CN101587449A - System and method for sharing load of computer peripherals - Google Patents

System and method for sharing load of computer peripherals Download PDF

Info

Publication number
CN101587449A
CN101587449A CNA200810111791XA CN200810111791A CN101587449A CN 101587449 A CN101587449 A CN 101587449A CN A200810111791X A CNA200810111791X A CN A200810111791XA CN 200810111791 A CN200810111791 A CN 200810111791A CN 101587449 A CN101587449 A CN 101587449A
Authority
CN
China
Prior art keywords
software section
core missions
computer peripherals
module
missions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200810111791XA
Other languages
Chinese (zh)
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNA200810111791XA priority Critical patent/CN101587449A/en
Publication of CN101587449A publication Critical patent/CN101587449A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention provides a system and a method for sharing load of computer peripherals, which relates to the technical field of information. The system comprises a software part and a computer peripheral, wherein the software part comprises a communication module, a control module, a monitoring module and a task processing module, and the computer peripheral comprises a communication module, a control module and an intelligent processing module. The method mainly comprises the following steps that: the software part monitors whether the processing efficiency of core tasks in a computer reaches a preset value, and permits the computer to continue to process the core tasks if so, otherwise transfers part of the core tasks to the computer peripheral to be processed, and finally, the software part merges the results of processing the core tasks of two parts to obtain final processing results.

Description

A kind of system and method for sharing load of computer peripherals
Technical field
The present invention relates to areas of information technology, be specifically related to a kind of system and method for sharing load of computer peripherals.
Background technology
In flourishing day by day today of Information technology, information-based deep further to the influence of socio-economic development.The development of world economy process is accelerated, the fairly obvious computer of the megatrend of informationization, globalization, diversified development is widely used in daily life, the appearance velocity of propagation of internet is accelerated, quantity of information increases, knowledge explosion, change and accelerate, technology content increases, no longer only be confined to the work of scientific research and high precision, also playing the part of more and more important effect in common daily life, simultaneously, is the application of the infotech of representative with the internet, dwindle the distance in regional space, striven for time efficiency.
Computing machine is by original weigh 30 tons, become notebook, the PDA of today, its purposes is also by only limiting to the laboratory to being used for military affairs, scientific research, high precision work, and then to being widely used in daily life, except the variation of profile and purposes, the Computing ability that is determined by computer CPU has also had significant raising, for example in addition, the highest arithmetic speed of supercomputer of today is 91.8 floating-point operations (Teraflop, 1 floating-point operations=per second 1 TFlops mathematical operation).
Yet even so, it is too high that computing machine also exists its CPU usage, the problem that load is overweight, computer CPU not only will be responsible for receiving the information material of extraneous input after all, but also will be responsible for handling these data, and the result that will handle is sent on the corresponding device thereof then.Nearly all big and small work all need be issued an order by CPU, is communicated to other equipment and carries out.Lift a simple example, when we will print a file, the at first instruction of printing by keyboard or mouse input, after CPU receives this instruction, know that we want print file, will assign instruction data is delivered to printer, carry out the work of print file then by printer.Therefore, when the computer CPU occupancy is too high, cause the task efficient of emergency treatment in the computing machine to reduce easily, delay finishing of task, make troubles to people's work.
Smart card is a kind of size and the similar plastic cards of common business card, includes a silicon about diameter 1cm, has canned data and the function of carrying out complex calculation.It is widely used in fields such as phonecard, fiscard, identification card and mobile phone, pay TV.On the chip of smart card, integrated microprocessor, storer and I/O unit etc.It is considered to minimum in the world robot calculator.On smart card, have the extremely strong safe and secret controlling mechanism of a whole set of performance, the security control program is cured among the ROM (read-only memory), thereby has and can't duplicate and safety assurance reliably such as password read-write.It is than common magnetic card, and it is big also to have an information storage capacity, can utilize little processing to increase card advantages such as " wisdom ".
Intelligent key apparatus is a kind of personal computer interface by standard, the portable set that provides information encryption to handle.Its built-in single-chip microcomputer or intelligent card chip can storage key or digital certificate, utilizes the built-in cryptographic algorithm of intelligent key apparatus to realize functions such as the encryption of information or identification processing.Intelligent key apparatus has functions such as PKI application, digital signature, information encryption, secure network login and visit SSL secure network, and have the feature that the private key that guarantees the user leaves hardware never, it also has characteristics such as physically preventing from illegally to obtain its inner sensitive information.The USB Key because generally employing USB interface, so intelligent key apparatus is otherwise known as.
Summary of the invention
For solving the core missions problem that the treatment effeciency in computing machine is low sometimes, processing speed is slow in the prior art, the invention provides a kind of system of sharing load of computer peripherals, comprise software section and computer peripherals on the computing machine;
Described software section comprises communication module, control module, monitoring module and task processing module;
Described communication module is used for described software section and described computer peripherals communicates;
Described control module is used to control communicating by letter of described software section and described computer peripherals, and coordinates the communication between inner each module of the described software section of control and the work of each module;
Described monitoring module, whether the treatment effeciency that is used to monitor the core missions of carrying out on computers reaches preset value, and notifies described control module with monitored results;
Described task processing module, be used for monitoring module and monitor described core missions treatment effeciency when being lower than described preset value, described core missions are split as two parts, and wherein a part of core missions send to described computer peripherals by described communication module, and allow computing machine to continue to handle remaining a part of core missions, and receiving after described computer peripherals sends the result of described a part of core missions of returning by described communication module, the result of described two parts core missions is merged, obtain final core missions result; If described core missions treatment effeciency is not less than described preset value, then allow computing machine to continue to carry out described core missions;
Described computer peripherals comprises communication module, control module and intelligent processing module;
Described communication module is used for described computer peripherals and described software section communicates;
Described control module, be used to control described software section and described computer peripherals communicate by letter and inner each module of computer peripherals between communication and the work of each module;
Described intelligent processing module, be used to handle described software section and send described a part of core missions of described computer peripherals to, and after processing, result is sent to described software section by described communication module by the communication module of described computer peripherals.
Described software section also comprises core missions selection module, is used for automatic or manual and selects core missions.
Described software section also comprises authentication module, and whether be used to authenticate described computer peripherals legal.
Described software section also comprises the encryption and decryption module, is used for described software section will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or described software section is received from the outside;
Correspondingly, described computer peripherals also comprises the encryption and decryption module, is used for described computer peripherals will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or described computer peripherals is received from the outside.
Described data are a part of core missions or its result.
The control module of described software section also is used for determining the preset value of described core missions treatment effeciency, and described preset value can be determined by automatic or manual.
Communication module in described software section and the described computer peripherals can but to be not limited to be USB interface, parallel port, serial ports or eSATA interface or infrared ray, bluetooth, Wireless USB, contactless smart card, light wave or radio-frequency apparatus.
On the other hand, the present invention also provides a kind of method of sharing load of computer peripherals, and described method comprises:
Step 1, computer peripherals are set up with the software section on the computing machine and are communicated by letter;
Step 2, described software section monitoring core missions are carried out computer-chronograph on computers whether its treatment effeciency are reached preset value; If execution in step 3 then; Otherwise execution in step 4;
Step 3 allows to continue to carry out described core missions on computers, until being finished;
Step 4, described software section is split as two parts with described core missions, and wherein a part of core missions send to described computer peripherals; Described software section allows computing machine to continue to handle remaining a part of core missions;
Step 5, described computer peripherals is handled it after receiving described a part of core missions, and result sent to described software section, described software section will merge the result of two parts core missions, obtain final core missions result.
Described core missions can be self-defined by described software section by the user, perhaps selects a Computer Processing task as core missions automatically by described software section.
Before the described step 4, can also comprise the step that described software section authenticates described computer peripherals.
In the described step 4, before described a part of core missions are sent to described computer peripherals, can also encrypt it;
Correspondingly, in the described step 5, described computer peripherals at first is decrypted it, and then handles after receiving described a part of core missions.
Equally, in the described step 5, described computer peripherals sends to described operation result before the described software section, can also encrypt it;
Correspondingly, described software section merges before the described result, need the result of having encrypted be decrypted.
The preset value of described core missions treatment effeciency can be self-defined by described software section by the user, perhaps selects the preset value of a value as the core missions treatment effeciency automatically by described software section.
It can be by USB interface, parallel port, serial ports or eSATA interface or modes such as infrared ray, bluetooth, Wireless USB, contactless smart card, light wave or radio frequency that described computer peripherals is communicated by letter with described software section.
The invention has the beneficial effects as follows when in computing machine, carrying out core missions, whether reach the preset value of treatment effeciency by its treatment effeciency of software supervision, if do not reach, then core missions are split, part core missions after will splitting then send computer peripherals to and handle, after the computer peripherals processing finishes, with result return to software and by software the most at last the result of two parts core missions merge, thereby guaranteed the timely of core missions, fast processing, reduced the operation burden of computer system, and the process of can logarithm reportedly sending is encrypted, and has improved the security of operation.
Description of drawings
Fig. 1 is the structural representation of sharing load of computer peripherals provided by the invention system.
Fig. 2 is the process flow diagram of sharing load of computer peripherals method provided by the invention.
Embodiment
In order to be illustrated more clearly in the system and method for a kind of sharing load of computer peripherals of the present invention, below in conjunction with accompanying drawing and preferred embodiment it is further explained, but should not be construed as limitation of the present invention.
For making embodiments of the invention more concrete, computer peripherals in following examples is specially intelligent key apparatus, and the intelligent key apparatus cpu function is powerful in the present embodiment, the port information flow is also bigger, core missions are specially the anti-virus software virus killing, software section is specially anti-virus software, runs on computing machine.
The preferred embodiment of sharing load of computer peripherals system:
Shown in the accompanying drawing 1 is the preferred embodiment of the system of a kind of sharing load of computer peripherals provided by the invention, and as shown in FIG., this system comprises, software section and computer peripherals (intelligent key apparatus).
Software section comprises, task processing module 101, control module 102, monitoring module 103 and communication module 104;
Task processing module 101, be used for monitoring module and monitor the core missions treatment effeciency when being lower than preset value, core missions are split as two parts, and wherein a part of core missions send to computer peripherals by communication module, and allow computing machine to continue to handle remaining a part of core missions, and receiving after computer peripherals sends the result of a part of core missions of returning by communication module, the result of two parts core missions is merged, obtain final core missions result; If the core missions treatment effeciency is not less than preset value, then allow computing machine to continue to carry out described core missions;
Control module 102, be used for communicating by letter of Control Software part and computer peripherals, and the communication between each module of coordination Control Software partial interior and the work of each module, and the preset value of definite core missions treatment effeciency, preset value can be determined by automatic or manual;
Monitoring module 103, whether the treatment effeciency that is used to monitor the core missions of carrying out on computers reaches preset value, and notifies control module with monitored results;
Communication module 104 is used for computer peripherals and software section communicates.
In the practical application, software section also comprises core missions selection module, is used for automatic or manual and selects core missions; Authentication module, whether be used for the authentication computer external equipment legal; And/or the encryption and decryption module, be used for software section will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or software section is received from the outside.Data are a part of core missions or its result.
In the present embodiment, computer peripherals is specially intelligent key apparatus, and software section is specially anti-virus software, and core missions are specially the anti-virus software virus killing, and wherein anti-virus software virus killing efficient preset value is set by the anti-virus software control module.Anti-virus software virus killing task is set accounts for 80% of computer CPU, monitoring modular 103 monitors anti-virus software virus killing task occupancy 80% o'clock less than computer CPU, monitoring modular 103 sends control module 102 with monitoring result, control module 102 control task processing modules 101 split anti-virus software virus killing task, and the part anti-virus software virus killing task after will splitting sends intelligent key apparatus.
In the practical application, can also replace anti-virus software virus killing task to monitor with other tasks, the percent that takies computer CPU can be set arbitrarily, for example: 50%, 70% etc., this computer CPU occupancy preset value is set when the initialization by control module 102.
Task processing module 101 is connected in control module 102, and control module 102 is connected in task processing module 101, monitoring module 103 and communication module 104, and monitoring module 103 is connected in control module 102, and communication module 104 is connected in control module 102.
Intelligent key apparatus comprises, communication module 105, control module 106 and intelligent processing module 107;
Communication module 105 is used for intelligent key apparatus and software section communicates;
Control module 106, be used for Control Software part and intelligent key apparatus communicate by letter and inner each module of computer peripherals between communication and the work of each module;
Intelligent processing module 107 is used for processing software part and sends a part of core missions of intelligent key apparatus to by the communication module of intelligent key apparatus, and by communication module result is sent to software section after processing;
Communication module 105 is connected in control module 106, and control module 106 is connected in communication module 105 and intelligent processing module 107, and intelligent key processing module 107 is connected in control module 106.
If the software section of system comprises the encryption and decryption module, correspondingly, intelligent key apparatus also comprises the encryption and decryption module, is used for intelligent key apparatus will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or intelligent key apparatus is received from the outside.Data are a part of core missions or its result.
In the present embodiment, software section is when the user obtains intelligent key apparatus, and the manufacturer provides by intelligent key apparatus, and installs on computers.
Preferably, communication module 105 in the communication module 102 of the software section in the present embodiment and the intelligent key apparatus is meant usb interface connector, in addition communication module 102 and 103 can also be that the connector of parallel port, serial ports, eSATA interface or other are infrared, Wireless Telecom Equipments such as bluetooth, Wireless USB, contactless smart card, light wave or video.
Accompanying drawing 2 shows the preferred embodiment of the method for a kind of intelligent key apparatus load balancing of the present invention, originally execute example, the intelligent key apparatus cpu function is powerful, and the port information flow is also bigger, and software section is provided by the intelligent key apparatus manufacturer, be installed on computer run, core missions are specially 1+2+3+ ... + 100, and 1*2*3* ... * 100 two computation processes are before the concrete Processing tasks, intelligent key apparatus need be by the authentication of software section, and concrete steps are:
Step 201, intelligent key apparatus are set up with the software section on the computing machine and are communicated by letter; Intelligent key apparatus is connected in computing machine by USB interface in the present embodiment, in the practical application, can also use parallel port, serial ports, eSATA interface or wireless modes such as other are infrared, bluetooth, Wireless USB, contactless smart card, light wave or radio frequency connect intelligent key apparatus and computing machine;
Step 202, whether the software section authentication intelligent key device that moves in the computing machine is the intelligent key apparatus of legal (matching), if then execution in step 204; Otherwise, execution in step 203;
Computer utility shock response algorithm authentication intelligent key device in the present embodiment.
Step 203, the prompting intelligent key apparatus is illegal;
Step 204, the software section monitoring facilities that moves in the computing machine, 1+2+3+ in the monitoring computer ... + 100 and 1*2*3* ... * whether the computer CPU occupancy of 100 two computation processes reaches the CPU usage preset value, if then execution in step 205; Otherwise execution in step 206;
Present embodiment, after the intelligent key apparatus authentication is passed through, monitoring facilities is started working, core missions 1+2+3+ in the monitoring computer ... + 100 and 1*2*3* ... * whether 100 computer CPU occupancy reaches 80% of computer CPU, is, execution in step 205, otherwise, reach preset value for making the core missions CPU usage, accelerate core missions and handle, execution in step 206 splits core missions and transfers to the intelligent key apparatus processing;
In the practical application, can also replace above-mentioned two computation processes with other tasks, the occupancy preset value of CPU is artificially set when the initialization by control program, can be any setting (by the software section automatic or manual), for example: 50%, 70% etc.;
Step 205 allows computing machine to continue to carry out core missions;
Step 206, software section calculates 1+2+3+ with core missions ... + 100 and 1*2*3* ... * 100 split into, core missions 1+2+3+ ... + 100 and core missions 1*2*3* ... * 100, core missions are calculated 1+2+3+ ... + 100 encrypt, and send to intelligent key apparatus; Software section allows computing machine to continue to carry out core missions and calculates 1*2*3* ... * 100;
The present embodiment software section calculates 1+2+3+ with core missions ... + 100 encrypt employed algorithm can but be not limited to DES, 3DES or RC4;
Step 207, the core missions after the encryption that the intelligent key apparatus deciphering receives are calculated 1+2+3+ ... + 100, and, carry out these core missions then with corresponding algorithm deciphering;
Step 208, intelligent key apparatus will be carried out the result of above-mentioned core missions, send to the software section on the computing machine after the encryption;
Step 209, software section on the computing machine is decrypted the result that receives, software section monitors core missions and calculates 1*2*3* ... * 100 dispose after, core missions after the deciphering are calculated 1+2+3+ ... + 100 result and core missions are calculated 1*2*3* ... * 100 result merges, and obtains final core missions result.
In the practical application, if the core missions that split are tasks of an integral body, promptly, as core missions are 1+2+3+ ... + 100 these computation processes, then software section splits task and gives the intelligent key apparatus processing, and after the intelligent key apparatus processing finishes to return, after the core missions another part result merging of result with Computer Processing that receives, submit to computing machine together, the software section monitoring facilities continues the treatment effeciency of the next core missions of monitoring then.
The preset value of core missions treatment effeciency can be self-defined by software section by the user, perhaps selects the preset value of a value as the core missions treatment effeciency automatically by software section.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (14)

1. the system of a sharing load of computer peripherals is characterized in that, comprises software section and computer peripherals on the computing machine;
Described software section comprises communication module, control module, monitoring module and task processing module;
Described communication module is used for described software section and described computer peripherals communicates;
Described control module is used to control communicating by letter of described software section and described computer peripherals, and coordinates the communication between inner each module of the described software section of control and the work of each module;
Described monitoring module, whether the treatment effeciency that is used to monitor the core missions of carrying out on computers reaches preset value, and notifies described control module with monitored results;
Described task processing module, be used for monitoring module and monitor described core missions treatment effeciency when being lower than described preset value, described core missions are split as two parts, and wherein a part of core missions send to described computer peripherals by described communication module, and allow computing machine to continue to handle remaining a part of core missions, and receiving after described computer peripherals sends the result of described a part of core missions of returning by described communication module, the result of described two parts core missions is merged, obtain final core missions result; If described core missions treatment effeciency is not less than described preset value, then allow computing machine to continue to carry out described core missions;
Described computer peripherals comprises communication module, control module and intelligent processing module;
Described communication module is used for described computer peripherals and described software section communicates;
Described control module, be used to control described software section and described computer peripherals communicate by letter and inner each module of computer peripherals between communication and the work of each module;
Described intelligent processing module, be used to handle described software section and send described a part of core missions of described computer peripherals to, and after processing, result is sent to described software section by described communication module by the communication module of described computer peripherals.
2. system according to claim 1 is characterized in that, described software section also comprises core missions selection module, is used for automatic or manual and selects core missions.
3. system according to claim 1 is characterized in that described software section also comprises authentication module, and whether be used to authenticate described computer peripherals legal.
4. system according to claim 1, it is characterized in that, described software section also comprises the encryption and decryption module, is used for described software section will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or described software section is received from the outside;
Correspondingly, described computer peripherals also comprises the encryption and decryption module, is used for described computer peripherals will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or described computer peripherals is received from the outside.
5. system according to claim 4 is characterized in that, described data are a part of core missions or its result.
6. system according to claim 1 is characterized in that, the control module of described software section also is used for determining the preset value of described core missions treatment effeciency, and described preset value is determined by the automatic or manual mode.
7. system according to claim 1, it is characterized in that the communication module in described software section and the described computer peripherals is at least a in USB interface, parallel port, serial ports or eSATA interface or infrared ray, bluetooth, Wireless USB, contactless smart card, light wave or the radio-frequency apparatus.
8. the method for a sharing load of computer peripherals is characterized in that, described method comprises:
Step 1, computer peripherals are set up with the software section on the computing machine and are communicated by letter;
Step 2, described software section monitoring core missions are carried out computer-chronograph on computers whether its treatment effeciency are reached preset value; If execution in step 3 then; Otherwise execution in step 4;
Step 3 allows to continue to carry out described core missions on computers, until being finished;
Step 4, described software section is split as two parts with described core missions, and wherein a part of core missions send to described computer peripherals; Described software section allows computing machine to continue to handle remaining a part of core missions;
Step 5, described computer peripherals is handled it after receiving described a part of core missions, and result sent to described software section, described software section will merge the result of two parts core missions, obtain final core missions result.
9. method according to claim 8 is characterized in that, described core missions are self-defined by described software section by the user, perhaps selects a Computer Processing task as core missions automatically by described software section.
10. method according to claim 8 is characterized in that, before the described step 4, also comprises the step that described software section authenticates described computer peripherals.
11. method according to claim 8 is characterized in that, in the described step 4, before described a part of core missions are sent to described computer peripherals, also comprises it is encrypted;
Correspondingly, in the described step 5, described computer peripherals at first is decrypted it, and then handles after receiving described a part of core missions.
12. method according to claim 8 is characterized in that, in the described step 5, described computer peripherals sends to described operation result before the described software section, also comprises it is encrypted;
Correspondingly, described software section merges before the described result, need the result of having encrypted be decrypted.
13. method according to claim 8 is characterized in that, the preset value of described core missions treatment effeciency is self-defined by described software section by the user, perhaps selects the preset value of a value as the core missions treatment effeciency automatically by described software section.
14. method according to claim 8, it is characterized in that communicate by letter with described software section at least a into by in USB interface, parallel port, serial ports or eSATA interface or the modes such as infrared ray, bluetooth, Wireless USB, contactless smart card, light wave or radio frequency of described computer peripherals.
CNA200810111791XA 2008-05-20 2008-05-20 System and method for sharing load of computer peripherals Pending CN101587449A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200810111791XA CN101587449A (en) 2008-05-20 2008-05-20 System and method for sharing load of computer peripherals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200810111791XA CN101587449A (en) 2008-05-20 2008-05-20 System and method for sharing load of computer peripherals

Publications (1)

Publication Number Publication Date
CN101587449A true CN101587449A (en) 2009-11-25

Family

ID=41371703

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200810111791XA Pending CN101587449A (en) 2008-05-20 2008-05-20 System and method for sharing load of computer peripherals

Country Status (1)

Country Link
CN (1) CN101587449A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693455A (en) * 2012-05-04 2012-09-26 武汉天喻信息产业股份有限公司 Fully automatic system and method of data preparation based on financial IC card
WO2015078073A1 (en) * 2013-11-29 2015-06-04 深圳市理邦精密仪器股份有限公司 Method for monitoring software crash and medical external apparatus using same
WO2021109654A1 (en) * 2019-12-03 2021-06-10 支付宝(杭州)信息技术有限公司 Security task processing method and electronic device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693455A (en) * 2012-05-04 2012-09-26 武汉天喻信息产业股份有限公司 Fully automatic system and method of data preparation based on financial IC card
WO2015078073A1 (en) * 2013-11-29 2015-06-04 深圳市理邦精密仪器股份有限公司 Method for monitoring software crash and medical external apparatus using same
WO2021109654A1 (en) * 2019-12-03 2021-06-10 支付宝(杭州)信息技术有限公司 Security task processing method and electronic device

Similar Documents

Publication Publication Date Title
US9015848B2 (en) Method for virtualizing a personal working environment and device for the same
CN106605233B (en) Providing trusted execution environment using processor
US9495524B2 (en) Secure user authentication using a master secure element
KR101805476B1 (en) Virtual point of sale
CN101770386B (en) Safe startup method for Linux embedded system
US7861015B2 (en) USB apparatus and control method therein
EP3065074A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
JP5808482B2 (en) User terminal and payment system
EP3706019B1 (en) Hardware-enforced access protection
US10491395B2 (en) Handy terminal and payment method to be used in same
US20140380403A1 (en) Secure access enforcement proxy
EP2915116A1 (en) Secure computing environment
US20150019875A1 (en) Portable device for data encryption/decryption and/or compression/decompression
CN109033771B (en) System and method for PIN entry on a mobile device
CN101535957A (en) System and method for sharing atrusted platform module
CN104504563A (en) Mobile information safety equipment and working method thereof
CN107422838A (en) A kind of Wearable, solution lock control system and solution lock control method
WO2004053664A1 (en) Program execution control apparatus, os, client terminal, server, program execution control system, program execution control method, and program execution control program
CN101587449A (en) System and method for sharing load of computer peripherals
EP3776324A1 (en) Remote secured terminal
WO2013121275A1 (en) Portable device for data encryption/decryption and/or compression/decompression
EP3839783A1 (en) Electronic device for providing service by using secure element, and operating method thereof
CN101646262A (en) Wireless data card and identity certification method thereof
US20140215204A1 (en) Device for preventing logging of clients input data in a computer system
Morgner et al. Mobile smart card reader using NFC-enabled smartphones

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20091125