Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for three-in-one smart card anti-side-channel-attack protection

A side-channel attack, trinity technology, applied in the field of information security, can solve problems affecting the availability of smart cards, etc., to achieve the effect of increasing difficulty, good effect, and meeting the cost

Inactive Publication Date: 2014-07-02
BEIJING WATCH DATA SYST
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Implementing a security protection strategy will inevitably pay for code length, computing time, RAM space, etc., which will affect the availability of smart cards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for three-in-one smart card anti-side-channel-attack protection
  • Method and system for three-in-one smart card anti-side-channel-attack protection
  • Method and system for three-in-one smart card anti-side-channel-attack protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0071] Such as figure 2 As shown, a smart card trinity anti-side channel attack protection system includes a user security configuration module 11 and a security control center module 12 connected thereto, a chip layer anti-attack strategy collection module 13 connected to the security control center module 12, and a COS layer anti-attack strategy module 13. Attack strategy collection module 14, application layer anti-attack strategy collection module 15, the detailed description of each module is as follows:

[0072] User security configuration module 11: It is convenient for users to perform reasonable configuration according to smart card application requirements. This module implements a user security configuration interface on the PC side. Legal users can operate the security control center through this user interface after completing PIN...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for three-in-one smart card anti-side-channel-attack protection. According to the method and the system of the invention, a security control center is arranged in a COS layer so as to configure and manage anti-attack strategies of a chip layer, the COS layer and an application layer in a unified mode. A legitimate user can configure the security control center through a user security configuration interface after PIN verification so as to realize flexible and unified three-in-one anti-attack strategy management. By adopting the method and the system of the invention, the overall security of smart cards can be promoted, and the difficulty for smart cards to resist side channel attack is increased.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a smart card trinity anti-side channel attack protection method and system. Background technique [0002] With the rapid development of information technology and the increasing popularity of smart cards, the application of smart cards has spread across all aspects of people's lives. Smart card (smart card) is also called integrated circuit card, that is, IC card (integrated circuit card). It has features such as convenience and safety. In order to protect the security of information and communication on the smart card, a variety of encryption algorithms are implemented on the smart card. Encrypting the smart card is one of the means to effectively ensure the security of the smart card. Commonly used algorithms include DES and AES for symmetric encryption, RSA and ECC for asymmetric encryption, and SHAx series and MAC for calculating message digests. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/073H04L9/06
Inventor 张擎
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products