期刊文献+

智能卡的安全体系研究 被引量:1

Research on the security system of smart card
原文传递
导出
摘要 随着我国EMV迁移的发展,金融IC卡取代磁条卡的升级换代正在加速进行;而移动支付的持续升温,又将推动一卡多应用的普及与发展,这些趋势都使智能卡的安全日益引发关注。本文从Java卡的角度研究智能卡安全体系的三道防线,一是标准规范提供的安全机制,二是智能卡芯片中集成有各种传感器以及保护层,保证卡片运行物理环境的可靠性,三是智能卡OS在设计时增加了很多安全校验代码,并充分利用芯片层提供的各种安全模块。三道防线相互呼应,有机结合,为智能卡的运行提供了一个严密的安全体系。 With the development of EMV migration in our country, the financial IC card instead of a magnetic stripe card upgrade are accelerating; And mobile payment is on the rise, will promote the popularity of more than one card application and development of these trends are that the security of smart card cause attention increasingly. In this paper, from the viewpoint of the Java card, smart card security system of three lines of defence, one is to provide the security mechanism of standard specification, the second is a smart card chip integrated with various sensors and protection layer, guarantee the reliability of the card to run the physical environment, three is a smart card OS has increased a lot in the design of safety check code, and make full use of the chip layer provides various security module. Three lines of defence mutual echo, organic combination, for the operation of the smart card provides a tight security system.
作者 李奕
机构地区 武汉理工大学
出处 《电子技术(上海)》 2015年第5期19-22,11,共5页 Electronic Technology
关键词 智能卡 JAVA卡 芯片 安全模块 smart card JAVA card chip Security module
  • 相关文献

参考文献9

  • 1Sun Microsystems Inc.: Runtime Environment Specification, Java Card Platform Version 3.0.1 Connected Edition(2009).
  • 2Sun Microsystems Inc.: Virtual Machine Specification, Java Card Platform Version 3.0.1 Connected Edition(2009).
  • 3Sun Microsystems Inc.: Java Card API Specification, Java Card Platform Version 3.0.1 Connected Edition(2009).
  • 4GlobalPlatform: GlobalPlatform Card Specification 2.2(2006).
  • 5Vermoen D., Witteman M., Gaydadjiev .G.N.. Reverse engineering Java Card Applets using power analysis. Information Security Theory and practices. Smart Cards, Mobile and Ubiquitos Computing Systems. First IFIP TC6/WG8.8/WG 11.2 International Workshop, WISTP 2007.Berlin,Germany:Springer, 2007.138-149.
  • 6Bar-E1 H., Choukri H., Naccache D., etal. The Sorcerer's apprentice guide to fault attacks. Proceedings of the IEEE, 2006, 94(2):370-382.
  • 7Bouffard G., Iguchi-Cartigny J., Lanet J.-L. Combined Software and Hardware Attacks on the Java Card Control Flow. Smart Card Research and Advanced Applications. 10th IFIP WG 8.8/11.2 International Conference. CARDIS 2011. Berlin, Germany: Springer-Verlag, 2011.283-296.
  • 8Vertanen O. Java type confusion and fault attacks. Fault Diagnosis and Tolerance in Cryptography. Third International Workshop, FDTC 2006. Berlin, Germay: Springer-Verlag, 2006.237-251.
  • 9Sere A.A, Iguchi-Cartigny J., Lanet J.L..Mutant Applications in smart card. In: Proceedings of CIS 2010(2010). Piscataway, NJ, USA: IEEE, 2010.

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部