Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

158 results about "Java Card" patented technology

Java Card refers to a software technology that allows Java-based applications (applets) to be run securely on smart cards and similar small memory footprint devices. Java Card is the tiniest of Java platforms targeted for embedded devices. Java Card gives the user the ability to program the devices and make them application specific. It is widely used in SIM cards (used in GSM mobile phones) and ATM cards. The first Java Card was introduced in 1996 by Schlumberger's card division which later merged with Gemplus to form Gemalto. Java Card products are based on the Java Card Platform specifications developed by Sun Microsystems (later a subsidiary of Oracle Corporation). Many Java card products also rely on the GlobalPlatform specifications for the secure management of applications on the card (download, installation, personalization, deletion).

Intelligent card and U disk compound device and its access security improvement method based on bidirectional authentication mechanism

The invention discloses an intelligence card, U disc complex equipment and method to improve the access security based on the bidirectional identification mechanism. The operation system 203 of intelligence card which is worked following the technical specifications of Java Card is mounted in intelligence card and U disc complex equipment, and the application program 301 which is used to control the read-write of flask disc and application program 112 which is used to complete the identification are run in the operation system 203 of intelligence card. The bidirectional identification based on the digital certificate is realized by three steps: (1)the generation and load of equipment certificate of intelligence card and U disc complex equipment, (2)the certificate of host computer is generated, (3)the bidirectional identification is realized between the host computers, intelligence card and U disc complex equipment. The access of ordinal U disc is not controlled any more. The bidirectional identification mechanism which is realized by the digital certificate can confirm the identity of intelligence card and U disc complex equipment, and it has perfect secrecy, and can satisfy the requirement of security for the special department.
Owner:中国信息安全产品测评认证中心 +1

Realization method for security domain on java card

The invention discloses a realization method for a security domain on a java card, and relates to the field of smart cards. The method comprises the following steps of: receiving and resolving a first command by using a current security domain to obtain application related information, and setting a first state into waiting for the reception of a second command; receiving and resolving the second command to obtain a loaded file data block, storing the loaded file data block into a first memory area, verifying whether the second command is legal or not, continuing the method if the second command is legal, otherwise reporting an error; receiving and resolving a third command, verifying whether the third command is legal or not according to resolved data, and if the third command is legal, calling an installation method, and installing application according to the data of the first memory area; receiving and resolving a fourth command, judging whether the fourth command is legal or not, and if the fourth command is legal, setting the first state into waiting for the reception of a fifth command; and receiving the fifth command, and executing application personalization operation. By using the scheme, the security of application downloading, installation and personalization processes of the card is ensured.
Owner:FEITIAN TECHNOLOGIES

Remote card issuing method of mobile phone payment card based on JAVA card

The invention provides a remote card issuing method of a mobile phone payment card based on a JAVA card, which comprises the following steps of: firstly inquiring card applications installed on the mobile phone payment card to obtain the opened card applications and the card applications which are not opened; and then, selecting the card applications needing to be opened according to the user needs, sending basic information of the mobile phone payment card to a server side, carrying out external authentication on the card applications needing to be opened, and updating a secret key of the mobile phone payment card after the external authentication succeeds. According to the remote card issuing method provided by the invention, remote card issuing can be simultaneously carried out on multiple mobile phone payment cards through the server side, and the card issuing speed is rapid; and by storing the secret key through an encryption equipment, the secret key is safer and more convenient to manage; the card applications can be deleted or newly added and can be freely combined according to the user needs, and the card issuing process and the user application process are also recorded and managed through the server end, thus avoiding errors in the using process.
Owner:中电福富信息科技有限公司

Method for processing Java card debugging information

The invention discloses a method for processing Java card debugging information. The method comprises the following steps of: acquiring an instruction, detecting the type of the instruction, if the instruction is an unprocessed setting instruction and an adjuster is a position adjuster, replacing original byte codes corresponding to position information in a Java card program running on a virtual machine by using special bytes, and writing the original byte codes into an event list to generate an event serial number; if the adjuster is a single-step adjuster, setting single-step debugging information, and writing an event into the event list to generate an event serial number; if the instruction is a debugging instruction, acquiring byte codes of the current Java card program running on the virtual machine, and judging whether the byte codes are special byte codes; and if the byte codes are special byte codes, searching the corresponding original byte codes from the event list, replacing the special byte codes with the original byte codes to obtain returned data, otherwise, when the setting of a single-step debugging mark in the event list is judged, acquiring the returned data according to the byte codes. The method is convenient to use and is capable of monitoring and checking the debugging process of a virtual machine in real time.
Owner:FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products