Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing chip operating system (COS) safety mechanism of intelligent card

A technology of safety mechanism and implementation method, which is applied to record carriers, computer parts, and instruments used in machines, and can solve problems such as difficulty in implementing safety mechanisms and discrete safety attributes.

Active Publication Date: 2012-09-12
SHANDONG SYNTHESIS ELECTRONICS TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the security properties that need to be defined are discrete, and it becomes more and more difficult to realize the security mechanism of traditional smart cards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing chip operating system (COS) safety mechanism of intelligent card
  • Method for realizing chip operating system (COS) safety mechanism of intelligent card
  • Method for realizing chip operating system (COS) safety mechanism of intelligent card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] According to the present invention, a smart card COS multi-dimensional security mechanism of individualized file access authority is proposed, which implements security status and security attributes by bit logic, and uses security control words to control the relationship between security attributes.

[0036] The control word is stored in the register and can be defined and modified. The operation and status corresponding to each bit of the predefined control word are reversely analyzed to complete the relevant control, operation, and status transfer.

[0037] Correspondingly, the security control word is to control the use of security attributes, specifically the control of access rights. The security control word is defined in the security attributes, and its initialization content should be expressed as a comprehensive prohibition of access rights, that is, no access rights are obtained. Authorization conditional on security attributes.

[0038]In one embodiment, bi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing a chip operating system (COS) safety mechanism of an intelligent card. The method comprises the following steps of setting corresponding bits of a safety control word through results of external authentication and verification according to a predetermined method when the intelligent card is recognized by a reading-writing terminal equipment; reading the safety control word with set bits, analyzing the safety control word according to a predetermined method, and determining an application logic of the safety attribute; verifying whether a safety status updated by the status transfer satisfies the safety attribute under the logic condition, and executing the allowed operation; and resetting the safety control word after the predetermined operation of the intelligent card and the reading-writing terminal equipment is completed. According to the method, the realization of the safety mechanism can be simplified.

Description

technical field [0001] The invention relates to a method for realizing a COS safety mechanism of a smart card, wherein COS is an abbreviation of Chip Operating System, that is, an operating system on a chip. Background technique [0002] Smart card technology is widely used in government offices, public utilities, communications, finance, social security, transportation, medical care, education, entertainment, information security and other social industries. While the smart card greatly facilitates the lives of ordinary people, the restriction of the security mechanism is a problem that needs to be considered. [0003] A smart card, also called a CPU card, is an integrated circuit card that integrates a CPU, a storage unit, and an encryption coprocessor. COS needs to be loaded in the smart card CPU to make the smart card "smart". COS generally has its own security system, and its security performance is usually an important technical index to measure COS, so it is necessa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/073
Inventor 郭延海孙涛
Owner SHANDONG SYNTHESIS ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products