Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for making secure typed data language in particular in integrated system and integrated system therefor

An embedded system and security technology, which is applied to the security of classified data language, especially in the embedded system and the embedded system field that realizes it, can solve the problem of error operation spreading smart cards, etc., and achieve the effect of optimizing memory space

Inactive Publication Date: 2002-12-04
BULL CP8
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Finally, if the smart card is connected to the outside world, the resulting error behavior may propagate to the smart card's external

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for making secure typed data language in particular in integrated system and integrated system therefor
  • Method for making secure typed data language in particular in integrated system and integrated system therefor
  • Method for making secure typed data language in particular in integrated system and integrated system therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In the following, without limiting its scope, we shall hereafter be within the scope of the best application of the invention, unless the contrary is indicated, that is to say in the electronic intelligence embedded with the "JAVA" virtual machine for translating the "p-code" in the case of a system.

[0044] As we recalled in the preamble to this specification, when a given method executes, the virtual machine looks up the corresponding "p-code". This "p-code" identifies a specific operation to be performed by the virtual machine. A special stack is required for the processing of local variables and arithmetic operations or for other method calls.

[0045] For the virtual machine the stack is used as the work area. To optimize virtual machine performance, the stack size is usually fixed for a given primitive type.

[0046] As already recalled, there are two main types of objects that can be used in the stack:

[0047] - Objects of "primitive" type, which start with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system for the secure execution of sequences of information application instructions written in the form of classified data or objects, in particular written in the "JAVA" language. The memory (1) is organized in the form of a first element stack series (2,3) to record instructions. We associate each data or class object with one or more type bits indicating the type. These bits are recorded in the second element stack series (4,5) and correspond one-to-one with the first series stack (2,3). Before the execution of the predefined type instructions, a continuous verification of the consistency between the type indicated by these instructions and the type indicated by the type bits is carried out before these instructions are executed. Stop execution in case of inconsistency.

Description

technical field [0001] The present invention relates to a dynamic security method for a classified data type language, especially for an electronic chip embedded system. [0002] The invention also relates to an electronic smart card embedded system using the method. Background technique [0003] In the scope of the invention, the term "embedded system" must be used in its broadest sense. It relates in particular to light terminals with an electronic smart card, more precisely a smart card. The smart card has recording means and digital data processing means, such as a microprocessor for the latter. [0004] To illustrate the concept, and not limit its scope, the following invention is in the case of its best application, ie a smart card based application, unless stated to the contrary. [0005] Also, although different informative languages, such as "ADA" or "KAMEL" (both are registered trademarks), are of the type of data or object referred to as collations, one most co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/07G06F9/44G06F9/45G06F9/455G06F21/12
CPCG06F9/45504G06F9/44589
Inventor 尼考拉斯·福吉奥克斯奥利弗·弗迪尔帕特里·海米奥
Owner BULL CP8
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products