CN110084003B - Method and system for accessing encryption lock based on middleware - Google Patents

Method and system for accessing encryption lock based on middleware Download PDF

Info

Publication number
CN110084003B
CN110084003B CN201810076819.4A CN201810076819A CN110084003B CN 110084003 B CN110084003 B CN 110084003B CN 201810076819 A CN201810076819 A CN 201810076819A CN 110084003 B CN110084003 B CN 110084003B
Authority
CN
China
Prior art keywords
encryption lock
data
application program
socket connection
interface function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810076819.4A
Other languages
Chinese (zh)
Other versions
CN110084003A (en
Inventor
陶涛
谢浩
沈景华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Founder Holdings Development Co ltd
Beijing Founder Electronics Co Ltd
Original Assignee
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Founder Group Co Ltd, Beijing Founder Electronics Co Ltd filed Critical Peking University Founder Group Co Ltd
Priority to CN201810076819.4A priority Critical patent/CN110084003B/en
Publication of CN110084003A publication Critical patent/CN110084003A/en
Application granted granted Critical
Publication of CN110084003B publication Critical patent/CN110084003B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms

Abstract

The invention provides a method and a system for accessing an encryption lock based on a middleware, a computer device and a computer readable storage medium, wherein the method for accessing the encryption lock based on the middleware comprises the following steps: receiving data required by an application program in a first system for reading an encryption lock; calling an interface function of the encryption lock under the second system, and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not; and receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system so that the application program can determine whether the encryption lock is effective according to the judgment result. The invention solves the problem that the read-write operation cannot be carried out on the encryption lock when the interface function of the corresponding version is not available or is inconvenient to obtain, and realizes that different systems mutually judge whether the encryption lock is effective or not, thereby protecting intellectual property rights and preventing the intellectual property rights from being illegally used.

Description

Method and system for accessing encryption lock based on middleware
Technical Field
The invention relates to the field of computer software, in particular to a method and a system for accessing an encryption lock based on middleware, computer equipment and a computer readable storage medium.
Background
The encryption lock is an encryption product combining software and hardware on a computer parallel port or a Universal Serial Bus (USB) port, and is an intelligent tool with a software protection function provided for software developers. It includes a hardware installed on the computer parallel port or universal serial bus port, and a set of interface software and tool software suitable for various languages. The encryption lock is based on a hardware protection technology, and aims to prevent intellectual property rights from being illegally used through protection of software and data. The software developer can judge whether the encryption lock is effective or not by performing data exchange (namely reading and writing the encryption lock) on the interface function and the encryption lock; or directly encrypt the executable file with the tool attached to the encryption lock. Thus, a software developer can set a plurality of software locks in the software, and the locks are opened by using the encryption locks as keys; if the encryption lock is invalid, the software cannot be normally executed.
Often, the dongle interface functions will have different versions to accommodate different operating systems. For example, a Windows version of interface function exists under a Windows operating system, and a Macintosh version of interface function exists under a Macintosh operating system. Windows, Microsoft Windows, is a suite of operating systems developed by Microsoft corporation of America; macintosh is abbreviated as Mac, Macintosh computer, a series of personal computers among apple computers. And when the interface function of the corresponding version is not available or inconvenient to obtain, the read-write operation of the encryption lock cannot be carried out usually. Therefore, how to effectively access the encryption lock of another system under a certain system so as to judge whether the encryption lock of another system is effective becomes a problem to be solved urgently.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art or the related art.
To this end, a first aspect of the invention is directed to a method for middleware-based access to a dongle.
A second aspect of the present invention is to provide a middleware-based access dongle system.
A third aspect of the invention is directed to a computer device.
A fourth aspect of the present invention is directed to a computer-readable storage medium.
In view of the above, according to an aspect of the present invention, there is provided a method for accessing an encryption lock based on middleware, including:
receiving data required by an application program in a first system for reading an encryption lock; calling an interface function of the encryption lock under the second system, and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not; and receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system so that the application program can determine whether the encryption lock is effective according to the judgment result.
The method for accessing the encryption lock based on the middleware provided by the invention receives the data required by the reading operation of the application program of the first system on the encryption lock, calls the interface function of the encryption lock of the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
The method for accessing the encryption lock based on the middleware can further have the following technical characteristics:
in the foregoing technical solution, preferably, the receiving data required by the operation of the application program in the first system to read the encryption lock specifically includes: establishing socket connection with equipment corresponding to a first system; and receiving data required by the application program in the first system for the reading operation of the encryption lock in a socket connection mode.
In the technical scheme, the socket connection is established with the equipment corresponding to the first system, so that the middleware receives data transmitted by data required by the operation of reading the encryption lock by an application program in the first system in a socket connection mode, data interaction among different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no error of data, no repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures the effective transmission of the data.
In any of the above technical solutions, preferably, the interface function of the dongle in the second system is invoked, and the data is sent to the dongle through the interface function, so that the dongle processes the data and determines whether itself is valid, which specifically includes: reading the configuration file to obtain the IP address of the equipment corresponding to the second system and the port number of the equipment corresponding to the second system for socket connection, and establishing socket connection with the equipment corresponding to the second system; calling an interface function of an encryption lock under a second system; and sending the data to the encryption lock in a socket connection mode so that the encryption lock processes the data and judges whether the encryption lock is effective.
In the technical scheme, the IP address of the device corresponding to the second system and the port number of the device corresponding to the second system for socket connection are obtained by reading the configuration file, socket connection is established according to the IP address and the port number of the device corresponding to the second system for socket connection, an interface function of the encryption lock under the second system is called, and data required by reading operation of the encryption lock by an application program under the first system is sent to the encryption lock in a socket connection mode, so that the encryption lock processes the data, and whether the encryption lock is effective or not is judged, and therefore access to the encryption lock of the second system under the first system is achieved. Among them, IP (internet protocol, protocol for interconnection between networks) is a protocol designed for communication between computer networks. By the technical scheme, the problem that the encryption lock cannot be read and written normally when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and the mutual judgment of validity of the encryption lock among different systems is realized, so that the intellectual property is protected, and the intellectual property is prevented from being illegally used.
In any of the above technical solutions, preferably, the determination result is sent to the application program in the first system in a socket connection manner.
In the technical scheme, data interaction between the middleware and the first system is realized in a socket connection mode, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures effective transmission of data.
According to a second aspect of the present invention, there is provided a middleware-based access dongle system, comprising: the receiving unit is used for receiving data required by an application program in the first system for reading the encryption lock; the calling unit is used for calling an interface function of the encryption lock under the second system and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not; and the sending unit is used for receiving the judgment result of the encryption lock and sending the judgment result to the application program in the first system so that the application program can determine whether the encryption lock is effective according to the judgment result.
The system for accessing the encryption lock based on the middleware receives the data required by the reading operation of the application program of the first system on the encryption lock through the receiving unit, the calling unit calls the interface function of the encryption lock under the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing the access to the encryption lock of the second system under the first system, the encryption lock processes the received data and judges whether the encryption lock is effective, receiving the judgment result transmitted by the interface function of the second system through the transmitting unit, transmitting the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
The above system for accessing the encryption lock based on the middleware according to the present invention may further have the following technical features:
in the foregoing technical solution, preferably, the receiving unit specifically includes: the first establishing unit is used for establishing socket connection with equipment corresponding to a first system; the first receiving unit is used for receiving data required by the application program in the first system for the reading operation of the encryption lock in a socket connection mode.
In the technical scheme, the first establishing unit establishes socket connection between the middleware and the equipment corresponding to the first system, so that the first receiving unit receives data transmitted by an application program in the first system in a socket connection mode for reading data required by encryption lock operation, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, error-free data, repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures effective transmission of the data.
In any one of the above technical solutions, preferably, the invoking unit includes: a second establishing unit, configured to read the configuration file, obtain an IP address of the device corresponding to the second system and a port number of the device corresponding to the second system for performing socket connection, and establish socket connection with the device corresponding to the second system; the calling subunit is used for calling an interface function of the encryption lock under the second system; and the first sending unit is used for sending the data to the encryption lock in a socket connection mode so that the encryption lock processes the data and judges whether the encryption lock is effective.
In the technical scheme, the configuration file is read through the second establishing unit to obtain the IP address of the device corresponding to the second system and the port number of the device corresponding to the second system for socket connection, socket connection is established according to the IP address and the port number of the device corresponding to the second system for socket connection, the sub-unit is called to call an interface function of the encryption lock under the second system, and the first sending unit sends data required by reading operation of an application program under the first system on the encryption lock to the encryption lock in a socket connection mode so that the encryption lock can process the data and judge whether the data is valid or not, so that access to the encryption lock of the second system under the first system is achieved. Among them, IP (internet protocol, protocol for interconnection between networks) is a protocol designed for communication between computer networks. By the technical scheme, the problem that the encryption lock cannot be read and written normally when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and the mutual judgment of validity of the encryption lock among different systems is realized, so that the intellectual property is protected, and the intellectual property is prevented from being illegally used.
In any of the above technical solutions, preferably, the determination result is sent to the application program in the first system in a socket connection manner.
In the technical scheme, data interaction between the middleware and the first system is realized in a socket connection mode, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures effective transmission of data.
According to a third aspect of the present invention, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor when executing the computer program implementing the steps of the middleware access dongle based method according to any one of the preceding claims.
The invention provides a computer device, when a processor executes a computer program, the computer program realizes the reading operation of an encryption lock by receiving data required by an application program of a first system, calls an interface function of the encryption lock of a second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
According to a fourth aspect of the invention, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the middleware-based access dongle method of any one of the above.
The computer readable storage medium provided by the invention, when executed by a processor, realizes the operation of reading the encryption lock by receiving the data required by the application program of the first system, calling the interface function of the encryption lock of the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow diagram illustrating a method for middleware-based access to a dongle according to one embodiment of the present invention;
FIG. 2 is a flow diagram illustrating a method for middleware-based access to a dongle according to another embodiment of the present invention;
FIG. 3 is a flow diagram illustrating a method for middleware-based access to a dongle according to another embodiment of the present invention;
FIG. 4 shows a schematic block diagram of a middleware-based access dongle system of one embodiment of the present invention;
FIG. 5 shows a schematic block diagram of a computer device of an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a method for middleware-based access to a dongle according to another embodiment of the present invention.
Detailed Description
So that the manner in which the above recited aspects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
The embodiment of the first aspect of the present invention provides a method for accessing an encryption lock based on a middleware, and fig. 1 shows a flowchart of the method for accessing an encryption lock based on a middleware according to an embodiment of the present invention, where the method for accessing an encryption lock based on a middleware includes:
s102, receiving data required by an application program in a first system for reading an encryption lock;
s104, calling an interface function of the encryption lock under the second system, and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not;
s106, receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system, so that the application program can determine whether the encryption lock is effective according to the judgment result.
In the embodiment, the method comprises the steps of receiving data required by an application program of a first system for reading an encryption lock, calling an interface function of an encryption lock of a second system, so as to obtain the interface function corresponding to the encryption lock, sending the data required by the application program in the first system for reading the encryption lock to the encryption lock through the interface function, so as to access the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the received data is valid, receiving a judgment result transmitted by the interface function of the second system, and sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
FIG. 2 is a flowchart illustrating a method for middleware-based access to a dongle according to another embodiment of the present invention. Wherein, the method comprises the following steps:
s202, establishing socket connection with equipment corresponding to a first system;
s204, receiving data required by the application program in the first system for reading the encryption lock in a socket connection mode;
s206, calling an interface function of the encryption lock under the second system, and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not;
s208, receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system, so that the application program can determine whether the encryption lock is effective according to the judgment result.
In the embodiment, the socket connection is established with the device corresponding to the first system, so that the middleware receives data transmitted by the application program in the first system through the socket connection mode to read the data required by the encryption lock operation, data interaction between different systems is realized through the socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated transmission and capability of receiving according to the transmission sequence, and effectively ensures effective transmission of the data.
FIG. 3 is a flowchart illustrating a method for middleware-based access to a dongle according to another embodiment of the present invention. Wherein, the method comprises the following steps:
s302, establishing socket connection with equipment corresponding to a first system;
s304, receiving data required by the application program in the first system for reading the encryption lock in a socket connection mode;
s306, reading the configuration file to obtain the IP address of the equipment corresponding to the second system and the port number of the equipment corresponding to the second system for socket connection, and establishing socket connection with the equipment corresponding to the second system;
s308, calling an interface function of the encryption lock under the second system;
s310, sending data to the encryption lock in a socket connection mode so that the encryption lock processes the data and judges whether the encryption lock is effective or not;
s312, receiving the judgment result of the encryption lock, and sending the judgment result to the application program in the first system, so that the application program can determine whether the encryption lock is valid according to the judgment result.
In the embodiment, the IP address of the device corresponding to the second system and the port number of the device corresponding to the second system for socket connection are obtained by reading the configuration file, socket connection is established according to the IP address and the port number of the device corresponding to the second system for socket connection, an interface function of the encryption lock under the second system is called, and data required by reading operation of the encryption lock by an application program under the first system is sent to the encryption lock through the socket connection mode, so that the encryption lock processes the data, and whether the encryption lock is effective or not is judged, thereby realizing access to the encryption lock of the second system under the first system. Among them, IP (internet protocol, protocol for interconnection between networks) is a protocol designed for communication between computer networks. By the technical scheme, the problem that the encryption lock cannot be read and written normally when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and the mutual judgment of validity of the encryption lock among different systems is realized, so that the intellectual property is protected, and the intellectual property is prevented from being illegally used.
In an embodiment of the present invention, the determination result is preferably sent to the application program in the first system by means of a socket connection.
In the embodiment, data interaction between the middleware and the first system is realized in a socket connection mode, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated sending and capability of receiving according to the sending sequence, and effectively ensures effective transmission of data.
In a second aspect of the present invention, a middleware-based access dongle system 400 is provided, and fig. 4 shows a schematic block diagram of the middleware-based access dongle system 400 according to an embodiment of the present invention, wherein the middleware-based access dongle system 400 comprises:
a receiving unit 402, configured to receive data required by an application program in a first system to read an encryption lock; the calling unit 404 is configured to call an interface function of the encryption lock in the second system, and send the data to the encryption lock through the interface function, so that the encryption lock processes the data and determines whether the encryption lock is valid; and the sending unit 406 is configured to receive the judgment result of the encryption lock, and send the judgment result to the application program in the first system, so that the application program determines whether the encryption lock is valid according to the judgment result.
In this embodiment, the receiving unit 402 receives the data required by the application program of the first system to read the encryption lock, the calling unit 404 calls the interface function of the encryption lock of the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing the access to the encryption lock of the second system under the first system, the encryption lock processes the received data and judges whether the encryption lock is effective, the determination result transmitted by the interface function of the second system is received by the sending unit 406, and the determination result is sent to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
In an embodiment of the present invention, preferably, the receiving unit 402 specifically includes: a first establishing unit 408, configured to establish a socket connection with a device corresponding to the first system; the first receiving unit 410 is configured to receive, by means of a socket connection, data required by an application program in the first system for an encryption lock read operation.
In this embodiment, the first establishing unit 408 establishes a socket connection between the middleware and the device corresponding to the first system, so that the first receiving unit 410 receives data to be transmitted by an application program in the first system through the socket connection, the data required by the read dongle operation is transmitted, data interaction between different systems is realized through the socket connection, and the method has the characteristics of reliable data transmission service, no data error, no repeated transmission, and capability of receiving according to the transmission sequence, thereby effectively ensuring effective transmission of data. A
In one embodiment of the present invention, preferably, the invoking unit 404 includes: a second establishing unit 412, configured to read the configuration file, obtain an IP address of the device corresponding to the second system and a port number of the device corresponding to the second system for performing socket connection, and establish socket connection with the device corresponding to the second system; a calling subunit 414, configured to call an interface function of the dongle in the second system; the first sending unit 416 is configured to send the data to the dongle through a socket connection, so that the dongle processes the data and determines whether itself is valid.
In this embodiment, the second establishing unit 412 reads the configuration file to obtain the IP address of the device corresponding to the second system and the port number of the device corresponding to the second system for socket connection, and establishes socket connection according to the IP address and the port number of the device corresponding to the second system for socket connection, the calling subunit 414 calls an interface function of the encryption lock under the second system, and the first sending unit 416 sends data, which is required by the application program under the first system to perform the reading operation on the encryption lock, to the encryption lock in a socket connection manner, so that the encryption lock processes the data, and determines whether the encryption lock is valid, thereby implementing access to the encryption lock of the second system under the first system. Among them, IP (internet protocol, protocol for interconnection between networks) is a protocol designed for communication between computer networks. By the technical scheme, the problem that the encryption lock cannot be read and written normally when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and the mutual judgment of validity of the encryption lock among different systems is realized, so that the intellectual property is protected, and the intellectual property is prevented from being illegally used.
In an embodiment of the present invention, the determination result is preferably sent to the application program in the first system by means of a socket connection.
In the embodiment, data interaction between the middleware and the first system is realized in a socket connection mode, data interaction between different systems is realized in a socket connection mode, and the method has the characteristics of reliable data transmission service, no data error, no repeated sending and capability of receiving according to the sending sequence, and effectively ensures effective transmission of data.
In a third aspect of the present invention, a computer apparatus is provided, and fig. 5 is a schematic block diagram of a computer apparatus 500 according to an embodiment of the present invention. Comprising a memory 502, a processor 504 and a computer program stored on the memory 502 and executable on the processor, the processor 504, when executing the computer program, performing the steps of the method for middleware based access to a dongle as in any of the above.
In the computer apparatus 500 of the present invention, the processor 504, when executing the computer program, realizes that the interface function of the dongle in the second system is invoked by receiving the data required by the reading operation of the application program of the first system on the dongle, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
An embodiment of the fourth aspect of the invention proposes a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the middleware-based access dongle method according to any one of the preceding claims.
The computer readable storage medium provided by the invention, when executed by a processor, realizes the operation of reading the encryption lock by receiving the data required by the application program of the first system, calling the interface function of the encryption lock of the second system, thereby realizing the acquisition of the interface function corresponding to the encryption lock, sending the data required by the reading operation of the application program in the first system to the encryption lock through the interface function, thereby realizing accessing the encryption lock of the second system under the first system, processing the received data by the encryption lock, judging whether the encryption lock is effective or not, receiving the judgment result transmitted by the interface function of the second system, sending the judgment result to the application program in the first system, so that the application program determines whether the encryption lock under the second system is valid according to the judgment result, and further determines whether to execute the operation according to whether the encryption lock is valid. By the technical scheme, the problem that the encryption lock cannot be read and written when the interface function of the corresponding version is not available or is inconvenient to obtain is solved, and whether the encryption lock is effective or not is judged among different systems, so that intellectual property rights are protected, and the intellectual property rights are prevented from being illegally used.
Fig. 6 is a schematic flowchart illustrating a method for accessing an encryption lock based on middleware according to another embodiment of the present invention, as shown in fig. 6, a USB encryption lock, that is, an encryption lock in the present application, is used to encrypt and decrypt a PDF file, where the encrypted PDF file is from a normalizer of a regular flow software, and a PDF (Portable Document Format) is a file Format developed by Adobe Systems company for exchanging files in a manner independent of an application program, an operating system, and hardware. The Adobe Acrobat decryption plug-in at the Macintosh end is an application program in the first system in the application, wherein Macintosh is called Mac for short, Macintosh computers are a series of personal computers in apple computers. Adobe Acrobat is a PDF (Portable Document Format) editing software developed by Adobe corporation. The system comprises a square positive flow certificate management tool, namely middleware in the application, a USB encryption lock, a Macintosh end Adobe Acrobat decryption plugin, a square positive flow certificate management tool configuration file, namely a configuration file in the application, and a Macintosh end Adobe Acrobat decryption plugin configuration file, wherein the square positive flow certificate management tool is used for exchanging data with the Macintosh end Adobe Acrobat decryption plugin at the USB encryption lock and is used for storing an IP address of a machine where the square positive flow certificate management tool is located and a port number used when socket connection is conducted with a server where the square positive flow certificate management tool is located; the method comprises the steps that a square smooth flow certificate management tool reads an IP address of a machine where a USB encryption lock is located and a port number used when socket connection is conducted with the machine where the USB encryption lock is located from a square smooth flow certificate management tool configuration file; and establishing socket connection with the machine where the USB encryption lock is located. And the Macintosh Adobe Acrobat decryption plugin reads the IP address of the machine where the just-right-flow certificate management tool is located and the port number used when the machine where the just-right-flow certificate management tool is located is in socket connection with the machine from the configuration file of the Macintosh Adobe Acrobat decryption plugin. And establishing socket connection with a machine where the certificate management tool is located; after a socket connection is established with a machine where a square and smooth flow certificate management tool is located, the Adobe Acrobat decryption plug-in at the Macintosh end sends data to the square and smooth flow certificate management tool through the established socket connection; the method comprises the steps that a certificate management tool of the square smooth flow receives data sent from an Adobe Acrobat decryption plug-in at a Macintosh end, and sends data required by read-write operation to a USB encryption lock through established socket connection by calling an encryption lock interface function of a Windows version; the USB encryption lock receives data sent by the right and left certificate management tool, processes the data sent by the right and left certificate management tool and judges whether the USB encryption lock is effective or not. And sending the encryption lock judgment result to the certificate management tool for the regular flow of the party through the established socket connection. The method comprises the steps that a party flow certificate management tool receives an encryption lock judgment result sent by a USB encryption lock, sends the encryption lock judgment result to a Macintosh Adobe Acrobat decryption plugin through established socket connection, and the Macintosh Adobe Acrobat decryption plugin receives the encryption lock judgment result sent by the party flow certificate management tool and determines whether to normally open an encrypted PDF file from a party flow software normalizer or not according to the encryption lock judgment result. By the method, the Macintosh end can provide a convenient way to exchange data with the encryption lock to check whether the encryption lock is effective or not under the condition that an interface function of a Macintosh version is not or is not convenient to obtain, so that the intellectual property is protected and prevented from being illegally used.
In the description herein, the description of the terms "one embodiment," "some embodiments," "specific embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A middleware-based method for accessing an encryption lock, comprising:
receiving data required by an application program in a first system for reading the encryption lock;
calling an interface function of the encryption lock under a second system, and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not;
receiving a judgment result of the encryption lock, and sending the judgment result to the application program in the first system so that the application program can determine whether the encryption lock is valid according to the judgment result;
the calling an interface function of the encryption lock in the second system, and sending the data to the encryption lock through the interface function, so that the encryption lock processes the data and judges whether the encryption lock is valid, specifically comprising:
reading a configuration file to obtain an IP address of equipment corresponding to the second system and a port number of socket connection of the equipment corresponding to the second system, and establishing socket connection with the equipment corresponding to the second system;
calling an interface function of the encryption lock under the second system;
and sending the data to the encryption lock in a socket connection mode so that the encryption lock processes the data and judges whether the data is valid or not.
2. The middleware-based access dongle method of claim 1,
the receiving data required by the application program in the first system for the operation of reading the encryption lock specifically includes:
establishing socket connection with equipment corresponding to the first system;
and receiving data required by the application program in the first system for the reading operation of the encryption lock in a socket connection mode.
3. The middleware-based access dongle method of claim 1,
and sending the judgment result to the application program in the first system in a socket connection mode.
4. A middleware-based access dongle system, comprising:
the receiving unit is used for receiving data required by an application program in a first system for reading the encryption lock;
the calling unit is used for calling an interface function of the encryption lock under the second system and sending the data to the encryption lock through the interface function so that the encryption lock processes the data and judges whether the encryption lock is effective or not;
the sending unit is used for receiving the judgment result of the encryption lock and sending the judgment result to the application program in the first system so that the application program can determine whether the encryption lock is valid according to the judgment result;
the calling unit comprises:
a second establishing unit, configured to read a configuration file, obtain an IP address of a device corresponding to the second system and a port number of a socket connection performed by the device corresponding to the second system, and establish a socket connection with the device corresponding to the second system;
the calling subunit is used for calling the interface function of the encryption lock under the second system;
and the first sending unit is used for sending the data to the encryption lock in a socket connection mode so that the encryption lock processes the data and judges whether the data is valid or not.
5. The middleware-based access dongle system of claim 4, wherein the receiving unit specifically comprises:
a first establishing unit, configured to establish a socket connection with a device corresponding to the first system;
and the first receiving unit is used for receiving data required by the application program in the first system for the reading operation of the encryption lock in a socket connection mode.
6. The middleware-based access dongle system of claim 4,
and sending the judgment result to the application program in the first system in a socket connection mode.
7. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, characterized in that: the processor is configured to perform the steps of the middleware based access dongle based method of any one of claims 1 to 3.
8. A computer-readable storage medium having stored thereon a computer program, characterized in that: the computer program realizing the steps of the middleware based access dongle method of any one of claims 1 to 3 when executed by a processor.
CN201810076819.4A 2018-01-26 2018-01-26 Method and system for accessing encryption lock based on middleware Expired - Fee Related CN110084003B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810076819.4A CN110084003B (en) 2018-01-26 2018-01-26 Method and system for accessing encryption lock based on middleware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810076819.4A CN110084003B (en) 2018-01-26 2018-01-26 Method and system for accessing encryption lock based on middleware

Publications (2)

Publication Number Publication Date
CN110084003A CN110084003A (en) 2019-08-02
CN110084003B true CN110084003B (en) 2021-04-09

Family

ID=67412320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810076819.4A Expired - Fee Related CN110084003B (en) 2018-01-26 2018-01-26 Method and system for accessing encryption lock based on middleware

Country Status (1)

Country Link
CN (1) CN110084003B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006309A (en) * 2010-12-16 2011-04-06 新余钢铁集团有限公司 Method for performing real-time communication between manufacturing execution system (MES) and process control system (PCS) and middleware
CN103186729A (en) * 2013-03-26 2013-07-03 北京深思数盾科技有限公司 Encryption lock and method for protecting software by utilizing encryption lock

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040215665A1 (en) * 2002-01-09 2004-10-28 Edgar David A. System, method, and computer program product for providing accelerated and secure wireless data transmission over the internet
DE60309216T2 (en) * 2003-04-04 2007-08-23 Telefonaktiebolaget Lm Ericsson (Publ) METHOD AND DEVICES FOR PROVIDING DATA ACCESS
CN101197723B (en) * 2008-01-03 2010-08-18 中兴通讯股份有限公司 Network management intermediate part
CN102434478B (en) * 2011-11-04 2014-09-24 重庆海润节能技术股份有限公司 Remote intelligent control system and control method for fan
CN103136466B (en) * 2013-02-04 2015-12-09 福州大学 A kind of Web3D encryption method based on softdog
CN104424401B (en) * 2013-08-23 2018-02-23 北大方正集团有限公司 Encryption method and device for encryption lock
WO2017101122A1 (en) * 2015-12-18 2017-06-22 深圳市振华微电子有限公司 Computer encryption lock having separating management and use

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006309A (en) * 2010-12-16 2011-04-06 新余钢铁集团有限公司 Method for performing real-time communication between manufacturing execution system (MES) and process control system (PCS) and middleware
CN103186729A (en) * 2013-03-26 2013-07-03 北京深思数盾科技有限公司 Encryption lock and method for protecting software by utilizing encryption lock

Also Published As

Publication number Publication date
CN110084003A (en) 2019-08-02

Similar Documents

Publication Publication Date Title
US7657932B2 (en) Extendible security token management architecture and secure message handling methods
US7743413B2 (en) Client apparatus, server apparatus and authority control method
CN102227734B (en) Client computer for protecting confidential file, server computer therefor, method therefor
US8090946B2 (en) Inter-system binding method and application based on hardware security unit
US8191167B2 (en) Secure system and method for processing data between a first device and at least one second device provided with monitoring means
US20100034391A1 (en) Cryptographic-key management system, external device, and cryptographic-key management program
CN103034811B (en) A kind of method, system and device of file process
CN104834874A (en) Establishing physical locality between secure execution environments
CN114125027A (en) Communication establishing method and device, electronic equipment and storage medium
CN112751866B (en) Network data transmission method and system
CN101208704A (en) Security system and method for securing the integrity of at least one arrangement comprising multiple devices
CN110084003B (en) Method and system for accessing encryption lock based on middleware
CN104537283A (en) Software licensing control device based on network
WO2014089968A1 (en) Virtual machine system data encryption method and device
US9135449B2 (en) Apparatus and method for managing USIM data using mobile trusted module
CN110768990A (en) Data transmission method, system, equipment and computer readable storage medium
CN114915503A (en) Data stream splitting processing encryption method based on security chip and security chip device
CN101489227B (en) Host device, mobile terminal, method for processing mobile communication service and system thereof
CN111859351A (en) Method, system, server and storage medium for writing information into chip
KR100924951B1 (en) Network Interworking Security Gateway Apparatus and Method
CN111339578A (en) Key access method, device, system, equipment and storage medium
CN104579741A (en) Business management system
CN115543663B (en) Data processing method, device, electronic equipment and storage medium
CN115118523B (en) Security chip encryption processing method and device for adjusting encryption strategy by terminal equipment
JP7146124B1 (en) Terminal, method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230609

Address after: 3007, Hengqin international financial center building, No. 58, Huajin street, Hengqin new area, Zhuhai, Guangdong 519031

Patentee after: New founder holdings development Co.,Ltd.

Patentee after: BEIJING FOUNDER ELECTRONICS Co.,Ltd.

Address before: 100871, Beijing, Haidian District Cheng Fu Road 298, founder building, 9 floor

Patentee before: PEKING UNIVERSITY FOUNDER GROUP Co.,Ltd.

Patentee before: BEIJING FOUNDER ELECTRONICS Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210409