CN108388788A - A kind of method and device for calling USB KEY bottoms library - Google Patents
A kind of method and device for calling USB KEY bottoms library Download PDFInfo
- Publication number
- CN108388788A CN108388788A CN201810200505.0A CN201810200505A CN108388788A CN 108388788 A CN108388788 A CN 108388788A CN 201810200505 A CN201810200505 A CN 201810200505A CN 108388788 A CN108388788 A CN 108388788A
- Authority
- CN
- China
- Prior art keywords
- usb key
- library
- bottoms
- calling
- facility information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of methods in calling USB KEY bottoms library, the method is when receiving the request for calling com component, preset com component is called, and after the facility information for getting USB KEY, USB KEY bottoms corresponding with facility information library is called by target interface.So that the USB KEY that com component is suitable for different vendor's production can call its corresponding USB KEY bottoms library for different USB KEY by target interface;Meanwhile USB KEY bottoms library is called using this method, it avoids technical staff and develops different com components for different USB KEY, reduce the workload of developer, saved cost.Correspondingly, a kind of device, system, equipment and computer readable storage medium calling USB KEY bottoms library disclosed by the invention, similarly has above-mentioned technique effect.
Description
Technical field
The present invention relates to field of information security technology, more specifically to a kind of side in calling USB KEY bottoms library
Method, device, system, equipment and computer readable storage medium.
Background technology
With internet and operation system apply gradually deeply, people for information security attention degree increasingly
Height is carried out to ensure the safe operation of the network platform and system platform and logs in safety and authentication work, and USB KEY are answered
It transports and gives birth to.USB KEY can be stored as a kind of hardware device with USB interface, built-in microcontroller or intelligent card chip
Private key and digital certificate of user etc..
Currently, USB KEY are complete general with corresponding com component in application system and corresponding USB KEY bottoms library
It is operated at various safety checks.But since different vendor encapsulates different interface libraries, each USB KEY needs is corresponding with
Specific com component and USB KEY bottoms library.A kind of USB KEY are often produced, need to develop corresponding com component, ability
It realizes the calling to USB KEY bottoms library, completes various safety check operations.The exploitation amount of com component is so just increased, both
It wastes time, and increases the workload of technical staff.
Therefore, so that com component is compatible with different USB KEY, realize the calling to different USB KEY bottoms libraries, be this
Field technology personnel's problem to be solved.
Invention content
The purpose of the present invention is to provide a kind of method, apparatus, system, equipment and the calculating in calling USB KEY bottoms library
Machine readable storage medium storing program for executing calls different USB KEY bottoms libraries to realize that com component is compatible with different USB KEY.
To achieve the above object, an embodiment of the present invention provides following technical solutions:
A method of USB KEY bottoms library is called, including:
Receive the request for calling com component;
According to the preset com component of the request call, the com component has compatible different USB KEY bottoms libraries
Target interface;
The facility information for the USB KEY that the request carries is obtained by the com component, and passes through the target interface
Call USB KEY bottoms corresponding with facility information library.
Wherein, before the library by target interface calling USB KEY bottoms corresponding with the facility information, also
Including:
USB KEY bottoms corresponding with facility information library is searched in preset database.
Wherein, lookup USB KEY bottoms corresponding with the facility information library in preset database, including:
Judge to whether there is USB KEY bottoms corresponding with facility information library in the database;
If so, executing lookup USB KEY bottoms corresponding with the facility information library in preset database
The step of;
If it is not, then importing the KEY bottoms libraries USB corresponding with the facility information to the database, and execute described logical
Cross the step of target interface calls the bottom libraries USB KEY corresponding with the facility information.
Wherein, lookup USB KEY bottoms corresponding with the facility information library in preset database, including:
Search USB KEY bottoms corresponding with the facility information in the database according to preset configuration file
Library, the configuration file have prestored the correspondence of facility information and USB KEY bottoms library.
Wherein, after the preset com component according to the request call, further include:
Corresponding ActiveX control is downloaded according to the ActiveX of html page marks, and executes the ActiveX control.
A kind of device calling USB KEY bottoms library, including:
Receiving module, for receiving the request for calling com component;
Calling module, for according to the preset com component of the request call, the com component to have compatible different USB
The target interface in KEY bottoms library;
Execution module, the facility information for obtaining the USB KEY that the request carries by the com component, and lead to
It crosses the target interface and calls USB KEY bottoms corresponding with facility information library.
Wherein, further include:
Searching module, for searching USB KEY bottoms corresponding with facility information library in preset database.
A kind of system for calling USB KEY bottoms library, including:
Client, for sending the request for calling com component;
Server-side, for receiving the request for calling com component;It is described according to the preset com component of the request call
Com component has the target interface in compatible different USB KEY bottoms libraries;Obtain what the request carried by the com component
The facility information of USB KEY, and USB KEY bottoms corresponding with facility information library is called by the target interface.
A kind of equipment for calling USB KEY bottoms library, including:
Memory, for storing computer program;
Processor realizes the bottoms calling USB KEY as described in above-mentioned any one when for executing the computer program
The step of method in layer library.
A kind of computer readable storage medium is stored with computer program on the computer readable storage medium, described
The step of the method for calling USB KEY bottoms library as described in above-mentioned any one is realized when computer program is executed by processor
Suddenly.
By above scheme it is found that a kind of method for calling USB KEY bottoms libraries provided in an embodiment of the present invention, including:
Receive the request for calling com component;According to the preset com component of the request call, the com component has compatible different
The target interface in USB KEY bottoms library;The facility information for the USB KEY that the request carries is obtained by the com component, and
USB KEY bottoms corresponding with facility information library is called by the target interface.
As it can be seen that the method calls preset com component, and getting when receiving the request for calling com component
After the facility information of USB KEY, USB KEY bottoms corresponding with facility information library is called by target interface, that is, is called
USB KEY bottoms corresponding with USB KEY library.So that com component can meet different USB KEY by target
Mouth calls its corresponding USB KEY bottoms library, i.e. the com component is public com component, is suitable for different vendor's production
USB KEY;Simultaneously as target interface can call different USB KEY bottoms libraries, it is thus possible to shield different UEB KEY
The otherness in bottom library;Furthermore USB KEY bottoms library is called by the com component that this method provides, also avoids technical staff
Different com components is developed for different USB KEY, reduces the workload of developer, improves work efficiency, also save
Cost.
Correspondingly, a kind of device, system, equipment and calculating for calling USB KEY bottoms library provided in an embodiment of the present invention
Machine readable storage medium storing program for executing, similarly has above-mentioned technique effect.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of method flow diagram calling USB KEY bottoms library disclosed by the embodiments of the present invention;
Fig. 2 is another method flow diagram for calling USB KEY bottoms library disclosed by the embodiments of the present invention;
Fig. 3 is a kind of schematic device for calling USB KEY bottoms library disclosed by the embodiments of the present invention;
Fig. 4 is a kind of system schematic for calling USB KEY bottoms library disclosed by the embodiments of the present invention;
Fig. 5 is a kind of equipment schematic diagram for calling USB KEY bottoms library disclosed by the embodiments of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of method, apparatus, system, equipment and the computers in calling USB KEY bottoms library
Readable storage medium storing program for executing calls different USB KEY bottoms libraries to realize that com component is compatible with different USB KEY.
Referring to Fig. 1, a kind of method for calling USB KEY bottoms library provided in an embodiment of the present invention, including:
S101, the request for calling com component is received;
Specifically, when user needs using USB KEY, USB KEY are plugged to USB interface first, and pass through browsing
Device is operated accordingly.Such mode of operation for carrying out safety check is based on B/S structures (Browser/Server structures), i.e.,
Browser and server structure.
At this stage, B/S structures have become a kind of epidemic system structure during Web application systems are developed, the advantage of the structure
It is:Without developing client software, maintenance and upgrade is convenient;Can cross-platform operation, as long as any machine equipped with WWW it is clear
It lookes at device software, can be used as client computer to access system, call corresponding com component, it, can be real after being connect with USB KEY
The operations such as existing safety check have good open and expandability.
S102, according to the preset com component of the request call, the com component has compatible different USB KEY bottoms
The target interface in library;
In the present embodiment, the com component according to《Intelligent code key cipher application interface specification》It is designed out
Hair, therefore each interface in the com component is satisfied by the design requirement of the specification, including:The intelligent cipher of PKI cipher systems
Key cipher application interface, cipher application interface, data type, parameter definition and equipment safety etc..Therefore in the present embodiment
Com component can be compatible with the USB KEY of different vendor's production, and the corresponding USB KEY bottoms libraries difference USB KEY.
S103, the facility information that the USB KEY that the request carries are obtained by the com component;
S104, USB KEY bottoms corresponding with facility information library is searched in preset database, and by described
Target interface calls USB KEY bottoms corresponding with facility information library.
It should be noted that the com component includes:It enumerates USB KEY, open equipment, enciphering/deciphering, signature sign test
And obtain the interfaces such as facility information;Wherein further include:Compatible different USB KEY bottoms libraries, for calling USB KEY bottoms
The target interface in library.The above interface can operate any one USB KEY, i.e., these interfaces are common interface.Its
In, the target interface in compatible different USB KEY bottoms libraries can call the corresponding USB KEY of USB KEY of arbitrary manufacturer's production
Bottom library.
Specifically, by the com component obtain it is described request carry USB KEY facility information after, can foundation
The facility information got searches corresponding USB KEY bottoms library, and realizes the tune to USB KEY bottoms library by target interface
With, and then realize and the safety check of USB KEY is operated.
As it can be seen that a kind of method for calling USB KEY bottoms library provided in this embodiment, the method are receiving calling
When the request of com component, preset com component is called, and after the facility information for getting USB KEY, in preset data
USB KEY bottoms corresponding with facility information library is searched in library, and is called and the facility information pair by target interface
USB KEY bottoms corresponding with USB KEY library is called in the USB KEY bottoms library answered.So that com component is for difference
USB KEY can call its corresponding USB KEY bottoms library by target interface, i.e. the com component is public COM groups
Part is suitable for the USB KEY of different vendor's production;Simultaneously as target interface can call different USB KEY bottoms libraries,
The otherness in different UEB KEY bottoms libraries can thus be shielded;Furthermore USB KEY are called by the com component that this method provides
Bottom library also avoids technical staff and develops different com components for different USB KEY, reduces the work of developer
Amount, improves work efficiency, also saves cost.
The embodiment of the invention discloses another methods for calling USB KEY bottoms library, relative to a upper embodiment, this reality
It applies example and further instruction and optimization has been made to technical solution.
Referring to Fig. 2, another method for calling USB KEY bottoms library provided in an embodiment of the present invention, including:
S201, the request for calling com component is received;
S202, according to the preset com component of the request call, the com component has compatible different USB KEY bottoms
The target interface in library;
S203, the facility information that the USB KEY that the request carries are obtained by the com component;
S204, judge to whether there is USB KEY bottoms corresponding with facility information library in preset database;If
It is then to execute S205;If it is not, then executing S206;
S205, USB KEY bottoms corresponding with facility information library is searched in preset database, and execute
S207;
S206, the KEY bottoms libraries USB corresponding with the facility information are imported to the database, and executes S207;
S207, USB KEY bottoms corresponding with facility information library is called by the target interface.
In the present embodiment, a variety of USB KEY bottoms libraries are pre-stored in preset database, and the database is
State database, can be according to the in due course additions and deletions of the actual demand USB KEY bottoms library therein of user.Such as:When in database not
When in the presence of the bottom libraries USB KEY corresponding with the facility information, USB corresponding with the facility information can be imported in time
USB KEY bottoms corresponding with facility information library is called to the database, will pass through target interface in KEY bottoms library.
Certainly, if certain USB KEY bottoms library long period in database is idle, the bottoms USB KEY can be deleted
Layer library increases other USB KEY bottoms libraries in due course to save the memory space of database.
As it can be seen that another method for calling USB KEY bottoms library provided in this embodiment, the method are receiving calling
When the request of com component, preset com component is called, and after the facility information for getting USB KEY, judge preset number
According in library whether there is USB KEY bottoms corresponding with facility information library;If so, in preset database search with
The corresponding USB KEY bottoms library of the facility information;If it is not, then importing USB KEY bottoms corresponding with facility information library
To the database;In turn, USB KEY bottoms corresponding with facility information libraries is called by target interface, that is, call and
The corresponding USB KEY bottoms libraries USB KEY.
So that com component for different USB KEY, can call its corresponding USB KEY by target interface
Bottom library, the i.e. com component are public com component, are suitable for the USB KEY of different vendor's production;Simultaneously as target connects
Mouth can call different USB KEY bottoms libraries, it is thus possible to shield the otherness in different UEB KEY bottoms libraries;Furthermore pass through
The com component that this method provides calls USB KEY bottoms library, and it is different for different USB KEY exploitations to also avoid technical staff
Com component, reduce the workload of developer, improve work efficiency, also save cost.
Based on above-mentioned any embodiment, it should be noted that described searched in preset database is believed with the equipment
Corresponding USB KEY bottoms library is ceased, including:
Search USB KEY bottoms corresponding with the facility information in the database according to preset configuration file
Library, the configuration file have prestored the correspondence of facility information and USB KEY bottoms library.
Specifically, since different USB KEY are corresponding with different USB KEY bottoms libraries, there are one-to-one relationship,
Therefore, before calling USB KEY bottoms library, it is necessary first to determine its correspondence.Therefore, correspondence can be deposited in advance
Storage when needing to obtain correspondence, is searched according to preset configuration file and is set with described to configuration file in the database
The standby corresponding USB KEY bottoms library of information.
It is of course also possible to use the mode of cyclic switching searches the corresponding USB KEY bottoms library of facility information.Such as:Number
According to storing No. 1 USB KEY bottoms library, No. 2 USB KEY bottoms libraries, No. 3 USB KEY bottoms libraries in library, and user is used
No. 3 USB KEY, then can first attempt to call No. 1 USB KEY bottoms library, if malloc failure malloc, it tries call No. 2 USB
If KEY bottoms library malloc failure mallocs, it tries call No. 3 USB KEY bottoms libraries, successfully call at this time, after user can carry out
Continue other operations.Certainly, technical staff can search corresponding USB KEY according to actual demand using suitable other methods
Bottom library, details are not described herein for this specification.
Based on above-mentioned any embodiment, it should be noted that it is described according to the preset com component of the request call it
Afterwards, further include:
Corresponding ActiveX control is downloaded according to the ActiveX of html page marks, and executes the ActiveX control.
Specifically, when coordinating USB KEY to be operated by browser, need to be marked according to the ActiveX of html page
Will downloads corresponding ActiveX control, and executes the ActiveX control.When user needs to operate using USB KEY,
ActiveX control just calls the corresponding interface of com component, and then calls corresponding USB KEY bottoms library real by target interface
The functions such as existing safety check.
Based on above-mentioned any embodiment, it should be noted that the com component can be according to《Intelligent code key password
Application Interface Specification》It is designed exploitation, exploitation design can also be carried out according to the interface specification of other in industry.Certainly, institute
The target interface stated in com component can also be according to the actual demand of user, and follows the interface specification in industry and carry out individual character
Melt hair design.Exploitation design is carried out according to the distinct interface specification in industry so that the com component and the target interface
It can be compatible with more difference USB KEY and its corresponding USB KEY bottoms libraries each USB KEY as far as possible.
Based on above-mentioned any embodiment, it should be noted that interface function specific implementation is completed in com component.
Any number of interface may be implemented in one com component, this can by the multiple inheritance of the abstract base class to defining interface or
It is realized using modes such as nested class.Meanwhile com component needs unique GUID value to identify itself, identifies the GUID of component
Referred to as CLSID (Class Identifier).The com component provided in this specification is suitable for the operation ring of arbitrary USB KEY
Border, such as CA, enterprise, data center, public security, Custom system etc..
A kind of device calling USB KEY bottoms libraries provided in an embodiment of the present invention is introduced below, is described below
A kind of device in calling USB KEY bottoms library can be mutual with a kind of above-described method that calling USB KEY bottoms libraries
Reference.
Referring to Fig. 3, a kind of device calling USB KEY bottoms library provided in an embodiment of the present invention, including:
Receiving module 301, for receiving the request for calling com component;
Calling module 302, for according to the preset com component of the request call, the com component to have compatible different
The target interface in USB KEY bottoms library;
Execution module 303, the facility information for obtaining the USB KEY that the request carries by the com component, and
USB KEY bottoms corresponding with facility information library is called by the target interface.
Wherein, further include:
Searching module, for searching USB KEY bottoms corresponding with facility information library in preset database.
Wherein, the searching module is specifically used for:
Search USB KEY bottoms corresponding with the facility information in the database according to preset configuration file
Library, the configuration file have prestored the correspondence of facility information and USB KEY bottoms library.
Wherein, the searching module includes:
Judging unit whether there is USB KEY bottoms corresponding with the facility information for judging in the database
Library;
Execution unit, when for there is the bottom libraries USB KEY corresponding with the facility information in the database, pre-
If database in search USB KEY bottoms corresponding with facility information libraries;
Import unit is led when for the bottom libraries USB KEY corresponding with the facility information to be not present in the database
Enter the KEY bottoms libraries USB corresponding with the facility information to the database, and by the target interface call with it is described
The corresponding USB KEY bottoms library of facility information.
Wherein, further include:
Execution module is downloaded, for downloading corresponding ActiveX control according to the ActiveX of html page marks, and is held
The row ActiveX control.
A kind of system that calling USB KEY bottoms libraries provided in an embodiment of the present invention is introduced below, is described below
A kind of system in calling USB KEY bottoms library can with a kind of above-described method and device that calling USB KEY bottoms libraries
With cross-referenced.
Referring to Fig. 4, a kind of system for calling USB KEY bottoms library provided in an embodiment of the present invention, including:
Client 401, for sending the request for calling com component;
Server-side 402, for receiving the request for calling com component;According to the preset com component of the request call, institute
Stating com component has the target interface in compatible different USB KEY bottoms libraries;The request is obtained by the com component to carry
USB KEY facility information, and pass through the target interface and call USB KEY bottoms corresponding with facility information libraries.
A kind of equipment that calling USB KEY bottoms libraries provided in an embodiment of the present invention is introduced below, is described below
A kind of equipment in calling USB KEY bottoms library a kind of calling the method, apparatus in USB KEY bottoms libraries with above-described and be
System can be cross-referenced.
Referring to Fig. 5, a kind of equipment for calling USB KEY bottoms library provided in an embodiment of the present invention, including:
Memory 501, for storing computer program;
Processor 502 realizes the calling USB KEY described in above-mentioned any embodiment when for executing the computer program
The step of method in bottom library.
A kind of computer readable storage medium provided in an embodiment of the present invention is introduced below, one kind described below
Computer readable storage medium and a kind of above-described method, apparatus, system and the equipment for calling USB KEY bottoms libraries can be with
It is cross-referenced.
A kind of computer readable storage medium is stored with computer program on the computer readable storage medium, described
The step of the method for calling USB KEY bottoms library as described in above-mentioned any embodiment is realized when computer program is executed by processor
Suddenly.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other
The difference of embodiment, just to refer each other for identical similar portion between each embodiment.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest range caused.
Claims (10)
1. a kind of method for calling USB KEY bottoms library, which is characterized in that including:
Receive the request for calling com component;
According to the preset com component of the request call, the com component has the target in compatible different USB KEY bottoms libraries
Interface;
The facility information for the USB KEY that the request carries is obtained by the com component, and is called by the target interface
USB KEY bottoms corresponding with facility information library.
2. the method according to claim 1 for calling USB KEY bottoms library, which is characterized in that described to pass through the target
Before interface calls USB KEY bottoms corresponding with facility information library, further include:
USB KEY bottoms corresponding with facility information library is searched in preset database.
3. the method according to claim 2 for calling USB KEY bottoms library, which is characterized in that described in preset data
USB KEY bottoms corresponding with facility information library is searched in library, including:
Judge to whether there is USB KEY bottoms corresponding with facility information library in the database;
If so, executing the step for searching USB KEY bottoms corresponding with facility information library in preset database
Suddenly;
If it is not, then importing the KEY bottoms libraries USB corresponding with the facility information to the database, and pass through institute described in execution
State the step of target interface calls the bottom libraries USB KEY corresponding with the facility information.
4. the method according to claim 3 for calling USB KEY bottoms library, which is characterized in that described in preset data
USB KEY bottoms corresponding with facility information library is searched in library, including:
Search USB KEY bottoms corresponding with facility information library, institute in the database according to preset configuration file
State the correspondence that configuration file has prestored facility information and USB KEY bottoms library.
5. the method according to claim 1 for calling USB KEY bottoms library, which is characterized in that described according to the request
After calling preset com component, further include:
Corresponding ActiveX control is downloaded according to the ActiveX of html page marks, and executes the ActiveX control.
6. a kind of device calling USB KEY bottoms library, which is characterized in that including:
Receiving module, for receiving the request for calling com component;
Calling module, for according to the preset com component of the request call, the com component to have compatible different USB KEY
The target interface in bottom library;
Execution module, the facility information for obtaining the USB KEY that the request carries by the com component, and pass through institute
It states target interface and calls USB KEY bottoms corresponding with facility information library.
7. the device according to claim 6 for calling USB KEY bottoms library, which is characterized in that further include:
Searching module, for searching USB KEY bottoms corresponding with facility information library in preset database.
8. a kind of system for calling USB KEY bottoms library, which is characterized in that including:
Client, for sending the request for calling com component;
Server-side, for receiving the request for calling com component;According to the preset com component of the request call, the COM groups
Part has the target interface in compatible different USB KEY bottoms libraries;The USB that the request carries is obtained by the com component
The facility information of KEY, and USB KEY bottoms corresponding with facility information library is called by the target interface.
9. a kind of equipment for calling USB KEY bottoms library, which is characterized in that including:
Memory, for storing computer program;
Processor realizes the calling USB KEY as described in claim 1-5 any one when for executing the computer program
The step of method in bottom library.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the bottoms calling USB KEY as described in claim 1-5 any one when the computer program is executed by processor
The step of method in layer library.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810200505.0A CN108388788B (en) | 2018-03-12 | 2018-03-12 | A kind of method and device for calling USB KEY bottom library |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810200505.0A CN108388788B (en) | 2018-03-12 | 2018-03-12 | A kind of method and device for calling USB KEY bottom library |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108388788A true CN108388788A (en) | 2018-08-10 |
CN108388788B CN108388788B (en) | 2019-11-26 |
Family
ID=63067568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810200505.0A Active CN108388788B (en) | 2018-03-12 | 2018-03-12 | A kind of method and device for calling USB KEY bottom library |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108388788B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1591891A2 (en) * | 2004-04-29 | 2005-11-02 | Microsoft Corporation | Generic USB drivers |
CN101639771A (en) * | 2008-07-30 | 2010-02-03 | 许燕 | Method for converting HID interface to PC/SC interface |
CN101986740A (en) * | 2010-09-14 | 2011-03-16 | 中国联合网络通信集团有限公司 | JAVA card |
CN102118381A (en) * | 2010-09-20 | 2011-07-06 | 中科方德软件有限公司 | Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method |
CN103366812A (en) * | 2013-07-22 | 2013-10-23 | 烽火通信科技股份有限公司 | Device for Flash online programming on circuit board and implementation method |
CN103618699A (en) * | 2013-11-12 | 2014-03-05 | 吴晓军 | Method and device for calling component |
US9043497B2 (en) * | 2010-01-14 | 2015-05-26 | Microsoft Technology Licensing, Llc | Driver interface functions to interface client function drivers |
-
2018
- 2018-03-12 CN CN201810200505.0A patent/CN108388788B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1591891A2 (en) * | 2004-04-29 | 2005-11-02 | Microsoft Corporation | Generic USB drivers |
CN101639771A (en) * | 2008-07-30 | 2010-02-03 | 许燕 | Method for converting HID interface to PC/SC interface |
US9043497B2 (en) * | 2010-01-14 | 2015-05-26 | Microsoft Technology Licensing, Llc | Driver interface functions to interface client function drivers |
CN101986740A (en) * | 2010-09-14 | 2011-03-16 | 中国联合网络通信集团有限公司 | JAVA card |
CN102118381A (en) * | 2010-09-20 | 2011-07-06 | 中科方德软件有限公司 | Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method |
CN103366812A (en) * | 2013-07-22 | 2013-10-23 | 烽火通信科技股份有限公司 | Device for Flash online programming on circuit board and implementation method |
CN103618699A (en) * | 2013-11-12 | 2014-03-05 | 吴晓军 | Method and device for calling component |
Non-Patent Citations (1)
Title |
---|
郭洋: "基于数字证书的电子签章系统在电子政务中的应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108388788B (en) | 2019-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Costin et al. | A {Large-scale} analysis of the security of embedded firmwares | |
CN108399329B (en) | Method for improving security of trusted application program | |
CN111695156A (en) | Service platform access method, device, equipment and storage medium | |
CN104408371B (en) | A kind of implementation method based on credible performing environment high safety application system | |
CN105446713A (en) | Safe storage method and equipment | |
CN106341381A (en) | Method and system of key management for rack server system | |
JP2016540282A (en) | Method and apparatus for protecting a dynamic library | |
CN109634619A (en) | Credible performing environment implementation method and device, terminal device, readable storage medium storing program for executing | |
CN106096418B (en) | SELinux-based startup security level selection method and device and terminal equipment | |
CN112800429A (en) | Method for protecting driver in UEFI BIOS firmware system based on foundation | |
CN111639309B (en) | Data processing method and device, node equipment and storage medium | |
CN104954463A (en) | Method, equipment and system for user information management of application | |
CN103561006A (en) | Application authentication method and device and application authentication server based on Android | |
CN107741874B (en) | Automatic creating method and system for GIS cloud virtual machine | |
CN103885784A (en) | Method for establishing Android platform with security module and plugging function | |
CN111949529B (en) | System debugging method, device, computer equipment and storage medium | |
CN107992379A (en) | A kind of method, mobile terminal and computer-readable medium for reading data message | |
CN108388788B (en) | A kind of method and device for calling USB KEY bottom library | |
CN115021995B (en) | Multi-channel login method, device, equipment and storage medium | |
CN111488286A (en) | Method and device for independently developing Android module | |
CN106778193B (en) | Client and UI interaction method | |
CN116566629A (en) | Security testing method and device, computer equipment and storage medium | |
CN106027639B (en) | A kind of wide-area network access method and device of PAAS platform | |
CN114924783A (en) | Interface calling method, device, equipment and storage medium of application program | |
CN111339552B (en) | Database access method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 264200 No. 12-1, Chuhe North Road, chucun Town, gaoqu District, Weihai City, Shandong Province Patentee after: Yuweng Information Technology Co.,Ltd. Address before: No.12, Chuhe North Road, gaoqu District, Weihai City, Shandong Province Patentee before: SHANDONG FISHERMAN INFORMATION TECHNOLOGY Co.,Ltd. |
|
CP03 | Change of name, title or address |