CN108111519A - Management method, device and the computer readable storage medium of key file - Google Patents
Management method, device and the computer readable storage medium of key file Download PDFInfo
- Publication number
- CN108111519A CN108111519A CN201711458021.8A CN201711458021A CN108111519A CN 108111519 A CN108111519 A CN 108111519A CN 201711458021 A CN201711458021 A CN 201711458021A CN 108111519 A CN108111519 A CN 108111519A
- Authority
- CN
- China
- Prior art keywords
- key file
- device identification
- key
- equipment
- management method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of management methods of key file, when being included in the key file acquisition request for receiving equipment transmission, the device identification of equipment according to the key file obtains acquisition request, obtain the corresponding key file of the device identification, the address information of the key file of acquisition is issued to the equipment, so that the equipment downloads the key file according to described address information.The invention also discloses a kind of managing device of key file and readable computer storage mediums.The present invention solves artificial burning key file in the prior art by providing automatic management and the distribution function of key file, and work efficiency is low and the technical issues of easy error.
Description
Technical field
Method, apparatus and computer the present invention relates to encryption technology field more particularly to a kind of key file management can
Read storage medium.
Background technology
Many intelligent cloud service products are required for subscription authentication at present.In order to which every equipment can smoothly be obtained from intelligence
The service of energy cloud service provider is, it is necessary to distribute the key file of a Cloud Server for every equipment, and ensure every equipment
Cloud Server key file uniqueness, avoid caused by reuse of the Cloud Server key between distinct device
Conflict.
In the prior art, common method is that key file is pushed away feed arrangement by serial ports burn recording software.This method
Developer is needed to go burning key file, less efficient and easy error manually.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill
Art.
The content of the invention
Present invention aims at provide a kind of method, apparatus of key file management, it is intended to solve artificial in the prior art
Burning key file, work efficiency is low and the technical issues of easy error.
To achieve the above object, the present invention provides a kind of method of key file management, the side of the key file management
Method includes the following steps:
When the key file for receiving equipment transmission obtains request, according to the key file obtains acquisition request
The device identification of equipment;
Obtain the corresponding key file of the device identification;
The address information of the key file of acquisition is issued to the equipment, for the equipment according to described
Location information downloads the key file.
Preferably, the corresponding key file step of the device identification that obtains includes:
It determines whether and the associated key file of the device identification;
If there is the associated key file of the device identification, the associated key file of the device identification is obtained;
If key file is not distributed for the device identification, and is associated with the associated key file of the device identification
Preserve the key file and the device identification.
Preferably, described the step of distributing key file for the device identification, includes:
Random number is generated, and according to the generating random number key file;
Using the key file of generation as the corresponding key file of the device identification.
Preferably, the server obtains the associated key file step of device identification and includes:
Obtain the check information of the corresponding key file of the device identification and the key file;
The key file is compressed, and the compressed key file is named with the check information of the key file.
Preferably, after the device identification step of the equipment according to the key file obtains acquisition request, institute
The acquisition methods for stating key file further include:
Judge whether the device identification is effective;
If there is the device identification effective, the corresponding key file of the device identification is obtained.
Preferably, the address information of the key file by acquisition, which is issued to the device step, includes:
Obtain path and the filename of key file;
Corresponding uniform resource position mark URL is obtained according to the path of the key file and filename;
The equipment is issued to using the URL of the key file as address information.
Preferably, the management method of the key file further includes:
When receiving the key file download request sent by the URL within a preset time interval, by the key
File is issued to the terminal.
Preferably, the management method of the key file further includes:
When prefixed time interval does not receive the key file download request sent by the URL, by being issued to
The URL for stating terminal is arranged to invalid.
To achieve the above object, the present invention also provides the device of the key file management, including:Memory, processor
And the key file management program that can be run on the memory and on the processor is stored in, the key file management
Program realizes the step of key file management method as described above when being performed by the processor.
The management method and device for a kind of key file that the embodiment of the present invention proposes, server are literary according to the key of equipment
Part obtains the device identification of equipment described in acquisition request, obtains the associated key file of device identification, and the ground of key file
Location information is issued to equipment, and so that equipment downloads key file according to described address information, it is automatic that the present invention realizes server
Management and distribution key file, every equipment need to only network just can get a unique key file automatically, without exploitation
Personnel's craft burning key file, avoids same key file from being reused between multiple equipment, has both improved key text
The efficiency of management of part in turn ensures the correctness of key file distribution.
Description of the drawings
Fig. 1 is the key file managing device structure diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of key file management method first embodiment of the present invention;
Fig. 3 is the flow diagram of key file management method second embodiment of the present invention;
Fig. 4 is the flow diagram of key file management method 3rd embodiment of the present invention;
Fig. 5 is the flow diagram of key file management method fourth embodiment of the present invention;
Fig. 6 is the flow diagram of the 5th embodiment of key file management method of the present invention;
Fig. 7 is the flow diagram of key file management method sixth embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:In server end, obtained in the key file for receiving equipment transmission
When taking request, the device identification of equipment according to the key file obtains acquisition request;The device identification is obtained to correspond to
Key file;The address information of the key file of acquisition is issued to the equipment, so that the equipment is according to institute
It states address information and downloads the key file.
Since in the prior art, key file pushes away feed arrangement by manual operation burn recording software, substantial amounts of people has both been expended
It power and time, and the easily key file of assignment error, influences equipment and uses the corresponding service of key file.
The present invention provides a solution, and by the way that server and equipment is allowed to be in consolidated network, server receives simultaneously
The key file based on device identification that processing equipment is sent obtains request, key file address of the equipment based on server feedback
Information downloads key file, realizes the automatic management and distribution of key file, avoids the low of artificial burning key file
Efficiency and the working method easily to malfunction, improve work efficiency, and ensure that key file management and distribute the quality of work.
As shown in Figure 1, the key file managing device knot for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to
Structure schematic diagram.
As shown in Figure 1, the key file managing device can include:Processor 1001, such as CPU, communication bus 1002,
Memory 1003.Wherein, communication bus 1002 is used to implement the connection communication between these components.Memory 1003 can be high
Fast RAM memory or the memory of stabilization (non-volatile memory), such as magnetic disk storage.Memory
The 1003 optional storage devices that can also be independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the terminal structure shown in Fig. 1 not structure paired terminal, can wrap
It includes and either combines some components or different components arrangement than illustrating more or fewer components.
As shown in Figure 1, as operating system and key can be included in a kind of memory 1003 of computer storage media
Documentor.
In device shown in Fig. 1, processor 1001 can be used for calling the key management journey stored in memory 1003
Sequence, and perform following operation:
When the key file for receiving equipment transmission obtains request, according to the key file obtains acquisition request
The device identification of equipment;
Obtain the corresponding key file of the device identification;
The address information of the key file of acquisition is issued to the equipment, for the equipment according to described
Location information downloads the key file.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform
It operates below:
It determines whether and the associated key file of the device identification;
If there is the associated key file of the device identification, the associated key file of the device identification is obtained;
If key file is not distributed for the device identification, and is associated with the associated key file of the device identification
Preserve the key file and the device identification.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform
It operates below:
Random number is generated, and according to the generating random number key file;
Using the key file of generation as the corresponding key file of the device identification.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform
It operates below:
Obtain the check information of the corresponding key file of the device identification and the key file;
The key file is compressed, and the compressed key file is named with the check information of the key file.
Further, processor 1001 can call the key file stored in memory 1003 to download program, also perform
It operates below:
Judge whether the device identification is effective;
If there is the device identification effective, the corresponding key file of the device identification is obtained.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform
It operates below:
Obtain path and the filename of key file;
Corresponding uniform resource position mark URL is obtained according to the path of the key file and filename;
The equipment is issued to using the URL of the key file as address information.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform
It operates below:
When receiving the key file download request sent by the URL within a preset time interval, by the key
File is issued to the terminal.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform
It operates below:
When prefixed time interval does not receive the key file download request sent by the URL, by being issued to
The URL for stating terminal is arranged to invalid.
With reference to Fig. 2, first embodiment of the invention provides a kind of management method of key file, the described method includes:
Step S10 when the key file for receiving equipment transmission obtains request, is obtained according to the key file and asked
Obtain the device identification of the equipment.
Server and multiple devices are co-located in LAN, dedicated network or a public network, and equipment passes through TCP/IP
Agreement sends key file and obtains request, and the key of different equipment text is distinguished and handled to server by obtaining device identification
Part obtains request.
The device identification that server parses and equipment vendors' offered is appointed.Such as the customized equipment of equipment vendors
The information such as mark, model, date of manufacture, batch including equipment.Such as employer's organization or normal structure uniformly develop planning
Device identification, such as international mobile equipment identification number IMEI code, this yard storage can be used for distinguishing in a mobile device different
Mobile equipment.MAC Address, cpu character mark of equipment etc. can also be used.
Step S20 obtains the corresponding key file of the device identification.
Server is responsible for the management and distribution of key file, and key file is provided by corresponding service provider.Work as clothes
When business provider disposably provides substantial amounts of key file according to customer demand, key file is stored in server by administrative staff
In memory and and database association.When service provider provide key file Core Generator when, administrative staff with instrument according to
Customer demand manually generates key file or the server calls instruments automatically generates key file.
When generating key file with keying tool, when key file number to be generated need to be set and setting system
Between.The key file that keying tool generates corresponding number according to the key file number of setting presss from both sides, and has in each key file folder
Sequence number, the key information file being made of numerical value and letter, wherein sequence number are unique, for identifying different key texts
Part presss from both sides.Keying tool generation key information file when using system time information as input, to ensure that different batches are generated
Key information file be unique.
When server receives the cipher key acquisition request based on device identification, arrive first to inquire about whether have recorded this in database
Device identification and the sequence number of its associated key file, if there is the sequence number just according to key file finds key file,
If not then a key file not being associated is obtained from memory and distributes to the device identification, registration in the database should
Device identification and associated key file sequence number.
The address information of the key file of acquisition is issued to the equipment, for the equipment root by step S30
The key file is downloaded according to described address information.
If removing " return " key" file in the message communicating process of server and equipment, the key text of several kbytes in size
Part data volume is much larger compared with the uniform resource position mark URL data volume of several characters, can aggravate server and equipment communicate into
The burden of journey, so the path that server is stored according to key file obtains corresponding uniform resource position mark URL, and URL
Address information as key file is sent to the download that equipment end carries out key file.
When equipment end voluntarily goes server end to download file, response apparatus is removed in another treatment progress of startup of server
The download request at end, since the primary operational in downloading process is in equipment end, which occupies the money of processor-server
Source is seldom.But since URL is cleartext information, there are security breaches, for security reasons, key file and URL can be improved
Mapping mode, such as take irregular naming rule rename key file folder, so as to obtain being not easy the URL being predicted
Address.
In the present embodiment, the key file sent by receiving device obtains request, is obtained and corresponded to according to device identification
Key file, the address information of key file is sent to equipment, realizes the automatic management and distribution of key file, if
Standby need to only network can identify acquisition key file by sending device, simplify the flow that equipment obtains key file, pole
Improve efficiency greatly.
Further, with reference to Fig. 3, second embodiment of the invention provides a kind of key file management based on first embodiment
Method, the present embodiment include in step S20:
Step S210, it is determined whether have the associated key file of the device identification.
Step S220 if there is the associated key file of the device identification, obtains the associated key text of the device identification
Part.
If the device identification does not have associated key file, key file is distributed for the device identification by step S230,
And it associates and preserves the key file and the device identification.
As the equipment of key file to be obtained is constantly connected to network, server can receive the substantial amounts of key that obtains please
It asks, and server will preserve increasing number of key file whithin a period of time, to be carried out when handling key request
The distribution again of matching inquiry and key file, so installation data library software on the server, is provided using database software
Storage, matching, search and query function come manage the equipment identification information of huge number and corresponding key file letter
Breath.When server memory not enough stores growing information content, the portability function of database software offer can also be utilized
It will be on the server of information data Rapid transplant to memory bigger.
When the equipment of networking is very more, for example, up to hundreds of thousands even up to a million when, in order to ensure timely sound
The key file of numerous networked devices is answered to obtain request, server starts multiple processes simultaneously, and a process plays multiple lines
Journey carries out interprocess communication and thread management by server.
Illustrate the detailed process that server through database software obtains key file according to device identification:Server
Process processing receive equipment end acquisition key file request, inquire about whether it has into database according to device identification
Corresponding key file, if not provided, to be stored on server selected under the path of key file one it is unassigned close
Key file.Since the different processes for the acquisition request for running processing distinct device on the server may be selected simultaneously
To same key file, when some process of server gets a unassigned key file folder, can't stand
Equipment is fed back to, but the sequence number in being pressed from both sides according to key file is needed to inquire about whether it is assigned to other in the database
Device identification, it is and anti-if just the sequence number that the device identification and the key file found press from both sides is not recorded in database
Feed apparatus, if the key file folder already be allocated to other device identifications, just look for again again one it is unappropriated close
Key file simultaneously repeats acknowledged journey.The multi-process of server process key request, multithreading be for same database into
Row operation, keep the mutually exclusive operation between process and thread.
In the present embodiment, associated key file identified by database software record and query facility, be new registration
Device identification distribution key file, realize and distribute unique key file for each unique equipment, avoid same
Key file is reused in distinct device, ensure that the correctness of key file distribution.
Further, with reference to Fig. 4, third embodiment of the invention provides a kind of key file management based on first embodiment
Method, the present embodiment include in step S20:
Step S240 generates random number, and according to the generating random number key file.
Step S250, using the key file of generation as the corresponding key file of the device identification.
In order to generate the high key file of safety and reliability, random number is generated and according to random number using random algorithm
Generate key file.The algorithm of existence random number is divided into two major classes, and one kind is to obtain information in never reproducible physical phenomenon
True random number is generated, variation, ambient thermal noise such as environment temperature or sound, one kind generated using various pseudo random numbers
Device generates pseudo random number according to externally input seed.After random number is obtained, it can be given birth to directly using random number as key
Into key file, a variety of key data change algorithms can also be used to carry out transform operation to random number so as to obtain key text
Part.
In the present embodiment, by according to generating random number key file, utilizing the scrambling of random number, unpredictability
And non-repeated, it ensure that the uniqueness and reliability for the key file that server is distributed to equipment.
Further, with reference to Fig. 5, fourth embodiment of the invention provides a kind of key file management based on first embodiment
Method, the present embodiment include in step S20:
Step S260 obtains the check information of the corresponding key file of the device identification and the key file;
Step S270 compresses the key file, and described compressed with the check information name of the key file
Key file.
In network transmission when the error occurs, user can be caused to receive imperfect or vicious key file.In order to
The mistake that receiving terminal is made to can be found that in key file transmission, server obtain the school of key file using message digest algorithm
Test information, such as MD5 algorithms, SHA algorithms, MAC algorithms.
Message digest algorithm is that text message is converted into brief information by specific Hash hash function computing to pluck
It will.Such as in MD5 algorithms, the raw information of random length is inputted, by the processing of MD5 algorithms, exports the hash for 128
As a result it is check information.The hashed result that the strong hash function computing of encryption generates must be irreversible, that is, pass through verification
Information can not release raw information, and the small variation of raw information will all cause the bright of the check information of hash function computing output
Aobvious variation.
Server obtains the check information of each key file by message digest algorithm, in order to reduce transmission data
Amount, is not further added by additional check information file, server renames key file with the check information and is supplied under user
It carries.When the key file address information that user returns according to server downloads the key file to local, first from key file
Filename obtain original check information, then with and server calculate message digest algorithm calculating used in original checksums information
Go out the local check information of key file, by comparing original checksums information and the no consistent judgement file reception of local check information
It is whether complete and correct.
In the present embodiment, by obtaining the check information of the corresponding key file of device identification and key file, with school
Information name key file is tested, a kind of mode of simplicity is being provided to the integrality of key file that receives and just to receiving terminal
True property is checked, ensure that the correctness of key file transmission.
Further, with reference to Fig. 6, fifth embodiment of the invention provides a kind of key file management based on first embodiment
Method, the present embodiment include after step slo:
Step S40 judges whether the device identification is effective.
Step S50 if there is the device identification effective, obtains the corresponding key file of the device identification.
When server and equipment are in LAN or Virtual Private Network, the security of network is higher, and when clothes
When business device and equipment are in wide area network or public network, security breaches, i.e. server are susceptible to it is possible that receiving based on illegal
Device identification key request, by the stealing behavior of key file.
In order to resist cipher key acquisition request illegal on network, server is receiving the acquisition of the key based on device identification
It first has to judge whether the device identification is effective during request.Server is needed by way of actively collecting device identification in local
Set up effective equipment identification information database.Such as equipment wants burning basic driver software when dispatch from the factory, it at this time can be with
The acquisition of calling interface function is stored in MAC Address, cpu character information or the IMEI of equipment after burning basic driver software
Code can also generate equipment while burning and uniquely customized sequence number and the sequence number is saved in having for server
It imitates in equipment identification information database.When server receives the cipher key acquisition request based on device identification, server is first at this
Inquire about whether have the device identification in effective equipment identification information database of ground storage, if it is effective to be described the device identification
, it is illegal, its cipher key acquisition request of refusal respond if not.
In the present embodiment, whether server is effective by the device identification for judging to receive, and is only sent to key file
Effective equipment prevents the behavior that key file is stolen by illegality equipment, so as to ensure that key file management and distribution automatically
Reliability.
Further, with reference to Fig. 7, sixth embodiment of the invention provides a kind of key file management based on first embodiment
Method, the present embodiment include after step S30:
Step S60 receives what is sent by the URL within a preset time interval, will during key file download request
The key file is issued to the terminal.
In order to grasp the situation distributed to the key file of equipment and used, find in time from cipher key address information to key
In file download process it is possible that occur information drop-out, URL address errors, network transmission etc. or unit exception situations such as,
The waste of key file resource is avoided simultaneously, and the situation that server downloads equipment according to address information key file is supervised
It surveys.
Server starts timer the address information of key file is sent to after equipment, if in the default time
The key file download request that equipment is sent with address information URL is received in interval, by HTTP transport protocol by Document encapsulation
Equipment is sent in multiple data packets, the data packet that equipment parsing receives is in the local caching of fileinfo write-in and again
It is assembled into complete key file.
If server is detected when prefixed time interval is not received by the key file download request of equipment transmission,
The corresponding URL of the key file for equipment being issued to is arranged to invalid, which is changed into from allocated state does not divide
The state matched somebody with somebody, for subsequent sub-distribution again.
In the present embodiment, server by default time interval detection device download key file situation,
First, ensure that key file can be sent to equipment end in time, second is that the exception of message transmission or equipment in network is found in time,
So as to quickly correct the mistake in key file distribution procedure, by the URL of invalid key file key can also be avoided literary
The waste of part resource.
The present invention also provides a kind of key file managing device, which includes:It memory, processor and is stored in described
On memory and the key file management program that can run on the processor, the key file management program is by the place
Manage the step of realizing the key file management method when device performs.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or system including a series of elements not only include those elements, and
And it further includes other elements that are not explicitly listed or further includes as this process, method, article or system institute inherently
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
Also there are other identical elements in the process of element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme substantially in other words does the prior art
Going out the part of contribution can be embodied in the form of software product, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone,
Computer, server, air conditioner or network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of management method of key file, which is characterized in that the management method of the key file comprises the following steps:
When the key file for receiving equipment transmission obtains request, the equipment according to the key file obtains acquisition request
Device identification;
Obtain the corresponding key file of the device identification;
The address information of the key file of acquisition is issued to the equipment, so that the equipment is believed according to described address
Breath downloads the key file.
2. the management method of key file as described in claim 1, which is characterized in that described to obtain the device identification correspondence
Key file step include:
It determines whether and the associated key file of the device identification;
If there is the associated key file of the device identification, the associated key file of the device identification is obtained;
If key file is not distributed for the device identification, and associates preservation with the associated key file of the device identification
The key file and the device identification.
3. the management method of the key file described in as claimed in claim 2, which is characterized in that described for the device identification point
Include with the step of key file:
Random number is generated, and according to the generating random number key file;
Using the key file of generation as the corresponding key file of the device identification.
4. the management method of key file as described in claim 1, which is characterized in that the server obtains the equipment mark
Knowing associated key file step includes:
Obtain the check information of the corresponding key file of the device identification and the key file;
The key file is compressed, and the compressed key file is named with the check information of the key file.
5. the management method of key file as described in claim 1, which is characterized in that described to be obtained according to the key file
After the device identification step of equipment described in acquisition request, the management method of the key file further includes:
Judge whether the device identification is effective;
If the device identification is effective, the corresponding key file of the device identification is obtained.
6. the management method of key file as described in claim 1, which is characterized in that the key text by acquisition
The address information of part, which is issued to the device step, to be included:
Obtain path and the filename of key file;
Corresponding uniform resource position mark URL is obtained according to the path of the key file and filename;
The equipment is issued to using the URL of the key file as address information.
7. the management method of key file as claimed in claim 6, which is characterized in that the management method of the key file is also wrapped
It includes:
When receiving the key file download request sent by the URL within a preset time interval, by the key file
It is issued to the terminal.
8. the management method of key file as claimed in claim 7, which is characterized in that the management method of the key file is also
Including:
When prefixed time interval does not receive the key file download request sent by the URL, the end will be issued to
The URL at end is arranged to invalid.
9. a kind of managing device of key file, which is characterized in that described device includes:Memory, processor and it is stored in institute
State the processing routine for the key file management that can be run on memory and on the processor, the place of the key file management
Reason program realizes the step such as key file management method described in any item of the claim 1 to 8 when being performed by the processor
Suddenly.
10. a kind of computer readable storage medium, which is characterized in that key text is stored on the computer readable storage medium
Part management program is realized when the key file management program is executed by processor as any one of claim 1 to 7
The step of key file management method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711458021.8A CN108111519A (en) | 2017-12-27 | 2017-12-27 | Management method, device and the computer readable storage medium of key file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711458021.8A CN108111519A (en) | 2017-12-27 | 2017-12-27 | Management method, device and the computer readable storage medium of key file |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108111519A true CN108111519A (en) | 2018-06-01 |
Family
ID=62214109
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711458021.8A Pending CN108111519A (en) | 2017-12-27 | 2017-12-27 | Management method, device and the computer readable storage medium of key file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108111519A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833096A (en) * | 2018-06-26 | 2018-11-16 | 湖南格凡安信科技有限公司 | A kind of data encryption dynamic key management system and method |
CN111355680A (en) * | 2018-12-04 | 2020-06-30 | 李舒云 | Key distribution method, key receiving method, electronic terminal and storage medium |
CN114423003A (en) * | 2021-12-29 | 2022-04-29 | 中国航空工业集团公司西安飞机设计研究所 | Airplane key comprehensive management method and system |
CN117472035A (en) * | 2023-12-27 | 2024-01-30 | 东方电气风电股份有限公司 | Verification method for software and hardware of main control system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102546731A (en) * | 2010-12-30 | 2012-07-04 | 中国移动通信集团公司 | Subchunk integrity checking method and system of peer-to-peer streaming media system |
CN102726027A (en) * | 2011-12-28 | 2012-10-10 | 华为技术有限公司 | Secret key transmission method and device during pre-boot under full-disk encryption of virtual machine |
CN103107996A (en) * | 2013-02-07 | 2013-05-15 | 北京中视广信科技有限公司 | On-line download method and system of digital certificate and digital certificate issuing platform |
US20150195256A1 (en) * | 2011-12-22 | 2015-07-09 | Adobe Systems Incorporated | Methods and Apparatus for Key Delivery in HTTP Live Streaming |
CN105743885A (en) * | 2016-01-22 | 2016-07-06 | 山东大学(威海) | Data file transmitting and receiving method and device based on multi-level server client mode |
-
2017
- 2017-12-27 CN CN201711458021.8A patent/CN108111519A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102546731A (en) * | 2010-12-30 | 2012-07-04 | 中国移动通信集团公司 | Subchunk integrity checking method and system of peer-to-peer streaming media system |
US20150195256A1 (en) * | 2011-12-22 | 2015-07-09 | Adobe Systems Incorporated | Methods and Apparatus for Key Delivery in HTTP Live Streaming |
CN102726027A (en) * | 2011-12-28 | 2012-10-10 | 华为技术有限公司 | Secret key transmission method and device during pre-boot under full-disk encryption of virtual machine |
CN103107996A (en) * | 2013-02-07 | 2013-05-15 | 北京中视广信科技有限公司 | On-line download method and system of digital certificate and digital certificate issuing platform |
CN105743885A (en) * | 2016-01-22 | 2016-07-06 | 山东大学(威海) | Data file transmitting and receiving method and device based on multi-level server client mode |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833096A (en) * | 2018-06-26 | 2018-11-16 | 湖南格凡安信科技有限公司 | A kind of data encryption dynamic key management system and method |
CN111355680A (en) * | 2018-12-04 | 2020-06-30 | 李舒云 | Key distribution method, key receiving method, electronic terminal and storage medium |
CN114423003A (en) * | 2021-12-29 | 2022-04-29 | 中国航空工业集团公司西安飞机设计研究所 | Airplane key comprehensive management method and system |
CN114423003B (en) * | 2021-12-29 | 2024-01-30 | 中国航空工业集团公司西安飞机设计研究所 | Airplane key comprehensive management method and system |
CN117472035A (en) * | 2023-12-27 | 2024-01-30 | 东方电气风电股份有限公司 | Verification method for software and hardware of main control system |
CN117472035B (en) * | 2023-12-27 | 2024-03-08 | 东方电气风电股份有限公司 | Verification method for software and hardware of main control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108111519A (en) | Management method, device and the computer readable storage medium of key file | |
CN109840591A (en) | Model training systems, method and storage medium | |
CN107528865B (en) | File downloading method and system | |
US20060242318A1 (en) | Method and apparatus for cascading media | |
CN107800795A (en) | The processing method and processing device of block information | |
EP3459000A1 (en) | Applied cryptographic ip management method and system | |
CN110598110B (en) | Service pushing method and device | |
CN109598131B (en) | File uploading and downloading method and device, electronic equipment and storage medium | |
CN107181804A (en) | The method for down loading and device of resource | |
CN108093015A (en) | Document transmission system | |
US20130179513A1 (en) | Behavior information collection device and behavior information transmission device | |
CN111460394A (en) | Copyright file verification method and device and computer readable storage medium | |
CN113867782A (en) | Gray scale distribution method and device, computer equipment and storage medium | |
CN111666086B (en) | Method, system and storage medium for updating application software | |
CN110197064A (en) | Process handling method and device, storage medium and electronic device | |
CN108769743A (en) | A kind of video playing control method, system, node and computer storage media | |
CN111431957B (en) | File processing method, device, equipment and system | |
CN106878246A (en) | A kind of method for managing resource and device | |
CN107798236A (en) | It is a kind of that the method and apparatus installed safely are realized to application program installation kit | |
CN106469091B (en) | For distributing the method and apparatus of available area | |
CN111679853A (en) | Open source software publishing method and device, computer equipment and readable storage medium | |
CN111444542A (en) | Data processing method, device and storage medium for copyright file | |
CN116094698A (en) | Quantum security identity authentication device, method, equipment and storage medium | |
CN110618989A (en) | Information processing method, information processing device and related product | |
CN108830050A (en) | Register method, device and the storage medium of computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180601 |