Font Size: a A A

Pivotal Technique And Applications Of Smart Card

Posted on:2007-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y H WangFull Text:PDF
GTID:2178360212460727Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of semiconductor technique and the increase of social requirements for information security, the Smart Card has been widely and rapidly applied in daily life. Especially in recent years, the related technologies development of information digitalization accelerate the application of the Smart Card, and more and more fields make use of the Smart Card. There are tremendous merits of the Smart Card application case in every country. Now the Smart Card has been accepted in the finance, insurance, telecom, medical treatment, transport, security and so on, they are all very close to people's daily life. So, it is very valuable and important for China to research and develop the Smart Card technique.In this research field, the keystone is in software level, and the kernel technique of software is the operating system (abbr. COS). The powerful COS can greatly promote the card system to be acceptable and feasible. I have been engaged in the Smart Card development research since 2000, and I took charge of several card projects, which have been put into practice and work well. Thus lots of theory knowledge and design experience are accumulated in my practice, and this is very helpful for my researchIn this paper I will introduce the basic knowledge of the Smart Card detailedly firstly. For example, categories of the Smart Card, infrastructure, principle and the developing status in China and other country. Then I will emphasize studying the main components of the Smart Card operating system, which includes in communication module, file system, security module and the Smart Card application. In the communication module, the communication protocols T=0 and T=1 are mainly described; In the file system, after I will analyze the file systems, bring forward four solutions of file system, and then make comparison; In the security module, I will introduce how to defend the attack from the outside, and how to solve these issues.
Keywords/Search Tags:Javacard, COS, File System, Anti-tear
PDF Full Text Request
Related items