Supercharge Your Innovation With Domain-Expert AI Agents!

Safe JAVA card secret key storage method

A card key and key technology, which is applied in the field of smart cards, can solve problems such as key value leakage, unsafe storage methods, and users cannot directly access the key, so as to ensure consistency, improve execution efficiency, and reduce key security issues. The effect of the risk of leakage

Inactive Publication Date: 2016-04-27
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] Common key storage methods in the card can be stored in arrays or key objects. Storage in arrays is obviously the most insecure storage method. If you use this method to store, then The security of the card can only be guaranteed by the fact that the key is not allowed to be read in the GlobalPlatform specification, but the attacker is likely to obtain the key value through brute force cracking or logical attack
[0017] It is obviously more secure than the array method to store the key object. It stores the key value in the key object, and the user cannot directly access the actual value of the key. The key in the card is also in the form of a key object. transmission, which improves encapsulation, but since the key value is transmitted to the card through the PUTKEY command, and the key value in the command has been encrypted, to store it in the key object, only Operations where the key value is first decrypted and then used to set the key object, in these operations the key value is likely to be leaked through the array of commands

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe JAVA card secret key storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The JAVA card key storage method provided by the present invention will be described in more detail below in conjunction with the accompanying drawings and embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] The JAVA card key storage method provided in the embodiment of the present invention, such as figure 1 As shown, the method steps include:

[0030] S101. Write the security channel initial key in the security domain of the issuer when the card is initialized;

[0031] S102. Create a security channel initial key object of the issuer's security domain;

[0032] S103. Use the encrypted ENC key and MAC key to set the ENC (Encryption) key and MAC (MessageAuthenticationCode) key in the security channel initial key of the issuer security domain;

[0033] S104. Use the DEK key to encrypt itsel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe JAVA card secret key storage method. The storage method comprises the following steps of initializing the card, writing in a safe channel initial secret key in an issuing party safety margin, and establishing a safe channel initial secret key object; setting an ENC (encryption) secret key and an MAC (message authentication code) secret key in the safe channel initial secret key through an encrypted ENC secret key and an encrypted MAC secret key; encrypting a DEK (data encryption key) secret key in the safe channel initial secret key through a DEK secret key; and storing an encrypted safe channel initial secret key value in a PUT KEY instruction into the secret key object, and storing a public key value to a public key object. By adoption of the safe JAVA card secret key storage method, the encapsulation and safety in storage of the secret key are improved, and the use time of the secret key is saved.

Description

technical field [0001] The invention relates to the technical field of smart cards, in particular to a safe JAVA card key storage method. Background technique [0002] JAVA card technology is a technology that enables programs written in JAVA language to run on smart cards or resource-constrained devices by tailoring the JAVA technology. At present, JAVA card technology has been widely used in finance, telecommunications and other industries. JAVA cards often carry a lot of confidential information about users, so people are more and more concerned about the security of JAVA cards themselves. [0003] In the JAVA card, in order to perform some calculations, it is often necessary to save some keys. The key is an extremely important sensitive data in the JAVA card, and the security of its storage must be guaranteed. [0004] GlobalPlatform is a global organization dedicated to providing a common security and card management architecture. Most of the JAVA cards currently on th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08G06K19/07G06F21/34
Inventor 毛云娟
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More