Method for generating security file system of smart card

A security file and smart card technology, applied in response to error generation, internal/peripheral computer component protection, instruments, etc., can solve the problems of poor file system security, poor scalability and controllability, and high file system management overhead

Active Publication Date: 2015-04-29
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, based on the file system in the smart card operating system, according to the ISO/IEC 7816-4 standard, only the relevant file types and the relevant specifications of the MF root directory are defined. The organization and structure of the directory and files are designed by the designer according to the specific application functions. Therefore, there is no uniform technical specification for the file system in the smart card operating system
The popular smart card file system has two modes. One is to learn from the file allocation table (FAT) mode of hard disk file management, divide the smart card data storage into several blocks of equal size, and manage the data storage of the smart card in units of blocks. Associated with the data storage block, the file system management overhead of this mode is high, the uti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating security file system of smart card
  • Method for generating security file system of smart card
  • Method for generating security file system of smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Such as figure 1 As shown, the directory control item consists of the directory control item header address (DCFA), directory identifier (DirID), peer directory pointer (PDP), lower-level directory chain head pointer (NDLHP), lower-level directory chain tail pointer (NDLTP), directory Remaining space head address (DRSHA), file chain head pointer (FLHP), file chain tail pointer (FLTP), directory data head address (DDHA), directory application space (DAS), directory other control parameters (DOCP) and CRC check code composition.

[0056] The directory identifier consists of 2 bytes. The root directory identifier is specified as 3F00. The directory identifier is one of the parameters to find out whether the directory exists. Each directory must have a directory identifier, and the directory identifiers of the same-level directories cannot be the same . The same-level directory pointer points to the directory control item of the same-level directory. When the pointer is e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for generating a security file system of a smart card. The method comprises the following steps: 1, after the smart card receives a pre-initializing command, performing initial checking on a smart card data storage unit area, and determining the numbers of to-be-created directory control items and file control items according to parameters of the command; 2, creating the relative numbers of empty directory control items and empty file control items, and constructing independent empty directory control item chain tables and empty file control item chain tables; 3, based on the empty directory control item chain tables and the empty file control item chain tables, creating directories and files, constructing a membership relation between a directory and another directory and a relationship that the files are subordinate to the directories, and constructing specifically applied directory control item chain tables and file control item chain tables; and 4, performing corresponding directory and file selection and cancel. According to the method for generating the security file system of the smart card, the utilization rate of a data storage unit and the access control speed of the file system are increased, and meanwhile, the safety and the robustness of the file system are enhanced.

Description

technical field [0001] The invention relates to the design field of a smart card and a smart card operating system, in particular to a method for generating a smart card security file system. Background technique [0002] At present, based on the file system in the smart card operating system, according to the ISO / IEC 7816-4 standard, only the relevant file types and the relevant specifications of the MF root directory are defined. The organization and structure of the directory and files are designed by the designer according to the specific application functions. Therefore, there is no unified technical specification for the file system in the smart card operating system. The popular smart card file system has two modes. One is to learn from the file allocation table (FAT) mode of hard disk file management, divide the smart card data storage into several blocks of equal size, and manage the data storage of the smart card in units of blocks. Associated with data storage bl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78G06F11/10
CPCG06F11/106G06F21/79
Inventor 张鲁国何骏苏庆会梁松涛刘长河张重磊
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products