System and method for optimizing byte codes for JAVA card

An optimization method and bytecode technology, applied in the field of smart cards, can solve problems such as unrealizable, limiting the execution speed of smart card dual-core JAVA cards, etc.

Inactive Publication Date: 2010-06-16
爱思开电讯投资(中国)有限公司
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the application field of dual-core JAVA cards whose software and hardware conditions are comparable to those of mobile devices or servers, bytecode optimization technologies such as JIT or Hotspot can be fully realized. However, due to the limitations of its own hardware and software condit...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for optimizing byte codes for JAVA card
  • System and method for optimizing byte codes for JAVA card
  • System and method for optimizing byte codes for JAVA card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 A block diagram of a bytecode optimization system according to Embodiment 1 of the present invention is shown. Such as figure 1 As shown, the bytecode optimization system 1 includes an optimized code library 100, a detection unit 200 and a JIT compiler 300 located in the JAVA card application domain.

[0027] The optimized code repository 100 stores optimized codes of bytecode sequences of secure domain applications. The optimized codes stored in the optimized code library 100 also include those optimized codes obtained by running standard test programs and simulating byte code sequences of actual running conditions, which are pre-stored before the JAVA card leaves the factory.

[0028] When the application program is installed or used in the security domain, the detection unit 200 detects whether there is a corresponding optimized code in the bytecode sequence of the application program in the optimization code library 100, and there is no corresponding opti...

Embodiment 2

[0031] figure 2 A block diagram of a bytecode optimization system according to Embodiment 2 of the present invention is shown. Such as figure 2 As shown, the bytecode optimization system 2 includes an optimized code library 101 , a detection unit 200 , a JIT compiler 300 , an optimized code library management unit 400 and a verification unit 500 . exist figure 2 in, with figure 1 Similar elements have been given the same reference numerals and their details will not be repeated below.

[0032] as reference figure 1 Like the optimized code library 100 described, in this embodiment, the optimized code library 101 also stores optimized codes of bytecode sequences of applications in the security domain. In addition, the optimized code library 101 also stores the storage time and usage times of each optimized code, so as to make statistics about which optimized codes are most frequently used and which optimized codes are least used. For example, for the optimized code A st...

Embodiment 3

[0044] Figure 4 A block diagram of a bytecode optimization system according to Embodiment 3 of the present invention is shown. Such as Figure 4 As shown, the bytecode optimization system 3 includes an optimized code library 100 , a detection unit 200 , a JIT compiler 300 and a security level judgment unit 600 . exist Figure 4 in, with figure 1 Similar elements have been given the same reference numerals and their details will not be repeated below.

[0045] From a security point of view, it is unsafe for the detection unit 200 to transmit all bytecode sequences of the security domain application program to the JIT compiler 300 in the application domain for optimization. In fact, there are different security levels among bytecode sequences of applications. For bytecode sequences that are closely related to security, such as bytecode sequences that implement encryption and decryption functions, the security level is naturally much higher. For this Part of the bytecode se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system and a method for optimizing byte codes for a JAVA card, wherein the JAVA card comprises an application domain and a security domain. The method for optimizing the byte codes for the JAVA card comprises the steps of: detecting whether a byte code sequence of an application program in the security domain has an optimized code or not; when a detection result is negative, transmitting the byte code sequence to the application domain; in the application domain, compiling the received byte code sequence into a local code of the security domain to serve as the optimized code; and storing the optimized code in the security domain. The system and the method can realize the optimization of the byte codes in the security domain of the JAVA card and increase the speed of program execution of the JAVA card.

Description

technical field [0001] The invention relates to smart card technology, in particular to a bytecode optimization system and method for JAVA cards. Background technique [0002] JAVA card is the product of the combination of JAVA technology and traditional smart card technology. It is a smart card that can run JAVA language programs. [0003] The traditional JAVA card is mainly used for security purposes, and has only one operating system on which the JAVA virtual machine runs. As more and more complex applications are set on the JAVA card, the traditional JAVA card can no longer meet the needs of handling more services. In this case, the dual-core JAVA card emerges at the historic moment, and has been more and more widely used. The dual-core JAVA card mainly includes two parts: one part is called the security domain, which is equivalent to the traditional JAVA card, and is mainly used for security purposes to realize the functions realized by the traditional JAVA card; the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/45G06K19/07
Inventor 刘子瑛李丞倍金亨一罗栋元李相研
Owner 爱思开电讯投资(中国)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products