Secure device and reader/writer

A security device and reader technology, applied in computer security devices, internal/peripheral computer component protection, record carriers used by machines, etc., to achieve the effect of reducing the storage area

Inactive Publication Date: 2009-04-22
PANASONIC CORP
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Recently, a device including a large-capacity memory in an IC chip that can be used as an extended memory protection area of ​​an IC card (here

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure device and reader/writer
  • Secure device and reader/writer
  • Secure device and reader/writer

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0133] Embodiment 1 is an invention related to a security device that is used to permit downloading if there is no server application in the same card when downloading a client application, and when the client application is executed, it is different from the one on a different card. The server application installed in it works in combination.

Example Embodiment

[0134] Embodiment 2 is an invention related to a system for providing safety when devices work in combination with each other.

Example Embodiment

[0135] Embodiment 3 is an invention related to a (first) system for checking the owner of a safety device and the different safety device when a safety device and a different safety device work in combination with each other. The identity of the owner of the device.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

It is possible to solve the problem that a server application owned by a secure device cannot be used by a client application owned by other secure device. A secure device includes: an application storage unit (202) for storing a client application as an application performing data processing; an address calculation unit (205) for judging whether the application storage unit (202) has a server application for passing data to/from the client; and a reference destination existence judging unit (210) for judging whether other secure device has a first server application when the address calculation unit (205) has judged that the application storage unit (202) does not have the first server application for passing data to/from the first client application.

Description

technical field [0001] The present invention relates to a security device and an external machine connected to the security device. Background technique [0002] Currently, attention is paid to IC cards as security devices. A multi-application compatible card that allows applications to be downloaded thereto after the card is issued has been developed for improving user convenience and lowering entry barriers for companies that want to provide IC card services. [0003] Recently, a device including a large-capacity memory in an IC chip that can be used as an extended memory protection area of ​​an IC card (hereinafter referred to as a secure memory card) has been proposed, and has made it possible to satisfy a large capacity of IC card application data. need. Because the secure memory card can be adapted to the size of the mobile machine, it is expected that the secure memory card will be inserted directly into a mobile machine with a slot for development to be used as an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K19/07G06F21/24G06K17/00G06K19/10G06F21/10G06F21/44G06F21/60G06F21/62
CPCG06F21/77
Inventor 田靡雅基竹内康雄鹤切惠美德田泰久
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products