终端关机场景中的交易需求。
发明内容
本申请提供的一种安全业务的交易方法及终端,可以实现终端关机后可切换支持交易的安全业务,满足用户在终端关机场景中的交易需求。
为了实现上述目的,本申请实施例提供了以下技术方案:
第一方面,提供一种卡片的切换方法,应用于终端,终端包括第一卡片列表,第一卡片列表包括被设置为在终端关机时或终端的电量小于预设阈值时支持交易的卡片的信息;该方法包括:终端处于开机状态时或者终端的电量等于或大于预设阈值时,终端中第一卡片处于未激活状态;在终端检测到关机事件或者终端的电量小于预设阈值后,终端确定第一卡片列表中包括第一卡片时,切换第一卡片为激活状态。如此,第一终端的第一卡片可以与读卡设备进行交易。其中,第一卡片的数量为一个或多个。
其中,第一卡片列表中包括用户希望在终端关机后或终端电量小于预设阈值后仍进行交易的卡片。第一卡片列表包括第一卡片,表示用户希望在终端关机后或终端电量小于预设阈值后第一卡片仍可以进行交易。
在现有技术中,当终端关机后所有卡片均处于未激活状态,或者,终端关机后默认保留关机之前处于激活状态的卡片的状态,可见现有技术不能满足用户在终端关机后的交易需求。然而,本申请中,可以通过设置第一卡片列表的方式,使得终端关机后,将关机之前处于未激活状态的卡片自动切换到激活状态,第一卡片可在关机后继续交易,满足用户在关机后的交易需求。
一种可能的实现方式中,终端还包括第二卡片;在终端处于开机状态时或者终端的电量等于或大于预设阈值时,第二卡片处于激活状态;在终端检测到关机事件或者 终端的电量小于预设阈值后,且,在终端切换第一卡片为激活状态之前,该方法还包括:终端切换第二卡片为未激活状态,第一卡片列表不包括第二卡片。
其中,第一卡片列表不包括第二卡片,表示用户希望在终端关机后或终端电量小于预设阈值后第二卡片不可进行交易,例如第二卡片为高安业务(例如进入安全区域的门禁卡,或者包含敏感信息的电子证件等)。那么,终端在关机之前,可以自动将第二卡片切换到未激活状态。
一方面,如果第二卡片为高安业务(例如进入安全区域的门禁卡,或者包含敏感信息的电子证件等),那么在关机后可以进行交易,存在安全性风险。或者,第二卡片为需要用户认证的卡片,那么在关机后,终端的REE模块和TEE模块均不工作,无法进行用户认证,第二卡片关机后也不可用。另一方面,如果第二卡片与后续需要激活的第一卡片的非接参数出现冲突,那么后续激活第一卡片则可能出现激活失败的情况。因此,本申请实施例去激活第二卡片,有利于保证第二卡片的交易安全,也有利于提高第一卡片关机后交易的成功率。
一种可能的实现方式中,终端还包括第二卡片列表,第二卡片列表包括在终端关机时或终端的电量小于预设阈值时被设置为支持在预设模式下交易的卡片的信息,第二卡片列表包括第一卡片;在终端检测到关机事件或者终端的电量小于预设阈值后,且在终端切换第一卡片为激活状态之前,该方法还包括:终端切换第一卡片的工作模式为预设模式。
也就是说,终端还可以包括一些具有两个或两个以上工作模式的卡片。终端可以控制这类卡片在终端开机时和关机时处于不同的工作模式,以此满足用户不同的交易需求。这里以第一卡片为例,在终端自动切换第一卡片为激活状态之前,终端确定第二卡片列表中包括第一卡片后,将将第一卡片的工作模式切换到预设模式,再激活第一卡片。可以理解的是,在激活第一卡片之前,先将第一卡片的工作模式切换到预设模式,有利于保证第一卡片的交易安全。
一种可能的实现方式中,终端还包括第三卡片;终端处于开机状态时或者终端的电量等于或大于预设阈值时,第三卡片处于激活状态;该方法还包括:在终端检测到关机事件或者终端的电量小于预设阈值后,终端切换第三卡片的工作模式为预设模式,第二卡片列表包括第三卡片。
也就是说,第二卡片列表中的第三卡片在开机时或者终端的电量大于或等于预设阈值时已处于激活状态,那么在检测到关机事件或终端的电量小于预设阈值后,可以直接切换第二卡片列表中的第三卡片的工作模式为预设模式即可。
一种可能的实现方式中,第二卡片列表中的卡片集合为第一卡片列表中卡片集合的子集。其中,第一卡片列表和第二卡片列表可以为独立的两张表,第一卡片列表中包括关机后可进行交易的卡片的信息。第二卡片列表中包括关机后需要处于预设模式的卡片的信息。可以理解的,第一卡片列表中的卡片包含第二卡片列表中的卡片。当然,第一卡片列表和第二卡片列表也可以为同一张表,该表包括所有关机后可进行交易的卡片(即第一卡片列表),并标记出关机后需要工作在预设模式下的卡片(即标记出属于第二卡片列表中的卡片)。本申请实施例对第一卡片列表和第二卡片列表的形式不做限定。
一种可能的实现方式中,在终端切换第一卡片为激活状态之后,该方法还包括:在终端检测到开机事件或者终端的电量等于或大于预设阈值后,终端切换第一卡片为未激活状态。
由此可见,当终端再次开机后,将各个卡片(例如第一卡片)恢复到关机之前的状态,保留了用户在开机时的操作习惯,避免造成用户使用上的困惑。
一种可能的实现方式中,该方法还包括:终端存储第一卡片的第一状态,第一状态为终端处于开机状态时或者终端的电量等于或大于预设阈值时第一卡片的状态;在终端检测到开机事件或者终端的电量等于或大于预设阈值后,终端切换第一卡片为未激活状态,包括:在终端检测到开机事件或者终端的电量等于或大于预设阈值后,终端还获取第一卡片的第二状态,第二状态为终端处于关机状态时或者终端的电量小于预设阈值时第一卡片的状态;当第一卡片的第一状态为未激活状态,且第一卡片的第二状态为激活状态时,终端切换第一卡片为未激活状态。由此提供了一种终端再次开机后恢复各个卡片的状态的方法。
一种可能的实现方式中,在终端切换第二卡片为未激活状态之后,该方法还包括:在终端检测到开机事件或者终端的电量等于或大于预设阈值后,终端切换第二卡片为激活状态。
一种可能的实现方式中,在终端切换第一卡片的工作模式为预设模式之后,该方法还包括:在终端检测到开机事件或者终端的电量等于或大于预设阈值后,终端切换第一卡片为非预设模式。
一种可能的实现方式中,在终端切换第三卡片的工作模式为预设模式之后,该方法还包括:在终端检测到开机事件或者终端的电量等于或大于预设阈值后,终端切换第三卡片为非预设模式。
一种可能的实现方式中,在终端检测到关机事件或者终端的电量小于预设阈值后,终端切换第一卡片为激活状态之前,该方法还包括:终端接收用户的第一操作,终端根据第一操作确定第一卡片列表。
也就是说,用户的第一操作用于设置第一卡片列表。一般,终端中安全性要求较低的,且无需用户进行认证的卡片可以由用户设置是否在终端关机后可以进行交易。例如,各类交通卡、门禁卡(或者,具体为一般区域的门禁卡)、钥匙(例如,车钥匙)等
一种可能的实现方式中,该方法还包括:终端接收用户的第二操作,终端根据第一卡片列表和第二操作确定第二卡片列表。
也就是说,用户的第二操作用于设置第二卡片列表。当然,终端也可以自动根据卡片的性质(是否具有多个工作模式)、交易的安全性等自行确定第二卡片列表。
一种可能的实现方式中,终端包括近场通信NFC模块;在终端检测到关机事件或者终端的电量小于预设阈值后,终端切换第一卡片为激活状态之后,该方法还包括:在终端关机后或者终端电量小于预设阈值后,终端通过NFC模块接收到读卡设备选择第一卡片的指令;响应于选择第一卡片的指令,终端中第一卡片与读卡设备执行交易业务。
第二方面、提供一种终端,包括:处理器、存储器、近场通信NFC模块和触摸屏, 存储器、触摸屏、NFC模块与处理器耦合,处理器包括安全元件SE模块,存储器用于存储计算机程序代码,计算机程序代码包括计算机指令,当处理器从存储器中读取计算机指令,以使得终端执行上述方面及其中任一种可能的实现方式中的方法。
第三方面、提供一种装置,该装置包含在终端中,该装置具有实现上述方面及可能的实现方式中任一方法中终端行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括至少一个与上述功能相对应的模块或单元。例如,接收模块或单元、显示模块或单元、以及处理模块或单元等。
第四方面、提供一种计算机可读存储介质,包括计算机指令,当计算机指令在终端上运行时,使得终端执行如上述方面及其中任一种可能的实现方式中的方法。
第五方面、提供一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行如上述方面中及其中任一种可能的实现方式中的方法。
第六方面、提供一种芯片系统,包括处理器,当处理器执行指令时,处理器执行如上述方面中及其中任一种可能的实现方式中的方法。
上述第二方面提供的终端,第三方面提供的装置,第四方面提供的计算机可读存储介质,第五方面提供的计算机程序产品,第六方面提供的芯片系统所能达到的技术效果,请参考第一方面以及第一方面中任一种可能实现方式中关于技术效果的描述,这里不再说明。
附图说明
图1为本申请实施例提供的一种终端的结构示意图;
图2为本申请实施例提供的另一种终端的结构示意图;
图3为本申请实施例提供的一种设置关机后交易卡片的方法的流程示意图;
图4为本申请实施例提供的一些终端的用户界面示意图;
图5为本申请实施例提供的一种终端关机前的安全业务的处理方法的流程示意图;
图6为本申请实施例提供的一种终端开机时的安全业务的处理方法的流程示意图;
图7为本申请实施例提供的另一种终端关机前的安全业务的处理方法的流程示意图;
图8为本申请实施例提供的另一种终端开机时的安全业务的处理方法的流程示意图;
图9为本申请实施例提供的一种芯片系统的结构示意图。
具体实施方式
在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。
在本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说 明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
本申请实施例提供的安全业务的交易方法适用于包含有SE模块的终端。示例性的,本申请实施例中终端100例如可以为手机、平板电脑、个人计算机(personal computer,PC)、个人数字助理(personal digital assistant,PDA)、上网本、可穿戴终端(如智能手表、智能手环等)、增强现实技术(augmented reality,AR)设备、虚拟现实(virtual reality,VR)设备、车载设备、智慧屏、智能汽车、智能音响等,本申请对该终端100的具体形式不做特殊限制。
如图1所示,图1示出了终端100的结构示意图。
终端100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
可以理解的是,本发明实施例示意的结构并不构成对终端100的具体限定。在本申请另一些实施例中,终端100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以存储处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过终端100的无线充电线圈接收无线充电输入。充电管理模块140为电池142 充电的同时,还可以通过电源管理模块141为终端供电。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于检测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。
终端100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。终端100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在终端100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。
无线通信模块160可以提供应用在终端100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,终端100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得终端100可以通过无线通信技术与网络以及其他设备通信。无线通信技术可以包括全球移动通讯系统(global system for mobile communications, GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
终端100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
终端100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展终端100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件存储在外部存储卡中。
内部存储器121可以用于存储计算机可执行程序代码,可执行程序代码包括指令。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储终端100使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。处理器110通过运行存储在内部存储器121的指令,和/或存储在设置于处理器中的存储器的指令,执行终端100的各种功能应用以及数据处理。
终端100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
图2为本申请实施例提供的一种终端100的软件结构。
如图2所示,终端100包括富执行环境(Rich Execution Environment,REE)模块、可信执行环境(Trusted Execution Environment,TEE)模块和安全元件(Secure Element,SE)模块三种应用环境。在一个示例中,REE模块和TEE模块集成在一个芯片上,例如集成在应用处理器(Application Processor,AP)芯片,SE模块集成在另一个芯片上,如SE芯片。
其中,REE模块包括运行在通用的嵌入式处理器上的一般操作系统(图中未示出),如Rich OS或基于kernel的操作系统(如安卓系统、鸿蒙系统等),以及REE模块中的应用/服务。
在一些示例中,REE模块可以包括应用层和系统框架层。其中,应用层包括一系列的应用程序(Application,APP),例如包括业务APP(例如钱包APP),支持添加银行卡、交通卡、电子证件、零钱、会员卡、发票,以及社区门禁卡、智能家用锁 门卡、智能酒店房卡等,通过终端即可满足交通出行、移动支付等安全业务。在一些示例中,业务APP还可以接收用户设置的关机后可交易的安全业务(即卡片)的信息等。可选的,业务APP还可以接收用户设置的关机后需要切换工作模式的安全业务的信息等。其中,系统框架层,为应用层的APP提供应用编程接口(application programming interface,API)和编程框架等。系统框架层包括一些预先定义的函数。例如,系统框架层包括触发事件检测模块,以及业务管理服务等。其中,触发事件检测模块检测终端100的触发事件,包括第一触发事件和第二触发事件。其中,第一触发事件,用于触发终端开始切换终端中卡片的状态(如激活状态切换为未激活状态,或者未激活状态切换为激活状态)。例如,第一触发事件包括关机事件,和/或,终端电量小于预设阈值的事件。第二触发事件,用于触发终端恢复终端中各个卡片在检测到第一触发事件之前的状态(如激活状态或未激活状态)。例如,第二触发事件包括开机事件,和/或,终端电量等于或大于预设阈值的事件。在具体实现中,触发事件检测模块包括开关机服务,用于检测终端100的开机和关机事件,并将检测到的终端100的开机事件或关机事件通知到业务管理服务。又例如,触发事件检测模块也可以包括电量检测服务,用于检测终端100的终端电量情况。当检测到终端100的终端电量小于预设阈值的事件,或者,终端电量等于或大于预设阈值的事件时,通知到业务管理服务,用于向TEE模块转发触发事件。
其中,TEE模块是运行于REE模块之外的独立运行环境,其向REE模块提供安全服务并且与REE模块隔离。REE模块(包括一般操作系统及其上的应用程序)无法直接访问TEE模块的硬件和软件资源。TEE模块为TEE模块中的应用提供可信赖的运行环境,再通过对机密性、完整性的保护和数据访问权限的控制,确保端到端的安全。TEE模块与REE模块并行,通过安全的应用程序编程接口(Application Programming Interface,API)与REE模块进行交互。TEE模块提供了一个比REE模块更高安全等级的运行环境,但无法提供硬件隔离级别的安全的密钥存储和密钥运行环境。其中,TEE模块中的应用也称为可信应用(TEE application,TA)。
例如,TEE模块包括业务管理TA,用于在接收到业务管理服务转发的第一触发事件(如关机事件或者终端电量小于预设阈值的事件)后,通知SE模块激活关机后或者当终端电量小于预设阈值后可交易的安全业务,去激活(deactived)关机后或者当终端电量小于预设阈值后不可交易的安全业务。可选的,业务管理TA,还可在接收到业务管理服务转发的第一触发事件后,通知SE模块切换部分安全业务的工作模式。
又例如,业务管理TA,用于在接收到业务管理服务转发的第二触发事件(如开机事件或者终端电量等于或大于预设阈值的事件)后,通知SE模块将其中各个卡片的状态恢复到检测到第一触发事件之前的状态和/或工作模式。
其中,SE模块用来构建可信的安全的密钥存储和密钥运算环境。这是因为SE模块中软件系统简单,硬件元器件相对较少,故而容易建立物理防护和实施安全保障,从而提高SE模块的安全强度,从而可以服务于安全性要求更高的安全系统。其中,SE模块包括卡片操作系统(Chip Operating System,COS)模块(图中未示出)、非接注册服务(Contactless Registry service,CRS)模块以及SE模块中的应用(例如图2中的卡片1、卡片2等)。其中,COS为SE芯片的操作系统,用于对接收到的应用 协议数据单元(Application Protocol Data Unit,APDU)指令进行预处理,并将指令分发给SE中的相应的服务或应用进行处理。CRS为SE模块中的一个系统应用,负责对SE模块中的应用的注册管理,激活或去激活(即取消激活)SE模块中的应用。SE模块中的应用也可以称为Applet或卡片,例如可以为银行卡、交通卡、门禁卡、工卡、电子证件、车钥匙、典型支持(如支付宝TM,微信支付TM)中一项或多项。
还需要说明的是,这里的“业务APP”、“触发事件检测模块”、“业务管理服务”、“业务管理TA”等均是本申请为方便方案描述提供的名称,在一些示例中不能作为对本申请方案的功能的限定。
需要说明的是,终端100还包括NFC模块,用于支持终端100与其他NFC设备(例如读卡设备200)进行通信。NFC模块包括非接触性前端(Contactless Front-End,CLF),为NFC模块的控制器,可以接收读卡设备200的APDU指令,并将接收的APDU指令发送给SE芯片的COS,以便COS将接收到的APDU指令分发给相应的SE模块中的应用进行业务交易。在一个示例中,NFC模块可以集成在独立于AP芯片和SE芯片之外的另一个芯片上,也称为NFC芯片。需要说明的是,在终端100关机时,终端100剩余的电量可为终端100的NFC模块和SE模块供电,即终端100的NFC模块和SE模块仍可工作。那么,终端100关机后,若当SE模块中的卡片1处于激活状态,那么卡片1仍可与读卡设备200进行交易。
以下结合图2所示的终端100的软件结构,以第一触发事件为关机事件,第二触发事件为开机事件为例,对本申请实施例提供的技术方案进行详细说明。在一个示例中,触发事件检测模块中的开关机服务具体用于检测关机事件和开机事件。
在本申请的一些实施例中,终端可以根据用户的设置或者终端默认设置确定终端在关机后可进行交易的安全业务(也称为卡片),即确定下述的第一卡片列表。如图3所示,为本申请实施例示例性提供的一种设置终端关机后可以进行交易的安全业务的方法流程图,该方法包括:
S301、REE模块的业务APP接收用户设置。
在一个示例中,REE模块中的业务APP可以提供设置界面,以供用户设置希望在终端100关机后可以进行交易的安全业务(也称为卡片)。
S302、业务APP根据用户设置确定第一卡片列表,该第一卡片列表包括终端100关机后支持交易的卡片的信息。
在一些示例中,业务APP可以基于卡片交易的安全性等因素,从终端中已添加的卡片中确定系统允许关机后交易的卡片。一般,终端中安全性要求较低的,且无需用户进行认证的卡片可以由用户设置是否在终端关机后可以进行交易。例如,各类交通卡、门禁卡(或者,具体为一般区域的门禁卡)、钥匙(例如,车钥匙)等。而后,业务APP提供用户设置界面,该界面中仅包括系统允许关机后交易的卡片,以供用户设置用户希望在终端关机后能够交易的卡片,即得到第一卡片列表。
在另一些示例中,用户可以对终端中已添加的全部卡片进行设置,设置用户希望在终端关机后能够交易的卡片,得到卡片列表a。另外,业务APP基于卡片交易的安全性等因素,确定系统允许关机后交易的卡片,得到卡片列表b。而后,业务APP根据卡片列表a和卡片列表b确定两个卡片列表的交集为第一卡片列表,即得到用户设 置的希望终端关机后进行交易的卡片的信息。又或者,用户在设置希望在终端关机后能够交易的卡片时,终端也可以自动检测用户设置的卡片是否在卡片列表b上,即是否为系统允许关机后交易的卡片。当用户设置的卡片不在卡片列表b上,可以提示用户,阻止用户设置该卡片为关机后可进行交易。总而言之,本申请实施例对业务APP如何确定第一卡片列表的具体实现不做限定。
例如,以业务APP是钱包APP为例。如图4中(1)所示界面为钱包APP的设置界面。在该设置界面中包括“关机后的卡片设置”项401。响应于检测到用户操作“关机后的卡片设置”项401,终端显示如图4中(2)所示的关机后卡片的详细设置界面。在该界面中,用户可以通过各个卡片后的复选框选择用户希望在终端关机后能够交易的卡片。例如,第一卡片列表包括交通卡和车钥匙。
S303、业务APP向TEE模块的业务管理TA发送第一卡片列表,业务管理TA存储第一卡片列表。
示例性的,REE模块中的业务APP可以直接向TEE模块中的业务管理TA发送第一卡片列表,也可以通过REE模块中的业务管理服务向TEE模块中的业务管理TA发送第一卡片列表,本申请实施例对此不做限定。
S304、业务管理TA向业务APP返回第一卡片列表接收成功的响应。本步骤为可选的。
需要说明的是,在其他一些示例中,业务APP也可以直接将用户设置的希望在终端关机能够交易的卡片信息发送给业务管理TA,由业务管理TA确定第一卡片列表。或者,在又一些示例中,业务APP也可以直接将用户设置的希望在终端关机能够交易的卡片信息发送给REE模块中的业务管理服务,由业务管理服务确定第一卡片列表。而后,业务管理服务向业务管理TA发送第一卡片列表。其中,TEE模块中的业务管理TA或者REE模块中的业务管理服务如何确定第一卡片列表可以参考上述业务APP确定第一卡片列表的方法,这里不再赘述。
S305、业务APP向REE模块中的开关机服务订阅终端的开关机事件。本步骤为可选。
在其他一些示例中,也可以由REE模块中的业务管理服务,或者TEE模块中的业务管理TA向REE模块中的开关机服务订阅终端的开关机事件。
需要说明的是,这里订阅的开关机事件包括开机事件和关机事件。其中,订阅的关机事件包括终端准备关机的事件,此时终端并未关机。在一些示例中,订阅的关机事件包括用户手动关机的事件和终端因电量不足或者其他原因自动关机的事件。在另一些示例中,订阅的关机事件可以仅包括终端因电量不足或其他原因自动关机的事件,不包括用户手动关机的事件。需要说明的是,当订阅的关机事件不同时,本申请的技术方案所达到的技术效果有所不同,后续将进行详细说明,这里先不做说明。
S306、开关机服务向业务APP返回订阅成功的响应。本步骤为可选。
在其他一些示例中,如果REE模块中的业务管理服务,或者TEE模块中的业务管理TA向REE模块中的开关机服务订阅终端的开关机事件,则开关机服务相相应的订阅者(业务管理服务或业务管理TA)返回订阅成功的响应。
需要说明的是,在另外一些实施例中,终端也可以默认设置终端关机后能够交易 的卡片,或者,默认订阅终端的开关机事件。又或者,开关机服务在检测到开关机事件后,自动广播开关机事件,那么业务APP可以接收到广播的开关机事件。也就是说,终端也可以不执行上述步骤S301-步骤S304。
由此,终端根据用户设置和/或终端中已添加的各个卡片的信息确定并存储第一卡片列表,还订阅终端的开关机事件。
在本申请的一些实施例中,在终端确定第一卡片列表后,当检测到终端的关机事件后,终端在关机之前,根据第一卡片列表自动切换各个卡片的状态(包括激活状态和未激活状态),从而使得第一卡片列表中的卡片在终端关机后可以进行交易。
如图5所示,为本申请实施例提供的一种终端的安全业务的交易方法的流程示意图,该方法包括:
S501a、REE模块中的开关机服务向REE模块的业务管理服务发送关机事件。
当REE模块中的开关机服务检测到关机事件后,通过REE模块中的业务管理服务向TEE中的业务管理TA发送关机事件。
S501b、业务管理服务向TEE模块的业务管理TA转发关机事件。
步骤S501a-步骤S501b,是以REE模块的业务管理服务向开关机服务订阅终端开关机事件为例进行说明的。需要说明的是,在其他一些示例中,TEE模块的业务管理TA也可以直接向REE模块的开关机服务订阅终端开关机事件,那么REE模块的开关机服务在检测到关机事件后,直接向TEE模块的业务管理TA发送关机事件。或者,REE模块的业务APP向REE模块的业务APP订阅终端开关机事件,那么REE模块的业务APP在检测到关机事件后,向REE模块的业务APP发送关机事件。而后,REE模块的业务APP直接向TEE模块的业务管理TA转发关机事件,或者经REE模块的业务管理服务向业务管理TA转发关机事件。
在一些示例中,关机事件包括接收到用户关机指示后关机事件(即用户手动关机事件)和接收到因电量不足或其他原因自动关机的事件(即终端自动关机事件)。在该示例中,终端因不同原因关机后,终端的交易场景相同,用户体验一致。在另一些示例中,关机事件仅包括因电量不足或其他原因自动关机的事件,不包括接收到用户关机指示后关机事件(即用户手动关机的事件)。也就是说,当终端因不同原因关机后,终端的交易场景可能不同。例如,若用户手动关机,终端执行现有技术,那么终端关机后任何卡片不可交易,或者终端关机后仅默认卡可进行交易。若终端因电量不足自动关机,终端执行本申请实施例提供的方法,那么终端关机后在第一卡片列表中卡片可以进行交易。在该示例中,可以避免其他非法获得终端的用户可以通过主动关机的方式进行部分卡片的交易,进一步提升了终端交易的安全性。
S502、业务管理TA接收到关机事件后,向SE模块的CRS查询SE模块中各个卡片的状态。其中,卡片的状态包括激活状态和未激活状态。
S503、CRS向业务管理TA返回SE模块中各个卡片的状态,业务管理TA存储此时各个卡片的状态,即存储关机之前各个卡片的状态。
可选的,TEE模块的业务管理TA还可以从CRS或COS处获取并存储其他相关信息,例如默认卡的信息。默认卡是指SE模块中默认激活的卡片。在具体实现时,默认卡可以是SE模块中某个具体卡片(如交通卡、门禁卡等),也可以是智闪卡。 其中,智闪卡能够根据地理位置、读卡设备等条件自动识别场景,自动激活相应的卡片。
可以理解的是,业务管理TA存储此时SE模块中各个卡片的状态以及其他相关信息,可用于后续终端再次开机时,将SE模块中各个卡片的状态恢复关机前各个卡片的状态。
S504、根据第一卡片列表确定是否存在第一卡片,如果确定存在第一卡片,第一卡片为SE模块中当前处于激活状态的卡片,且第一卡片不在第一卡片列表中,则业务管理TA向CRS发送去激活(deactived)第一卡片。
其中,去激活第一卡片,是指取消第一卡片的激活状态,使得第一卡片处于未激活状态,那么第一卡片不可进行交易。第一卡片的数量为一个或多个。当第一卡片的数量为多个时,业务管理TA可以针对每个第一卡片逐个发送去激活的指令,即业务管理TA向CRS发送多条去激活指令。或者,业务管理TA也可以针对所有的第一卡片发送一条去激活指令,CRS根据该条去激活指令逐个去激活每个第一卡片。本申请实施例对具体的去激活过程不做限定。
TEE模块的业务管理TA根据SE模块中各个卡片的状态,以及预先存储的第一卡片列表,确定第一卡片。可以理解的,如果第一卡片不在第一卡片列表中时,第一卡片是用户不希望终端关机后能够交易的卡片,但此时第一卡片处于激活状态。如果不去激活第一卡片,则在终端关机后,第一卡片仍处于激活状态,那么第一卡片仍然可以进行交易。一方面,如果第一卡片为高安业务(例如进入安全区域的门禁卡,或者包含敏感信息的电子证件等),那么在关机后可以进行交易,存在安全性风险。或者,第一卡片为需要用户认证的卡片,那么在关机后,终端的REE模块和TEE模块均不工作,无法进行用户认证,第一卡片关机后也不可用。另一方面,如果第一卡片与后续需要激活的第二卡片的非接参数出现冲突,那么后续激活第二卡片则可能出现激活失败的情况。因此,本申请实施例去激活第一卡片,有利于保证第一卡片的交易安全,也有利于提高第二卡片关机后交易的成功率。
如果某个卡片处于激活状态,但该卡片在第一卡片列表中,那么该卡片是用户希望关机后能够交易的卡片。那么,业务管理TA无需改变对该卡片的状态。在终端关机后,该卡片处于激活状态,可以进行交易。
在其他一些实施例中,如果确定不存在第一卡片,则直接执行后续步骤S506。
S505、CRS去激活第一卡片后,向业务管理TA返回去激活第一卡片成功的响应。
S506、根据第一卡片列表确定是否存在第二卡片,如果确定存在第二卡片,第二卡片为SE模块中当前处于未激活状态的卡片,且第一卡片在第一卡片列表中,则业务管理TA向CRS发送激活第二卡片。
TEE模块的业务管理TA根据SE模块中各个卡片的状态,以及预先存储的第一卡片列表,确定第二卡片。其中第二卡片的数量为一个或多个。当第二卡片的数量为多个时,业务管理TA可以针对每个第二卡片逐个发送激活的指令,即业务管理TA向CRS发送多条激活指令。或者,业务管理TA也可以针对所有的第二卡片发送一条激活指令,由CRS根据该激活指令逐个激活每个第二卡片,本申请实施例对具体的激活过程不做限定。
S507、CRS向业务管理TA返回激活第二卡片成功的响应。
S508a、业务管理TA向业务管理服务返回关机事件的响应。
S508b、业务管理服务向开关机服务返回关机事件的响应。
步骤S508a和步骤S508b可以在步骤S502之前或之后执行,也可以不执行步骤S508a和步骤S508b。
而后,当终端关机后,第一卡片列表中的卡片(包括在接收到关机事件之前本身处于激活状态的卡片,以及接收到关机事件后激活的第二卡片)处于激活状态,那么第一卡片列表中的卡片在终端关机后处于激活状态。可以理解的是,在终端关机时,终端剩余的电量可为终端的NFC模块和SE模块供电,即终端的NFC模块和SE模块仍可工作。那么,当终端关机后,终端的NFC模块仍可以接收到读卡设备的交易指令(例如选择第一卡片的指令)后,终端的SE模块中第一卡片列表中的卡片能够与读卡设备进行交易。相较于现有技术,终端关机后任何卡片不可交易,或者终端关机后仅默认卡可进行交易的情况,本申请实施例实现在终端关机后多个卡片可进行交易,满足关机场景的交易需求。
另外,需要说明的是,由于在终端确定第一卡片列表时,已经基于卡片交易安全等因素在第一卡片列表中排除了高安业务(例如进入安全区域的门禁卡,或者需要用户认证的大额支付业务,或者包含敏感信息的电子证件等),本申请实施例提高了第一卡片列表中卡片在终端关机后交易的安全性。
如图6所示,为本申请实施例提供的终端再次开机后恢复关机之前各个卡片状态的方法流程示意图,该方法包括:
S601a、REE模块中的开关机服务向REE模块的业务管理服务发送开机事件。
S601b、业务管理服务向TEE模块的业务管理TA转发开机事件。
步骤S601a-步骤S601b,是以REE模块的业务管理服务向开关机服务订阅终端开关机事件为例进行说明的。需要说明的是,在其他一些示例中,TEE模块的业务管理TA也可以直接向REE模块的开关机服务订阅终端开关机事件,那么REE模块的开关机服务在检测到开机事件后,直接向TEE模块的业务管理TA发送开机事件。或者,REE模块的业务APP向REE模块的业务APP订阅终端开机事件,那么REE模块的业务APP在检测到开机事件后,向REE模块的业务APP发送开机事件。而后,REE模块的业务APP直接向TEE模块的业务管理TA转发开机事件,或者经REE模块的业务管理服务向业务管理TA转发开机事件。
S602、业务管理TA获取在关机之前SE模块中各个卡片的状态。其中,卡片的状态包括激活状态和未激活状态。
在上述步骤S503中,TEE模块的业务管理TA已存储关机之前SE模块中各个卡片的状态。
S603、业务管理TA接收到开机事件后,向SE模块的CRS查询SE模块中各个卡片的状态。
需要说明的是,步骤S603可以与步骤S602同时执行,也可以在步骤S602之后或之前执行,本申请不限定步骤S603和步骤S602的执行顺序。
S604、CRS向业务管理TA返回SE模块中各个卡片的状态。
可以理解的是,由于此时终端刚开机,此时查询到的SE模块中各个卡片的状态,与终端关机时各个卡片的状态是相同的。
在其他一些示例中,终端可以根据第一卡片列表确定终端关机时各个卡片的状态。例如,第一卡片列表中的卡片在关机时处于激活状态,不在第一卡片列表中的卡片在关机时处于未激活状态。也就是说,终端也可以不执行步骤S603和步骤S604。
S605、如果第三卡片关机之前处于未激活状态,关机时处于激活状态,则业务管理TA向CRS发送去激活第三卡片。
可以理解的是,此时第三卡片与步骤S506中的第二卡片相同。
S606、CRS向业务管理TA返回去激活第三卡片成功的响应。
S607、如果第四卡片关机之前处于激活状态,关机时处于未激活状态,则业务管理TA向CRS发送激活第四卡片。
可以理解的是,本步骤中的第四卡片与上述步骤S504中的第一卡片相同。
S608、CRS向业务管理TA返回激活第四卡片成功的响应。
S609a、业务管理TA向业务管理服务返回开机事件的响应。
可选的,在一些示例中,业务管理TA在接收到CRS返回的激活第四卡片成功的响应后,还清除业务管理TA存储的关机时各个卡片的状态以及相关信息等。
S609b、业务管理服务向开关机服务返回开机事件的响应。
步骤S609a和步骤S609b可以在步骤S602之前或之后执行,也可以不执行步骤S609a和步骤S609b。
由此可见,当终端再次开机后,SE模块中的各个卡片恢复到关机之前的状态,保留了用户在开机时的操作习惯,避免造成用户使用上的困惑。
这里结合具体的应用场景,对本申请的技术方案进行说明。
具体的应用场景:终端中已添加交通卡、银行卡、车钥匙、门钥匙、门禁卡和支付卡片。终端当前激活的卡片为交通卡。
现有技术:终端关机后,保留关机之前各个卡片的激活状态,即仅交通卡为激活状态,其余卡片为未激活状态。那么,关机之后,终端中仅交通卡可进行交易,其余卡片不可交易。
或者,终端关机后,取消所有卡片的激活状态。那么,关机之后,终端中所有卡片均不可交易。
本申请的技术方案1:用户在图4中(2)所示的界面中设置关机后可交易的卡片为交通卡和车钥匙,即第一卡片列表包括交通卡和车钥匙。其中,银行卡和支付卡片为终端系统默认不能在终端关机后交易的卡片。如果用户设置银行卡或支付卡片在终端关机后为终端可交易的卡片时,终端将发出提示,禁止银行卡或电子支持设置为关机后可交易的卡片。
当检测到终端被用户手动关机或者终端因电量不足等原因自动关机时,终端记录关机之前的卡片状态为:车钥匙为激活状态,其他卡片为未激活状态。终端查询到当前处于激活状态的卡片-车钥匙不在第一卡片列表中,则取消车钥匙的激活状态。进一步,终端查询到在第一卡片列表中的交通卡均处于未激活状态,则终端激活交通卡。当终端关机后,终端中交通卡和车钥匙仍处于激活状态,其余卡片处于未激活状态。 那么,终端中的交通卡和车钥匙可进行交易,其余卡片不能进行交易。
当终端再次开机后,终端根据存储关机之前各个卡片的状态恢复到原来的状态,即车钥匙为激活状态,其他卡片为未激活状态。
本申请的技术方案2:相较于技术方案1,仅终端订阅的关机事件仅包括终端因电量不足等原因自动关机,那么在不同关机场景中有所不同。在一个示例中,如图4中(2)所示,用户可以选择订阅的关机事件包括因电量不足等原因自动关机,不包括用户手动关机事件。
场景1、当检测到用户手动关机时,终端的处理可以采用现有技术,那么技术效果与现有技术相同。即,终端关机后,仅车钥匙可进行交易,其余卡片不可交易。或者,终端中所有卡片均不可交易。
场景2、当检测到终端因电量不足等原因自动关机时,终端的处理与技术方案1相同,技术效果也相同。即,当终端关机后,终端中交通卡和车钥匙仍处于激活状态,其余卡片处于未激活状态。那么,终端中的交通卡和车钥匙可进行交易,其余卡片不能进行交易。
当终端再次开机后,终端根据存储关机之前各个卡片的状态恢复到原来的状态,即车钥匙为激活状态,其他卡片为未激活状态。
可以理解的,对比技术方案1和技术方案2可知,技术方案2可以避免其他非法获得终端的用户可以通过主动关机的方式在终端关机后进行部分卡片的交易,进一步提升了终端交易的安全性。
在其他一些实施例中,SE模块中还可以包括一些具有两个或两个以上工作模式的卡片。终端可以控制这类卡片在终端开机时和关机时处于不同的工作模式,以此满足用户不同的交易需求。
例如:支付类的卡片可以在终端开机时工作在模式2下,在模式2下该卡片可以在用户的认证下进行大额交易,保证交易安全,用户的认证方式包括人脸数据认证,指纹特征认证或密码认证等。支付类的卡片还可以在终端关机时工作在模式1下,在模式1下该卡片可以免用户认证进行小额交易,模式1无需用户认证可以进行免密支付,满足终端关机后用户的支付需求。
又例如:门禁卡可以在终端开机时工作在模式b下,在模式b下该门禁卡可以进入安全区域和一般区域。门禁卡可以在终端关机时工作在模式a下,在模式a下该门禁卡仅可以进入一般区域。
以办公场景为例。在办公环境中,门厅或休息室可以设置为一般区域,工位区以及会议室可以设置为安全区域。某员工的手机开机时,手机中的门禁卡工作在模式b下,门禁卡在用户未进行认证的情况下处于未激活状态。当员工用手机刷休息室的读卡器时,手机提示用户进行认证。在用户认证后,门禁卡处于激活状态,门禁卡和休息室的读卡器进行交互,休息室门解锁,用户可进入休息室。在预设时间段后或者用户退出业务APP后,门禁卡恢复未激活状态。当员工用手机刷会议室的读卡器时,手机提示用户进行认证。在用户认证后,门禁卡处于激活状态,门禁卡和会议室的读卡器进行交互,会议室门解锁,用户可进入会议室。在预设时间段后或者用户退出业务APP后,门禁卡恢复未激活状态。
该员工的手机关机后,手机中的门禁卡工作在模式a下,无需用户进行认证,门禁卡处于激活状态。当员工用手机刷休息室的读卡器时,门禁卡和休息室的读卡器进行交互,休息室的读卡器确定门禁卡工作在模式a下,休息室门解锁,用户可进入休息室。当员工用手机刷会议室的读卡器时,门禁卡和会议室的读卡器进行交互,会议室的读卡器确定门禁卡工作在模式a下,拒绝解锁会议室门,用户不可进入会议室。
又例如:电子证件可以在终端开机时工作在模式1下,在模式1下电子证件可以提供敏感信息和非敏感信息。电子证件可以在终端关机时工作在模式2下,在模式2下该电子证件仅提供非敏感信息。其中,敏感信息例如包括用户的姓名、身份证号、银行卡号等信息。非敏感信息例如包括会员卡号、用户性别、用户生日、办卡时间等信息。
由此,终端在检测到关机事件后,除了需要激活关机后能够交易的卡片外,还需要将具有多种工作模式的卡片切换到关机后的预设模式下。
在一个示例中,终端(例如TEE模块中的业务管理TA)还需要存储有第二卡片列表,该第二卡片列表中包括在关机后需要工作在预设模式下的卡片的信息。一些示例中,第二卡片列表中的卡片也属于关机后可进行交易的卡片,即属于第一卡片列表的卡片。也就是说,第二卡片列表中卡片集合为第一卡片列表中卡片集合的子集。在一些具体示例中,用户可以设置关机后需要切换到预设模式下的卡片。例如,业务APP提供图4中(3)所示的界面,在具有多种工作模式的卡片被设置为关机可进行交易的卡片后,用户可以设置该卡片关机后的预设模式。例如,支付卡关机后的工作模式设置为模式1,门禁卡关机后的工作模式设置为模式a。而后,业务APP根据接收到的用户设置确定第二卡片列表,并将第二卡片列表转发给TEE模块中的业务管理TA。在另一些具体示例中,终端还可以自动确定第二卡片列表。例如,终端判断第一卡片列表中是否存在多种工作模式的卡片。若存在多种工作模式的卡片,则直接确定该卡片为关机后需要切换到预设模式的卡片并且确定各个卡片关机后的预设模式。可以理解的是,第一卡片列表中是关机后能够交易的卡片,若该卡片存在多个工作模式,则关机时需要切换到预设模式,基于卡片交易安全性等因素可以从该卡片的多个工作模式中确定一个模式为预设模式,该预设模式符合终端关机后的交易要求。在一些示例中,符合终端关机后的交易要求的预设模式也可以称为低风险模式。关于第二卡片列表的其他内容可以参考第一卡片列表的相关内容的描述,这里不再展开说明。例如,第一卡片列表包括交通卡、车钥匙、支付卡片和门禁卡。第二卡片列表包括支付卡和门禁卡,且支付卡关机或终端电量小于预设阈值后的预设模式为模式1,门禁卡关机或终端电量小于预设阈值后的预设模式为模式a。
还需要说明的是,第一卡片列表和第二卡片列表可以为独立的两张表,第一卡片列表中包括关机后可进行交易的卡片的信息。第二卡片列表中包括关机后需要处于预设模式的卡片的信息。可以理解的,第一卡片列表中的卡片包含第二卡片列表中的卡片。当然,第一卡片列表和第二卡片列表也可以为同一张表,该表包括所有关机后可进行交易的卡片(即第一卡片列表),并标记出关机后需要工作在预设模式下的卡片(即标记出属于第二卡片列表中的卡片)。本申请实施例对第一卡片列表和第二卡片列表的形式不做限定。以下实施例以第一卡片列表和第二卡片列表为不同的两张表为 例进行示例性说明。
如图7所示,为本申请实施例提供的另一种安全业务的交易方法的流程示意图,该方法包括:
S701a、REE模块中的开关机服务向REE模块的业务管理服务发送关机事件。
S701b、业务管理服务向TEE模块的业务管理TA转发关机事件。
步骤S701a-步骤S701b,是以REE模块的业务管理服务向开关机服务订阅终端开关机事件为例进行说明的。其他内容可以参考上述步骤S501a-步骤S501b的相关内容。
在一些示例中,关机事件包括接收到用户关机指示后关机事件(即用户手动关机的事件)和接收到用户因电量不足或其他原因自动关机的事件。在该示例中,终端因不同原因关机后,终端的交易场景相同,用户体验一致。在另一些示例中,关机事件仅包括接收到用户关机指示后关机事件(即用户手动关机的事件)。也就是说,当终端因不同原因关机后,终端的交易场景可能不同。例如,若用户手动关机,终端执行现有技术,那么终端关机后任何卡片不可交易,或者终端关机后仅默认卡可进行交易。若终端因电量不足自动关机,终端执行本申请实施例提供的方法,那么终端关机后在第一卡片列表中卡片可以进行交易。在该示例中,可以避免其他非法获得终端的用户可以通过主动关机的方式进行部分卡片的交易,进一步提升了终端交易的安全性。
S702、业务管理TA接收到关机事件后,向SE模块的CRS查询SE模块中各个卡片的状态。其中,卡片的状态包括激活状态和未激活状态。
S703、CRS向业务管理TA返回SE模块中各个卡片的状态。
TEE模块的业务管理TA存储此时各个卡片的状态,即存储关机之前各个卡片的状态。
可选的,TEE模块的业务管理TA还可以从SE模块处获取并存储其他相关信息,例如默认卡的信息。默认卡是指SE模块中默认激活的卡片。在具体实现时,默认卡可以是SE模块中某个具体卡片(如交通卡、门禁卡等),也可以是智闪卡。其中,智闪卡能够根据地理位置、读卡设备等条件自动识别场景,自动激活相应的卡片。
在其他一些实施例中,如果终端在执行步骤S703时获取各个卡片的状态时,还获取了各个卡片的模式,便于终端后续判断是否需要切换卡片到指定模式。
可以理解的是,业务管理TA存储此时SE模块中各个卡片的状态以及其他相关信息,可用于后续开机时,将SE模块中各个卡片的状态恢复关机前各个卡片的状态。
S704、如果确定存在第一卡片,第一卡片为SE模块中当前处于激活状态的卡片,且第一卡片不在第一卡片列表中,则业务管理TA向CRS发送去激活第一卡片。
其中,去激活第一卡片,是指取消第一卡片的激活状态,使得第一卡片处于未激活状态,那么第一卡片不可进行交易。第一卡片的数量为一个或多个。当第一卡片的数量为多个时,业务管理TA可以针对每个第一卡片逐个发送去激活的指令,即业务管理TA向CRS发送多条去激活指令。或者,业务管理TA也可以针对所有的第一卡片发送一条去激活指令,CRS根据该条去激活指令逐个去激活每个第一卡片。本申请实施例对具体的去激活过程不做限定。
在其他一些实施例中,如果确定不存在第一卡片,则直接执行后续步骤S706。
S705、CRS向业务管理TA返回去激活第一卡片成功的响应。
S706、业务管理TA针对第二卡片列表中的各个卡片,逐个向CRS发送切换到预设模式的指令。
其中,第二卡片列表中包括一个或多个需要切换到预设模式的卡片。在一些实施例中,第二卡片列表中的卡片在第一卡片列表中。换言之,第二卡片列表中的卡片属于关机后可进行交易的卡片。那么,针对第一卡片列表中需要切换到预设模式下的卡片(即第二卡片列表中的卡片)将其切换到预设模式下。可以理解的是,如果第二卡片列表中的卡片A此时处于激活状态,执行本步骤,将卡片A切换到预设模式。当终端关机后,该卡片A可进行交易。如果第二卡片列表中的卡片B此时处于未激活状态,则先执行本步骤,将卡片B切换到预设模式,而后通过执行步骤S708将卡片B激活。当终端关机后,该卡片B可进行交易。
在一具体实现中,需要切换到预设模式的各个卡片定义各自私有的切换模式的指令,那么,TEE模块中的业务管理TA针对第二卡片列表中的每个卡片逐个发送相应的切换到预设模式的指令。
在其他一些实施例中,如果终端在执行步骤S703时获取各个卡片的状态时,还获取了各个卡片的模式。那么,终端也可以判断第二卡片列表中各个卡片是否处于预设模式。针对第二卡片列表中已处于预设模式的卡片,终端无需发送切换到预设模式的指令。针对未处于第二卡片列表中未处于预设模式的卡片,终端需要发送相应的切换到预设模式的指令。
需要说明的是,步骤S706也可以与步骤S704同时执行,或者在步骤S704之后或之前执行,本申请实施例对步骤S706和步骤S704的执行顺序不做限定。
S707、CRS向业务管理TA返回模式切换成功的响应。
S708、如果确定存在第二卡片,第二卡片为SE模块中当前处于未激活状态的卡片,且第一卡片在第一卡片列表中,则业务管理TA向CRS发送激活第二卡片的指令。
在第二卡片列表中的所有需要切卡模式的卡片均切换成功后,TEE模块的业务管理TA向SE模块的CRS发送激活第二卡片的指令。其中第二卡片的数量为一个或多个。当第二卡片的数量为多个时,业务管理TA可以针对每个第二卡片逐个发送激活的指令,即业务管理TA向CRS发送多条激活指令。或者,业务管理TA也可以针对所有的第二卡片发送一条激活指令,由CRS根据该激活指令逐个激活每个第二卡片,本申请实施例对具体的激活过程不做限定。
需要注意的是,此时需要激活在第一卡片列表中,且当前处于未激活状态的卡片。那么,包括激活不在第二卡片列表中但在第一卡片列表中,且当前处于未激活状态的卡片;以及,激活在第二卡片列表中,且当前处于未激活状态的卡片。也就是说,针对在第二卡片列表中的卡片,且当前处于未激活状态的卡片,先将其切换到预设模式,再将其激活。可以理解的,针对在第二卡片列表中,且当前处于激活状态的卡片,仅需将其切换到指定模式,无需再执行激活操作。
S709、CRS向业务管理TA返回激活第二卡片成功的响应。
S710a、业务管理TA向业务管理服务返回关机事件的响应。
S710b、业务管理服务向开关机服务返回关机事件的响应。
步骤S710a和步骤S710b可以在步骤S702之前或之后执行,也可以不执行步骤 S710a和步骤S710b。
由此可见,当终端关机后,第二卡片列表中的卡片被切换到预设模式(关机时的工作模式),既保证第二卡片列表中的卡片在关机后可以交易,又通过第二卡片列表中的卡片工作在预设模式下保证卡片交易的安全性。本实施例丰富了终端关机后可交易的卡片,满足更多关机场景的交易需求。
如图8所示,为本申请实施例提供的另一种终端再次开机后恢复关机之前各个卡片状态的方法流程示意图,该方法包括:
S801a、REE模块中的开关机服务向REE模块的业务管理服务发送开机事件。
S801b、业务管理服务向业务管理TA转发开机事件。
步骤S801a-步骤S801b,是以REE模块的业务管理服务向开关机服务订阅终端开关机事件为例进行说明的。需要说明的是,在其他一些示例中,TEE模块的业务管理TA也可以直接向REE模块的开关机服务订阅终端开关机事件,那么REE模块的开关机服务在检测到开机事件后,直接向TEE模块的业务管理TA发送开机事件。或者,REE模块的业务APP向REE模块的业务APP订阅终端开机事件,那么REE模块的业务APP在检测到开机事件后,向REE模块的业务APP发送开机事件。而后,REE模块的业务APP直接向TEE模块的业务管理TA转发开机事件,或者经REE模块的业务管理服务向业务管理TA转发开机事件。
S802、业务管理TA获取在关机之前SE模块中各个卡片的状态。其中,卡片的状态包括激活状态和未激活状态。
在上述步骤S703中,TEE模块的业务管理TA已存储关机之前SE模块中各个卡片的状态。
S803、业务管理TA接收到开机事件后,向SE模块的CRS查询SE模块中各个卡片的状态。
需要说明的是,步骤S803可以与步骤S802同时执行,也可以在步骤S802之后或之前执行,本申请不限定步骤S803和步骤S802的执行顺序。
S804、CRS向业务管理TA返回SE模块中各个卡片的状态。
可以理解的是,由于此时终端刚开机,此时查询到的SE模块中各个卡片的状态,与终端开机之前(即关机后)各个卡片的状态是相同的。
在其他一些示例中,终端可以根据第一卡片列表确定终端关机后各个卡片的状态。例如,第一卡片列表中的卡片在关机后处于激活状态,不在第一卡片列表中的卡片在关机后处于未激活状态。也就是说,终端也可以不执行步骤S803和步骤S804。
S805、如果第三卡片关机之前处于未激活状态,关机后处于激活状态,则业务管理TA向CRS发送去激活第三卡片的指令。
可以理解的是,此时第三卡片与步骤S708中的第二卡片相同。第三卡片在第一卡片列表上,包括在第二卡片列表中(即关机后工作在预设模式的卡片),以及不在第二卡片列表中但在第一卡片列表中。其中,第三卡片的数量为一个或多个。
S806、CRS向业务管理TA返回去激活第三卡片成功的响应。
S807、业务管理TA针对第二卡片列表中的各个卡片,逐个向CRS发送切换模式指令。
S808、CRS向业务管理TA返回模式切换成功的响应。
S809、如果第四卡片关机之前处于激活状态,关机后处于未激活状态,则业务管理TA向SE模块发送激活第四卡片的指令。
可以理解的是,本步骤中的第四卡片与上述步骤S704中的第一卡片相同。第四卡片不在第一卡片列表中。其中,第四卡片的数量为一个或多个。
S810、CRS向业务管理TA返回激活第四卡片成功的响应。
S811a、业务管理TA向业务管理服务返回开机事件的响应。
可选的,在一些示例中,TEE模块的业务管理TA在接收到SE模块返回的激活第四卡片成功的响应后,也可以清除TEE模块的业务管理TA存储的关机后各个卡片的状态以及相关信息等。
S811b、业务管理服务向开关机服务返回开机事件的响应。
步骤S811a和步骤S811b可以在步骤S802之前或之后执行,也可以不执行步骤S8011a和步骤S8011b。
由此可见,当终端再次开机后,SE模块中的各个卡片恢复到关机之前的状态,保留了用户在开机时的操作习惯,避免造成用户使用上的困惑。
这里再次结合具体的应用场景,对本申请的技术方案进行说明。
结合前面的应用场景:终端中已添加的卡片有交通卡、银行卡、车钥匙、门钥匙、支付卡片和门禁卡。终端当前激活的卡片为车钥匙和门禁卡。
现有技术:终端关机后,保留关机之前各个卡片的激活状态,即仅车钥匙和门禁卡为激活状态,其余卡片为未激活状态。那么,关机之后,终端中仅车钥匙和门禁卡可进行交易,其余卡片不可交易。
或者,终端关机后,取消所有卡片的激活状态。那么,关机之后,终端中所有卡片均不可交易。
本申请的技术方案3:用户在图4中(3)所示的界面中设置关机后可交易的卡片为交通卡、车钥匙、支付卡片和门禁卡,即第一卡片列表包括交通卡、车钥匙、支付卡片和门禁卡。
其中,支付卡片具有多个模式,一个模式支持用户认证的大额支付功能,另一个模式支持免认证的小额支付功能。那么,终端确认支付卡片在关机时需切换到预设模式-免认证的小额支付功能模式(图中为模式1)。其中,门禁卡具有多个模式,一个模式支持进入安全区域和一般区域,另一个模式支持进入一般区域,不可进入安全区域。那么,终端确认门禁卡在关机时需切换到预设模式-支持进入一般区域,不可进入安全区域(图中为模式a)。即,第二卡片列表包括支付卡片和门禁卡。
当检测到终端被用户手动关机或者终端因电量不足等原因自动关机时,终端记录关机之前的卡片状态为:车钥匙为激活状态,其他卡片为未激活状态,且门禁卡处于模式b,支付卡片处于模式2。终端查询到当前处于激活状态的卡片-车钥匙不在第一卡片列表中,则取消车钥匙的激活状态。若门禁卡当前处于激活状态,由于门禁卡在第一卡片列表中,所以保留门禁卡的激活状态。若门禁卡当前处于未激活状态,由于门禁卡在第一卡片列表中,则无需调整门禁卡的激活状态。
进一步,终端根据第二卡片列表切换支付卡片的模式为预设模式。即,将支付卡 片的模式从模式2切换到模式1,将门禁卡的模式从模式b切换到模式a。而后,终端查询到当前处于未激活状态的卡片,但在第一卡片列表中的门禁卡、支付卡片、交通卡和车钥匙均处于未激活状态,则终端激活门禁卡、支付卡片、交通卡和车钥匙。当终端关机后,终端中门禁卡、支付卡片、交通卡和车钥匙仍处于激活状态,且支付卡片处于预设模式(模式1),门禁卡处于预设模式(模式a),其余卡片处于未激活状态。那么,终端中的门禁卡、支付卡片、交通卡和车钥匙可进行交易,其中支付卡片仅可进行免认证的小额支付交易,门禁卡仅支持进入一般区域,其余卡片不能进行交易。
当终端再次开机后,终端根据存储关机之前各个卡片的状态恢复到原来的状态,即车钥匙和门禁卡为激活状态,其他卡片为未激活状态,且门禁卡切回模式b,支付卡片切换回模式2。
本申请的技术方案4:相较于技术方案3,仅终端订阅的关机事件仅包括终端因电量不足等原因自动关机,那么在不同关机场景中有所不同。
场景3、当检测到用户手动关机时,终端的处理可以采用现有技术,那么技术效果与现有技术相同。即,终端关机后,仅车钥匙可进行交易,其余卡片不可交易。或者,终端中所有卡片均不可交易。
场景4、当检测到终端因电量不足等原因自动关机时,终端的处理与技术方案3相同,技术效果也相同。即,当终端关机后,终端中门禁卡、支付卡片、交通卡和车钥匙仍处于激活状态,且支付卡片处于预设模式(模式1),门禁卡处于预设模式(模式a),其余卡片处于未激活状态。那么,终端中的门禁卡、支付卡片、交通卡和车钥匙可进行交易,其中支付卡片仅可进行免认证的小额支付交易,门禁卡仅支持进入一般区域,其余卡片不能进行交易。
当终端再次开机后,终端根据存储关机之前各个卡片的状态恢复到原来的状态,车钥匙和门禁卡为激活状态,其他卡片为未激活状态,且门禁卡切回模式b,支付卡片切换回模式2。
可以理解的,对比技术方案3和技术方案4可知,技术方案4可以避免其他非法获得终端的用户可以通过主动关机的方式在终端关机后进行部分卡片的交易,进一步提升了终端交易的安全性。
另外,技术方案3和技术方案4,相较于技术方案1和技术方案2,增加了对具有多个工作模式卡片切换到预设模式的处理,更加丰富了终端中卡片的交易场景,满足了终端关机后更多的交易需求。
在另外一些实施例中,第一触发事件还可以是终端电量小于预设阈值的事件,第二触发事件还可以是终端电量等于或大于预设阈值的事件。在一个示例中,可具体由触发事件检测模块中的电量检测服务用于检测第一触发事件和第二触发事件。
终端可以自动设置或者根据用户设置确定第一卡片列表,第一卡片列表包括终端电量小于预设阈值时支持交易的卡片的信息。例如,当终端电量小于预设阈值时,可以选择SE模块中无需要用户认证的卡片。可以理解的是,无需用户认证的卡片在交易时,可以不经过TEE模块和REE模块,有利于节省终端功耗,延长终端的待机时长。可选的,终端还可以确定第二卡片列表,第二卡片列表包括终端电量小于预设阈 值时支持在预设模式下交易的卡片的信息。换言之,当终端电量小于预设阈值时,终端还需要将第二卡片列表中的卡片的工作模式切换到预设模式下。在一个示例中,第二卡片列表中的卡片集合为第一卡片列表集合中的子集。
当终端检测到终端电量小于预设阈值时,终端根据第一卡片列表,将当前处于激活状态但不在第一卡片列表中的卡片去激活;然后将当前处于未激活状态但在第一卡片列表中的卡片激活。可选的,在终端将当前处于未激活状态但在第一卡片列表中的卡片激活之前,终端还根据第二卡片列表,将在第二卡片列表中的卡片分别切换到预设模式下。当终端检测到终端电量等于或大于预设阈值时,终端将各个卡片的状态恢复到检测到终端电量小于预设阈值之前的状态。可选的,将各个卡片的工作模式也切换回检测到终端电量小于预设阈值之前的工作模式。其他内容请参考前述实施例中相关内容的描述,这里不再赘述。
本申请实施例还提供一种芯片系统,如图9所示,该芯片系统包括至少一个处理器1101和至少一个接口电路1102。处理器1101和接口电路1102可通过线路互联。例如,接口电路1102可用于从其它装置(例如终端100的存储器)接收信号。又例如,接口电路1102可用于向其它装置(例如处理器1101)发送信号。示例性的,接口电路1102可读取存储器中存储的指令,并将该指令发送给处理器1101。当指令被处理器1101执行时,可使得终端执行上述实施例中的终端100(比如,手机)执行的各个步骤。当然,该芯片系统还可以包含其他分立器件,本申请实施例对此不作具体限定。
本申请实施例还提供一种装置,该装置包含在终端中,该装置具有实现上述实施例中任一方法中终端行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括至少一个与上述功能相对应的模块或单元。例如,检测模块或单元、显示模块或单元、确定模块或单元、以及计算模块或单元等。
本申请实施例还提供一种计算机存储介质,包括计算机指令,当计算机指令在终端上运行时,使得终端执行如上述实施例中任一方法。
本申请实施例还提供一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行如上述实施例中任一方法。
本申请实施例还提供一种终端上的图形用户界面,终端具有显示屏、摄像头、存储器、以及一个或多个处理器,一个或多个处理器用于执行存储在存储器中的一个或多个计算机程序,图形用户界面包括终端执行如上述实施例中任一方法时显示的图形用户界面。
可以理解的是,上述终端等为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明实施例的范围。
本申请实施例可以根据上述方法示例对上述终端等进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的 形式实现。需要说明的是,本发明实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请实施例各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:快闪存储器、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。
以上,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (16)

  1. 一种卡片的切换方法,其特征在于,应用于终端,所述终端包括第一卡片列表,所述第一卡片列表包括被设置为在所述终端关机时或所述终端的电量小于预设阈值时支持交易的卡片的信息;所述方法包括:
    所述终端处于开机状态时或者所述终端的电量等于或大于所述预设阈值时,所述终端中第一卡片处于未激活状态;
    在所述终端检测到关机事件或者所述终端的电量小于所述预设阈值后,所述终端切换所述第一卡片为激活状态,所述第一卡片列表包括第一卡片。
  2. 根据权利要求1所述的方法,其特征在于,所述终端还包括第二卡片;
    在所述终端处于开机状态时或者所述终端的电量等于或大于所述预设阈值时,所述第二卡片处于激活状态;
    在所述终端检测到关机事件或者所述终端的电量小于所述预设阈值后,且,在所述终端切换所述第一卡片为激活状态之前,所述方法还包括:
    所述终端切换所述第二卡片为未激活状态,所述第一卡片列表不包括第二卡片。
  3. 根据权利要求1或2所述的方法,其特征在于,所述终端还包括第二卡片列表,所述第二卡片列表包括在所述终端关机时或所述终端的电量小于所述预设阈值时被设置为支持在预设模式下交易的卡片的信息,所述第二卡片列表包括所述第一卡片;
    在所述终端检测到关机事件或者所述终端的电量小于所述预设阈值后,且在所述终端切换所述第一卡片为激活状态之前,所述方法还包括:
    所述终端切换所述第一卡片的工作模式为所述预设模式。
  4. 根据权利要求3所述的方法,其特征在于,所述终端还包括第三卡片;
    所述终端处于开机状态时或者所述终端的电量等于或大于所述预设阈值时,所述第三卡片处于激活状态;所述方法还包括:
    在所述终端检测到关机事件或者所述终端的电量小于所述预设阈值后,所述终端切换所述第三卡片的工作模式为所述预设模式,所述第二卡片列表包括所述第三卡片。
  5. 根据权利要求3或4所述的方法,其特征在于,所述第二卡片列表中的卡片集合为所述第一卡片列表中卡片集合的子集。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,在所述终端切换所述第一卡片为激活状态之后,所述方法还包括:
    在所述终端检测到开机事件或者所述终端的电量等于或大于所述预设阈值后,所述终端切换所述第一卡片为未激活状态。
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    所述终端存储所述第一卡片的第一状态,所述第一状态为所述终端处于开机状态时或者所述终端的电量等于或大于所述预设阈值时所述第一卡片的状态;
    所述在所述终端检测到开机事件或者所述终端的电量等于或大于所述预设阈值后,所述终端切换所述第一卡片为未激活状态,包括:
    在所述终端检测到开机事件或者所述终端的电量等于或大于所述预设阈值后,所述终端还获取所述第一卡片的第二状态,所述第二状态为所述终端处于关机状态时或者所述终端的电量小于所述预设阈值时所述第一卡片的状态;
    当所述第一卡片的所述第一状态为未激活状态,且所述第一卡片的所述第二状态为激活状态时,所述终端切换所述第一卡片为未激活状态。
  8. 根据权利要求2所述的方法,其特征在于,在所述终端切换所述第二卡片为未激活状态之后,所述方法还包括:
    在所述终端检测到开机事件或者所述终端的电量等于或大于所述预设阈值后,所述终端切换所述第二卡片为激活状态。
  9. 根据权利要求3所述的方法,其特征在于,在所述终端切换所述第一卡片的工作模式为所述预设模式之后,所述方法还包括:
    在所述终端检测到开机事件或者所述终端的电量等于或大于所述预设阈值后,所述终端切换所述第一卡片为非所述预设模式。
  10. 根据权利要求4所述的方法,其特征在于,在所述终端切换所述第三卡片的工作模式为所述预设模式之后,所述方法还包括:
    在所述终端检测到开机事件或者所述终端的电量等于或大于所述预设阈值后,所述终端切换所述第三卡片为非所述预设模式。
  11. 根据权利要求1-10任一项所述的方法,其特征在于,在所述终端检测到关机事件或者所述终端的电量小于所述预设阈值后,所述终端切换所述第一卡片为激活状态之前,所述方法还包括:
    所述终端接收用户的第一操作,所述终端根据所述第一操作确定所述第一卡片列表。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    所述终端接收用户的第二操作,所述终端根据所述第一卡片列表和所述第二操作确定所述第二卡片列表。
  13. 根据权利要求1-12任一项所述的方法,其特征在于,所述终端包括近场通信NFC模块;在所述终端检测到关机事件或者所述终端的电量小于所述预设阈值后,所述终端切换所述第一卡片为激活状态之后,所述方法还包括:
    在所述终端关机后或者所述终端电量小于所述预设阈值后,所述终端通过所述NFC模块接收到读卡设备选择第一卡片的指令;
    响应于选择所述第一卡片的指令,所述终端中所述第一卡片与所述读卡设备执行交易业务。
  14. 一种终端,其特征在于,包括:处理器、存储器、近场通信NFC模块、安全元件SE模块和触摸屏;所述存储器、所述触摸屏、所述NFC模块、所述SE模块与所述处理器耦合,所述SE模块包括第一卡片,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,当所述处理器从所述存储器中读取所述计算机指令,以使得所述终端执行如权利要求1-13中任一项所述的卡片的切换方法。
  15. 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在终端上运行时,使得所述终端执行如权利要求1-13中任一项的卡片的切换方法。
  16. 一种芯片系统,其特征在于,包括一个或多个处理器,当所述一个或多个处理器执行指令时,所述一个或多个处理器执行如权利要求1-13中任一项所述的卡片的切换方法。
PCT/CN2023/077729 2022-03-09 2023-02-22 一种安全业务的交易方法及终端 WO2023169214A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP23765792.9A EP4354330A1 (en) 2022-03-09 2023-02-22 Transaction method for secure service and terminal

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202210223921.9 2022-03-09
CN202210223921 2022-03-09
CN202210992941.2A CN116776332A (zh) 2022-03-09 2022-08-18 一种安全业务的交易方法及终端
CN202210992941.2 2022-08-18

Publications (1)

Publication Number Publication Date
WO2023169214A1 true WO2023169214A1 (zh) 2023-09-14

Family

ID=87937155

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/077729 WO2023169214A1 (zh) 2022-03-09 2023-02-22 一种安全业务的交易方法及终端

Country Status (2)

Country Link
EP (1) EP4354330A1 (zh)
WO (1) WO2023169214A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190213582A1 (en) * 2018-01-10 2019-07-11 Capital One Services, Llc Electronic wallet device for business transactions
CN112492562A (zh) * 2017-06-02 2021-03-12 华为技术有限公司 一种nfc业务处理方法、终端及nfc芯片
CN112529564A (zh) * 2019-09-18 2021-03-19 华为技术有限公司 近距离无线通信的方法和电子设备
CN113950043A (zh) * 2020-07-17 2022-01-18 深圳酷派技术有限公司 通信方法、装置、存储介质以及终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492562A (zh) * 2017-06-02 2021-03-12 华为技术有限公司 一种nfc业务处理方法、终端及nfc芯片
US20190213582A1 (en) * 2018-01-10 2019-07-11 Capital One Services, Llc Electronic wallet device for business transactions
CN112529564A (zh) * 2019-09-18 2021-03-19 华为技术有限公司 近距离无线通信的方法和电子设备
CN113950043A (zh) * 2020-07-17 2022-01-18 深圳酷派技术有限公司 通信方法、装置、存储介质以及终端

Also Published As

Publication number Publication date
EP4354330A1 (en) 2024-04-17

Similar Documents

Publication Publication Date Title
EP3913522A1 (en) Method for automatically selecting nfc emulation card, electronic apparatus, and communications system
WO2020143408A1 (zh) 显示方法及相关装置
US9832603B2 (en) Apparatus and method for determining a wireless device's location after shutdown
CN109478904B (zh) 一种nfc业务处理方法、终端及存储介质
US10433169B2 (en) Method and device for controlling information transmission, and smart terminal
US10810811B2 (en) Electronic device and method for managing electronic key thereof
WO2021185105A1 (zh) SIM卡和eSIM卡的切换方法及电子设备
JP2022548910A (ja) 近距離通信方法及び電子デバイス
US20230094172A1 (en) Cross-Device Application Invoking Method and Electronic Device
WO2020238778A1 (zh) 一种基于用户身份识别的显示方法及电子设备
CN111835903B (zh) 对nfc标签中的数据进行快速分发的方法及电子设备
WO2022083551A1 (zh) 一种模拟卡的切换方法、电子设备和通信系统
WO2020216160A1 (zh) 一种se的自动路由方法及电子设备
CN112445276A (zh) 一种折叠屏显示应用方法及电子设备
CN113923611A (zh) 一种呼叫转移系统及相关装置
CN113196236A (zh) 一种跨设备认证方法及电子设备
CN112085872A (zh) 基于nfc的解锁方法、相关装置及系统
WO2023169214A1 (zh) 一种安全业务的交易方法及终端
WO2023131209A9 (zh) 终端防盗方法及终端设备
EP4145875A1 (en) Smart card sharing method, electronic device, and computer-readable storage medium
WO2024001767A1 (zh) 安全业务的切换方法及终端
CN113282361B (zh) 一种窗口的处理方法及电子设备
CN116776332A (zh) 一种安全业务的交易方法及终端
CN117979263A (zh) 近场通信业务管理方法及电子设备
CN117950620A (zh) 一种设备控制方法及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23765792

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2023765792

Country of ref document: EP

Ref document number: 23765792.9

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2023765792

Country of ref document: EP

Effective date: 20240111