Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protection method for JAVA card virtual machine

A security protection and virtual machine technology, applied in the field of smart cards, can solve problems such as access to private data, security threats to the use of JAVA card virtual machines, etc., and achieve the effect of enhancing use security and enhancing security protection capabilities

Pending Publication Date: 2021-09-24
WUHAN TIANYU INFORMATION IND
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the JAVA card virtual machine has firewall measures between applications, it is impossible to obtain private data through conventional means. At present, the common attack method is to attack the memory of the card by laser, modify the virtual machine program pointer of the JAVA virtual machine, the virtual machine Stack pointer, virtual machine method frame pointer, etc., conduct side-channel attacks on the process of operating the stack and data in E2 (non-volatile storage area), and illegally access the stored data in the card through the firewall, so as to virtualize the JAVA card Threats to the safety of the machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method for JAVA card virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The embodiment of the present invention provides a security protection method for a JAVA card virtual machine, which realizes redundant protection of pointers of the JAVA card virtual machine through software, and performs integrity protection for the content of the method frame, so that the virtual machine can run and read internal data. If an external attack is encountered during the acquisition, it can be detected in time, and the operation of the system will be terminated in time, which effectively enhances the security protection capability of the virtual machine and enhances the use security of the JAVA card virtual machine.

[0047]In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the descri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection method for a JAVA card virtual machine, which relates to the technical field of intelligent cards and comprises the following steps of: creating redundant backup variables for pointers of the JAVA card virtual machine, and adding checksum in a JAVA object data head; when the JAVA card virtual machine is reset and initialized, initializing all pointers, and assigning values of all the pointers to respective redundant backup variables; carrying out the judgement of the execution type of byte codes by the JAVA card virtual machine: when the execution type is to execute the bytecode and operate stack data, and an execution object member accesses the bytecode or an execution method returns the bytecode, performing security check based on the pointers, the redundant backup variables of the pointers and the data checksum to judge whether the bytecode is normally executed or not. According to the method, the security protection capability of the virtual machine can be effectively enhanced, and the use security of the JAVA card virtual machine is enhanced.

Description

technical field [0001] The invention relates to the technical field of smart cards, in particular to a security protection method for a JAVA card virtual machine. Background technique [0002] With the widespread use of JAVA (a computer programming language) smart card, the use security of JAVA smart card has also attracted more and more attention. Hackers can maliciously attack the applications loaded on the JAVA smart card, thereby illegally stealing the data stored in the application on the card. Private or Sensitive Data. [0003] Since the JAVA card virtual machine has firewall measures between applications, it is impossible to obtain private data through conventional means. At present, the common attack method is to attack the memory of the card by laser, modify the virtual machine program pointer of the JAVA virtual machine, the virtual machine Stack pointer, virtual machine method frame pointer, etc., conduct side-channel attacks on the process of operating the stac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455G06F21/56
CPCG06F9/45558G06F21/566G06F2009/45587
Inventor 张新访董逢华周杰姚成正
Owner WUHAN TIANYU INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products