Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Abnormity processing method and abnormity processing device

An abnormal and abnormal event technology, applied in the field of information security, can solve the problem of not saving the communication state and the information input by the user.

Active Publication Date: 2015-12-09
FEITIAN TECHNOLOGIES
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, when the smart key device communicates with the mobile terminal, if it encounters an abnormal situation such as an incoming call, a text message or an alarm clock, it will immediately interrupt the communication, exit the mobile terminal, and will not save the communication status and user input before the abnormal situation occurs. information, when the mobile terminal restarts, it needs to restart

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormity processing method and abnormity processing device
  • Abnormity processing method and abnormity processing device
  • Abnormity processing method and abnormity processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0101] Embodiment 1 of the present invention provides a method for handling exceptions, such as figure 1 shown, including:

[0102] Step 101: The mobile terminal initializes, organizes the data to be signed, and generates a signature instruction according to the data to be signed;

[0103] In this embodiment, the initialization specifically includes: setting the screen status to highlight, initializing the number of PIN code verifications, setting the number of signature command sending times to the initial value, setting the number of signature result acquisition times to the initial value, resetting the abnormal event flag, and starting System event monitoring service.

[0104] Among them, after the mobile terminal is initialized, it also includes: receiving the PIN code input by the user, judging whether the PIN code is correct, if so, organizing the data to be signed, otherwise reporting an error, and ending;

[0105] Specifically, the mobile terminal generates a verific...

Embodiment 2

[0128] Embodiment 2 of the present invention provides a method for handling exceptions, such as figure 2 and image 3 shown, including:

[0129] Step 201: Start the mobile terminal, set the screen state to be highlighted, initialize the number of times of PIN code verification, set the number of command sending times as the initial value, set the number of times of obtaining signature results as the initial value, and set the number of times of obtaining key state as the initial value, Reset the abnormal event identification and start the system event monitoring service;

[0130] Wherein, the mobile terminal sets the screen state to be highlighted, specifically: the mobile terminal sets the idleTimerDisabled system attribute of the mobile terminal to YES, so as to prevent a black screen abnormal event from occurring when the communication is not completed;

[0131] In this embodiment, the mobile terminal receives the event message sent by the system to the mobile terminal t...

Embodiment 3

[0198] Embodiment 3 of the present invention provides a device for handling exceptions, such as Figure 4 shown, including

[0199] Instruction generation module 1: used to organize the data to be signed, and generate signature instructions according to the data to be signed;

[0200] Sending module 2: used to send the signature command to the smart key device, and also used to send the command to obtain the signature result to the smart key device;

[0201] Receiving module 3: used to receive the response returned by the smart key device;

[0202] The first judging module 4: used to judge whether a successful response returned by the smart key device is received within a preset time; it is also used to judge whether the number of times of sending signature instructions reaches the preset number of times;

[0203] The second judging module 5: used for judging whether there is an abnormal event when the first judging module judges that the successful response returned by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an abnormity processing method and an abnormity processing device, belonging to the field of information safety. The abnormity processing method comprises the following steps that: A, a mobile terminal organizes a signature instruction, sends the signature instruction to intelligent secret key equipment, performs a step B if receiving a returned response within a pre-set time, and or else, sends the signature instruction again to reach a pre-set time; and B, the mobile terminal judges whether an abnormal event exists or not, judges whether the continuous event of the abnormal event reaches a pre-set value or not if the abnormal event exists, ends if the continuous event of the abnormal event reaches the pre-set value, performs the step B if the continuous event of the abnormal event does not reach the pre-set value, and sends an instruction for obtaining a signature result to the intelligent secrete key equipment and receives a returned success response if the abnormal event does not exist. By adopting the technical scheme provided by the invention, different abnormity processing methods are adopted aiming at different instructions; and thus, the purposes of normally operating programmes more safely and conveniently when abnormities occur can be achieved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for handling exceptions. Background technique [0002] The smart key device is a secure carrier of digital certificates and private keys based on the public key system, which can achieve reliable identity authentication and data encryption. At present, with the development of mobile banking (Mobile Banking Service, also known as mobile banking), smart key devices based on mobile terminals have emerged. This type of smart key device communicates with The mobile terminal connects and communicates. [0003] In the prior art, when the smart key device communicates with the mobile terminal, if it encounters an abnormal situation such as an incoming call, a text message or an alarm clock, it will immediately interrupt the communication, exit the mobile terminal, and will not save the communication status and user input before the abnormal situation occurs. info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725H04L9/32H04M1/72454
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products