Method and system for realizing browser access to intelligent key device

An intelligent key device and browser technology, applied in the field of communications, can solve problems such as hidden dangers, system security, browser crashes, etc., and achieve the effects of high security, good stability, and wide application range.

Inactive Publication Date: 2016-12-07
FEITIAN TECHNOLOGIES
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In particular, NPAPI technology has the following defects: the plug-in implemented by NPAPI technology cannot support the mobile platform; the NPAPI plug-in implemented by using NPAPI technology runs outside the browser, so it has the highest authority for the current user to access the local computer, and hackers can use the loopholes in the NPAPI plug-in Malicious programs are executed on the local computer, making the system a security risk; at the same time, the stability of the NPAPI plug-in and the stability of the data output from the NPAPI plug-in to the browser are uncontrollable, which may easily cause the browser to crash

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing browser access to intelligent key device
  • Method and system for realizing browser access to intelligent key device
  • Method and system for realizing browser access to intelligent key device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides a method for implementing a browser to access a smart key device, such as figure 1 shown, including the following steps:

[0032] Step S1: the extension program receives the first data from the browser, and sends the first data to the local application program;

[0033] Step S2: The local application parses the first data to obtain communication parameters, calls the driver interface of the smart key device according to the communication parameters, sends corresponding instructions to the smart key device, and receives the operation result returned by the smart key device;

[0034] Step S3: The local application program organizes the second data according to the received operation result, and sends the second data to the extension program;

[0035] Step S4: the extension program receives the second data, and sends the second data to the browser.

[0036] In the above step S1 of this embodiment, before the extension program sends the first data...

Embodiment 2

[0075] This embodiment provides a method for implementing a browser to access a smart key device, which is applied to a system including a browser, an extension program, a local application program, and a smart key device. Such as figure 2 shown, including:

[0076] Step H1: The extension program registers the browser monitoring interface and waits to receive data from the browser.

[0077] Specifically, the extension program registers the browser monitoring interface, specifically: when the extension program starts, the extension program registers the first extension function as the browser monitoring interface. More specifically, the extension program registers the first extension function as the browser monitoring interface, specifically: the extension program invokes the first system function to register the first extension function as the browser monitoring interface.

[0078] For example, the first extension function is: function(data, sender, sendResponse);

[0079]...

Embodiment 3

[0231] This embodiment provides a method for implementing a browser to access a smart key device, which is applied to a system including a browser, an extension program, a local application program, and a smart key device. Such as image 3 shown, including:

[0232] Step 300: the extension program registers the long link request monitoring interface;

[0233] Specifically, when the browser is started, the extension program registers the first extension function as the long link request monitoring interface. More specifically, when the browser is started, the extension program calls the first system function to register the first extension function as a long link request monitoring interface.

[0234] For example, the first extension function is: function(port2Web), port2Web;

[0235] The first system function is: chrome.runtime.onConnectExternal.addListener;

[0236] The long link request listener interface registered by the extension program is: chrome.runtime.onConnectEx...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for realizing browser access to an intelligent key device, and belongs to the communication field. The method comprises the following steps: an extension program receiving the first data from a browser, and sending the first data to a local application program; the local application program analyzing the first data to obtain the communication data, invoking a driver interface of the intelligent key device according to the communication parameter, sending a corresponding instruction to the intelligent key device, and receiving an operation result returned by the intelligent key device; the local application program organizing the second data according to the received operation result, and sending the second data to the extension program; the extension program receiving the second data, and sending the second data to the browser. The method and system disclosed by the invention can replace the communication way of the browser to access the local computer through the NPAPI technology, and have the advantages of being wide in application range, high in security and good in stability.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for realizing browser access to smart key equipment. Background technique [0002] As the technical architecture of the last century, NPAPI technology can no longer meet the current needs. In 2014, Mozilla announced the death of NPAPI, and major manufacturers also announced that they would no longer support NPAPI technology. Chrome browser, as a mainstream browser, has blocked NPAPI plug-ins by default since January 2015, so Chrome browser has been unable to access plug-ins developed using NPAPI technology. [0003] In particular, NPAPI technology has the following defects: the plug-in implemented by NPAPI technology cannot support the mobile platform; the NPAPI plug-in implemented by using NPAPI technology runs outside the browser, so it has the highest authority for the current user to access the local computer, and hackers can use the loopholes in the NPAPI plug-i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F17/30
CPCG06F21/606G06F16/972G06F2221/2141
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products