CN107977565A - USBKEY interface systems and the method being connected with USBKEY - Google Patents

USBKEY interface systems and the method being connected with USBKEY Download PDF

Info

Publication number
CN107977565A
CN107977565A CN201610940480.9A CN201610940480A CN107977565A CN 107977565 A CN107977565 A CN 107977565A CN 201610940480 A CN201610940480 A CN 201610940480A CN 107977565 A CN107977565 A CN 107977565A
Authority
CN
China
Prior art keywords
usbkey
interface
standard
interface module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610940480.9A
Other languages
Chinese (zh)
Inventor
张盼
何丽
程思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201610940480.9A priority Critical patent/CN107977565A/en
Publication of CN107977565A publication Critical patent/CN107977565A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4063Device-to-bus coupling
    • G06F13/4068Electrical coupling

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to data safe processing technical field, and disclosing a kind of USBKEY interface systems and the method being connected with USBKEY, the system includes:Including:Interface module, the different interface standards of the USBKEY are converted to unified interface standard, by the interface module by the USBKEY access user terminals of distinct interface standard;Communication component, to realize the communication between the interface module and the USBKEY;Various criterion interface module is packaged into a unified interface module, a set of unified interface module is provided for upper layer application, so as to reduce the extra development amount brought because interface standard and USBKEY equipment are different, the compatibility of equipment and system is improved, saves hardware and program resource.

Description

USBKEY interface systems and the method being connected with USBKEY
Technical field
The present invention relates to data safe processing technical field, and in particular, to a kind of USBKEY interface systems and with The method of USBKEY connections.
Background technology
Continuous development and maturation with digital technology and network technology, information security become it is of concern it is heavy in it Weight.Since USBKEY emerges, extreme enrichment and the security solution for improving all kinds of electronic applications, USBKEY is a kind of USB The hardware device of interface.Its built-in security chip, there is certain memory space, can store private key for user and digital certificate, The certification to user identity is realized using the public key algorithm built in USBKEY.Since private key for user is stored in safety chip, reason By above making all read in any way, therefore it ensure that the security of user authentication.
PKI (Public Key Infrastructure, i.e. Public Key Infrastructure) can be that all-network pellucidly provides Key and certificate management functions needed for the cryptographic services such as encrypted and digitally signed, using the teaching of the invention it is possible to provide certification, access control, data are complete The core security services such as whole property, confidentiality and non-repudiation.Since PKI provides good security platform, the whole world is many single Position all develops various PKI software and hardwares encryption devices.It is User Exploitation and equipment but the encryption interface of commensurate is not quite similar Unrelated encryption application is made troubles.In order to solve encryption interface problem, a variety of API international standards have been formd at present, its The API standard that middle PKI is recommended has PKCS#11 and Microsoft CryptoAPI (CSP) etc..
USBKEY is combined by USBKEY producers with PKI technologies, have developed the security middleware for meeting PKI standards, profit Digital certificate and private key for user are preserved with USBKEY, and to application developers (as opened for bank's exploitation bank system of web Hair business) programming interface for meeting PKI standards is provided, in order to develop the application program based on PKI.
Since the hardware configuration of USBKEY itself determines that user can only access data by manufacturer's programming interface, this is just protected Having demonstrate,proved the private key for user being stored in USBKEY can not be replicated, and each USBKEY carries cryptoguard, so The hardware and password of USBKEY constitutes the two necessary factors that can use certificate.Since USBKEY is in terms of certificate storage Superiority, more and more CA, bank and user have selected USBKEY as certificate storage medium.
Current most commonly used PKI standards mainly have PKCS#11, CSP standard, and national Password Management office was in 2011 The close interface standard of relevant state (hereinafter referred to as " mouth is touched in state ") is formulated, because different manufacturers may use three of the above different Standard provides each independent middleware interface storehouse so that application developers often select a kind of USBKEY, are intended to by its offer Independent upper layer application is developed in PKI standard interfaces storehouse.And application developers are using different USBKEY equipment and different marks During quasi- interface library, very big test is proposed to the compatibility of upper layer application, and program redundancy increases, complexity is high, exists The possibility of defect is larger.
The content of the invention
The object of the present invention is to provide a kind of USBKEY interface systems and the method being connected with USBKEY, the system and method Various criterion interface module is packaged into a unified interface module, a set of unified interface module is provided for upper layer application, So as to reduce the extra development amount brought because interface standard and USBKEY equipment are different, the compatibility of equipment and system is improved Property, save hardware and program resource.
To achieve these goals, the present invention provides a kind of USBKEY interface systems, including:Interface module, to by institute The different interface standards for stating USBKEY are converted to unified interface standard, by the interface module by distinct interface standard USBKEY access user terminals;Communication component, to realize the communication between the interface module and the USBKEY.
Preferably, the interface module includes:Public keys standard PKCS#11 interface modules, Cryptographic Service Provider CSP Standard interface module and state's Data Encryption Standard interface module, wherein, public keys standard PKCS#11 interface modules, cryptographic services provide One end of any one of person CSP standard interface modules and state's Data Encryption Standard interface module is connected with communication component;And unified interface Module, its one end connect the other end of any one of above-mentioned three kinds of interface modules, its other end connection user terminal.
Preferably, the communication component includes:Device enumeration module, is connected to described in several of the system to obtain The facility information of USBKEY;Equipment opens module, to open the USBKEY specified according to user instruction;Mould is performed with order Block, to:The instruction that user sends via the interface module is received, which is converted to the form of the USBKEY receptions And it is transmitted to the USBKEY;The response message after described instruction is operated is directed to the USBKEY is received, and this is rung Message is answered to return to the interface module.
Preferably, the unified interface module includes:Function sub-modules, to perform corresponding behaviour according to the instruction of user Make;With attribute submodule, to obtain the facility information of the USBKEY of the device enumeration module.
Preferably, the operation that the function sub-modules perform includes:Signature, signature verification, encryption, decryption, certification authentication, File operation or generation symmetric key;The facility information of the attribute submodule record includes:Certificate information, certificate information solution Analysis, facility information parsing and PIN information.
The present invention also provides a kind of method being connected using above-mentioned USBKEY interface systems with USBKEY, including:According to The USBKEY of family selection gates corresponding standard interface module, is established by the standard interface module with selected USBKEY's Connection.
Preferably, before user selects USBKEY, the facility information of the USBKEY is obtained, which at least wraps Include:Device name and interface standard.
Preferably, this method further includes:Before user selects USBKEY, the certificate of the USBKEY is updated.
Preferably, this method further includes:Judge whether user logs in, if user is not logged on, carry out personal identification number PIN Authority Verifications;If user has logged on, corresponding operating is sent to selected USBKEY;Wherein, the operation bag Include any of signature, signature verification, encryption, decryption, certification authentication, file operation or generation symmetric key or several.
Preferably, this method further includes:Allocation list is set, to record the standard information of the USBKEY of the acquisition.
Through the above technical solutions, common PKCS#11 interface modules, CSP standard interface modules and state's Data Encryption Standard are connect Mouth mold block is encapsulated in the USBKEY, is connected by unified interface module with upper layer application, and communication component connects the core of USBKEY Piece operates COS systems and is packaged with the interface module of above three module.When user is inserted into one by the USBKEY interface systems During a or several USBKEY equipment, interface module updates functions of the equipments function (update dev ()) first, communication component Device enumeration module enumerates the facility information for one or several USBKEY for being connected to the USBKEY interface systems, such as equipment Title, certificate information etc..The attribute submodule of unified interface module obtains the facility information of above-mentioned USBKEY, and upper layer application obtains After the facility information, the PKI standard lib types in allocation list, as PKCS#11 standards, CSP standards and state's Data Encryption Standard are enumerated The equipment enumerated involved by each standard, and by association attributes loading equipment tabulated function in facility information.User selects After selecting some USBKEY, by corresponding to the interface standard module of the USBKEY in interface module, beaten to the equipment of communication component Mold block and send instruction, open the USBKEY chosen.The user instruction of upper layer application passes sequentially through function of interface module The command execution module of module, corresponding standard interface and communication component, is sent to the COS systems of USBKEY, to perform label The operational orders such as name, signature verification, encryption, decryption, certification authentication, file operation or generation symmetric key.The present invention's USBKEY interface systems, encapsulate common several standard interface, are converted to unified interface, meet user to difference The use demand of USBKEY equipment and various criterion interface library, simplifies user's operation flow, and reduces complexity risk.It is logical Cross hardware implementation mode and simplify operating system underlying programs, improve key arithmetic speed, be unified interface library key computing And upper layer application cipher key service provides reliable password support.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Attached drawing is for providing a further understanding of the present invention, and a part for constitution instruction, with following tool Body embodiment is used to explain the present invention together, but is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the USBKEY interface system structure schematic diagrames of one embodiment of the present invention;
Fig. 2 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention;
Fig. 3 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention;
Fig. 4 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention;
Fig. 5 is the method flow diagram being connected using the USBKEY interface systems of one embodiment of the present invention with USBKEY;
Fig. 6 is the method flow being connected using the USBKEY interface systems of the present invention with USBKEY of another embodiment Figure;
Fig. 7 is that the USBKEY interface systems of one embodiment of the present invention call stream in the operation of cryptographic service cert services Journey.
Embodiment
The embodiment of the present invention is described in detail below in conjunction with attached drawing.It should be appreciated that this place is retouched The embodiment stated is merely to illustrate and explain the present invention, and is not intended to limit the invention.
The present invention provides a kind of USBKEY interface systems, including:Interface module 100, to by the difference of the USBKEY Interface standard be converted to unified interface standard, it is by the interface module that the USBKEY accessing users of distinct interface standard is whole End;Communication component 200, to realize the communication between the interface module and the USBKEY.
In such scheme, to connect user terminal, the other end and communication component 200 connect 100 one end of interface module, lead to Believe the other end connection USBKEY of component, USBKEY chip operating systems COS300 is operated.
Bottoms of the chip operating system COS300 as USBKEY, to realize that the operation of USBKEY includes signature, signature Verification, encryption, decryption, certification authentication, file operation or generation symmetric key etc., ensure that the security reliability of system, are whole The foundation stone of a system.
The communication component 200 connects COS300 and interface module 100, plays the role of secure communication tie.Institute The interface module 100 stated is to by distinct interface standard, such as CSP interface modules, PKCS#11 interface modules and state's Data Encryption Standard Interface module is packaged into a unified interface module, required compatible to be no longer three and independently connect for upper layer application Mouth mold block, but only need an interface corresponding with unified interface standard, largely meet application developers and User is to the different demands of USBKEY equipment and interface standard, and interface calls simpler convenience.
Fig. 2 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention.The present invention as shown in Figure 2 The USBKEY interface systems of another embodiment, the interface module include:Public keys standard PKCS#11 interface modules 124th, Cryptographic Service Provider CSP standard interface modules 122 and state's Data Encryption Standard interface module 126, wherein, public keys standard In PKCS#11 interface modules 124, Cryptographic Service Provider CSP standard interface modules 122 and state's Data Encryption Standard interface module 126 The one end of any one is connected with communication component;With unified interface module 110, its one end connects appointing in above-mentioned three kinds of interface modules The other end of one, its other end connection user terminal.
Fig. 3 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention.The present invention as shown in Figure 3 The USBKEY interface systems of another embodiment, the communication component 200 include:Device enumeration module 220, to the company of acquisition It is connected to the facility information of several USBKEY of the system;Equipment opens module 230, refers to be opened according to user instruction Fixed USBKEY;With command execution module 240, to:The instruction that user sends via the interface module 100 is received, by this Instruction is converted to the form that the USBKEY is received and is transmitted to the USBKEY;Described instruction is directed to the USBKEY is received Response message after being operated, and the response message is returned into the interface module 100.
Fig. 4 is the USBKEY interface system structure schematic diagrames of another embodiment of the present invention.The present invention as shown in Figure 4 The USBKEY interface systems of another embodiment, the unified interface module 110 include:Function sub-modules 113, to basis The instruction of user performs corresponding operation;With attribute submodule 112, to obtain described in the device enumeration module 220 The facility information of USBKEY.
A kind of embodiment according to the present invention, the operation that the function sub-modules 113 perform include:Signature, signature verification, Encryption, decryption, certification authentication, file operation or generation symmetric key;The facility information bag that the attribute submodule 112 records Include:Certificate information, certificate information parsing, facility information parsing and PIN information.
Communication component 200 is completing connection communication task.The communication component 200 includes device enumeration module 220 (DeviceEnum ()), equipment open module 230 (DeviceOpen ()) and command execution module 240 (DeviceExecCmd()).Device enumeration module 220 can be enumerated is connected to user terminal by the USBKEY interface systems The facility information of USBKEY, selects for user.Equipment is opened module 230 and is set for opening a currently selected fixed USBKEY Standby, connection user terminal and selected USBKEY equipment, prepare for subsequent commands.Command execution module 240 is used to receive Interface module 100 is sent to the command message of the COS systems 300 of USBKEY, and is converted into the reception of USBKEYCOS systems 300 Form is transmitted to the COS systems 300 of USBKEY;The response report after the processing of COS systems 300 of the USBKEY of USBKEY is received at the same time Text, returns to interface module 100.
The interface module 100 is to by the CSP interface modules 122 of distinct interface standard, PKCS#11 interface modules 124 and state's Data Encryption Standard interface module 126 encapsulation output one unified interface module 110, it is required for upper layer application Compatible is no longer three stand-alone interface modules, but only needs one and 110 corresponding interface of unified interface module, greatly The different demands of application developers and user to USBKEY equipment and interface standard are met in degree, and interface calling is simpler Folk prescription is just.
Interface module 100 is mainly that upper layer application provides the associated secure code clothes such as signature sign test, cert services, encryption and decryption Business.At present, CSP is come tissue key by container;PKCS#11 does not have container concept, its preservation and tissue to key data Mainly by object, PKCS#11 defines three kinds of object types:Data object, certificate object and key object;National password pipe Reason office uses for reference or with reference in terms of upper strata CSP interfaces in the close interface standard of relevant state formulated in 2011, its standard, exist The concept of container, uses for reference or with reference to PKCS#11 interfaces on bottom operation, there is the standard of object.Therefore by three kinds of interface libraries Being packaged into a unified interface module 110 has feasibility.
The unified interface module 110 is divided for function sub-modules 113 and attribute submodule 112.Function sub-modules 113 are led Corresponding operation is performed according to the instruction of user to receive the instruction of upper-layer user, including signature, signature verification, encryption, Decryption, certification authentication, file operation and the symmetrical secret key of generation etc..Attribute submodule 112, to obtain by the USBKEY interfaces System is connected to the facility information of the USBKEY of user terminal, including the parsing of certificate information, certificate information, facility information, equipment Information parses and PIN is operated etc..
With the data transfer of the interface module 100 of upper layer application access, for upper layer application user, only one need to be safeguarded Allocation list (config.ini) is opened, only need to list each USBKEY facility informations that user uses in allocation list, each USBKEY device categories include:Device name and interface standard (mouth is touched in CSP/PKCS#11/ states), such as further include PKI interfaces Storehouse absolute path.User by the unified interface module 110 that calling interface component 100 defines can be convenient and safe calling to institute Any one of three kinds of interface modules needed.
Fig. 5 is the method flow diagram being connected using the USBKEY interface systems of one embodiment of the present invention with USBKEY. The method being connected using the USBKEY interface systems of the present invention with USBKEY of another embodiment as shown in Figure 5, including: In step 410, the USBKEY selected according to user gates corresponding standard interface module, at step 420, passes through the standard Interface module establishes the connection with selected USBKEY.
Fig. 6 is the method flow diagram being connected using the USBKEY interface systems of one embodiment of the present invention with USBKEY. The method being connected using the USBKEY interface systems of one embodiment of the present invention with USBKEY as shown in Figure 6, this method is also Including:Before user selects USBKEY, in step 401, the facility information of the USBKEY is obtained, which at least wraps Include:Device name and interface standard.
A kind of embodiment, this method further include according to the present invention:Before user selects USBKEY, in step 402, more The certificate of the new USBKEY.
A kind of embodiment, this method further include according to the present invention:In step 430, judge whether user logs in, if with Family is not logged on, then in step 440, personal identification number's PIN Authority Verifications is carried out, then in step 450, by corresponding operating It is sent to selected USBKEY;If user has logged on, in step 450, corresponding operating is sent to the selection USBKEY;Wherein, it is symmetrical to include signature, signature verification, encryption, decryption, certification authentication, file operation or generation for the operation Any of key is several.
A kind of embodiment, this method further include according to the present invention:In step 400, allocation list is set, to record State the standard information of the USBKEY of acquisition.
It is first when user is inserted into one or several USBKEY equipment by the USBKEY interface systems in such scheme Functions of the equipments function (update dev ()) is first updated, obtains list of devices, and the certificate of renewal USBKEY, acquisition are connected to Title, the certificate information of the facility information of one or several USBKEY of the USBKEY interface systems, such as equipment.It is somebody's turn to do After facility information, according to the PKI standard lib types of USBKEY in allocation list, such as PKCS#11 standards, CSP standards and state's Data Encryption Standard The equipment enumerated involved by each standard is enumerated, after user selects some USBKEY, gating is corresponding with the USBKEY Standard interface module, open the USBKEY chosen, establish the connection of the USBKEY chosen with this.The user of upper layer application refers to Order judges whether it is user's login, if so, command adapted thereto to be then sent to the COS systems of selected USBKEY, to perform The operational orders such as signature, signature verification, encryption, decryption, certification authentication, file operation or generation symmetric key.As user does not have Log in, then carry out personal sign PIN Authority Verifications.The side being connected by USBKEY interface systems with USBKEY of the present invention Method, meets use demand of the user to different USBKEY equipment and distinct interface standard, simplifies user's operation flow, and reduce The complexity of operation.
Fig. 7 is that the USBKEY interface systems of one embodiment of the present invention call stream in the operation of cryptographic service cert services Journey.The USBKEY interface systems of one embodiment of the present invention as shown in Figure 5 call in the operation of cryptographic service cert services Flow is as follows:
1st, user is inserted into one or several USBKEY equipment, in step 510, updates list of devices:Interface module Unified interface module updates functions of the equipments function (update_dev ()) first, and the device enumeration module of communication component enumerates company It is connected to the facility information of one or several USBKEY of the USBKEY interface systems, title, the certificate information of such as equipment.System The attribute submodule of one interface module obtains the facility information of above-mentioned USBKEY, after upper layer application obtains the facility information, according to PKI standard lib types (CSP/PKCS#11/ states are close) in allocation list (config.ini) enumerate each standard interface module institute The equipment being related to, and equipment association attributes is included in list of devices (device list).
2nd, in step 520, list of cert is updated:Certificate (the update in each USBKEY equipment is updated successively Cer ()), the certificate enumerated is included in list of cert (certificate list).
3rd, in step 530, equipment/certificate is selected, is associated with corresponding PIK standard interface modules, such as CSP interfaces Module, PKCS#11 interface modules or state's Data Encryption Standard interface module:User selects according to the list of cert frame or list of devices frame of pop-up Select required certificate or equipment.When user selects certificate or equipment, unified interface module is alternatively coupled to according to user In associated standard interface module (the close interface module thrin of CSP/PKCS#11/ states).
4th, in step 540, judge whether user has logged on:Determine whether operating right, if being not logged on, In step 550, register is performed, prompts user to input PIN verifying authorizations.
5th, in step 560, user is sent into the cryptographic service order datas such as signature sign test, certificate operation:According to user's need Ask, call the relevant interfaces such as signature sign test, certification authentication, encrypting and decrypting.Unified interface module interface function receives user command Message, is sequentially transmitted to communication component, operating system bottom via the PKI standard interface modules for having established connection.
6th, in step 570, order data is sent into lower floor's processing, and returns response data to unified interface module:Order Data are sent into the command execution module of lower floor, that is, communication component, are further sent at the chip operating system COS of USBKEY Reason, and return response data to unified interface module unified interface module receive lower floor send back come response message return to User terminal, completes security password service.
The preferred embodiment of the present invention is described in detail above in association with attached drawing, still, the present invention is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the present invention, a variety of letters can be carried out to technical scheme Monotropic type, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique feature described in above-mentioned embodiment, in not lance In the case of shield, it can be combined by any suitable means.In order to avoid unnecessary repetition, the present invention to it is various can The combination of energy no longer separately illustrates.
In addition, various embodiments of the present invention can be combined randomly, as long as it is without prejudice to originally The thought of invention, it should equally be considered as content disclosed in this invention.

Claims (10)

  1. A kind of 1. USBKEY interface systems, it is characterised in that including:
    Interface module, the different interface standards of the USBKEY are converted to unified interface standard, passes through the interface Component is by the USBKEY access user terminals of distinct interface standard;
    Communication component, to realize the communication between the interface module and the USBKEY.
  2. 2. system according to claim 1, it is characterised in that the interface module includes:
    Public keys standard PKCS#11 interface modules, Cryptographic Service Provider CSP standard interface modules and state's Data Encryption Standard interface mould Block, wherein, public keys standard PKCS#11 interface modules, Cryptographic Service Provider CSP standard interface modules and state's Data Encryption Standard connect Mouth mold one end of any one in the block is connected with communication component;With
    Unified interface module, its one end connect the other end of any one of above-mentioned three kinds of interface modules, and the connection of its other end is used Family terminal.
  3. 3. system according to claim 1, it is characterised in that
    The communication component includes:
    Device enumeration module, to obtain the facility information for several USBKEY for being connected to the system;
    Equipment opens module, to open the USBKEY specified according to user instruction;With
    Command execution module, to:
    The instruction that user sends via the interface module is received, which is converted into form and the biography that the USBKEY is received It is sent to the USBKEY;With
    The response message after the USBKEY is operated for described instruction is received, and the response message is returned into described connect Mouth component.
  4. 4. system according to claim 3, it is characterised in that the unified interface module includes:
    Function sub-modules, to perform corresponding operation according to the instruction of user;With
    Attribute submodule, to obtain the facility information of the USBKEY of the device enumeration module.
  5. 5. system according to claim 4, it is characterised in that
    The operation that the function sub-modules perform includes:Signature, signature verification, encryption, decryption, certification authentication, file operation or Generate symmetric key;
    The facility information of the attribute submodule record includes:Certificate information, certificate information parsing, facility information parsing and PIN Information.
  6. 6. usage right requires the method that the system any one of 1-5 is connected with USBKEY, including:
    The USBKEY selected according to user gates corresponding standard interface module, by the standard interface module establish with it is selected USBKEY connection.
  7. 7. according to the method described in claim 6, this method further includes:
    Before user selects USBKEY, the facility information of the USBKEY is obtained, which includes at least:Device name and Interface standard.
  8. 8. according to the method described in claim 7, this method further includes:
    Before user selects USBKEY, the certificate of the USBKEY is updated.
  9. 9. according to the method described in claim 6, this method further includes:
    Judge whether user logs in, if user is not logged on, carry out personal identification number's PIN Authority Verifications;
    If user has logged on, corresponding operating is sent to selected USBKEY;
    Wherein, the operation includes signature, signature verification, encryption, decryption, certification authentication, file operation or generation symmetric key Any of or it is several.
  10. 10. according to the method described in claim 7, this method further includes:
    Allocation list is set, to record the standard information of the USBKEY of the acquisition.
CN201610940480.9A 2016-10-25 2016-10-25 USBKEY interface systems and the method being connected with USBKEY Pending CN107977565A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610940480.9A CN107977565A (en) 2016-10-25 2016-10-25 USBKEY interface systems and the method being connected with USBKEY

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610940480.9A CN107977565A (en) 2016-10-25 2016-10-25 USBKEY interface systems and the method being connected with USBKEY

Publications (1)

Publication Number Publication Date
CN107977565A true CN107977565A (en) 2018-05-01

Family

ID=62004988

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610940480.9A Pending CN107977565A (en) 2016-10-25 2016-10-25 USBKEY interface systems and the method being connected with USBKEY

Country Status (1)

Country Link
CN (1) CN107977565A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657449A (en) * 2018-12-14 2019-04-19 成都三零嘉微电子有限公司 A kind of method and apparatus for realizing the intercommunication of password resource based on cipher card
CN112100586A (en) * 2020-08-21 2020-12-18 郑州信大捷安信息技术股份有限公司 System and method for accessing different password devices
CN112434276A (en) * 2020-12-08 2021-03-02 武汉卓尔信息科技有限公司 Self-adaptive identity recognition system based on UKEY
CN112434277A (en) * 2020-12-08 2021-03-02 武汉卓尔信息科技有限公司 UKEY middleware and multi-UKEY self-adaptive integrated adaptation method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101122940A (en) * 2007-09-30 2008-02-13 金蝶软件(中国)有限公司 USBKEY integration method and device
CN101266590A (en) * 2008-04-22 2008-09-17 北京飞天诚信科技有限公司 Method and system for dynamically switching equipment arrangement
US20130010955A1 (en) * 2010-03-31 2013-01-10 Zhou Lu Method for implementing an encryption engine
CN103457742A (en) * 2013-09-18 2013-12-18 浪潮电子信息产业股份有限公司 Security suite library system based on USB KEY
CN104199680A (en) * 2014-08-04 2014-12-10 中国电子科技集团公司第三十研究所 Processing method supporting calling of various safety devices
CN104579687A (en) * 2015-01-19 2015-04-29 浪潮电子信息产业股份有限公司 CSP implementation based on USBKEY

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101122940A (en) * 2007-09-30 2008-02-13 金蝶软件(中国)有限公司 USBKEY integration method and device
CN101266590A (en) * 2008-04-22 2008-09-17 北京飞天诚信科技有限公司 Method and system for dynamically switching equipment arrangement
US20130010955A1 (en) * 2010-03-31 2013-01-10 Zhou Lu Method for implementing an encryption engine
CN103457742A (en) * 2013-09-18 2013-12-18 浪潮电子信息产业股份有限公司 Security suite library system based on USB KEY
CN104199680A (en) * 2014-08-04 2014-12-10 中国电子科技集团公司第三十研究所 Processing method supporting calling of various safety devices
CN104579687A (en) * 2015-01-19 2015-04-29 浪潮电子信息产业股份有限公司 CSP implementation based on USBKEY

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657449A (en) * 2018-12-14 2019-04-19 成都三零嘉微电子有限公司 A kind of method and apparatus for realizing the intercommunication of password resource based on cipher card
CN109657449B (en) * 2018-12-14 2020-11-03 成都三零嘉微电子有限公司 Method and equipment for realizing password resource intercommunication based on password card
CN112100586A (en) * 2020-08-21 2020-12-18 郑州信大捷安信息技术股份有限公司 System and method for accessing different password devices
CN112100586B (en) * 2020-08-21 2022-04-08 郑州信大捷安信息技术股份有限公司 System and method for accessing different password devices
CN112434276A (en) * 2020-12-08 2021-03-02 武汉卓尔信息科技有限公司 Self-adaptive identity recognition system based on UKEY
CN112434277A (en) * 2020-12-08 2021-03-02 武汉卓尔信息科技有限公司 UKEY middleware and multi-UKEY self-adaptive integrated adaptation method and system

Similar Documents

Publication Publication Date Title
CN105376216B (en) A kind of remote access method, proxy server and client
EP2477165B1 (en) Multi-application smart card, and system and method for multi-application management of smart card
CN103249045B (en) A kind of methods, devices and systems of identification
CN108667608A (en) The guard method of data key, device and system
CN107977565A (en) USBKEY interface systems and the method being connected with USBKEY
JPS63205687A (en) Method and apparatus for protecting secret element in network of cryptograph by handing open key
CN112953970B (en) Identity authentication method and identity authentication system
CN110401655A (en) Access control right management system based on user and role
CN109448271A (en) A kind of no card withdrawal method, computer readable storage medium and server
CN101114326A (en) Systems and methods for computer device authentication
CN108229956A (en) Network bank business method, apparatus, system and mobile terminal
NO174730B (en) Procedure for routing secret data keys to security modules and user cards in an information processing network
CN107294916A (en) Single-point logging method, single-sign-on terminal and single-node login system
CN106549920A (en) Log-on message input method, log-on message store method and relevant apparatus
CN106341234A (en) Authorization method and device
CN101894235B (en) Smart card security session system
CN104021335B (en) Password service method based on extensible password service framework
CN103489101A (en) Safe electronic payment system and payment method based on converged communication technology
CN109214161A (en) A kind of two-dimension code safe label login system
CN102075327A (en) Method, device and system for unlocking electronic key
CN105320891B (en) A kind of method and device of computer security loading system mirror image
CN111813614A (en) Debugging processing method and device and debugging processing system
CN109766152A (en) A kind of exchange method and device
CN108768963A (en) The communication means and system of trusted application and safety element
CN109587142A (en) A kind of the data safety AM access module and equipment of service-oriented stream

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180501