Realization method for security domain on java card

An implementation method and security domain technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as low security and cardholder interests cannot be guaranteed, and achieve the effect of improving security

Active Publication Date: 2012-11-28
FEITIAN TECHNOLOGIES
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the widespread application of smart cards, the use and function integration of smart cards are getting higher and higher, and the security of the application in the card is related to the major interests of the cardho...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method for security domain on java card
  • Realization method for security domain on java card
  • Realization method for security domain on java card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] S1: The card is powered on, and the current security domain of the card starts to work;

[0051] S2: The current security domain is waiting to receive the command sent by the host computer. When receiving the APDU command, detect the type of the APDU command. If it is the first command, execute S3; if it is the second command, execute S4- S10; if it is the third command, execute S11-S12; if it is the fourth command, execute S13; if it is the fifth command, execute S14-S15; if it is other APDU commands, operate according to the APDU command ;

[0052] In this embodiment, the first command is an install for load command, the second command is a load command, the third command is an install for install command, the fourth command is an install for personalization command, and the fifth command is a store data Order.

[0053] S3: The current security domain parses the first command to obtain the command header and data field, and parses the data field of the first command...

Embodiment 2

[0067] Embodiment 2 of the present invention provides a method for implementing a security domain on a java card. The method takes the main security domain receiving the install for load command, load command, install for install command, install for personalization command and store data command as an example, The specific process is as follows:

[0068] Step 101: Power on the card;

[0069] Step 102: The current security domain of the card receives the APDU command sent by the host computer, and judges the command type;

[0070] The current security domain can be the main security domain or the user security domain; it can be the default security domain application after the card is powered on or the security domain application selected by the select command. In particular, the default application after the card is powered on is When the non-secure domain application or the application selected by the select command is a non-secure domain application, before this step, the ...

Embodiment 3

[0133] Embodiment 3 of the present invention provides yet another implementation method of the security domain on the java card. The method takes the user security domain receiving the install for load command, load command, install for install command, install for personalization command and store data command as an example , the method is as follows:

[0134] Step 201: power on the card;

[0135] Step 202: The current security domain in the card receives the APDU command sent by the host computer, and judges the command type. If the command type is a preset type command, execute steps 204-206, otherwise execute step 203;

[0136] Preferably, the current security domain is the user security domain, and before this step, the step of selecting the user security domain as the current security domain by the card receiving a select command sent by the host computer may also be included. In this embodiment, the preset type commands include an install for load command and an instal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a realization method for a security domain on a java card, and relates to the field of smart cards. The method comprises the following steps of: receiving and resolving a first command by using a current security domain to obtain application related information, and setting a first state into waiting for the reception of a second command; receiving and resolving the second command to obtain a loaded file data block, storing the loaded file data block into a first memory area, verifying whether the second command is legal or not, continuing the method if the second command is legal, otherwise reporting an error; receiving and resolving a third command, verifying whether the third command is legal or not according to resolved data, and if the third command is legal, calling an installation method, and installing application according to the data of the first memory area; receiving and resolving a fourth command, judging whether the fourth command is legal or not, and if the fourth command is legal, setting the first state into waiting for the reception of a fifth command; and receiving the fifth command, and executing application personalization operation. By using the scheme, the security of application downloading, installation and personalization processes of the card is ensured.

Description

technical field [0001] The invention relates to the field of smart cards, in particular to a method for realizing a security domain on a java card. Background technique [0002] With the widespread application of smart cards, the use and function integration of smart cards are getting higher and higher, and the security of the application in the card is related to the major interests of the cardholder. The internal and external authentication of the upper computer allows the management of the application in the card after the authentication is passed. The security is low and the interests of the cardholder cannot be guaranteed. Contents of the invention [0003] In order to solve the above problems, according to an aspect of the present invention, a method for implementing a security domain on a java card is provided, including: [0004] S1: The card is powered on, and the current security domain of the card starts to work; [0005] S2: The current security domain waits ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products