Security protection method for JAVA card virtual machine
A security protection and virtual machine technology, applied in the field of smart cards, can solve problems such as access to private data, security threats to the use of JAVA card virtual machines, etc., and achieve the effect of enhancing use security and enhancing security protection capabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The embodiment of the present invention provides a security protection method for a JAVA card virtual machine, which realizes redundant protection of pointers of the JAVA card virtual machine through software, and performs integrity protection for the content of the method frame, so that the virtual machine can run and read internal data. If an external attack is encountered during the acquisition, it can be detected in time, and the operation of the system will be terminated in time, which effectively enhances the security protection capability of the virtual machine and enhances the use security of the JAVA card virtual machine.
[0047]In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the descri...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com