Method for achieving multi-application of intelligent secret key equipment

An intelligent key device, multi-application technology, applied in the field of information security

Active Publication Date: 2015-03-25
FEITIAN TECHNOLOGIES
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem of how to adapt CSP and PKCS#11 to USB Keys with multiple applications, and provide a method for realizing multiple applications of smart key devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for achieving multi-application of intelligent secret key equipment
  • Method for achieving multi-application of intelligent secret key equipment
  • Method for achieving multi-application of intelligent secret key equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0150] Embodiment 1 of the present invention provides a method for implementing multiple applications of smart key devices, such as Figure 1-Figure 5 shown, including:

[0151] Step 101: When the CSP interface of the middleware is called, the middleware judges the type of the interface. If it is an initialization interface, then execute step 102. If it is to search for a container interface, then execute step 107. If it is to create a container interface, then execute step 125. To delete the container interface, execute step 139; if to create a key interface, execute step 157; if to call the key interface, execute step 161;

[0152] In this embodiment, the key will be invoked by calling the corresponding interface during encryption, decryption, and signature;

[0153] Step 102: the middleware enumerates all USB Keys connected to the host, and creates a device information list according to the enumerated USB Keys, using the first device name in the device information list as the...

Embodiment 2

[0249] Embodiment 2 of the present invention provides a method for implementing multiple applications of smart key devices, such as Image 6 with Figure 7 shown, including:

[0250] Step 201: When the PKCS#11 interface of the middleware is called, the middleware judges the type of the interface, if it is an initialization interface, then execute step 202, if it is an open session interface, then execute step 207, if it is an object interface, then execute step 209 , if it is to delete the object interface, execute step 216;

[0251] In this embodiment, the initialization interface is specifically:

[0252]

[0253] Open the session interface specifically as follows:

[0254]

[0255] Create an object interface specifically as:

[0256]

[0257] The delete object interface is specifically:

[0258]

[0259] Step 202: the middleware enumerates all USB Keys connected to the host through the initialization interface, and creates a device information list according ...

Embodiment 3

[0298] Embodiment 3 of the present invention provides a method for implementing multiple applications of smart key devices, such as Figure 8 with Figure 9 shown, including:

[0299] Step 300: When the national secret interface of the middleware is called, the middleware detects the type of the called interface. If it is an enumerated device interface, execute step 301. If it is a connection device interface, execute step 302. If it is an enumerated application interface Then perform step 303, if it is to create an application interface, then perform step 305, if it is to open an application interface, then perform step 308, if it is to delete an application interface, then perform step 311, if it is to enumerate container interfaces, then perform step 314, if it is to create a container Step 316 is executed for the interface, step 319 is executed if the container interface is opened, step 322 is executed if the container interface is deleted, step 325 is executed if the key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for achieving multi-application of intelligent secret key equipment. the method includes the steps that when an initialized interface of a middleware is called, an equipment information list, an application list and a container list are built; if a built container interface is called, the middleware builds container objects, distributes container sentence handles and correspondingly stores the container sentence handles to the corresponding positions of the container list, and the container sentence handles are returned; if a built secret key interface is called, the middleware builds secret key objects, distributes corresponding secret key IDs, stores the secret key IDs and secret key functions to the secret key objects, stores the secret key IDs to the container objects, and distributes one secret key handle and stores the secret key handle, and the secret key handle is returned; if a deleting container interface is called, the middleware obtains corresponding container object quotations according to equipment names and container names, deleting commands are generated according to the container object quotations and sent to the corresponding intelligent secret key equipment, after the intelligent secret key equipment successfully deletes the corresponding container objects according to the deleting commands, the middleware removes the corresponding container information from the container list.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for realizing multiple applications of an intelligent key device. Background technique [0002] Since the release of the "Smart IC Card and Smart Password Key Application Interface Specification", manufacturers in the industry have not been able to perfectly integrate the multi-application, multi-container and standard CSP interface in the national secret interface. The bidirectional compatibility and data interoperability between reading and writing, Basically adopt one-way compatibility for different projects. Before the introduction of the national secret interface, the way to manage the USB Key (smart key device) application through CSP and PKCS#11 is: only one application is created inside a USB Key (smart key device), and each application can be created under one application. Data objects, such as creating container objects, key objects, etc. Operating the con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products