Boundary checking method of JAVA card frame

A border check and card frame technology, applied in the field of smart cards, can solve problems such as illegally obtaining card storage data, and achieve the effect of improving security

Inactive Publication Date: 2017-06-13
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Among the existing attack methods, it is possible to modify the local variable index of the java method or increase or decrease the pop-up stack operation by laser attacking the storage medium of the java card or downloading a malicious Applet application, and the operand stack and local variable area of ​​the method frame Access out of bounds and illegally obtain the stored data of the card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Boundary checking method of JAVA card frame
  • Boundary checking method of JAVA card frame
  • Boundary checking method of JAVA card frame

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0019] figure 1 It points out the execution flow of a java method on the java card virtual machine. When the Java Card virtual machine executes the method, it will create a method frame for it, push it onto the stack, and record the start address of the method frame. Two ranges are recorded at the same time: the legal operand range and the legal local variable index range. Then execute the bytecode in the java method in turn. Until the execution of the java method ends, the method frame is popped from the stack.

[0020] figure 2 A schematic diagram of where the legal operand ranges and the legal local variable index ranges are indicated. Starting from the start address of the method frame is the local variable area. Therefore, the legal range of local variables is from the start address of the method frame to ((max_locals+nargs)*2). Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a boundary checking method of a JAVA card frame and belongs to the technical field of smart cards. The boundary checking method includes the steps that when a Java card virtual machine executes a Java method of an application, a method frame is established, a stack is pressed into the frame, and a starting address of the method frame is recorded; meanwhile, two ranges are recorded and include a legal operand range and a legal local variable indexing range; when the Java card virtual machine executes inner byte codes of the Java method of the application, and the stack data type operated by the machine is obtained; if current operating data is local variables, whether local variable indexes are in the legal local variable indexing range or not is judged, if yes, the operation is permitted, and if not, abnormity is prompted; if the current operating data is operands, whether operand addresses are in the legal operand range or not is judged, if yes, the operation is permitted, and if not, abnormity is prompted. The multi-application security management of the Java card is achieved.

Description

technical field [0001] The invention relates to the technical field of smart cards, in particular to a method for checking boundaries of JAVA card frames. Background technique [0002] With the development of e-government and e-commerce, the application of Java cards is becoming more and more extensive. In order to solve the needs of users for one card with multiple functions, the current multi-application Java cards are becoming more and more common, and the security issues between applications are becoming more and more important. . [0003] Among the existing attack methods, it is possible to modify the local variable index of the java method or increase or decrease the pop-up stack operation by laser attacking the storage medium of the java card or downloading a malicious Applet application, and the operand stack and local variable area of ​​the method frame Conduct cross-border access and illegally obtain the stored data of the card. The Java card needs to provide a f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F9/455
CPCG06F21/566G06F9/45525
Inventor 曾林仲倩黎
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products