Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for safely producing intelligent key device

A technology of smart key equipment and safe production, which is applied to record carriers used by machines, instruments, digital mark record carriers, etc., and can solve problems such as message interception and insecure production process

Active Publication Date: 2012-12-19
FEITIAN TECHNOLOGIES
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, during the production process of the smart key device, the terminal needs to create files, add keys, write relevant hardware information and public key algorithms, etc. to generate corresponding commands and send them one by one to the smart key device for parsing commands. Messages may be intercepted during the process of sending commands, making the production process unsafe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for safely producing intelligent key device
  • Method and device for safely producing intelligent key device
  • Method and device for safely producing intelligent key device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] Embodiment 1 of the present invention provides a method for safely producing a smart key device. A log containing basic information of the smart key device is stored in the terminal. The basic information includes a PIN code, a production key, a key object, and a file object. and related hardware information, etc. Such as figure 1 As shown, the method includes:

[0090] Step S1: The smart key device is powered on and initialized, waiting to receive USB data;

[0091] Step S2: The smart key device judges whether its life cycle status is in the production stage, if yes, execute step S3, otherwise execute step S7;

[0092] Step S3: The smart key device waits for the command to be issued by the receiving host. When the command is received, the command type is detected. If it is a production command, execute step S4. If it is a sealing command, execute step S5. If it is another command, report an error and return to step S3;

[0093] Specifically, in this embodiment, the ...

Embodiment 2

[0101] The second embodiment of the present invention provides a method for safely producing a smart key device, which is suitable for the production stage of the smart key device, and the backup data containing the basic information of the smart key device is stored in the terminal, and the basic information includes the PIN code , production keys, key objects, file objects, and related hardware information, etc. Such as figure 2 As shown, the method includes:

[0102] Step 101: The smart key device is powered on and initialized, waiting to receive USB data;

[0103] Step 102: The smart key device judges whether its life cycle status is in the production stage, if yes, execute step 103, otherwise perform application operation;

[0104] Step 103: The smart key device waits to receive an instruction issued by the host, and when receiving an instruction issued by the host, judges whether it is a production instruction, if yes, execute step 104, otherwise execute step 106;

...

Embodiment 3

[0119] The third embodiment of the present invention provides a method for securely producing a smart key device, which is suitable for the application stage of the smart key device, and the backup data containing the basic information of the smart key device is stored in the terminal, and the basic information includes the PIN code , production keys, key objects, file objects, and related hardware information, etc. Such as image 3 As shown, the method includes:

[0120] Step 201: The smart key device is powered on and initialized, waiting to receive USB data;

[0121] Step 202: The smart key device judges whether the normal flag of the file is set, if yes, execute step 206, otherwise execute step 203;

[0122] Step 203: the smart key device overwrites the backup data in the system file with the backup data in the auxiliary space;

[0123] Specifically, in this embodiment, if the backup data in the auxiliary space is compressed data, first decompress the compressed backup ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for safely producing an intelligent key device. The method comprises the steps of: electrifying and initializing the intelligent key device, and waiting for receiving USB (Universal Serial Bus) data; detecting the type of an instruction when the instruction is received at a production stage; analyzing the instruction and writing the analyzed backup data into a system file if the instruction is a production instruction, calculating a current check value according to the backup data, and storing the backup data into a developed subsidiary space; if the instruction is a sealing instruction, analyzing the instruction and judging whether the analyzed check value accords with the current check value, if so, modifying the life cycle scale state into the application stage, and if not, reporting an error; judging whether the instruction is an instant recovery instruction when being received at the application stage, and if so, covering the backup data in the system file by the backup data of the subsidiary space; and reporting the error if the instruction is the production instruction, and carrying out corresponding operation and returning an operation result to a host computer if the instruction is other instruction. According to the method and the device, disclosed by the invention, the security in the production of the intelligent key device is improved.

Description

technical field [0001] The invention relates to the field of electronic product equipment, in particular to a method and device for securely producing smart key equipment. Background technique [0002] A smart key device (USBKEY) is a hardware device with a USB interface. It has a built-in single-chip microcomputer or smart card chip, has a certain storage space, can store the user's private key and digital certificate, and uses the built-in public key algorithm to realize the authentication of the user's identity. In the existing technology, during the production process of the smart key device, the terminal needs to create files, add keys, write relevant hardware information and public key algorithms, etc. to generate corresponding commands and send them one by one to the smart key device for parsing commands. Messages may be intercepted during the process of sending commands, making the production process unsafe. Contents of the invention [0003] The object of the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K1/12G06K19/073
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products