CN102831362A - Method and device for safely producing intelligent key device - Google Patents

Method and device for safely producing intelligent key device Download PDF

Info

Publication number
CN102831362A
CN102831362A CN2012102596195A CN201210259619A CN102831362A CN 102831362 A CN102831362 A CN 102831362A CN 2012102596195 A CN2012102596195 A CN 2012102596195A CN 201210259619 A CN201210259619 A CN 201210259619A CN 102831362 A CN102831362 A CN 102831362A
Authority
CN
China
Prior art keywords
backup data
instruction
cipher key
intelligent cipher
key equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102596195A
Other languages
Chinese (zh)
Other versions
CN102831362B (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN201210259619.5A priority Critical patent/CN102831362B/en
Publication of CN102831362A publication Critical patent/CN102831362A/en
Application granted granted Critical
Publication of CN102831362B publication Critical patent/CN102831362B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and a device for safely producing an intelligent key device. The method comprises the steps of: electrifying and initializing the intelligent key device, and waiting for receiving USB (Universal Serial Bus) data; detecting the type of an instruction when the instruction is received at a production stage; analyzing the instruction and writing the analyzed backup data into a system file if the instruction is a production instruction, calculating a current check value according to the backup data, and storing the backup data into a developed subsidiary space; if the instruction is a sealing instruction, analyzing the instruction and judging whether the analyzed check value accords with the current check value, if so, modifying the life cycle scale state into the application stage, and if not, reporting an error; judging whether the instruction is an instant recovery instruction when being received at the application stage, and if so, covering the backup data in the system file by the backup data of the subsidiary space; and reporting the error if the instruction is the production instruction, and carrying out corresponding operation and returning an operation result to a host computer if the instruction is other instruction. According to the method and the device, disclosed by the invention, the security in the production of the intelligent key device is improved.

Description

A kind of method of the intelligent cipher key equipment of keeping the safety in production and device
Technical field
The present invention relates to the electronic product apparatus field, relate in particular to a kind of method and device of the intelligent cipher key equipment of keeping the safety in production.
Background technology
Intelligent cipher key equipment (USBKEY) is a kind of hardware device of USB interface.Its built-in single-chip microcomputer or intelligent card chip has certain storage space, can store user's private key and digital certificate, utilizes built-in public key algorithm to realize the authentication to user identity.Prior art is in the intelligent cipher key equipment production run; File need be created in the terminal; Append key; Write generation corresponding command such as related hardware information and public key algorithm and send to intelligent cipher key equipment one by one and carry out resolve command, terminal message in the process of repeatedly sending order might be caused production run dangerous by intercepting and capturing.
Summary of the invention
The objective of the invention is provides a kind of method and device of the intelligent cipher key equipment of keeping the safety in production in order to overcome the deficiency of prior art.
The method of a kind of intelligent cipher key equipment of keeping the safety in production provided by the invention comprises:
Step S1: the intelligent cipher key equipment power-up initializing, wait for receiving usb data;
Step S2: whether said intelligent cipher key equipment judges its life cycle state in the production phase, is execution in step S3 then, otherwise execution in step S7;
Step S3: said intelligent cipher key equipment is waited for receiving under the main frame and is sent instructions; Detect instruction type when receiving when instruction, produce in this way and instruct then execution in step S4, seal in this way and instruct then execution in step S5; Other instructions then report an error in this way, continue the instruction of waiting for that the reception main frame issues;
Step S4: said intelligent cipher key equipment is resolved said production instruction; And the Backup Data in the analysis result is written in the system file; Calculate current proof test value according to said Backup Data; Open up subsidiary space and with the backup data store in the said analysis result in said subsidiary space, return step S3;
Step S5: said intelligent cipher key equipment seals instruction and resolves said, and whether the proof test value in the judge analysis result conform to said current proof test value, is execution in step S6 then, otherwise reports an error, and returns step S3;
Step S6: said intelligent cipher key equipment is revised as the application stage with said life cycle state, returns step S2;
Step S7: said intelligent cipher key equipment waits for receiving under the main frame and sends instructions when receiving instruction, judge whether it is a key restore instruction, is execution in step S9 then, otherwise execution in step S8;
Step S8: said intelligent cipher key equipment judges whether the instruction that receives is to produce instruction, is then to report an error, and returns step S7, otherwise carries out corresponding operating according to the instruction that receives, and operating result is returned to main frame, returns step S7;
Step S9: said intelligent cipher key equipment covers the Backup Data in the said system file with the Backup Data of said subsidiary space, and judges whether to cover completion, is then to return step S7, otherwise finishes current operation, returns step S7.
Wherein, said step S6 also comprises: file is normally identified set.
Carry out following step when wherein, being judged as not among the said step S2 earlier;
Steps A 1: said intelligent cipher key equipment judges that said file normally identifies whether set, is execution in step S7 then, otherwise execution in step A2;
Steps A 2: said intelligent cipher key equipment covers the Backup Data in the said system file with the Backup Data of said subsidiary space;
Steps A 3: said intelligent cipher key equipment judges whether cover to accomplish, and is execution in step A4 then, otherwise returns steps A 2;
Steps A 4: said intelligent cipher key equipment normally identifies set with said file, order execution in step S7.
Wherein, be judged as the following step of elder generation's execution when being among the said step S7:
Step B1: said intelligent cipher key equipment judges that said file normally identifies whether set, is execution in step B2 then, otherwise execution in step S9;
Step B2: said intelligent cipher key equipment resets the normal sign of said file, order execution in step S9.
Wherein, be judged as when being among the said step S9 said file is normally identified set, return step S7.
Wherein, detect the type of instruction among the said step S3 through second byte of instruction, as the data on second byte be 12 for producing instruction, as the data on second byte be 14 for sealing instruction.
Wherein, when said Backup Data during greater than the reception buffer area of said intelligent cipher key equipment, said main frame is divided into polylith with Backup Data and is handed down to said intelligent cipher key equipment.
Wherein, said step S4 specifically comprises:
Step S4-1: said intelligent cipher key equipment is resolved said production instruction, and the Backup Data in the analysis result is written in the system file;
Step S4-2: said intelligent cipher key equipment calculates new proof test value according to Backup Data in the said analysis result and current proof test value, and upgrades current proof test value with new proof test value;
Step S4-3: said intelligent cipher key equipment open up subsidiary space and with the backup data store in the said analysis result in said subsidiary space, return step S3.
Wherein, when said intelligent cipher key equipment received the production instruction for the first time, said step S4-2 replaced with:
Said intelligent cipher key equipment calculates new proof test value according to the Backup Data in the said analysis result, and with said new proof test value as current proof test value.
Wherein, when said main frame is divided into polylith with Backup Data, and not when being handed down to said intelligent cipher key equipment according to the order of sequence, initial value be set be 0 the indegree of writing in intelligent cipher key equipment; Said step S4 and step S5 replace with step S4 ' and step S5 ';
Step S4 ': said intelligent cipher key equipment is resolved said production instruction; The sequence number of the file content in the judge analysis result whether with write indegree and add 1 and equate, be then the Backup Data in the said analysis result to be written in the said system file, the said write number of times is from adding 1; Return step S3; Otherwise report an error, and the said write number of times is set to 0, returns step S3;
Step S5 ': said intelligent cipher key equipment calculates current proof test value according to the Backup Data in the said system file; And seal instruction and resolve said, whether the proof test value in the judge analysis result conforms to said current proof test value, is execution in step S6 then; Otherwise report an error, return step S3.
Wherein, when said main frame is divided into polylith with Backup Data, and not when being handed down to said intelligent cipher key equipment according to the order of sequence, the system file of said intelligent cipher key equipment carries out piecemeal and numbering according to the order of sequence according to fixed size; Said step S4 and step S5 replace with step S4 accordingly " and step S5 ";
Step S4 ": said intelligent cipher key equipment is resolved said production instruction; and from analysis result, obtain the sequence number and corresponding Backup Data of file content, and the Backup Data of said correspondence is write in the numbering system file piecemeal consistent with the sequence number of said file content;
Step S5 ": said intelligent cipher key equipment calculates current proof test value according to the Backup Data in the said system file; and seal instruction and resolve said, whether the proof test value in the judge analysis result conforms to said current proof test value, is execution in step S6 then; otherwise report an error, return step S3.
Wherein, saidly open up subsidiary space and the backup data store in the said system file be specially in said subsidiary space:
Open up subsidiary space, and with storing in the said subsidiary space after the compression of the Backup Data in the said analysis result;
Said intelligent cipher key equipment is specially with the Backup Data that the Backup Data of said subsidiary space covers in the said system file:
Said intelligent cipher key equipment carries out decompress(ion) earlier to the Backup Data of said subsidiary space, covers the Backup Data in the said system file with the data behind the decompress(ion) again.
Wherein, saidly open up subsidiary space and the backup data store in the said system file be specially in said subsidiary space:
Store in subsidiary space or other buffer areas after using self private key that the Backup Data in the said analysis result is encrypted;
Said intelligent cipher key equipment is specially with the Backup Data that the Backup Data of said subsidiary space covers in the said system file:
Said intelligent cipher key equipment use self PKI is deciphered earlier Backup Data in said subsidiary space or the buffer memory, covers the Backup Data in the said system file with the data after the deciphering again.
The device of a kind of intelligent cipher key equipment of keeping the safety in production provided by the invention comprises:
Receiver module is used to receive the instruction that main frame issues;
Whether first judge module, the life cycle state that is used to judge intelligent cipher key equipment are the then second judge module work in the production phase, otherwise the 3rd judge module work;
Said second judge module is used for detecting instruction type when said receiver module receives when instruction, produces instruction in this way and then resolves writing module work, seals the then analysis judgment module work of instructing in this way, other instructions module work that then reports an error in this way;
The said module that reports an error is used to report an error;
Said parsing writing module is used for said production instruction is resolved, and the Backup Data in the analysis result is written in the system file;
Computing module is used for calculating current proof test value according to said Backup Data;
Memory module, be used for opening up subsidiary space and with the backup data store of said analysis result in said subsidiary space;
Said analysis judgment module be used for sealing instruction and resolving said, and whether the proof test value in the judge analysis result conforms to said current proof test value, is then modified module work, otherwise the said module work that reports an error;
Said modified module is used for said life cycle state is revised as the application stage;
Said the 3rd judge module is used for when said receiver module receives instruction, judging whether it is a key restore instruction, is then the 4th judge module work, otherwise covers judge module work;
Said the 4th judge module is used to judge whether the instruction that said receiver module receives is to produce instruction, is the then said module work that reports an error, otherwise carries out corresponding operating according to the instruction that receives, and operating result is returned to main frame;
Said covering judge module is used for covering with the Backup Data of said subsidiary space the Backup Data of said system file, and judges whether to cover completion.
Wherein, said device also comprises:
The set module is used for being judged as when being at said covering judge module file is normally identified set, also is used for the 5th judge module and is judged as when being the normal sign of file is resetted;
Said the 5th judge module is used to judge that said file normally identifies whether set, is then said the 3rd judge module work or the work of said set module, otherwise the work of said covering judge module;
When said covering judge module is judged as said set module work when being; Said the 3rd judge module is judged as said the 5th judge module work when being, said the 5th judge module is judged as said set module work when being, said covering judge module work when said the 5th judge module is judged as not.
Wherein, said computing module specifically is used for calculating new proof test value according to the Backup Data of said analysis result and current proof test value, and upgrades current proof test value with new proof test value;
When said receiver module is to receive for the first time to produce instruction, said computing module also is used for calculating new proof test value according to the Backup Data of said analysis result, and with said new proof test value as current proof test value.
Wherein, said parsing writing module comprises:
First resolution unit is used for said production instruction is resolved;
Judging unit, be used for judging said first resolution unit analysis result file content sequence number whether with write indegree and add 1 and equate, be then first to write processing unit work, otherwise the unit be set and report an error module work;
Said first writes processing unit, is used for the Backup Data of said analysis result is written in the said system file, and the said write number of times is from adding 1;
The said unit that is provided with is used for the said write number of times and is set to 0.
Wherein, said parsing writing module comprises:
Second resolution unit is used for said production instruction is resolved;
Acquiring unit is used for the sequence number and corresponding Backup Data of obtaining file content from the analysis result of said second resolution unit;
Second writing unit is used for the Backup Data of said correspondence is write the numbering system file piecemeal consistent with the sequence number of said file content.
Wherein, said memory module specifically is used for storing said subsidiary space into after the Backup Data compression with said system file;
Said covering judge module specifically is used for the Backup Data of said subsidiary space is carried out decompress(ion), covers the Backup Data in the said system file with the data behind the decompress(ion) again, and judges whether to cover completion.
Wherein, said memory module stores in subsidiary space or other buffer areas after specifically being used for using self private key that the Backup Data of said analysis result is encrypted;
Said covering judge module specifically is used for using self PKI that said subsidiary space or buffer memory Backup Data are deciphered earlier, covers the Backup Data in the said system file with the data after the deciphering again, and judges whether to cover and accomplish.
The present invention compared with prior art has the following advantages:
Write as journal file with producing the USBKEY file system structure of accomplishing; Write data among the USBKEY through an order; With this order sealing, production efficiency was higher after production was accomplished, thereby and reduced by the probability of hacker's intercepting and capturing and improved the security of producing.
Description of drawings
The method flow diagram of a kind of intelligent cipher key equipment of keeping the safety in production that Fig. 1 provides for the embodiment of the invention one;
The method flow diagram that Fig. 2 provides for the embodiment of the invention two at a kind of intelligent cipher key equipment of keeping the safety in production of production phase;
A kind of method flow diagram that generates intelligent cipher key equipment safely that Fig. 3 provides for the embodiment of the invention three in the application stage;
A kind of safety that Fig. 4 provides for the embodiment of the invention four generates the method flow diagram of intelligent cipher key equipment;
A kind of safety that Fig. 5 provides for the embodiment of the invention five generates the device block diagram of intelligent cipher key equipment;
The another kind of safety that Fig. 6 provides for the embodiment of the invention five generates the device block diagram of intelligent cipher key equipment;
The concrete synoptic diagram of the parsing writing module in the device that Fig. 7 and Fig. 8 provide for the embodiment of the invention five.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
Embodiment one
The embodiment of the invention one provides a kind of method of the intelligent cipher key equipment of keeping the safety in production; In the terminal, store the daily record of the essential information that comprises intelligent cipher key equipment, essential information comprises PIN code, produces key, key object, file object and related hardware information etc.As shown in Figure 1, this method comprises:
Step S1: the intelligent cipher key equipment power-up initializing, wait for receiving usb data;
Step S2: whether intelligent cipher key equipment judges its life cycle state in the production phase, is execution in step S3 then, otherwise execution in step S7;
Step S3: intelligent cipher key equipment wait for to receive under the main frame and sends instructions, and when receiving instruction, detects instruction type, produces in this way to instruct then execution in step S4, seals in this way to instruct then execution in step S5, and other instructions then report an error in this way, return step S3;
Concrete, in the present embodiment, intelligent cipher key equipment detects the type of instruction through second byte of instruction, as the data on second byte be 12 for producing instruction, as the data on second byte be 14 for sealing instruction;
Step S4: intelligent cipher key equipment is resolved said production instruction; And the Backup Data in the analysis result is written in the system file; Calculate current proof test value according to Backup Data, open up subsidiary space and with the backup data store in the analysis result in subsidiary space, return step S3;
Step S5: intelligent cipher key equipment seals instruction and resolves said, and whether the proof test value in the judge analysis result conform to current proof test value, is execution in step S6 then, otherwise reports an error, and returns step S3;
Step S6: intelligent cipher key equipment is revised as the application stage with life cycle state, returns step S2;
Step S7: intelligent cipher key equipment wait for to receive under the main frame and sends instructions, and when receiving instruction, judges whether it is a key restore instruction, is execution in step S9 then, otherwise execution in step S8;
Step S8: intelligent cipher key equipment judges whether the instruction that receives is to produce instruction, is then to report an error, and returns step S7, otherwise carries out corresponding operating according to the instruction that receives, and operating result is returned to main frame, returns step S7;
Step S9: intelligent cipher key equipment is with the Backup Data in the Backup Data covering system file of subsidiary space, and judges whether to cover and accomplish, and is then to return step S7, otherwise finishes current operation, returns step S7.
Embodiment two
The method of a kind of intelligent cipher key equipment of keeping the safety in production that the embodiment of the invention two provides; Be applicable to the production phase of intelligent cipher key equipment; In the terminal, store the Backup Data of the essential information that comprises intelligent cipher key equipment, essential information comprises PIN code, produces key, key object, file object and related hardware information etc.As shown in Figure 2, this method comprises:
Step 101: the intelligent cipher key equipment power-up initializing, wait for receiving usb data;
Step 102: whether intelligent cipher key equipment judges its life cycle state in the production phase, is execution in step 103 then, otherwise carries out application operating;
Step 103: intelligent cipher key equipment wait for to receive the instruction that main frame issues, and when receiving the instruction that main frame issues, judges whether it is to produce instruction, is execution in step 104 then, otherwise execution in step 106;
Come the type of decision instruction through second byte of instruction in the present embodiment, concrete, present embodiment production instruction is 80 12 00 OP Lc Data, and when Backup Data during greater than the reception buffer area of intelligent cipher key equipment, main frame is divided into polylith with Backup Data and issues; Wherein OP representes the sequence number of file content, and Data representes the corresponding file content;
Step 104: intelligent cipher key equipment is resolved the production instruction that receives; And the Backup Data in the analysis result is written in the system file; Calculate new proof test value according to Backup Data in the analysis result and current proof test value, and upgrade current proof test value with new proof test value;
In the present embodiment; Like intelligent cipher key equipment is to receive the production instruction that main frame issues for the first time; Then step 104 replaces with accordingly: intelligent cipher key equipment is resolved the production instruction that receives; And the Backup Data in the analysis result is written in the system file, intelligent cipher key equipment is according to the Backup Data calculation check value in the analysis result, and with result of calculation as current proof test value;
When main frame is not to issue according to the order of sequence when producing instruction, initial value then be set be 0 the indegree of writing in intelligent cipher key equipment, step 104 replaces with: intelligent cipher key equipment is resolved the instruction that receives; The sequence number of the file content in the judge analysis result whether with write indegree and add 1 and equate, be then the Backup Data in the analysis result to be written in the system file, write indegree from adding 1; Return step 103; Otherwise report an error, and write indegree and be set to 0, return step 103;
When main frame is not to issue according to the order of sequence when producing instruction, step 104 also has another kind of implementation, and the system file of intelligent cipher key equipment carries out piecemeal and numbering according to the order of sequence according to fixed size (like 64K); Step 104 replaces with accordingly: intelligent cipher key equipment is resolved the instruction that receives; And the sequence number of from analysis result, obtaining file content and corresponding Backup Data; Find the numbering of system file piecemeal according to the sequence number of file content, and Backup Data is write in the numbering system file piecemeal consistent with the sequence number of file content;
When main frame is not to issue according to the order of sequence when producing instruction, the operating in to receive when sealing instruction of calculation check value carried out;
Step 105: intelligent cipher key equipment open up subsidiary space and with the backup data store in the analysis result in subsidiary space, return step 103;
In the present embodiment, before the Backup Data in the intelligent cipher key equipment standby system file, can carry out processed compressed to it earlier, the backup data store after will compressing again is in subsidiary space; Use Huffman (Huffman) algorithm to compress in the preferred present embodiment, but be not limited thereto, also available other algorithms realizations are like LZW (Lenpel-Ziv & Welch) compression algorithm etc.; Accordingly, when using the Backup Data in the Backup Data covering system file in the subsidiary space in the application stage, need decompress earlier covers again;
Step 106: whether intelligent cipher key equipment judges the instruction receive for sealing instruction, is execution in step 107 then, otherwise reports an error, and returns step 103;
Concrete, the instruction of sealing in the present embodiment is: 84 14 00 00 Lc CRC;
Step 107: intelligent cipher key equipment is resolved sealing instruction, and whether the proof test value in the judge analysis result conform to current proof test value, is execution in step 108 then, otherwise reports an error, and returns step 103;
In the present embodiment, when main frame is not when issuing the production instruction according to the order of sequence, also to comprise between step 106 and the step 107: calculate current proof test value according to the Backup Data in the system file;
Step 108: intelligent cipher key equipment normally identifies set with file, and life cycle state is revised as the application stage, returns step 102.
Embodiment three
The method of a kind of intelligent cipher key equipment of keeping the safety in production that the embodiment of the invention three provides; Be applicable to the application stage of intelligent cipher key equipment; In the terminal, store the Backup Data of the essential information that comprises intelligent cipher key equipment, essential information comprises PIN code, produces key, key object, file object and related hardware information etc.As shown in Figure 3, this method comprises:
Step 201: the intelligent cipher key equipment power-up initializing, wait for receiving usb data;
Step 202: intelligent cipher key equipment judges that file normally identifies whether set, is execution in step 206 then, otherwise execution in step 203;
Step 203: intelligent cipher key equipment is with the Backup Data in the Backup Data covering system file of subsidiary space;
Concrete, in the present embodiment, for the data after compressing, then in step 203, earlier the Backup Data that compresses is decompressed, then with the Backup Data in the data covering system file after decompressing like the Backup Data in the subsidiary space; Compression process among decompression process and the embodiment two is reciprocal;
Step 204: intelligent cipher key equipment judges whether cover to accomplish, and is execution in step 205 then, otherwise returns step 203;
Step 205: intelligent cipher key equipment normally identifies set with file, order execution in step 206;
Step 206: intelligent cipher key equipment wait for to receive under the main frame and sends instructions, and when receiving instruction, judges whether it is a key restore instruction, is execution in step 208 then, otherwise execution in step 207;
Concrete, the key restore instruction in the present embodiment is 84 16 00 00 Lc Data;
Step 207: intelligent cipher key equipment judges whether the instruction that receives is to produce instruction, is then to report an error, and returns step 206, otherwise carries out corresponding operating according to the instruction that receives, and operating result is returned to main frame, returns step 206;
Step 208: intelligent cipher key equipment judges that file normally identifies whether set, is execution in step 209 then, otherwise execution in step 210;
Step 209: intelligent cipher key equipment resets the normal sign of file, order execution in step 210;
Step 210: intelligent cipher key equipment is with the Backup Data in the Backup Data covering system file of subsidiary space, and judges whether to cover and accomplish, and is execution in step 211 then, otherwise finishes current operation, returns step 206;
Concrete, in the present embodiment, be the Backup Data after the compression like what store in the subsidiary space, then overwrite procedure is specially: the data to subsidiary space decompress earlier, then with the Backup Data in the Backup Data covering system file after decompressing; Compression process among decompression process and the embodiment two is reciprocal;
Step 211: intelligent cipher key equipment normally identifies set with file, returns 206.
In the present embodiment, the Backup Data in the Backup Data covering system file of repeatedly using subsidiary space can be set, when promptly in step 210, being judged as not; Carry out the following step: intelligent cipher key equipment judges whether to arrive Preset Time; Be then to report an error, finish, otherwise return 206.
Embodiment four
The method of a kind of intelligent cipher key equipment of keeping the safety in production that the embodiment of the invention four provides; In the terminal, store the Backup Data of the essential information that comprises intelligent cipher key equipment, essential information comprises PIN code, produces key, key object, file object and related hardware information etc.As shown in Figure 4, this method comprises:
Step 301: the intelligent cipher key equipment power-up initializing, wait for receiving usb data;
Step 302: whether intelligent cipher key equipment judges its life cycle state in the production phase, is execution in step 303 then, otherwise execution in step 309;
Step 303: intelligent cipher key equipment wait for to receive the instruction that main frame issues, and judges when receiving instruction whether it is to produce instruction, is execution in step 304 then, otherwise execution in step 306;
Come the type of decision instruction through second byte of instruction in the present embodiment, concrete, present embodiment production instruction is 80 12 00 OP Lc Data, and when Backup Data during greater than the reception buffer area of intelligent cipher key equipment, main frame is divided into polylith with Backup Data and issues; Wherein OP representes the sequence number of file content, and Data representes the corresponding file content;
Step 304: intelligent cipher key equipment is resolved the production instruction that receives; And the Backup Data in the analysis result is written in the system file; And calculate new proof test value, and upgrade current proof test value with new proof test value according to the Backup Data in the analysis result and current proof test value;
In the present embodiment, be to receive the production instruction that main frame issues for the first time like intelligent cipher key equipment, then step 304 replaces with accordingly: intelligent cipher key equipment is according to the Backup Data calculation check value in the analysis result;
When main frame was divided into Backup Data polylith and issues, its implementation was identical with embodiment two in the present embodiment, and the operation of corresponding calculated proof test value is also carried out when sealing instruction receiving, and repeats no more at this;
Step 305: intelligent cipher key equipment open up subsidiary space and with the backup data store in the analysis result in subsidiary space, return step 303;
Also can be earlier in the present embodiment Backup Data in the analysis result is compressed, stores in the subsidiary space after the reversible treatment such as encryption again, implementation be with reference to embodiment two;
Step 306: whether intelligent cipher key equipment judges the instruction receive for sealing instruction, is execution in step 307 then, otherwise reports an error, and returns step 303;
Concrete, the instruction of sealing in the present embodiment is: 84 14 00 00 Lc CRC;
In the present embodiment, when main frame was divided into Backup Data polylith and issues, then step 304 replaces with: intelligent cipher key equipment was resolved the instruction that receives, and the Backup Data of analysis result is written in the system file;
Accordingly, be judged as in the step 306 when being earlier according to the Backup Data calculation check value in the system file, again order execution in step 307;
Step 307: intelligent cipher key equipment is resolved sealing instruction, and whether the proof test value in the judge analysis result conform to current proof test value, is execution in step 308 then, otherwise reports an error, and returns step 303;
Step 308: intelligent cipher key equipment normally identifies set with file, and life cycle state is revised as the application stage, continues execution in step 309;
Step 309: intelligent cipher key equipment judges that file normally identifies whether set, is execution in step 313 then, otherwise execution in step 310;
Step 310: intelligent cipher key equipment is with the Backup Data in the Backup Data covering system file of subsidiary space;
In the present embodiment; Like the Backup Data in the subsidiary space for when the data that reversible treatment such as overcompression or encryption are crossed; Then in this step, earlier the data in the subsidiary space are decompressed or processing such as deciphering; With the Backup Data in the data covering system file after handling, implementation can be with reference to embodiment three again;
Step 311: intelligent cipher key equipment judges whether cover to accomplish, and is execution in step 312 then, otherwise returns step 310;
Step 312: intelligent cipher key equipment normally identifies set with file;
Step 313: intelligent cipher key equipment is waited for receiving under the main frame and is sent instructions; The time judge whether it is a key restore instruction when receiving instruction, be execution in step 314 then, otherwise carry out corresponding operating according to the instruction that receives; Operating result is returned to main frame, execution in step 313;
Concrete, the key restore instruction in the present embodiment is 84 16 00 00 Lc Data;
Step 314: intelligent cipher key equipment judges that file normally identifies whether set, is execution in step 315 then, otherwise execution in step 316;
Step 315: intelligent cipher key equipment resets the normal sign of file, order execution in step 316;
Step 316: intelligent cipher key equipment is with the Backup Data in the Backup Data covering system file of subsidiary space, and judges whether to cover and accomplish, and is execution in step 317 then, otherwise finishes current operation, returns step 313;
Overwrite procedure in the present embodiment in this step can realize with reference to step 310;
Step 317: intelligent cipher key equipment normally identifies set with file, returns 313.
In the present embodiment; Backup Data in the Backup Data covering system file of repeatedly using subsidiary space can be set, and when promptly in step 316, being judged as not, carry out the following step: intelligent cipher key equipment judges whether to arrive Preset Time; Be then to report an error; Finish current operation, return step 313, otherwise directly return 313.
The data of storing in the subsidiary space in the present embodiment four are the Backup Data after compressing, and its implementation procedure is identical with embodiment three with embodiment two, repeats no more at this.
Intelligent cipher key equipment also can use the private key of self that Backup Data is encrypted in the embodiment of the invention, stores in the subsidiary space then or in other buffer areas; When covering, intelligent cipher key equipment obtains earlier the Backup Data of encryption from subsidiary space or other buffer areas, with the PKI of giving self Backup Data of encrypting is deciphered, and covers the data file in the log system with the data after the deciphering then; Or intelligent cipher key equipment can carry out other reversible calculating to Backup Data, and then stores in the subsidiary space; When covering, intelligent cipher key equipment carries out contrary calculating to the data in the subsidiary space earlier, covers the data file in the log system with the data after contrary the calculating then.
Embodiment five
The device of a kind of intelligent cipher key equipment of keeping the safety in production that the embodiment of the invention five provides, as shown in Figure 5, comprising:
Receiver module 501 is used to receive the instruction that main frame issues;
Whether first judge module 502, the life cycle state that is used to judge intelligent cipher key equipment are then second judge module, 503 work in the production phase, otherwise 504 work of the 3rd judge module;
Second judge module 503 is used for when receiver module 501 receives instruction, detecting instruction type, produces instruction in this way and then resolves writing module 505 work, seals then analysis judgment module 506 work of instructing in this way, in this way other module 507 work that then report an error;
The 3rd judge module 504 is used for when receiver module 501 receives instruction, judging whether it is a key restore instruction, is then the 4th judge module 511 work, otherwise covers judge module 512 work;
Resolve writing module 505, be used for resolving, and the Backup Data in the analysis result is written in the system file producing instruction;
Parsing writing module 505 in the present embodiment has two kinds of implementations, and first implementation is 0 the indegree of writing for storing initial value in device, and is as shown in Figure 7, resolves writing module 505 and comprises:
First resolution unit 5051 is used for resolving producing instruction;
Judging unit 5052, be used for judging first resolution unit 5051 analysis result file content sequence number whether with write indegree and add 1 and equate, be then first to write processing unit 5053 work, otherwise the unit 5054 and module 507 work that report an error be set;
First writes processing unit 5053, is used for the Backup Data of analysis result is written in the system file, writes indegree from adding 1;
Unit 5054 is set, is used for writing indegree and is set to 0;
Parsing writing module 505 in the present embodiment has two kinds of implementations, and second implementation is as shown in Figure 8, resolves writing module 505 and comprises:
Second resolution unit 5055 is used for resolving producing instruction;
Acquiring unit 5056 is used for the sequence number and corresponding Backup Data of obtaining file content from the analysis result of second resolution unit 5055;
Second writing unit 5057 is used for the Backup Data of correspondence is write the numbering system file piecemeal consistent with the sequence number of file content;
Analysis judgment module 506 be used for resolving sealing instruction, and whether the proof test value in the judge analysis result conforms to said current proof test value, be then modified module 510 work, otherwise the module 507 that reports an error is worked;
The module 507 that reports an error is used to report an error;
Computing module 508 is used for calculating current proof test value according to Backup Data;
In the present embodiment, computing module 508 specifically is used for calculating new proof test value according to the Backup Data of system file and current proof test value, and upgrades current proof test value with new proof test value; When receiver module 501 is to receive for the first time to produce instruction, computing module 508 also is used for calculating new proof test value according to the Backup Data of analysis result, and with new proof test value as current proof test value;
When parsing writing module 505 adopted above-mentioned dual mode to realize, the computing module 508 in the present embodiment specifically was used for calculating current proof test value according to the Backup Data of system file;
Memory module 509, be used for opening up subsidiary space and with the backup data store of analysis result in subsidiary space;
Modified module 510 is used for life cycle state is revised as the application stage;
The 4th judge module 511 is used to judge whether the instruction that receiver module 501 receives is to produce instruction, is module 507 work that then report an error, otherwise carries out corresponding operating according to the instruction that receives, and operating result is returned to main frame;
Cover judge module 512, be used for Backup Data, and judge whether to cover completion with the Backup Data covering system file of subsidiary space.
As shown in Figure 6, the device in the present embodiment also comprises:
Set module 513 is used for being judged as when being file normally being identified set covering judge module 512, also is used for the 5th judge module 514 and is judged as when being the normal sign of file is resetted;
The 5th judge module 514 is used to judge that file normally identifies whether set, is then the 3rd judge module 504 work or 513 work of set module, otherwise covers judge module 512 work;
Be judged as set module 513 work when being when covering judge module 512; The 3rd judge module 504 is judged as the 5th judge module 514 work when being, the 5th judge module 514 is judged as set module 513 work when being, the 5th judge module 514 covers judge module 512 work when being judged as not.
In the present embodiment, memory module 509 specifically is used for storing subsidiary space into after the Backup Data compression with system file; Cover judge module 512 and specifically be used for the Backup Data of subsidiary space is carried out decompress(ion),, and judge whether to cover completion again with the Backup Data in the data covering system file behind the decompress(ion).
Perhaps the memory module in the present embodiment 509 stores in subsidiary space or other buffer areas after specifically being used for using self private key that the Backup Data of analysis result is encrypted; Cover judge module 512 and specifically be used for using self PKI that subsidiary space or buffer memory Backup Data are deciphered earlier,, and judge whether to cover and accomplish again with the Backup Data in the data covering system file after the deciphering.
The above; Be merely the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technician who is familiar with the present technique field is in technical scope disclosed by the invention; The variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (20)

1. the method for the intelligent cipher key equipment of keeping the safety in production is characterized in that, comprising:
Step S1: the intelligent cipher key equipment power-up initializing, wait for receiving usb data;
Step S2: whether said intelligent cipher key equipment judges its life cycle state in the production phase, is execution in step S3 then, otherwise execution in step S7;
Step S3: said intelligent cipher key equipment is waited for receiving under the main frame and is sent instructions; Detect instruction type when receiving when instruction, produce in this way and instruct then execution in step S4, seal in this way and instruct then execution in step S5; Other instructions then report an error in this way, continue the instruction of waiting for that the reception main frame issues;
Step S4: said intelligent cipher key equipment is resolved said production instruction; And the Backup Data in the analysis result is written in the system file; Calculate current proof test value according to said Backup Data; Open up subsidiary space and with the backup data store in the said analysis result in said subsidiary space, return step S3;
Step S5: said intelligent cipher key equipment seals instruction and resolves said, and whether the proof test value in the judge analysis result conform to said current proof test value, is execution in step S6 then, otherwise reports an error, and returns step S3;
Step S6: said intelligent cipher key equipment is revised as the application stage with said life cycle state, returns step S2;
Step S7: said intelligent cipher key equipment waits for receiving under the main frame and sends instructions when receiving instruction, judge whether it is a key restore instruction, is execution in step S9 then, otherwise execution in step S8;
Step S8: said intelligent cipher key equipment judges whether the instruction that receives is to produce instruction, is then to report an error, and returns step S7, otherwise carries out corresponding operating according to the instruction that receives, and operating result is returned to main frame, returns step S7;
Step S9: said intelligent cipher key equipment covers the Backup Data in the said system file with the Backup Data of said subsidiary space, and judges whether to cover completion, is then to return step S7, otherwise finishes current operation, returns step S7.
2. the method for claim 1 is characterized in that, said step S6 also comprises: file is normally identified set.
3. method as claimed in claim 2 is characterized in that, carries out following step when being judged as not among the said step S2 earlier;
Steps A 1: said intelligent cipher key equipment judges that said file normally identifies whether set, is execution in step S7 then, otherwise execution in step A2;
Steps A 2: said intelligent cipher key equipment covers the Backup Data in the said system file with the Backup Data of said subsidiary space;
Steps A 3: said intelligent cipher key equipment judges whether cover to accomplish, and is execution in step A4 then, otherwise returns steps A 2;
Steps A 4: said intelligent cipher key equipment normally identifies set with said file, order execution in step S7.
4. method as claimed in claim 3 is characterized in that, is judged as among the said step S7 and carries out following step when being earlier:
Step B1: said intelligent cipher key equipment judges that said file normally identifies whether set, is execution in step B2 then, otherwise execution in step S9;
Step B2: said intelligent cipher key equipment resets the normal sign of said file, order execution in step S9.
5. method as claimed in claim 4 is characterized in that, is judged as when being among the said step S9 said file is normally identified set, returns step S7.
6. like claim 1 or 5 described methods, it is characterized in that, detect the type of instruction among the said step S3 through second byte of instruction, as the data on second byte be 12 for producing instruction, as the data on second byte be 14 for sealing instruction.
7. like claim 1 or 5 described methods, it is characterized in that when said Backup Data during greater than the reception buffer area of said intelligent cipher key equipment, said main frame is divided into polylith with Backup Data and is handed down to said intelligent cipher key equipment.
8. method as claimed in claim 7 is characterized in that, said step S4 specifically comprises:
Step S4-1: said intelligent cipher key equipment is resolved said production instruction, and the Backup Data in the analysis result is written in the system file;
Step S4-2: said intelligent cipher key equipment calculates new proof test value according to Backup Data in the said analysis result and current proof test value, and upgrades current proof test value with new proof test value;
Step S4-3: said intelligent cipher key equipment open up subsidiary space and with the backup data store in the said analysis result in said subsidiary space, return step S3.
9. method as claimed in claim 8 is characterized in that, when said intelligent cipher key equipment received the production instruction for the first time, said step S4-2 replaced with:
Said intelligent cipher key equipment calculates new proof test value according to the Backup Data in the said analysis result, and with said new proof test value as current proof test value.
10. method as claimed in claim 7 is characterized in that, when said main frame is divided into polylith with Backup Data, and is not when being handed down to said intelligent cipher key equipment according to the order of sequence, initial value is set is 0 the indegree of writing in intelligent cipher key equipment; Said step S4 and step S5 replace with step S4 ' and step S5 ';
Step S4 ': said intelligent cipher key equipment is resolved said production instruction; The sequence number of the file content in the judge analysis result whether with write indegree and add 1 and equate, be then the Backup Data in the said analysis result to be written in the said system file, the said write number of times is from adding 1; Return step S3; Otherwise report an error, and the said write number of times is set to 0, returns step S3;
Step S5 ': said intelligent cipher key equipment calculates current proof test value according to the Backup Data in the said system file; And seal instruction and resolve said, whether the proof test value in the judge analysis result conforms to said current proof test value, is execution in step S6 then; Otherwise report an error, return step S3.
11. method as claimed in claim 7 is characterized in that, when said main frame is divided into polylith with Backup Data, and is not when being handed down to said intelligent cipher key equipment according to the order of sequence, the system file of said intelligent cipher key equipment carries out piecemeal and numbering according to the order of sequence according to fixed size; Said step S4 and step S5 replace with step S4 accordingly " and step S5 ";
Step S4 ": said intelligent cipher key equipment is resolved said production instruction; and from analysis result, obtain the sequence number and corresponding Backup Data of file content, and the Backup Data of said correspondence is write in the numbering system file piecemeal consistent with the sequence number of said file content;
Step S5 ": said intelligent cipher key equipment calculates current proof test value according to the Backup Data in the said system file; and seal instruction and resolve said, whether the proof test value in the judge analysis result conforms to said current proof test value, is execution in step S6 then; otherwise report an error, return step S3.
12. like claim 1 or 5 described methods, it is characterized in that, saidly open up subsidiary space and the backup data store in the said system file is specially in said subsidiary space:
Open up subsidiary space, and with storing in the said subsidiary space after the compression of the Backup Data in the said analysis result;
Said intelligent cipher key equipment is specially with the Backup Data that the Backup Data of said subsidiary space covers in the said system file:
Said intelligent cipher key equipment carries out decompress(ion) earlier to the Backup Data of said subsidiary space, covers the Backup Data in the said system file with the data behind the decompress(ion) again.
13. like claim 1 or 5 described methods, it is characterized in that, saidly open up subsidiary space and the backup data store in the said system file is specially in said subsidiary space:
Store in subsidiary space or other buffer areas after using self private key that the Backup Data in the said analysis result is encrypted;
Said intelligent cipher key equipment is specially with the Backup Data that the Backup Data of said subsidiary space covers in the said system file:
Said intelligent cipher key equipment use self PKI is deciphered earlier Backup Data in said subsidiary space or the buffer memory, covers the Backup Data in the said system file with the data after the deciphering again.
14. the device of the intelligent cipher key equipment of keeping the safety in production is characterized in that, comprising:
Receiver module is used to receive the instruction that main frame issues;
Whether first judge module, the life cycle state that is used to judge intelligent cipher key equipment are the then second judge module work in the production phase, otherwise the 3rd judge module work;
Said second judge module is used for detecting instruction type when said receiver module receives when instruction, produces instruction in this way and then resolves writing module work, seals the then analysis judgment module work of instructing in this way, other instructions module work that then reports an error in this way;
The said module that reports an error is used to report an error;
Said parsing writing module is used for said production instruction is resolved, and the Backup Data in the analysis result is written in the system file;
Computing module is used for calculating current proof test value according to said Backup Data;
Memory module, be used for opening up subsidiary space and with the backup data store of said analysis result in said subsidiary space;
Said analysis judgment module be used for sealing instruction and resolving said, and whether the proof test value in the judge analysis result conforms to said current proof test value, is then modified module work, otherwise the said module work that reports an error;
Said modified module is used for said life cycle state is revised as the application stage;
Said the 3rd judge module is used for when said receiver module receives instruction, judging whether it is a key restore instruction, is then the 4th judge module work, otherwise covers judge module work;
Said the 4th judge module is used to judge whether the instruction that said receiver module receives is to produce instruction, is the then said module work that reports an error, otherwise carries out corresponding operating according to the instruction that receives, and operating result is returned to main frame;
Said covering judge module is used for covering with the Backup Data of said subsidiary space the Backup Data of said system file, and judges whether to cover completion.
15. device as claimed in claim 14 is characterized in that, also comprises:
The set module is used for being judged as when being at said covering judge module file is normally identified set, also is used for the 5th judge module and is judged as when being the normal sign of file is resetted;
Said the 5th judge module is used to judge that said file normally identifies whether set, is then said the 3rd judge module work or the work of said set module, otherwise the work of said covering judge module;
When said covering judge module is judged as said set module work when being; Said the 3rd judge module is judged as said the 5th judge module work when being, said the 5th judge module is judged as said set module work when being, said covering judge module work when said the 5th judge module is judged as not.
16. device as claimed in claim 14 is characterized in that, said computing module specifically is used for calculating new proof test value according to the Backup Data of said analysis result and current proof test value, and upgrades current proof test value with new proof test value;
When said receiver module is to receive for the first time to produce instruction, said computing module also is used for calculating new proof test value according to the Backup Data of said analysis result, and with said new proof test value as current proof test value.
17. device as claimed in claim 14 is characterized in that, said parsing writing module comprises:
First resolution unit is used for said production instruction is resolved;
Judging unit, be used for judging said first resolution unit analysis result file content sequence number whether with write indegree and add 1 and equate, be then first to write processing unit work, otherwise the unit be set and report an error module work;
Said first writes processing unit, is used for the Backup Data of said analysis result is written in the said system file, and the said write number of times is from adding 1;
The said unit that is provided with is used for the said write number of times and is set to 0.
18. device as claimed in claim 14 is characterized in that, said parsing writing module comprises:
Second resolution unit is used for said production instruction is resolved;
Acquiring unit is used for the sequence number and corresponding Backup Data of obtaining file content from the analysis result of said second resolution unit;
Second writing unit is used for the Backup Data of said correspondence is write the numbering system file piecemeal consistent with the sequence number of said file content.
19. device as claimed in claim 14 is characterized in that, said memory module specifically is used for storing said subsidiary space into after the Backup Data compression with said system file;
Said covering judge module specifically is used for the Backup Data of said subsidiary space is carried out decompress(ion), covers the Backup Data in the said system file with the data behind the decompress(ion) again, and judges whether to cover completion.
20. device as claimed in claim 14 is characterized in that, said memory module stores in subsidiary space or other buffer areas after specifically being used for using self private key that the Backup Data of said analysis result is encrypted;
Said covering judge module specifically is used for using self PKI that said subsidiary space or buffer memory Backup Data are deciphered earlier, covers the Backup Data in the said system file with the data after the deciphering again, and judges whether to cover and accomplish.
CN201210259619.5A 2012-07-25 2012-07-25 Method and device for safely producing intelligent key device Active CN102831362B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210259619.5A CN102831362B (en) 2012-07-25 2012-07-25 Method and device for safely producing intelligent key device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210259619.5A CN102831362B (en) 2012-07-25 2012-07-25 Method and device for safely producing intelligent key device

Publications (2)

Publication Number Publication Date
CN102831362A true CN102831362A (en) 2012-12-19
CN102831362B CN102831362B (en) 2014-12-10

Family

ID=47334495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210259619.5A Active CN102831362B (en) 2012-07-25 2012-07-25 Method and device for safely producing intelligent key device

Country Status (1)

Country Link
CN (1) CN102831362B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248490A (en) * 2013-05-23 2013-08-14 天地融科技股份有限公司 Method and system for backing-up information in electronic signature token
WO2014187210A1 (en) * 2013-05-23 2014-11-27 天地融科技股份有限公司 Method and system for backing up private key of electronic signature token
US9742565B2 (en) 2013-05-23 2017-08-22 Tendyron Corporation Method and system for backing up private key of electronic signature token
CN107423583A (en) * 2017-07-18 2017-12-01 北京深思数盾科技股份有限公司 A kind of software protecting device remapping method and device
CN111970108A (en) * 2020-07-20 2020-11-20 四川虹美智能科技有限公司 Key writing method, device and system for intelligent equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007056283A1 (en) * 2005-11-11 2007-05-18 Computer Associates Think, Inc. System and method for data encryption keys and indicators
US20090193521A1 (en) * 2005-06-01 2009-07-30 Hideki Matsushima Electronic device, update server device, key update device
CN101588351A (en) * 2008-05-21 2009-11-25 北京飞天诚信科技有限公司 Method for information security device for binding network software
CN102227106A (en) * 2011-06-01 2011-10-26 飞天诚信科技股份有限公司 Method and system for intelligent secret key equipment to communicate with computer

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090193521A1 (en) * 2005-06-01 2009-07-30 Hideki Matsushima Electronic device, update server device, key update device
WO2007056283A1 (en) * 2005-11-11 2007-05-18 Computer Associates Think, Inc. System and method for data encryption keys and indicators
CN101588351A (en) * 2008-05-21 2009-11-25 北京飞天诚信科技有限公司 Method for information security device for binding network software
CN102227106A (en) * 2011-06-01 2011-10-26 飞天诚信科技股份有限公司 Method and system for intelligent secret key equipment to communicate with computer

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248490A (en) * 2013-05-23 2013-08-14 天地融科技股份有限公司 Method and system for backing-up information in electronic signature token
WO2014187210A1 (en) * 2013-05-23 2014-11-27 天地融科技股份有限公司 Method and system for backing up private key of electronic signature token
CN103248490B (en) * 2013-05-23 2016-08-10 天地融科技股份有限公司 A kind of back up the method and system of information in electronic signature token
US9712326B2 (en) 2013-05-23 2017-07-18 Tendyron Corporation Method and system for backing up private key of electronic signature token
US9742565B2 (en) 2013-05-23 2017-08-22 Tendyron Corporation Method and system for backing up private key of electronic signature token
CN107423583A (en) * 2017-07-18 2017-12-01 北京深思数盾科技股份有限公司 A kind of software protecting device remapping method and device
CN107423583B (en) * 2017-07-18 2018-08-03 北京深思数盾科技股份有限公司 A kind of software protecting device remapping method and device
CN111970108A (en) * 2020-07-20 2020-11-20 四川虹美智能科技有限公司 Key writing method, device and system for intelligent equipment
CN111970108B (en) * 2020-07-20 2022-08-02 四川虹美智能科技有限公司 Key writing method, device and system for intelligent equipment

Also Published As

Publication number Publication date
CN102831362B (en) 2014-12-10

Similar Documents

Publication Publication Date Title
US11263416B2 (en) Two-dimensional code generation and identification
CN102831362B (en) Method and device for safely producing intelligent key device
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN103368691B (en) Data transmission method based on big-dipper satellite and device
CN101646168B (en) Data encryption method, decryption method and mobile terminal
CN110688286B (en) Application program operation information transmission method and device, storage medium and electronic equipment
CN107395751A (en) A kind of remote control system of intelligent household electrical appliance and method
CN108958966A (en) A kind of data guard method and device of lossless data compression
CN111596938A (en) Embedded equipment firmware safety upgrading method, system, terminal and storage medium
CN105848145A (en) WIFI intelligent configuration method and device
CN111404584A (en) Server running state monitoring method, device and system and readable storage medium
CN108737353B (en) Data encryption method and device based on data analysis system
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
Park et al. New flash memory acquisition methods based on firmware update protocols for LG Android smartphones
CN107169370A (en) The encryption method and encryption device of executable file
CN102012978B (en) Method and system for safely upgrading ISO (International Standard Code) file
CN108650264B (en) Data transmission method, device, equipment and computer readable storage medium
CN105631352A (en) Encoding and decoding methods, encoding and decoding apparatuses and mobile terminal
CN104898985A (en) Storage device, controller, and data writing method
CN115102701A (en) Multi-chip data encryption and decryption processing method and device
CN110517045B (en) Block chain data processing method, device, equipment and storage medium
CN110784868B (en) Encryption and decryption method for wireless communication, data transmission method and wireless communication system
TW201723946A (en) Method and apparatus for switching point-of-sale (POS) terminal modes
CN107548058B (en) Equipment access method and intelligent terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 17th floor, building B, Huizhi building, No.9, Xueqing Road, Haidian District, Beijing 100085

Patentee after: Feitian Technologies Co.,Ltd.

Country or region after: China

Address before: 100085 17th floor, block B, Huizhi building, No.9 Xueqing Road, Haidian District, Beijing

Patentee before: Feitian Technologies Co.,Ltd.

Country or region before: China