Method for checking operating authority of smart card and smart card

A technology of operation authority and inspection method, which is applied in the field of smart cards, can solve problems such as potential safety hazards, and achieve the effect of improving security

Inactive Publication Date: 2011-06-29
BEIJING WATCH DATA SYST
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, when the security status of an operation performed by the smart card satisfies the security attributes of the object to be operated, and thus is allowed to perform the operation, the security status will usually be kept, which poses a great security risk in the application, for examp

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for checking operating authority of smart card and smart card
  • Method for checking operating authority of smart card and smart card
  • Method for checking operating authority of smart card and smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the above objectives, features and advantages of the present invention more obvious and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0047] One of the core concepts of the embodiments of the present invention is that by defining the effective value range of the security state of the smart card, and adding security state migration rules to the security attributes of the data object, when the smart card performs a certain operation, the smart card is In addition to completing the security attribute check of the corresponding data object for the effective value range of the security state, it is also necessary to complete the update of the security state according to the security state migration rule set in the security attribute. Through the change of the value of the safe state, the use of the safe state is dynamically recorded, so as to achieve the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for checking operating authority of a smart card. The method comprises steps as follows: when an operation of the smart card needs to be performed, current safety state identification of the smart card must be obtained and judged whether the safety state identification is within the valid identification range of the preset safety state of the smart card; if so, theoperation is executed, and the safety state identification is updated according to a preset transfer rule corresponding to the current operation. The invention can precisely and effectively control the safety state of the smart card, and improves the safety of the smart card.

Description

Technical field [0001] The present invention relates to the technical field of smart cards, in particular to a method for checking operation authority of a smart card and a smart card. Background technique [0002] Smart card is also called IC card, and its English name is SMART card or Integrated Circuit Card. The smart card integrates a microprocessor CPU, a storage unit (including random access memory RAM, program memory ROM (FLASH), user data memory EEPROM, etc.) and a chip operating system (COS) to form a complete computer system. In recent years, smart cards have been widely used in the fields of identity authentication, electronic payment and settlement, transaction security, and data carriers. [0003] In order to ensure the security of smart card applications, in addition to setting up its own physical security mechanism, a COS security management module is also set up inside the smart card. The security management module of smart card COS is scattered in all layers of CO...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06K19/073G06F21/34
Inventor 王贻君
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products