Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art or the related art.
To this end, a first aspect of the invention is directed to a method for middleware-based access to a dongle.
A second aspect of the present invention is to provide a middleware-based access dongle system.
A third aspect of the invention is directed to a computer device.
A fourth aspect of the present invention is directed to a computer-readable storage medium.
In view of the above, according to an aspect of the present invention, there is provided a method for accessing an encryption lock based on middleware, including:
receiving data required by an application program in a first system for reading an encryption lock; calling an interface function of the encryption lock under the second system, and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not; and receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system so that the application program can determine whether the encryption lock is effective according to the judgment result.
The method for accessing the encryption lock based on the middleware provided by the invention receives the data required by the reading operation of the application program of the first system on the encryption lock, calls the interface function of the encryption lock of the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
The method for accessing the encryption lock based on the middleware can further have the following technical characteristics:
in the foregoing technical solution, preferably, the receiving data required by the operation of the application program in the first system to read the encryption lock specifically includes: establishing socket connection with equipment corresponding to a first system; and receiving data required by the application program in the first system for the reading operation of the encryption lock in a socket connection mode.
In the technical scheme, the socket connection is established with the equipment corresponding to the first system, so that the middleware receives data transmitted by data required by the operation of reading the encryption lock by an application program in the first system in a socket connection mode, data interaction among different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no error of data, no repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures the effective transmission of the data.
In any of the above technical solutions, preferably, the interface function of the dongle in the second system is invoked, and the data is sent to the dongle through the interface function, so that the dongle processes the data and determines whether itself is valid, which specifically includes: reading the configuration file to obtain the IP address of the equipment corresponding to the second system and the port number of the equipment corresponding to the second system for socket connection, and establishing socket connection with the equipment corresponding to the second system; calling an interface function of an encryption lock under a second system; and sending the data to the encryption lock in a socket connection mode so that the encryption lock processes the data and judges whether the encryption lock is effective.
In the technical scheme, the IP address of the device corresponding to the second system and the port number of the device corresponding to the second system for socket connection are obtained by reading the configuration file, socket connection is established according to the IP address and the port number of the device corresponding to the second system for socket connection, an interface function of the encryption lock under the second system is called, and data required by reading operation of the encryption lock by an application program under the first system is sent to the encryption lock in a socket connection mode, so that the encryption lock processes the data, and whether the encryption lock is effective or not is judged, and therefore access to the encryption lock of the second system under the first system is achieved. Among them, IP (internet protocol, protocol for interconnection between networks) is a protocol designed for communication between computer networks. By the technical scheme, the problem that the encryption lock cannot be read and written normally when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and the mutual judgment of validity of the encryption lock among different systems is realized, so that the intellectual property is protected, and the intellectual property is prevented from being illegally used.
In any of the above technical solutions, preferably, the determination result is sent to the application program in the first system in a socket connection manner.
In the technical scheme, data interaction between the middleware and the first system is realized in a socket connection mode, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures effective transmission of data.
According to a second aspect of the present invention, there is provided a middleware-based access dongle system, comprising: the receiving unit is used for receiving data required by an application program in the first system for reading the encryption lock; the calling unit is used for calling an interface function of the encryption lock under the second system and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not; and the sending unit is used for receiving the judgment result of the encryption lock and sending the judgment result to the application program in the first system so that the application program can determine whether the encryption lock is effective according to the judgment result.
The system for accessing the encryption lock based on the middleware receives the data required by the reading operation of the application program of the first system on the encryption lock through the receiving unit, the calling unit calls the interface function of the encryption lock under the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing the access to the encryption lock of the second system under the first system, the encryption lock processes the received data and judges whether the encryption lock is effective, receiving the judgment result transmitted by the interface function of the second system through the transmitting unit, transmitting the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
The above system for accessing the encryption lock based on the middleware according to the present invention may further have the following technical features:
in the foregoing technical solution, preferably, the receiving unit specifically includes: the first establishing unit is used for establishing socket connection with equipment corresponding to a first system; the first receiving unit is used for receiving data required by the application program in the first system for the reading operation of the encryption lock in a socket connection mode.
In the technical scheme, the first establishing unit establishes socket connection between the middleware and the equipment corresponding to the first system, so that the first receiving unit receives data transmitted by an application program in the first system in a socket connection mode for reading data required by encryption lock operation, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, error-free data, repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures effective transmission of the data.
In any one of the above technical solutions, preferably, the invoking unit includes: a second establishing unit, configured to read the configuration file, obtain an IP address of the device corresponding to the second system and a port number of the device corresponding to the second system for performing socket connection, and establish socket connection with the device corresponding to the second system; the calling subunit is used for calling an interface function of the encryption lock under the second system; and the first sending unit is used for sending the data to the encryption lock in a socket connection mode so that the encryption lock processes the data and judges whether the encryption lock is effective.
In the technical scheme, the configuration file is read through the second establishing unit to obtain the IP address of the device corresponding to the second system and the port number of the device corresponding to the second system for socket connection, socket connection is established according to the IP address and the port number of the device corresponding to the second system for socket connection, the sub-unit is called to call an interface function of the encryption lock under the second system, and the first sending unit sends data required by reading operation of an application program under the first system on the encryption lock to the encryption lock in a socket connection mode so that the encryption lock can process the data and judge whether the data is valid or not, so that access to the encryption lock of the second system under the first system is achieved. Among them, IP (internet protocol, protocol for interconnection between networks) is a protocol designed for communication between computer networks. By the technical scheme, the problem that the encryption lock cannot be read and written normally when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and the mutual judgment of validity of the encryption lock among different systems is realized, so that the intellectual property is protected, and the intellectual property is prevented from being illegally used.
In any of the above technical solutions, preferably, the determination result is sent to the application program in the first system in a socket connection manner.
In the technical scheme, data interaction between the middleware and the first system is realized in a socket connection mode, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures effective transmission of data.
According to a third aspect of the present invention, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor when executing the computer program implementing the steps of the middleware access dongle based method according to any one of the preceding claims.
The invention provides a computer device, when a processor executes a computer program, the computer program realizes the reading operation of an encryption lock by receiving data required by an application program of a first system, calls an interface function of the encryption lock of a second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
According to a fourth aspect of the invention, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the middleware-based access dongle method of any one of the above.
The computer readable storage medium provided by the invention, when executed by a processor, realizes the operation of reading the encryption lock by receiving the data required by the application program of the first system, calling the interface function of the encryption lock of the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Detailed Description
So that the manner in which the above recited aspects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
The embodiment of the first aspect of the present invention provides a method for accessing an encryption lock based on a middleware, and fig. 1 shows a flowchart of the method for accessing an encryption lock based on a middleware according to an embodiment of the present invention, where the method for accessing an encryption lock based on a middleware includes:
s102, receiving data required by an application program in a first system for reading an encryption lock;
s104, calling an interface function of the encryption lock under the second system, and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not;
s106, receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system, so that the application program can determine whether the encryption lock is effective according to the judgment result.
In the embodiment, the method comprises the steps of receiving data required by an application program of a first system for reading an encryption lock, calling an interface function of an encryption lock of a second system, so as to obtain the interface function corresponding to the encryption lock, sending the data required by the application program in the first system for reading the encryption lock to the encryption lock through the interface function, so as to access the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the received data is valid, receiving a judgment result transmitted by the interface function of the second system, and sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
FIG. 2 is a flowchart illustrating a method for middleware-based access to a dongle according to another embodiment of the present invention. Wherein, the method comprises the following steps:
s202, establishing socket connection with equipment corresponding to a first system;
s204, receiving data required by the application program in the first system for reading the encryption lock in a socket connection mode;
s206, calling an interface function of the encryption lock under the second system, and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not;
s208, receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system, so that the application program can determine whether the encryption lock is effective according to the judgment result.
In the embodiment, the socket connection is established with the device corresponding to the first system, so that the middleware receives data transmitted by the application program in the first system through the socket connection mode to read the data required by the encryption lock operation, data interaction between different systems is realized through the socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures effective transmission of the data.
FIG. 3 is a flowchart illustrating a method for middleware-based access to a dongle according to another embodiment of the present invention. Wherein, the method comprises the following steps:
s302, establishing socket connection with equipment corresponding to a first system;
s304, receiving data required by the application program in the first system for reading the encryption lock in a socket connection mode;
s306, reading the configuration file to obtain the IP address of the equipment corresponding to the second system and the port number of the equipment corresponding to the second system for socket connection, and establishing socket connection with the equipment corresponding to the second system;
s308, calling an interface function of the encryption lock under the second system;
s310, sending data to the encryption lock in a socket connection mode so that the encryption lock processes the data and judges whether the encryption lock is effective or not;
s312, receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system, so that the application program can determine whether the encryption lock is valid according to the judgment result.
In the embodiment, the IP address of the device corresponding to the second system and the port number of the device corresponding to the second system for socket connection are obtained by reading the configuration file, socket connection is established according to the IP address and the port number of the device corresponding to the second system for socket connection, an interface function of the encryption lock under the second system is called, and data required by reading operation of the encryption lock by an application program under the first system is sent to the encryption lock through the socket connection mode, so that the encryption lock processes the data, and whether the encryption lock is effective or not is judged, thereby realizing access to the encryption lock of the second system under the first system. Among them, IP (internet protocol, protocol for interconnection between networks) is a protocol designed for communication between computer networks. By the technical scheme, the problem that the encryption lock cannot be read and written normally when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and the mutual judgment of validity of the encryption lock among different systems is realized, so that the intellectual property is protected, and the intellectual property is prevented from being illegally used.
In an embodiment of the present invention, the determination result is preferably sent to the application program in the first system by means of a socket connection.
In the embodiment, data interaction between the middleware and the first system is realized in a socket connection mode, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated sending and capability of receiving according to the sending sequence, and effectively ensures effective transmission of data.
In a second aspect of the present invention, a middleware-based access dongle system 400 is provided, and fig. 4 shows a schematic block diagram of the middleware-based access dongle system 400 according to an embodiment of the present invention, wherein the middleware-based access dongle system 400 comprises:
a receiving unit 402, configured to receive data required by an application program in a first system to read an encryption lock; the calling unit 404 is configured to call an interface function of the encryption lock in the second system, and send the data to the encryption lock through the interface function, so that the encryption lock processes the data and determines whether the encryption lock is valid; and the sending unit 406 is configured to receive the judgment result of the encryption lock, and send the judgment result to the application program in the first system, so that the application program determines whether the encryption lock is valid according to the judgment result.
In this embodiment, the receiving unit 402 receives the data required by the application program of the first system to read the encryption lock, the calling unit 404 calls the interface function of the encryption lock of the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing the access to the encryption lock of the second system under the first system, the encryption lock processes the received data and judges whether the encryption lock is effective, the determination result transmitted by the interface function of the second system is received by the sending unit 406, and the determination result is sent to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
In an embodiment of the present invention, preferably, the receiving unit 402 specifically includes: a first establishing unit 408, configured to establish a socket connection with a device corresponding to the first system; the first receiving unit 410 is configured to receive, by means of a socket connection, data required by an application program in the first system for an encryption lock read operation.
In this embodiment, the first establishing unit 408 establishes a socket connection between the middleware and the device corresponding to the first system, so that the first receiving unit 410 receives data to be transmitted by an application program in the first system through the socket connection, the data required by the read dongle operation is transmitted, data interaction between different systems is realized through the socket connection, and the method has the characteristics of reliable data transmission service, no data error, no repeated transmission, and capability of receiving according to the transmission sequence, thereby effectively ensuring effective transmission of data. A
In one embodiment of the present invention, preferably, the invoking unit 404 includes: a second establishing unit 412, configured to read the configuration file, obtain an IP address of the device corresponding to the second system and a port number of the device corresponding to the second system for performing socket connection, and establish socket connection with the device corresponding to the second system; a calling subunit 414, configured to call an interface function of the dongle in the second system; the first sending unit 416 is configured to send the data to the dongle through a socket connection, so that the dongle processes the data and determines whether itself is valid.
In this embodiment, the second establishing unit 412 reads the configuration file to obtain the IP address of the device corresponding to the second system and the port number of the device corresponding to the second system for socket connection, and establishes socket connection according to the IP address and the port number of the device corresponding to the second system for socket connection, the calling subunit 414 calls an interface function of the encryption lock under the second system, and the first sending unit 416 sends data, which is required by the application program under the first system to perform the reading operation on the encryption lock, to the encryption lock in a socket connection manner, so that the encryption lock processes the data, and determines whether the encryption lock is valid, thereby implementing access to the encryption lock of the second system under the first system. Among them, IP (internet protocol, protocol for interconnection between networks) is a protocol designed for communication between computer networks. By the technical scheme, the problem that the encryption lock cannot be read and written normally when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and the mutual judgment of validity of the encryption lock among different systems is realized, so that the intellectual property is protected, and the intellectual property is prevented from being illegally used.
In an embodiment of the present invention, the determination result is preferably sent to the application program in the first system by means of a socket connection.
In the embodiment, data interaction between the middleware and the first system is realized in a socket connection mode, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated sending and capability of receiving according to the sending sequence, and effectively ensures effective transmission of data.
In a third aspect of the present invention, a computer apparatus is provided, and fig. 5 is a schematic block diagram of a computer apparatus 500 according to an embodiment of the present invention. Comprising a memory 502, a processor 504 and a computer program stored on the memory 502 and executable on the processor, the processor 504, when executing the computer program, performing the steps of the method for middleware based access to a dongle as in any of the above.
In the computer apparatus 500 of the present invention, the processor 504, when executing the computer program, realizes that the interface function of the dongle in the second system is invoked by receiving the data required by the reading operation of the application program of the first system on the dongle, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
An embodiment of the fourth aspect of the invention proposes a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the middleware-based access dongle method according to any one of the preceding claims.
The computer readable storage medium provided by the invention, when executed by a processor, realizes the operation of reading the encryption lock by receiving the data required by the application program of the first system, calling the interface function of the encryption lock of the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
Fig. 6 is a schematic flowchart illustrating a method for accessing an encryption lock based on middleware according to another embodiment of the present invention, as shown in fig. 6, a USB encryption lock, that is, an encryption lock in the present application, is used to encrypt and decrypt a PDF file, where the encrypted PDF file is from a normalizer of a regular flow software, and a PDF (Portable Document Format) is a file Format developed by Adobe Systems company for exchanging files in a manner independent of an application program, an operating system, and hardware. The Adobe Acrobat decryption plug-in at the Macintosh end is an application program in the first system in the application, wherein Macintosh is called Mac for short, Macintosh computers are a series of personal computers in apple computers. Adobe Acrobat is a PDF (Portable Document Format) editing software developed by Adobe corporation. The system comprises a square positive flow certificate management tool, namely middleware in the application, a USB encryption lock, a Macintosh end Adobe Acrobat decryption plugin, a square positive flow certificate management tool configuration file, namely a configuration file in the application, and a Macintosh end Adobe Acrobat decryption plugin configuration file, wherein the square positive flow certificate management tool is used for exchanging data with the Macintosh end Adobe Acrobat decryption plugin at the USB encryption lock and is used for storing an IP address of a machine where the square positive flow certificate management tool is located and a port number used when socket connection is conducted with a server where the square positive flow certificate management tool is located; the method comprises the steps that a square smooth flow certificate management tool reads an IP address of a machine where a USB encryption lock is located and a port number used when socket connection is conducted with the machine where the USB encryption lock is located from a square smooth flow certificate management tool configuration file; and establishing socket connection with the machine where the USB encryption lock is located. And the Macintosh Adobe Acrobat decryption plugin reads the IP address of the machine where the just-right-flow certificate management tool is located and the port number used when the machine where the just-right-flow certificate management tool is located is in socket connection with the machine from the configuration file of the Macintosh Adobe Acrobat decryption plugin. And establishing socket connection with a machine where the certificate management tool is located; after a socket connection is established with a machine where a square and smooth flow certificate management tool is located, the Adobe Acrobat decryption plug-in at the Macintosh end sends data to the square and smooth flow certificate management tool through the established socket connection; the method comprises the steps that a certificate management tool of the square smooth flow receives data sent from an Adobe Acrobat decryption plug-in at a Macintosh end, and sends data required by read-write operation to a USB encryption lock through established socket connection by calling an encryption lock interface function of a Windows version; the USB encryption lock receives data sent by the right and left certificate management tool, processes the data sent by the right and left certificate management tool and judges whether the USB encryption lock is effective or not. And sending the encryption lock judgment result to the certificate management tool for the regular flow of the party through the established socket connection. The method comprises the steps that a party flow certificate management tool receives an encryption lock judgment result sent by a USB encryption lock, sends the encryption lock judgment result to a Macintosh Adobe Acrobat decryption plugin through established socket connection, and the Macintosh Adobe Acrobat decryption plugin receives the encryption lock judgment result sent by the party flow certificate management tool and determines whether to normally open an encrypted PDF file from a party flow software normalizer or not according to the encryption lock judgment result. By the method, the Macintosh end can provide a convenient way to exchange data with the encryption lock to check whether the encryption lock is effective or not under the condition that an interface function of a Macintosh version is not or is not convenient to obtain, so that the intellectual property is protected and prevented from being illegally used.
In the description herein, the description of the terms "one embodiment," "some embodiments," "specific embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.