06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

C.7 Application Binding Protocol - Local<br />

227 while ( c h i l d s > 0) {<br />

228 switch (inCTLV . nextType ( ) ) {<br />

229 case 1 :<br />

230 pTemp = ( PrimitiveTLV )inCTLV . getNext ( ) ;<br />

231 i f ( Arrays . e q u a l s (pTemp . getTagName ( ) ,<br />

232 this . CardID . getTagName ( ) ) ) {<br />

233 this . CardID = pTemp ;<br />

234 }<br />

235 else i f ( Arrays . e q u a l s (pTemp . getTagName ( ) ,<br />

236 this . SCIdentity . getTagName ( ) ) ) {<br />

237 this . SCIdentity = pTemp ;<br />

238 }<br />

239 else i f ( Arrays . e q u a l s (pTemp . getTagName ( ) ,<br />

240 this . SCRandomNumber . getTagName ( ) ) ) {<br />

241 this . SCRandomNumber = pTemp ;<br />

242 }<br />

243 else i f ( Arrays . e q u a l s (pTemp . getTagName ( ) ,<br />

244 this . MACedData . getTagName ( ) ) ) {<br />

245 this . MACedData = pTemp ;<br />

246 }<br />

247 i f ( Arrays . e q u a l s (pTemp . getTagName ( ) ,<br />

248 this . U s e r I d e n t i t y . getTagName ( ) ) ) {<br />

249 this . U s e r I d e n t i t y = pTemp ;<br />

250 }<br />

251 break ;<br />

252 case 0 : cTemp = ( ConstructedTLV )inCTLV . getNext ( ) ;<br />

253 i f ( Arrays . e q u a l s (cTemp . getTagName ( ) ,<br />

254 this . EncryptedData . getTagName ( ) ) ) {<br />

255 this . EncryptedData = cTemp ;<br />

256 }<br />

257 break ;<br />

258 default :<br />

259 System . out . p r i n t l n ( " Error In Parsing Input Message " ) ;<br />

260 }<br />

261 c h i l d s −−;<br />

262 }<br />

263 } catch ( Exception e ) {<br />

264 System . out . p r i n t l n (<br />

265 " Error i n ProtocolHanlder . ChildExtractionMethod<br />

: " + e . g e t C l a s s ( ) . getName ( ) ) ;<br />

266 }<br />

267 }<br />

268 }<br />

C.7 Application Binding Protocol - Local<br />

The Java Card implementation of the ABP L discussed in section 7.4 is listed in subsequent<br />

sections.<br />

364

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!