Java卡的Applet和Android奇巧4.4的基于主机卡仿真 [英] Java Card Applet and Host-based Card Emulation of Android Kitkat 4.4

查看:322
本文介绍了Java卡的Applet和Android奇巧4.4的基于主机卡仿真的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我想创建基于Android奇巧4.4 NFC支付应用程序,它目前支持NFC卡模拟模式为不涉及安全元件和涉及安全的因素。

I would like to create NFC Payment Application based on Android Kitkat 4.4 which now support the NFC Card Emulation Mode for both not involving secure element and involving secure element.

我想,让我的应用涉及到安全元件。所以,我有一个问题。而Android奇巧可以让我的应用程序访问其安装到一个安全元件和Java Card applet?

I would like to let My Application involve a secure element. So, I have a question. The Android KitKat can let my application access to the java card applet which is installed into a secure element?

推荐答案

没有,而Android HCE文件列出了使用的安全元件为基础的卡模拟的可能性,也有阻碍当前设备使用安全元件的几个问题

No, while the Android HCE documentation lists the possibility to use secure element-based card emulation, there are several problems hindering the use of a secure element in current devices:

  1. 的Nexus设备为访问嵌入式安全元件专有的API只(访问UICC / SIM卡为基础的安全元件没有API似乎可用)。然而,新的Nexus设备似乎不再包括嵌入式SE。此外,只有谷歌(也可能是移动网络运营商销售这些设备)能够使用的权限来访问SE API。 (否则,你将需要root权限添加您的应用程序证书允许的应用程序列表。)

  1. Nexus devices have a proprietary API for access to embedded secure elements only (no API for access to UICC/SIM card-based secure elements seems to be available). However, newer Nexus devices seem to no longer include an embedded SE. Moreover, only Google (and possibly mobile network operators selling those devices) are able to use the permissions to access the SE API. (Otherwise you would need root permissions to add your app certificates to the list of permitted apps.)

似乎的Nexus设备不启用的UICC卡模拟的。因此,即使你寄存器进行脱离主机卡模拟应用中,UICC无法使用在这些设备

Nexus devices do not seem to enable the UICC for card emulation at all. Thus, even if you register applications for off-host card emulation, the UICC could not be used on such devices.

许多其他(非的Nexus设备)提供基于开放移动API一个安全元件API(通常是SEEK换Android的基础上实现或东西)。这些设备似乎主要使用该API访问的UICC /基于SIM卡的安全元件。 (还没有人对采用Android 4.4的无主机卡仿真服务注册尚未交互信息。)

Many other (non-Nexus devices) provide a secure element API based on the Open Mobile API (typically the SEEK-for-Android implementation or something based on it). Those devices seem to use that API mainly for access to a UICC/SIM card-based secure element. (No information about interaction with off-host card emulation service registration of Android 4.4 yet.)

您需要访问一个安全元件(即你需要知道的钥匙,安装/管理上的SE应用程序)。这是东西,你通常不会得到的,除非你有与设备制造商(为嵌入式安全元件)有着良好的合作或移动网络运营商(为UICC / SIM卡为基础的安全元件)。

You need access to a secure element (i.e. you need to know the keys to install/manage applications on the SE). This is something that you typically don't get, unless you have a good cooperation with the device manufacturer (for embedded secure elements) or a mobile network operator (for UICC/SIM card-based secure elements).

这篇关于Java卡的Applet和Android奇巧4.4的基于主机卡仿真的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆