CN101551838A - Identity authentication method and system of memory card - Google Patents

Identity authentication method and system of memory card Download PDF

Info

Publication number
CN101551838A
CN101551838A CNA2008101033596A CN200810103359A CN101551838A CN 101551838 A CN101551838 A CN 101551838A CN A2008101033596 A CNA2008101033596 A CN A2008101033596A CN 200810103359 A CN200810103359 A CN 200810103359A CN 101551838 A CN101551838 A CN 101551838A
Authority
CN
China
Prior art keywords
authentication
file
application software
storage card
extended protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008101033596A
Other languages
Chinese (zh)
Other versions
CN101551838B (en
Inventor
蒋曲明
秦预
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
POENIX MCROELECTRONIC (CHINA) CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by POENIX MCROELECTRONIC (CHINA) CO Ltd filed Critical POENIX MCROELECTRONIC (CHINA) CO Ltd
Priority to CN2008101033596A priority Critical patent/CN101551838B/en
Publication of CN101551838A publication Critical patent/CN101551838A/en
Application granted granted Critical
Publication of CN101551838B publication Critical patent/CN101551838B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to an identity authentication method and a system of a memory card. The system comprises an upper computer for invoking an application software of a file system API of an operating system and a customized memory card; and the method comprises the following steps: a special file on the memory card is read and written by invoking the file system API of the operating system so as to establish a data interaction channel between the application software of the upper computer and the memory card; and the identity authentication is finished by using the data interaction on the data interaction channel, the application software of the upper computer as well as the authorization processing at the end of the memory card. The method and the system further adopt the synchronous counting method and the synchronous comparison method at the both ends of the data interaction channel to shield the cache in the file system API, can be adapted for various operating systems, reduce the work load of development and greatly reduce the working difficulty of debugging of compatibility, thereby effectively reducing the time of development and later-period debugging and improving the efficiency.

Description

A kind of storage card identity identifying method and system thereof
Technical field
The present invention relates to storage card, be specifically related to a kind of storage card identity identifying method and system thereof.
Background technology
Storage card is widely used in the types of applications as the media of data storage, as navigation application, multimedia application, mobile communication application or the like.Storage card commonly used at present mainly contains compact flash card CF, multimedia storage card MMC, safe digital card SD or the like.These storage cards possess versatility widely, plug and play, but versatility also can be brought hidden danger to the data security on the storage card, and do not provide corresponding guarantee in these numerous storage card relevant criterion to the data security on the card.
In some application scenario, the application data of storing on the storage card is very important, need prevent that illegal upper computer software from carrying out read and write access to it, in order to avoid critical data is illegally stolen, therefore can adopt some security algorithm between application software and storage card, to set up ID authentication mechanism, after mutual authentication passed through, application software just had the authority that the data file of storing in the storage card is conducted interviews.At this moment the actual storage card that becomes customization of storage card, the customization storage card can only be visited by the upper computer software by authentication, thereby prevents illegal upper computer software stealing the related application critical data of customization storage card storage.Compare with existing storage card, customization storage card built-in special authentication file, a whole set of security algorithm and an encryption mechanism are used for the identity authentication function of storage card and host computer; And, prevent illegal upper computer software stealing to data on the storage card to the monitoring that conducts interviews of the critical data on the storage card.As long as relevant upper computer software possesses corresponding identity authentication function, the customization storage card equally also can be used in multiple occasions such as mobile phone, digital camera, global location navigational system GPS, PC, keeps the versatility of existing storage card simultaneously.
Set up ID authentication mechanism between application software and storage card, existing mode is to utilize the bottom Storage Card Drivers to set up the media card communication passage, and carries the relevant authentication agreement of expansion by the storage card passage.And types of applications software may operate on the several operation systems platform, there are a lot of differences in every kind of operating system to the processing of bottom Storage Card Drivers, even do not provide application programming interfaces api function to the bottom storing driver, cause application software to want to accomplish versatility, realize cross-platform authentication, can't directly carry out protocol extension and realize the authentication process by the media card communication passage.
Simultaneously, the common development interface that each operating system offers application software has file system api, and further, file system has cache memory cache usually, may cause the file read-write order can not convert bottom layer driving sector read write command immediately to.
Summary of the invention
The technical issues that need to address of the present invention provide a kind of storage card identity identifying method and system thereof, utilize file system api to realize the authentication of cross-platform operation system, further can shield cache in the file system api.
Above-mentioned first technical matters of the present invention solves like this, and a kind of storage card identity identifying method is provided, and it is characterized in that, may further comprise the steps:
1.1) set up data interaction passage between host computer application software and the storage card by the special file on the call operation system file system API reading and writing memory card;
1.2) utilize the data interaction on the described data interaction passage and the authentication process of host computer application software and storage card end to finish authentication.
According to authentication method provided by the invention, described special file is defined as the authentication file; Described file system is arranged in the operating system that application software is moved; Described storage card is the customization storage card.
According to authentication method provided by the invention, this authentication method comprises that also the restriction of described storage card is without authentication or authenticate file in unsanctioned host computer accessible with application software other all or part storage cards except that described special file; Described restriction includes but not limited to forbid; The situation of described part is to provide the interior a part of space of storage card as the communal space.
According to authentication method provided by the invention, the size of described special file should be greater than file system cache capacity.
According to authentication method provided by the invention, described data interaction is a transmitting-receiving authentication Extended Protocol message, and this message is the self-defined structure message of arranging mutually.
According to authentication method provided by the invention, described authentication Extended Protocol message adopts to be encrypted and verification, is used to guarantee the integrality of the security and the transmission of data interaction.
According to authentication method provided by the invention, described authentication Extended Protocol message comprises heading and message body; Wherein:
Described message body comprises instruction name and message content; Described message content is random number, identifying algorithm result of calculation or comparative result.
Described heading comprises uplink and downlink synchronometer digital section; Described data interaction comprises initial synchronisation setting and follow-up synchronous comparison, counts and put described synchronometer digital section synchronously, is used to guarantee the integrality of session, the influence of shielding file system cache; Corresponding specific implementation method can multiplely change, and wherein: relatively two ends all must be carried out synchronously, and counting can carry out simultaneously at storage card end, host computer application software end or two ends synchronously, is that example describes to count synchronously at the storage card end below:
(1) application software
When receiving described authentication Extended Protocol uplink message, whether the value of the down-going synchronous counter at first should more described authentication Extended Protocol uplink message is changed to invalid value, and whether the value of the uplink synchronous counter in the described authentication Extended Protocol uplink message is consistent with the local Counter Value of application software, when two conditions satisfy simultaneously, represent that a complete file write order, file read command process all are stored card and receive and handle; Otherwise or the file read command hit by file system cache, or file write commands hit by file system cache, or the two is all hit by file system cache;
When storage card sends described authentication Extended Protocol downlink message, need to upgrade earlier the value (generally being) of the local counter of application software, then the value of local counter is inserted the down-going synchronous counter and the uplink synchronous counter field of described authentication Extended Protocol downlink message from adding one;
(2) storage card
When receiving described authentication Extended Protocol downlink message, if the down-going synchronous counter in the described authentication Extended Protocol downlink message is effective value with the value of uplink synchronous counter and equates, and local Counter Value greater than storage card, with the local Counter Value of the replacement of the down-going synchronous Counter Value in described authentication Extended Protocol downlink message storage card, then described authentication Extended Protocol downlink message is done subsequent treatment; Otherwise, just abandon this downlink message;
When application software sends described authentication Extended Protocol uplink message, it is invalid the down-going synchronous counter of described authentication Extended Protocol uplink message should to be changed to, and the local Counter Value of storage card is inserted the uplink synchronous counter field of described authentication Extended Protocol uplink message;
(3) handle
When the read write command to described special file is hit by file system cache, can differentiate by described uplink synchronous counter and down-going synchronous counter, and retransmit, till file write commands, file read command to described special file are stored card and really receive and do respective protocol and handle.
Wherein:
Described authentication Extended Protocol downlink message is carried by file write commands by application software and is handed down to storage card; Described authentication Extended Protocol uplink message is carried by the file read command of responding application software by storage card and issues application software, and application software is read by file, obtains the message from storage card.
The invalid value of described uplink synchronous counter and down-going synchronous counter is 0xFFFFFFFF; The local Counter Value of described application software is the counter value when sending authentication Extended Protocol downlink message last time, and initial value is 0; The local Counter Value of described storage card is the thus up counter value when sending authentication Extended Protocol uplink message last time, and initial value is 0.
According to authentication method provided by the invention, described operating system includes, but are not limited to WINDOWS, UNIX, LINUX, WINCE or UC/OSII system.
Above-mentioned another technical matters of the present invention solves like this, and a kind of storage card identity authorization system is provided, and specifically comprises:
The host computer of operation application software, the built-in upper computer end authentication process of this application software device, call operation system file system API transmitting-receiving is also handled authentication Extended Protocol message, finishes the authentication process;
The storage card of customization, preset authentication file and card end authentication process device, handle described authentication Extended Protocol message, finish the authentication process, and before by authentication, restriction host computer application software is to the visit of other all or part file except described authentication file in the storage card; Described restriction includes but not limited to forbid; The situation of described part is to provide the interior a part of space of storage card as the communal space.
According to Verification System provided by the invention, described authentication file is a special file.
Storage card identity identifying method provided by the invention and system thereof, have following effect: 1. guarantee to have only the application software by authentication could the storage card of customization be conducted interviews, the related application critical data that prevents to customize in the storage card is stolen by illegal upper computer software; 2. only utilize file system api just can set up reliable data interaction passage, finish the authentication process with storage card.Need not to pay close attention to the difference of bottom Storage Card Drivers, need not to be concerned about the difference of different operating system platform, reduced development workload, also greatly degree has reduced the difficulty of compatible debugging work, thereby effectively shortens exploitation and later stage debug time, has improved efficient.
Description of drawings
Further the present invention is described in detail below in conjunction with the drawings and specific embodiments.
Fig. 1 is host computer application software of the present invention and storage card identity identifying method and system schematic thereof;
Fig. 2 is that upper computer end of the present invention flows mutual synoptic diagram with the card end data;
Fig. 3 is navigation application software of the present invention and the authentication process synoptic diagram that customizes the SD card.
Embodiment
At first, core concept of the present invention and points for attention are described:
(1) core concept
Usually, the common development interface that each operating system offers application software can only be file system layer API, and the expansion of agreement just can only consider that also framework is on the read-write operation to file;
(2) points for attention
But file system has cache usually, causes the file read-write order may not can to convert bottom layer driving sector read write command immediately to and is handed down to storage card.In this case, need a kind of effective method, the assurance application software is only utilized file system api, and the influence of shielding file system cache is set up reliable data interaction passage with storage card, finishes the authentication process.
In second step, the crucial concrete implementation step of the present invention is described:
(1) utilize file system api to set up the data channel of authentication Extended Protocol message
As shown in Figure 1, comprise host computer 1 and customization storage card 2, wherein:
For host computer 1: the bottom service comprises operating system, cache management, Storage Card Drivers, and this part is for upper layer application, and its specific implementation is that each is discrepant, also is sightless; Common interface comprises file system, and this part is the difference with the difference of bottom service not; Upper layer application can comprise types of applications software;
For customization storage card 2, the bottom service comprises Storage Card Drivers; Upper layer application comprises authentication software;
Utilize this common interface of file system like this, can shield the difference of bottom service, set up the data channel of the authentication Extended Protocol message of spanning operation system platform.
(2) data interaction
As shown in Figure 2, the master data exchange method is as follows:
1) application software is when carrying out write operation to special authentication file, need to upgrade earlier the local Counter Value (for example: add 1) of upper computer end, and make the local Counter Value of upper computer end after the down-going synchronous Counter Value of descending authentication Extended Protocol message and uplink synchronous Counter Value equal to upgrade, after assembling descending authentication Extended Protocol message, the input parameter that descending authentication Extended Protocol message is operated as " writing " is handed down to the customization storage card;
2) the customization storage card is when receiving " writing " operation (being converted into the sector by the operating system bottom layer driving writes), the local counter that needs to customize storage card is earlier compared with down-going synchronous counter and uplink synchronous counter in the descending authentication Extended Protocol message, have only down-going synchronous Counter Value and uplink synchronous Counter Value in the descending authentication Extended Protocol message to be effective value and to equate, and all greater than the local Counter Value that customizes storage card, just then handle descending authentication Extended Protocol message, and replace the local counter of customization storage card with the down-going synchronous Counter Value in the descending authentication Extended Protocol message; Otherwise think that this descending authentication Extended Protocol message was once hit by the cache of file system, abandoned this descending authentication Extended Protocol message.
3) application software is carried out the authentication internal logic and is handled, and calls file system api to the read operation of issuing the documents of customization storage card.
4) the customization storage card is when responding " reading " operation (being converted into the sector by the operating system bottom layer driving reads), it is invalid to need earlier the down-going synchronous counter in the up authentication Extended Protocol message to be changed to, and make uplink synchronous Counter Value in the up authentication Extended Protocol message equal to customize the local Counter Value of storage card, after assembling up authentication Extended Protocol message, up authentication Extended Protocol message is passed to application software as " reading " operation return data;
5) application software is when the special authentication file read operation of acquisition is responded, whether the value of the down-going synchronous counter at first should more up authentication Extended Protocol message is invalid, and whether the value of uplink synchronous counter is consistent with the local counter of upper computer end, represents when two conditions satisfy simultaneously that a complete read-write process all is customized storage card and receives and handle; Otherwise or read operation hit by file system Cache, or write operation hit by file system Cache, or the two is all hit by file system Cache, needs this moment to adopt certain retransmission policy to retransmit.
6) when application software has arrived end of file to the read-write of special authentication file, will restart read-write from the section start of this special authentication file.
7) for reducing the probability that the file write operation is hit by file system Cache, special authentication file is carried out the size of write operation should be greater than 2K or 4K at every turn.
8) repeating step 1 repeatedly)-5), can utilize file system api, the influence of shielding file system cache is set up reliable data interaction passage at application software and customization storage card, finishes the authentication process.
At last, describe the present invention in detail with concrete an application " verification process of navigation application software and customization SD card ":
(1) Ding Zhi SD card need be pre-created special authentication file, and this document size should be greater than the Cache size of file system, such as desirable 256K.Because being customization SD card, creates in advance by special authentication file, card end itself is the Sector Range that can know this document place, thereby can effectively control the visit of upper computer end to the card end, except the sector in the limited range, its sector of customization SD khaki all can not be accessed not by authentication the time.Thereby can realize: special authentication file can not be deleted, can not be formatted, can not arbitrarily be rewritten, and only be used for navigation application software and the authentication that customizes the SD card; By the authentication before, this special authentication file be unique can be by the file of upper computer end file system access, other file can not be accessed.
(2) form of up-downgoing authentication Extended Protocol message comprises heading, data volume and proof test value.Wherein heading comprises down-going synchronous counter, uplink synchronous counter or the like.Data volume can comprise instruction name, customization SD card sequence number, computational data and result or the like, for data security, preferably adopts cryptographic algorithm to encrypt.Proof test value is the proof test value to data volume, to guarantee the correctness of data transmission.
Convenient for following description, the instruction name is done following simple agreement:
1) instruction name: 0x30, presentation directives is called " generation random number ";
2) instruction name: 0x50, presentation directives is called " execution identifying algorithm ";
3) instruction name: 0x70, presentation directives is called " loopback comparative result ";
(3) ideally, customization SD card as shown in Figure 3, specifically comprises the identification step of navigation application software:
1) upper computer end is at first initiated, and the local Counter Value of navigation application software is initially set to 0x00000000, to the read operation of issuing the documents of customization SD card.
2) when init state, the local Counter Value of customization SD card is 0x00000000, when receiving the file read operation, then transfers " producing the random number state " to from " init state ", produces a random number; It is invalid making the down-going synchronous Counter Value in the up authentication Extended Protocol message, it is 0xFFFFFFFF that the down-going synchronous Counter Value promptly is set, simultaneously, make the uplink synchronous Counter Value equal to customize the local Counter Value of SD card, the instruction in the up authentication Extended Protocol message is called 0x30; With down-going synchronous Counter Value, uplink synchronous Counter Value, instruction name, card sequence number, random number etc. are inserted respective field, and data volume encrypted, produces form up authentication Extended Protocol message behind the proof test value, as the response of file read operation.
3) navigation application software is received the response of file read operation, whether the uplink synchronous Counter Value whether the down-going synchronous Counter Value in the at first more up authentication Extended Protocol message is changed in invalid (0xFFFFFFFF) and the up authentication Extended Protocol message equals the local Counter Value of navigation application software, does not satisfy condition and then abandons this message; Satisfied then carry out subsequent treatment: the local Counter Value of navigation application software adds 1, then up authentication Extended Protocol message data body is carried out verification and deciphering after, carry out identifying algorithm with the random number of receiving; Then make the value of down-going synchronous counter in the descending authentication Extended Protocol message and uplink synchronous counter be equal to the local Counter Value of navigation application software, make the instruction 0x50 by name in the descending authentication Extended Protocol message, with down-going synchronous Counter Value, uplink synchronous Counter Value, instruction name, carry out the authentication calculations value that obtains behind the identifying algorithm etc. and insert respective field, and data volume encrypted, produces form descending authentication Extended Protocol message behind the proof test value, send the file write operation to customization SD card.
When 4) customization SD card is received the file write operation, whether the down-going synchronous Counter Value in the at first more descending authentication Extended Protocol message equals the uplink synchronous Counter Value, and whether it all is effective value (promptly being not equal to 0xFFFFFFFF), and greater than the local Counter Value of customization SD card, then do not abandon this message if do not satisfy condition, customization SD card state, local counter do not change; Then carry out subsequent treatment if satisfy condition: the local Counter Value that upgrades customization SD card with the down-going synchronous Counter Value in the descending authentication Extended Protocol message of receiving, it is the local Counter Value of SD card=down-going synchronous Counter Value, then descending authentication Extended Protocol message data body is carried out verification, after the deciphering, compare with authentication calculations value of receiving and the local calculated value of customization SD card, customization SD card is transferred to " relatively execution algorithm result phase " by " producing the random number state ", authenticate if comparative result is identical and to pass through, the corresponding zone bit of set, comparative result then authentification failure inequality, corresponding zone bit is constant.
5) navigation application software is after distributing the descending authentication Extended Protocol message that comprises " execution identifying algorithm " instruction name, to the read operation of issuing the documents of customization SD card.
When 6) customization SD is stuck in " relatively execution algorithm result phase ", receive the file read operation, then transfer " loopback comparative result state " to from " relatively execution algorithm result phase ", it is invalid making the down-going synchronous Counter Value in the up authentication Extended Protocol message, even the down-going synchronous Counter Value is 0xFFFFFFFF, make the uplink synchronous Counter Value equal to customize the local Counter Value of SD card, make the instruction 0x70 by name in the up authentication Extended Protocol message; Whether pass through from the corresponding marker bit authentication query, fill in comparative result; With down-going synchronous Counter Value, uplink synchronous Counter Value, instruction name, comparative result etc. are inserted the respective field of up authentication Extended Protocol message, and data volume encrypted, produces form up authentication Extended Protocol message behind the proof test value, as the response of file read operation.
7) navigation application software is received the response of file read operation, whether the down-going synchronous Counter Value in the at first more up authentication Extended Protocol message is changed to invalid (0xFFFFFFFF), and whether the uplink synchronous Counter Value equals local Counter Value, if not then abandon this message or retransmit; If then carry out subsequent treatment: local Counter Value adds 1, after then up authentication Extended Protocol message data body being carried out verification and deciphering, checking whether the instruction name in the up authentication Extended Protocol message is 0x70, is then whether to transfer " state is passed through in authentication " to the comparative result decision host computer of receiving; Otherwise abandon this message.
Under the non-ideality, then need to utilize uplink synchronous Counter Value and down-going synchronous Counter Value in the up-downgoing authentication Extended Protocol message, and the logical relation of each instruction name shields the influence of upper computer end file system Cache in the verification process, and is specific as follows:
Navigation application software:
For step 3, if the down-going synchronous Counter Value in the up authentication Extended Protocol message is changed to invalid (0xFFFFFFFF), and the uplink synchronous Counter Value equals the local Counter Value of navigation application software, two conditions satisfy simultaneously represents that then the file read operation is customized the SD card and receives and handle, otherwise abandon this up authentication Extended Protocol message, repeating step 1 is retransmitted.
For step 7, if the down-going synchronous Counter Value in the up authentication Extended Protocol message is changed to invalid (0xFFFFFFFF), and the uplink synchronous Counter Value equals the local Counter Value of navigation application software, two conditions satisfy simultaneously represent then that a complete file is write, the file read procedure all is customized the SD card and receives and handle; Otherwise or read operation is hit by file system Cache, or write operation is hit by file system Cache, or the two is all hit by file system Cache: if a) the down-going synchronous Counter Value is changed to invalid (0xFFFFFFFF), but the uplink synchronous Counter Value is less than the local Counter Value of navigation application software, represent that then the file write operation that sends in the step 3 is hit by the Cache of file system, the file read operation of step 5 is customized the SD card and receives and handle, after then using the random number of carrying in the up authentication Extended Protocol message and re-executing identifying algorithm, the file write operation in the retransmission steps 3; In order to reduce the probability that the file write operation is hit by Cache, need to adjust and write the length of content, as be adjusted to 2K, 4K size.B) if the down-going synchronous Counter Value is not equal to invalid value (0xFFFFFFFF), the read operation of expression file is hit by Cache.Need this moment to adopt retransmission policy to retransmit.
Customization SD card:
For step 4, if the down-going synchronous Counter Value in the descending authentication Extended Protocol message is smaller or equal to the local Counter Value of customization SD card, expression was once hit by the Cache of file system by the file write operation that navigation application software sends, retransmit the new file write operation in back and be customized the SD card and receive and handled, then directly abandon this message;
For step 6, if being in " producing the random number state ", customization SD card receives the file read operation, represent that then the file write operation that step 3 sends has been hit by the Cache of file system, the Cache that file system is then walked around in the file read operation that step 5 sent has sent to customization SD card earlier, customization SD card then produces random number, the response of the file read operation in the retransmission steps 2 again.
By such processing, navigation application software only utilizes file system api just can set up reliable data interaction passage with customization SD card, finish the authentication process, thereby guaranteed only to have those application software could the geography information in the customization SD card be conducted interviews, effectively prevented illegal software stealing geographic information data in the customization SD card by authentication.

Claims (10)

1, a kind of storage card identity identifying method is characterized in that, may further comprise the steps:
1.1) set up data interaction passage between host computer application software and the storage card by the special file on the call operation system file system API reading and writing memory card;
1.2) utilize the data interaction on the described data interaction passage and the authentication process of host computer application software and storage card end to finish authentication.
2, according to the described authentication method of claim 1, it is characterized in that this authentication method comprises that also the restriction of described storage card is without authentication or authenticate file in unsanctioned host computer accessible with application software other all or part storage cards except that described special file.
According to the described authentication method of claim 1, it is characterized in that 3, the size of described special file is greater than file system cache capacity.
According to the described authentication method of claim 1, it is characterized in that 4, described data interaction is a transmitting-receiving authentication Extended Protocol message.
According to the described authentication method of claim 4, it is characterized in that 5, described authentication Extended Protocol message adopts to be encrypted and verification.
According to the described authentication method of claim 4, it is characterized in that 6, described authentication Extended Protocol message comprises instruction name and message content; Described message content is random number, identifying algorithm result of calculation or comparative result.
According to the described authentication method of claim 6, it is characterized in that 7, described authentication Extended Protocol message also comprises uplink and downlink synchronometer digital section; Described data interaction comprises initial synchronisation setting and follow-up synchronous comparison, counts and put described synchronometer digital section synchronously.
According to the described authentication method of claim 7, it is characterized in that 8, described synchronous counting carries out simultaneously at storage card end, host computer application software end or two ends.
According to the described authentication method of claim 1, it is characterized in that 9, described operating system is WINDOWS, UNIX, LINUX, WINCE or UC/OSII system.
10, a kind of storage card identity authorization system is characterized in that, comprising:
The host computer of operation application software, the built-in upper computer end authentication process of this application software device, call operation system file system API transmitting-receiving is also handled authentication Extended Protocol message, finishes the authentication process;
The storage card of customization, preset authentication file and card end authentication process device, handle described authentication Extended Protocol message, finish the authentication process, and before passing through by authentication, restriction host computer application software is to the visit of other all or part file except described authentication file in the storage card.
CN2008101033596A 2008-04-03 2008-04-03 Identity authentication method and system of memory card Active CN101551838B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101033596A CN101551838B (en) 2008-04-03 2008-04-03 Identity authentication method and system of memory card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101033596A CN101551838B (en) 2008-04-03 2008-04-03 Identity authentication method and system of memory card

Publications (2)

Publication Number Publication Date
CN101551838A true CN101551838A (en) 2009-10-07
CN101551838B CN101551838B (en) 2013-01-16

Family

ID=41156083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101033596A Active CN101551838B (en) 2008-04-03 2008-04-03 Identity authentication method and system of memory card

Country Status (1)

Country Link
CN (1) CN101551838B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001956A (en) * 2012-11-23 2013-03-27 杭州也要买电子商务有限公司 Method for performing permission validation to system read operation request
CN104462602A (en) * 2014-12-30 2015-03-25 中国科学院上海微系统与信息技术研究所 File system with data processing function and use method thereof
CN105320578A (en) * 2015-11-09 2016-02-10 青岛海信移动通信技术股份有限公司 Method and apparatus for backing up and recovering APP
CN106302354A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of identity identifying method and device
CN107967158A (en) * 2016-10-14 2018-04-27 希捷科技有限公司 Active drive api
CN109858276A (en) * 2018-12-28 2019-06-07 航天信息股份有限公司 A kind of method and system for the multistage locking of embedded device progress

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1667046A1 (en) * 2003-10-22 2006-06-07 Samsung Electronics Co., Ltd. Method for managing digital rights using portable storage device
KR100736091B1 (en) * 2005-12-09 2007-07-06 삼성전자주식회사 Apparatus and method for managing a plurality of certificates
CN100464315C (en) * 2006-05-22 2009-02-25 中国软件与技术服务股份有限公司 Mobile memory divulgence protection method and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001956A (en) * 2012-11-23 2013-03-27 杭州也要买电子商务有限公司 Method for performing permission validation to system read operation request
CN104462602A (en) * 2014-12-30 2015-03-25 中国科学院上海微系统与信息技术研究所 File system with data processing function and use method thereof
CN104462602B (en) * 2014-12-30 2018-03-02 中国科学院上海微系统与信息技术研究所 File system and its application method with data processing function
CN106302354A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of identity identifying method and device
CN105320578A (en) * 2015-11-09 2016-02-10 青岛海信移动通信技术股份有限公司 Method and apparatus for backing up and recovering APP
CN107967158A (en) * 2016-10-14 2018-04-27 希捷科技有限公司 Active drive api
CN107967158B (en) * 2016-10-14 2020-12-25 希捷科技有限公司 Active drive API
US10936350B2 (en) 2016-10-14 2021-03-02 Seagate Technology Llc Active drive API
US11119797B2 (en) 2016-10-14 2021-09-14 Seagate Technology Llc Active drive API
CN109858276A (en) * 2018-12-28 2019-06-07 航天信息股份有限公司 A kind of method and system for the multistage locking of embedded device progress
CN109858276B (en) * 2018-12-28 2022-03-04 航天信息股份有限公司 Method and system for performing multistage locking on embedded equipment

Also Published As

Publication number Publication date
CN101551838B (en) 2013-01-16

Similar Documents

Publication Publication Date Title
CN100576173C (en) Reduce storage demand and the system and method for firmware security update and memory block is provided
US8402269B2 (en) System and method for controlling exit of saved data from security zone
US6296191B1 (en) Storing data objects in a smart card memory
US8370645B2 (en) Protection of security parameters in storage devices
CN101551838B (en) Identity authentication method and system of memory card
US20070136606A1 (en) Storage system with built-in encryption function
US20070266440A1 (en) Method and apparatus for searching rights object and mapping method and mapping apparatus for the same
US20140115292A1 (en) Dynamic obfuscation of heap memory allocations
CN103617404A (en) Storing device of safety partitions
CN102782732A (en) Protected mode for global platform compliant smart cards
CN100419620C (en) Method for command interaction and two-way data transmission on USB mass storage equipment by program and USB mass storage equipment
CN101964068A (en) SD card and method for controlling data access thereof
CN111201553B (en) Safety element and related equipment
CN103136124B (en) A kind of intelligent card hardware firewall system and its implementation
US20170124339A1 (en) Implementing method for javacard application function expansion
CN106130730A (en) The data sharing method of a kind of smart card and smart card
KR20040105794A (en) Memory managing unit, code verifying device, and code decoder
CN107832589A (en) Software copyright protecting method and its system
CN108229190B (en) Transparent encryption and decryption control method, device, program, storage medium and electronic equipment
CN110826099A (en) Safe storage method and system suitable for embedded real-time operating system
CN104462893A (en) Method and device for managing multiple SE modules
CN101149708A (en) Mobile memory encryption method and method for automatically operating encrypted mobile memory
CN101238492A (en) ITSO FVC2 application monitor
US20220245253A1 (en) Secure element and method for starting an application
CN111142902B (en) Method and device for protecting upgrading firmware of processor and vehicle

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Owner name: RDA MICROELECTRONICS (SHANGHAI) CO., LTD.

Free format text: FORMER OWNER: PHOENIX MICROELECTRONICS (CHINA) CO., LTD.

Effective date: 20100423

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100084 18/F, TOWER A, SCIENCE BUILDING, QINGHUA SCIENCE PARK, ZHONGGUANCUN EAST ROAD, HAIDIAN DISTRICT, BEIJING CITY TO: 201203 ROOM 302, BUILDING 2, NO.690, BIBO ROAD, ZHANGJIANG HIGH-TECH PARK, SHANGHAI CITY

TA01 Transfer of patent application right

Effective date of registration: 20100423

Address after: 201203, room 2, building 690, No. 302 blue wave road, Zhangjiang hi tech park, Shanghai

Applicant after: RDA Microelectronics (Shanghai) Corp. Ltd.

Address before: 100084, Beijing Road, Zhongguancun, Haidian District science and Technology Park, Tsinghua Science and technology building, block A, 18

Applicant before: Poenix Mcroelectronic (China) Co., Ltd.

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20181101

Address after: 201203 Building 1, exhibition hall, 2288 lane, 2288 Chong, road, Zhangjiang hi tech park, Shanghai

Patentee after: Zhanxun Communication (Shanghai) Co., Ltd.

Address before: 201203 Shanghai Zhangjiang hi tech Park 302, room 2, building 690, Bi Po Road.

Patentee before: RDA Microelectronics (Shanghai) Corp. Ltd.

TR01 Transfer of patent right