Method of using cryptographic equipment by JAVASCRIPT

A cryptographic device and parameter technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as process crashes, hidden safety hazards, and complicated use, and achieve the effects of enhancing stability, ensuring security, and reducing complexity

Inactive Publication Date: 2015-11-18
ZHEJIANG ICINFO TECH
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is necessary to develop plug-ins and corresponding scripts for the browser core. Due to the variety of browser cores, each plug-in technology has a lot of learning and development costs, and the browser is still developing, and the plug-in technology is often updated, such as Google browser. Different versions of the server support different plug-in technologies, and the maintenance cost will be relatively high
[0013] 2. Affect the stability of the application system
Because the plug-in method is to expand the function by loading the plug-in, the plug-in will often cause the browser to be unstable and crash. crashed
[0014] 3. Security issues
Plug-ins are closely integra

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of using cryptographic equipment by JAVASCRIPT

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045]1、部署一台密码设备HTTPS服务器,用来处理密码设备请求。该服务器与密码设备对接,通过密码设备的应用接口访问密码设备。

[0046]2、WEB应用后台配置密码设备HTTPS服务的地址和端口。WEB应用页面通过密码设备HTTPS服务的地址和端口访问部署在远程的密码设备。

[0047]3、WEB应用页面在需要进行密码设备操作的时候调用密码设备HTTPS服务的授权认证,终端用户在密码设备HTTPS服务的授权认证页面上输入用户名和密码。认证通过后WEB应用获得一个授权的令牌。

[0048]4、WEB应用页面脚本通过的SRC属性调用调用密码设备HTTPS服务,并传入授权的令牌。先传入缓存数据,例如加密操作,先将加密原文分成1500字节长度多个数据段,将数据段BASE64防止特殊字符。然后循环发送,每次发送的示例代码如下:

[0049]varhead=document.getElementsByTagName('head')[0];

[0050]varscript=document.createElement('script');

[0051]script.type='text / javascript';

[0052]script.onload=script.onreadystatechange=function(){

[0053]if(!this.readyState||this.readyState==="loaded"||this.readyState==="complete"){

[0054]script.onload=script.onreadystatechange=null;

[0055]}};

[0056]script.src='https: / / 密码设备HTTPS服务地址:端口 / CryptService?callback=onCallBack&method=cache&guid=340282366920938463463374607431768211456&total=120&sn=1&len=1500&expired=10m&data=……&token=64a0623103634c71a94cd8ef1e3581f5';

[0057]head.appendChild(script);

[0058]}

[0059]其中method为cache标识本次调用为数据缓存。gui...

Embodiment 2

[0089]1、在终端用户的计算机上部署密码设备HTTPS服务,服务地址为127.0.0.1,端口为空闲端口:9818。这个密码设备HTTPS服务访问接入到终端计算机上密码设备,如智能卡钥匙等。

[0090]2、WEB应用后台配置密码设备HTTPS服务的地址和端口。WEB应用页面通过密码设备HTTPS服务的地址和端口访问接入终端计算机的密码设备。

[0091]3、WEB应用页面脚本通过的SRC属性调用调用密码设备HTTPS服务,并传入授权的令牌。先传入缓存数据,例如加密操作,先将加密原文分成1500字节长度多个数据段,将数据段BASE64防止特殊字符。然后循环发送,每次发送的示例代码如下:

[0092]varhead=document.getElementsByTagName('head')[0];

[0093]varscript=document.createElement('script');

[0094]script.type='text / javascript';

[0095]script.onload=script.onreadystatechange=function(){

[0096]if(!this.readyState||this.readyState==="loaded"||this.readyState==="complete"){

[0097]script.onload=script.onreadystatechange=null;

[0098]}};

[0099]script.src='https: / / 密码设备HTTPS服务地址:端口 / CryptService?callback=onCallBack&method=cache&guid=340282366920938463463374607431768211456&total=120&sn=1&len=1500&expired=10m&data=……&token=64a0623103634c71a94cd8ef1e3581f5';

[0100]head.appendChild(script);

[0101]}

[0102]其中method为cache标识本次调用为数据缓存。guid为缓存数据标识,total为数据段数目,sn为数据段序号,len为数据体长度,expired为时效时间(10m表示十分钟,即收到第一段...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Method of using cryptographic equipment by JAVASCRIPT. The method comprises the following steps: step 1) of accessing the HTTPS (Hyper Text Transfer Protocol) service of the cryptographic equipment by the applied WEB page JavaScript script through an SRC (Source) attribute of a <script> tag by an HTTPS protocol, and putting the parameter data into an URL (Uniform Resource Locator) link; step 2) of requiring a caller to verify the identity after acquiring the parameters in the URL required by the HTTPS by the HTTPS service of the cryptographic equipment, after the identity verification is passed, operating the cryptographic equipment according to the parameters; step 3) of returning an operating result of the cryptographic equipment by means of balling back a JavaScript function in the WEB page after the operation is finished; acquiring the operating result in the JavaScript callback function by the applied WEB page, and then processing the operating result according to an own business process. The method of using the cryptographic equipment by JAVASCRIPT provided by the invention has the advantages of being free from a browser plug-in, cross-platform, flexible in deployment, high in security, convenient, supporting very long data and saving cost and the like.

Description

technical field [0001] The invention relates to the technical field of using cryptographic devices in Internet WEB applications, and in particular to cross-platform technology of multiple different core browsers, WEB page script cross-domain access technology, and browser plug-in technology. Background technique [0002] Cryptographic devices refer to devices that use cryptographic algorithms to generate, store, and calculate passwords. Common ones include encryption cards, encryption machines, smart cryptographic keys (also known as USB-keys, U-shields), operating system certificate storage areas, and encryption services. Algorithms such as my country's national secret standard SM1 / SM2 require hardware implementation. Cryptographic devices generally provide an application interface (API), through which the cryptographic device can be operated, but the API of the cryptographic device is generally a C / C++ interface. [0003] Invoking a password device generally requires auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/06
Inventor 王忠义
Owner ZHEJIANG ICINFO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products