Processing method supporting calling of various safety devices

A security device and processing method technology, applied in the processing field that supports calling multiple security devices, can solve the problems of different API interfaces, functions and algorithms of security service providers, etc., and achieve the effect of large scalability

Active Publication Date: 2014-12-10
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to: aim at the problems existing in the prior art, provide a processing method that supports calling multiple security devices, and solve the problem that the functions and algorithms supported by the security devices provided by various security device manufacturers are ve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method supporting calling of various safety devices
  • Processing method supporting calling of various safety devices
  • Processing method supporting calling of various safety devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] A processing method that supports invoking multiple security devices is used in the connection and communication between a device (such as a computer) installed with an application program and the security device. In principle, the method of the present invention adopts the factory model, and abstracts the functions of security equipment to obtain the equipment base class. The security equipment inherits from the equipment base class. The equipment worker configures the production equipment according to the algorithm, and the manager manages the factory production according to the middleware configuration. The flow chart and sequence diagram of this method are as follows figure 1 , figure 2 As shown, it specifically includes the following steps:

[0033] Step 1. Receive the command to call the initialization interface sent by the application system, and initialize the middleware interface.

[0034] In this step, the process of initializing the middleware interface is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a processing method supporting calling of various safety devices. The method comprises the steps that (1) an instruction of calling an initialization interface is received, and a middleware interface is initialized, wherein the instruction is sent by an application system; (2) safety device interfaces are called to be opened, and a safety device base class object handle is returned; (3) safety service program interfaces of safety devices are called, and safety service program operation results are obtained; (4) the safety device interfaces are called to be closed, and the middleware interface is released. The processing method supporting calling of the various safety devices has the advantages that a user can achieve connection communication between the safety devices and devices provided with application programs without the need of knowing various algorithms or an API, and the user can use the safety devices conveniently.

Description

technical field [0001] The invention relates to the field of information security, in particular to a processing method that supports invoking multiple security devices. Background technique [0002] In information security, security devices provide security services for applications. However, the functions and algorithms supported by security devices provided by various security device manufacturers are quite different, and the API interfaces of security service providers are also different. The API of the device can be divided into three categories. One is that the API supports international standards and specifications, mainly including: CDSA, RSA PKCS#11 Cryptographic Token Interface Standard and Microsoft CryptoAPI, etc.; the other is that the API supports domestic standards, mainly including: GM / T 0016-2012 technical specifications, etc.; the third category is the security device manufacturer's custom API. [0003] Application users obtain security services provided b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/445G06F21/85
Inventor 林俊燕何智陈兴容侯建宁
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products