Background
An IC card, also called intelligent card, smart card, microcircuit card or microchip card, it embeds a microelectronic chip into the card base which accords with ISO 7816 standard, makes card form, the communication mode between IC card and reader can be contact type, also can be non-contact type, the volume is small and light, very easy to carry; the storage capacity is large, the CPU card contains a microprocessor, and the memory can be divided into a plurality of application areas, so that the card has multiple purposes and is convenient to store; the reliability is high, and the IC card has strong antimagnetic, antistatic and anti-interference capabilities and higher reliability than a magnetic card; the service life is long, and the information can be read and written ten thousand times and is long; the security is strong, the security is high, the IC card has the hardware security setting, can control the read-write characteristic of some districts in the IC card, if try to decipher, these districts are self-locked, namely can't carry on the read-write operation, the information in the IC card can't be duplicated after encrypting, the password checks the mistake, the card has the self-destruction function, so the data in the IC card is safe and reliable; the IC card has low requirement on the real-time performance and sensitivity of a computer network in application, can be applied in an environment with low network quality or under the condition of no connection, can be divided into a memory card, a non-contact IC card, an optical card, a non-contact intelligent IC card and an intelligent card, the application process of the IC card mainly comprises four stages of manufacturing, issuing, using and recovering, the IC card stores the basic information, balance, necessary conditions of transaction and the history details of recent transaction of a user, and also stores various data reading and writing authorities and authentication passwords. All the operations for exchanging data with the card must pass through the CPU in the card; data for all operations is encrypted; the operation of encryption is performed by a security module within the card terminal. The wrong operation times are recorded by the IC card, and when the operation times are larger than the specified numerical value, the IC card can self-lock and even destroy the data of the IC card so as to ensure the global safety.
The IC card needs to install programs through a special platform in the using process, but when the application programs are installed and used with the IC, the IC card is easy to be invaded by trojans, and when the IC card is used for a long time, the programs in the IC card are not easy to clean.
Disclosure of Invention
The present invention provides a method of controlling the running of an applet for an IC card that can solve the problems in the background art described above.
In order to achieve the purpose, the invention provides the following technical scheme: the method for controlling the running of the small application program for the IC card comprises program downloading, program installation, program registration, program login, safety detection and program operation, wherein the program downloading comprises an application program and a virus killing program, the application program and the virus killing program download a legal version program through a normal platform, the application program is the small application program of the IC card, and the virus killing program is a virus killing program special for a chip.
Preferably, the program installation is to install the downloaded application program and the antivirus program in the IC card respectively, create a new folder corresponding to the program name in the IC card before installation, and install the program in the file correspondingly.
Preferably, the program registration is to create an independent account and password in the application program, associate the information of the IC card with the created account, and create the independent account and password in the antivirus program.
Preferably, the program login is to create an independent account and a password in the application program, input the account and the password in an input box, log in the application program, create an independent account and a password in the antivirus program, input the account and the password in the input box, and create the login in the antivirus program.
Preferably, the security detection includes Trojan horse checking and killing and program cleaning, and after the application program logs in, Trojan horse checking and killing and program cleaning are performed on the application program and the IC card through an antivirus program.
Preferably, the method of controlling the running of the applet for the IC card comprises the steps of:
downloading a genuine application program and a antivirus program on a formal platform through equipment, wherein the application program is an IC card applet, the antivirus program is a chip-specific antivirus program, and the antivirus program can be automatically read when the IC card is used and can protect the IC card;
step two, a folder is newly built in the IC card, the downloaded application program and the antivirus program are installed in the corresponding folder, the name of the folder corresponds to the installed program, the installed application program and the antivirus program can be started and used after the installation, and whether the program can normally operate or not is detected;
step three, the installed application program and the antivirus program can be started, after the start, application registration of an independent account and a password is respectively carried out in the installed application program and the antivirus program, and information of the IC card and the application program are set in an associated manner;
step four, the account and the password which are applied for creation are respectively input into an input box on the login interfaces of the application program and the antivirus program, the application program and the antivirus program are logged in, and the application program and the antivirus program can be operated and used after logging in;
and fifthly, after the application program and the antivirus program finish logging in, safety detection can be carried out through the antivirus program, Trojan horse checking and killing can be carried out on the application program and the IC card through the safety detection, the IC can be prevented from being implanted with Trojan horse viruses, redundant running programs are cleaned and closed, program running can be carried out through the safety detection, and the IC card is controlled and used through the application program.
Compared with the prior art, the invention has the beneficial effects that: the invention carries out programmed processing on the whole process of the operation of the application program through program downloading, program installation, program registration, program login, safety detection and program operation, wherein the program downloading comprises the application program and a virus killing program, the application program and the virus killing program are downloaded into a legal version program through a normal platform, the application program is an IC card small application program, and the virus killing program is a chip-specific virus killing program, wherein the safety detection is realized, the virus killing program downloaded and installed can carry out Trojan horse checking and killing on the application program and the IC card, the poisoning condition of the IC card during use is avoided, the data loss can be avoided, the safety of the IC card during use can be increased, the virus killing program can be automatically read during the use of the IC card, the IC card can be protected, the program is cleaned, the redundant programs can be prevented from occupying the operation space of the IC card, and the normal use requirement of the IC card can be ensured during use, when registering, can carry out relevant setting with the information and the application of IC-card, conveniently use, it is comparatively convenient when using, be of value to people and use, possess certain use prospect.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further described with the specific embodiments.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1-2, the present invention provides a technical solution: the method for controlling the running of the small application program for the IC card comprises program downloading, program installation, program registration, program login, safety detection and program running, wherein the program downloading comprises an application program and a virus killing program, and the application program and the virus killing program download a legal version program through a normal platform.
The program installation comprises the steps of respectively installing the downloaded application program and the virus killing program in an IC card, newly building a folder corresponding to the program name in the IC card before installation, and correspondingly installing the program in a file.
The program registration includes creating an independent account and password in the application program, associating the information of the IC card with the created account, and creating the independent account and password in the antivirus program.
The program login comprises the steps of inputting an independent account and a password which are created in the application program into an input box, logging in the application program, and inputting an independent account and a password which are created by the antivirus program into the input box, and logging in the antivirus program.
The safety detection comprises Trojan horse checking and killing and program cleaning, and after the application program logs in, Trojan horse checking and killing and program cleaning are carried out on the application program and the IC card through the antivirus program.
The method for controlling the running of the small application program for the IC card comprises the following steps:
downloading a genuine application program and a antivirus program on a formal platform through equipment, wherein the application program is an IC card applet, the antivirus program is a chip-specific antivirus program, and the antivirus program can be automatically read when the IC card is used and can protect the IC card;
step two, a folder is newly built in the IC card, the downloaded application program and the antivirus program are installed in the corresponding folder, the name of the folder corresponds to the installed program, the installed application program and the antivirus program can be started and used after the installation, and whether the program can normally operate or not is detected;
step three, the installed application program and the antivirus program can be started, after the start, application registration of an independent account and a password is respectively carried out in the installed application program and the antivirus program, and information of the IC card and the application program are set in an associated manner;
step four, the account and the password which are applied for creation are respectively input into an input box on the login interfaces of the application program and the antivirus program, the application program and the antivirus program are logged in, and the application program and the antivirus program can be operated and used after logging in;
and fifthly, after the application program and the antivirus program finish logging in, safety detection can be carried out through the antivirus program, Trojan horse checking and killing can be carried out on the application program and the IC card through the safety detection, the IC can be prevented from being implanted with Trojan horse viruses, redundant running programs are cleaned and closed, program running can be carried out through the safety detection, and the IC card is controlled and used through the application program.
The invention carries out programmed processing on the whole process of the operation of the application program through program downloading, program installation, program registration, program login, safety detection and program operation, wherein the program downloading comprises the application program and a virus killing program, the application program and the virus killing program are downloaded into a legal version program through a normal platform, the application program is an IC card small application program, and the virus killing program is a chip-specific virus killing program, wherein the safety detection is realized, the virus killing program downloaded and installed can carry out Trojan horse checking and killing on the application program and the IC card, the poisoning condition of the IC card during use is avoided, the data loss can be avoided, the safety of the IC card during use can be increased, the virus killing program can be automatically read during the use of the IC card, the IC card can be protected, the program is cleaned, the redundant programs can be prevented from occupying the operation space of the IC card, and the normal use requirement of the IC card can be ensured during use, when registering, can carry out relevant setting with the information and the application of IC-card, conveniently use, it is comparatively convenient when using, be of value to people and use, possess certain use prospect.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.