CN108388788A - A kind of method and device for calling USB KEY bottoms library - Google Patents

A kind of method and device for calling USB KEY bottoms library Download PDF

Info

Publication number
CN108388788A
CN108388788A CN201810200505.0A CN201810200505A CN108388788A CN 108388788 A CN108388788 A CN 108388788A CN 201810200505 A CN201810200505 A CN 201810200505A CN 108388788 A CN108388788 A CN 108388788A
Authority
CN
China
Prior art keywords
usb key
library
bottoms
calling
facility information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810200505.0A
Other languages
Chinese (zh)
Other versions
CN108388788B (en
Inventor
于佳平
段芳芳
宋志华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuweng Information Technology Co.,Ltd.
Original Assignee
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd filed Critical SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201810200505.0A priority Critical patent/CN108388788B/en
Publication of CN108388788A publication Critical patent/CN108388788A/en
Application granted granted Critical
Publication of CN108388788B publication Critical patent/CN108388788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of methods in calling USB KEY bottoms library, the method is when receiving the request for calling com component, preset com component is called, and after the facility information for getting USB KEY, USB KEY bottoms corresponding with facility information library is called by target interface.So that the USB KEY that com component is suitable for different vendor's production can call its corresponding USB KEY bottoms library for different USB KEY by target interface;Meanwhile USB KEY bottoms library is called using this method, it avoids technical staff and develops different com components for different USB KEY, reduce the workload of developer, saved cost.Correspondingly, a kind of device, system, equipment and computer readable storage medium calling USB KEY bottoms library disclosed by the invention, similarly has above-mentioned technique effect.

Description

A kind of method and device for calling USB KEY bottoms library
Technical field
The present invention relates to field of information security technology, more specifically to a kind of side in calling USB KEY bottoms library Method, device, system, equipment and computer readable storage medium.
Background technology
With internet and operation system apply gradually deeply, people for information security attention degree increasingly Height is carried out to ensure the safe operation of the network platform and system platform and logs in safety and authentication work, and USB KEY are answered It transports and gives birth to.USB KEY can be stored as a kind of hardware device with USB interface, built-in microcontroller or intelligent card chip Private key and digital certificate of user etc..
Currently, USB KEY are complete general with corresponding com component in application system and corresponding USB KEY bottoms library It is operated at various safety checks.But since different vendor encapsulates different interface libraries, each USB KEY needs is corresponding with Specific com component and USB KEY bottoms library.A kind of USB KEY are often produced, need to develop corresponding com component, ability It realizes the calling to USB KEY bottoms library, completes various safety check operations.The exploitation amount of com component is so just increased, both It wastes time, and increases the workload of technical staff.
Therefore, so that com component is compatible with different USB KEY, realize the calling to different USB KEY bottoms libraries, be this Field technology personnel's problem to be solved.
Invention content
The purpose of the present invention is to provide a kind of method, apparatus, system, equipment and the calculating in calling USB KEY bottoms library Machine readable storage medium storing program for executing calls different USB KEY bottoms libraries to realize that com component is compatible with different USB KEY.
To achieve the above object, an embodiment of the present invention provides following technical solutions:
A method of USB KEY bottoms library is called, including:
Receive the request for calling com component;
According to the preset com component of the request call, the com component has compatible different USB KEY bottoms libraries Target interface;
The facility information for the USB KEY that the request carries is obtained by the com component, and passes through the target interface Call USB KEY bottoms corresponding with facility information library.
Wherein, before the library by target interface calling USB KEY bottoms corresponding with the facility information, also Including:
USB KEY bottoms corresponding with facility information library is searched in preset database.
Wherein, lookup USB KEY bottoms corresponding with the facility information library in preset database, including:
Judge to whether there is USB KEY bottoms corresponding with facility information library in the database;
If so, executing lookup USB KEY bottoms corresponding with the facility information library in preset database The step of;
If it is not, then importing the KEY bottoms libraries USB corresponding with the facility information to the database, and execute described logical Cross the step of target interface calls the bottom libraries USB KEY corresponding with the facility information.
Wherein, lookup USB KEY bottoms corresponding with the facility information library in preset database, including:
Search USB KEY bottoms corresponding with the facility information in the database according to preset configuration file Library, the configuration file have prestored the correspondence of facility information and USB KEY bottoms library.
Wherein, after the preset com component according to the request call, further include:
Corresponding ActiveX control is downloaded according to the ActiveX of html page marks, and executes the ActiveX control.
A kind of device calling USB KEY bottoms library, including:
Receiving module, for receiving the request for calling com component;
Calling module, for according to the preset com component of the request call, the com component to have compatible different USB The target interface in KEY bottoms library;
Execution module, the facility information for obtaining the USB KEY that the request carries by the com component, and lead to It crosses the target interface and calls USB KEY bottoms corresponding with facility information library.
Wherein, further include:
Searching module, for searching USB KEY bottoms corresponding with facility information library in preset database.
A kind of system for calling USB KEY bottoms library, including:
Client, for sending the request for calling com component;
Server-side, for receiving the request for calling com component;It is described according to the preset com component of the request call Com component has the target interface in compatible different USB KEY bottoms libraries;Obtain what the request carried by the com component The facility information of USB KEY, and USB KEY bottoms corresponding with facility information library is called by the target interface.
A kind of equipment for calling USB KEY bottoms library, including:
Memory, for storing computer program;
Processor realizes the bottoms calling USB KEY as described in above-mentioned any one when for executing the computer program The step of method in layer library.
A kind of computer readable storage medium is stored with computer program on the computer readable storage medium, described The step of the method for calling USB KEY bottoms library as described in above-mentioned any one is realized when computer program is executed by processor Suddenly.
By above scheme it is found that a kind of method for calling USB KEY bottoms libraries provided in an embodiment of the present invention, including: Receive the request for calling com component;According to the preset com component of the request call, the com component has compatible different The target interface in USB KEY bottoms library;The facility information for the USB KEY that the request carries is obtained by the com component, and USB KEY bottoms corresponding with facility information library is called by the target interface.
As it can be seen that the method calls preset com component, and getting when receiving the request for calling com component After the facility information of USB KEY, USB KEY bottoms corresponding with facility information library is called by target interface, that is, is called USB KEY bottoms corresponding with USB KEY library.So that com component can meet different USB KEY by target Mouth calls its corresponding USB KEY bottoms library, i.e. the com component is public com component, is suitable for different vendor's production USB KEY;Simultaneously as target interface can call different USB KEY bottoms libraries, it is thus possible to shield different UEB KEY The otherness in bottom library;Furthermore USB KEY bottoms library is called by the com component that this method provides, also avoids technical staff Different com components is developed for different USB KEY, reduces the workload of developer, improves work efficiency, also save Cost.
Correspondingly, a kind of device, system, equipment and calculating for calling USB KEY bottoms library provided in an embodiment of the present invention Machine readable storage medium storing program for executing, similarly has above-mentioned technique effect.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of method flow diagram calling USB KEY bottoms library disclosed by the embodiments of the present invention;
Fig. 2 is another method flow diagram for calling USB KEY bottoms library disclosed by the embodiments of the present invention;
Fig. 3 is a kind of schematic device for calling USB KEY bottoms library disclosed by the embodiments of the present invention;
Fig. 4 is a kind of system schematic for calling USB KEY bottoms library disclosed by the embodiments of the present invention;
Fig. 5 is a kind of equipment schematic diagram for calling USB KEY bottoms library disclosed by the embodiments of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of method, apparatus, system, equipment and the computers in calling USB KEY bottoms library Readable storage medium storing program for executing calls different USB KEY bottoms libraries to realize that com component is compatible with different USB KEY.
Referring to Fig. 1, a kind of method for calling USB KEY bottoms library provided in an embodiment of the present invention, including:
S101, the request for calling com component is received;
Specifically, when user needs using USB KEY, USB KEY are plugged to USB interface first, and pass through browsing Device is operated accordingly.Such mode of operation for carrying out safety check is based on B/S structures (Browser/Server structures), i.e., Browser and server structure.
At this stage, B/S structures have become a kind of epidemic system structure during Web application systems are developed, the advantage of the structure It is:Without developing client software, maintenance and upgrade is convenient;Can cross-platform operation, as long as any machine equipped with WWW it is clear It lookes at device software, can be used as client computer to access system, call corresponding com component, it, can be real after being connect with USB KEY The operations such as existing safety check have good open and expandability.
S102, according to the preset com component of the request call, the com component has compatible different USB KEY bottoms The target interface in library;
In the present embodiment, the com component according to《Intelligent code key cipher application interface specification》It is designed out Hair, therefore each interface in the com component is satisfied by the design requirement of the specification, including:The intelligent cipher of PKI cipher systems Key cipher application interface, cipher application interface, data type, parameter definition and equipment safety etc..Therefore in the present embodiment Com component can be compatible with the USB KEY of different vendor's production, and the corresponding USB KEY bottoms libraries difference USB KEY.
S103, the facility information that the USB KEY that the request carries are obtained by the com component;
S104, USB KEY bottoms corresponding with facility information library is searched in preset database, and by described Target interface calls USB KEY bottoms corresponding with facility information library.
It should be noted that the com component includes:It enumerates USB KEY, open equipment, enciphering/deciphering, signature sign test And obtain the interfaces such as facility information;Wherein further include:Compatible different USB KEY bottoms libraries, for calling USB KEY bottoms The target interface in library.The above interface can operate any one USB KEY, i.e., these interfaces are common interface.Its In, the target interface in compatible different USB KEY bottoms libraries can call the corresponding USB KEY of USB KEY of arbitrary manufacturer's production Bottom library.
Specifically, by the com component obtain it is described request carry USB KEY facility information after, can foundation The facility information got searches corresponding USB KEY bottoms library, and realizes the tune to USB KEY bottoms library by target interface With, and then realize and the safety check of USB KEY is operated.
As it can be seen that a kind of method for calling USB KEY bottoms library provided in this embodiment, the method are receiving calling When the request of com component, preset com component is called, and after the facility information for getting USB KEY, in preset data USB KEY bottoms corresponding with facility information library is searched in library, and is called and the facility information pair by target interface USB KEY bottoms corresponding with USB KEY library is called in the USB KEY bottoms library answered.So that com component is for difference USB KEY can call its corresponding USB KEY bottoms library by target interface, i.e. the com component is public COM groups Part is suitable for the USB KEY of different vendor's production;Simultaneously as target interface can call different USB KEY bottoms libraries, The otherness in different UEB KEY bottoms libraries can thus be shielded;Furthermore USB KEY are called by the com component that this method provides Bottom library also avoids technical staff and develops different com components for different USB KEY, reduces the work of developer Amount, improves work efficiency, also saves cost.
The embodiment of the invention discloses another methods for calling USB KEY bottoms library, relative to a upper embodiment, this reality It applies example and further instruction and optimization has been made to technical solution.
Referring to Fig. 2, another method for calling USB KEY bottoms library provided in an embodiment of the present invention, including:
S201, the request for calling com component is received;
S202, according to the preset com component of the request call, the com component has compatible different USB KEY bottoms The target interface in library;
S203, the facility information that the USB KEY that the request carries are obtained by the com component;
S204, judge to whether there is USB KEY bottoms corresponding with facility information library in preset database;If It is then to execute S205;If it is not, then executing S206;
S205, USB KEY bottoms corresponding with facility information library is searched in preset database, and execute S207;
S206, the KEY bottoms libraries USB corresponding with the facility information are imported to the database, and executes S207;
S207, USB KEY bottoms corresponding with facility information library is called by the target interface.
In the present embodiment, a variety of USB KEY bottoms libraries are pre-stored in preset database, and the database is State database, can be according to the in due course additions and deletions of the actual demand USB KEY bottoms library therein of user.Such as:When in database not When in the presence of the bottom libraries USB KEY corresponding with the facility information, USB corresponding with the facility information can be imported in time USB KEY bottoms corresponding with facility information library is called to the database, will pass through target interface in KEY bottoms library.
Certainly, if certain USB KEY bottoms library long period in database is idle, the bottoms USB KEY can be deleted Layer library increases other USB KEY bottoms libraries in due course to save the memory space of database.
As it can be seen that another method for calling USB KEY bottoms library provided in this embodiment, the method are receiving calling When the request of com component, preset com component is called, and after the facility information for getting USB KEY, judge preset number According in library whether there is USB KEY bottoms corresponding with facility information library;If so, in preset database search with The corresponding USB KEY bottoms library of the facility information;If it is not, then importing USB KEY bottoms corresponding with facility information library To the database;In turn, USB KEY bottoms corresponding with facility information libraries is called by target interface, that is, call and The corresponding USB KEY bottoms libraries USB KEY.
So that com component for different USB KEY, can call its corresponding USB KEY by target interface Bottom library, the i.e. com component are public com component, are suitable for the USB KEY of different vendor's production;Simultaneously as target connects Mouth can call different USB KEY bottoms libraries, it is thus possible to shield the otherness in different UEB KEY bottoms libraries;Furthermore pass through The com component that this method provides calls USB KEY bottoms library, and it is different for different USB KEY exploitations to also avoid technical staff Com component, reduce the workload of developer, improve work efficiency, also save cost.
Based on above-mentioned any embodiment, it should be noted that described searched in preset database is believed with the equipment Corresponding USB KEY bottoms library is ceased, including:
Search USB KEY bottoms corresponding with the facility information in the database according to preset configuration file Library, the configuration file have prestored the correspondence of facility information and USB KEY bottoms library.
Specifically, since different USB KEY are corresponding with different USB KEY bottoms libraries, there are one-to-one relationship, Therefore, before calling USB KEY bottoms library, it is necessary first to determine its correspondence.Therefore, correspondence can be deposited in advance Storage when needing to obtain correspondence, is searched according to preset configuration file and is set with described to configuration file in the database The standby corresponding USB KEY bottoms library of information.
It is of course also possible to use the mode of cyclic switching searches the corresponding USB KEY bottoms library of facility information.Such as:Number According to storing No. 1 USB KEY bottoms library, No. 2 USB KEY bottoms libraries, No. 3 USB KEY bottoms libraries in library, and user is used No. 3 USB KEY, then can first attempt to call No. 1 USB KEY bottoms library, if malloc failure malloc, it tries call No. 2 USB If KEY bottoms library malloc failure mallocs, it tries call No. 3 USB KEY bottoms libraries, successfully call at this time, after user can carry out Continue other operations.Certainly, technical staff can search corresponding USB KEY according to actual demand using suitable other methods Bottom library, details are not described herein for this specification.
Based on above-mentioned any embodiment, it should be noted that it is described according to the preset com component of the request call it Afterwards, further include:
Corresponding ActiveX control is downloaded according to the ActiveX of html page marks, and executes the ActiveX control.
Specifically, when coordinating USB KEY to be operated by browser, need to be marked according to the ActiveX of html page Will downloads corresponding ActiveX control, and executes the ActiveX control.When user needs to operate using USB KEY, ActiveX control just calls the corresponding interface of com component, and then calls corresponding USB KEY bottoms library real by target interface The functions such as existing safety check.
Based on above-mentioned any embodiment, it should be noted that the com component can be according to《Intelligent code key password Application Interface Specification》It is designed exploitation, exploitation design can also be carried out according to the interface specification of other in industry.Certainly, institute The target interface stated in com component can also be according to the actual demand of user, and follows the interface specification in industry and carry out individual character Melt hair design.Exploitation design is carried out according to the distinct interface specification in industry so that the com component and the target interface It can be compatible with more difference USB KEY and its corresponding USB KEY bottoms libraries each USB KEY as far as possible.
Based on above-mentioned any embodiment, it should be noted that interface function specific implementation is completed in com component. Any number of interface may be implemented in one com component, this can by the multiple inheritance of the abstract base class to defining interface or It is realized using modes such as nested class.Meanwhile com component needs unique GUID value to identify itself, identifies the GUID of component Referred to as CLSID (Class Identifier).The com component provided in this specification is suitable for the operation ring of arbitrary USB KEY Border, such as CA, enterprise, data center, public security, Custom system etc..
A kind of device calling USB KEY bottoms libraries provided in an embodiment of the present invention is introduced below, is described below A kind of device in calling USB KEY bottoms library can be mutual with a kind of above-described method that calling USB KEY bottoms libraries Reference.
Referring to Fig. 3, a kind of device calling USB KEY bottoms library provided in an embodiment of the present invention, including:
Receiving module 301, for receiving the request for calling com component;
Calling module 302, for according to the preset com component of the request call, the com component to have compatible different The target interface in USB KEY bottoms library;
Execution module 303, the facility information for obtaining the USB KEY that the request carries by the com component, and USB KEY bottoms corresponding with facility information library is called by the target interface.
Wherein, further include:
Searching module, for searching USB KEY bottoms corresponding with facility information library in preset database.
Wherein, the searching module is specifically used for:
Search USB KEY bottoms corresponding with the facility information in the database according to preset configuration file Library, the configuration file have prestored the correspondence of facility information and USB KEY bottoms library.
Wherein, the searching module includes:
Judging unit whether there is USB KEY bottoms corresponding with the facility information for judging in the database Library;
Execution unit, when for there is the bottom libraries USB KEY corresponding with the facility information in the database, pre- If database in search USB KEY bottoms corresponding with facility information libraries;
Import unit is led when for the bottom libraries USB KEY corresponding with the facility information to be not present in the database Enter the KEY bottoms libraries USB corresponding with the facility information to the database, and by the target interface call with it is described The corresponding USB KEY bottoms library of facility information.
Wherein, further include:
Execution module is downloaded, for downloading corresponding ActiveX control according to the ActiveX of html page marks, and is held The row ActiveX control.
A kind of system that calling USB KEY bottoms libraries provided in an embodiment of the present invention is introduced below, is described below A kind of system in calling USB KEY bottoms library can with a kind of above-described method and device that calling USB KEY bottoms libraries With cross-referenced.
Referring to Fig. 4, a kind of system for calling USB KEY bottoms library provided in an embodiment of the present invention, including:
Client 401, for sending the request for calling com component;
Server-side 402, for receiving the request for calling com component;According to the preset com component of the request call, institute Stating com component has the target interface in compatible different USB KEY bottoms libraries;The request is obtained by the com component to carry USB KEY facility information, and pass through the target interface and call USB KEY bottoms corresponding with facility information libraries.
A kind of equipment that calling USB KEY bottoms libraries provided in an embodiment of the present invention is introduced below, is described below A kind of equipment in calling USB KEY bottoms library a kind of calling the method, apparatus in USB KEY bottoms libraries with above-described and be System can be cross-referenced.
Referring to Fig. 5, a kind of equipment for calling USB KEY bottoms library provided in an embodiment of the present invention, including:
Memory 501, for storing computer program;
Processor 502 realizes the calling USB KEY described in above-mentioned any embodiment when for executing the computer program The step of method in bottom library.
A kind of computer readable storage medium provided in an embodiment of the present invention is introduced below, one kind described below Computer readable storage medium and a kind of above-described method, apparatus, system and the equipment for calling USB KEY bottoms libraries can be with It is cross-referenced.
A kind of computer readable storage medium is stored with computer program on the computer readable storage medium, described The step of the method for calling USB KEY bottoms library as described in above-mentioned any embodiment is realized when computer program is executed by processor Suddenly.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other The difference of embodiment, just to refer each other for identical similar portion between each embodiment.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest range caused.

Claims (10)

1. a kind of method for calling USB KEY bottoms library, which is characterized in that including:
Receive the request for calling com component;
According to the preset com component of the request call, the com component has the target in compatible different USB KEY bottoms libraries Interface;
The facility information for the USB KEY that the request carries is obtained by the com component, and is called by the target interface USB KEY bottoms corresponding with facility information library.
2. the method according to claim 1 for calling USB KEY bottoms library, which is characterized in that described to pass through the target Before interface calls USB KEY bottoms corresponding with facility information library, further include:
USB KEY bottoms corresponding with facility information library is searched in preset database.
3. the method according to claim 2 for calling USB KEY bottoms library, which is characterized in that described in preset data USB KEY bottoms corresponding with facility information library is searched in library, including:
Judge to whether there is USB KEY bottoms corresponding with facility information library in the database;
If so, executing the step for searching USB KEY bottoms corresponding with facility information library in preset database Suddenly;
If it is not, then importing the KEY bottoms libraries USB corresponding with the facility information to the database, and pass through institute described in execution State the step of target interface calls the bottom libraries USB KEY corresponding with the facility information.
4. the method according to claim 3 for calling USB KEY bottoms library, which is characterized in that described in preset data USB KEY bottoms corresponding with facility information library is searched in library, including:
Search USB KEY bottoms corresponding with facility information library, institute in the database according to preset configuration file State the correspondence that configuration file has prestored facility information and USB KEY bottoms library.
5. the method according to claim 1 for calling USB KEY bottoms library, which is characterized in that described according to the request After calling preset com component, further include:
Corresponding ActiveX control is downloaded according to the ActiveX of html page marks, and executes the ActiveX control.
6. a kind of device calling USB KEY bottoms library, which is characterized in that including:
Receiving module, for receiving the request for calling com component;
Calling module, for according to the preset com component of the request call, the com component to have compatible different USB KEY The target interface in bottom library;
Execution module, the facility information for obtaining the USB KEY that the request carries by the com component, and pass through institute It states target interface and calls USB KEY bottoms corresponding with facility information library.
7. the device according to claim 6 for calling USB KEY bottoms library, which is characterized in that further include:
Searching module, for searching USB KEY bottoms corresponding with facility information library in preset database.
8. a kind of system for calling USB KEY bottoms library, which is characterized in that including:
Client, for sending the request for calling com component;
Server-side, for receiving the request for calling com component;According to the preset com component of the request call, the COM groups Part has the target interface in compatible different USB KEY bottoms libraries;The USB that the request carries is obtained by the com component The facility information of KEY, and USB KEY bottoms corresponding with facility information library is called by the target interface.
9. a kind of equipment for calling USB KEY bottoms library, which is characterized in that including:
Memory, for storing computer program;
Processor realizes the calling USB KEY as described in claim 1-5 any one when for executing the computer program The step of method in bottom library.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the bottoms calling USB KEY as described in claim 1-5 any one when the computer program is executed by processor The step of method in layer library.
CN201810200505.0A 2018-03-12 2018-03-12 A kind of method and device for calling USB KEY bottom library Active CN108388788B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810200505.0A CN108388788B (en) 2018-03-12 2018-03-12 A kind of method and device for calling USB KEY bottom library

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810200505.0A CN108388788B (en) 2018-03-12 2018-03-12 A kind of method and device for calling USB KEY bottom library

Publications (2)

Publication Number Publication Date
CN108388788A true CN108388788A (en) 2018-08-10
CN108388788B CN108388788B (en) 2019-11-26

Family

ID=63067568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810200505.0A Active CN108388788B (en) 2018-03-12 2018-03-12 A kind of method and device for calling USB KEY bottom library

Country Status (1)

Country Link
CN (1) CN108388788B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1591891A2 (en) * 2004-04-29 2005-11-02 Microsoft Corporation Generic USB drivers
CN101639771A (en) * 2008-07-30 2010-02-03 许燕 Method for converting HID interface to PC/SC interface
CN101986740A (en) * 2010-09-14 2011-03-16 中国联合网络通信集团有限公司 JAVA card
CN102118381A (en) * 2010-09-20 2011-07-06 中科方德软件有限公司 Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method
CN103366812A (en) * 2013-07-22 2013-10-23 烽火通信科技股份有限公司 Device for Flash online programming on circuit board and implementation method
CN103618699A (en) * 2013-11-12 2014-03-05 吴晓军 Method and device for calling component
US9043497B2 (en) * 2010-01-14 2015-05-26 Microsoft Technology Licensing, Llc Driver interface functions to interface client function drivers

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1591891A2 (en) * 2004-04-29 2005-11-02 Microsoft Corporation Generic USB drivers
CN101639771A (en) * 2008-07-30 2010-02-03 许燕 Method for converting HID interface to PC/SC interface
US9043497B2 (en) * 2010-01-14 2015-05-26 Microsoft Technology Licensing, Llc Driver interface functions to interface client function drivers
CN101986740A (en) * 2010-09-14 2011-03-16 中国联合网络通信集团有限公司 JAVA card
CN102118381A (en) * 2010-09-20 2011-07-06 中科方德软件有限公司 Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method
CN103366812A (en) * 2013-07-22 2013-10-23 烽火通信科技股份有限公司 Device for Flash online programming on circuit board and implementation method
CN103618699A (en) * 2013-11-12 2014-03-05 吴晓军 Method and device for calling component

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭洋: "基于数字证书的电子签章系统在电子政务中的应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Also Published As

Publication number Publication date
CN108388788B (en) 2019-11-26

Similar Documents

Publication Publication Date Title
Costin et al. A {Large-scale} analysis of the security of embedded firmwares
CN108399329B (en) Method for improving security of trusted application program
CN111695156A (en) Service platform access method, device, equipment and storage medium
CN104408371B (en) A kind of implementation method based on credible performing environment high safety application system
CN105446713A (en) Safe storage method and equipment
CN106341381A (en) Method and system of key management for rack server system
JP2016540282A (en) Method and apparatus for protecting a dynamic library
CN109634619A (en) Credible performing environment implementation method and device, terminal device, readable storage medium storing program for executing
CN106096418B (en) SELinux-based startup security level selection method and device and terminal equipment
CN112800429A (en) Method for protecting driver in UEFI BIOS firmware system based on foundation
CN111639309B (en) Data processing method and device, node equipment and storage medium
CN104954463A (en) Method, equipment and system for user information management of application
CN103561006A (en) Application authentication method and device and application authentication server based on Android
CN107741874B (en) Automatic creating method and system for GIS cloud virtual machine
CN103885784A (en) Method for establishing Android platform with security module and plugging function
CN111949529B (en) System debugging method, device, computer equipment and storage medium
CN107992379A (en) A kind of method, mobile terminal and computer-readable medium for reading data message
CN108388788B (en) A kind of method and device for calling USB KEY bottom library
CN115021995B (en) Multi-channel login method, device, equipment and storage medium
CN111488286A (en) Method and device for independently developing Android module
CN106778193B (en) Client and UI interaction method
CN116566629A (en) Security testing method and device, computer equipment and storage medium
CN106027639B (en) A kind of wide-area network access method and device of PAAS platform
CN114924783A (en) Interface calling method, device, equipment and storage medium of application program
CN111339552B (en) Database access method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 264200 No. 12-1, Chuhe North Road, chucun Town, gaoqu District, Weihai City, Shandong Province

Patentee after: Yuweng Information Technology Co.,Ltd.

Address before: No.12, Chuhe North Road, gaoqu District, Weihai City, Shandong Province

Patentee before: SHANDONG FISHERMAN INFORMATION TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address