Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing multiple applications by information security equipment, information security equipment and system

An information security, multi-application technology, applied in the field of information security equipment and systems, can solve the problem that information security equipment cannot support multiple applications, improve portability and hardware compatibility, facilitate development and writing and function expansion, and improve development. The effect of efficiency

Active Publication Date: 2017-09-19
TENDYRON CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method for information security equipment to realize multiple applications, an information security equipment for realizing multiple applications, and an information security system for realizing multiple applications, so as to at least solve the problem that information security equipment in the prior art cannot support multiple applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing multiple applications by information security equipment, information security equipment and system
  • Method for realizing multiple applications by information security equipment, information security equipment and system
  • Method for realizing multiple applications by information security equipment, information security equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] This embodiment provides a method for an information security device to implement multiple applications. In this embodiment, the terminal may be a personal computer PC, etc., and the information security device may be a smart key device (such as a USB key, an audio key, etc.). By adopting the method provided by the embodiment of the present invention, the information security device can not only realize the signature function, but also realize many different applications.

[0026] figure 1 A flow chart of the method for implementing multiple applications for the information security device provided in Embodiment 1 of the present invention, as shown in figure 1 shown, including the following steps:

[0027] In step 101, the terminal compiles and transforms the written application program to obtain an intermediate code file of the application program.

[0028] Wherein, the application program may be written in a high-level language, such as BASIC language, True BASIC la...

Embodiment 2

[0055] This embodiment provides an information security device implementing multiple applications, which can be used to implement the operations performed by the information security device in the method described in Embodiment 1. Such as figure 2 As shown, the information security equipment includes:

[0056] Sending module 21, is used for sending application program download request to terminal;

[0057] The receiving module 22 is configured to receive the intermediate code files of at least two application programs sent by the terminal for download, and the intermediate code files of the application programs are obtained by the terminal after compiling, transforming and safety checking the written application programs;

[0058] The storage module 23 is connected to the receiving module 22, and is used to save the intermediate code files of at least two application programs received by the receiving module 22;

[0059] The receiving module 22 is also configured to receive...

Embodiment 3

[0067] This embodiment provides an information security system for implementing multiple applications, which can be used to implement the method for implementing multiple applications by an information security device described in Embodiment 1. Such as image 3 As shown, the system includes: an information security device 20 and a terminal 30, and the information security device 20 may be the information security device as described in Embodiment 2.

[0068] The terminal 30 is used for compiling and transforming the written application program to obtain the intermediate code file of the application program; performing security verification on the intermediate code file; and saving the intermediate code file passing the security verification; An application program download request; obtaining intermediate code files of at least two application programs requested to be downloaded according to the download request; and sending the intermediate code files of at least two applicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for information security equipment to realize multiple applications, information security equipment and a system. The method includes: the terminal compiles and converts the written application program to obtain an intermediate code file; the terminal performs security verification on the intermediate code file and saves it. The intermediate code file that passes the security verification; the terminal receives the application program download request sent by the information security device, and obtains the intermediate code files of at least two application programs that are requested to be downloaded according to the download request; the terminal sends the at least two application program files to the information security device The intermediate code file of the application program; the information security device receives and saves the intermediate code files of the at least two application programs; the information security device receives the first execution command; the intermediate code interpreter on the information security device executes the instruction indicated by the first execution command The intermediate code file of the application program, wherein the intermediate code file is used to call the API of the information security device to control the hardware of the information security device.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a method for realizing multiple applications of information security equipment, information security equipment and a system. Background technique [0002] With the rapid development of Internet technology and e-commerce, information security issues have become increasingly prominent. Therefore, a variety of information security devices for protecting sensitive information of users have been produced. These devices cooperate with public key infrastructure (Public Key Infrastructure, PKI) and other systems. Effectively guarantee various information security operations such as user data interaction, identification information, and authority management. [0003] However, the existing information security equipment can usually only be used for one function. If you want to realize multiple functions, you need to purchase multiple information security equipment, which will m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/52G06F21/53
CPCG06F21/52G06F21/53G06F21/629
Inventor 李东声
Owner TENDYRON CORP