Emulated Card Selection Method and Mobile Device

    公开(公告)号:US20210067201A1

    公开(公告)日:2021-03-04

    申请号:US16958491

    申请日:2017-12-29

    Abstract: An emulated card selection method is implemented on a mobile device having a near field communication (NFC) NFC function. A first emulated card and a second emulated card are configured on the mobile device. When detecting an NFC radio frequency field, the mobile device detects whether there is fingerprint input. The mobile device selects the first emulated card if there is the fingerprint input. The mobile device selects the second emulated card if there is no fingerprint input. The mobile device performs NFC interaction with the NFC card reader based on the selected first emulated card or second emulated card. The mobile device can automatically select an emulated card in different emulated cards based on a card swiping status when a user uses an NFC emulated card.

    Capability enabling method and apparatus

    公开(公告)号:US12010250B2

    公开(公告)日:2024-06-11

    申请号:US17290497

    申请日:2019-10-23

    CPC classification number: H04L9/3268 H04L9/3242 H04L9/3247 H04L2209/80

    Abstract: A capability enabling method and apparatus. A secure element (SE) establishes, with a trusted execution environment (TEE), a session for communication. The SE sends, to the TEE, an obtaining instruction to obtain a security certificate of the TEE. After receiving the obtaining instruction, the TEE generates the security certificate based on attribute information of the TEE, and sends the generated security certificate to the SE. After the SE receives the security certificate, the SE determines, based on the security certificate and a preset security policy, that the TEE is in a secure state. After the SE determines that the TEE is in the secure state, the SE enables a first capability for a third-party service in the SE based on a second capability of the TEE.

    Terminal transaction method, and terminal

    公开(公告)号:US11334862B2

    公开(公告)日:2022-05-17

    申请号:US16650720

    申请日:2017-11-30

    Abstract: In this application, a terminal transaction method and a terminal are provided and used to resolve a problem existing in the prior art that an NFC application does not match a type of a POS, and there is relatively poor user experience. The method includes: establishing, by a terminal, a near field communication NFC radio frequency connection to a point of sale POS, and starting up a first transaction; and selecting, by the terminal, a first NFC application corresponding to the POS, and performing the first transaction when a use condition of the first NFC application is already satisfied.

    Method for Authenticating Identity of Digital Key, Terminal Device, and Medium

    公开(公告)号:US20220203933A1

    公开(公告)日:2022-06-30

    申请号:US17605110

    申请日:2020-04-17

    Inventor: Sishan Wang

    Abstract: A method for authenticating an identity of a digital key, a terminal, and a medium, where before a second terminal enters a preset operating state from a non-preset operating state, identity authentication is first performed on a user using an identity authentication system of the second terminal, and obtained identity authentication information is stored in a secure element of the second terminal. Then, when a digital key in the second terminal is to be used, the identity authentication information stored in the secure element of the second terminal is sent to a first terminal, and the first terminal may perform verification based on the identity authentication information to determine whether the user using the digital key in the second terminal is an authorized holder of the second terminal.

    Data processing method and apparatus

    公开(公告)号:US11552807B2

    公开(公告)日:2023-01-10

    申请号:US16648126

    申请日:2017-09-18

    Abstract: A method includes sending, by a trusted application (TA) entity, a certificate of the TA entity and a private key signature of the TA entity to a target security domain (SD). The certificate and the private key signature enable the target SD to perform trust verification via a server, obtaining, by the TA entity, a first key of the target SD when the trust verification of the TA entity succeeds, and establishing, by the TA entity, a trust relationship with the target SD.

    Capability Enabling Method and Apparatus

    公开(公告)号:US20210359867A1

    公开(公告)日:2021-11-18

    申请号:US17290497

    申请日:2019-10-23

    Abstract: A capability enabling method and apparatus are provided, to resolve a prior-art problem that security of executing a service by using a TEE +SE security architecture cannot be ensured. In this application, an SE establishes, with a TEE, a session used for communication. The SE sends, to the TEE by using the session, an obtaining instruction used to obtain a security certificate of the TEE. The TEE receives, by using the session, the obtaining instruction from the SE. After receiving the obtaining instruction, the TEE generates the security certificate based on attribute information of the TEE, and sends the generated security certificate to the SE by using the session. After the SE receives, by using the session, the security certificate sent by the TEE, the SE determines, based on the security certificate and a preset security policy, that the TEE is in a secure state. After the SE determines that the TEE is in the secure state, the SE enables a first capability for a third-party service in the SE, where the first capability is implemented based on a second capability of the TEE.

    Access Token Management Method, Terminal, and Server

    公开(公告)号:US20200336309A1

    公开(公告)日:2020-10-22

    申请号:US16758095

    申请日:2017-10-23

    Abstract: Embodiments of this application relate to an access token management method, The method includes: obtaining, by a server, an access token and login information of an authorized account corresponding to the access token in a terminal, where the access token is a credential used for accessing a protected resource in the server, and the authorized account is an account that logs in to a resource authorization application on the terminal when the resource authorization application authorizes the access token; and when the login information indicates that the authorized account is in a non-login state, performing, by the server, invalidation processing on the access token.

Patent Agency Ranking