Anti-attack method and device for Java card

A consistent, storage location technology, applied in the field of Java cards, to achieve the effect of ensuring security

Active Publication Date: 2017-03-08
DATANG MICROELECTRONICS TECH CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to propose a Java card anti-attack method and device, aiming at solving the possible security risk problems of the above-mentioned Java

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack method and device for Java card
  • Anti-attack method and device for Java card
  • Anti-attack method and device for Java card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0033] The technical solution of the present invention will be described in more detail below with reference to the drawings and embodiments.

[0034] It should be noted that, if there is no conflict, the embodiments of the present invention and various features in the embodiments can be combined with each other, and all are within the protection scope of the present invention. In addition, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0035] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-attack method and device for a Java card. The anti-attack method for a Java card comprises the following steps: saving the size information of a non-array object to the object header of the non-array object while the non-array object is created; checking whether the offset value of the member variable of the non-array object is consistent with the size information stored in the object header of the non-array object while the non-array object is accessed, and if the offset value of the member variable of the non-array object is not consistent with the size information stored in the object header of the non-array object, then the access is denied. The invention also provides a Java card including an anti-attack device. According to the scheme disclosed by the invention, the size information of the non-array object is saved while the non-array object is created, and the size of the non-array object is confirmed quickly while the non-array object is accessed, therefore, the disadvantage is prevented that the offset value of the member variable of the binary executable file of the non-array object is maliciously modified and accessed by an illegal user through comparing the offset value of the member variable of the non-array object with the size of the non-array object, therefore, the security for data accessing of a Java card is ensured without the loss of the performance of the Java card.

Description

technical field [0001] The invention relates to the technical field of Java cards, in particular to a Java card attack prevention method and device. Background technique [0002] Java card object access is usually completed through several assembly instructions, such as reading object member variables with getfield related instructions, and member variable assignment with putfield related instructions. Each instruction is followed by a constant of one or two bytes, indicating the need to access The offset of the member variables of the object, the Java Card virtual machine realizes the access control to the member variables of the object by implementing these related access instructions. The usual implementation process of a virtual machine is as follows: firstly, the reference to the object to be accessed (that is, the identifier of the object) is taken out from the running stack, and then the offset of the member variable to be accessed is read from the place where the cod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/60
CPCG06F21/51G06F21/60
Inventor 秦远富熊燕萍尚微
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products