Inversion technology-based instruction distribution method and system for intelligent security chips

A security chip and instruction technology, applied in the field of communication, can solve the problems of poor security, instruction distribution time overhead, etc., achieve the effect of improving speed and security, facilitating system maintenance, and preventing attacks

Active Publication Date: 2016-05-25
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the problems of high command distribution time overhead and poor security in the prior art, the prese

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Inversion technology-based instruction distribution method and system for intelligent security chips
  • Inversion technology-based instruction distribution method and system for intelligent security chips
  • Inversion technology-based instruction distribution method and system for intelligent security chips

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0030] In order to solve the problems of high command distribution time overhead and poor security in the prior art, the present invention proposes a method and system for command distribution of an intelligent security chip based on inversion technology.

[0031] When the smart security chip communicates with the terminal device, information is exchanged through the APDU command. When the command enters the smart security chip, the command is first distributed to the function mode of the corresponding application through the command distributor to complete the parsing and execution of the command and return. That is, after receiving the instruction, determine the corresponding instruction record according to the instru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an inversion technology-based instruction distribution method and system for intelligent security chips. The method comprises the following steps: establishing instruction records which comprises the basic information required by instruction distribution; distributing a corresponding unique offset address for the instruction record of each chip type according to different chip types; establishing an instruction inversion table which comprises instruction words and the unique offset addresses, wherein each instruction word corresponds to a plurality of unique offset addresses and the number of the unique offset addresses is same as the number of the chip types; receiving an instruction from terminal equipment and determining a corresponding instruction record according to the instruction word and chip type of the instruction; judging whether a data domain of the instruction needs to be received according to an instruction data domain sign of the instruction and the corresponding instruction record; if the judging result is positive, receiving the data domain of the instruction; and of the judging result is negative, skipping the step.

Description

technical field [0001] The present invention relates to the technical field of command distribution in the communication field, and in particular, to a method and system for command distribution of an intelligent security chip based on inversion technology. Background technique [0002] Before the smart security chip was used on a large scale, the products that were widely used in related fields mainly included memory cards with various interfaces, interface chips, and magnetic stripe cards. These products do not have the ability to identify visitors, the stored data is not safe, and it is easy to be forged and copied. Visitors can directly read the data inside through an open protocol. [0003] After the rise of the smart security chip industry, traditional products have gradually been replaced. At present, smart security chips are widely used in telecommunications, banking, electric power and other fields for safe storage of data, identification, and security control. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 赖宇阳张明明赵云钱斌林伟斌张乐平胡珊珊陈华军
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products