Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment

A smart key device and smart key technology are applied to a method for improving the stability of smart key devices and the field of smart key devices, which can solve instability, delay command processing, and reduce the stability of smart key devices and computers. Sex and other issues to achieve safe use and improve stability

Active Publication Date: 2009-04-29
FEITIAN TECHNOLOGIES
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The command received / sent by multiple virtual devices to the host is executed by the same processor inside the composite device, which will lead to the unavoidable problem of instruction crossing when the computer and the composite device perform data exchange or data calculation, that is, When the computer processes the instructions sent by multiple virtual devices in the composite device, or when the composite device processes multiple cross-commands received from the computer, instability occurs. The command processing process of the virtual device is likely to delay the processing of commands of other virtual devices, or there may be mishandling, which reduces the stability of the smart key device when interacting with the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment
  • Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment
  • Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] see figure 1 , this embodiment provides a method for improving the stability of the smart key device. In this embodiment, the composite device declared by the smart key device contains multiple virtual devices of different types. The method specifically includes:

[0057] Step 101: the smart key device is connected to the host;

[0058] Step 102: The smart key device starts the first interrupt, which is specifically the USB interrupt in this embodiment, and reports itself to the host as a composite device. In this embodiment, the composite device includes two virtual devices, a SCSI device and a HID device, as an example Be explained;

[0059] Step 103: the smart key device receives the message command sent by the host, closes the USB interrupt, parses and processes the message command;

[0060] Step 104: The smart key device judges whether the time required to process the message command exceeds the preset time, if yes, then considers that the message command needs t...

Embodiment 2

[0076] see figure 2 , this embodiment provides a method for improving the stability of the smart key device. In this embodiment, the compound device declared by the smart key device contains multiple virtual devices of the same type. The method specifically includes:

[0077] Step 201: the smart key device is connected to the host;

[0078] Step 202: The smart key device starts the first interrupt, specifically the USB interrupt in this embodiment, and reports itself to the host as a composite device. In this embodiment, the composite device includes three virtual devices: HID1 device, HID2 device and HID3 device. equipment as an example to illustrate;

[0079] Step 203: the smart key device receives the message command sent by the host, then closes the USB interrupt, parses and processes the message command;

[0080] Step 204: The smart key device judges the type of the message command according to the type of the virtual device, if the message command is an immediate resp...

Embodiment 3

[0093] see image 3 , the embodiment of the present invention provides a smart key device, including:

[0094] The USB interface module 301 is used to establish a connection between the smart key device and the host;

[0095] The first interrupt module 302 is configured to enable the first interrupt, and report to the host that the smart key device is a composite device, the composite device includes at least two virtual devices, and after the USB interface module 301 receives the message command sent by the host, close the second One interrupt, open the first interrupt after receiving the notification;

[0096] The smart key module 303 is used to analyze the message command after the USB interface module 301 receives the message command, and judge whether the time required for processing the message command exceeds the preset time, if not exceed the preset time Set the time, then process the message command and save the processing result, then notify the first interrupt mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention pertaining to the field of information security, discloses a method for improving stability of an intelligent key device and an intelligent key device. The method comprises the steps of the intelligent key device establishing a connection with a host computer, opening a first interruption, reporting to the host computer that the intelligent key device is a composite device which at least comprises two virtual units, receiving and analyzing message commands sent by the host computer, closing the first interruption, judging that whether the time needed for processing the message commands exceeds a predetermined time, if true, processing the message commands, opening a second interruption, keeping processing when receiving subsequent message commands or informing the host computer to perform a delay process, closing the second interruption and opening the first interruption; if not, processing the message commands, storing the processing result and opening the first interruption. The intelligent key device comprises a USB interface module, a first interruption module, an intelligent key module and a second interruption module. According to the present invention, stability of communication between the intelligent key device and the computer is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for improving the stability of an intelligent key device and the intelligent key device. Background technique [0002] With the development of information security technology, the application of smart key devices is becoming more and more extensive. The smart key device is a small hardware device with a USB (Universal Serial Bus, Universal Serial Bus) interface. COS), which can store the user's key and digital authentication certificate, use the built-in cryptographic algorithm to realize the authentication of the user's identity, with email encryption, digital signature, security certificate, secure network login and access SSL (Security Socket Layer, Secure socket layer protocol layer) security network and other functions, and has the characteristics of ensuring that the user's private key never leaves the hardware, and also has the characteristics of physical atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/56
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products