CN107977565A - USBKEY interface systems and the method being connected with USBKEY - Google Patents
USBKEY interface systems and the method being connected with USBKEY Download PDFInfo
- Publication number
- CN107977565A CN107977565A CN201610940480.9A CN201610940480A CN107977565A CN 107977565 A CN107977565 A CN 107977565A CN 201610940480 A CN201610940480 A CN 201610940480A CN 107977565 A CN107977565 A CN 107977565A
- Authority
- CN
- China
- Prior art keywords
- usbkey
- interface
- standard
- interface module
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/40—Bus structure
- G06F13/4063—Device-to-bus coupling
- G06F13/4068—Electrical coupling
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to data safe processing technical field, and disclosing a kind of USBKEY interface systems and the method being connected with USBKEY, the system includes:Including:Interface module, the different interface standards of the USBKEY are converted to unified interface standard, by the interface module by the USBKEY access user terminals of distinct interface standard;Communication component, to realize the communication between the interface module and the USBKEY;Various criterion interface module is packaged into a unified interface module, a set of unified interface module is provided for upper layer application, so as to reduce the extra development amount brought because interface standard and USBKEY equipment are different, the compatibility of equipment and system is improved, saves hardware and program resource.
Description
Technical field
The present invention relates to data safe processing technical field, and in particular, to a kind of USBKEY interface systems and with
The method of USBKEY connections.
Background technology
Continuous development and maturation with digital technology and network technology, information security become it is of concern it is heavy in it
Weight.Since USBKEY emerges, extreme enrichment and the security solution for improving all kinds of electronic applications, USBKEY is a kind of USB
The hardware device of interface.Its built-in security chip, there is certain memory space, can store private key for user and digital certificate,
The certification to user identity is realized using the public key algorithm built in USBKEY.Since private key for user is stored in safety chip, reason
By above making all read in any way, therefore it ensure that the security of user authentication.
PKI (Public Key Infrastructure, i.e. Public Key Infrastructure) can be that all-network pellucidly provides
Key and certificate management functions needed for the cryptographic services such as encrypted and digitally signed, using the teaching of the invention it is possible to provide certification, access control, data are complete
The core security services such as whole property, confidentiality and non-repudiation.Since PKI provides good security platform, the whole world is many single
Position all develops various PKI software and hardwares encryption devices.It is User Exploitation and equipment but the encryption interface of commensurate is not quite similar
Unrelated encryption application is made troubles.In order to solve encryption interface problem, a variety of API international standards have been formd at present, its
The API standard that middle PKI is recommended has PKCS#11 and Microsoft CryptoAPI (CSP) etc..
USBKEY is combined by USBKEY producers with PKI technologies, have developed the security middleware for meeting PKI standards, profit
Digital certificate and private key for user are preserved with USBKEY, and to application developers (as opened for bank's exploitation bank system of web
Hair business) programming interface for meeting PKI standards is provided, in order to develop the application program based on PKI.
Since the hardware configuration of USBKEY itself determines that user can only access data by manufacturer's programming interface, this is just protected
Having demonstrate,proved the private key for user being stored in USBKEY can not be replicated, and each USBKEY carries cryptoguard, so
The hardware and password of USBKEY constitutes the two necessary factors that can use certificate.Since USBKEY is in terms of certificate storage
Superiority, more and more CA, bank and user have selected USBKEY as certificate storage medium.
Current most commonly used PKI standards mainly have PKCS#11, CSP standard, and national Password Management office was in 2011
The close interface standard of relevant state (hereinafter referred to as " mouth is touched in state ") is formulated, because different manufacturers may use three of the above different
Standard provides each independent middleware interface storehouse so that application developers often select a kind of USBKEY, are intended to by its offer
Independent upper layer application is developed in PKI standard interfaces storehouse.And application developers are using different USBKEY equipment and different marks
During quasi- interface library, very big test is proposed to the compatibility of upper layer application, and program redundancy increases, complexity is high, exists
The possibility of defect is larger.
The content of the invention
The object of the present invention is to provide a kind of USBKEY interface systems and the method being connected with USBKEY, the system and method
Various criterion interface module is packaged into a unified interface module, a set of unified interface module is provided for upper layer application,
So as to reduce the extra development amount brought because interface standard and USBKEY equipment are different, the compatibility of equipment and system is improved
Property, save hardware and program resource.
To achieve these goals, the present invention provides a kind of USBKEY interface systems, including:Interface module, to by institute
The different interface standards for stating USBKEY are converted to unified interface standard, by the interface module by distinct interface standard
USBKEY access user terminals;Communication component, to realize the communication between the interface module and the USBKEY.
Preferably, the interface module includes:Public keys standard PKCS#11 interface modules, Cryptographic Service Provider CSP
Standard interface module and state's Data Encryption Standard interface module, wherein, public keys standard PKCS#11 interface modules, cryptographic services provide
One end of any one of person CSP standard interface modules and state's Data Encryption Standard interface module is connected with communication component;And unified interface
Module, its one end connect the other end of any one of above-mentioned three kinds of interface modules, its other end connection user terminal.
Preferably, the communication component includes:Device enumeration module, is connected to described in several of the system to obtain
The facility information of USBKEY;Equipment opens module, to open the USBKEY specified according to user instruction;Mould is performed with order
Block, to:The instruction that user sends via the interface module is received, which is converted to the form of the USBKEY receptions
And it is transmitted to the USBKEY;The response message after described instruction is operated is directed to the USBKEY is received, and this is rung
Message is answered to return to the interface module.
Preferably, the unified interface module includes:Function sub-modules, to perform corresponding behaviour according to the instruction of user
Make;With attribute submodule, to obtain the facility information of the USBKEY of the device enumeration module.
Preferably, the operation that the function sub-modules perform includes:Signature, signature verification, encryption, decryption, certification authentication,
File operation or generation symmetric key;The facility information of the attribute submodule record includes:Certificate information, certificate information solution
Analysis, facility information parsing and PIN information.
The present invention also provides a kind of method being connected using above-mentioned USBKEY interface systems with USBKEY, including:According to
The USBKEY of family selection gates corresponding standard interface module, is established by the standard interface module with selected USBKEY's
Connection.
Preferably, before user selects USBKEY, the facility information of the USBKEY is obtained, which at least wraps
Include:Device name and interface standard.
Preferably, this method further includes:Before user selects USBKEY, the certificate of the USBKEY is updated.
Preferably, this method further includes:Judge whether user logs in, if user is not logged on, carry out personal identification number
PIN Authority Verifications;If user has logged on, corresponding operating is sent to selected USBKEY;Wherein, the operation bag
Include any of signature, signature verification, encryption, decryption, certification authentication, file operation or generation symmetric key or several.
Preferably, this method further includes:Allocation list is set, to record the standard information of the USBKEY of the acquisition.
Through the above technical solutions, common PKCS#11 interface modules, CSP standard interface modules and state's Data Encryption Standard are connect
Mouth mold block is encapsulated in the USBKEY, is connected by unified interface module with upper layer application, and communication component connects the core of USBKEY
Piece operates COS systems and is packaged with the interface module of above three module.When user is inserted into one by the USBKEY interface systems
During a or several USBKEY equipment, interface module updates functions of the equipments function (update dev ()) first, communication component
Device enumeration module enumerates the facility information for one or several USBKEY for being connected to the USBKEY interface systems, such as equipment
Title, certificate information etc..The attribute submodule of unified interface module obtains the facility information of above-mentioned USBKEY, and upper layer application obtains
After the facility information, the PKI standard lib types in allocation list, as PKCS#11 standards, CSP standards and state's Data Encryption Standard are enumerated
The equipment enumerated involved by each standard, and by association attributes loading equipment tabulated function in facility information.User selects
After selecting some USBKEY, by corresponding to the interface standard module of the USBKEY in interface module, beaten to the equipment of communication component
Mold block and send instruction, open the USBKEY chosen.The user instruction of upper layer application passes sequentially through function of interface module
The command execution module of module, corresponding standard interface and communication component, is sent to the COS systems of USBKEY, to perform label
The operational orders such as name, signature verification, encryption, decryption, certification authentication, file operation or generation symmetric key.The present invention's
USBKEY interface systems, encapsulate common several standard interface, are converted to unified interface, meet user to difference
The use demand of USBKEY equipment and various criterion interface library, simplifies user's operation flow, and reduces complexity risk.It is logical
Cross hardware implementation mode and simplify operating system underlying programs, improve key arithmetic speed, be unified interface library key computing
And upper layer application cipher key service provides reliable password support.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Attached drawing is for providing a further understanding of the present invention, and a part for constitution instruction, with following tool
Body embodiment is used to explain the present invention together, but is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the USBKEY interface system structure schematic diagrames of one embodiment of the present invention;
Fig. 2 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention;
Fig. 3 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention;
Fig. 4 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention;
Fig. 5 is the method flow diagram being connected using the USBKEY interface systems of one embodiment of the present invention with USBKEY;
Fig. 6 is the method flow being connected using the USBKEY interface systems of the present invention with USBKEY of another embodiment
Figure;
Fig. 7 is that the USBKEY interface systems of one embodiment of the present invention call stream in the operation of cryptographic service cert services
Journey.
Embodiment
The embodiment of the present invention is described in detail below in conjunction with attached drawing.It should be appreciated that this place is retouched
The embodiment stated is merely to illustrate and explain the present invention, and is not intended to limit the invention.
The present invention provides a kind of USBKEY interface systems, including:Interface module 100, to by the difference of the USBKEY
Interface standard be converted to unified interface standard, it is by the interface module that the USBKEY accessing users of distinct interface standard is whole
End;Communication component 200, to realize the communication between the interface module and the USBKEY.
In such scheme, to connect user terminal, the other end and communication component 200 connect 100 one end of interface module, lead to
Believe the other end connection USBKEY of component, USBKEY chip operating systems COS300 is operated.
Bottoms of the chip operating system COS300 as USBKEY, to realize that the operation of USBKEY includes signature, signature
Verification, encryption, decryption, certification authentication, file operation or generation symmetric key etc., ensure that the security reliability of system, are whole
The foundation stone of a system.
The communication component 200 connects COS300 and interface module 100, plays the role of secure communication tie.Institute
The interface module 100 stated is to by distinct interface standard, such as CSP interface modules, PKCS#11 interface modules and state's Data Encryption Standard
Interface module is packaged into a unified interface module, required compatible to be no longer three and independently connect for upper layer application
Mouth mold block, but only need an interface corresponding with unified interface standard, largely meet application developers and
User is to the different demands of USBKEY equipment and interface standard, and interface calls simpler convenience.
Fig. 2 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention.The present invention as shown in Figure 2
The USBKEY interface systems of another embodiment, the interface module include:Public keys standard PKCS#11 interface modules
124th, Cryptographic Service Provider CSP standard interface modules 122 and state's Data Encryption Standard interface module 126, wherein, public keys standard
In PKCS#11 interface modules 124, Cryptographic Service Provider CSP standard interface modules 122 and state's Data Encryption Standard interface module 126
The one end of any one is connected with communication component;With unified interface module 110, its one end connects appointing in above-mentioned three kinds of interface modules
The other end of one, its other end connection user terminal.
Fig. 3 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention.The present invention as shown in Figure 3
The USBKEY interface systems of another embodiment, the communication component 200 include:Device enumeration module 220, to the company of acquisition
It is connected to the facility information of several USBKEY of the system;Equipment opens module 230, refers to be opened according to user instruction
Fixed USBKEY;With command execution module 240, to:The instruction that user sends via the interface module 100 is received, by this
Instruction is converted to the form that the USBKEY is received and is transmitted to the USBKEY;Described instruction is directed to the USBKEY is received
Response message after being operated, and the response message is returned into the interface module 100.
Fig. 4 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention.The present invention as shown in Figure 4
The USBKEY interface systems of another embodiment, the unified interface module 110 include:Function sub-modules 113, to basis
The instruction of user performs corresponding operation;With attribute submodule 112, to obtain described in the device enumeration module 220
The facility information of USBKEY.
A kind of embodiment according to the present invention, the operation that the function sub-modules 113 perform include:Signature, signature verification,
Encryption, decryption, certification authentication, file operation or generation symmetric key;The facility information bag that the attribute submodule 112 records
Include:Certificate information, certificate information parsing, facility information parsing and PIN information.
Communication component 200 is completing connection communication task.The communication component 200 includes device enumeration module 220
(DeviceEnum ()), equipment open module 230 (DeviceOpen ()) and command execution module 240
(DeviceExecCmd()).Device enumeration module 220 can be enumerated is connected to user terminal by the USBKEY interface systems
The facility information of USBKEY, selects for user.Equipment is opened module 230 and is set for opening a currently selected fixed USBKEY
Standby, connection user terminal and selected USBKEY equipment, prepare for subsequent commands.Command execution module 240 is used to receive
Interface module 100 is sent to the command message of the COS systems 300 of USBKEY, and is converted into the reception of USBKEYCOS systems 300
Form is transmitted to the COS systems 300 of USBKEY;The response report after the processing of COS systems 300 of the USBKEY of USBKEY is received at the same time
Text, returns to interface module 100.
The interface module 100 is to by the CSP interface modules 122 of distinct interface standard, PKCS#11 interface modules
124 and state's Data Encryption Standard interface module 126 encapsulation output one unified interface module 110, it is required for upper layer application
Compatible is no longer three stand-alone interface modules, but only needs one and 110 corresponding interface of unified interface module, greatly
The different demands of application developers and user to USBKEY equipment and interface standard are met in degree, and interface calling is simpler
Folk prescription is just.
Interface module 100 is mainly that upper layer application provides the associated secure code clothes such as signature sign test, cert services, encryption and decryption
Business.At present, CSP is come tissue key by container;PKCS#11 does not have container concept, its preservation and tissue to key data
Mainly by object, PKCS#11 defines three kinds of object types:Data object, certificate object and key object;National password pipe
Reason office uses for reference or with reference in terms of upper strata CSP interfaces in the close interface standard of relevant state formulated in 2011, its standard, exist
The concept of container, uses for reference or with reference to PKCS#11 interfaces on bottom operation, there is the standard of object.Therefore by three kinds of interface libraries
Being packaged into a unified interface module 110 has feasibility.
The unified interface module 110 is divided for function sub-modules 113 and attribute submodule 112.Function sub-modules 113 are led
Corresponding operation is performed according to the instruction of user to receive the instruction of upper-layer user, including signature, signature verification, encryption,
Decryption, certification authentication, file operation and the symmetrical secret key of generation etc..Attribute submodule 112, to obtain by the USBKEY interfaces
System is connected to the facility information of the USBKEY of user terminal, including the parsing of certificate information, certificate information, facility information, equipment
Information parses and PIN is operated etc..
With the data transfer of the interface module 100 of upper layer application access, for upper layer application user, only one need to be safeguarded
Allocation list (config.ini) is opened, only need to list each USBKEY facility informations that user uses in allocation list, each
USBKEY device categories include:Device name and interface standard (mouth is touched in CSP/PKCS#11/ states), such as further include PKI interfaces
Storehouse absolute path.User by the unified interface module 110 that calling interface component 100 defines can be convenient and safe calling to institute
Any one of three kinds of interface modules needed.
Fig. 5 is the method flow diagram being connected using the USBKEY interface systems of one embodiment of the present invention with USBKEY.
The method being connected using the USBKEY interface systems of the present invention with USBKEY of another embodiment as shown in Figure 5, including:
In step 410, the USBKEY selected according to user gates corresponding standard interface module, at step 420, passes through the standard
Interface module establishes the connection with selected USBKEY.
Fig. 6 is the method flow diagram being connected using the USBKEY interface systems of one embodiment of the present invention with USBKEY.
The method being connected using the USBKEY interface systems of one embodiment of the present invention with USBKEY as shown in Figure 6, this method is also
Including:Before user selects USBKEY, in step 401, the facility information of the USBKEY is obtained, which at least wraps
Include:Device name and interface standard.
A kind of embodiment, this method further include according to the present invention:Before user selects USBKEY, in step 402, more
The certificate of the new USBKEY.
A kind of embodiment, this method further include according to the present invention:In step 430, judge whether user logs in, if with
Family is not logged on, then in step 440, personal identification number's PIN Authority Verifications is carried out, then in step 450, by corresponding operating
It is sent to selected USBKEY;If user has logged on, in step 450, corresponding operating is sent to the selection
USBKEY;Wherein, it is symmetrical to include signature, signature verification, encryption, decryption, certification authentication, file operation or generation for the operation
Any of key is several.
A kind of embodiment, this method further include according to the present invention:In step 400, allocation list is set, to record
State the standard information of the USBKEY of acquisition.
It is first when user is inserted into one or several USBKEY equipment by the USBKEY interface systems in such scheme
Functions of the equipments function (update dev ()) is first updated, obtains list of devices, and the certificate of renewal USBKEY, acquisition are connected to
Title, the certificate information of the facility information of one or several USBKEY of the USBKEY interface systems, such as equipment.It is somebody's turn to do
After facility information, according to the PKI standard lib types of USBKEY in allocation list, such as PKCS#11 standards, CSP standards and state's Data Encryption Standard
The equipment enumerated involved by each standard is enumerated, after user selects some USBKEY, gating is corresponding with the USBKEY
Standard interface module, open the USBKEY chosen, establish the connection of the USBKEY chosen with this.The user of upper layer application refers to
Order judges whether it is user's login, if so, command adapted thereto to be then sent to the COS systems of selected USBKEY, to perform
The operational orders such as signature, signature verification, encryption, decryption, certification authentication, file operation or generation symmetric key.As user does not have
Log in, then carry out personal sign PIN Authority Verifications.The side being connected by USBKEY interface systems with USBKEY of the present invention
Method, meets use demand of the user to different USBKEY equipment and distinct interface standard, simplifies user's operation flow, and reduce
The complexity of operation.
Fig. 7 is that the USBKEY interface systems of one embodiment of the present invention call stream in the operation of cryptographic service cert services
Journey.The USBKEY interface systems of one embodiment of the present invention as shown in Figure 5 call in the operation of cryptographic service cert services
Flow is as follows:
1st, user is inserted into one or several USBKEY equipment, in step 510, updates list of devices:Interface module
Unified interface module updates functions of the equipments function (update_dev ()) first, and the device enumeration module of communication component enumerates company
It is connected to the facility information of one or several USBKEY of the USBKEY interface systems, title, the certificate information of such as equipment.System
The attribute submodule of one interface module obtains the facility information of above-mentioned USBKEY, after upper layer application obtains the facility information, according to
PKI standard lib types (CSP/PKCS#11/ states are close) in allocation list (config.ini) enumerate each standard interface module institute
The equipment being related to, and equipment association attributes is included in list of devices (device list).
2nd, in step 520, list of cert is updated:Certificate (the update in each USBKEY equipment is updated successively
Cer ()), the certificate enumerated is included in list of cert (certificate list).
3rd, in step 530, equipment/certificate is selected, is associated with corresponding PIK standard interface modules, such as CSP interfaces
Module, PKCS#11 interface modules or state's Data Encryption Standard interface module:User selects according to the list of cert frame or list of devices frame of pop-up
Select required certificate or equipment.When user selects certificate or equipment, unified interface module is alternatively coupled to according to user
In associated standard interface module (the close interface module thrin of CSP/PKCS#11/ states).
4th, in step 540, judge whether user has logged on:Determine whether operating right, if being not logged on,
In step 550, register is performed, prompts user to input PIN verifying authorizations.
5th, in step 560, user is sent into the cryptographic service order datas such as signature sign test, certificate operation:According to user's need
Ask, call the relevant interfaces such as signature sign test, certification authentication, encrypting and decrypting.Unified interface module interface function receives user command
Message, is sequentially transmitted to communication component, operating system bottom via the PKI standard interface modules for having established connection.
6th, in step 570, order data is sent into lower floor's processing, and returns response data to unified interface module:Order
Data are sent into the command execution module of lower floor, that is, communication component, are further sent at the chip operating system COS of USBKEY
Reason, and return response data to unified interface module unified interface module receive lower floor send back come response message return to
User terminal, completes security password service.
The preferred embodiment of the present invention is described in detail above in association with attached drawing, still, the present invention is not limited to above-mentioned reality
The detail in mode is applied, in the range of the technology design of the present invention, a variety of letters can be carried out to technical scheme
Monotropic type, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique feature described in above-mentioned embodiment, in not lance
In the case of shield, it can be combined by any suitable means.In order to avoid unnecessary repetition, the present invention to it is various can
The combination of energy no longer separately illustrates.
In addition, various embodiments of the present invention can be combined randomly, as long as it is without prejudice to originally
The thought of invention, it should equally be considered as content disclosed in this invention.
Claims (10)
- A kind of 1. USBKEY interface systems, it is characterised in that including:Interface module, the different interface standards of the USBKEY are converted to unified interface standard, passes through the interface Component is by the USBKEY access user terminals of distinct interface standard;Communication component, to realize the communication between the interface module and the USBKEY.
- 2. system according to claim 1, it is characterised in that the interface module includes:Public keys standard PKCS#11 interface modules, Cryptographic Service Provider CSP standard interface modules and state's Data Encryption Standard interface mould Block, wherein, public keys standard PKCS#11 interface modules, Cryptographic Service Provider CSP standard interface modules and state's Data Encryption Standard connect Mouth mold one end of any one in the block is connected with communication component;WithUnified interface module, its one end connect the other end of any one of above-mentioned three kinds of interface modules, and the connection of its other end is used Family terminal.
- 3. system according to claim 1, it is characterised in thatThe communication component includes:Device enumeration module, to obtain the facility information for several USBKEY for being connected to the system;Equipment opens module, to open the USBKEY specified according to user instruction;WithCommand execution module, to:The instruction that user sends via the interface module is received, which is converted into form and the biography that the USBKEY is received It is sent to the USBKEY;WithThe response message after the USBKEY is operated for described instruction is received, and the response message is returned into described connect Mouth component.
- 4. system according to claim 3, it is characterised in that the unified interface module includes:Function sub-modules, to perform corresponding operation according to the instruction of user;WithAttribute submodule, to obtain the facility information of the USBKEY of the device enumeration module.
- 5. system according to claim 4, it is characterised in thatThe operation that the function sub-modules perform includes:Signature, signature verification, encryption, decryption, certification authentication, file operation or Generate symmetric key;The facility information of the attribute submodule record includes:Certificate information, certificate information parsing, facility information parsing and PIN Information.
- 6. usage right requires the method that the system any one of 1-5 is connected with USBKEY, including:The USBKEY selected according to user gates corresponding standard interface module, by the standard interface module establish with it is selected USBKEY connection.
- 7. according to the method described in claim 6, this method further includes:Before user selects USBKEY, the facility information of the USBKEY is obtained, which includes at least:Device name and Interface standard.
- 8. according to the method described in claim 7, this method further includes:Before user selects USBKEY, the certificate of the USBKEY is updated.
- 9. according to the method described in claim 6, this method further includes:Judge whether user logs in, if user is not logged on, carry out personal identification number's PIN Authority Verifications;If user has logged on, corresponding operating is sent to selected USBKEY;Wherein, the operation includes signature, signature verification, encryption, decryption, certification authentication, file operation or generation symmetric key Any of or it is several.
- 10. according to the method described in claim 7, this method further includes:Allocation list is set, to record the standard information of the USBKEY of the acquisition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610940480.9A CN107977565A (en) | 2016-10-25 | 2016-10-25 | USBKEY interface systems and the method being connected with USBKEY |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610940480.9A CN107977565A (en) | 2016-10-25 | 2016-10-25 | USBKEY interface systems and the method being connected with USBKEY |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107977565A true CN107977565A (en) | 2018-05-01 |
Family
ID=62004988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610940480.9A Pending CN107977565A (en) | 2016-10-25 | 2016-10-25 | USBKEY interface systems and the method being connected with USBKEY |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107977565A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109657449A (en) * | 2018-12-14 | 2019-04-19 | 成都三零嘉微电子有限公司 | A kind of method and apparatus for realizing the intercommunication of password resource based on cipher card |
CN112100586A (en) * | 2020-08-21 | 2020-12-18 | 郑州信大捷安信息技术股份有限公司 | System and method for accessing different password devices |
CN112434276A (en) * | 2020-12-08 | 2021-03-02 | 武汉卓尔信息科技有限公司 | Self-adaptive identity recognition system based on UKEY |
CN112434277A (en) * | 2020-12-08 | 2021-03-02 | 武汉卓尔信息科技有限公司 | UKEY middleware and multi-UKEY self-adaptive integrated adaptation method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101122940A (en) * | 2007-09-30 | 2008-02-13 | 金蝶软件(中国)有限公司 | USBKEY integration method and device |
CN101266590A (en) * | 2008-04-22 | 2008-09-17 | 北京飞天诚信科技有限公司 | Method and system for dynamically switching equipment arrangement |
US20130010955A1 (en) * | 2010-03-31 | 2013-01-10 | Zhou Lu | Method for implementing an encryption engine |
CN103457742A (en) * | 2013-09-18 | 2013-12-18 | 浪潮电子信息产业股份有限公司 | Security suite library system based on USB KEY |
CN104199680A (en) * | 2014-08-04 | 2014-12-10 | 中国电子科技集团公司第三十研究所 | Processing method supporting calling of various safety devices |
CN104579687A (en) * | 2015-01-19 | 2015-04-29 | 浪潮电子信息产业股份有限公司 | CSP implementation based on USBKEY |
-
2016
- 2016-10-25 CN CN201610940480.9A patent/CN107977565A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101122940A (en) * | 2007-09-30 | 2008-02-13 | 金蝶软件(中国)有限公司 | USBKEY integration method and device |
CN101266590A (en) * | 2008-04-22 | 2008-09-17 | 北京飞天诚信科技有限公司 | Method and system for dynamically switching equipment arrangement |
US20130010955A1 (en) * | 2010-03-31 | 2013-01-10 | Zhou Lu | Method for implementing an encryption engine |
CN103457742A (en) * | 2013-09-18 | 2013-12-18 | 浪潮电子信息产业股份有限公司 | Security suite library system based on USB KEY |
CN104199680A (en) * | 2014-08-04 | 2014-12-10 | 中国电子科技集团公司第三十研究所 | Processing method supporting calling of various safety devices |
CN104579687A (en) * | 2015-01-19 | 2015-04-29 | 浪潮电子信息产业股份有限公司 | CSP implementation based on USBKEY |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109657449A (en) * | 2018-12-14 | 2019-04-19 | 成都三零嘉微电子有限公司 | A kind of method and apparatus for realizing the intercommunication of password resource based on cipher card |
CN109657449B (en) * | 2018-12-14 | 2020-11-03 | 成都三零嘉微电子有限公司 | Method and equipment for realizing password resource intercommunication based on password card |
CN112100586A (en) * | 2020-08-21 | 2020-12-18 | 郑州信大捷安信息技术股份有限公司 | System and method for accessing different password devices |
CN112100586B (en) * | 2020-08-21 | 2022-04-08 | 郑州信大捷安信息技术股份有限公司 | System and method for accessing different password devices |
CN112434276A (en) * | 2020-12-08 | 2021-03-02 | 武汉卓尔信息科技有限公司 | Self-adaptive identity recognition system based on UKEY |
CN112434277A (en) * | 2020-12-08 | 2021-03-02 | 武汉卓尔信息科技有限公司 | UKEY middleware and multi-UKEY self-adaptive integrated adaptation method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105376216B (en) | A kind of remote access method, proxy server and client | |
EP2477165B1 (en) | Multi-application smart card, and system and method for multi-application management of smart card | |
CN103249045B (en) | A kind of methods, devices and systems of identification | |
CN108667608A (en) | The guard method of data key, device and system | |
CN107977565A (en) | USBKEY interface systems and the method being connected with USBKEY | |
JPS63205687A (en) | Method and apparatus for protecting secret element in network of cryptograph by handing open key | |
CN112953970B (en) | Identity authentication method and identity authentication system | |
CN110401655A (en) | Access control right management system based on user and role | |
CN109448271A (en) | A kind of no card withdrawal method, computer readable storage medium and server | |
CN101114326A (en) | Systems and methods for computer device authentication | |
CN108229956A (en) | Network bank business method, apparatus, system and mobile terminal | |
NO174730B (en) | Procedure for routing secret data keys to security modules and user cards in an information processing network | |
CN107294916A (en) | Single-point logging method, single-sign-on terminal and single-node login system | |
CN106549920A (en) | Log-on message input method, log-on message store method and relevant apparatus | |
CN106341234A (en) | Authorization method and device | |
CN101894235B (en) | Smart card security session system | |
CN104021335B (en) | Password service method based on extensible password service framework | |
CN103489101A (en) | Safe electronic payment system and payment method based on converged communication technology | |
CN109214161A (en) | A kind of two-dimension code safe label login system | |
CN102075327A (en) | Method, device and system for unlocking electronic key | |
CN105320891B (en) | A kind of method and device of computer security loading system mirror image | |
CN111813614A (en) | Debugging processing method and device and debugging processing system | |
CN109766152A (en) | A kind of exchange method and device | |
CN108768963A (en) | The communication means and system of trusted application and safety element | |
CN109587142A (en) | A kind of the data safety AM access module and equipment of service-oriented stream |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180501 |