Working method and device of intelligent key device

A technology of smart key device and working method, which is applied in the field of smart key device work, can solve problems such as excessive storage overhead, complex logical structure, and poor user experience, and achieve improved user experience, simple logical structure, and low storage overhead Effect

Active Publication Date: 2018-06-22
FEITIAN TECHNOLOGIES
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If PKCS#15 needs to support encryption service providers or software key storage providers, it is necessary to manage the container name and the correspondence between the container name and the key by itself. There are too many attribute information in object storage, and the operation is cumbersome.
[0004] In the existing technology, the PKI function cannot be realized on some smart key devices with small capacity, and the application program must be installed to use when logging in with a smart card, the logical structure is complex, the storage overhead is too large, and the user experience is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Working method and device of intelligent key device
  • Working method and device of intelligent key device
  • Working method and device of intelligent key device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] This embodiment provides a working method of a smart key device, such as figure 1 shown, including:

[0044] The smart key device waits for the instruction to be received. When receiving the instruction to create a key file sent by the upper-layer application, execute step S1; when receiving the instruction to generate a key pair sent by the upper-layer application, execute step S2; When the signature management security environment command is executed, step S3 is executed; when the signature instruction sent by the upper layer application is received, step S4 is executed;

[0045] Step S1, the smart key device judges whether the corresponding location identifier can be found in the key retrieval table according to the key identifier carried in the instruction to create a key file, and if yes, an error will be reported; otherwise, the key file will be created and the key will be created The key identifier carried in the file instruction is set as the file name of the k...

Embodiment 2

[0076] This embodiment discloses a working method of a smart key device, such as figure 2 As shown, the method specifically includes:

[0077] Step 101, the smart key device receives the application selection instruction sent by the upper application, and obtains the identifier of the application directory file carried in the application selection instruction;

[0078] Specifically, the instruction for selecting an application may specifically be: 00a4040009a00000039742544659. These include selection header: 00a40400 and application number: a00000039742544659;

[0079] Step 102, the smart key device selects the application directory file according to the identifier of the application directory file, obtains file control information, and returns to the upper application;

[0080] Specifically, when the smart key device receives the application selection instruction sent by the upper layer application, the java virtual machine in the device matches each application program in...

Embodiment 3

[0118] This embodiment discloses a working method of a smart key device, which is applied to a system including an upper-layer application and a smart key device. The upper-layer application communicates with the smart key device (hereinafter referred to as the device) directly or through other devices. or media, etc., which are not specifically limited in the present invention. The methods specifically include:

[0119] Generate a key pair process, such as image 3 shown, including:

[0120] Step 201, the upper layer application sends an instruction to select an application to the device;

[0121] In this embodiment, the upper-layer application sends an instruction to select an application to the device. After the device receives the instruction, the java virtual machine in the device matches each application program in the device according to the AID (Application Identifie) in the instruction, and then Send the command to the matching application.

[0122] Specifically, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a working method and device of an intelligent key device, related to the field of computer. The working method of the intelligent key device comprises the following steps: whenan instruction of creating a key file sent by an upper layer application is received, the key file is created, the key identification carried in the instruction of creating the key file is set as thefile name of the key file, and the location identification corresponding to the key identification is saved to a key retrieval table; when an instruction of generating a key pair sent by the upper layer application is received, the corresponding key file is found according to the location identification, the key pair is generated when judging that no key pair is in the key file, and the private key is saved; when a signature instruction sent by the upper layer application is received, the private key in the private key file is called to sign the signature data carried in the signature instruction and obtain the signature result, and the signature result is returned to the upper layer application. The technical scheme disclosed by the invention has simple logical structure, simple operation and small storage cost, which improves the user experience.

Description

technical field [0001] The invention relates to the field of computers, in particular to a working method and device for an intelligent key device. Background technique [0002] PKI (English full name Public Key Infrastructure, public key infrastructure) is a standard-compliant technology and specification that uses public key encryption technology to provide a secure basic platform for the development of e-commerce. It is to support public key management and support Infrastructure for authentication, encryption, integrity and accountability services. [0003] PKCS (The Public-Key Cryptography Standards) is a set of public key cryptography standards developed by RSA Data Security Company and its partners, including certificate application, certificate renewal, certificate revocation table release, extended certificate content and digital signature, digital A series of related agreements on the format of the envelope, etc. Among them, PKCS#15 is a password token information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0825H04L9/088H04L9/0894
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products