Method for information safety device to achieve multiple applications, and information safety device and system

An information security system and information security technology, applied in the field of information security equipment and systems, can solve the problem that information security equipment cannot support multiple applications, improve portability and hardware compatibility, facilitate development and writing and function expansion, improve The effect of development efficiency

Active Publication Date: 2014-05-14
TENDYRON CORP
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method for information security equipment to realize multiple applications, an information security equipment for realizing multiple applications, and an information security system for realizing multiple applications, so as to at least solve the problem that information security equipment in the prior art cannot support multiple applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for information safety device to achieve multiple applications, and information safety device and system
  • Method for information safety device to achieve multiple applications, and information safety device and system
  • Method for information safety device to achieve multiple applications, and information safety device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] This embodiment provides a method for an information security device to implement multiple applications. In this embodiment, the terminal may be a personal computer PC, etc., and the information security device may be a smart key device (such as a USB key, an audio key, etc.). By adopting the method provided by the embodiment of the present invention, the information security device can not only realize the signature function, but also realize many different applications.

[0026] figure 1 A flow chart of the method for implementing multiple applications for the information security device provided in Embodiment 1 of the present invention, as shown in figure 1 shown, including the following steps:

[0027] In step 101, the terminal compiles and transforms the written application program to obtain an intermediate code file of the application program.

[0028] Wherein, the application program may be written in a high-level language, such as BASIC language, True BASIC la...

Embodiment 2

[0055] This embodiment provides an information security device implementing multiple applications, which can be used to implement the operations performed by the information security device in the method described in Embodiment 1. like figure 2 As shown, the information security equipment includes:

[0056] Sending module 21, is used for sending application program download request to terminal;

[0057] The receiving module 22 is configured to receive the intermediate code files of at least two application programs sent by the terminal for download, and the intermediate code files of the application programs are obtained by the terminal after compiling, transforming and safety checking the written application programs;

[0058] The storage module 23 is connected to the receiving module 22, and is used to save the intermediate code files of at least two application programs received by the receiving module 22;

[0059] The receiving module 22 is also configured to receive th...

Embodiment 3

[0067] This embodiment provides an information security system for implementing multiple applications, which can be used to implement the method for implementing multiple applications by an information security device described in Embodiment 1. like image 3 As shown, the system includes: an information security device 20 and a terminal 30, and the information security device 20 may be the information security device as described in Embodiment 2.

[0068] The terminal 30 is used for compiling and transforming the written application program to obtain the intermediate code file of the application program; performing security verification on the intermediate code file; and saving the intermediate code file passing the security verification; An application program download request; obtaining intermediate code files of at least two application programs requested to be downloaded according to the download request; and sending the intermediate code files of at least two application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for an information safety device to achieve multiple applications, the information safety device and an information safety system. The method comprises the steps that a terminal is used for compiling and converting written application programs so as to obtain intermediate code files; the terminal conducts safety verification on the intermediate code files and stores the intermediate code files passing through the safety verification; the terminal receives an application program downloading request sent by the information safety device and obtains the intermediate code files of at least two application programs needing to be downloaded according to the downloading request; the terminal sends the intermediate code files of the application programs to the information safety device; the information safety device receives and stores the intermediate code files of the application programs; the information safety device receives a first execution instruction; an intermediate code interpreter of the information safety device executes the intermediate code files of the application program indicated by the first execution instruction, wherein the intermediate code files are used for calling an API of the information safety device so as to control hardware of the information safety device.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a method for realizing multiple applications of information security equipment, information security equipment and a system. Background technique [0002] With the rapid development of Internet technology and e-commerce, information security issues have become increasingly prominent. Therefore, a variety of information security devices for protecting sensitive information of users have been produced. These devices cooperate with public key infrastructure (Public Key Infrastructure, PKI) and other systems. It can effectively guarantee various information security operations such as user data interaction, identification information, and authority management. [0003] However, the existing information security equipment can usually only be used for one function. If you want to realize multiple functions, you need to purchase multiple information security equipment, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/53
CPCG06F21/52G06F21/53G06F21/629
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products