首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 703 毫秒
1.
本文介绍了一种实现一卡多发的新型智能卡UCard及其体系结构。针对UCard现有固定存储空间分配存在资源浪费等不足,提出了一种按需存储空间分配方法,并且该方法通过对高位地址总线的约束实现了不同大小COS之间的物理隔离。然后在引入动态地址控制器的基础上,给出了基于按需存储空间分配的UCard底层调度模块的一种实现方式。最后利用有限状态机对UCard底层调度模块装载、调度、卸载COS的过程进行了形式化描述。  相似文献   

2.
本文首先介绍了一种为解决智能卡便携性问题而提出的新型智能卡结构模型-UCard;然后给出了UCard的可信计算基的具体构成;接着从UCard的两种工作形态即发卡态和用卡态详细分析了UCard在不同状态下其可信计算基的构成情况;最后,在讨论重构系统安全性问题的基础上,对多可信计算基的UCard安全性问题做了具体分析。  相似文献   

3.
本文首先通过分析智能卡覆其协议的发展,给出了UCard覆其底层协议的概念。基于UCard的应用特征,本文给出了UCard协议对象的定义、属性、集合、约束。同时给出了对象约束图。在此基础上,本文通过研究Ucard初始化协议中相关对象的状态转换,为初始化对象管理的协议制定给出参考依据。  相似文献   

4.
针对现有智能卡操作系统COS(Chip Operating System)测试难、效率低,以及现有测试工具通用性差、测试脚本复用程度低的问题,结合智能卡软件测试的特点,提出一种针对智能卡操作系统测试的通用测试脚本语言UCSL;并对该语言的语法结构及其相应解释器的设计进行研究和实现。应用实践表明:UCSL脚本语言具有语法简单、结构清晰、易于维护,便于扩展等优点,能够用于多种COS的测试。  相似文献   

5.
对智能卡COS现有USB、串口读写器的烧写技术进行了研究与分析,提出了一种以ARM处理器为母片硬件平台,通过智能卡接口对其他智能卡COS进行快速烧写的片拷贝方法。该方法具有硬件设计简单、烧写速度快,稳定性、安全性高等优点,且易于扩展为批量智能卡COS烧写器平台。目前该技术已在贴片智能卡生产厂商得以全面应用,大大提高了COS的烧写效率,具有较好的应用前景。  相似文献   

6.
本文对智能卡作了简要介绍,给出了一台手持设备中的接触式智能卡的读写电路。该电路避免了智能卡的带电插拔操作,能有效地延长智能卡的使用寿命。本文同时探讨了智能卡的类型识别问题,提出了一种对ATMEL公司各型存储器卡的识别办法,最后对“一卡多用”问题进行了讨论。  相似文献   

7.
李国俊  董晶晶  周瑾 《微机发展》2014,(2):164-167,171
智能卡COS是智能卡中重要的软件控制部分,它控制着智能卡内外部的数据通信和存储。智能卡COS的安全性是信息化应用健康有序进展的重要基础,因此,必须对智能卡COS进行科学全面的测试评价。文中首先描述了智能卡COS的组成结构;然后分析了智能卡COS需要保护的信息资产及其面临的安全威胁,在此基础之上,提出智能卡COS在软件设计实现中需要考虑的安全机制,阐明如何构建智能卡COS安全性测试评价平台;最后,重点从安全功能测试和穿透性测试两个方面阐述了智能卡COS安全测试的关键技术。  相似文献   

8.
智能卡芯片操作系统的研究与实现   总被引:1,自引:0,他引:1  
为了充分利用智能卡芯片有限的资源,开发出高效的、易扩充的芯片操作系统(COS),研究了智能卡COS设计和实现方法.介绍了智能卡COS的体系结构,设计了结构模型,从COS的主守护流程、通信管理、文件系统、安全管理和命令解释5个方面论述了智能卡COS的设计与实现.采用中断调度方式节省了系统开销,采用静态存储管理方式节约了存储空间.通过测试验证了COS符合国际标准和行业标准,该系统能正确应用在终端和相应网络环境中,具有良好的兼容性和稳定性.  相似文献   

9.
一种新的"一卡多用"智能卡模型   总被引:6,自引:0,他引:6  
提出了一种新的“一卡多用”的智能卡的模型,并提出了适合一卡多用的新的硬件体系结构,着重探讨了基于这种模型的芯片操作系统的结构以及有关的安全管理方法。  相似文献   

10.
金融智能卡操作系统安全体系研究   总被引:10,自引:1,他引:9  
讨论了通用智能卡操作系统COS的安全体系,围绕该体系的三大功能:文件操作、认证系统、加/解密展开论述。金融智能卡操作系统是建立在通用COS基础上集成了银行应用的COS。结合实践的JETCOS智能卡操作系统分析了金融智能卡COS在交易流程和应用过程中的安全性。  相似文献   

11.
介绍了智能卡COS现状及存在的问题,针对底层通用问题,借鉴Java智能卡的优点实现与底层无关的COS,即针对不同的硬件平台,无需重新编写代码。根据参数的不同提出了几种不同的解决方案。  相似文献   

12.
随着芯片技术的发展以及运营商之间的业务扩展,手机智能卡将会向多应用平台方向发展。就是在多应用要求下,重点对文件系统、安全机制和双通道通信管理进行研究与设计。最后基于RF_SIM卡设计了一种多应用COS(智能卡操作系统)结构和实现了一个简单原型,具有较高的稳定性和安全性,对其他研究人员设计多应用COS有一定的借签价值。  相似文献   

13.
《Computer Networks》2007,51(9):2234-2248
Smart cards are secure tokens that have provided security services to a wide range of applications for over thirty years. Along with other technology advances, smart card technology has changed dramatically as well. However, its communication standards, largely unchanged, do not match with those of mainstream computing, which has limited its success in the Internet age. For nearly a decade, researchers have sought to connect smart cards to the Internet. The benefits are plentiful, including providing services over the Internet and eliminating smart card specific infrastructure. A key to this quest is to equip smart cards with a secure and effective networking capability. Various approaches have been taken to find this key. There is still much work to do. This paper reviews years of research in this area, looks at the state of the art, and analyzes and compares various networking options for smart cards. Furthermore, the paper outlines remaining technical challenges for making smart cards a part of the Internet world.  相似文献   

14.
基于蓝牙技术的智能卡应用系统   总被引:2,自引:0,他引:2  
张利华 《计算机工程》2005,31(20):191-193
在现有的智能卡系统中智能卡处于被动的地位,只能在专有设备的场合使用,从而限制了智能卡的应用。该文在分析现有智能卡应用系统的基础上,基于蓝牙技术,给出了一种新概念的蓝牙智能卡应用系统。该系统中交易双方处于平等地位,能够实现双向的数据流动,联网和使用方便。同时给出了相应的应用模式和交易流程。实验室的原型系统表明这种方案是可行的。  相似文献   

15.
When compared with data carriers such as cards with magnetic stripes or diskettes, the potential for protecting and securing data is one of the main advantages of cards with electronic chips (smart cards). Consequently, the chip hardware must be designed in an optimum fashion to meet this purpose; this includes the corresponding cryptographic procedures for securing the secret data. However, security is not only dependent on the specialised hardware of the microcontroller or on the cryptographic algorithms implemented in the operating system software. The security of applications for smart cards and the design principles applied by the developers to meet these security needs are of fundamental importance. The essential property of a smart card is its ability to offer a secure environment for data and programs. This article examines the range of possible attacks against smart cards, and the measures that can be used to protect against these attacks.  相似文献   

16.
In recent years, the applications of smart cards become wider and wider. Smart cards are used in various areas and play a vital role in many security systems. At the same time, the security issue of smart cards has been more and more important. Smart cards are vulnerable to several attack approaches such as power analysis attacks. In this paper, we propose four novel algorithms to defend against power analysis attacks via randomized execution of programs. The experimental results confirm that the new approaches can even the power distribution of applications in smart cards, which makes smart cards less susceptible to power analysis attacks. Our approaches are general and not limited to a certain application.  相似文献   

17.
一种跨行业多应用智能卡系统模型及实现   总被引:1,自引:0,他引:1       下载免费PDF全文
董威  杨义先 《计算机工程》2007,33(8):230-232
在分析单应用智能卡和多应用智能卡关键技术的基础上,提出了一种跨行业多应用智能卡系统模型,对模型各模块关键技术及模型安全性进行了研究,采用Java Card技术对模型予以实现,并对该实现进行了评估,讨论了下一步的研究重点。  相似文献   

18.
Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号