Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety verification method, compiling device, device and system capable of running .net programs

A security verification and program technology, applied in the field of security verification, can solve the problems that the security of .NET cards cannot be completely guaranteed, and the CRC verification is not safe enough, etc.

Active Publication Date: 2012-02-22
FEITIAN TECHNOLOGIES
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Since the CRC check is not secure enough, the security of the .NET card cannot be fully guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method, compiling device, device and system capable of running .net programs
  • Safety verification method, compiling device, device and system capable of running .net programs
  • Safety verification method, compiling device, device and system capable of running .net programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] Embodiment 1 of the present invention provides a security verification method, see figure 1 , the method includes:

[0101] Step 101: Compile the .NET assembly, and add strong naming to the .NET assembly during the compilation process, and obtain the executable file after adding the strong naming;

[0102] On the one hand, strong naming is used to prevent executable files from being tampered with and version control, which is provided by the compiler during compilation. Add strong naming to the assembly, CLR (Common Language Runtime, common language runtime) can guarantee that two assemblies with the same strong naming are completely consistent in any respect. In other words, strong naming provides the CLR with a unique identifier for an assembly. After strong naming is added, the host generates a key pair, including a public key and a private key. The public key is stored in the manifest of the executable file, and the private key is invisible. Strongly named assemb...

Embodiment 2

[0160] An embodiment of the present invention provides a safety verification system. For the working method of the system, reference may be made to the method in Embodiment 1, which will not be repeated here. see figure 2 , the system includes: a compiling device 201 and a .NET card 202;

[0161] Among them, see image 3 , the compiling device 201 specifically includes:

[0162] The compilation module 201A is used to compile the .NET program, and add a strong name to the .NET program during the compilation process to obtain the .NET executable file;

[0163] The obtaining module 201B is used to obtain the public key, public key identifier, original data and signature data including the index table in the .NET executable file;

[0164] The sending module 201C is used to send the public key, the public key identifier, the original data containing the index table and the signature data obtained by the obtaining module 201B to the inside of the .NET card, the public key, the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety check method, relating to the field of information safety. The safety check method comprises the following steps of: compiling a .NET program, and adding a strong name to the .NET program in the compiling process to obtain a .NET executable file; obtaining a public key, a public key identification as well as original data and signature data containing index tables from the .NET executable file, and sending the public key, the public key identification as well as the original data and the signature data containing the index tables to the inside of a .NET card; checking the public key identification by utilizing the index tables inside the .NET card; if the check of the public key identification is successful, checking whether the public key is legal or not by utilizing the public key identification; if the public key is legal, checking whether the original data is legal or not; when the original data is legal, ending the operation; when the original data is illegal, returning error information and carrying out error processing; if the public key is illegal, returning error information and carrying out error processing; and if the check of the public key identification is failed, returning error information and carrying out error processing. Correspondingly, the invention also provides a compilation device, the .NET card and a system.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a safety verification method, a compiling device, a device and a system capable of running .NET programs. Background technique [0002] A smart card is a plastic card similar in size to an ordinary business card. It contains a silicon chip with a diameter of about 1cm, which has the functions of storing information and performing complex calculations. It is widely used in telephone cards, financial cards, identification cards, mobile phones, pay phones and other fields. Among them, the chip of the smart card is considered to be the smallest electronic computer in the world due to its integrated microprocessor, memory, and input and output units. Moreover, on the smart card, there is a complete set of security control mechanism with strong performance, and the security program is solidified in the read-only memory, so it has reliable security guarantees such as non-cop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06K19/073G06F21/30
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES