CN108111519A - Management method, device and the computer readable storage medium of key file - Google Patents

Management method, device and the computer readable storage medium of key file Download PDF

Info

Publication number
CN108111519A
CN108111519A CN201711458021.8A CN201711458021A CN108111519A CN 108111519 A CN108111519 A CN 108111519A CN 201711458021 A CN201711458021 A CN 201711458021A CN 108111519 A CN108111519 A CN 108111519A
Authority
CN
China
Prior art keywords
key file
device identification
key
equipment
management method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711458021.8A
Other languages
Chinese (zh)
Inventor
伍祺昱
吕坤
沈浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Tongli Electronics Huizhou Co Ltd
Original Assignee
TCL Tongli Electronics Huizhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Tongli Electronics Huizhou Co Ltd filed Critical TCL Tongli Electronics Huizhou Co Ltd
Priority to CN201711458021.8A priority Critical patent/CN108111519A/en
Publication of CN108111519A publication Critical patent/CN108111519A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of management methods of key file, when being included in the key file acquisition request for receiving equipment transmission, the device identification of equipment according to the key file obtains acquisition request, obtain the corresponding key file of the device identification, the address information of the key file of acquisition is issued to the equipment, so that the equipment downloads the key file according to described address information.The invention also discloses a kind of managing device of key file and readable computer storage mediums.The present invention solves artificial burning key file in the prior art by providing automatic management and the distribution function of key file, and work efficiency is low and the technical issues of easy error.

Description

Management method, device and the computer readable storage medium of key file
Technical field
Method, apparatus and computer the present invention relates to encryption technology field more particularly to a kind of key file management can Read storage medium.
Background technology
Many intelligent cloud service products are required for subscription authentication at present.In order to which every equipment can smoothly be obtained from intelligence The service of energy cloud service provider is, it is necessary to distribute the key file of a Cloud Server for every equipment, and ensure every equipment Cloud Server key file uniqueness, avoid caused by reuse of the Cloud Server key between distinct device Conflict.
In the prior art, common method is that key file is pushed away feed arrangement by serial ports burn recording software.This method Developer is needed to go burning key file, less efficient and easy error manually.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill Art.
The content of the invention
Present invention aims at provide a kind of method, apparatus of key file management, it is intended to solve artificial in the prior art Burning key file, work efficiency is low and the technical issues of easy error.
To achieve the above object, the present invention provides a kind of method of key file management, the side of the key file management Method includes the following steps:
When the key file for receiving equipment transmission obtains request, according to the key file obtains acquisition request The device identification of equipment;
Obtain the corresponding key file of the device identification;
The address information of the key file of acquisition is issued to the equipment, for the equipment according to described Location information downloads the key file.
Preferably, the corresponding key file step of the device identification that obtains includes:
It determines whether and the associated key file of the device identification;
If there is the associated key file of the device identification, the associated key file of the device identification is obtained;
If key file is not distributed for the device identification, and is associated with the associated key file of the device identification Preserve the key file and the device identification.
Preferably, described the step of distributing key file for the device identification, includes:
Random number is generated, and according to the generating random number key file;
Using the key file of generation as the corresponding key file of the device identification.
Preferably, the server obtains the associated key file step of device identification and includes:
Obtain the check information of the corresponding key file of the device identification and the key file;
The key file is compressed, and the compressed key file is named with the check information of the key file.
Preferably, after the device identification step of the equipment according to the key file obtains acquisition request, institute The acquisition methods for stating key file further include:
Judge whether the device identification is effective;
If there is the device identification effective, the corresponding key file of the device identification is obtained.
Preferably, the address information of the key file by acquisition, which is issued to the device step, includes:
Obtain path and the filename of key file;
Corresponding uniform resource position mark URL is obtained according to the path of the key file and filename;
The equipment is issued to using the URL of the key file as address information.
Preferably, the management method of the key file further includes:
When receiving the key file download request sent by the URL within a preset time interval, by the key File is issued to the terminal.
Preferably, the management method of the key file further includes:
When prefixed time interval does not receive the key file download request sent by the URL, by being issued to The URL for stating terminal is arranged to invalid.
To achieve the above object, the present invention also provides the device of the key file management, including:Memory, processor And the key file management program that can be run on the memory and on the processor is stored in, the key file management Program realizes the step of key file management method as described above when being performed by the processor.
The management method and device for a kind of key file that the embodiment of the present invention proposes, server are literary according to the key of equipment Part obtains the device identification of equipment described in acquisition request, obtains the associated key file of device identification, and the ground of key file Location information is issued to equipment, and so that equipment downloads key file according to described address information, it is automatic that the present invention realizes server Management and distribution key file, every equipment need to only network just can get a unique key file automatically, without exploitation Personnel's craft burning key file, avoids same key file from being reused between multiple equipment, has both improved key text The efficiency of management of part in turn ensures the correctness of key file distribution.
Description of the drawings
Fig. 1 is the key file managing device structure diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of key file management method first embodiment of the present invention;
Fig. 3 is the flow diagram of key file management method second embodiment of the present invention;
Fig. 4 is the flow diagram of key file management method 3rd embodiment of the present invention;
Fig. 5 is the flow diagram of key file management method fourth embodiment of the present invention;
Fig. 6 is the flow diagram of the 5th embodiment of key file management method of the present invention;
Fig. 7 is the flow diagram of key file management method sixth embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:In server end, obtained in the key file for receiving equipment transmission When taking request, the device identification of equipment according to the key file obtains acquisition request;The device identification is obtained to correspond to Key file;The address information of the key file of acquisition is issued to the equipment, so that the equipment is according to institute It states address information and downloads the key file.
Since in the prior art, key file pushes away feed arrangement by manual operation burn recording software, substantial amounts of people has both been expended It power and time, and the easily key file of assignment error, influences equipment and uses the corresponding service of key file.
The present invention provides a solution, and by the way that server and equipment is allowed to be in consolidated network, server receives simultaneously The key file based on device identification that processing equipment is sent obtains request, key file address of the equipment based on server feedback Information downloads key file, realizes the automatic management and distribution of key file, avoids the low of artificial burning key file Efficiency and the working method easily to malfunction, improve work efficiency, and ensure that key file management and distribute the quality of work.
As shown in Figure 1, the key file managing device knot for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to Structure schematic diagram.
As shown in Figure 1, the key file managing device can include:Processor 1001, such as CPU, communication bus 1002, Memory 1003.Wherein, communication bus 1002 is used to implement the connection communication between these components.Memory 1003 can be high Fast RAM memory or the memory of stabilization (non-volatile memory), such as magnetic disk storage.Memory The 1003 optional storage devices that can also be independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the terminal structure shown in Fig. 1 not structure paired terminal, can wrap It includes and either combines some components or different components arrangement than illustrating more or fewer components.
As shown in Figure 1, as operating system and key can be included in a kind of memory 1003 of computer storage media Documentor.
In device shown in Fig. 1, processor 1001 can be used for calling the key management journey stored in memory 1003 Sequence, and perform following operation:
When the key file for receiving equipment transmission obtains request, according to the key file obtains acquisition request The device identification of equipment;
Obtain the corresponding key file of the device identification;
The address information of the key file of acquisition is issued to the equipment, for the equipment according to described Location information downloads the key file.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform It operates below:
It determines whether and the associated key file of the device identification;
If there is the associated key file of the device identification, the associated key file of the device identification is obtained;
If key file is not distributed for the device identification, and is associated with the associated key file of the device identification Preserve the key file and the device identification.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform It operates below:
Random number is generated, and according to the generating random number key file;
Using the key file of generation as the corresponding key file of the device identification.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform It operates below:
Obtain the check information of the corresponding key file of the device identification and the key file;
The key file is compressed, and the compressed key file is named with the check information of the key file.
Further, processor 1001 can call the key file stored in memory 1003 to download program, also perform It operates below:
Judge whether the device identification is effective;
If there is the device identification effective, the corresponding key file of the device identification is obtained.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform It operates below:
Obtain path and the filename of key file;
Corresponding uniform resource position mark URL is obtained according to the path of the key file and filename;
The equipment is issued to using the URL of the key file as address information.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform It operates below:
When receiving the key file download request sent by the URL within a preset time interval, by the key File is issued to the terminal.
Further, processor 1001 can call the key file management program stored in memory 1003, also perform It operates below:
When prefixed time interval does not receive the key file download request sent by the URL, by being issued to The URL for stating terminal is arranged to invalid.
With reference to Fig. 2, first embodiment of the invention provides a kind of management method of key file, the described method includes:
Step S10 when the key file for receiving equipment transmission obtains request, is obtained according to the key file and asked Obtain the device identification of the equipment.
Server and multiple devices are co-located in LAN, dedicated network or a public network, and equipment passes through TCP/IP Agreement sends key file and obtains request, and the key of different equipment text is distinguished and handled to server by obtaining device identification Part obtains request.
The device identification that server parses and equipment vendors' offered is appointed.Such as the customized equipment of equipment vendors The information such as mark, model, date of manufacture, batch including equipment.Such as employer's organization or normal structure uniformly develop planning Device identification, such as international mobile equipment identification number IMEI code, this yard storage can be used for distinguishing in a mobile device different Mobile equipment.MAC Address, cpu character mark of equipment etc. can also be used.
Step S20 obtains the corresponding key file of the device identification.
Server is responsible for the management and distribution of key file, and key file is provided by corresponding service provider.Work as clothes When business provider disposably provides substantial amounts of key file according to customer demand, key file is stored in server by administrative staff In memory and and database association.When service provider provide key file Core Generator when, administrative staff with instrument according to Customer demand manually generates key file or the server calls instruments automatically generates key file.
When generating key file with keying tool, when key file number to be generated need to be set and setting system Between.The key file that keying tool generates corresponding number according to the key file number of setting presss from both sides, and has in each key file folder Sequence number, the key information file being made of numerical value and letter, wherein sequence number are unique, for identifying different key texts Part presss from both sides.Keying tool generation key information file when using system time information as input, to ensure that different batches are generated Key information file be unique.
When server receives the cipher key acquisition request based on device identification, arrive first to inquire about whether have recorded this in database Device identification and the sequence number of its associated key file, if there is the sequence number just according to key file finds key file, If not then a key file not being associated is obtained from memory and distributes to the device identification, registration in the database should Device identification and associated key file sequence number.
The address information of the key file of acquisition is issued to the equipment, for the equipment root by step S30 The key file is downloaded according to described address information.
If removing " return " key" file in the message communicating process of server and equipment, the key text of several kbytes in size Part data volume is much larger compared with the uniform resource position mark URL data volume of several characters, can aggravate server and equipment communicate into The burden of journey, so the path that server is stored according to key file obtains corresponding uniform resource position mark URL, and URL Address information as key file is sent to the download that equipment end carries out key file.
When equipment end voluntarily goes server end to download file, response apparatus is removed in another treatment progress of startup of server The download request at end, since the primary operational in downloading process is in equipment end, which occupies the money of processor-server Source is seldom.But since URL is cleartext information, there are security breaches, for security reasons, key file and URL can be improved Mapping mode, such as take irregular naming rule rename key file folder, so as to obtain being not easy the URL being predicted Address.
In the present embodiment, the key file sent by receiving device obtains request, is obtained and corresponded to according to device identification Key file, the address information of key file is sent to equipment, realizes the automatic management and distribution of key file, if Standby need to only network can identify acquisition key file by sending device, simplify the flow that equipment obtains key file, pole Improve efficiency greatly.
Further, with reference to Fig. 3, second embodiment of the invention provides a kind of key file management based on first embodiment Method, the present embodiment include in step S20:
Step S210, it is determined whether have the associated key file of the device identification.
Step S220 if there is the associated key file of the device identification, obtains the associated key text of the device identification Part.
If the device identification does not have associated key file, key file is distributed for the device identification by step S230, And it associates and preserves the key file and the device identification.
As the equipment of key file to be obtained is constantly connected to network, server can receive the substantial amounts of key that obtains please It asks, and server will preserve increasing number of key file whithin a period of time, to be carried out when handling key request The distribution again of matching inquiry and key file, so installation data library software on the server, is provided using database software Storage, matching, search and query function come manage the equipment identification information of huge number and corresponding key file letter Breath.When server memory not enough stores growing information content, the portability function of database software offer can also be utilized It will be on the server of information data Rapid transplant to memory bigger.
When the equipment of networking is very more, for example, up to hundreds of thousands even up to a million when, in order to ensure timely sound The key file of numerous networked devices is answered to obtain request, server starts multiple processes simultaneously, and a process plays multiple lines Journey carries out interprocess communication and thread management by server.
Illustrate the detailed process that server through database software obtains key file according to device identification:Server Process processing receive equipment end acquisition key file request, inquire about whether it has into database according to device identification Corresponding key file, if not provided, to be stored on server selected under the path of key file one it is unassigned close Key file.Since the different processes for the acquisition request for running processing distinct device on the server may be selected simultaneously To same key file, when some process of server gets a unassigned key file folder, can't stand Equipment is fed back to, but the sequence number in being pressed from both sides according to key file is needed to inquire about whether it is assigned to other in the database Device identification, it is and anti-if just the sequence number that the device identification and the key file found press from both sides is not recorded in database Feed apparatus, if the key file folder already be allocated to other device identifications, just look for again again one it is unappropriated close Key file simultaneously repeats acknowledged journey.The multi-process of server process key request, multithreading be for same database into Row operation, keep the mutually exclusive operation between process and thread.
In the present embodiment, associated key file identified by database software record and query facility, be new registration Device identification distribution key file, realize and distribute unique key file for each unique equipment, avoid same Key file is reused in distinct device, ensure that the correctness of key file distribution.
Further, with reference to Fig. 4, third embodiment of the invention provides a kind of key file management based on first embodiment Method, the present embodiment include in step S20:
Step S240 generates random number, and according to the generating random number key file.
Step S250, using the key file of generation as the corresponding key file of the device identification.
In order to generate the high key file of safety and reliability, random number is generated and according to random number using random algorithm Generate key file.The algorithm of existence random number is divided into two major classes, and one kind is to obtain information in never reproducible physical phenomenon True random number is generated, variation, ambient thermal noise such as environment temperature or sound, one kind generated using various pseudo random numbers Device generates pseudo random number according to externally input seed.After random number is obtained, it can be given birth to directly using random number as key Into key file, a variety of key data change algorithms can also be used to carry out transform operation to random number so as to obtain key text Part.
In the present embodiment, by according to generating random number key file, utilizing the scrambling of random number, unpredictability And non-repeated, it ensure that the uniqueness and reliability for the key file that server is distributed to equipment.
Further, with reference to Fig. 5, fourth embodiment of the invention provides a kind of key file management based on first embodiment Method, the present embodiment include in step S20:
Step S260 obtains the check information of the corresponding key file of the device identification and the key file;
Step S270 compresses the key file, and described compressed with the check information name of the key file Key file.
In network transmission when the error occurs, user can be caused to receive imperfect or vicious key file.In order to The mistake that receiving terminal is made to can be found that in key file transmission, server obtain the school of key file using message digest algorithm Test information, such as MD5 algorithms, SHA algorithms, MAC algorithms.
Message digest algorithm is that text message is converted into brief information by specific Hash hash function computing to pluck It will.Such as in MD5 algorithms, the raw information of random length is inputted, by the processing of MD5 algorithms, exports the hash for 128 As a result it is check information.The hashed result that the strong hash function computing of encryption generates must be irreversible, that is, pass through verification Information can not release raw information, and the small variation of raw information will all cause the bright of the check information of hash function computing output Aobvious variation.
Server obtains the check information of each key file by message digest algorithm, in order to reduce transmission data Amount, is not further added by additional check information file, server renames key file with the check information and is supplied under user It carries.When the key file address information that user returns according to server downloads the key file to local, first from key file Filename obtain original check information, then with and server calculate message digest algorithm calculating used in original checksums information Go out the local check information of key file, by comparing original checksums information and the no consistent judgement file reception of local check information It is whether complete and correct.
In the present embodiment, by obtaining the check information of the corresponding key file of device identification and key file, with school Information name key file is tested, a kind of mode of simplicity is being provided to the integrality of key file that receives and just to receiving terminal True property is checked, ensure that the correctness of key file transmission.
Further, with reference to Fig. 6, fifth embodiment of the invention provides a kind of key file management based on first embodiment Method, the present embodiment include after step slo:
Step S40 judges whether the device identification is effective.
Step S50 if there is the device identification effective, obtains the corresponding key file of the device identification.
When server and equipment are in LAN or Virtual Private Network, the security of network is higher, and when clothes When business device and equipment are in wide area network or public network, security breaches, i.e. server are susceptible to it is possible that receiving based on illegal Device identification key request, by the stealing behavior of key file.
In order to resist cipher key acquisition request illegal on network, server is receiving the acquisition of the key based on device identification It first has to judge whether the device identification is effective during request.Server is needed by way of actively collecting device identification in local Set up effective equipment identification information database.Such as equipment wants burning basic driver software when dispatch from the factory, it at this time can be with The acquisition of calling interface function is stored in MAC Address, cpu character information or the IMEI of equipment after burning basic driver software Code can also generate equipment while burning and uniquely customized sequence number and the sequence number is saved in having for server It imitates in equipment identification information database.When server receives the cipher key acquisition request based on device identification, server is first at this Inquire about whether have the device identification in effective equipment identification information database of ground storage, if it is effective to be described the device identification , it is illegal, its cipher key acquisition request of refusal respond if not.
In the present embodiment, whether server is effective by the device identification for judging to receive, and is only sent to key file Effective equipment prevents the behavior that key file is stolen by illegality equipment, so as to ensure that key file management and distribution automatically Reliability.
Further, with reference to Fig. 7, sixth embodiment of the invention provides a kind of key file management based on first embodiment Method, the present embodiment include after step S30:
Step S60 receives what is sent by the URL within a preset time interval, will during key file download request The key file is issued to the terminal.
In order to grasp the situation distributed to the key file of equipment and used, find in time from cipher key address information to key In file download process it is possible that occur information drop-out, URL address errors, network transmission etc. or unit exception situations such as, The waste of key file resource is avoided simultaneously, and the situation that server downloads equipment according to address information key file is supervised It surveys.
Server starts timer the address information of key file is sent to after equipment, if in the default time The key file download request that equipment is sent with address information URL is received in interval, by HTTP transport protocol by Document encapsulation Equipment is sent in multiple data packets, the data packet that equipment parsing receives is in the local caching of fileinfo write-in and again It is assembled into complete key file.
If server is detected when prefixed time interval is not received by the key file download request of equipment transmission, The corresponding URL of the key file for equipment being issued to is arranged to invalid, which is changed into from allocated state does not divide The state matched somebody with somebody, for subsequent sub-distribution again.
In the present embodiment, server by default time interval detection device download key file situation, First, ensure that key file can be sent to equipment end in time, second is that the exception of message transmission or equipment in network is found in time, So as to quickly correct the mistake in key file distribution procedure, by the URL of invalid key file key can also be avoided literary The waste of part resource.
The present invention also provides a kind of key file managing device, which includes:It memory, processor and is stored in described On memory and the key file management program that can run on the processor, the key file management program is by the place Manage the step of realizing the key file management method when device performs.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements not only include those elements, and And it further includes other elements that are not explicitly listed or further includes as this process, method, article or system institute inherently Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this Also there are other identical elements in the process of element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone, Computer, server, air conditioner or network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of management method of key file, which is characterized in that the management method of the key file comprises the following steps:
When the key file for receiving equipment transmission obtains request, the equipment according to the key file obtains acquisition request Device identification;
Obtain the corresponding key file of the device identification;
The address information of the key file of acquisition is issued to the equipment, so that the equipment is believed according to described address Breath downloads the key file.
2. the management method of key file as described in claim 1, which is characterized in that described to obtain the device identification correspondence Key file step include:
It determines whether and the associated key file of the device identification;
If there is the associated key file of the device identification, the associated key file of the device identification is obtained;
If key file is not distributed for the device identification, and associates preservation with the associated key file of the device identification The key file and the device identification.
3. the management method of the key file described in as claimed in claim 2, which is characterized in that described for the device identification point Include with the step of key file:
Random number is generated, and according to the generating random number key file;
Using the key file of generation as the corresponding key file of the device identification.
4. the management method of key file as described in claim 1, which is characterized in that the server obtains the equipment mark Knowing associated key file step includes:
Obtain the check information of the corresponding key file of the device identification and the key file;
The key file is compressed, and the compressed key file is named with the check information of the key file.
5. the management method of key file as described in claim 1, which is characterized in that described to be obtained according to the key file After the device identification step of equipment described in acquisition request, the management method of the key file further includes:
Judge whether the device identification is effective;
If the device identification is effective, the corresponding key file of the device identification is obtained.
6. the management method of key file as described in claim 1, which is characterized in that the key text by acquisition The address information of part, which is issued to the device step, to be included:
Obtain path and the filename of key file;
Corresponding uniform resource position mark URL is obtained according to the path of the key file and filename;
The equipment is issued to using the URL of the key file as address information.
7. the management method of key file as claimed in claim 6, which is characterized in that the management method of the key file is also wrapped It includes:
When receiving the key file download request sent by the URL within a preset time interval, by the key file It is issued to the terminal.
8. the management method of key file as claimed in claim 7, which is characterized in that the management method of the key file is also Including:
When prefixed time interval does not receive the key file download request sent by the URL, the end will be issued to The URL at end is arranged to invalid.
9. a kind of managing device of key file, which is characterized in that described device includes:Memory, processor and it is stored in institute State the processing routine for the key file management that can be run on memory and on the processor, the place of the key file management Reason program realizes the step such as key file management method described in any item of the claim 1 to 8 when being performed by the processor Suddenly.
10. a kind of computer readable storage medium, which is characterized in that key text is stored on the computer readable storage medium Part management program is realized when the key file management program is executed by processor as any one of claim 1 to 7 The step of key file management method.
CN201711458021.8A 2017-12-27 2017-12-27 Management method, device and the computer readable storage medium of key file Pending CN108111519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711458021.8A CN108111519A (en) 2017-12-27 2017-12-27 Management method, device and the computer readable storage medium of key file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711458021.8A CN108111519A (en) 2017-12-27 2017-12-27 Management method, device and the computer readable storage medium of key file

Publications (1)

Publication Number Publication Date
CN108111519A true CN108111519A (en) 2018-06-01

Family

ID=62214109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711458021.8A Pending CN108111519A (en) 2017-12-27 2017-12-27 Management method, device and the computer readable storage medium of key file

Country Status (1)

Country Link
CN (1) CN108111519A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833096A (en) * 2018-06-26 2018-11-16 湖南格凡安信科技有限公司 A kind of data encryption dynamic key management system and method
CN111355680A (en) * 2018-12-04 2020-06-30 李舒云 Key distribution method, key receiving method, electronic terminal and storage medium
CN114423003A (en) * 2021-12-29 2022-04-29 中国航空工业集团公司西安飞机设计研究所 Airplane key comprehensive management method and system
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546731A (en) * 2010-12-30 2012-07-04 中国移动通信集团公司 Subchunk integrity checking method and system of peer-to-peer streaming media system
CN102726027A (en) * 2011-12-28 2012-10-10 华为技术有限公司 Secret key transmission method and device during pre-boot under full-disk encryption of virtual machine
CN103107996A (en) * 2013-02-07 2013-05-15 北京中视广信科技有限公司 On-line download method and system of digital certificate and digital certificate issuing platform
US20150195256A1 (en) * 2011-12-22 2015-07-09 Adobe Systems Incorporated Methods and Apparatus for Key Delivery in HTTP Live Streaming
CN105743885A (en) * 2016-01-22 2016-07-06 山东大学(威海) Data file transmitting and receiving method and device based on multi-level server client mode

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546731A (en) * 2010-12-30 2012-07-04 中国移动通信集团公司 Subchunk integrity checking method and system of peer-to-peer streaming media system
US20150195256A1 (en) * 2011-12-22 2015-07-09 Adobe Systems Incorporated Methods and Apparatus for Key Delivery in HTTP Live Streaming
CN102726027A (en) * 2011-12-28 2012-10-10 华为技术有限公司 Secret key transmission method and device during pre-boot under full-disk encryption of virtual machine
CN103107996A (en) * 2013-02-07 2013-05-15 北京中视广信科技有限公司 On-line download method and system of digital certificate and digital certificate issuing platform
CN105743885A (en) * 2016-01-22 2016-07-06 山东大学(威海) Data file transmitting and receiving method and device based on multi-level server client mode

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833096A (en) * 2018-06-26 2018-11-16 湖南格凡安信科技有限公司 A kind of data encryption dynamic key management system and method
CN111355680A (en) * 2018-12-04 2020-06-30 李舒云 Key distribution method, key receiving method, electronic terminal and storage medium
CN114423003A (en) * 2021-12-29 2022-04-29 中国航空工业集团公司西安飞机设计研究所 Airplane key comprehensive management method and system
CN114423003B (en) * 2021-12-29 2024-01-30 中国航空工业集团公司西安飞机设计研究所 Airplane key comprehensive management method and system
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system
CN117472035B (en) * 2023-12-27 2024-03-08 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Similar Documents

Publication Publication Date Title
CN108111519A (en) Management method, device and the computer readable storage medium of key file
CN109840591A (en) Model training systems, method and storage medium
CN107528865B (en) File downloading method and system
US20060242318A1 (en) Method and apparatus for cascading media
CN107800795A (en) The processing method and processing device of block information
EP3459000A1 (en) Applied cryptographic ip management method and system
CN110598110B (en) Service pushing method and device
CN109598131B (en) File uploading and downloading method and device, electronic equipment and storage medium
CN107181804A (en) The method for down loading and device of resource
CN108093015A (en) Document transmission system
US20130179513A1 (en) Behavior information collection device and behavior information transmission device
CN111460394A (en) Copyright file verification method and device and computer readable storage medium
CN113867782A (en) Gray scale distribution method and device, computer equipment and storage medium
CN111666086B (en) Method, system and storage medium for updating application software
CN110197064A (en) Process handling method and device, storage medium and electronic device
CN108769743A (en) A kind of video playing control method, system, node and computer storage media
CN111431957B (en) File processing method, device, equipment and system
CN106878246A (en) A kind of method for managing resource and device
CN107798236A (en) It is a kind of that the method and apparatus installed safely are realized to application program installation kit
CN106469091B (en) For distributing the method and apparatus of available area
CN111679853A (en) Open source software publishing method and device, computer equipment and readable storage medium
CN111444542A (en) Data processing method, device and storage medium for copyright file
CN116094698A (en) Quantum security identity authentication device, method, equipment and storage medium
CN110618989A (en) Information processing method, information processing device and related product
CN108830050A (en) Register method, device and the storage medium of computer program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180601