[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2016045042A1 - 一种安全单元中内容管理的方法及装置 - Google Patents

一种安全单元中内容管理的方法及装置 Download PDF

Info

Publication number
WO2016045042A1
WO2016045042A1 PCT/CN2014/087415 CN2014087415W WO2016045042A1 WO 2016045042 A1 WO2016045042 A1 WO 2016045042A1 CN 2014087415 W CN2014087415 W CN 2014087415W WO 2016045042 A1 WO2016045042 A1 WO 2016045042A1
Authority
WO
WIPO (PCT)
Prior art keywords
tsm
token
security domain
content management
application
Prior art date
Application number
PCT/CN2014/087415
Other languages
English (en)
French (fr)
Inventor
李国庆
常新苗
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2014/087415 priority Critical patent/WO2016045042A1/zh
Priority to CN201480080705.7A priority patent/CN106576239B/zh
Publication of WO2016045042A1 publication Critical patent/WO2016045042A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules

Definitions

  • the present invention relates to the field of computer technologies, and in particular, to a method and apparatus for content management in a security unit.
  • SE Silicon Element
  • NFC Near Field Communication
  • the process of installing an application in the SE is: the user sends a request for installing the application through the terminal, and after receiving the request, the application server requests the TSM (Trust Service Manager) server belonging to the operator for the request.
  • the Token of the application is installed, and the token is sent to the terminal together with the installation command after the token is requested, and is performed by the TSD (Trust Security Domain) having the token verification authority in the terminal SE.
  • TSD Trust Security Domain
  • the installation command is executed by the SD (Security Domain, SD, security domain) having the entrusted management authority in the SE, and the application is installed in the SE.
  • SD Security Domain, SD, security domain
  • SE-authorized application providers can perform SE content management operations such as application installation, update, and deletion on the SE.
  • SE content management tokens generated by the TSM platforms of different operators are different. It is assumed that one application provider contracts with two operators C and U at the same time, and the installation commands of the same application are obtained from the carrier C and the carrier U. It is different, and is recorded as TokenC and TokenU respectively. TokenC sent to the SE issued by the operator C can be authenticated by the token, but the SE sent by the TokenC to the operator U cannot pass the verification.
  • the user accesses the communication network of the operator U using the UICC (Universal Integrated Circuit Card) issued by the operator C, and needs to install the application provided by the operator T of the operator U in the SE issued by the operation bank C.
  • the application provider A will be shipped
  • the TSM of the business U sends an application installation request, and the TSM of the operator U only has the management authority for the security unit issued by the operator U, and the token generated by the operator U can only authorize the application provider A to access the security unit issued by itself;
  • the TSM of the operator C can only issue a token to the application provider B registered in itself, and the provision is used when the provider B accesses the security unit issued by the operator C; the above-mentioned terminal using the SE issued by the operator C
  • the token generated by the carrier U was not verified and could not be installed.
  • an embodiment of the present invention provides a method and apparatus for content management in a security unit SE.
  • the technical solution is as follows:
  • the first aspect a method for content management in a security unit SE, comprising:
  • the application server is registered with the first trusted service management platform TSM;
  • the second token is verified, and after the second token is verified, the security domain corresponding to the first TSM in the SE is invoked to execute the content management command.
  • the method further includes:
  • the security domain corresponding to the first TSM is installed by the security domain corresponding to the second TSM, and the security domain corresponding to the first TSM is installed in the SE. And granting the security domain entrusting management authority corresponding to the first TSM.
  • the method before the verifying the third token, the method further includes:
  • the method further include:
  • the key set is configured to a security domain corresponding to the first TSM.
  • the acquiring, by the second TSM, the second token for managing the SE content includes:
  • the acquiring, by using the second TSM, the second token for managing the SE content includes:
  • the method further includes:
  • the method further includes:
  • the content management command includes at least one of the following operations:
  • a device for content management in a security unit SE includes:
  • a sending module configured to send a content management request to the application server, where the application server is registered in the first trusted service management platform TSM;
  • a first receiving module configured to receive a first token obtained by the application server from the first TSM for verifying whether the content management command is legal, and receiving a content management command returned by the application server;
  • An acquiring module configured to verify the first token, and after the first token is verified, acquire a second token for managing content in the SE by using a second TSM, where the second TSM is configured to Management authority of SE;
  • the execution module is configured to verify the second token, and after the second token is verified, the security domain corresponding to the first TSM in the SE is invoked to execute the content management command.
  • the device further includes:
  • a second receiving module configured to receive a third token obtained by the first TSM from the second TSM for installing the security domain corresponding to the first TSM on the SE, and receiving the first TSM sent for installation An installation command and related data of the security domain corresponding to the first TSM;
  • a verification module configured to verify the third token
  • An installation module configured to: after the third token verification is passed, execute an installation command of the security domain corresponding to the first TSM by using a security domain corresponding to the second TSM, and install the first TSM in the SE Corresponding security domain, and granting the security domain corresponding to the first TSM to delegate management rights.
  • the device further includes:
  • a third receiving module configured to receive a key set sent by the second TSM
  • the device further comprises:
  • a configuration module configured to configure the key set to a security domain corresponding to the first TSM.
  • the acquiring module includes:
  • a generating unit configured to generate, by the security domain corresponding to the first TSM, a second token for managing SE content according to the key set and the content management command.
  • the acquiring module includes:
  • a sending unit configured to send, to the first TSM, a request for managing a second token of the SE content
  • a receiving unit configured to receive the second token that is requested by the first TSM from the second TSM.
  • the device further includes:
  • the first receipt sending module is configured to send, to the second TSM, a receipt for the security domain installation corresponding to the first TSM.
  • the device further includes:
  • a second receipt sending module configured to send the content management command to the second TSM to execute A receipt of merit.
  • the content management command includes at least one of the following operations:
  • a device for content management in a security unit SE includes:
  • the device includes: a processor, a memory, a transmitter, and a receiver,
  • the transmitter is configured to send a content management request to an application server, where the application server is registered in a first trusted service management platform TSM;
  • the receiver is configured to receive a first token obtained by the application server from the first TSM for verifying whether a content management command is legal, and receive a content management command returned by the application server;
  • the processor is configured to verify the first token, and after the first token is verified, obtain a second token for managing content in the SE by using a second TSM, where the second TSM is configured The administrative authority of the SE;
  • the processor is configured to verify the second token, and after the second token is verified, invoke the security domain corresponding to the first TSM in the SE to execute the content management command;
  • the memory is for storing data generated by the processor.
  • the receiver is configured to receive a third token obtained by the first TSM from the second TSM for installing the security domain corresponding to the first TSM on the SE, and receive the first TSM sent for installation An installation command and related data of the security domain corresponding to the first TSM;
  • the processor configured to verify the third token
  • the processor is configured to: after the third token is verified, perform an installation command of installing a security domain corresponding to the first TSM by using a security domain corresponding to the second TSM, and installing the A security domain corresponding to the TSM, and granting a security domain entrusting management authority corresponding to the first TSM.
  • the receiver is configured to receive a key set sent by the second TSM
  • the processor is configured to configure the key set to a security domain corresponding to the first TSM.
  • the processor is configured to generate, by the security domain corresponding to the first TSM, a second token for managing SE content according to the key set and the content management command.
  • the transmitter configured to send, to the first TSM, a request for managing a second token of the SE content
  • the receiver is configured to receive the second token that the first TSM requests from the second TSM.
  • the transmitter is configured to send, to the second TSM, a return receipt of a security domain installation corresponding to the first TSM.
  • the transmitter is configured to send, to the second TSM, a receipt that the content management command is successfully executed.
  • the content management command includes at least one of the following operations:
  • the first order corresponding to the first TSM and the second TSM having the management authority for the SE respectively And the second token, and after the token verification is passed, the content management command is executed by the security domain corresponding to the first TSM in the SE, and the content delivered by the TSM other than the second TSM having the management authority is executed in the SE.
  • Management commands further realize cross-platform content management in SE and improve the efficiency of SE usage.
  • FIG. 1 is a flowchart of a method for content management in a security unit SE according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for content management in a security unit SE according to Embodiment 2 of the present invention
  • FIG. 3 is a flowchart of a method for content management in a security unit SE according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic structural diagram of an apparatus for content management in a security unit SE according to Embodiment 4 of the present invention.
  • FIG. 5 is a schematic structural diagram of a terminal according to Embodiment 5 of the present invention.
  • the embodiment of the invention provides a method for content management in the security unit SE, see FIG.
  • the method includes:
  • Step 102 Receive a first token obtained by the application server from the first TSM for verifying whether a content management command is legal, and receive a content management command returned by the application server.
  • TSM is a module in the mobile payment ecosystem. It can sign cooperation agreements with MNOs, terminal vendors or other entities with SE management rights to assist the application server to deploy certified applications to the SE.
  • the security domain is an application for managing a storage area in the SE, and the storage area can be used to install applications such as mobile payment, bus cards, and access cards, and the security domain performs communication with the outside world for these applications. management.
  • the first TSM and the second token corresponding to the second TSM having the management authority for the SE are respectively acquired, and after the token verification is passed, the security domain of the first TSM in the SE is obtained.
  • the content management command is executed to implement content management commands issued by other TSMs other than the second TSM having the management authority in the SE, thereby further implementing cross-platform content management in the SE and improving the use efficiency of the SE.
  • the embodiment of the invention provides a method for content management in the security unit SE.
  • the terminal can install applications registered in other TSMs and perform SE content management after installing these applications.
  • the second TSM has the management authority TSM for the SE, and the security domain corresponding to the second TSM is installed in the SE, and the installation manner may be that the security domain corresponding to the second TSM is pre-installed when the SE is shipped from the factory. Or allocate storage space in the SE for the security domain corresponding to the second TSM through the OTA (Over the Air Technology) method, load the security domain installation file into the storage space of the SE, and execute the installation command and necessary permissions. Manage to complete the installation process.
  • OTA Over the Air Technology
  • the other TSMs may install the security domain in the storage space managed by the security domain corresponding to the second TSM.
  • the other TSMs are represented by the first TSM.
  • the process of installing the security domain in the SE by the first TSM may include the following two situations:
  • the first case is performed when the application registered in the first TSM is requested for the first time.
  • the user operates the terminal to install the application registered in the first TSM, after sending the application installation request to the application server, the first TSM Querying the local database and discovering that the terminal that sends the request has not installed the security domain corresponding to the first TSM, and then issues related commands and data, and interacts with the terminal to complete the security domain installation process, and then continues to apply the installation;
  • the process of installing the security domain in the SE by the first TSM may be performed in advance before the application registered in the first TSM is installed for the first time.
  • the installation of the security domain corresponding to the first TSM is initiated by the user.
  • the first TSM sends an instruction to the SE to install the security domain corresponding to the first TSM through the second TSM, and after receiving the command, the SE distributes the command to the security domain corresponding to the second TSM, and is processed by the second TSM.
  • the security domain executes the installation command, installs the security domain corresponding to the first TSM in the storage space of the security domain corresponding to the second TSM, and divides a part of the security domain corresponding to the first TSM in the storage space managed by the second TSM, and is in the SE.
  • the security unit and the application management module register the security domain corresponding to the first TSM, and indicate the association relationship between the security domain corresponding to the first TSM and the security domain corresponding to the second TSM, thereby completing the installation of the security domain corresponding to the first TSM.
  • the security domain corresponding to the second TSM needs to be responsible for establishing a channel when the security domain corresponding to the first TSM communicates with the first TSM.
  • the security domain corresponding to the first TSM can establish a channel for the application installed in its storage space to communicate with the remote server.
  • FIG. 2 the process of installing the security domain corresponding to other TSMs before content management of the SE is shown in FIG. 2, including:
  • the terminal sends a content management request to the first TSM, where the content management request carries the terminal identifier.
  • the terminal identifier may include, but is not limited to, an ICCID (Integrate circuit card identity) and/or a SEID (Secure Element Identity), where the SEID may uniquely identify a security unit.
  • ICCID Insulegrate circuit card identity
  • SEID Secure Element Identity
  • the first TSM When receiving the terminal request, the first TSM sends a request to the second TSM to request to install the security domain corresponding to the first TSM.
  • the request for installing the security domain corresponding to the first TSM carries the terminal identifier.
  • the terminal identifier may include, but is not limited to, an ICCID and/or an SEID.
  • the first MNO Mobile Network Operator
  • the first MNO Mobile Network Operator
  • the MNO has a subscription relationship.
  • the first MNO can access the SE of the second MNO under certain conditions, and the SE in the terminal does not have the security domain corresponding to the first TSM. Therefore, the first TSM sends a request to the second TSM to install the first.
  • the second TSM sends a third token of the installation application to the first TSM.
  • the second TSM generates a third token for installing the security domain corresponding to the first TSM on the SE according to the contractual relationship that the first MNO and the second MNO already exist, and returns the third token to the first TSM.
  • the terminal receives a third token obtained by the first TSM from the second TSM for installing the security domain corresponding to the first TSM on the SE, and receiving a security domain that is sent by the first TSM for installing the first TSM. Install commands and related data.
  • the verification process may be performed by the security domain dedicated to verifying the token in the SE to perform the third token step.
  • the terminal After the third token is verified, the terminal performs an installation command of the security domain corresponding to the first TSM by using the security domain corresponding to the second TSM, and installs the security domain corresponding to the first TSM in the SE, and grants the first TSM.
  • the corresponding security domain delegates administrative rights.
  • the security domain corresponding to the first TSM is allocated to the security domain corresponding to the second TSM in the SE, and the process of installing the security domain corresponding to the first TSM is completed after the allocation is completed.
  • the security domain corresponding to the second TSM is an associated security domain of the security domain corresponding to the first TSM.
  • the terminal sends a successful receipt of the security domain installation corresponding to the first TSM to the second TSM.
  • the receipt is generated by a security domain in the security unit that has the return generation permission.
  • the specific operation in the content management request may include at least one of the following operations:
  • the installation of a bus card application is taken as an example.
  • the content management request carries a terminal identifier, where the terminal identifier may include, but is not limited to, an ICCID and/or an SEID.
  • the application server After receiving the content management request sent by the terminal, the application server sends a content management request to the first TSM.
  • the first TSM After receiving the content management request, the first TSM sends a first token to the application server for verifying whether the content management command is legal.
  • the first TSM can check the local database and send the token to the application server after the terminal has installed the security domain corresponding to the first TSM.
  • Step 102 Receive a first token obtained by the application server from the first TSM for verifying whether the content management command is legal, and receive a content management command delivered by the application server.
  • the content management command includes at least one of the following operations:
  • the content management command is: loading an application installation file into the SE or installing an application into the SE
  • the related data corresponding to the content management command such as an installation file of the application
  • the first token is verified by a security domain in the SE dedicated to verifying the token. If the verification is successful, the steps of steps 1031-1032 are performed; if the verification fails, the user is prompted to verify the failure and the installation process is ended.
  • the process of acquiring the second token for managing the content in the SE by using the second TSM is to request the second token from the second TSM by using the first TSM.
  • the process can be:
  • the security domain corresponding to the first TSM passes the second token to the security domain for verifying the second token and completes the verification. After the verification is passed, the confirmation that the token verification is successful is sent. To the security domain corresponding to the first TSM, the security domain corresponding to the first TSM executes the content management command, and returns a successful receipt of the content management command execution to the first TSM after the execution succeeds; otherwise, the error information is returned.
  • step 104 the terminal sends a receipt to the second TSM that the content management command is successfully executed.
  • the first implementation scenario the user terminal uses the SE issued by the domestic operator A. After the user accesses the foreign local carrier B after going abroad, the bus card application registered in the first TSM of the operator B needs to be installed. In this case, the security domain corresponding to the first TSM of the operator B is installed in the SE, and the bus card application is installed after the installation, where the second TSM is the TSM corresponding to the operator A.
  • the second implementation scenario is as follows: the user terminal uses the SE issued by the domestic operator A, the user does not go abroad and accesses the operator A, but needs to install the bus card application registered in the first TSM of the foreign operator B.
  • the security domain corresponding to the first TSM of the operator B is installed in the SE, and the bus card application is installed after the installation.
  • the second TSM is the TSM corresponding to the operator A
  • the first TSM is the TSM corresponding to the operator B.
  • the first token and the second token corresponding to the second TSM having the management authority for the SE are respectively acquired, and after the token verification is passed, the security corresponding to the first TSM in the SE is obtained.
  • the domain execution content management command implements content management commands issued by other TSMs other than the second TSM with management rights in the SE, further realizes cross-platform content management in the SE, and improves the use efficiency of the SE.
  • the embodiment of the invention provides a method for content management in the security unit SE.
  • the security domain corresponding to other TSMs that do not have the SE management authority needs to be installed in the SE.
  • the terminal can install other TSMs. Registered apps and SE content management after installing these apps.
  • the second TSM has the management authority TSM for the SE, and the security domain corresponding to the second TSM is installed in the SE, and the installation manner may be that the SE is pre-installed with the security domain corresponding to the second TSM. Or allocate storage space in the SE for the security domain corresponding to the second TSM through the OTA (Over the Air Technology) method, load the security domain installation file into the storage space of the SE, and execute the installation command and necessary rights management. To complete the installation process.
  • OTA Over the Air Technology
  • the other TSMs may install the security domain in the storage space managed by the security domain corresponding to the second TSM.
  • the other TSMs are represented by the first TSM.
  • the process of installing the security domain in the SE by the first TSM may include the following two situations:
  • the first case is performed when the application registered in the first TSM is requested for the first time.
  • the user operates the terminal to install the application registered in the first TSM, after sending the application installation request to the application server, the first TSM Querying the local database and discovering that the terminal that sends the request has not installed the security domain corresponding to the first TSM, and then issues related commands and data, and interacts with the terminal to complete the security domain installation process, and then continues to apply the installation;
  • the process of installing the security domain in the SE by the first TSM may be performed in advance before the application registered in the first TSM is installed for the first time.
  • the installation of the security domain corresponding to the first TSM is initiated by the user.
  • the first TSM sends an instruction to the SE to install the security domain corresponding to the first TSM through the second TSM, and after receiving the command, the SE distributes the command to the security domain corresponding to the second TSM, and is processed by the second TSM.
  • the security domain executes the installation command, installs the security domain corresponding to the first TSM in the storage space of the security domain corresponding to the second TSM, and divides a part of the security domain corresponding to the first TSM in the storage space managed by the second TSM, and is in the SE.
  • the security unit and the application management module register the security domain corresponding to the first TSM, and indicate the association relationship between the security domain corresponding to the first TSM and the security domain corresponding to the second TSM, thereby completing the installation of the security domain corresponding to the first TSM.
  • the security domain corresponding to the second TSM needs to be responsible for establishing a channel when the security domain corresponding to the first TSM communicates with the first TSM.
  • the security domain corresponding to the first TSM can establish a channel for the application installed in its storage space to communicate with the remote server.
  • FIG. 3 the process of installing the security domain corresponding to other TSMs before content management of the SE is shown in FIG. 3, including:
  • the terminal sends a content management request to the first TSM, where the content management request carries the terminal identifier.
  • the terminal identifier may include, but is not limited to, an ICCID (Integrate circuit card identity) and/or a SEID (Secure Element Identity), where the SEID may uniquely identify a security unit.
  • ICCID Insulegrate circuit card identity
  • SEID Secure Element Identity
  • the first TSM When receiving the terminal request, the first TSM sends a request to the second TSM to request to install the security domain corresponding to the first TSM.
  • the request for installing the security domain corresponding to the first TSM carries the terminal identifier.
  • the terminal identifier may include, but is not limited to, an ICCID and/or an SEID.
  • the first MNO Mobile Network Operator
  • the first MNO Mobile Network Operator
  • the MNO has a subscription relationship.
  • the first MNO can access the SE of the second MNO under certain conditions, and the SE in the terminal does not have the security domain corresponding to the first TSM. Therefore, the first TSM sends a request to the second TSM to install the first.
  • the second TSM sends a third token for installing the application to the first TSM.
  • the second TSM generates a third token for installing the security domain corresponding to the first TSM on the SE according to the contractual relationship that the first MNO and the second MNO already exist, and returns the third token to the first TSM.
  • the terminal receives a third token obtained by the first TSM from the second TSM for installing the security domain corresponding to the first TSM on the SE, and receiving the security domain that is sent by the first TSM for installing the first TSM. Install commands and related data.
  • the steps 304 and 305 may be sent in the same message, or may be separately sent, and are not limited herein.
  • the key set is used to generate a second token that manages content in the SE.
  • the verification process may be performed by the security domain dedicated to verifying the token in the SE to perform the third token step.
  • the terminal After the third token is verified, the terminal performs an installation command of the security domain corresponding to the first TSM, and installs the security domain corresponding to the first TSM in the SE, and grants the first TSM.
  • the corresponding security domain delegates administrative rights.
  • the security domain corresponding to the first TSM is allocated to the security domain corresponding to the second TSM in the SE, and the process of installing the security domain corresponding to the first TSM is completed after the allocation is completed.
  • the security domain corresponding to the second TSM is an associated security domain of the security domain corresponding to the first TSM.
  • the terminal sends a successful receipt of the security domain installation corresponding to the first TSM to the second TSM.
  • the receipt is generated by a security domain in the security unit that has the return generation permission.
  • a security ticket is provided after installing the security domain corresponding to the first TSM.
  • the method of content management in the yuan The flow of content management in the security unit shown in FIG. 1 will be described in detail below in conjunction with a specific processing manner.
  • the specific content may be as follows:
  • the specific operation in the content management request may include at least one of the following operations:
  • the installation of a bus card application is taken as an example.
  • the content management request carries a terminal identifier, where the terminal identifier may include, but is not limited to, an ICCID and/or an SEID.
  • the application server After receiving the content management request sent by the terminal, the application server sends a content management request to the first TSM.
  • the first TSM After receiving the content management request, the first TSM sends a first token to the application server for verifying whether the content management command is legal.
  • the first TSM can check the local database and send the token to the application server after the terminal has installed the security domain corresponding to the first TSM.
  • Step 102 Receive a first token obtained by the application server from the first TSM for verifying whether the content management command is legal, and receive a content management command delivered by the application server.
  • the content management command includes at least one of the following operations:
  • the content management command is: loading an application installation file into the SE or installing an application into the SE
  • the related data corresponding to the content management command such as an installation file of the application
  • the second token for managing the SE content is generated by the security domain corresponding to the first TSM, and the second TSM has the management authority of the SE.
  • the first token is verified by the security domain dedicated to the verification token in the SE. If the verification succeeds, the step of generating the second token is performed; if the verification fails, the user is prompted to verify the failure and terminate the installation process.
  • the process of acquiring the second token for managing the content in the SE by using the second TSM is to generate a second order by using the already configured key set by the already installed security domain corresponding to the first TSM. brand.
  • the security domain corresponding to the first TSM passes the second token to the security domain for verifying the second token and completes the verification.
  • the confirmation that the token verification is successful is sent to the security domain corresponding to the first TSM, and the security domain corresponding to the first TSM executes the content management command, and returns the content management command to the first TSM after the execution succeeds. Receipt; otherwise an error message is returned.
  • step 104 the terminal sends a receipt to the second TSM that the content management command is successfully executed.
  • the first token and the second token corresponding to the second TSM having the management authority for the SE are respectively acquired, and after the token verification is passed, the security corresponding to the first TSM in the SE is obtained.
  • the domain execution content management command implements content management commands issued by other TSMs other than the second TSM with management rights in the SE, further realizes cross-platform content management in the SE, and improves the use efficiency of the SE.
  • An embodiment of the present invention provides a device for managing content in a security unit SE.
  • the device includes:
  • the sending module 401 is configured to send a content management request to the application server, where the application server is registered in the first trusted service management platform TSM;
  • the first receiving module 402 is configured to receive a first token obtained by the application server from the first TSM for verifying whether the content management command is legal, and receive a content management command returned by the application server;
  • the obtaining module 403 is configured to verify the first token, and after the first token is verified, obtain a second token for managing content in the SE by using the second TSM, where the second TSM has the management authority of the SE;
  • the execution module 404 is configured to verify the second token, and after the second token is verified, the content management command is executed by the security domain corresponding to the first TSM in the SE.
  • the device further comprises:
  • the second receiving module 405 is configured to receive a third token obtained by the first TSM from the second TSM for installing the security domain corresponding to the first TSM on the SE, and receive the first TSM sent to install the first TSM.
  • a verification module 406, configured to verify the third token
  • the installation module 407 is configured to: after the third token verification is passed, execute the installation command of the security domain corresponding to the first TSM by the security domain corresponding to the second TSM, install the security domain corresponding to the first TSM in the SE, and grant the security domain The security domain corresponding to the first TSM delegates administrative rights.
  • the device further comprises:
  • a third receiving module 408, configured to receive a key set sent by the second TSM
  • the device further comprises:
  • the configuration module 409 is configured to configure the key set to the security domain corresponding to the first TSM.
  • the obtaining module 403 includes:
  • a generating unit configured to generate, by the security domain corresponding to the first TSM, a second token for managing the SE content according to the key set and the content management command.
  • the obtaining module 403 further includes:
  • a sending unit configured to send, to the first TSM, a request for managing a second token of the SE content
  • a receiving unit configured to receive a second token that is requested by the first TSM from the second TSM.
  • the device further comprises:
  • the first receipt sending module 410 is configured to send, to the second TSM, a receipt of a security domain installation successful corresponding to the first TSM.
  • the device further comprises:
  • the second receipt sending module 411 is configured to send the content management command to the second TSM successfully. receipt.
  • the content management command includes at least one of the following operations:
  • the first token and the second token corresponding to the second TSM having the management authority for the SE are respectively acquired, and after the token verification is passed, the security corresponding to the first TSM in the SE is obtained.
  • the domain execution content management command implements content management commands issued by other TSMs other than the second TSM with management rights in the SE, further realizes cross-platform content management in the SE, and improves the use efficiency of the SE.
  • An embodiment of the present invention provides a terminal, as shown in FIG. 5.
  • the terminal includes: a processor 501, a transmitter 502, and a receiver 503,
  • the transmitter 503 is configured to send a content management request to an application server, where the application server is registered in the first trusted service management platform TSM;
  • the receiver 504 is configured to receive a first token obtained by the application server from the first TSM for verifying whether a content management command is legal, and receive a content management command returned by the application server;
  • the processor 501 is configured to verify the first token, and after the first token is verified, obtain, by using the second TSM, a second token for managing content in the SE, where the second TSM Having the management authority of the SE; verifying the second token, and after the second token is verified, calling the security domain corresponding to the first TSM in the SE to execute the content management command;
  • the receiver 503 may be further configured to receive a third token obtained by the first TSM from the second TSM for installing the security domain corresponding to the first TSM on the SE, and receive the first TSM transmission.
  • the processor 501 is further configured to verify the third token; after the third token is verified, the security domain corresponding to the first TSM is installed by the security domain corresponding to the second TSM.
  • the installation command is to install the security domain corresponding to the first TSM in the SE, and grant the security domain corresponding management authority corresponding to the first TSM.
  • the receiver 503 is further configured to receive a key set sent by the second TSM;
  • the processor 501 is further configured to configure the key set to a security domain corresponding to the first TSM.
  • the processor 501 is further configured to generate, by the security domain corresponding to the first TSM, a second token for managing SE content according to the key set and the content management command.
  • the transmitter 502 may be further configured to send, to the first TSM, a request for managing a second token of the SE content;
  • the receiver 503 is further configured to receive the second token that is requested by the first TSM from the second TSM.
  • the transmitter 502 may be further configured to send, to the second TSM, a return receipt of the security domain installation corresponding to the first TSM.
  • the transmitter 502 is further configured to send, to the second TSM, a receipt that the content management command is successfully executed.
  • the content management command includes at least one of the following operations:
  • the first TSM is obtained separately, and the second management right is provided to the SE.
  • the content management commands issued by other TSMs further realize cross-platform content management in SE and improve the efficiency of SE usage.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a flash memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

本发明实施例提供了一种安全单元SE中内容管理的方法及装置,涉及计算机技术领域,方法包括:向应用服务器发送内容管理请求,应用服务器注册于第一可信服务管理平台TSM;接收应用服务器从第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收应用服务器返回的内容管理命令;验证第一令牌,并在第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,第二TSM具备SE的管理权限;验证第二令牌,并在第二令牌验证通过后,由SE中第一TSM对应的安全域执行内容管理命令。本发明实现了在SE中执行具备管理权限的第二TSM以外其他TSM下发的内容管理命令,进一步实现了SE中跨平台的内容管理,提高了SE的使用效率。

Description

一种安全单元中内容管理的方法及装置 技术领域
本发明涉及计算机技术领域,特别涉及一种安全单元中内容管理的方法及装置。
背景技术
SE(Secure Element,安全单元)是一种具有防内容篡改功能的微控制器,为终端中安装在SE上的应用提供安全的存储和运行环境。当前,SE广泛用于基于NFC(Near Field Communication,近场通信)的移动支付场景中,用户可以通过终端在SE中安装移动支付、公交卡、门禁卡等类别的应用,并通过NFC接口与非接触读卡器进行通信。
依据现有技术,在SE中安装应用的过程为:用户通过终端发送安装应用的请求,应用服务器接收到该请求后向属于运营商的TSM(Trust Service Manager,可信服务管理)服务器请求用于安装应用的令牌(Token),在请求到令牌后将该令牌与安装命令一起发送给终端,并由终端SE中具备令牌验证权限的TSD(Trust Security Domain,可信安全域)进行验证,验证通过后由SE中具备委托管理权限的SD(Security Domain,SD,安全域)执行安装命令,将该应用安装于SE中。在实际部署环境中,不同的运营商拥有不同的TSM服务器,用于管理各自发行的SE。只有获得TSM授权的应用提供商才可以对SE进行应用安装、更新和删除等SE内容管理操作。不同运营商的TSM平台生成的SE内容管理令牌不同;假定一个应用提供商与两个运营商C和U同时签约,同一个应用的安装命令从运营商C和运营商U处获得的令牌是不同的,分别记为TokenC和TokenU,TokenC发送到运营商C发行的SE处可以通过令牌验证,但TokenC发送至运营商U发行的SE处则无法通过验证。
发明人发现现有技术至少存在以下问题:
当用户使用运营商C发行的UICC(Universal Integrated Circuit Card,通用集成电路卡)接入运营商U的通信网络,并且需要向运营行C发行的SE内安装注册于运营商U的TSM的应用提供商A的应用时,该应用提供商A将向运 营商U的TSM发送应用安装请求,而运营商U的TSM只对运营商U发行的安全单元具有管理权限,运营商U生成的令牌只能授权应用提供商A访问自己发行的安全单元;同样的,运营商C的TSM只能向在自身中注册的应用提供商B发放令牌,供应用提供商B访问运营商C发行的安全单元时使用;上述使用运营商C发行的SE的终端接收到运营商U生成的令牌,无法通过验证,导致无法安装该应用。
发明内容
为了解决现有技术的缺陷,本发明实施例提供了一种安全单元SE中内容管理的方法及装置。所述技术方案如下:
第一方面、一种安全单元SE中内容管理的方法,包括:
向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM;
接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器返回的内容管理命令;
验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备所述SE的管理权限;
验证所述第二令牌,并在所述第二令牌验证通过后,调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令。
在第一方面的第一种可能的实现方式中,所述方法还包括:
接收第一TSM从第二TSM获得的用于在SE上安装所述第一TSM对应的安全域的第三令牌,以及接收所述第一TSM发送的用于安装所述第一TSM对应的安全域的安装命令和相关数据;
验证所述第三令牌;
在所述第三令牌验证通过后,由所述第二TSM对应的安全域执行安装所述第一TSM对应的安全域的安装命令,在SE中安装所述第一TSM对应的安全域,并授予所述第一TSM对应的安全域委托管理权限。
结合第一方面的第一种可能的实现方式,在第一方面的第二种可能的实现方式中,所述验证所述第三令牌之前,所述方法还包括:
接收所述第二TSM发送的密钥集;
相应的,所述在SE中安装所述第一TSM对应的安全域之后,所述方法还 包括:
将所述密钥集配置到所述第一TSM对应的安全域中。
结合第一方面的第二种可能的实现方式,在第一方面的第三种可能的实现方式中,所述通过第二TSM获取用于管理SE内容的第二令牌,包括:
根据所述密钥集以及所述内容管理命令,由所述第一TSM对应的安全域生成用于管理SE内容的第二令牌。
在第一方面的第四种可能的实现方式中,所述通过第二TSM获取用于管理SE内容的第二令牌,包括:
向所述第一TSM发送用于管理SE内容的第二令牌的请求;
接收所述第一TSM从第二TSM请求到的所述第二令牌。
结合第一方面的第一种可能的实现方式,在第一方面的第五种可能的实现方式中,所述在SE中安装所述第一TSM对应的安全域之后,所述方法还包括:
向所述第二TSM发送所述第一TSM对应的安全域安装成功的回执。
在第一方面的第六种可能的实现方式中,所述调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令之后,所述方法还包括:
向所述第二TSM发送所述内容管理命令执行成功的回执。
在第一方面的第七种可能的实现方式中,所述内容管理命令包括以下操作中的至少一种:
向所述SE内载入应用安装文件;
向所述SE内安装应用;
配置所述SE内已经安装的应用;
删除所述SE内的应用和/或应用数据;
删除所述SE内的应用安装文件;
更新所述应用对应的注册表信息。
第二方面、一种安全单元SE中内容管理的装置,包括:
发送模块,用于向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM;
第一接收模块,用于接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器返回的内容管理命令;
获取模块,用于验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备所述SE的管理权限;
执行模块,用于验证所述第二令牌,并在所述第二令牌验证通过后,调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令。
在第二方面的第一种可能的实现方式中,所述装置还包括:
第二接收模块,用于接收第一TSM从第二TSM获得的用于在SE上安装所述第一TSM对应的安全域的第三令牌,以及接收所述第一TSM发送的用于安装所述第一TSM对应的安全域的安装命令和相关数据;
验证模块,用于验证所述第三令牌;
安装模块,用于在所述第三令牌验证通过后,由所述第二TSM对应的安全域执行安装所述第一TSM对应的安全域的安装命令,在SE中安装所述第一TSM对应的安全域,并授予所述第一TSM对应的安全域委托管理权限。
结合第二方面的第一种可能的实现方式,在第二方面的第二种可能的实现方式中,所述装置还包括:
第三接收模块,用于接收所述第二TSM发送的密钥集;
相应的,所述装置还包括:
配置模块,用于将所述密钥集配置到所述第一TSM对应的安全域中。
结合第二方面的第二种可能的实现方式,在第二方面的第三种可能的实现方式中,所述获取模块,包括:
生成单元,用于根据所述密钥集以及所述内容管理命令,由所述第一TSM对应的安全域生成用于管理SE内容的第二令牌。
在第二方面的第四种可能的实现方式中,所述获取模块,包括:
发送单元,用于向所述第一TSM发送用于管理SE内容的第二令牌的请求;
接收单元,用于接收所述第一TSM从第二TSM请求到的所述第二令牌。
结合第二方面的第一种可能的实现方式,在第二方面的第五种可能的实现方式中,所述装置还包括:
第一回执发送模块,用于向所述第二TSM发送所述第一TSM对应的安全域安装成功的回执。
在第二方面的第六种可能的实现方式中,所述装置还包括:
第二回执发送模块,用于向所述第二TSM发送所述内容管理命令执行成 功的回执。
在第二方面的第七种可能的实现方式中,所述内容管理命令包括以下操作中的至少一种:
向所述SE内载入应用安装文件;
向所述SE内安装应用;
配置所述SE内已经安装的应用;
删除所述SE内的应用和/或应用数据;
删除所述SE内的应用安装文件;
更新所述应用对应的注册表信息。
第三方面、一种安全单元SE中内容管理的装置,包括:
所述装置包括:处理器,存储器,发射器和接收器,
所述发射器,用于向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM;
所述接收器,用于接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器返回的内容管理命令;
所述处理器,用于验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备所述SE的管理权限;
所述处理器,用于验证所述第二令牌,并在所述第二令牌验证通过后,调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令;
所述存储器用于存储所述处理器产生的数据。
在第二方面的第一种可能的实现方式中,
所述接收器,用于接收第一TSM从第二TSM获得的用于在SE上安装所述第一TSM对应的安全域的第三令牌,以及接收所述第一TSM发送的用于安装所述第一TSM对应的安全域的安装命令和相关数据;
所述处理器,用于验证所述第三令牌;
所述处理器,用于在所述第三令牌验证通过后,由所述第二TSM对应的安全域执行安装所述第一TSM对应的安全域的安装命令,在SE中安装所述第一TSM对应的安全域,并授予所述第一TSM对应的安全域委托管理权限。
结合第二方面的第一种可能的实现方式,在第二方面的第二种可能的实现方式中,
所述接收器,用于接收所述第二TSM发送的密钥集;
相应的,所述处理器,用于将所述密钥集配置到所述第一TSM对应的安全域中。
结合第二方面的第二种可能的实现方式,在第二方面的第三种可能的实现方式中,
所述处理器,用于根据所述密钥集以及所述内容管理命令,由所述第一TSM对应的安全域生成用于管理SE内容的第二令牌。
在第二方面的第四种可能的实现方式中,
所述发射器,用于向所述第一TSM发送用于管理SE内容的第二令牌的请求;
所述接收器,用于接收所述第一TSM从第二TSM请求到的所述第二令牌。
结合第二方面的第一种可能的实现方式,在第二方面的第五种可能的实现方式中,
所述发射器,用于向所述第二TSM发送所述第一TSM对应的安全域安装成功的回执。
在第二方面的第六种可能的实现方式中,
所述发射器,用于向所述第二TSM发送所述内容管理命令执行成功的回执。
在第二方面的第七种可能的实现方式中,所述内容管理命令包括以下操作中的至少一种:
向所述SE内载入应用安装文件;
向所述SE内安装应用;
配置所述SE内已经安装的应用;
删除所述SE内的应用和/或应用数据;
删除所述SE内的应用安装文件;
更新所述应用对应的注册表信息。
本发明实施例提供的技术方案的有益效果是:
通过分别获取第一TSM和对SE具备管理权限的第二TSM对应的第一令 牌和第二令牌,并在令牌验证通过后,由SE中第一TSM对应的安全域执行内容管理命令,实现了在SE中执行具备管理权限的第二TSM以外其他TSM下发的内容管理命令,进一步实现了SE中跨平台的内容管理,提高了SE的使用效率。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例1提供的安全单元SE中内容管理的方法流程图;
图2是本发明实施例2提供的安全单元SE中内容管理的方法流程图;
图3是本发明实施例2提供的安全单元SE中内容管理的方法流程图;
图4是本发明实施例4提供的安全单元SE中内容管理的装置的结构示意图;
图5是本发明实施例5提供的终端的结构示意图。
具体实施方式
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。
实施例1
本发明实施例提供了一种安全单元SE中内容管理的方法,参见图1。该方法包括:
101:向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM;
102:接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器返回的内容管理命令;
103:验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备SE的管理权限;
104:验证所述第二令牌,并在所述第二令牌验证通过后,调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令。
其中,TSM是移动支付生态系统中的一个模块,可以与MNO、终端厂商或其他拥有SE管理权限的实体签署合作协议,协助应用服务器把认证的应用部署到SE中。
其中,安全域是用于管理SE中一块存储区域的应用程序,该存储区域可以用来安装移动支付、公交卡、门禁卡等类别的应用程序,而安全域则对这些应用程序与外界通信进行管理。
本发明实施例中通过分别获取第一TSM和对SE具备管理权限的第二TSM对应的第一令牌和第二令牌,并在令牌验证通过后,由SE中第一TSM的安全域执行内容管理命令,实现了在SE中执行具备管理权限的第二TSM以外其他TSM下发的内容管理命令,进一步实现了SE中跨平台的内容管理,提高了SE的使用效率。
实施例2
本发明实施例提供了一种安全单元SE中内容管理的方法。
需要说明的是在对SE进行内容管理之前,需要在SE中安装不具备该SE管理权限的其他TSM对应的安全域。在其他TSM对应的安全域在SE中安装后,终端才可以安装其他TSM中注册的应用,并在安装这些应用后进行SE内容管理。
其中,在本发明实施例中第二TSM为对SE具备管理权限TSM,SE中已经安装有第二TSM对应的安全域,其安装方式可以是SE出厂时预先安装对应于第二TSM的安全域,或者通过OTA(Over the Air Technology,空中下载技术)方式在SE中为第二TSM对应的安全域分配存储空间,将安全域安装文件装载到SE的存储空间内并执行安装命令和必要的权限管理以完成安装过程。
进一步的,其他TSM可以在第二TSM对应的安全域管理的存储空间内安装安全域,在本发明实施例中其他TSM用第一TSM表示。
第一TSM在SE中安装安全域的过程可以包括以下两种情况:
第一种情况:在首次请求安装第一TSM中注册的应用时进行,此种情况下在用户操作终端安装第一TSM中注册的应用时,在向应用服务器发送应用安装请求之后,第一TSM查询本地数据库发现此发送请求的终端尚未安装第一TSM对应的安全域,于是下发相关命令和数据,与终端交互完成安全域安装过程,之后继续应用安装;
第二种情况,第一TSM在SE中安装安全域的过程可以在首次安装第一TSM中注册的应用之前预先进行,第一TSM对应的安全域的安装由用户主动发起。
这里,对何时在SE中安装第一TSM对应的安全域不做限定。
例如,第一TSM通过第二TSM,向SE发送安装第一TSM对应的安全域的指令,SE收到命令后,将命令分发给第二TSM对应的安全域处理,并由第二TSM对应的安全域执行安装命令,在第二TSM对应的安全域的存储空间内安装第一TSM对应的安全域,并在自己管理的存储空间内划分一部分给第一TSM对应的安全域,并在SE中的安全单元和应用管理模块注册第一TSM对应的安全域,并注明第一TSM对应的安全域与第二TSM对应的安全域的关联关系,至此完成第一TSM对应的安全域的安装。
其中,第一TSM对应的安全域与第一TSM通信时,需要由第二TSM对应的安全域负责建立通道。而第一TSM对应的安全域可以为安装到其存储空间内的应用和远端服务器通信建立通道。
因此,作为对SE进行内容管理的方法的一部分,在对SE进行内容管理之前安装其他TSM对应的安全域的过程参见图2,包括:
201:终端向第一TSM发送内容管理请求,内容管理请求中携带终端标识。
其中终端标识可以包括但不限于:ICCID(Integrate circuit card identity,集成电路卡识别码)和/或SEID(Secure Element identity,安全单元标识),这里SEID可以唯一标识一个安全单元。
202:第一TSM收到终端请求时,向第二TSM发送请求安装第一TSM对应的安全域的请求。其中,安装第一TSM对应的安全域的请求中携带终端标识。
其中终端标识可以包括但不限于:ICCID和/或SEID。
第一TSM接收到终端发送的应用安装请求后,第一MNO(Mobile Network Operator,移动网络运营商)检查自己的数据库,通过终端标识发现该终端归属于第二MNO,并且第一MNO和第二MNO已经存在签约关系,第一MNO可以在一定条件下访问第二MNO的SE,且该终端中的SE尚未安装第一TSM对应的安全域,因此第一TSM向第二TSM发送请求安装第一TSM对应的安全域的请求。
203:第二TSM向第一TSM发送安装应用的第三令牌。
第二TSM根据第一MNO和第二MNO已经存在的签约关系,生成用于在SE上安装第一TSM对应的安全域的第三令牌,并将第三令牌返回给第一TSM。
204:终端接收第一TSM从第二TSM获得的用于在SE上安装第一TSM对应的安全域的第三令牌,以及接收第一TSM发送的用于安装第一TSM对应的安全域的安装命令和相关数据。
205:验证第三令牌。
其中,验证过程可以由SE中专门用于验证令牌的安全域验证进行第三令牌的步骤。
206:终端在第三令牌验证通过后,由第二TSM对应的安全域执行安装第一TSM对应的安全域的安装命令,在SE中安装第一TSM对应的安全域,并授予第一TSM对应的安全域委托管理权限。
在SE中第二TSM对应的安全域中为第一TSM对应的安全域分配存储空间,在分配完毕后完成安装第一TSM对应的安全域的过程。
其中,第二TSM对应的安全域为第一TSM对应的安全域的关联安全域。
207:终端向第二TSM发送第一TSM对应的安全域安装成功的回执。
其中,回执由安全单元中具有回执生成权限的安全域生成。
在本发明实施例中,安装第一TSM对应的安全域后,提供了一种安全单元中内容管理的方法。下面将结合具体的处理方式,对图1所示的安全单元中内容管理的流程进行详细的说明,具体内容可以如下:
101:向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM。
其中,内容管理请求中具体的操作可以包括以下操作中的至少一种:
向SE内载入应用安装文件的操作;
向SE内安装应用的操作;
配置SE内已经安装的应用的操作;
删除SE内的应用和/或应用数据的操作;
删除SE内的应用安装文件的操作;
更新应用对应的注册表信息的操作。
在本发明实施例中,以安装一个公交卡应用为例进行说明,内容管理请求中携带终端标识,其中终端标识可以包括但不限于:ICCID和/或SEID。
应用服务器在接收到终端发送的内容管理请求之后,向第一TSM发送内容管理请求。
第一TSM在接收到内容管理请求之后,向应用服务器发送用于验证内容管理命令是否合法的第一令牌。
其中,第一TSM可以检查本地数据库,发现该终端已经安装有第一TSM对应的安全域之后才会向应用服务器发送令牌。
102:接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器下发的内容管理命令;
其中,内容管理命令包括以下操作中的至少一种:
向SE内载入应用安装文件;
向SE内安装应用;
配置SE内已经安装的应用;
删除SE内的应用和/或应用数据;
删除SE内的应用安装文件;
更新应用对应的注册表信息。
可选的,当内容管理命令为:向SE内载入应用安装文件或向SE内安装应用时,还会携带内容管理命令对应的相关数据,例如应用的安装文件等。
103:验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备SE的管理权限。
其中,通过SE中专门用于验证令牌的安全域验证第一令牌。如果验证成功则执行步骤1031-1032的步骤;如果验证失败则提示用户验证失败并结束安装流程。
在本发明实施例中,通过第二TSM获取用于管理SE中内容的第二令牌的过程为通过第一TSM向第二TSM请求第二令牌。
相应的,该过程可以为:
1031:向第一TSM发送用于管理SE内容的第二令牌的请求;
1032:接收第一TSM从第二TSM请求到的第二令牌。
104:验证所述第二令牌,并在所述第二令牌验证通过后,由SE中所述第一TSM对应的安全域执行内容管理命令。
其中,在一个实施例中,第一TSM对应的安全域将第二令牌传递给用于验证第二令牌的安全域并完成验证。在验证通过后,发送令牌验证成功的确认 给第一TSM对应的安全域,第一TSM对应的安全域则执行内容管理命令,并在执行成功后向第一TSM返回内容管理命令执行成功的回执;否则返回错误信息。
步骤104之后,终端向第二TSM发送内容管理命令执行成功的回执。
其中,对于本发明实施例中的具体实施场景可以通过以下实例进行描述:
第一种实施场景:用户终端使用国内运营商A发行的SE,该用户出国后接入国外当地运营商B后,需要要安装注册于运营商B的第一TSM中的公交卡应用,此种情况下在SE中安装运营商B的第一TSM对应的安全域,并在安装后安装公交卡应用,其中第二TSM为运营商A对应的TSM。
第二种实施场景:用户终端使用国内运营商A发行的SE,用户未出国并且接入的是运营商A,但需要安装注册于国外运营商B的第一TSM中的公交卡应用,此种情况下在SE中安装运营商B的第一TSM对应的安全域,并在安装后安装公交卡应用,其中第二TSM为运营商A对应的TSM,第一TSM为运营商B对应的TSM。
本发明实施例中通过分别获取第一TSM和对SE具备管理权限的第二TSM对应的第一令牌和第二令牌,并在令牌验证通过后,由SE中第一TSM对应的安全域执行内容管理命令,实现了在SE中执行具备管理权限的第二TSM以外其他TSM下发的内容管理命令,进一步实现了SE中跨平台的内容管理,提高了SE的使用效率。
实施例3
本发明实施例提供了一种安全单元SE中内容管理的方法。
需要说明的是在对SE进行内容管理之前,需要在SE中安装不具备该SE管理权限的其他TSM对应的安全域,在其他TSM对应的安全域在SE中安装后,终端才可以安装其他TSM中注册的应用,并在安装这些应用后进行SE内容管理。
其中,在本发明实施例中第二TSM为对SE具备管理权限TSM,SE中已经安装有第二TSM对应的安全域,其安装方式可以是SE出厂时预先安装对应第二TSM的安全域,或者通过OTA(Over the Air Technology,空中下载技术)方式在SE中为第二TSM对应的安全域分配存储空间,将安全域安装文件装载到SE的存储空间内并执行安装命令和必要的权限管理以完成安装过程。
进一步的,其他TSM可以在第二TSM对应的安全域管理的存储空间内安装安全域,在本发明实施例中其他TSM用第一TSM表示。
第一TSM在SE中安装安全域的过程可以包括以下两种情况:
第一种情况:在首次请求安装第一TSM中注册的应用时进行,此种情况下在用户操作终端安装第一TSM中注册的应用时,在向应用服务器发送应用安装请求之后,第一TSM查询本地数据库发现此发送请求的终端尚未安装第一TSM对应的安全域,于是下发相关命令和数据,与终端交互完成安全域安装过程,之后继续应用安装;
第二种情况,第一TSM在SE中安装安全域的过程可以在首次安装第一TSM中注册的应用之前预先进行,第一TSM对应的安全域的安装由用户主动发起。
这里,对何时在SE中安装第一TSM对应的安全域不做限定。
例如,第一TSM通过第二TSM,向SE发送安装第一TSM对应的安全域的指令,SE收到命令后,将命令分发给第二TSM对应的安全域处理,并由第二TSM对应的安全域执行安装命令,在第二TSM对应的安全域的存储空间内安装第一TSM对应的安全域,并在自己管理的存储空间内划分一部分给第一TSM对应的安全域,并在SE中的安全单元和应用管理模块注册第一TSM对应的安全域,并注明第一TSM对应的安全域与第二TSM对应的安全域的关联关系,至此完成第一TSM对应的安全域的安装。
其中,第一TSM对应的安全域与第一TSM通信时,需要由第二TSM对应的安全域负责建立通道。而第一TSM对应的安全域可以为安装到其存储空间内的应用和远端服务器通信建立通道。
因此,作为对SE进行内容管理的方法的一部分,在对SE进行内容管理之前安装其他TSM对应的安全域的过程参见图3,包括:
301:终端向第一TSM发送内容管理请求,内容管理请求中携带终端标识。
其中终端标识可以包括但不限于:ICCID(Integrate circuit card identity,集成电路卡识别码)和/或SEID(Secure Element identity,安全单元标识),这里SEID可以唯一标识一个安全单元。
302:第一TSM收到终端请求时,向第二TSM发送请求安装第一TSM对应的安全域的请求。其中,安装第一TSM对应的安全域的请求中携带终端标识。
其中终端标识可以包括但不限于:ICCID和/或SEID。
第一TSM接收到终端发送的应用安装请求后,第一MNO(Mobile Network Operator,移动网络运营商)检查自己的数据库,通过终端标识发现该终端归属于第二MNO,并且第一MNO和第二MNO已经存在签约关系,第一MNO可以在一定条件下访问第二MNO的SE,且该终端中的SE尚未安装第一TSM对应的安全域,因此第一TSM向第二TSM发送请求安装第一TSM对应的安全域的请求。
303:第二TSM向第一TSM发送安装应用的第三令牌。
第二TSM根据第一MNO和第二MNO已经存在的签约关系,生成用于在SE上安装第一TSM对应的安全域的第三令牌,并将第三令牌返回给第一TSM。
304:终端接收第一TSM从第二TSM获得的用于在SE上安装第一TSM对应的安全域的第三令牌,以及接收第一TSM发送的用于安装第一TSM对应的安全域的安装命令和相关数据。
305:接收第二TSM发送的密钥集。
其中,步骤304和步骤305可以在同一条消息中发送,也可以分别进行发送,在此并不进行限定。
其中,密钥集用于生成管理SE中内容的第二令牌。
306:验证第三令牌。
其中,验证过程可以由SE中专门用于验证令牌的安全域验证进行第三令牌的步骤。
307:终端在第三令牌验证通过后,由第二TSM对应的安全域执行安装第一TSM对应的安全域的安装命令,在SE中安装第一TSM对应的安全域,并授予第一TSM对应的安全域委托管理权限。
在SE中第二TSM对应的安全域中为第一TSM对应的安全域分配存储空间,在分配完毕后完成安装第一TSM对应的安全域的过程。
其中,第二TSM对应的安全域为第一TSM对应的安全域的关联安全域。
308:将密钥集配置到第一TSM对应的安全域中。
309:终端向第二TSM发送第一TSM对应的安全域安装成功的回执。
其中,回执由安全单元中具有回执生成权限的安全域生成。
在本发明实施例中,安装第一TSM对应的安全域后,提供了一种安全单 元中内容管理的方法。下面将结合具体的处理方式,对图1所示的安全单元中内容管理的流程进行详细的说明,具体内容可以如下:
101:向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM。
其中,内容管理请求中具体的操作可以包括以下操作中的至少一种:
向SE内载入应用安装文件的操作;
向SE内安装应用的操作;
配置SE内已经安装的应用的操作;
删除SE内的应用和/或应用数据的操作;
删除SE内的应用安装文件的操作;
更新应用对应的注册表信息的操作。
在本发明实施例中,以安装一个公交卡应用为例进行说明,内容管理请求中携带终端标识,其中终端标识可以包括但不限于:ICCID和/或SEID。
应用服务器在接收到终端发送的内容管理请求之后,向第一TSM发送内容管理请求。
第一TSM在接收到内容管理请求之后,向应用服务器发送用于验证内容管理命令是否合法的第一令牌。
其中,第一TSM可以检查本地数据库,发现该终端已经安装有第一TSM对应的安全域之后才会向应用服务器发送令牌。
102:接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器下发的内容管理命令;
其中,内容管理命令包括以下操作中的至少一种:
向SE内载入应用安装文件;
向SE内安装应用;
配置SE内已经安装的应用;
删除SE内的应用和/或应用数据;
删除SE内的应用安装文件;
更新应用对应的注册表信息。
可选的,当内容管理命令为:向SE内载入应用安装文件或向SE内安装应用时,还会携带内容管理命令对应的相关数据,例如应用的安装文件等。
103:验证所述第一令牌,并在所述第一令牌验证通过后,根据密钥集以 及内容管理命令,由所述第一TSM对应的安全域生成用于管理SE内容的第二令牌,第二TSM具备SE的管理权限。
其中,通过SE中专门用于验证令牌的安全域验证第一令牌如果验证成功则执行生成第二令牌的步骤;如果验证失败则提示用户验证失败并结束安装流程。
在本发明实施例中,通过第二TSM获取用于管理SE中内容的第二令牌的过程为通过已经安装的对应于第一TSM的安全域使用已经配置好的密钥集生成第二令牌。
104:验证所述第二令牌,并在所述第二令牌验证通过后,由SE中所述第一TSM对应的安全域执行内容管理命令。
其中,在一个实施例中,第一TSM对应的安全域将第二令牌传递给用于验证第二令牌的安全域并完成验证。
在验证通过后,发送令牌验证成功的确认给第一TSM对应的安全域,第一TSM对应的安全域则执行内容管理命令,并在执行成功后向第一TSM返回内容管理命令执行成功的回执;否则返回错误信息。
步骤104之后,终端向第二TSM发送内容管理命令执行成功的回执。
本发明实施例中通过分别获取第一TSM和对SE具备管理权限的第二TSM对应的第一令牌和第二令牌,并在令牌验证通过后,由SE中第一TSM对应的安全域执行内容管理命令,实现了在SE中执行具备管理权限的第二TSM以外其他TSM下发的内容管理命令,进一步实现了SE中跨平台的内容管理,提高了SE的使用效率。
实施例4
本发明实施例提供了一种安全单元SE中内容管理的装置,参见图4,该装置包括:
发送模块401,用于向应用服务器发送内容管理请求,应用服务器注册于第一可信服务管理平台TSM;
第一接收模块402,用于接收应用服务器从第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收应用服务器返回的内容管理命令;
获取模块403,用于验证第一令牌,并在第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,第二TSM具备SE的管理权限;
执行模块404,用于验证第二令牌,并在第二令牌验证通过后,由SE中第一TSM对应的安全域执行内容管理命令。
其中,装置还包括:
第二接收模块405,用于接收第一TSM从第二TSM获得的用于在SE上安装第一TSM对应的安全域的第三令牌,以及接收第一TSM发送的用于安装第一TSM对应的安全域的安装命令和相关数据;
验证模块406,用于验证第三令牌;
安装模块407,用于在第三令牌验证通过后,由第二TSM对应的安全域执行安装第一TSM对应的安全域的安装命令,在SE中安装第一TSM对应的安全域,并授予第一TSM对应的安全域委托管理权限。
其中,装置还包括:
第三接收模块408,用于接收第二TSM发送的密钥集;
相应的,装置还包括:
配置模块409,用于将密钥集配置到第一TSM对应的安全域中。
其中,获取模块403,包括:
生成单元,用于根据密钥集以及内容管理命令,由第一TSM对应的安全域生成用于管理SE内容的第二令牌。
其中,获取模块403,还包括:
发送单元,用于向第一TSM发送用于管理SE内容的第二令牌的请求;
接收单元,用于接收第一TSM从第二TSM请求到的第二令牌。
其中,装置还包括:
第一回执发送模块410,用于向第二TSM发送第一TSM对应的安全域安装成功的回执。
其中,装置还包括:
第二回执发送模块411,用于向第二TSM发送内容管理命令执行成功的 回执。
其中,内容管理命令包括以下操作中的至少一种:
向SE内载入应用安装文件;
向SE内安装应用;
配置SE内已经安装的应用;
删除SE内的应用和/或应用数据;
删除SE内的应用安装文件;
更新应用对应的注册表信息。
本发明实施例中通过分别获取第一TSM和对SE具备管理权限的第二TSM对应的第一令牌和第二令牌,并在令牌验证通过后,由SE中第一TSM对应的安全域执行内容管理命令,实现了在SE中执行具备管理权限的第二TSM以外其他TSM下发的内容管理命令,进一步实现了SE中跨平台的内容管理,提高了SE的使用效率。
实施例5
本发明实施例提供了一种终端,参见图5。
所述终端包括:处理器501,发射器502和接收器503,
所述发射器503,用于向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM;
所述接收器504,用于接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器返回的内容管理命令;
所述处理器501,用于验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备所述SE的管理权限;验证所述第二令牌,并在所述第二令牌验证通过后,调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令;
所述接收器503,还可以用于接收第一TSM从第二TSM获得的用于在SE上安装所述第一TSM对应的安全域的第三令牌,以及接收所述第一TSM发送的用于安装所述第一TSM对应的安全域的安装命令和相关数据;
所述处理器501,还可以用于验证所述第三令牌;在所述第三令牌验证通过后,由所述第二TSM对应的安全域执行安装所述第一TSM对应的安全域的安装命令,在SE中安装所述第一TSM对应的安全域,并授予所述第一TSM对应的安全域委托管理权限。
所述接收器503,还可以用于接收所述第二TSM发送的密钥集;
所述处理器501,还可以用于将所述密钥集配置到所述第一TSM对应的安全域中。
所述处理器501,还可以用于根据所述密钥集以及所述内容管理命令,由所述第一TSM对应的安全域生成用于管理SE内容的第二令牌。
所述发射器502,还可以用于向所述第一TSM发送用于管理SE内容的第二令牌的请求;
所述接收器503,还可以用于接收所述第一TSM从第二TSM请求到的所述第二令牌。
所述发射器502,还可以用于向所述第二TSM发送所述第一TSM对应的安全域安装成功的回执。
所述发射器502,还可以用于向所述第二TSM发送所述内容管理命令执行成功的回执。
其中,所述内容管理命令包括以下操作中的至少一种:
向所述SE内载入应用安装文件;
向所述SE内安装应用;
配置所述SE内已经安装的应用;
删除所述SE内的应用和/或应用数据;
删除所述SE内的应用安装文件;
更新所述应用对应的注册表信息。
本发明实施例中通过分别获取第一TSM和对SE具备管理权限的第二 TSM对应的第一令牌和第二令牌,并在令牌验证通过后,由SE中第一TSM对应的安全域执行内容管理命令,实现了在SE中执行具备管理权限的第二TSM以外其他TSM下发的内容管理命令,进一步实现了SE中跨平台的内容管理,提高了SE的使用效率。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,快闪存储器、磁盘或光盘等。
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (24)

  1. 一种安全单元SE中内容管理的方法,其特征在于,所述方法包括:
    向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM;
    接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器返回的内容管理命令;
    验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备所述SE的管理权限;
    验证所述第二令牌,并在所述第二令牌验证通过后,调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令。
  2. 根据权利要求1所述的方法,其特征在于,所述向应用服务器发送内容管理请求之前,所述方法还包括:
    接收第一TSM从第二TSM获得的用于在SE上安装所述第一TSM对应的安全域的第三令牌,以及接收所述第一TSM发送的用于安装所述第一TSM对应的安全域的安装命令和相关数据;
    验证所述第三令牌;
    在所述第三令牌验证通过后,由所述第二TSM对应的安全域执行安装所述第一TSM对应的安全域的安装命令,在SE中安装所述第一TSM对应的安全域,并授予所述第一TSM对应的安全域委托管理权限。
  3. 根据权利要求2所述的方法,其特征在于,所述验证所述第三令牌之前,所述方法还包括:
    接收所述第二TSM发送的密钥集;
    相应的,所述在SE中安装所述第一TSM对应的安全域之后,所述方法还包括:
    将所述密钥集配置到所述第一TSM对应的安全域中。
  4. 根据权利要求3所述的方法,其特征在于,所述通过第二TSM获取用于管理SE内容的第二令牌,包括:
    根据所述密钥集以及所述内容管理命令,由所述第一TSM对应的安全域生成用于管理SE内容的第二令牌。
  5. 根据权利要求1所述的方法,其特征在于,所述通过第二TSM获取用于管理SE内容的第二令牌,包括:
    向所述第一TSM发送用于管理SE内容的第二令牌的请求;
    接收所述第一TSM从第二TSM请求到的所述第二令牌。
  6. 根据权利要求2所述的方法,其特征在于,所述在SE中安装所述第一TSM对应的安全域之后,所述方法还包括:
    向所述第二TSM发送所述第一TSM对应的安全域安装成功的回执。
  7. 根据权利要求1所述的方法,其特征在于,所述调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令之后,所述方法还包括:
    向所述第二TSM发送所述内容管理命令执行成功的回执。
  8. 根据权利要求1所述的方法,其特征在于,所述内容管理命令包括以下操作中的至少一种:
    向所述SE内载入应用安装文件;
    向所述SE内安装应用;
    配置所述SE内已经安装的应用;
    删除所述SE内的应用和/或应用数据;
    删除所述SE内的应用安装文件;
    更新所述应用对应的注册表信息。
  9. 一种安全单元SE中内容管理的装置,其特征在于,所述装置包括:
    发送模块,用于向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM;
    第一接收模块,用于接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器返回的内容管理命令;
    获取模块,用于验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备所述SE的管理权限;
    执行模块,用于验证所述第二令牌,并在所述第二令牌验证通过后,调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令。
  10. 根据权利要求9所述的装置,其特征在于,所述装置还包括:
    第二接收模块,用于接收第一TSM从第二TSM获得的用于在SE上安装所述第一TSM对应的安全域的第三令牌,以及接收所述第一TSM发送的用于安装所述第一TSM对应的安全域的安装命令和相关数据;
    验证模块,用于验证所述第三令牌;
    安装模块,用于在所述第三令牌验证通过后,由所述第二TSM对应的安全域执行安装所述第一TSM对应的安全域的安装命令,在SE中安装所述第一TSM对应的安全域,并授予所述第一TSM对应的安全域委托管理权限。
  11. 根据权利要求10所述的装置,其特征在于,所述装置还包括:
    第三接收模块,用于接收所述第二TSM发送的密钥集;
    相应的,所述装置还包括:
    配置模块,用于将所述密钥集配置到所述第一TSM对应的安全域中。
  12. 根据权利要求11所述的装置,其特征在于,所述获取模块,包括:
    生成单元,用于根据所述密钥集以及所述内容管理命令,由所述第一TSM对应的安全域生成用于管理SE内容的第二令牌。
  13. 根据权利要求9所述的装置,其特征在于,所述获取模块,包括:
    发送单元,用于向所述第一TSM发送用于管理SE内容的第二令牌的请求;
    接收单元,用于接收所述第一TSM从第二TSM请求到的所述第二令牌。
  14. 根据权利要求10所述的装置,其特征在于,所述装置还包括:
    第一回执发送模块,用于向所述第二TSM发送所述第一TSM对应的安全域安装成功的回执。
  15. 根据权利要求9所述的装置,其特征在于,所述装置还包括:
    第二回执发送模块,用于向所述第二TSM发送所述内容管理命令执行成功的回执。
  16. 根据权利要求9所述的装置,其特征在于,所述内容管理命令包括以下操作中的至少一种:
    向所述SE内载入应用安装文件;
    向所述SE内安装应用;
    配置所述SE内已经安装的应用;
    删除所述SE内的应用和/或应用数据;
    删除所述SE内的应用安装文件;
    更新所述应用对应的注册表信息。
  17. 一种终端,其特征在于,所述终端包括:处理器,发射器和接收器,
    所述发射器,用于向应用服务器发送内容管理请求,所述应用服务器注册于第一可信服务管理平台TSM;
    所述接收器,用于接收所述应用服务器从所述第一TSM获得的用于验证内容管理命令是否合法的第一令牌,以及接收所述应用服务器返回的内容管理命令;
    所述处理器,用于验证所述第一令牌,并在所述第一令牌验证通过后,通过第二TSM获取用于管理SE中内容的第二令牌,所述第二TSM具备所述SE的管理权限,验证所述第二令牌,并在所述第二令牌验证通过后,调用所述SE中所述第一TSM对应的安全域执行所述内容管理命令。
  18. 根据权利要求17所述的终端,其特征在于,
    所述接收器,还用于接收第一TSM从第二TSM获得的用于在SE上安装所述第一TSM对应的安全域的第三令牌,以及接收所述第一TSM发送的用于安装所述第一TSM对应的安全域的安装命令和相关数据;
    所述处理器,还用于验证所述第三令牌;在所述第三令牌验证通过后,由所述第二TSM对应的安全域执行安装所述第一TSM对应的安全域的安装命令, 在SE中安装所述第一TSM对应的安全域,并授予所述第一TSM对应的安全域委托管理权限。
  19. 根据权利要求18所述的终端,其特征在于,
    所述接收器,还用于接收所述第二TSM发送的密钥集;
    相应的,所述处理器,还用于将所述密钥集配置到所述第一TSM对应的安全域中。
  20. 根据权利要求19所述的终端,其特征在于,
    所述处理器,还用于根据所述密钥集以及所述内容管理命令,由所述第一TSM对应的安全域生成用于管理SE内容的第二令牌。
  21. 根据权利要求17所述的终端,其特征在于,
    所述发射器,还用于向所述第一TSM发送用于管理SE内容的第二令牌的请求;
    所述接收器,还用于接收所述第一TSM从第二TSM请求到的所述第二令牌。
  22. 根据权利要求18所述的终端,其特征在于,
    所述发射器,还用于向所述第二TSM发送所述第一TSM对应的安全域安装成功的回执。
  23. 根据权利要求17所述的终端,其特征在于,
    所述发射器,还用于向所述第二TSM发送所述内容管理命令执行成功的回执。
  24. 根据权利要求17所述的终端,其特征在于,所述内容管理命令包括以下操作中的至少一种:
    向所述SE内载入应用安装文件;
    向所述SE内安装应用;
    配置所述SE内已经安装的应用;
    删除所述SE内的应用和/或应用数据;
    删除所述SE内的应用安装文件;
    更新所述应用对应的注册表信息。
PCT/CN2014/087415 2014-09-25 2014-09-25 一种安全单元中内容管理的方法及装置 WO2016045042A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2014/087415 WO2016045042A1 (zh) 2014-09-25 2014-09-25 一种安全单元中内容管理的方法及装置
CN201480080705.7A CN106576239B (zh) 2014-09-25 2014-09-25 一种安全单元中内容管理的方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/087415 WO2016045042A1 (zh) 2014-09-25 2014-09-25 一种安全单元中内容管理的方法及装置

Publications (1)

Publication Number Publication Date
WO2016045042A1 true WO2016045042A1 (zh) 2016-03-31

Family

ID=55580090

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/087415 WO2016045042A1 (zh) 2014-09-25 2014-09-25 一种安全单元中内容管理的方法及装置

Country Status (2)

Country Link
CN (1) CN106576239B (zh)
WO (1) WO2016045042A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404706A (zh) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 应用下载方法、安全元件、客户端设备及服务管理设备
CN111556029A (zh) * 2017-08-31 2020-08-18 阿里巴巴集团控股有限公司 一种基于安全元件se的身份认证方法和装置
CN115941833A (zh) * 2022-11-21 2023-04-07 深圳市雪球科技有限公司 一种开通交通卡优化的方法、系统、设备及存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11552807B2 (en) 2017-09-18 2023-01-10 Huawei Technologies Co., Ltd. Data processing method and apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236011A (zh) * 2013-02-20 2013-08-07 郁晓东 一种电子货币交易监视的方法
CN103312678A (zh) * 2012-03-15 2013-09-18 中国移动通信集团公司 一种客户端安全登录方法、装置及系统
CN103313241A (zh) * 2012-03-15 2013-09-18 中国移动通信集团公司 一种se密钥管理方法、业务平台、管理平台和系统
US20140279552A1 (en) * 2012-10-17 2014-09-18 Royal Bank Of Canada Virtualization and secure processing of data

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104025507B (zh) * 2011-11-01 2017-02-22 谷歌公司 用于多个服务供应商可信服务管理器和安全元件的接口连接的系统、方法和计算机程序产品
CN102411742A (zh) * 2011-12-27 2012-04-11 大唐微电子技术有限公司 移动终端
US20140031024A1 (en) * 2012-02-05 2014-01-30 Rfcyber Corporation Method and system for providing controllable trusted service manager

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103312678A (zh) * 2012-03-15 2013-09-18 中国移动通信集团公司 一种客户端安全登录方法、装置及系统
CN103313241A (zh) * 2012-03-15 2013-09-18 中国移动通信集团公司 一种se密钥管理方法、业务平台、管理平台和系统
US20140279552A1 (en) * 2012-10-17 2014-09-18 Royal Bank Of Canada Virtualization and secure processing of data
CN103236011A (zh) * 2013-02-20 2013-08-07 郁晓东 一种电子货币交易监视的方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556029A (zh) * 2017-08-31 2020-08-18 阿里巴巴集团控股有限公司 一种基于安全元件se的身份认证方法和装置
CN111404706A (zh) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 应用下载方法、安全元件、客户端设备及服务管理设备
CN115941833A (zh) * 2022-11-21 2023-04-07 深圳市雪球科技有限公司 一种开通交通卡优化的方法、系统、设备及存储介质

Also Published As

Publication number Publication date
CN106576239B (zh) 2020-04-21
CN106576239A (zh) 2017-04-19

Similar Documents

Publication Publication Date Title
US10412575B2 (en) System and method for virtual SIM card
US9572025B2 (en) Method, server, computer program and computer program product for communicating with secure element
US9706407B2 (en) Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same
CN107547571B (zh) 用于管理访问控制的方法和访问控制客户端供应服务器
CN101231768B (zh) 一种多应用智能卡及实现智能卡多应用的方法
JP2017050875A (ja) 複数のアクセス制御クライアントをサポートするモバイル装置、及び対応する方法
US20140134981A1 (en) Method for changing mno in embedded sim on basis of special privilege, and embedded sim and recording medium therefor
EP3777082B1 (en) Trusted platform module-based prepaid access token for commercial iot online services
KR20130006258A (ko) 동적 키 생성 기반의 내장 sim의 mno 변경방법 및 그를 위한 내장 sim과 기록매체
JP2013546108A (ja) 非接触型スマートカードのためのローカルのトラステッドサービスマネージャ
TW201251482A (en) Apparatus and methods for storing electronic access clients
CN109196891B (zh) 一种签约数据集的管理方法、终端及服务器
US20150350219A1 (en) Profile change management
WO2016045042A1 (zh) 一种安全单元中内容管理的方法及装置
WO2019214697A1 (zh) 一种数据下载、管理的方法和终端
CN107358118B (zh) Sfs访问控制方法及系统、sfs及终端设备
EP3048553A1 (en) Method for distributing applets, and entities for distributing applets
US9473482B2 (en) Push-based trust model for public cloud applications
CN112514323A (zh) 用于处理数字密钥的电子设备及其操作方法
KR101882685B1 (ko) 클라우드 기반의 서비스 제공 방법
WO2024140215A1 (zh) 边缘计算中的tee资源编排方法、系统、设备及存储介质
CN112422475B (zh) 一种服务鉴权方法、装置、系统及存储介质
KR20130053867A (ko) 보안 어플리케이션 다운로드 관리방법, 이를 적용한 보안 어플리케이션 다운로드 관리서버, 단말기, 및 관리시스템
KR20140106940A (ko) 모바일 단말용 애플리케이션 검증 장치
Tamrakar et al. On rehoming the electronic id to TEEs

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14902745

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14902745

Country of ref document: EP

Kind code of ref document: A1