Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Smart card based secret key application method and application apparatus

A smart card and key technology, applied in digital data protection, internal/peripheral computer component protection, electrical components, etc., can solve the problems of smart card key leaks, application logic defects, and application test failures, etc., to achieve The effect of avoiding leaking keys

Active Publication Date: 2016-06-15
SUMAVISION TECH CO LTD
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, the key information of each application program is stored and managed by the application program itself, and the key information is not isolated from the application program itself. When the smart card performs business processing, it can be obtained directly from the application program. key processing
[0003] In this way, there is still a security risk of key information leakage due to improper management of key information by the application
[0004] For example, due to lack of experience in developing applications, or due to factors such as unqualified application testing, there may be logical defects in the application, and criminals can steal the keys of related services by attacking the loopholes in the application, and then according to The stolen relevant key copies the smart card, and uses the relevant key to interact with the business peer end using the copied smart card, thereby causing serious losses to the cardholder
[0005] Based on the above analysis, there is still the problem that the key of the smart card is easily leaked in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart card based secret key application method and application apparatus
  • Smart card based secret key application method and application apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] In order to solve the problem that the key of the smart card is easily leaked in the prior art, in the embodiment of the present invention, the smart card stores the key-associated information of each application program in the corresponding storage space in the locally designated key storage area. When receiving the service request sent by the application program, first read the corresponding key association information from the locally ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a smart card based secret key application method and an application apparatus for reducing potential safety hazards of secret key leakage. The method comprises: after the smart card receives a first business request sent by an application program, based on a mapping relation between a first secret key index and secret key associated information carried by the first business request, the smart card reads the secret key associated information arranged corresponding to the first secret key index from a secret key storage region designated locally, and obtains a first secret key corresponding to the first secret key index based on the secret key associated information, and employs the first secret key and business to end to complete relevant operation. In this way, when the smart card is processing the first business request, the first secret key is obtained from the secret key storage region designated locally by the mapping relation between the firs secret key index and the secret key associated information, rather than obtained directly from the application program, which prevents safety hazards of secret key leakage caused by attacks to the application programs by hackers or Trojan virus.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a key application method and application device based on a smart card. Background technique [0002] Multi-application smart card is an integrated circuit card that integrates multiple functions. It can carry multiple applications. It has the advantages of portability and easy use. It is widely used in finance, transportation, social security, medical communication and other industries. The multi-application smart card mainly realizes the coordinated management of various application programs through the smart card operating system (Card Operating System, COS). Among them, the COS system mainly adopts Java Card open platform technology and Global Platform (Global Platform, GP) Data isolation between applications. However, in the prior art, the key information of each application program is stored and managed by the application program itself, and the key information is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/77H04L29/06
CPCG06F21/64G06F21/77H04L63/0853H04L63/0876
Inventor 郑黎方陈德权
Owner SUMAVISION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products