Nothing Special   »   [go: up one dir, main page]

CN115017498A - Operation method and electronic device of applet - Google Patents

Operation method and electronic device of applet Download PDF

Info

Publication number
CN115017498A
CN115017498A CN202111376151.3A CN202111376151A CN115017498A CN 115017498 A CN115017498 A CN 115017498A CN 202111376151 A CN202111376151 A CN 202111376151A CN 115017498 A CN115017498 A CN 115017498A
Authority
CN
China
Prior art keywords
security domain
application
applet
terminal device
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111376151.3A
Other languages
Chinese (zh)
Other versions
CN115017498B (en
Inventor
韩业飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202310072380.9A priority Critical patent/CN116305093B/en
Priority to CN202111376151.3A priority patent/CN115017498B/en
Publication of CN115017498A publication Critical patent/CN115017498A/en
Application granted granted Critical
Publication of CN115017498B publication Critical patent/CN115017498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides an operation method of an applet and electronic equipment, which relate to the technical field of terminals, wherein an embedded security module is arranged in the terminal equipment and comprises the following steps: responding to the operation of the small application program in the application program, and sending verification information to the server, wherein the verification information comprises application program information; if the server passes the verification of the verification information, the terminal equipment receives a script file sent by the server; executing the script file to operate an auxiliary security domain in the embedded security module, the auxiliary security domain being used to install the applet. According to the scheme, the application program needs to operate the eSE of the terminal equipment, and when the Applet is operated, the terminal equipment sends the verification information comprising the application program information to the server, so that the authority of the application program is verified by the server.

Description

小应用程序的操作方法和电子设备Operation method and electronic device of applet

技术领域technical field

本申请涉及终端技术领域,尤其涉及一种小应用程序的操作方法和电子设备。The present application relates to the field of terminal technologies, and in particular, to a method for operating a small application and an electronic device.

背景技术Background technique

目前存在很多具有移动支付功能的终端设备,这些终端设备中设置有嵌入式安全模块(embedded secure element,eSE),主要负责终端设备的数据安全存储和数据加密等工作,eSE的安全性能较高。At present, there are many terminal devices with mobile payment functions. These terminal devices are provided with an embedded secure element (eSE), which is mainly responsible for data security storage and data encryption of the terminal device. The security performance of eSE is high.

在eSE中设置有辅助安全域(supplementary security domain,SSD),SSD中可以设置具有支付功能的小应用程序(Applet)。通过将Applet设置在eSE的SSD中,能够提高Applet的安全性能。A supplementary security domain (SSD) is set in the eSE, and an applet with a payment function can be set in the SSD. By setting the Applet in the SSD of the eSE, the security performance of the Applet can be improved.

但是,若任意的应用程序都可以在eSE中操作Applet,则会降低eSE的安全性能。However, if any application can operate Applet in eSE, the security performance of eSE will be reduced.

发明内容SUMMARY OF THE INVENTION

本申请实施例提供一种小应用程序的操作方法和电子设备,提高了eSE的安全性能。The embodiments of the present application provide an operation method and an electronic device for an applet, which improve the security performance of the eSE.

第一方面,本申请实施例提供一种小应用程序的操作方法,应用于终端设备,其中,所述终端设备中设置有嵌入式安全模块,所述方法包括:In a first aspect, an embodiment of the present application provides a method for operating an applet, which is applied to a terminal device, wherein an embedded security module is set in the terminal device, and the method includes:

响应对应用程序中的小应用程序的操作,向服务器发送校验信息,所述校验信息包括应用程序信息;In response to the operation of the applet in the application program, send verification information to the server, where the verification information includes application program information;

若所述服务器对所述校验信息进行校验通过,则所述终端设备接收所述服务器发送的脚本文件;If the verification of the verification information is passed by the server, the terminal device receives the script file sent by the server;

执行所述脚本文件在所述嵌入式安全模块中操作辅助安全域,所述辅助安全域用于安装所述小应用程序。Executing the script file operates an auxiliary security domain in the embedded security module, where the auxiliary security domain is used to install the applet.

本申请提供的小应用程序的操作方法中,应用程序需要操作终端设备的eSE,进而操作Applet时,终端设备向服务器发送包括应用程序信息的校验信息,从而由服务器对该应用程序的权限进行校验,若校验通过,则终端设备可以基于应用程序的功能操作eSE,否则,终端设备不操作eSE。通过这种方式,使得只有通过校验的应用程序才能够操作eSE,以提高eSE的安全性能。In the operation method of the applet provided by the present application, the application needs to operate the eSE of the terminal device, and then when the Applet is operated, the terminal device sends the verification information including the application information to the server, so that the server will check the authority of the application. Verification, if the verification is passed, the terminal device can operate the eSE based on the function of the application, otherwise, the terminal device does not operate the eSE. In this way, only applications that pass the verification can operate the eSE, so as to improve the security performance of the eSE.

在一种可能的实现方式中,若所述操作为安装操作,则所述方法还包括:In a possible implementation manner, if the operation is an installation operation, the method further includes:

若在所述辅助安全域中安装所述小应用程序成功,则显示小应用程序安装成功的界面;If the applet is successfully installed in the auxiliary security domain, an interface indicating that the applet is installed successfully is displayed;

若在所述嵌入式安全模块中创建所述辅助安全域失败,或者在所述辅助安全域中安装所述小应用程序失败,则显示小应用程序安装失败的界面。If the creation of the auxiliary security domain in the embedded security module fails, or the installation of the applet in the auxiliary security domain fails, an interface for installation failure of the applet is displayed.

这种实施方式中,可以使用户了解小应用程序的安装结果,提高用户体验。In this implementation manner, the user can be made aware of the installation result of the applet, and the user experience can be improved.

在一种可能的实现方式中,若所述操作为删除操作,则所述方法还包括:In a possible implementation manner, if the operation is a deletion operation, the method further includes:

若删除所述辅助安全域成功,则显示小应用程序删除成功的界面;If the deletion of the auxiliary security domain is successful, an interface that the applet is deleted successfully is displayed;

若删除所述辅助安全域成功,则显示小应用程序删除失败的界面。If the deletion of the auxiliary security domain is successful, an interface of failure to delete the applet is displayed.

这种实施方式中,可以使用户了解小应用程序的删除结果,提高用户体验。In this implementation manner, the user can be informed of the deletion result of the applet, and the user experience can be improved.

在一种可能的实现方式中,所述终端设备中设置有框架;所述响应对应用程序中的小应用程序的操作,向服务器发送校验信息,包括:In a possible implementation manner, the terminal device is provided with a frame; the response to the operation of the applet in the application program, sending verification information to the server, including:

所述应用程序接收对所述小应用程序的操作,并向所述框架发送安全域操作请求;The application receives the operation on the applet, and sends a security domain operation request to the framework;

所述框架获取安全域标识和所述应用程序的私钥,所述安全域标识与所述小应用程序对应;The framework obtains a security domain identifier and the private key of the application, and the security domain identifier corresponds to the applet;

所述框架根据所述私钥生成签名数据,并向所述服务器发送所述校验信息,所述校验信息中包括所述应用程序信息和第一时间信息,所述应用程序信息中包括所述签名数据、所述安全域标识。The framework generates signature data according to the private key, and sends the verification information to the server, where the verification information includes the application information and the first time information, and the application information includes all The signature data and the security domain identifier.

这种实施方式中,设置的服务器为终端设备的后台服务器,可以通过终端设备中设置的框架向服务器发送校验信息,使得服务器可以基于该校验信息对应用程序的权限进行校验。In this embodiment, the set server is the background server of the terminal device, and can send verification information to the server through the framework set in the terminal device, so that the server can verify the authority of the application program based on the verification information.

在一种可能的实现方式中,满足以下条件时所述校验信息校验通过:In a possible implementation manner, the verification information is verified and passed when the following conditions are met:

所述服务器使用所述应用程序的公钥对所述签名数据校验通过,且所述服务器确定所述应用程序信息中的安全域标识与所述应用程序对应,且所述服务器获取的第二时间信息与所述第一时间信息之间的时间间隔小于预设间隔。The server uses the public key of the application to verify the signature data, and the server determines that the security domain identifier in the application information corresponds to the application, and the second data obtained by the server is passed. A time interval between the time information and the first time information is less than a preset interval.

这种实施方式中需要对签名数据进行校验,还需要对与小应用程序对应的安全域标识进行校验,从而充分的验证需要操作eSE的应用程序的身份;还需要确定校验信息中的时间信息是否符合要求,从而能够避免短时间内重复下发脚本文件的问题。In this implementation, the signature data needs to be verified, and the security domain identifier corresponding to the applet needs to be verified, so as to fully verify the identity of the application that needs to operate the eSE; it is also necessary to determine the verification information. Whether the time information meets the requirements can avoid the problem of repeatedly issuing script files in a short period of time.

在一种可能的实现方式中,所述终端设备中设置有框架;所述操作为安装操作时,所述脚本文件为安全域安装脚本;In a possible implementation manner, a frame is provided in the terminal device; when the operation is an installation operation, the script file is a security domain installation script;

所述执行所述脚本文件在所述嵌入式安全模块中操作辅助安全域,包括:The executing the script file to operate the auxiliary security domain in the embedded security module includes:

所述框架执行所述安全域安装脚本在所述嵌入式安全模块中创建所述辅助安全域;The framework executes the security domain installation script to create the auxiliary security domain in the embedded security module;

所述方法还包括:所述应用程序在所述辅助安全域中安装所述小应用程序。The method also includes the application installing the applet in the secondary security domain.

这种实施方式中,若对应用程序的权限校验通过,则通过终端设备的框架在eSE中创建SSD,由框架创建SSD,从而避免应用程序直接在eSE中创建SSD,能够进一步的提高eSE的安全性。在创建成功后,由应用程序在创建的SSD中安装Applet,从而使具有操作eSE权限的应用程序能够在SSD中安装Applet。In this embodiment, if the permission verification of the application program is passed, the SSD is created in the eSE through the framework of the terminal device, and the SSD is created by the framework, thereby avoiding the application program directly creating the SSD in the eSE, which can further improve the eSE's performance. safety. After the creation is successful, the application installs the applet in the created SSD, so that the application with the permission to operate the eSE can install the applet in the SSD.

在一种可能的实现方式中,所述框架执行所述安全域安装脚本在所述嵌入式安全模块中创建所述辅助安全域之后,还包括:In a possible implementation manner, after the framework executes the security domain installation script to create the auxiliary security domain in the embedded security module, the framework further includes:

所述嵌入式安全模块向所述框架发送安全域创建结果,所述框架向所述应用程序转发所述安全域创建结果;The embedded security module sends a security domain creation result to the framework, and the framework forwards the security domain creation result to the application;

所述应用程序在所述辅助安全域中安装所述小应用程序包括:The installation of the applet by the application in the secondary security domain includes:

若所述安全域创建结果表征安全域创建成功,则所述应用程序在创建的所述辅助安全域中安装所述小应用程序。If the security domain creation result indicates that the security domain is successfully created, the application installs the applet in the created auxiliary security domain.

这种实施方式中,由FWK在eSE中创建SSD,并在SSD创建成功之后再由应用程序在SSD中安装Applet,从而避免应用程序直接在eSE中创建SSD,应用程序只对为其创建的SSD进行操作,进而进一步的提高eSE的安全性。In this implementation, the FWK creates the SSD in the eSE, and after the SSD is successfully created, the application installs the Applet in the SSD, so as to avoid the application from directly creating the SSD in the eSE, and the application only supports the SSD created for it. Perform operations to further improve the security of eSE.

在一种可能的实现方式中,所述应用程序在创建的所述辅助安全域中添加所述小应用程序,包括:In a possible implementation manner, the application adds the applet in the created auxiliary security domain, including:

所述应用程序下载所述小应用程序,并在所述辅助安全域中添加所述小应用程序。The application downloads the applet and adds the applet in the secondary security domain.

在一种可能的实现方式中,所述终端设备中设置有框架;所述操作为删除操作时,所述脚本文件为安全域删除脚本;In a possible implementation manner, the terminal device is provided with a frame; when the operation is a deletion operation, the script file is a security domain deletion script;

所述执行所述脚本文件在所述嵌入式安全模块中操作辅助安全域,包括:The executing the script file to operate the auxiliary security domain in the embedded security module includes:

所述框架执行所述安全域删除脚本在所述嵌入式安全模块中删除所述辅助安全域,所述辅助安全域中安装有所述小应用程序。The framework executes the security domain deletion script to delete the auxiliary security domain in the embedded security module in which the applet is installed.

这种实施方式中,由FWK在eSE中删除SSD,从而避免应用程序直接在eSE中删除SSD,且SSD中设置有Applet,当SSD被删除之后,其内部的Applet也会被删除,因此,这种方式能够以较为安全的方式删除eSE中的Applet。In this implementation, the FWK deletes the SSD in the eSE, so as to prevent the application from directly deleting the SSD in the eSE, and an Applet is set in the SSD. When the SSD is deleted, the internal Applet will also be deleted. Therefore, this This method can delete Applet in eSE in a safer way.

第二方面,本申请实施例提供一种小应用程序的操作方法,包括:In a second aspect, an embodiment of the present application provides a method for operating an applet, including:

终端设备接收对应用程序中的小应用程序的操作指令,向服务器发送校验信息;The terminal device receives the operation instruction for the applet in the application program, and sends the verification information to the server;

所述服务器对所述校验信息进行校验,若校验通过,则向所述终端设备发送脚本文件;The server verifies the verification information, and if the verification passes, sends a script file to the terminal device;

所述终端设备执行所述脚本文件操作嵌入式安全模块中的辅助安全域,所述辅助安全域用于安装所述小应用程序;所述终端设备中设置有所述操作嵌入式安全模块。The terminal device executes the script file to operate an auxiliary security domain in the embedded security module, where the auxiliary security domain is used to install the applet; the terminal device is provided with the operation embedded security module.

在一种可能的实现方式中,所述校验信息中包括应用程序信息和第一时间信息,所述应用程序信息中包括签名数据、安全域标识。In a possible implementation manner, the verification information includes application program information and first time information, and the application program information includes signature data and a security domain identifier.

在一种可能的实现方式中,若所述操作为安装操作,则所述脚本文件为安全域安装脚本。In a possible implementation manner, if the operation is an installation operation, the script file is a security domain installation script.

在一种可能的实现方式中,若所述操作为安装操作,则所述脚本文件为安全域删除脚本。In a possible implementation manner, if the operation is an installation operation, the script file is a security domain deletion script.

第三方面,本申请实施例提供一种小应用程序的操作装置,该装置可以是终端设备,还可以是终端设备内的芯片或者芯片系统。其中,所述终端设备中设置有嵌入式安全模块,所述装置可以包括框架。小应用程序的操作装置中还设置有显示单元,该显示单元用于执行显示的步骤。In a third aspect, an embodiment of the present application provides an apparatus for operating an applet, and the apparatus may be a terminal device, or a chip or a chip system in the terminal device. Wherein, the terminal device is provided with an embedded security module, and the apparatus may include a frame. A display unit is also provided in the operating device of the applet, and the display unit is used for performing the steps of displaying.

示例性的,框架用于响应对应用程序中的小应用程序的操作,向服务器发送校验信息,所述校验信息包括应用程序信息;所述框架还用于若所述服务器对所述校验信息进行校验通过,则接收所述服务器发送的脚本文件;所述框架用于执行所述脚本文件在所述嵌入式安全模块中操作辅助安全域,所述辅助安全域用于安装所述小应用程序。Exemplarily, the framework is used to send verification information to the server in response to the operation of the applet in the application program, where the verification information includes application information; the framework is also used for if the server checks the verification information. If the verification information is verified and passed, the script file sent by the server is received; the framework is used to execute the script file to operate an auxiliary security domain in the embedded security module, and the auxiliary security domain is used to install the applet.

在一种可能的实现方式中,所述操作为安装操作,则所述显示单元还用于:In a possible implementation manner, the operation is an installation operation, and the display unit is further configured to:

若在所述辅助安全域中安装所述小应用程序成功,则显示小应用程序安装成功的界面;If the applet is successfully installed in the auxiliary security domain, an interface indicating that the applet is installed successfully is displayed;

若在所述嵌入式安全模块中创建所述辅助安全域失败,或者在所述辅助安全域中安装所述小应用程序失败,则显示小应用程序安装失败的界面。If the creation of the auxiliary security domain in the embedded security module fails, or the installation of the applet in the auxiliary security domain fails, an interface for installation failure of the applet is displayed.

在一种可能的实现方式中,所述操作为删除操作,则所述显示单元还用于:In a possible implementation manner, the operation is a deletion operation, and the display unit is further configured to:

若删除所述辅助安全域成功,则显示小应用程序删除成功的界面;If the deletion of the auxiliary security domain is successful, an interface that the applet is deleted successfully is displayed;

若删除所述辅助安全域成功,则显示小应用程序删除失败的界面。If the deletion of the auxiliary security domain is successful, an interface of failure to delete the applet is displayed.

在一种可能的实现方式中,所述装置中还设置有应用程序:In a possible implementation manner, the device is further provided with an application program:

所述应用程序接收对所述小应用程序的操作,并向所述框架发送安全域操作请求;The application receives the operation on the applet, and sends a security domain operation request to the framework;

所述框架获取安全域标识和所述应用程序的私钥,所述安全域标识与所述小应用程序对应;The framework obtains a security domain identifier and the private key of the application, and the security domain identifier corresponds to the applet;

所述框架根据所述私钥生成签名数据,并向所述服务器发送所述校验信息,所述校验信息中包括所述应用程序信息和第一时间信息,所述应用程序信息中包括所述签名数据、所述安全域标识。The framework generates signature data according to the private key, and sends the verification information to the server, where the verification information includes the application information and the first time information, and the application information includes all The signature data and the security domain identifier.

在一种可能的实现方式中,满足以下条件时所述校验信息校验通过:In a possible implementation manner, the verification information is verified and passed when the following conditions are met:

所述服务器使用所述应用程序的公钥对所述签名数据校验通过,且所述服务器确定所述应用程序信息中的安全域标识与所述应用程序对应,且所述服务器获取的第二时间信息与所述第一时间信息之间的时间间隔小于预设间隔。The server uses the public key of the application to verify the signature data, and the server determines that the security domain identifier in the application information corresponds to the application, and the second data obtained by the server is passed. A time interval between the time information and the first time information is less than a preset interval.

在一种可能的实现方式中,所述操作为安装操作时,所述脚本文件为安全域安装脚本;In a possible implementation manner, when the operation is an installation operation, the script file is a security domain installation script;

所述框架具体用于:执行所述安全域安装脚本在所述嵌入式安全模块中创建所述辅助安全域;The framework is specifically used for: executing the security domain installation script to create the auxiliary security domain in the embedded security module;

所述应用程序具体用于在所述辅助安全域中安装所述小应用程序。The application program is specifically used to install the small application program in the auxiliary security domain.

在一种可能的实现方式中,所述框架执行所述安全域安装脚本在所述嵌入式安全模块中创建所述辅助安全域之后,所述嵌入式安全模块向所述框架发送安全域创建结果,所述框架向所述应用程序转发所述安全域创建结果;In a possible implementation manner, after the framework executes the security domain installation script to create the auxiliary security domain in the embedded security module, the embedded security module sends a security domain creation result to the framework , the framework forwards the security domain creation result to the application;

所述应用程序具体用于,若所述安全域创建结果表征安全域创建成功,则所述应用程序在创建的所述辅助安全域中安装所述小应用程序。The application program is specifically configured to, if the security domain creation result indicates that the security domain is successfully created, the application program installs the applet in the created auxiliary security domain.

在一种可能的实现方式中,所述应用程序具体用于:In a possible implementation manner, the application program is specifically used for:

所述应用程序下载所述小应用程序,并在所述辅助安全域中添加所述小应用程序。The application downloads the applet and adds the applet in the secondary security domain.

在一种可能的实现方式中,所述操作为删除操作时,所述脚本文件为安全域删除脚本;In a possible implementation manner, when the operation is a deletion operation, the script file is a security domain deletion script;

所述框架具体用于:The framework is specifically used to:

执行所述安全域删除脚本在所述嵌入式安全模块中删除所述辅助安全域,所述辅助安全域中安装有所述小应用程序。Executing the security domain deletion script deletes the auxiliary security domain in the embedded security module in which the applet is installed.

第四方面,本申请实施例提供一种电子设备,包括:用于执行第一方面或第一方面任意可能的实现方式中的任一方法的单元,或者用于执行第二方面或第二方面任意可能的实现方式中的任一方法的单元。In a fourth aspect, an embodiment of the present application provides an electronic device, including: a unit for performing the first aspect or any method in any possible implementation manner of the first aspect, or for performing the second aspect or the second aspect A unit of any method in any possible implementation.

第五方面,本申请实施例提供一种电子设备,包括:处理器、显示屏和接口电路,接口电路用于与其它装置通信;显示屏用于执行显示的步骤;处理器用于运行代码指令,以实现第一方面或第一方面任意可能的实现方式中的任一方法,或者实现第二方面或第二方面任意可能的实现方式中的任一方法。In a fifth aspect, an embodiment of the present application provides an electronic device, including: a processor, a display screen, and an interface circuit, where the interface circuit is used to communicate with other devices; the display screen is used to perform the steps of displaying; the processor is used to run code instructions, To implement the first aspect or any method in any possible implementation manner of the first aspect, or implement any method in the second aspect or any possible implementation manner of the second aspect.

第六方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质存储有指令,当指令被执行时,以实现第一方面或第一方面任意可能的实现方式中的任一方法,或者实现第二方面或第二方面任意可能的实现方式中的任一方法。In a sixth aspect, embodiments of the present application provide a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed, any one of the first aspect or any possible implementation manner of the first aspect is implemented. A method, or any method of implementing the second aspect or any possible implementation of the second aspect.

附图说明Description of drawings

图1为本申请实施例提供的终端设备100的结构示意图;FIG. 1 is a schematic structural diagram of a terminal device 100 provided by an embodiment of the present application;

图2为本申请实施例提供的终端设备100的软件结构示意图;FIG. 2 is a schematic diagram of a software structure of a terminal device 100 according to an embodiment of the present application;

图3为本公开一示例性实施例示出的终端设备的架构图;FIG. 3 is an architecture diagram of a terminal device according to an exemplary embodiment of the present disclosure;

图4为本公开一示例性实施例示出的界面示意图;FIG. 4 is a schematic diagram of an interface shown in an exemplary embodiment of the present disclosure;

图5为本公开一示例性实施例示出的Applet安装成功的界面示意图;FIG. 5 is a schematic diagram of an interface showing a successful installation of an Applet according to an exemplary embodiment of the present disclosure;

图6为本公开一示例性实施例示出的Applet安装失败的界面示意图;FIG. 6 is a schematic diagram of an interface of an Applet installation failure shown in an exemplary embodiment of the present disclosure;

图7为本公开第一示例性实施例示出的设备交互图;FIG. 7 is a device interaction diagram shown in the first exemplary embodiment of the present disclosure;

图8为本公开第二示例性实施例示出的设备交互图;FIG. 8 is a device interaction diagram shown in the second exemplary embodiment of the present disclosure;

图9为本申请实施例提供的小应用程序的操作装置的硬件结构示意图。FIG. 9 is a schematic diagram of a hardware structure of an operating device for an applet provided by an embodiment of the present application.

具体实施方式Detailed ways

为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。例如,第一目标功能的界面和第二目标功能的界面是为了区分不同的响应界面,并不对其先后顺序进行限定。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。In order to clearly describe the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as "first" and "second" are used to distinguish the same or similar items with basically the same function and effect. For example, the interface of the first target function and the interface of the second target function are used to distinguish different response interfaces, and the sequence of the interfaces is not limited. Those skilled in the art can understand that the words "first", "second" and the like do not limit the quantity and execution order, and the words "first", "second" and the like are not necessarily different.

需要说明的是,本申请中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其他实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。It should be noted that, in this application, words such as "exemplary" or "for example" are used to represent examples, illustrations or illustrations. Any embodiment or design described in this application as "exemplary" or "such as" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present the related concepts in a specific manner.

电子设备包括终端设备,终端设备也可以称为终端(terminal)、用户设备(userequipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等。终端设备可以是手机(mobile phone)、智能电视、穿戴式设备、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self-driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等。本申请的实施例对终端设备所采用的具体技术和具体设备形态不做限定。An electronic device includes a terminal device, which may also be referred to as a terminal (terminal), user equipment (user equipment, UE), a mobile station (mobile station, MS), a mobile terminal (mobile terminal, MT), and the like. The terminal device may be a mobile phone (mobile phone), a smart TV, a wearable device, a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (virtual reality, VR) terminal device, an augmented reality (augmented reality, AR) terminal Equipment, wireless terminal in industrial control, wireless terminal in self-driving, wireless terminal in remote medical surgery, wireless terminal in smart grid, transportation A wireless terminal in transportation safety, a wireless terminal in a smart city, a wireless terminal in a smart home, and so on. The embodiments of the present application do not limit the specific technology and specific device form adopted by the terminal device.

为了能够更好地理解本申请实施例,下面对本申请实施例的终端设备的结构进行介绍:In order to better understand the embodiments of the present application, the structure of the terminal device according to the embodiments of the present application is introduced below:

图1示出了终端设备100的结构示意图。终端设备100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriberidentification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。FIG. 1 shows a schematic structural diagram of a terminal device 100 . The terminal device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2 , mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone jack 170D, sensor module 180, buttons 190, motor 191, indicator 192, camera 193, display screen 194, and A subscriber identification module (SIM) card interface 195 and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.

可以理解的是,本申请实施例示意的结构并不构成对终端设备100的具体限定。在本申请另一些实施例中,终端设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。It can be understood that the structures illustrated in the embodiments of the present application do not constitute a specific limitation on the terminal device 100 . In other embodiments of the present application, the terminal device 100 may include more or less components than those shown in the drawings, or combine some components, or separate some components, or arrange different components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.

处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processingunit,GPU),图像信号处理器(image signal processor,ISP),控制器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。The processor 110 may include one or more processing units, for example, the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor ( image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (neural-network processing unit, NPU), etc. Wherein, different processing units may be independent devices, or may be integrated in one or more processors.

控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。The controller can generate an operation control signal according to the instruction operation code and timing signal, and complete the control of fetching and executing instructions.

处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从存储器中调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in processor 110 is cache memory. This memory may hold instructions or data that have just been used or recycled by the processor 110 . If the processor 110 needs to use the instruction or data again, it can be called from memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby increasing the efficiency of the system.

在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integratedcircuitsound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purposeinput/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。In some embodiments, the processor 110 may include one or more interfaces. The interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuitsound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver (universal asynchronous receiver/ transmitter, UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and/or general-purpose Serial bus (universal serial bus, USB) interface and so on.

I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现终端设备100的触摸功能。The I2C interface is a bidirectional synchronous serial bus that includes a serial data line (SDA) and a serial clock line (SCL). In some embodiments, the processor 110 may contain multiple sets of I2C buses. The processor 110 can be respectively coupled to the touch sensor 180K, the charger, the flash, the camera 193 and the like through different I2C bus interfaces. For example, the processor 110 may couple the touch sensor 180K through the I2C interface, so that the processor 110 and the touch sensor 180K communicate with each other through the I2C bus interface, so as to realize the touch function of the terminal device 100 .

I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。The I2S interface can be used for audio communication. In some embodiments, the processor 110 may contain multiple sets of I2S buses. The processor 110 may be coupled with the audio module 170 through an I2S bus to implement communication between the processor 110 and the audio module 170 . In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface, so as to realize the function of answering calls through a Bluetooth headset.

PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM总线接口耦合。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。I2S接口和PCM接口都可以用于音频通信。The PCM interface can also be used for audio communications, sampling, quantizing and encoding analog signals. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface. In some embodiments, the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.

UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。The UART interface is a universal serial data bus used for asynchronous communication. The bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is typically used to connect the processor 110 with the wireless communication module 160 . For example, the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function. In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.

MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(displayserial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现终端设备100的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现终端设备100的显示功能。The MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 . The MIPI interface includes a camera serial interface (camera serial interface, CSI), a display serial interface (displayserial interface, DSI), and the like. In some embodiments, the processor 110 communicates with the camera 193 through the CSI interface, so as to realize the shooting function of the terminal device 100 . The processor 110 communicates with the display screen 194 through the DSI interface to implement the display function of the terminal device 100 .

GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。The GPIO interface can be configured by software. The GPIO interface can be configured as a control signal or as a data signal. In some embodiments, the GPIO interface may be used to connect the processor 110 with the camera 193, the display screen 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface can also be configured as I2C interface, I2S interface, UART interface, MIPI interface, etc.

USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为终端设备100充电,也可以用于终端设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。The USB interface 130 is an interface that conforms to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like. The USB interface 130 can be used to connect a charger to charge the terminal device 100, and can also be used to transmit data between the terminal device 100 and peripheral devices. It can also be used to connect headphones to play audio through the headphones. The interface can also be used to connect other electronic devices, such as AR devices.

可以理解的是,本申请实施例示意的各模块间的接口连接关系,是示意性说明,并不构成对终端设备100的结构限定。在本申请另一些实施例中,终端设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。It can be understood that the interface connection relationship between the modules illustrated in the embodiments of the present application is a schematic illustration, and does not constitute a structural limitation of the terminal device 100 . In other embodiments of the present application, the terminal device 100 may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.

充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过终端设备100的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为终端设备供电。The charging management module 140 is used to receive charging input from the charger. The charger may be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 may receive charging input from the wired charger through the USB interface 130 . In some wireless charging embodiments, the charging management module 140 may receive wireless charging input through the wireless charging coil of the terminal device 100 . While the charging management module 140 charges the battery 142 , it can also supply power to the terminal device through the power management module 141 .

电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。The power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 . The power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the internal memory 121, the display screen 194, the camera 193, and the wireless communication module 160. The power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, battery health status (leakage, impedance). In some other embodiments, the power management module 141 may also be provided in the processor 110 . In other embodiments, the power management module 141 and the charging management module 140 may also be provided in the same device.

终端设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。The wireless communication function of the terminal device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modulation and demodulation processor, the baseband processor, and the like.

天线1和天线2用于发射和接收电磁波信号。终端设备100中的天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals. Antennas in terminal device 100 may be used to cover single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization. For example, the antenna 1 can be multiplexed as a diversity antenna of the wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.

移动通信模块150可以提供应用在终端设备100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。The mobile communication module 150 may provide a wireless communication solution including 2G/3G/4G/5G, etc. applied on the terminal device 100 . The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA) and the like. The mobile communication module 150 can receive electromagnetic waves from the antenna 1, filter and amplify the received electromagnetic waves, and transmit them to the modulation and demodulation processor for demodulation. The mobile communication module 150 can also amplify the signal modulated by the modulation and demodulation processor, and then turn it into an electromagnetic wave for radiation through the antenna 1 . In some embodiments, at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110 . In some embodiments, at least part of the functional modules of the mobile communication module 150 may be provided in the same device as at least part of the modules of the processor 110 .

调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。The modem processor may include a modulator and a demodulator. Wherein, the modulator is used to modulate the low frequency baseband signal to be sent into a medium and high frequency signal. The demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator transmits the demodulated low-frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and passed to the application processor. The application processor outputs sound signals through audio devices (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or videos through the display screen 194 . In some embodiments, the modem processor may be a separate device. In other embodiments, the modem processor may be independent of the processor 110, and may be provided in the same device as the mobile communication module 150 or other functional modules.

无线通信模块160可以提供应用在终端设备100上的包括无线局域网(wirelesslocal area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。The wireless communication module 160 can provide wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), and global navigation satellite systems applied on the terminal device 100 . (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 . The wireless communication module 160 can also receive the signal to be sent from the processor 110 , perform frequency modulation on it, amplify it, and convert it into electromagnetic waves for radiation through the antenna 2 .

在一些实施例中,终端设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得终端设备100可以通过无线通信技术与网络以及其他设备通信。无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(codedivision multiple access,CDMA),宽带码分多址(wideband code divisionmultipleaccess,WCDMA),时分码分多址(time-division code division multipleaccess,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidounavigation satellite system,BDS),准天顶卫星系统(quasi-zenithsatellitesystem,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。In some embodiments, the antenna 1 of the terminal device 100 is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the terminal device 100 can communicate with the network and other devices through wireless communication technology. Wireless communication technologies may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband code division multiple access wideband code division multiple access (WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (LTE), BT, GNSS, WLAN, NFC, FM, and/or IR technology, etc. GNSS may include a global positioning system (GPS), a global navigation satellite system (GLONASS), a Beidou satellite navigation system (BDS), a quasi-zenith satellite system (quasi-zenith satellite system, QZSS) and/or satellite based augmentation systems (SBAS).

终端设备100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。The terminal device 100 implements a display function through a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.

显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emittingdiode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrixorganic light emitting diode的,AMOLED),柔性发光二极管(flex light-emittingdiode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dotlightemitting diodes,QLED)等。在一些实施例中,终端设备100可以包括1个或N个显示屏194,N为大于1的正整数。Display screen 194 is used to display images, videos, and the like. Display screen 194 includes a display panel. The display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode or an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode). , AMOLED), flexible light-emitting diodes (flex light-emitting diodes, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diodes (quantum dotlight emitting diodes, QLED) and so on. In some embodiments, the terminal device 100 may include one or N display screens 194 , where N is a positive integer greater than one.

终端设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。The terminal device 100 can realize the shooting function through the ISP, the camera 193, the video codec, the GPU, the display screen 194 and the application processor.

ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。The ISP is used to process the data fed back by the camera 193 . For example, when taking a photo, the shutter is opened, the light is transmitted to the camera photosensitive element through the lens, the light signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing, converting it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise, brightness, and skin tone. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 193 .

摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,终端设备100可以包括1个或N个摄像头193,N为大于1的正整数。Camera 193 is used to capture still images or video. The object is projected through the lens to generate an optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. DSP converts digital image signals into standard RGB, YUV and other formats of image signals. In some embodiments, the terminal device 100 may include 1 or N cameras 193 , where N is a positive integer greater than 1.

数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当终端设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。A digital signal processor is used to process digital signals, in addition to processing digital image signals, it can also process other digital signals. For example, when the terminal device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy, and the like.

视频编解码器用于对数字视频压缩或解压缩。终端设备100可以支持一种或多种视频编解码器。这样,终端设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。Video codecs are used to compress or decompress digital video. The terminal device 100 may support one or more video codecs. In this way, the terminal device 100 can play or record videos in various encoding formats, for example, moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, and so on.

NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现终端设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。The NPU is a neural-network (NN) computing processor. By drawing on the structure of biological neural networks, such as the transfer mode between neurons in the human brain, it can quickly process the input information, and can continuously learn by itself. Applications such as intelligent cognition of the terminal device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, and the like.

外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展终端设备100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。The external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, so as to expand the storage capacity of the terminal device 100 . The external memory card communicates with the processor 110 through the external memory interface 120 to realize the data storage function. For example to save files like music, video etc in external memory card.

内部存储器121可以用于存储计算机可执行程序代码,可执行程序代码包括指令。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储终端设备100使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。处理器110通过运行存储在内部存储器121的指令,和/或存储在设置于处理器中的存储器的指令,执行终端设备100的各种功能应用以及数据处理。Internal memory 121 may be used to store computer executable program code, which includes instructions. The internal memory 121 may include a storage program area and a storage data area. The storage program area can store an operating system, an application program required for at least one function (such as a sound playback function, an image playback function, etc.), and the like. The storage data area may store data (such as audio data, phone book, etc.) created during the use of the terminal device 100 and the like. In addition, the internal memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (UFS), and the like. The processor 110 executes various functional applications and data processing of the terminal device 100 by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.

终端设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。The terminal device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playback, recording, etc.

音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。The audio module 170 is used for converting digital audio information into analog audio signal output, and also for converting analog audio input into digital audio signal. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .

扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。终端设备100可以通过扬声器170A收听音乐,或收听免提通话。Speaker 170A, also referred to as a "speaker", is used to convert audio electrical signals into sound signals. The terminal device 100 can listen to music through the speaker 170A, or listen to a hands-free call.

受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当终端设备100接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。The receiver 170B, also referred to as "earpiece", is used to convert audio electrical signals into sound signals. When the terminal device 100 answers a call or a voice message, the voice can be answered by placing the receiver 170B close to the human ear.

麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。终端设备100可以设置至少一个麦克风170C。在另一些实施例中,终端设备100可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,终端设备100还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。The microphone 170C, also called "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can make a sound by approaching the microphone 170C through a human mouth, and input the sound signal into the microphone 170C. The terminal device 100 may be provided with at least one microphone 170C. In other embodiments, the terminal device 100 may be provided with two microphones 170C, which may implement a noise reduction function in addition to collecting sound signals. In other embodiments, the terminal device 100 may further be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions.

耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。The earphone jack 170D is used to connect wired earphones. The earphone port 170D may be the USB port 130 or a 3.5mm open mobile terminal platform (OMTP) standard port, a cellular telecommunications industry association of the USA (CTIA) standard port.

压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。压力传感器180A的种类很多,如电阻式压力传感器,电感式压力传感器,电容式压力传感器等。电容式压力传感器可以是包括至少两个具有导电材料的平行板。当有力作用于压力传感器180A,电极之间的电容改变。终端设备100根据电容的变化确定压力的强度。当有触摸操作作用于显示屏194,终端设备100根据压力传感器180A检测触摸操作强度。终端设备100也可以根据压力传感器180A的检测信号计算触摸的位置。在一些实施例中,作用于相同触摸位置,但不同触摸操作强度的触摸操作,可以对应不同的操作指令。The pressure sensor 180A is used to sense pressure signals, and can convert the pressure signals into electrical signals. In some embodiments, the pressure sensor 180A may be provided on the display screen 194 . There are many types of pressure sensors 180A, such as resistive pressure sensors, inductive pressure sensors, capacitive pressure sensors, and the like. The capacitive pressure sensor may be comprised of at least two parallel plates of conductive material. When a force is applied to the pressure sensor 180A, the capacitance between the electrodes changes. The terminal device 100 determines the intensity of the pressure according to the change in capacitance. When a touch operation acts on the display screen 194, the terminal device 100 detects the intensity of the touch operation according to the pressure sensor 180A. The terminal device 100 may also calculate the touched position according to the detection signal of the pressure sensor 180A. In some embodiments, touch operations acting on the same touch position but with different touch operation intensities may correspond to different operation instructions.

陀螺仪传感器180B可以用于确定终端设备100的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定终端设备100围绕三个轴(即,x,y和z轴)的角速度。陀螺仪传感器180B可以用于拍摄防抖。示例性的,当按下快门,陀螺仪传感器180B检测终端设备100抖动的角度,根据角度计算出镜头模组需要补偿的距离,让镜头通过反向运动抵消终端设备100的抖动,实现防抖。陀螺仪传感器180B还可以用于导航,体感游戏场景。The gyro sensor 180B may be used to determine the motion attitude of the terminal device 100 . In some embodiments, the angular velocity of the end device 100 about three axes (ie, the x, y and z axes) may be determined by the gyro sensor 180B. The gyro sensor 180B can be used for image stabilization. Exemplarily, when the shutter is pressed, the gyro sensor 180B detects the shaking angle of the terminal device 100, calculates the distance to be compensated by the lens module according to the angle, and allows the lens to offset the shaking of the terminal device 100 through reverse motion to achieve anti-shake. The gyro sensor 180B can also be used for navigation and somatosensory game scenarios.

气压传感器180C用于测量气压。在一些实施例中,终端设备100通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。The air pressure sensor 180C is used to measure air pressure. In some embodiments, the terminal device 100 calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist in positioning and navigation.

磁传感器180D包括霍尔传感器。终端设备100可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当终端设备100是翻盖机时,终端设备100可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。The magnetic sensor 180D includes a Hall sensor. The terminal device 100 can detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the terminal device 100 is a flip machine, the terminal device 100 can detect the opening and closing of the flip according to the magnetic sensor 180D. Further, according to the detected opening and closing state of the leather case or the opening and closing state of the flip cover, characteristics such as automatic unlocking of the flip cover are set.

加速度传感器180E可检测终端设备100在各个方向上(一般为三轴)加速度的大小。当终端设备100静止时可检测出重力的大小及方向。还可以用于识别终端设备姿态,应用于横竖屏切换,计步器等应用程序。The acceleration sensor 180E can detect the magnitude of the acceleration of the terminal device 100 in various directions (generally three axes). The magnitude and direction of gravity can be detected when the terminal device 100 is stationary. It can also be used to identify the posture of terminal devices, and can be used in applications such as horizontal and vertical screen switching, pedometers, etc.

距离传感器180F,用于测量距离。终端设备100可以通过红外或激光测量距离。在一些实施例中,拍摄场景,终端设备100可以利用距离传感器180F测距以实现快速对焦。Distance sensor 180F for measuring distance. The terminal device 100 can measure the distance through infrared or laser. In some embodiments, when shooting a scene, the terminal device 100 can use the distance sensor 180F to measure the distance to achieve fast focusing.

接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。终端设备100通过发光二极管向外发射红外光。终端设备100使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定终端设备100附近有物体。当检测到不充分的反射光时,终端设备100可以确定终端设备100附近没有物体。终端设备100可以利用接近光传感器180G检测用户手持终端设备100贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。Proximity light sensor 180G may include, for example, light emitting diodes (LEDs) and light detectors, such as photodiodes. The light emitting diodes may be infrared light emitting diodes. The terminal device 100 emits infrared light to the outside through the light emitting diode. The terminal device 100 detects infrared reflected light from nearby objects using a photodiode. When sufficient reflected light is detected, it can be determined that there is an object near the terminal device 100 . When insufficient reflected light is detected, the terminal device 100 may determine that there is no object near the terminal device 100 . The terminal device 100 can use the proximity light sensor 180G to detect that the user holds the terminal device 100 close to the ear to talk, so as to automatically turn off the screen to save power. Proximity light sensor 180G can also be used in holster mode, pocket mode automatically unlocks and locks the screen.

环境光传感器180L用于感知环境光亮度。终端设备100可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测终端设备100是否在口袋里,以防误触。The ambient light sensor 180L is used to sense ambient light brightness. The terminal device 100 can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness. The ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures. The ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the terminal device 100 is in a pocket, so as to prevent accidental touch.

指纹传感器180H用于采集指纹。终端设备100可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。The fingerprint sensor 180H is used to collect fingerprints. The terminal device 100 can use the collected fingerprint characteristics to realize fingerprint unlocking, accessing application locks, taking photos with fingerprints, answering incoming calls with fingerprints, and the like.

温度传感器180J用于检测温度。在一些实施例中,终端设备100利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,终端设备100执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,终端设备100对电池142加热,以避免低温导致终端设备100异常关机。在其他一些实施例中,当温度低于又一阈值时,终端设备100对电池142的输出电压执行升压,以避免低温导致的异常关机。The temperature sensor 180J is used to detect the temperature. In some embodiments, the terminal device 100 uses the temperature detected by the temperature sensor 180J to execute the temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold value, the terminal device 100 reduces the performance of the processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection. In other embodiments, when the temperature is lower than another threshold, the terminal device 100 heats the battery 142 to avoid abnormal shutdown of the terminal device 100 caused by the low temperature. In some other embodiments, when the temperature is lower than another threshold, the terminal device 100 boosts the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.

触摸传感器180K,也称“触控器件”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于终端设备100的表面,与显示屏194所处的位置不同。Touch sensor 180K, also called "touch device". The touch sensor 180K may be disposed on the display screen 194 , and the touch sensor 180K and the display screen 194 form a touch screen, also called a “touch screen”. The touch sensor 180K is used to detect a touch operation on or near it. The touch sensor can pass the detected touch operation to the application processor to determine the type of touch event. Visual output related to touch operations may be provided through display screen 194 . In other embodiments, the touch sensor 180K may also be disposed on the surface of the terminal device 100 , which is different from the position where the display screen 194 is located.

骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。在一些实施例中,骨传导传感器180M也可以设置于耳机中,结合成骨传导耳机。音频模块170可以基于骨传导传感器180M获取的声部振动骨块的振动信号,解析出语音信号,实现语音功能。应用处理器可以基于骨传导传感器180M获取的血压跳动信号解析心率信息,实现心率检测功能。The bone conduction sensor 180M can acquire vibration signals. In some embodiments, the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human voice. The bone conduction sensor 180M can also contact the pulse of the human body and receive the blood pressure beating signal. In some embodiments, the bone conduction sensor 180M can also be disposed in the earphone, combined with the bone conduction earphone. The audio module 170 can analyze the voice signal based on the vibration signal of the voice part vibrating bone mass obtained by the bone conduction sensor 180M, so as to realize the voice function. The application processor can analyze the heart rate information based on the blood pressure beat signal obtained by the bone conduction sensor 180M, and realize the function of heart rate detection.

按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。终端设备100可以接收按键输入,产生与终端设备100的用户设置以及功能控制有关的键信号输入。The keys 190 include a power-on key, a volume key, and the like. Keys 190 may be mechanical keys. It can also be a touch key. The terminal device 100 may receive key input and generate key signal input related to user settings and function control of the terminal device 100 .

马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用程序(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。Motor 191 can generate vibrating cues. The motor 191 can be used for vibrating alerts for incoming calls, and can also be used for touch vibration feedback. For example, touch operations acting on different applications (such as taking pictures, playing audio, etc.) can correspond to different vibration feedback effects. The motor 191 can also correspond to different vibration feedback effects for touch operations on different areas of the display screen 194 . Different application scenarios (for example: time reminder, receiving information, alarm clock, games, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect can also support customization.

指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。The indicator 192 can be an indicator light, which can be used to indicate the charging state, the change of the power, and can also be used to indicate a message, a missed call, a notification, and the like.

SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和终端设备100的接触和分离。终端设备100可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一个SIM卡接口195可以同时插入多张卡。多张卡的类型可以相同,也可以不同。SIM卡接口195也可以兼容不同类型的SIM卡。SIM卡接口195也可以兼容外部存储卡。终端设备100通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,终端设备100采用eSIM,即:嵌入式SIM卡。eSIM卡可以嵌在终端设备100中,不能和终端设备100分离。The SIM card interface 195 is used to connect a SIM card. The SIM card can be contacted and separated from the terminal device 100 by inserting into the SIM card interface 195 or pulling out from the SIM card interface 195 . The terminal device 100 may support 1 or N SIM card interfaces, where N is a positive integer greater than 1. The SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card and so on. Multiple cards can be inserted into the same SIM card interface 195 at the same time. Multiple cards can be of the same type or different. The SIM card interface 195 can also be compatible with different types of SIM cards. The SIM card interface 195 is also compatible with external memory cards. The terminal device 100 interacts with the network through the SIM card to realize functions such as calls and data communication. In some embodiments, the terminal device 100 adopts an eSIM, that is, an embedded SIM card. The eSIM card can be embedded in the terminal device 100 and cannot be separated from the terminal device 100 .

终端设备100的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构,等。本申请实施例以分层架构的Android系统为例,示例性说明终端设备100的软件结构。The software system of the terminal device 100 may adopt a layered architecture, an event-driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture, and the like. The embodiments of the present application take an Android system with a layered architecture as an example to exemplarily describe the software structure of the terminal device 100 .

图2是本申请实施例的终端设备100的软件结构框图。FIG. 2 is a block diagram of a software structure of a terminal device 100 according to an embodiment of the present application.

分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。The layered architecture divides the software into several layers, and each layer has a clear role and division of labor. Layers communicate with each other through software interfaces. In some embodiments, the Android system is divided into four layers, which are, from top to bottom, an application layer, an application framework layer, an Android runtime (Android runtime) and system libraries, and a kernel layer.

应用程序层可以包括一系列应用程序包。The application layer can include a series of application packages.

如图2所示,应用程序包可以包括相机,日历,电话,地图,电话,音乐,设置,邮箱,视频,社交等应用程序。As shown in Figure 2, the application package can include applications such as camera, calendar, phone, map, phone, music, settings, mailbox, video, social, etc.

应用程序框架层为应用程序层的应用程序提供应用编程接口(applicationprogramming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。The application framework layer provides an application programming interface (application programming interface, API) and a programming framework for the applications of the application layer. The application framework layer includes some predefined functions.

如图2所示,应用程序框架层可以包括窗口管理器,内容提供器,资源管理器,视图系统,通知管理器等。As shown in Figure 2, the application framework layer can include window managers, content providers, resource managers, view systems, notification managers, and so on.

窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,触摸屏幕,拖拽屏幕,截取屏幕等。A window manager is used to manage window programs. The window manager can get the size of the display screen, determine whether there is a status bar, lock the screen, touch the screen, drag the screen, take a screenshot, etc.

内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。Content providers are used to store and retrieve data and make these data accessible to applications. Data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone book, etc.

视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。The view system includes visual controls, such as controls for displaying text, controls for displaying pictures, and so on. View systems can be used to build applications. A display interface can consist of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.

资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。The resource manager provides various resources for the application, such as localization strings, icons, pictures, layout files, video files and so on.

通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,终端设备振动,指示灯闪烁等。The notification manager enables applications to display notification information in the status bar, which can be used to convey notification-type messages, and can disappear automatically after a brief pause without user interaction. For example, the notification manager is used to notify download completion, message reminders, etc. The notification manager can also display notifications in the status bar at the top of the system in the form of graphs or scroll bar text, such as notifications of applications running in the background, and notifications on the screen in the form of dialog windows. For example, text information is prompted in the status bar, a prompt sound is issued, the terminal device vibrates, and the indicator light flashes.

Android runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。The Android runtime includes core libraries and a virtual machine. The Android runtime is responsible for the scheduling and management of the Android system.

核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。The core library consists of two parts: one is the function functions that the java language needs to call, and the other is the core library of Android.

应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。The application layer and the application framework layer run in virtual machines. The virtual machine executes the java files of the application layer and the application framework layer as binary files. The virtual machine is used to perform functions such as object lifecycle management, stack management, thread management, safety and exception management, and garbage collection.

系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。A system library can include multiple functional modules. For example: surface manager (surface manager), media library (Media Libraries), 3D graphics processing library (eg: OpenGL ES), 2D graphics engine (eg: SGL) and so on.

表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。The Surface Manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.

媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。The media library supports playback and recording of a variety of commonly used audio and video formats, as well as still image files. The media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.

三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。The 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing.

2D图形引擎是2D绘图的绘图引擎。2D graphics engine is a drawing engine for 2D drawing.

内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。The kernel layer is the layer between hardware and software. The kernel layer contains at least display drivers, camera drivers, audio drivers, and sensor drivers.

下面结合附图对本申请实施例提供的应用程序中的应用功能分屏设置的操作过程及分屏功能界面的显示过程进行详细地介绍。需要说明的是,本申请实施例中的“在……时”,可以为在某种情况发生的瞬时,也可以为在某种情况发生后的一段时间内,本申请实施例对此不作具体限定。The following describes in detail the operation process of setting the application function split screen in the application program provided by the embodiments of the present application and the display process of the split screen function interface with reference to the accompanying drawings. It should be noted that “at the time of” in the embodiment of the present application may be the moment when a certain situation occurs, or it may be within a period of time after the occurrence of a certain situation, which is not specified in the embodiment of the present application. limited.

目前,很多具有交易支付功能的终端设备中设置有嵌入式安全模块(embeddedsecure element,eSE),eSE是一种安全模块,主要负责终端设备的数据安全存储和数据加密等工作,eSE的安全性能较高。eSE中可以设置辅助安全域(supplementary securitydomain,SSD),每个SSD中都可以安装小应用程序(Applet)。终端设备能够通过Applet进行支付,以实现移动支付功能。At present, many terminal devices with transaction payment function are equipped with an embedded secure element (eSE). eSE is a security module, which is mainly responsible for the secure data storage and data encryption of the terminal device. The security performance of eSE is relatively high. high. A supplementary security domain (SSD) can be set in the eSE, and an applet can be installed in each SSD. The terminal device can make payment through Applet to realize the mobile payment function.

在终端设备中添加银行卡的Applet时,可以通过终端设备中的钱包App调用SSD创建接口,从而在终端设备的eSE中创建SSD,再在创建的SSD中添加银行卡的Applet。When adding a bank card applet to the terminal device, you can call the SSD creation interface through the wallet app in the terminal device to create an SSD in the eSE of the terminal device, and then add the bank card applet to the created SSD.

但是,eSE作为终端设备中安全性较高的硬件,若任意的应用程序可以操作eSE中的SSD,则终端设备的eSE的安全性会降低。为了解决上述技术问题,本公开提供的方案中,应用程序在eSE中操作SSD时,需要服务器对该应用程序进行校验,校验通过后,应用程序才能够操作eSE的SSD,从而提高终端设备的eSE的安全性能。However, as the eSE is the hardware with high security in the terminal device, if any application program can operate the SSD in the eSE, the security of the eSE of the terminal device will be reduced. In order to solve the above technical problems, in the solution provided by the present disclosure, when an application program operates the SSD in the eSE, the server needs to verify the application program. After the verification is passed, the application program can operate the SSD of the eSE, thereby improving the performance of the terminal equipment. The security performance of eSE.

图3为本公开一示例性实施例示出的终端设备的架构图。FIG. 3 is an architectural diagram of a terminal device according to an exemplary embodiment of the present disclosure.

如图3所示,在终端设备中可以设置应用程序、FWK(Framework,框架)和eSE。应用程序能够通过FWK提供的功能,操作eSE,进而在其中创建或删除SSD。As shown in FIG. 3, an application program, FWK (Framework, framework) and eSE can be set in the terminal device. Applications can operate eSE through the functions provided by FWK, and then create or delete SSD in it.

FWK可以提供SSD创建接口,应用程序可以调用该接口,进而在eSE中创建SSD。FWK可以提供SSD删除接口,应用程序可以调用该接口,进而在eSE中删除SSDFWK can provide an SSD creation interface, and applications can call this interface to create an SSD in eSE. FWK can provide an SSD deletion interface, which can be called by applications to delete SSD in eSE

图4为本公开一示例性实施例示出的界面示意图。FIG. 4 is a schematic diagram of an interface shown in an exemplary embodiment of the present disclosure.

在终端设备中可以设置应用程序,该应用程序具有支付功能,例如,可以是数字人民币钱包。用户可以操作终端设备使其运行具有支付功能的应用程序。该应用程序可以在终端设备的eSE中创建SSD,还能够在SSD中安装小应用程序Applet。An application can be set up in the terminal device, and the application has a payment function, for example, it can be a digital RMB wallet. The user can operate the terminal device to run the application program with payment function. The application can create an SSD in the eSE of the terminal device, and can also install the applet in the SSD.

用户可以在终端设备中操作该应用程序,使得该应用程序显示如图4所示的界面,从而在其中进行操作,使该应用程序在终端设备中安装Applet。The user can operate the application program in the terminal device, so that the application program displays the interface as shown in FIG. 4, so as to operate in the application program, and make the application program install the Applet in the terminal device.

如图4(a)所示,在应用程序中设置有安装Applet的界面,用户可以点击开通离线钱包的按键,从而向应用程序发送安装Applet的指令。As shown in Figure 4(a), an interface for installing Applet is set in the application, and the user can click the button for opening an offline wallet, thereby sending an instruction to install the Applet to the application.

应用程序接收到安装Applet的指令后,可以调用FWK提供的SSD创建接口,从而在eSE中创建SSD,再在创建的SSD中安装Applet。After the application receives the instruction to install the applet, it can call the SSD creation interface provided by the FWK to create the SSD in the eSE, and then install the applet in the created SSD.

为了提高eSE的安全性,应用程序调用SSD创建接口时,FWK还可以向服务器发送校验请求,服务器基于该请求对校验请求中的信息进行校验,这些信息具体可以是应用程序的信息,因此,服务器可以对应用程序的权限进行校验。若校验通过,则FWK能够在eSE中创建SSD,进而使应用程序能够在SSD中安装Applet。若校验不通过,则FWK无法在eSE中创建SSD,进而使应用程序不能够在SSD中安装Applet。In order to improve the security of eSE, when an application calls the SSD to create an interface, the FWK can also send a verification request to the server, and the server verifies the information in the verification request based on the request. Therefore, the server can verify the permissions of the application. If the verification is passed, the FWK can create the SSD in the eSE, and then the application can install the Applet in the SSD. If the verification fails, the FWK cannot create the SSD in the eSE, and the application cannot install the Applet in the SSD.

在等待服务器反馈消息、以及创建SSD、安装Applet的过程中,终端设备可以显示如图4(b)所示出的界面。During the process of waiting for a feedback message from the server, creating an SSD, and installing an Applet, the terminal device can display the interface shown in Figure 4(b).

图5为本公开一示例性实施例示出的Applet安装成功的界面示意图。FIG. 5 is a schematic diagram of an interface showing a successful installation of an Applet according to an exemplary embodiment of the present disclosure.

Applet安装成功后,终端设备可以显示如图5所示的界面示意图,图5中以该Applet为离线钱包进行示意性的说明。具体可以显示离线钱包的名称、卡号、余额等多个信息。还可以显示离线钱包开通成功的消息。After the Applet is successfully installed, the terminal device can display a schematic interface diagram as shown in FIG. 5 . In FIG. 5 , the Applet is used as an offline wallet for a schematic illustration. Specifically, it can display the name, card number, balance and other information of the offline wallet. It can also display the message that the offline wallet is successfully opened.

在离线钱包的界面中还设置有转入和转出按键,用户可以点击转入或转出的按键,从而向离线钱包中转入一定数额的数字人民币,或者从离线钱包中转出一定数额的数字人民币。There are also transfer-in and transfer-out buttons on the interface of the offline wallet. Users can click the transfer-in or transfer-out button to transfer a certain amount of digital RMB to the offline wallet, or transfer a certain amount of digital renminbi from the offline wallet. digital yuan.

图6为本公开一示例性实施例示出的Applet安装失败的界面示意图。FIG. 6 is a schematic diagram of an interface of an Applet installation failure shown in an exemplary embodiment of the present disclosure.

一种情况中,还可能存在安装Applet失败的情况,例如,服务器反馈校验失败的消息,则FWK无法创建SSD,这种情况下,应用程序可以显示如图6所示的界面,提醒用户离线钱包创建失败。In one case, there may also be a failure to install the Applet. For example, if the server reports a verification failure message, the FWK cannot create an SSD. In this case, the application can display the interface shown in Figure 6 to remind the user to go offline. Wallet creation failed.

图7为本公开第一示例性实施例示出的设备交互图。FIG. 7 is a device interaction diagram shown in the first exemplary embodiment of the present disclosure.

如图7所示,用户可以操作终端设备的应用程序,点击安装Applet的按键,例如,可以点击应用程序中的“创建离线钱包”的按键,再例如,可以点击应用程序中的“开卡”的按键。As shown in Figure 7, the user can operate the application program of the terminal device and click the button to install the Applet. For example, he can click the button of "Create Offline Wallet" in the application program, and for example, he can click the "Open Card" button in the application program. button.

应用程序接收到安装Applet的指令之后,可以向终端设备的FWK发送SSD创建请求。FWK能够提供SSD创建接口,应用程序接收到安装Applet的指令之后,可以调用该SSD创建接口,使得FWK为该应用程序在eSE中创建SSD。After the application receives the instruction to install the Applet, it can send an SSD creation request to the FWK of the terminal device. The FWK can provide an SSD creation interface. After the application receives the instruction to install the Applet, it can call the SSD creation interface, so that the FWK can create an SSD in the eSE for the application.

为了避免任意的应用程序均能够通过FWK在eSE中创建SSD,FWK还可以向服务器发送校验请求,该校验请求中可以携带应用程序的信息,使服务器对该应用程序的权限进行校验。To prevent any application from being able to create an SSD in the eSE through the FWK, the FWK can also send a verification request to the server. The verification request can carry information about the application, so that the server can verify the permissions of the application.

一种可选的实施方式中,在FWK向服务器发送校验请求之前,还可以确定该应用程序是否在白名单中,若在,则终端设备的FWK可以向服务器发送校验请求。若不在,则终端设备的FWK拒绝应用程序的创建SSD请求,应用程序界面中可以显示离线钱包创建失败的信息。In an optional implementation manner, before the FWK sends the verification request to the server, it can also be determined whether the application is in the whitelist, and if so, the FWK of the terminal device can send the verification request to the server. If not, the FWK of the terminal device rejects the application's request to create an SSD, and the application program interface can display the information that the offline wallet creation failed.

其中,在终端设备中还可以设置应用程序的私钥,在服务器中设置有该应用程序的公钥。从而可以根据非对称加密的方式对应用程序的权限进行校验。Wherein, the private key of the application can also be set in the terminal device, and the public key of the application can be set in the server. Thereby, the permission of the application can be verified according to the asymmetric encryption method.

FWK可以获取应用程序的私钥,并使用该私钥生成签名数据。例如,可以获取应用程序的信息,并利用应用程序的私钥对该信息进行签名,得到签名数据。例如,可以拼接应用程序标识、与安装的Applet对应的安全域标识、时间戳,得到字符串,再利用私钥对该字符串进行签名,得到签名数据。再例如,可以获取应用程序的标识,利用应用程序的私钥对该标识进行签名,得到签名数据。The FWK can obtain the application's private key and use that private key to generate signature data. For example, the information of the application can be obtained, and the information can be signed by using the private key of the application to obtain the signature data. For example, the application identifier, the security domain identifier corresponding to the installed Applet, and the timestamp can be concatenated to obtain a string, and then the private key is used to sign the string to obtain the signature data. For another example, the identifier of the application can be obtained, and the identifier can be signed by using the private key of the application to obtain the signature data.

还可以设置于该应用程序对应的加密算法,例如,可以基于sm2(一种加密算法)算法生成签名数据。It can also be set to the encryption algorithm corresponding to the application, for example, the signature data can be generated based on the sm2 (an encryption algorithm) algorithm.

针对每个Applet可以设置安全域标识,例如,为第一Applet创建SSD时,该SSD的标识为第一SSD AID,则第一Applet的安全域标识为第一SSD AID。A security domain identifier can be set for each applet. For example, when an SSD is created for the first applet, the identifier of the SSD is the first SSD AID, and the security domain identifier of the first applet is the first SSD AID.

进一步的,同一个应用程序可以对应有多个安全域标识。例如,通过一个应用程序可以安装N个Applet,则服务器中设置有与该应用程序对应的N个安全域标识。一个安全域标识与一个Applet对应。Further, the same application may correspond to multiple security domain identifiers. For example, if N Applets can be installed through one application, then N security domain identifiers corresponding to the application are set in the server. A security domain ID corresponds to an applet.

实际应用时,不同应用程序还可能与相同的安全域标识对应,例如,通过应用程序A可以安装第一Applet,通过应用程序B也可以安装该第一Applet,则应用程序A可以与第一Applet的安全域标识对应,应用程序B也可以与第一Applet的安全域标识对应。In actual application, different applications may also correspond to the same security domain identifier. For example, the first applet can be installed through application A, and the first applet can also be installed through application B, then application A can be used with the first applet. corresponding to the security domain identifier of the first applet, and application B may also correspond to the security domain identifier of the first applet.

FWK生成签名数据之后,可以向服务器发送校验请求,校验请求中可以包括该签名数据。服务器可以获取应用程序的公钥,进而对签名数据进行校验,若校验通过,则服务器可以向FWK发送通过信息,使得FWK为应用程序创建SSD。After the FWK generates the signature data, it can send a verification request to the server, and the verification request can include the signature data. The server can obtain the public key of the application, and then verify the signature data. If the verification is passed, the server can send the pass information to the FWK, so that the FWK can create an SSD for the application.

具体的,校验请求中还可以包括应用程序标识、安全域标识、时间戳等内容。例如,应用程序A向FWK发送创建SSD请求,则FWK获取应用程序A的私钥,并生成签名数据。再将应用程序A的标识、当前需要安装的Applet对应的安全域标识、时间戳和签名数据发送给服务器。Specifically, the verification request may also include content such as an application identifier, a security domain identifier, and a timestamp. For example, application A sends a request to create an SSD to FWK, and FWK obtains the private key of application A and generates signature data. Then, the identifier of the application A, the security domain identifier corresponding to the Applet that needs to be installed at present, the timestamp and the signature data are sent to the server.

服务器接收到校验请求后,可以获取其中的应用程序标识,再根据应用程序标识获取公钥。服务器侧可以存储与应用程序对应的公钥,例如,应用程序A和应用程序B具有在eSE中创建SSD的权限,则服务器中可以存储应用程序A和B对应的公钥。After the server receives the verification request, it can obtain the application ID in it, and then obtain the public key according to the application ID. The server side can store public keys corresponding to applications. For example, if application A and application B have the right to create SSDs in the eSE, the public keys corresponding to applications A and B can be stored in the server.

进一步的,服务器可以利用获取的公钥对校验请求中包括的签名数据进行校验,若使用公钥对签名数据进行解密成功,则可以确定该签名数据是使用应用程序的私钥生成的,进而确定对签名数据的校验通过,例如,可以预设加密算法,则可以基于该预设的加密算法对签名数据进行解密,预设加密算法例如可以是sm2算法。Further, the server can use the obtained public key to verify the signature data included in the verification request, and if the signature data is successfully decrypted by using the public key, it can be determined that the signature data is generated using the private key of the application, It is further determined that the verification of the signature data is passed. For example, an encryption algorithm may be preset, and the signature data may be decrypted based on the preset encryption algorithm. The preset encryption algorithm may be, for example, the sm2 algorithm.

另一种实施方式中,服务器中还存储有与应用程序对应的加密算法。这种实施方式中,服务器接收到校验请求之后,还可以根据应用程序标识获取加密算法,进而基于该加密算法,使用应用程序的公钥对签名数据进行解密,从而对签名数据进行校验。In another implementation manner, an encryption algorithm corresponding to the application program is also stored in the server. In this embodiment, after receiving the verification request, the server may also obtain an encryption algorithm according to the application identifier, and then use the public key of the application to decrypt the signature data based on the encryption algorithm, thereby verifying the signature data.

例如,应用程序A对应的加密算法为sm2,应用程序B对应的加密算法为RSA2048。若校验请求中包括的应用程序标识为程序A的标识,则服务器获取的加密算法为sm2。For example, the encryption algorithm corresponding to application A is sm2, and the encryption algorithm corresponding to application B is RSA2048. If the application identifier included in the verification request is the identifier of program A, the encryption algorithm obtained by the server is sm2.

在一个可选的实施方式中,针对同一个应用程序,服务器可以存储与该应用程序对应的多个加密算法。可以具体根据终端设备所在的地域选择加密算法。例如,服务器可以根据终端设备发送校验信息时的IP地址,确定该终端设备所在地域,进而根据该地域在与终端设备对应的多个加密算法进行选择。例如,应用程序A对应的加密算法为sm2和RSA2048,当终端设备所在的地域为第一区域时,可以选择sm2算法,当终端设备所在的地域为第二区域时,可以选择RSA2048算法。In an optional implementation manner, for the same application, the server may store multiple encryption algorithms corresponding to the application. The encryption algorithm can be selected according to the region where the terminal device is located. For example, the server may determine the region where the terminal device is located according to the IP address of the terminal device when sending the verification information, and then select multiple encryption algorithms corresponding to the terminal device according to the region. For example, the encryption algorithms corresponding to application A are sm2 and RSA2048. When the region where the terminal device is located is the first region, the sm2 algorithm can be selected, and when the region where the terminal device is located is the second region, the RSA2048 algorithm can be selected.

这种实施方式尤其适用于多地域的终端设备均可以向服务器发送校验信息的场景,例如位于第一区域的第一终端可以向服务器发送校验信息,且该第一终端生成签名数据时,使用与第一区域对应的加密算法;位于第二区域的第二终端也可以向服务器发送校验信息,且该第二终端生成签名数据时,使用与第二区域对应的加密算法。这种场景中,服务器可以根据终端设备所在地域选择与该地域对应的加密算法。This embodiment is especially suitable for scenarios where terminal devices in multiple regions can send verification information to the server. For example, a first terminal located in the first area can send verification information to the server, and when the first terminal generates signature data, The encryption algorithm corresponding to the first area is used; the second terminal located in the second area can also send verification information to the server, and the second terminal uses the encryption algorithm corresponding to the second area when generating the signature data. In this scenario, the server may select an encryption algorithm corresponding to the region according to the region where the terminal device is located.

其中,第一区域可以是指第一类国家所在的地区,第二区域可以是指第二类国家所在的地区。The first area may refer to the area where the first type of country is located, and the second area may refer to the area where the second type of country is located.

上述实施例用两个区域进行举例说明,当然也可以设置与更多的区域所对应的加密算法,处理过程与设置有与两个区域对应的加密算法相同,不再赘述。The above embodiment uses two regions as an example to illustrate, of course, encryption algorithms corresponding to more regions may also be set, and the processing process is the same as that of setting encryption algorithms corresponding to two regions, and will not be repeated.

一种可选的实施方式中,若服务器对签名数据校验成功,则服务器可以向终端设备的FWK发送校验通过的信息。这种实施方式中,FWK向服务器发送的校验请求中包括签名数据和应用程序标识。In an optional implementation manner, if the server verifies the signature data successfully, the server may send the verification information to the FWK of the terminal device. In this embodiment, the verification request sent by the FWK to the server includes the signature data and the application identifier.

实际应用时,服务器中还可以存储与应用程序对应的安全域标识。服务器可以根据校验请求中的应用程序标识,获取与应用程序对应的安全域标识。进而可以比对获取的安全域标识与校验请求中的安全域标识,若比对一致,则可以确定对安全域标识的校验通过。In actual application, the server may also store the security domain identifier corresponding to the application. The server can obtain the security domain identifier corresponding to the application according to the application identifier in the verification request. Further, the obtained security domain identifier can be compared with the security domain identifier in the verification request, and if the comparison is consistent, it can be determined that the verification of the security domain identifier has passed.

一种可选的实施方式中,若服务器对签名数据校验成功,且服务器对安全域标识的校验也通过,则服务器可以向终端设备的FWK发送校验通过的信息。这种实施方式中,FWK向服务器发送的校验请求中包括签名数据和应用程序标识,还包括安全域标识。In an optional implementation manner, if the verification of the signature data by the server is successful, and the verification of the security domain identifier by the server also passes, the server may send the verification information to the FWK of the terminal device. In this embodiment, the verification request sent by the FWK to the server includes the signature data and the application program identifier, and also includes the security domain identifier.

其中,FWK向服务器发送的校验请求中还可以包括时间戳,服务器校验时,可以获取当前时间,并与时间戳进行比对,若二者时间间隔小于预设间隔,则确定时间校验通过。这种实施方式中,能够避免服务器重复向FWK发送校验通过的信息。The verification request sent by the FWK to the server may also include a timestamp. When the server performs verification, the current time can be obtained and compared with the timestamp. If the time interval between the two is less than the preset interval, the time verification will be determined. pass. In this embodiment, the server can avoid repeatedly sending the verification information to the FWK.

一种可选的实施方式中,若服务器对签名数据校验成功,且服务器对安全域标识的校验也通过,且对时间的校验通过,则服务器可以向终端设备的FWK发送校验通过的信息。这种实施方式中,FWK向服务器发送的校验请求中包括签名数据和应用程序标识,还包括安全域标识、时间戳。In an optional embodiment, if the server checks the signature data successfully, and the server checks the security domain identifier, and the time check passes, then the server can send the check to the FWK of the terminal device. Information. In this embodiment, the verification request sent by the FWK to the server includes the signature data and the application program identifier, as well as the security domain identifier and the timestamp.

具体的,上述的应用程序标识可以是应用程序包名。Specifically, the above-mentioned application identifier may be an application package name.

若服务器对校验请求的校验通过,则可以向FWK发送校验通过的信息,该信息中可以包括安全域安装脚本。服务器对校验请求的校验通过后,可以获取安全域安装脚本,并将其发送给终端设备的FWK。If the verification of the verification request is passed by the server, the verification information may be sent to the FWK, and the information may include the security domain installation script. After the server passes the verification of the verification request, it can obtain the security domain installation script and send it to the FWK of the terminal device.

进一步的,服务器可以根据校验请求中的安全域标识,获取对应的安全域安装脚本。还可以根据当前需要安装的Applet,获取对应的安全域安装脚本。Further, the server may obtain the corresponding security domain installation script according to the security domain identifier in the verification request. You can also obtain the corresponding security domain installation script according to the current applet to be installed.

实际应用时,FWK接收到安全域安装脚本之后,可以执行该安全域安装脚本,进而在eSE中创建SSD。eSE可以向FWK发送创建结果,比如,SSD创建成功的结果,再例如,SSD创建失败的结果。FWK还可以将SSD创建结果转发给应用程序。In practical applications, after the FWK receives the security domain installation script, it can execute the security domain installation script to create an SSD in the eSE. The eSE can send the creation result to the FWK, for example, the result of the successful creation of the SSD, or the result of the failure of the creation of the SSD. FWK can also forward SSD creation results to applications.

一种可选的实施方式中,终端设备与应用程序可以预先约定初始秘钥的生成方式,在终端设备的eSE中创建SSD时,终端设备还可以根据预先约定的方式为该ssd生成初始秘钥。In an optional implementation manner, the terminal device and the application can pre-agreed on the generation method of the initial key, and when the SSD is created in the eSE of the terminal device, the terminal device can also generate the initial key for the SSD according to the pre-agreed method. .

若在eSE中创建SSD成功,则eSE可以向FWK发送SSD创建成功的结果,FWK可以向应用程序转发SSD创建成功的结果。若应用程序接收到了SSD创建成功的结果,则应用程序可以根据预先约定的方式生成初始秘钥,进而可以利用该初始秘钥操作创建的SSD。If the SSD is successfully created in the eSE, the eSE can send the result of the successful creation of the SSD to the FWK, and the FWK can forward the result of the successful creation of the SSD to the application. If the application program receives the result that the SSD is successfully created, the application program can generate an initial key according to a pre-agreed method, and then can operate the created SSD using the initial key.

应用程序可以利用初始秘钥修改SSD的密钥,使得创建的SSD更加安全,从而进一步的提高SSD的安全性。应用程序可以基于修改后的密钥操作SSD。The application can use the initial key to modify the key of the SSD to make the created SSD more secure, thereby further improving the security of the SSD. Applications can operate the SSD based on the modified key.

应用程序还可以在SSD中安装Applet。应用程序具体可以下载Applet,再将其添加到创建的SSD中。若在SSD中安装Applet成功,则eSE还可以向应用程序发送安装成功的消息。Applications can also install Applets in SSDs. The application can download the applet and add it to the created SSD. If the Applet is successfully installed in the SSD, the eSE can also send a message that the installation is successful to the application.

在SSD中成功安装Applet之后,应用程序还可以向FWK发送卡添加请求,从而在FWK中添加与该Applet对应的卡。FWK接收到卡添加请求之后,可以在硬件钱包中添加卡,并向应用程序发送添加结果。比如,卡添加成功的消息。After the applet is successfully installed in the SSD, the application can also send a card add request to the FWK to add the card corresponding to the applet in the FWK. After the FWK receives the card addition request, it can add the card in the hardware wallet and send the addition result to the application. For example, a message that the card was added successfully.

图8为本公开第二示例性实施例示出的设备交互图。FIG. 8 is a device interaction diagram shown in the second exemplary embodiment of the present disclosure.

如图8所示,用户可以操作终端设备的应用程序,点击删除Applet的按键,例如,可以点击应用程序中的“删除离线钱包”的按键,再例如,可以点击应用程序中的“删卡”的按键。As shown in Figure 8, the user can operate the application program of the terminal device and click the button to delete the Applet. For example, he can click the button of "Delete Offline Wallet" in the application program. For another example, he can click the button of "Delete Card" in the application program. button.

应用程序接收到删除Applet的指令之后,可以向终端设备的FWK发送SSD删除请求。FWK能够提供SSD删除接口,应用程序接收到删除Applet的指令之后,可以调用该SSD删除接口,使得FWK可以在eSE中删除SSD。After the application receives the instruction to delete the applet, it can send the SSD deletion request to the FWK of the terminal device. The FWK can provide an SSD deletion interface. After the application receives the instruction to delete the applet, it can call the SSD deletion interface, so that the FWK can delete the SSD in the eSE.

为了避免任意的应用程序均能够通过FWK在eSE中删除SSD,FWK还可以向服务器发送校验请求,该校验请求中可以携带应用程序的信息,使服务器对该应用程序的权限进行校验。In order to prevent any application from being able to delete the SSD in the eSE through the FWK, the FWK can also send a verification request to the server. The verification request can carry the information of the application, so that the server can verify the permissions of the application.

一种可选的实施方式中,在FWK向服务器发送校验请求之前,还可以确定该应用程序是否在白名单中,若在,则终端设备的FWK可以向服务器发送校验请求。若不在,则终端设备的FWK拒绝应用程序的删除SSD请求,应用程序界面中可以显示离线钱包删除失败的信息。In an optional implementation manner, before the FWK sends the verification request to the server, it can also be determined whether the application is in the whitelist, and if so, the FWK of the terminal device can send the verification request to the server. If not, the FWK of the terminal device rejects the application's request to delete the SSD, and the application program interface can display the information that the offline wallet deletion failed.

其中,在终端设备中还可以设置应用程序的私钥,在服务器中设置有该应用程序的公钥。从而可以根据非对称加密的方式对应用程序的权限进行校验。Wherein, the private key of the application can also be set in the terminal device, and the public key of the application can be set in the server. Thereby, the permission of the application can be verified according to the asymmetric encryption method.

FWK可以获取应用程序的私钥,并使用该私钥生成签名数据。例如,可以获取应用程序的信息,并利用应用程序的私钥对该信息进行签名,得到签名数据。例如,可以拼接应用程序标识、与删除的Applet对应的安全域标识、时间戳,得到字符串,再利用私钥对该字符串进行签名,得到签名数据。再例如,可以获取应用程序的标识,利用应用程序的私钥对该标识进行签名,得到签名数据。The FWK can obtain the application's private key and use that private key to generate signature data. For example, the information of the application can be obtained, and the information can be signed by using the private key of the application to obtain the signature data. For example, the application identifier, the security domain identifier corresponding to the deleted applet, and the timestamp can be spliced together to obtain a string, and then the private key is used to sign the string to obtain the signature data. For another example, the identifier of the application can be obtained, and the identifier can be signed by using the private key of the application to obtain the signature data.

还可以设置于该应用程序对应的加密算法,例如,可以基于sm2(一种加密算法)算法生成签名数据。It can also be set to the encryption algorithm corresponding to the application, for example, the signature data can be generated based on the sm2 (an encryption algorithm) algorithm.

针对每个Applet可以设置安全域标识,例如,第一Apple对应的安全域标识为第一SSD AID。A security domain identifier may be set for each Applet, for example, the security domain identifier corresponding to the first Apple is the first SSD AID.

进一步的,同一个应用程序可以对应有多个安全域标识。例如,通过一个应用程序可以安装N个Applet,则服务器中设置有与该应用程序对应的N个安全域标识。一个安全域标识与一个Applet对应。Further, the same application may correspond to multiple security domain identifiers. For example, if N Applets can be installed through one application, then N security domain identifiers corresponding to the application are set in the server. A security domain ID corresponds to an applet.

实际应用时,不同应用程序还可能与相同的安全域标识对应,例如,通过应用程序A可以删除第一Applet,通过应用程序B也可以删除该第一Applet,则应用程序A可以与第一Applet的安全域标识对应,应用程序B也可以与第一Applet的安全域标识对应。In actual application, different applications may also correspond to the same security domain identifier. For example, the first applet can be deleted through application A, and the first applet can also be deleted through application B, then application A can be used with the first applet. corresponding to the security domain identifier of the first applet, and application B may also correspond to the security domain identifier of the first applet.

FWK生成签名数据之后,可以向服务器发送校验请求,校验请求中可以包括该签名数据。服务器可以获取应用程序的公钥,进而对签名数据进行校验,若校验通过,则服务器可以向FWK发送通过信息,使得FWK删除eSE中相应的SSD。After the FWK generates the signature data, it can send a verification request to the server, and the verification request can include the signature data. The server can obtain the public key of the application, and then verify the signature data. If the verification is passed, the server can send the pass information to the FWK, so that the FWK deletes the corresponding SSD in the eSE.

具体的,校验请求中还可以包括应用程序标识、安全域标识、时间戳等内容。例如,应用程序A向FWK发送删除SSD请求,则FWK获取应用程序A的私钥,并生成签名数据。再将应用程序A的标识、当前需要删除的Applet对应的安全域标识、时间戳和签名数据发送给服务器。Specifically, the verification request may also include content such as an application identifier, a security domain identifier, and a timestamp. For example, when application A sends a request to FWK to delete the SSD, the FWK obtains the private key of application A and generates signature data. Then, the identifier of the application A, the security domain identifier corresponding to the applet that needs to be deleted, the timestamp and the signature data are sent to the server.

服务器接收到校验请求后,可以获取其中的应用程序标识,再根据应用程序标识获取公钥。服务器侧可以存储与应用程序对应的公钥,例如,应用程序A和应用程序B具有在eSE中删除SSD的权限,则服务器中可以存储应用程序A和B对应的公钥。After the server receives the verification request, it can obtain the application ID in it, and then obtain the public key according to the application ID. The server side can store the public key corresponding to the application. For example, if application A and application B have the right to delete the SSD in the eSE, the public key corresponding to application A and B can be stored in the server.

进一步的,服务器可以利用获取的公钥对校验请求中包括的签名数据进行校验,若使用公钥对签名数据进行解密成功,则可以确定该签名数据是使用应用程序的私钥生成的,进而确定对签名数据的校验通过,例如,可以预设加密算法,则可以基于该预设的加密算法对签名数据进行解密,预设加密算法例如可以是sm2算法。Further, the server can use the obtained public key to verify the signature data included in the verification request, and if the signature data is successfully decrypted using the public key, it can be determined that the signature data is generated using the private key of the application, It is further determined that the verification of the signature data is passed. For example, an encryption algorithm may be preset, and the signature data may be decrypted based on the preset encryption algorithm. The preset encryption algorithm may be, for example, the sm2 algorithm.

另一种实施方式中,服务器中还存储有与应用程序对应的加密算法。这种实施方式中,服务器接收到校验请求之后,还可以根据应用程序标识获取加密算法,进而基于该加密算法,使用应用程序的公钥对签名数据进行解密,从而对签名数据进行校验。In another implementation manner, an encryption algorithm corresponding to the application program is also stored in the server. In this embodiment, after receiving the verification request, the server may also obtain an encryption algorithm according to the application identifier, and then use the public key of the application to decrypt the signature data based on the encryption algorithm, thereby verifying the signature data.

例如,应用程序A对应的加密算法为sm2,应用程序B对应的加密算法为RSA2048。若校验请求中包括的应用程序标识为程序A的标识,则服务器获取的加密算法为sm2。For example, the encryption algorithm corresponding to application A is sm2, and the encryption algorithm corresponding to application B is RSA2048. If the application identifier included in the verification request is the identifier of program A, the encryption algorithm obtained by the server is sm2.

一种可选的实施方式中,若服务器对签名数据校验成功,则服务器可以向终端设备的FWK发送校验通过的信息。这种实施方式中,FWK向服务器发送的校验请求中包括签名数据和应用程序标识。In an optional implementation manner, if the server verifies the signature data successfully, the server may send the verification information to the FWK of the terminal device. In this embodiment, the verification request sent by the FWK to the server includes the signature data and the application identifier.

实际应用时,服务器中还可以存储与应用程序对应的安全域标识。服务器可以根据校验请求中的应用程序标识,获取与应用程序对应的安全域标识。进而可以比对获取的安全域标识与校验请求中的安全域标识,若比对一致,则可以确定对安全域标识的校验通过。In actual application, the server may also store the security domain identifier corresponding to the application. The server can obtain the security domain identifier corresponding to the application according to the application identifier in the verification request. Further, the obtained security domain identifier can be compared with the security domain identifier in the verification request, and if the comparison is consistent, it can be determined that the verification of the security domain identifier has passed.

一种可选的实施方式中,若服务器对签名数据校验成功,且服务器对安全域标识的校验也通过,则服务器可以向终端设备的FWK发送校验通过的信息。这种实施方式中,FWK向服务器发送的校验请求中包括签名数据和应用程序标识,还包括安全域标识。In an optional implementation manner, if the verification of the signature data by the server is successful, and the verification of the security domain identifier by the server also passes, the server may send the verification information to the FWK of the terminal device. In this embodiment, the verification request sent by the FWK to the server includes the signature data and the application program identifier, and also includes the security domain identifier.

其中,FWK向服务器发送的校验请求中还可以包括时间戳,服务器校验时,可以获取当前时间,并与时间戳进行比对,若二者时间间隔小于预设间隔,则确定时间校验通过。这种实施方式中,能够避免服务器重复向FWK发送校验通过的信息。The verification request sent by the FWK to the server may also include a timestamp. When the server performs verification, the current time can be obtained and compared with the timestamp. If the time interval between the two is less than the preset interval, the time verification will be determined. pass. In this embodiment, the server can avoid repeatedly sending the verification information to the FWK.

一种可选的实施方式中,若服务器对签名数据校验成功,且服务器对安全域标识的校验也通过,且对时间的校验通过,则服务器可以向终端设备的FWK发送校验通过的信息。这种实施方式中,FWK向服务器发送的校验请求中包括签名数据和应用程序标识,还包括安全域标识、时间戳。In an optional embodiment, if the server checks the signature data successfully, and the server checks the security domain identifier, and the time check passes, then the server can send the check to the FWK of the terminal device. Information. In this embodiment, the verification request sent by the FWK to the server includes the signature data and the application program identifier, as well as the security domain identifier and the timestamp.

具体的,上述的应用程序标识可以是应用程序包名。Specifically, the above-mentioned application identifier may be an application package name.

若服务器对校验请求的校验通过,则可以向FWK发送校验通过的信息,该信息中可以包括安全域删除脚本。服务器对校验请求的校验通过后,可以获取安全域删除脚本,并将其发送给终端设备的FWK。If the verification of the verification request is passed by the server, the verification information may be sent to the FWK, and the information may include a security domain deletion script. After the server passes the verification of the verification request, it can obtain the security domain deletion script and send it to the FWK of the terminal device.

进一步的,服务器可以根据校验请求中的安全域标识,获取对应的安全域删除脚本。还可以根据当前需要删除的Applet,获取对应的安全域删除脚本。Further, the server may obtain the corresponding security domain deletion script according to the security domain identifier in the verification request. You can also obtain the corresponding security domain deletion script according to the applet that needs to be deleted currently.

实际应用时,FWK接收到安全域删除脚本之后,可以执行该安全域删除脚本,进而在eSE中删除SSD。eSE可以向FWK发送删除结果,比如,SSD删除成功的结果,再例如,SSD删除失败的结果。FWK还可以将SSD删除结果转发给应用程序。In practical applications, after the FWK receives the security domain deletion script, it can execute the security domain deletion script, and then delete the SSD in the eSE. The eSE may send the deletion result to the FWK, for example, the result of the successful deletion of the SSD, or the result of the failure of the deletion of the SSD. FWK can also forward SSD removal results to applications.

在删除SSD成功后,应用程序还可以向FWK发送卡删除请求,从而在FWK中删除与该Applet对应的卡。FWK接收到卡删除请求之后,可以在硬件钱包中删除卡,并向应用程序发送删除结果。比如,卡删除成功的消息。After the SSD is successfully removed, the application can also send a card removal request to the FWK, thereby removing the card corresponding to the Applet in the FWK. After the FWK receives the card deletion request, it can delete the card in the hardware wallet and send the deletion result to the application. For example, a message that the card was deleted successfully.

本公开提供的可选的实施例中,还提供了一种小应用程序的操作方法,应用于终端设备,其中,所述终端设备中设置有嵌入式安全模块,所述方法包括:In an optional embodiment provided by the present disclosure, a method for operating an applet is also provided, which is applied to a terminal device, wherein the terminal device is provided with an embedded security module, and the method includes:

响应对应用程序中的小应用程序的操作,向服务器发送校验信息,所述校验信息包括应用程序信息;In response to the operation of the applet in the application program, send verification information to the server, where the verification information includes application program information;

若所述服务器对所述校验信息进行校验通过,则所述终端设备接收所述服务器发送的脚本文件;If the verification of the verification information is passed by the server, the terminal device receives the script file sent by the server;

执行所述脚本文件在所述嵌入式安全模块中操作辅助安全域,所述辅助安全域用于安装所述小应用程序。Executing the script file operates an auxiliary security domain in the embedded security module, where the auxiliary security domain is used to install the applet.

用户可以操作应用程序,操作应用程序的小应用程序,比如,可以在终端设备中添加小应用程序,或者删除小应用程序。The user can operate the application program and operate the applet program of the application program, for example, the applet program can be added to the terminal device, or the applet program can be deleted.

终端设备接收到用于操作小应用程序的操作,可以生成应用程序的校验信息,并向服务器发送校验信息。例如,可以用应用程序的私钥生成该校验信息。After receiving the operation for operating the applet, the terminal device can generate verification information of the application, and send the verification information to the server. For example, the verification information can be generated with the application's private key.

服务器接收到校验信息之后,可以对校验信息进行校验,若校验通过,则服务器确认终端设备中的应用程序具有操作权限,因此,可以向终端设备反馈脚本文件。例如,若用户的操作是添加小应用程序的操作,则服务器可以向终端设备发送创建SSD的脚本文件,若用户的操作是删除小应用程序的操作,则服务器可以向终端设备发送删除SSD的脚本文件。After the server receives the verification information, it can verify the verification information. If the verification is passed, the server confirms that the application program in the terminal device has the operation authority, so the script file can be fed back to the terminal device. For example, if the user's operation is to add an applet, the server can send a script file for creating an SSD to the terminal device; if the user's operation is to delete an applet, the server can send a script to delete the SSD to the terminal device document.

终端设备接收到脚本文件之后,可以执行相应的脚本文件,进而操作eSE中的SSD。例如,可以在eSE中创建SSD,再例如,可以在eSE中删除SSD。After receiving the script file, the terminal device can execute the corresponding script file, and then operate the SSD in the eSE. For example, an SSD can be created in the eSE, and another example, an SSD can be deleted in the eSE.

通过这种方式,应用程序操作终端设备的eSE时,终端设备向服务器发送校验信息,从而对应用程序的校验通过之后,终端设备再操作eSE,从而提高eSE的安全性。In this way, when the application program operates the eSE of the terminal device, the terminal device sends verification information to the server, so that after the verification of the application program passes, the terminal device operates the eSE again, thereby improving the security of the eSE.

本公开提供的可选的实施例中,还提供了一种小应用程序的操作方法,包括:In an optional embodiment provided by the present disclosure, a method for operating an applet is also provided, including:

终端设备接收对应用程序中的小应用程序的操作指令,向服务器发送校验信息;The terminal device receives the operation instruction for the applet in the application program, and sends the verification information to the server;

所述服务器对所述校验信息进行校验,若校验通过,则向所述终端设备发送脚本文件;The server verifies the verification information, and if the verification passes, sends a script file to the terminal device;

所述终端设备执行所述脚本文件操作嵌入式安全模块中的辅助安全域,所述辅助安全域用于安装所述小应用程序;所述终端设备中设置有所述操作嵌入式安全模块。The terminal device executes the script file to operate an auxiliary security domain in the embedded security module, where the auxiliary security domain is used to install the applet; the terminal device is provided with the operation embedded security module.

通过这种方式,应用程序操作终端设备的eSE时,终端设备向服务器发送校验信息,从而对应用程序的校验通过之后,终端设备再操作eSE,从而提高eSE的安全性。In this way, when the application program operates the eSE of the terminal device, the terminal device sends verification information to the server, so that after the verification of the application program passes, the terminal device operates the eSE again, thereby improving the security of the eSE.

可能的实现方式中,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。In a possible implementation manner, the computer-executed instructions in the embodiments of the present application may also be referred to as application code, which is not specifically limited in the embodiments of the present application.

可选的,接口电路903还可以包括发送器和/或接收器。可选的,上述处理器902可以包括一个或多个CPU,还可以是其他通用处理器、数字信号处理器(digital signalprocessor,DSP)、专用集成电路(application specific integrated circuit,ASIC)等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。Optionally, the interface circuit 903 may further include a transmitter and/or a receiver. Optionally, the above-mentioned processor 902 may include one or more CPUs, and may also be other general-purpose processors, digital signal processors (digital signal processors, DSPs), application specific integrated circuits (application specific integrated circuits, ASICs), and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps in combination with the method disclosed in the present application can be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.

本申请实施例还提供了一种计算机可读存储介质。上述实施例中描述的方法可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。如果在软件中实现,则功能可以作为一个或多个指令或代码存储在计算机可读介质上或者在计算机可读介质上传输。计算机可读介质可以包括计算机存储介质和通信介质,还可以包括任何可以将计算机程序从一个地方传送到另一个地方的介质。存储介质可以是可由计算机访问的任何目标介质。Embodiments of the present application also provide a computer-readable storage medium. The methods described in the above embodiments may be implemented in whole or in part by software, hardware, firmware or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media can include both computer storage media and communication media and also include any medium that can transfer a computer program from one place to another. The storage medium can be any target medium that can be accessed by a computer.

一种可能的实现方式中,计算机可读介质可以包括RAM,ROM,只读光盘(compactdisc read-only memory,CD-ROM)或其它光盘存储器,磁盘存储器或其它磁存储设备,或目标于承载的任何其它介质或以指令或数据结构的形式存储所需的程序代码,并且可由计算机访问。而且,任何连接被适当地称为计算机可读介质。例如,如果使用同轴电缆,光纤电缆,双绞线,数字用户线(Digital Subscriber Line,DSL)或无线技术(如红外,无线电和微波)从网站,服务器或其它远程源传输软件,则同轴电缆,光纤电缆,双绞线,DSL或诸如红外,无线电和微波之类的无线技术包括在介质的定义中。如本文所使用的磁盘和光盘包括光盘,激光盘,光盘,数字通用光盘(Digital Versatile Disc,DVD),软盘和蓝光盘,其中磁盘通常以磁性方式再现数据,而光盘利用激光光学地再现数据。上述的组合也应包括在计算机可读介质的范围内。In one possible implementation, the computer-readable medium may include RAM, ROM, compact disc read-only memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or a Any other medium or in the form of instructions or data structures that store the required program code and can be accessed by the computer. Also, any connection is properly termed a computer-readable medium. For example, if you use coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies (such as infrared, radio, and microwave) to transmit software from a website, server, or other remote source, coaxial Cable, fiber optic cable, twisted pair, DSL or wireless technologies such as infrared, radio and microwave are included in the definition of medium. Disk and disc, as used herein, includes compact disc, laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, and Blu-ray disc, where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.

本申请实施例是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理单元以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理单元执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The embodiments of the present application are described with reference to flowcharts and/or block diagrams of methods, apparatuses (systems), and computer program products according to the embodiments of the present application. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processing unit of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.

以上的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本发明的保护范围之内。The above specific embodiments further describe the purpose, technical solutions and beneficial effects of the present invention in detail. It should be understood that the above are only specific embodiments of the present invention, and are not intended to limit the protection scope of the present invention. On the basis of the technical solutions of the present invention, any modifications, equivalent replacements, improvements, etc. made shall be included within the protection scope of the present invention.

Claims (18)

1.一种小应用程序的操作方法,应用于终端设备,其中,所述终端设备中设置有嵌入式安全模块,其特征在于,所述方法包括:1. A method for operating an applet, applied to a terminal device, wherein an embedded security module is provided in the terminal device, wherein the method comprises: 响应对应用程序中的小应用程序的操作,向服务器发送校验信息,所述校验信息包括应用程序信息;In response to the operation of the applet in the application program, send verification information to the server, where the verification information includes application program information; 若所述服务器对所述校验信息进行校验通过,则所述终端设备接收所述服务器发送的脚本文件;If the verification of the verification information is passed by the server, the terminal device receives the script file sent by the server; 执行所述脚本文件在所述嵌入式安全模块中操作辅助安全域,所述辅助安全域用于安装所述小应用程序。Executing the script file operates an auxiliary security domain in the embedded security module, where the auxiliary security domain is used to install the applet. 2.根据权利要求1所述的方法,其特征在于,若所述操作为安装操作,则所述方法还包括:2. The method according to claim 1, wherein if the operation is an installation operation, the method further comprises: 若在所述辅助安全域中安装所述小应用程序成功,则显示小应用程序安装成功的界面;If the applet is successfully installed in the auxiliary security domain, an interface indicating that the applet is installed successfully is displayed; 若在所述嵌入式安全模块中创建所述辅助安全域失败,或者在所述辅助安全域中安装所述小应用程序失败,则显示小应用程序安装失败的界面。If the creation of the auxiliary security domain in the embedded security module fails, or the installation of the applet in the auxiliary security domain fails, an interface for installation failure of the applet is displayed. 3.根据权利要求1所述的方法,其特征在于,若所述操作为删除操作,则所述方法还包括:3. The method according to claim 1, wherein, if the operation is a deletion operation, the method further comprises: 若删除所述辅助安全域成功,则显示小应用程序删除成功的界面;If the deletion of the auxiliary security domain is successful, an interface that the applet is deleted successfully is displayed; 若删除所述辅助安全域成功,则显示小应用程序删除失败的界面。If the deletion of the auxiliary security domain is successful, an interface of failure to delete the applet is displayed. 4.根据权利要求1-3任一项所述的方法,其特征在于,所述终端设备中设置有框架;所述响应对应用程序中的小应用程序的操作,向服务器发送校验信息,包括:4. The method according to any one of claims 1-3, wherein the terminal device is provided with a frame; the response to the operation of the applet in the application program sends verification information to the server, include: 所述应用程序接收对所述小应用程序的操作,并向所述框架发送安全域操作请求;The application receives the operation on the applet, and sends a security domain operation request to the framework; 所述框架获取安全域标识和所述应用程序的私钥,所述安全域标识与所述小应用程序对应;The framework obtains a security domain identifier and the private key of the application, and the security domain identifier corresponds to the applet; 所述框架根据所述私钥生成签名数据,并向所述服务器发送所述校验信息,所述校验信息中包括所述应用程序信息和第一时间信息,所述应用程序信息中包括所述签名数据、所述安全域标识。The framework generates signature data according to the private key, and sends the verification information to the server, where the verification information includes the application information and the first time information, and the application information includes all The signature data and the security domain identifier. 5.根据权利要求4所述的方法,其特征在于,满足以下条件时所述校验信息校验通过:5. The method according to claim 4, wherein the verification information is checked and passed when the following conditions are met: 所述服务器使用所述应用程序的公钥对所述签名数据校验通过,且所述服务器确定所述应用程序信息中的安全域标识与所述应用程序对应,且所述服务器获取的第二时间信息与所述第一时间信息之间的时间间隔小于预设间隔。The server uses the public key of the application to verify the signature data, and the server determines that the security domain identifier in the application information corresponds to the application, and the second data obtained by the server is passed. A time interval between the time information and the first time information is less than a preset interval. 6.根据权利要求5所述的方法,其特征在于,所述服务器中存储有与所述应用程序对应的多个加密算法;6. The method according to claim 5, wherein a plurality of encryption algorithms corresponding to the application are stored in the server; 所述服务器基于目标加密算法,使用所述应用程序的公钥对所述签名数据进行校验,所述目标加密算法是所述服务器根据所述终端设备所在的地域信息在多个所述加密算法中确定的。The server uses the public key of the application program to verify the signature data based on the target encryption algorithm, and the target encryption algorithm is that the server performs multiple encryption algorithms according to the geographical information where the terminal device is located. determined in. 7.根据权利要求1-3任一项所述的方法,其特征在于,所述终端设备中设置有框架;所述操作为安装操作时,所述脚本文件为安全域安装脚本;7. The method according to any one of claims 1-3, wherein a frame is provided in the terminal device; when the operation is an installation operation, the script file is a security domain installation script; 所述执行所述脚本文件在所述嵌入式安全模块中操作辅助安全域,包括:The executing the script file to operate the auxiliary security domain in the embedded security module includes: 所述框架执行所述安全域安装脚本在所述嵌入式安全模块中创建所述辅助安全域;The framework executes the security domain installation script to create the auxiliary security domain in the embedded security module; 所述方法还包括:所述应用程序在所述辅助安全域中安装所述小应用程序。The method also includes the application installing the applet in the secondary security domain. 8.根据权利要求7所述的方法,其特征在于,所述框架执行所述安全域安装脚本在所述嵌入式安全模块中创建所述辅助安全域之后,还包括:8. The method according to claim 7, wherein after the framework executes the security domain installation script to create the auxiliary security domain in the embedded security module, the method further comprises: 所述嵌入式安全模块向所述框架发送安全域创建结果,所述框架向所述应用程序转发所述安全域创建结果;The embedded security module sends a security domain creation result to the framework, and the framework forwards the security domain creation result to the application; 所述应用程序在所述辅助安全域中安装所述小应用程序包括:The installation of the applet by the application in the secondary security domain includes: 若所述安全域创建结果表征安全域创建成功,则所述应用程序在创建的所述辅助安全域中安装所述小应用程序。If the security domain creation result indicates that the security domain is successfully created, the application installs the applet in the created auxiliary security domain. 9.根据权利要求8所述的方法,其特征在于,所述应用程序在创建的所述辅助安全域中添加所述小应用程序,包括:9. The method according to claim 8, wherein the application adds the applet in the created auxiliary security domain, comprising: 所述应用程序下载所述小应用程序,并在所述辅助安全域中添加所述小应用程序。The application downloads the applet and adds the applet in the secondary security domain. 10.根据权利要求1-3任一项所述的方法,其特征在于,所述终端设备中设置有框架;所述操作为删除操作时,所述脚本文件为安全域删除脚本;10. The method according to any one of claims 1-3, wherein a frame is provided in the terminal device; when the operation is a deletion operation, the script file is a security domain deletion script; 所述执行所述脚本文件在所述嵌入式安全模块中操作辅助安全域,包括:The executing the script file to operate the auxiliary security domain in the embedded security module includes: 所述框架执行所述安全域删除脚本在所述嵌入式安全模块中删除所述辅助安全域,所述辅助安全域中安装有所述小应用程序。The framework executes the security domain deletion script to delete the auxiliary security domain in the embedded security module in which the applet is installed. 11.一种小应用程序的操作方法,其特征在于,包括:11. A method of operating an applet, comprising: 终端设备接收对应用程序中的小应用程序的操作指令,向服务器发送校验信息;The terminal device receives the operation instruction for the applet in the application program, and sends the verification information to the server; 所述服务器对所述校验信息进行校验,若校验通过,则向所述终端设备发送脚本文件;The server verifies the verification information, and if the verification passes, sends a script file to the terminal device; 所述终端设备执行所述脚本文件操作嵌入式安全模块中的辅助安全域,所述辅助安全域用于安装所述小应用程序;所述终端设备中设置有所述操作嵌入式安全模块。The terminal device executes the script file to operate an auxiliary security domain in the embedded security module, where the auxiliary security domain is used to install the applet; the terminal device is provided with the operation embedded security module. 12.根据权利要求11所述的方法,其特征在于,所述校验信息中包括应用程序信息和第一时间信息,所述应用程序信息中包括签名数据、安全域标识。12 . The method according to claim 11 , wherein the verification information includes application program information and first time information, and the application program information includes signature data and a security domain identifier. 13 . 13.根据权利要求11或12所述的方法,其特征在于,若所述操作为安装操作,则所述脚本文件为安全域安装脚本。The method according to claim 11 or 12, wherein if the operation is an installation operation, the script file is a security domain installation script. 14.根据权利要求11或12所述的方法,其特征在于,若所述操作为安装操作,则所述脚本文件为安全域删除脚本。The method according to claim 11 or 12, wherein if the operation is an installation operation, the script file is a security domain deletion script. 15.一种电子设备,其特征在于,包括:用于执行权利要求1-14任一项所述的各个步骤的单元。15. An electronic device, characterized by comprising: a unit for performing each step of any one of claims 1-14. 16.一种电子设备,其特征在于,包括:处理器和显示屏,所述处理器用于调用存储器中的程序以执行权利要求1-14任一项所述的方法中处理的步骤,所述显示屏用于执行执行权利要求1-14任一项所述的方法中显示的步骤。16. An electronic device, comprising: a processor and a display screen, wherein the processor is used to call a program in a memory to execute the steps of processing in the method according to any one of claims 1-14, the The display screen is used for performing the steps displayed in the method of any one of claims 1-14. 17.一种电子设备,其特征在于,包括:处理器、显示屏和接口电路,所述接口电路用于与其它装置通信,所述处理器用于执行权利要求1-14任一项所述的方法中处理的步骤,所述显示屏用于执行执行权利要求1-14任一项所述的方法中显示的步骤。17. An electronic device, comprising: a processor, a display screen and an interface circuit, the interface circuit is used for communicating with other devices, and the processor is used for executing the method according to any one of claims 1-14 In the steps of processing in the method, the display screen is used to execute the steps displayed in the method according to any one of claims 1-14. 18.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有指令,当所述指令被执行时,使得计算机执行如权利要求1-14任一项所述的方法。18. A computer-readable storage medium, wherein the computer-readable storage medium stores instructions that, when executed, cause a computer to perform the method according to any one of claims 1-14.
CN202111376151.3A 2021-11-19 2021-11-19 Method for operating applet and electronic device Active CN115017498B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202310072380.9A CN116305093B (en) 2021-11-19 2021-11-19 Method for operating applet and electronic device
CN202111376151.3A CN115017498B (en) 2021-11-19 2021-11-19 Method for operating applet and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111376151.3A CN115017498B (en) 2021-11-19 2021-11-19 Method for operating applet and electronic device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310072380.9A Division CN116305093B (en) 2021-11-19 2021-11-19 Method for operating applet and electronic device

Publications (2)

Publication Number Publication Date
CN115017498A true CN115017498A (en) 2022-09-06
CN115017498B CN115017498B (en) 2023-02-28

Family

ID=83064409

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111376151.3A Active CN115017498B (en) 2021-11-19 2021-11-19 Method for operating applet and electronic device
CN202310072380.9A Active CN116305093B (en) 2021-11-19 2021-11-19 Method for operating applet and electronic device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202310072380.9A Active CN116305093B (en) 2021-11-19 2021-11-19 Method for operating applet and electronic device

Country Status (1)

Country Link
CN (2) CN115017498B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305093A (en) * 2021-11-19 2023-06-23 荣耀终端有限公司 Method for operating applet and electronic device

Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236568A (en) * 2011-07-13 2011-11-09 中国联合网络通信集团有限公司 Method, device and system for downloading Java card application
CN102333296A (en) * 2011-05-24 2012-01-25 中国联合网络通信集团有限公司 NFC (near field communication) flight service platform as well as method and system for providing flight service
CN102831468A (en) * 2012-08-06 2012-12-19 中国移动通信集团江苏有限公司 Intelligent card chip of mobile terminal as well as initialization and use method thereof
US20130185740A1 (en) * 2012-01-17 2013-07-18 Sony Corporation Information processing apparatus, ic chip, information processing method, program, and information processing system
US20130290078A1 (en) * 2012-04-11 2013-10-31 Jerome Svigals Dual Device System for Secure Transactions
CN103593621A (en) * 2012-08-13 2014-02-19 Nxp股份有限公司 Local trusted service manager
CN104008351A (en) * 2014-05-06 2014-08-27 武汉天喻信息产业股份有限公司 System, method and device for Windows application program integrity checking
US20140273913A1 (en) * 2013-03-12 2014-09-18 Oberthur Technologies Emergency call system and method
WO2014186559A2 (en) * 2013-05-15 2014-11-20 Jerome Svigals Advanced data security solutions
US20150180955A1 (en) * 2013-12-25 2015-06-25 Canon Kabushiki Kaisha Management apparatus and control method therefor for managing a network device
CN105187447A (en) * 2015-09-30 2015-12-23 成都汇合乾元科技有限公司 Secure terminal login method
US20160006762A1 (en) * 2013-02-18 2016-01-07 Oberthur Technologies Method for creating a profile in a security domain of a secured element
CN105393571A (en) * 2013-08-07 2016-03-09 德国捷德有限公司 Method for operating a security element
CN105391840A (en) * 2014-08-22 2016-03-09 苹果公司 automatic purposed-application creation
US20160239686A1 (en) * 2015-02-17 2016-08-18 Samsung Electronics Co., Ltd. Storing and using data with secure circuitry
CN105900104A (en) * 2014-01-06 2016-08-24 苹果公司 Migration of applets in secure elements
CN105991602A (en) * 2015-02-26 2016-10-05 北京神州泰岳信息安全技术有限公司 Data access method and data access system
CN106971299A (en) * 2016-01-13 2017-07-21 三星电子株式会社 Payment processing method and the electronic equipment for supporting it
WO2017211205A1 (en) * 2016-06-07 2017-12-14 华为技术有限公司 Method and device for updating whitelist
CN110209339A (en) * 2018-02-28 2019-09-06 华为终端有限公司 A kind of management method of memory space, safety element and terminal
CN110532441A (en) * 2019-08-23 2019-12-03 广州医科大学 A kind of electronic component wisdom management method and its system
US20190392424A1 (en) * 2016-12-19 2019-12-26 Xard Group Pty Ltd. Digital transaction apparatus, system, and method with a virtual companion card
CN111144878A (en) * 2019-12-16 2020-05-12 深圳融卡智能科技有限公司 Instruction generation method and instruction generation device
CN111191213A (en) * 2018-11-14 2020-05-22 华为终端有限公司 Method for deleting security service and electronic equipment
CN111199039A (en) * 2018-11-20 2020-05-26 成都鼎桥通信技术有限公司 Application security verification method and device and terminal equipment
CN112698846A (en) * 2020-12-30 2021-04-23 麒麟软件有限公司 Method and system for automatically installing patch in Linux system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160058375A (en) * 2014-11-14 2016-05-25 삼성전자주식회사 A Protected Communication with an Embedded Secure Element
EP3262583B1 (en) * 2015-02-27 2021-07-21 Samsung Electronics Co., Ltd. Method and device for controlling payment function
CN106228090B (en) * 2016-07-28 2019-02-05 飞天诚信科技股份有限公司 A kind of how main security domain Java smart card and its implementation
CN106658474B (en) * 2016-10-31 2019-11-19 上海路随通信科技有限公司 SIM card data security protection method is realized using embedded-type security element
CN106685931B (en) * 2016-12-07 2020-01-14 深圳市久和久科技有限公司 Smart card application management method and system, terminal and smart card
CN107257328A (en) * 2017-05-26 2017-10-17 深圳市金立通信设备有限公司 A kind of safety of payment dispositions method, system, terminal and proof of identity method
CN111404706B (en) * 2019-01-02 2023-05-09 中国移动通信有限公司研究院 Application download method, secure element, client device and service management device
CN115017498B (en) * 2021-11-19 2023-02-28 荣耀终端有限公司 Method for operating applet and electronic device

Patent Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333296A (en) * 2011-05-24 2012-01-25 中国联合网络通信集团有限公司 NFC (near field communication) flight service platform as well as method and system for providing flight service
CN102236568A (en) * 2011-07-13 2011-11-09 中国联合网络通信集团有限公司 Method, device and system for downloading Java card application
US20130185740A1 (en) * 2012-01-17 2013-07-18 Sony Corporation Information processing apparatus, ic chip, information processing method, program, and information processing system
US20130290078A1 (en) * 2012-04-11 2013-10-31 Jerome Svigals Dual Device System for Secure Transactions
CN102831468A (en) * 2012-08-06 2012-12-19 中国移动通信集团江苏有限公司 Intelligent card chip of mobile terminal as well as initialization and use method thereof
CN103593621A (en) * 2012-08-13 2014-02-19 Nxp股份有限公司 Local trusted service manager
US20160006762A1 (en) * 2013-02-18 2016-01-07 Oberthur Technologies Method for creating a profile in a security domain of a secured element
US20140273913A1 (en) * 2013-03-12 2014-09-18 Oberthur Technologies Emergency call system and method
WO2014186559A2 (en) * 2013-05-15 2014-11-20 Jerome Svigals Advanced data security solutions
CN105393571A (en) * 2013-08-07 2016-03-09 德国捷德有限公司 Method for operating a security element
US20150180955A1 (en) * 2013-12-25 2015-06-25 Canon Kabushiki Kaisha Management apparatus and control method therefor for managing a network device
CN105900104A (en) * 2014-01-06 2016-08-24 苹果公司 Migration of applets in secure elements
CN104008351A (en) * 2014-05-06 2014-08-27 武汉天喻信息产业股份有限公司 System, method and device for Windows application program integrity checking
CN105391840A (en) * 2014-08-22 2016-03-09 苹果公司 automatic purposed-application creation
US20160239686A1 (en) * 2015-02-17 2016-08-18 Samsung Electronics Co., Ltd. Storing and using data with secure circuitry
CN105991602A (en) * 2015-02-26 2016-10-05 北京神州泰岳信息安全技术有限公司 Data access method and data access system
CN105187447A (en) * 2015-09-30 2015-12-23 成都汇合乾元科技有限公司 Secure terminal login method
CN106971299A (en) * 2016-01-13 2017-07-21 三星电子株式会社 Payment processing method and the electronic equipment for supporting it
WO2017211205A1 (en) * 2016-06-07 2017-12-14 华为技术有限公司 Method and device for updating whitelist
US20190392424A1 (en) * 2016-12-19 2019-12-26 Xard Group Pty Ltd. Digital transaction apparatus, system, and method with a virtual companion card
CN110209339A (en) * 2018-02-28 2019-09-06 华为终端有限公司 A kind of management method of memory space, safety element and terminal
CN111191213A (en) * 2018-11-14 2020-05-22 华为终端有限公司 Method for deleting security service and electronic equipment
CN111199039A (en) * 2018-11-20 2020-05-26 成都鼎桥通信技术有限公司 Application security verification method and device and terminal equipment
CN110532441A (en) * 2019-08-23 2019-12-03 广州医科大学 A kind of electronic component wisdom management method and its system
CN111144878A (en) * 2019-12-16 2020-05-12 深圳融卡智能科技有限公司 Instruction generation method and instruction generation device
CN112698846A (en) * 2020-12-30 2021-04-23 麒麟软件有限公司 Method and system for automatically installing patch in Linux system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
牛文生等: "基于安全域隔离的嵌入式系统的访问控制机制研究", 《计算机科学》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116305093A (en) * 2021-11-19 2023-06-23 荣耀终端有限公司 Method for operating applet and electronic device

Also Published As

Publication number Publication date
CN116305093A (en) 2023-06-23
CN115017498B (en) 2023-02-28
CN116305093B (en) 2024-06-18

Similar Documents

Publication Publication Date Title
CN113722058B (en) Resource calling method and electronic equipment
WO2022160991A1 (en) Permission control method and electronic device
CN113691842A (en) A cross-device content projection method and electronic device
US12032938B2 (en) Plug-in installation method, apparatus, and storage medium
CN114553814B (en) Method and device for processing push message
WO2022170856A1 (en) Method for establishing connection, and electronic device
CN115701018A (en) Method for safely calling service, method and device for safely registering service
CN115017498B (en) Method for operating applet and electronic device
CN116486500B (en) Mail sending method and electronic equipment
CN113590346B (en) Method and electronic equipment for processing service request
CN114828098B (en) Data transmission method and electronic equipment
CN114691248B (en) Method, device, equipment and readable storage medium for displaying virtual reality interface
CN116414500B (en) Electronic device operation guidance information recording method, acquisition method and terminal device
CN117251223A (en) Cloud function plug-in configuration and scheduling method, system and electronic equipment
CN115016666B (en) Touch processing method, terminal equipment and storage medium
CN113271577B (en) Media data playback system, method and related device
CN116709609B (en) Message delivery method, electronic device and storage medium
WO2022042273A1 (en) Key using method and related product
WO2024061326A1 (en) Data protection method, and electronic device
CN115017227A (en) Data synchronization method and related equipment
WO2023179682A1 (en) Device collaboration method
WO2024002137A1 (en) Communication method, communication system, and electronic device
CN116719376A (en) Voltage control method, device, equipment and storage medium
CN118445113A (en) Method and device for determining abnormal restarting mode, electronic equipment and storage medium
CN114826636A (en) Access control system and related method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Unit 3401, unit a, building 6, Shenye Zhongcheng, No. 8089, Hongli West Road, Donghai community, Xiangmihu street, Futian District, Shenzhen, Guangdong 518040

Patentee after: Honor Terminal Co.,Ltd.

Country or region after: China

Address before: 3401, unit a, building 6, Shenye Zhongcheng, No. 8089, Hongli West Road, Donghai community, Xiangmihu street, Futian District, Shenzhen, Guangdong

Patentee before: Honor Device Co.,Ltd.

Country or region before: China