Method and device for browser to access smart key equipment

A technology of intelligent key device and browser, applied in the field of communication

Active Publication Date: 2016-10-26
FEITIAN TECHNOLOGIES
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the innovation of browsers, new browsers such as IE10, firefox11, chrome41, safari 6 and above versions are constantly coming out, but they abandon the use of the original NPAPI, ActiveX and other controls, so bas

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for browser to access smart key equipment
  • Method and device for browser to access smart key equipment
  • Method and device for browser to access smart key equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0114] Embodiment 1 of the present invention provides a method for implementing browser access to smart key devices, such as figure 1 shown, including:

[0115] Step 101: The simulated server receives the first data sent by the browser, and judges whether the first data conforms to the first WebSocket preset format, and if so, parses the first data to obtain communication parameters, and executes step 102, otherwise reports an error and ends;

[0116] In this embodiment, before step 101, it also includes:

[0117] Step a: Create a WebSocket connection between the simulated server and the browser;

[0118] In this embodiment, step a specifically includes:

[0119] Step a1: The simulated server receives the connection request sent by the browser, and judges whether the connection request conforms to the second WebSocket preset format. 2. The connection request response data in the preset format of WebSocket, otherwise an error will be reported and the end will be completed; ...

Embodiment 2

[0164] Embodiment 2 of the present invention provides a method for implementing a browser to access a smart key device, such as figure 2 and image 3 shown, including:

[0165] Step 201: the browser enters the page for invoking the smart key device for operation;

[0166] For example: online banking login page, password modification page, signature page, etc.;

[0167] Preferably, in this embodiment, the acquisition of the serial number of the smart key device is taken as an example for description, and the browser enters the page for obtaining the serial number of the smart key device.

[0168] Step 202: The browser judges whether this operation is the first operation, if so, execute step 203, otherwise execute step 212;

[0169] Specifically, the browser judges whether the WebSocket connection flag is set, and if so, confirms that this operation is not the first operation, otherwise confirms that this operation is the first operation;

[0170] Preferably, in this embodi...

Embodiment 3

[0270] Embodiment 3 of the present invention provides a workflow of simulating the server in the implementation method of browser access to the smart key device. In this embodiment, the serial number of the smart key device is taken as an example for illustration. When the establishment is successful, the browser creates the communication identification related to the access to the smart key device, and organizes the created communication identification according to the first WebSocket preset format to obtain the third data, and sends the obtained third data to the mock server; Figure 4 As shown, the mock server does the following:

[0271] Step 301: The simulated server waits for and receives the third data sent by the browser, and after receiving the third data, executes Step 302;

[0272] Preferably, in this embodiment, the received third data is: 81 9c 9b b8 cc 5c e0 9a 98 33f0 dd a2 7e a1 9a 8d 18 a8 8c 8a 1f ac 8c fe 6f af 88 8e 18 df 8b ee 21 .

[0273] Step 302: th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for a browser to access smart key equipment. The method comprises the following steps: an analog server receives first data from a browser, and when judging that the first data is in accordance with a first WebSocket preset format, the analog server analyzes the first data to get communication parameters; the analog server queries and calls the drive interface of smart key equipment according to the communication parameters, and the drive interface sends a corresponding instruction to the smart key equipment and receives an operation result returned by the smart key equipment; and the analog server organizes the operation result received by the drive interface to get second data in accordance with the first WebSocket preset format, and returns the second data to the browser. According to the technical scheme of the invention, the tradition method in which a control is used as a medium to access smart key equipment is abandoned, the method can be compatible with a novel browser effectively, and smart key equipment can be accessed based on a browser to perform a series of operations including identification and information modification.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and a device for a browser to access an intelligent key device. Background technique [0002] Today, with the rapid development of information technology, the network has become an important role in life, and subsequently, security issues such as browser-based information identification and identity authentication through smart key devices, such as USB Keys, have also become highly sought after. Focus on top priority. With the innovation of browsers, new browsers such as IE10, firefox11, chrome41, safari 6 and above versions are constantly coming out, but they abandon the use of the original NPAPI, ActiveX and other controls, so based on the above-mentioned new browsers, they cannot be used The control is used as a medium to use the smart key device to perform a series of operations such as identity authentication and information modification. Contents of the invention [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0853H04L67/02H04L69/162
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products