Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Java Card Realization Method Supporting Data Signature

A data signature and data information technology, applied in the field of information security, can solve the problems of restricting java card identification applications, java cards cannot support national secret algorithms, etc.

Active Publication Date: 2017-03-22
FEITIAN TECHNOLOGIES
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are many kinds of smart cards, and the java card is widely used as a kind of smart card. However, the technicians of the present invention find in the process of development that the java card cannot support the national secret algorithm, which limits the application of the java card in identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Java Card Realization Method Supporting Data Signature
  • A Java Card Realization Method Supporting Data Signature
  • A Java Card Realization Method Supporting Data Signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] The present invention provides a java card implementation method supporting data signature, such as figure 1 shown, including:

[0070] Step W01: the java card virtual machine is initialized, and the first storage area is cleared;

[0071] Step W02: when the java card virtual machine executes the function call instruction, obtain the function reference and the object reference from the stack;

[0072] Step W03: the java card virtual machine judges the function reference, if the function reference is equal to the first function in the java card standard functions, then perform step W04; if the function reference is equal to the second function in the java card standard functions, then perform step W05; if If the function reference is equal to the third function in the java card standard function, then step W06 is performed;

[0073] Step W04: The java card virtual machine obtains the first function address according to the function reference and the object reference, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a java card realization method supporting digital signature, and belongs to the field of information security. The adopted method comprises the following steps that a java card virtual machine executes a called function according to a function calling instruction; through the execution of the first function, transmitted first data information is stored as a private key, a public key is calculated according to the private key, second data information and the public key are subjected to Hash calculation, the obtained Hash result is used as a first middle value, calculation mode information is stored as a signature mode, and the public key, the transmitted second data information and the first middle value are stored; a first vector value is updated through the execution of a second function; through the execution of a third function, a storage region is allocated, the first vector value and transmitted original data to be signed are subjected to Hash calculation to obtain a second middle value, the private key is obtained, the second middle value and the private key are signed, the obtained signature result is stored into the storage region, the length of the signature result is calculated, and the length of the signature result is returned.

Description

technical field [0001] The invention relates to the field of information security, in particular to a java card implementation method supporting data signature. Background technique [0002] With the rapid development of communication technology, information network has been widely used, and at the same time, computer network crimes have emerged in an endless stream. People usually use a smart card with a national secret algorithm for identification, so as to achieve the purpose of protecting the internal data security of the information network. [0003] At present, there are many kinds of smart cards, and the java card is widely used as a kind of smart card. However, the technicians of the present invention found in the process of development that the java card cannot support the national secret algorithm, which limits the application of the java card in identification . Contents of the invention [0004] In order to solve the defects of the prior art, a java card impl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34G06F21/62G06F21/64
CPCG06F21/34G06F21/64
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products