CN110890957A - Key security device interaction method, electronic device and storage medium - Google Patents

Key security device interaction method, electronic device and storage medium Download PDF

Info

Publication number
CN110890957A
CN110890957A CN201811045218.3A CN201811045218A CN110890957A CN 110890957 A CN110890957 A CN 110890957A CN 201811045218 A CN201811045218 A CN 201811045218A CN 110890957 A CN110890957 A CN 110890957A
Authority
CN
China
Prior art keywords
data
key security
security device
operation instruction
data block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811045218.3A
Other languages
Chinese (zh)
Other versions
CN110890957B (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excelsecu Data Technology Co Ltd
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201811045218.3A priority Critical patent/CN110890957B/en
Publication of CN110890957A publication Critical patent/CN110890957A/en
Application granted granted Critical
Publication of CN110890957B publication Critical patent/CN110890957B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a key security device interaction method, electronic equipment and a storage medium, wherein the method comprises the following steps: in an idle state, acquiring first data from the key security equipment; if the operation instruction is obtained, the operation state is changed to a working state; and if the first data comprises the data required by the operation instruction, executing the operation instruction according to the corresponding data in the first data. The method comprises the steps that first data are obtained from key safety equipment in advance in an idle state, and the first data are used by a subsequent operation instruction; therefore, when the operation instruction needs to use the data block in the first data, the data block acquired from the key security device when the terminal device is in the idle state can be directly utilized, and the data block does not need to be read from the key security device in a Bluetooth communication mode with a slower speed, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interactive experience of the user in the process of using the key security device is improved.

Description

Key security device interaction method, electronic device and storage medium
Technical Field
The present invention relates to a key security device technology, and in particular, to a key security device interaction method, an electronic device, and a storage medium.
Background
The communication rate of the current BLE technology is also low, and the BLE technology is basically applied to some communication scenarios with small data volume, but the key security device, such as a bluetooth shield, still has some usage scenarios that need to transmit data of dozens of kbytes, even dozens of kbytes. For example, some operations by a user typically require reading data from certain files on a key security device, which may have tens of kbytes of data.
The use of BLE to transmit these large data typically takes several seconds or even tens of seconds, and waiting for each use for several seconds for user interaction can be significant in terms of user experience. The existing method generally increases the transmission speed by adjusting parameters such as a smaller connection interval, but the method has limited promotion and can cause poor compatibility of connection with terminal equipment such as android system equipment.
Disclosure of Invention
In order to overcome the defects of the prior art, an object of the present invention is to provide a key security device interaction method, which can solve the problem that the existing key security device interaction method that increases the transmission speed by adjusting parameters such as a smaller connection interval to reduce user waiting has a limitation.
Another object of the present invention is to provide an electronic device, which can solve the problem that the existing key security device interaction method for increasing transmission speed by adjusting parameters such as a smaller connection interval to reduce user waiting is limited.
It is a further object of the present invention to provide a storage medium storing a computer program, which can solve the problem that the existing key security device interaction method for increasing the transmission speed by adjusting parameters such as a smaller connection interval to reduce user waiting has a limitation.
One of the purposes of the invention is realized by adopting the following technical scheme:
a key security device interaction method comprises the following steps:
in an idle state, acquiring first data from the key security equipment; the first data comprises at least one data block;
if the operation instruction is obtained, the operation state is changed to a working state;
and if the first data comprises the data block required by the operation instruction, executing the operation instruction according to the corresponding data block in the first data.
Further, the key security device interaction method further comprises the following steps:
if the data required by the operation instruction comprises second data, acquiring the second data from the key security equipment; the second data is data which is required by the operation instruction and is not acquired from the key security equipment in an idle state;
and executing the operation instruction according to the second data.
Further, the key security device interaction method further comprises the following steps:
if the data required by the operation instruction comprises a data block in the first data and second data, acquiring the second data from the key security equipment; the second data is data which is not acquired from the key security equipment in an idle state;
and executing the operation instruction according to the data block in the first data and the second data.
Further, in the idle state, before the first data is acquired from the key security device, the method further includes the following steps:
and carrying out Bluetooth connection with the key safety equipment, and initializing the current state into an idle state.
Further, the slave key security device obtains first data, specifically, the driver layer obtains the first data from the key security device; the executing the operation instruction according to the corresponding data block in the first data is specifically that the application layer executes the operation instruction according to the corresponding data block in the first data.
Further, the operation instruction includes a read data command.
Further, the length of the data block in the first data acquired from the key security device in the idle state is not greater than the preset length.
Further, in the idle state, after the first data is acquired from the key security device, the method further includes the following steps:
and if the operation instruction is not obtained within the preset time length, obtaining a new data block from the key safety equipment, wherein the new data block is the data block which is not obtained from the key safety equipment in the idle state.
The second purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprising a memory, a processor and a program stored in the memory, the program being configured to be executed by the processor, the processor implementing the steps of the above-described key security device interaction method when executing the program.
The third purpose of the invention is realized by adopting the following technical scheme:
a storage medium storing a computer program which, when executed by a processor, implements the steps of the above-described key security device interaction method.
Compared with the prior art, the embodiment of the invention has the beneficial effects that: the method comprises the steps that first data are obtained from key safety equipment in advance in an idle state, and a data block in the first data is used by a subsequent operation instruction; therefore, when the operation instruction needs to use the first data, the first data acquired from the key security device when the terminal device is in the idle state can be directly utilized, and the data does not need to be read from the key security device in a low-speed Bluetooth communication mode, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interactive experience of the user in the process of using the key security device is improved.
Drawings
Fig. 1 is a schematic flowchart of a key security device interaction method according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating a key security device interaction method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to a third embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Example one
Fig. 1 is a schematic flowchart of a key security device interaction method, which is used for a terminal device, such as a mobile phone, a tablet, a dedicated read-write device, and the like, that can establish bluetooth communication with a key security device.
The key security device interaction method comprises the following steps:
step S110, when the terminal equipment is in an idle state, first data are obtained from the key safety equipment; the first data includes at least one data block.
In this embodiment, the first data represents data acquired by the terminal device from the key security device in the idle state, and the data acquired by the terminal device in the idle state may be preset according to actual application without limiting what type of data is; for example, larger files, such as files above 1 kbyte; the data usage can also be preset at the terminal device, for example, the acquired first data is an electronic signature file, and is generally tens of kbytes or twenty kbytes in size. When the terminal device is in an idle state, one or more first data are acquired from the key security device, and the type and the purpose of each first data may be the same or different.
The terminal equipment is provided with a program interacting with the key safety equipment, and actively generates or executes an instruction interacting with the key safety equipment or through the operation of a user, namely when the instruction is operated, the terminal equipment is in a working state; the terminal device is in an idle state when the terminal device does not generate or execute instructions to interact with the key security device.
When the terminal equipment is in an idle state, first data is obtained from the key safety equipment so as to prepare for subsequent operation instructions to use a data block in the first data. Therefore, when the operation instruction needs to use the data block in the first data, the data block in the first data acquired from the key security device by the terminal device in the idle state can be directly utilized, and the data does not need to be read from the key security device in a low-speed Bluetooth communication mode, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interactive experience of the user in the process of using the key security device is improved.
When the operation instruction needs to use the data block in the first data, the data block in one or more first data acquired by the terminal device from the key security device in the idle state can be directly utilized, and the type and the purpose of the data block in the acquired first data can be the same or different. For example, although the terminal device acquires a plurality of data blocks from the key security device in step S110, an operation instruction at a certain point of time only needs to use one data block in the first data acquired from the key security device while the terminal device is in the idle state.
As a preferred embodiment, the terminal device is provided with a program for interacting with the key security device, the program comprising a driver layer for establishing a connection with the key security device, and an application layer for processing specific instructions. In step S110, first data is obtained from the key security device, specifically, the driver layer obtains the first data from the key security device.
As a preferred implementation, after the terminal device is connected with the key security device by bluetooth, the current state is initialized to an idle state; the first data is then obtained from the key security device.
After the terminal device is connected with the key security device, some data blocks are read from the key security device and the read data blocks are cached as the acquired first data.
As a preferred implementation, after the terminal device is connected with the key security device by bluetooth, the current state is initialized to an idle state; the first data is then retrieved from the key security device before the operation instruction is not retrieved.
And step S120, if the operation instruction is acquired, the operation state is changed to the working state.
The terminal device actively or through the operation of the user generates or executes the instruction interacting with the key security device, namely, when the operation instruction is generated, the terminal device is converted into a working state.
When the operation instruction is acquired, the appropriate time can be waited to convert the operation instruction into a working state after acquiring a section of complete data from the key security equipment; and the data acquisition from the key security equipment can be stopped in an interruption mode, and the key security equipment is instantly switched to a working state.
Step S130, if the first data includes the data block required by the operation instruction, executing the operation instruction according to the corresponding data block in the first data.
For example, when the terminal device is in an idle state, the first data acquired from the key security device includes a complete electronic signature file, and data required by an operation instruction is also the electronic signature file, so that the terminal device can execute the operation instruction according to the electronic signature file in the first data, such as performing an operation of identity authentication and the like.
In a preferred embodiment, the operation instruction includes a read data command, for example, an operation instruction includes a command for reading data of an electronic signature file.
As a preferred embodiment, the terminal device is provided with a program for interacting with the key security device, the program comprising a driver layer for establishing a connection with the key security device, and an application layer for processing specific instructions.
As a preferred implementation manner, step S130 executes the operation instruction according to the corresponding data block in the first data, specifically, the application layer executes the operation instruction according to the corresponding data block in the first data.
According to the key security equipment interaction method provided by the embodiment of the invention, the first data is obtained from the key security equipment in advance in the idle state, so that the data block in the first data is used by a subsequent operation instruction; therefore, when the operation instruction needs to use the first data, the first data acquired from the key security device when the terminal device is in the idle state can be directly utilized, and the data does not need to be read from the key security device in a low-speed Bluetooth communication mode, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interactive experience of the user in the process of using the key security device is improved.
As a preferred embodiment, the key security device interaction method further comprises the following steps:
step S140, if the data required by the operation instruction includes the second data, acquiring the second data from the key security device. The second data is data that is required by the operation instruction and is not acquired from the key security device in an idle state.
In the present embodiment, the second data represents data acquired from the key security device when the terminal device is not in the idle state. Since the terminal device has a limited time in the idle state, sometimes the first data acquired from the key security device may not include data necessary for the operation instruction.
For example, when the terminal device is in an idle state, the first data acquired from the key security device does not include an electronic signature file, that is, the second data, and the data required by a certain operation instruction is the electronic signature file; therefore, the terminal device still needs to obtain the required data, i.e. the second data, such as the electronic signature file, from the key security device at this time. For another example, when the terminal device is in an idle state, the first data acquired from the key security device only includes one part of the electronic signature file, and the other part which is not acquired is the second data; therefore, when the terminal device needs the electronic signature file according to an operation instruction, another part of the electronic signature file, namely the second data, is acquired from the key security device.
In a preferred embodiment, the operation instruction includes a read data command, for example, an operation instruction includes a command for reading data of an electronic signature file.
And step S150, executing the operation instruction according to the second data.
After the terminal device acquires the required second data from the key security device, the terminal device may execute the operation instruction, such as identity authentication, according to the second data, such as the electronic signature file.
As a preferred implementation manner, step S150 executes the operation instruction according to the second data, specifically, the application layer executes the operation instruction according to the second data.
As a preferred embodiment, the key security device interaction method further comprises the following steps:
step S160, if the data required by the operation instruction includes the corresponding data block and the second data in the first data, acquiring the second data from the key security device. The second data is data that is not obtained from the key security device in the idle state.
In the present embodiment, the second data represents data acquired from the key security device when the terminal device is not in the idle state. Since the time during which the terminal device is in the idle state is limited, sometimes the first data acquired from the key security device may not completely include data necessary for the operation instruction. For example, the first data acquired from the key security device by the terminal device in the idle state only includes the first data block, and the data required by the operation instruction includes not only the first data block but also a second data block, which is the second data. The first data block and the second data block may be different data segments in one file, or may be different files.
For example, the first data acquired by the terminal device from the key security device in the idle state includes only a first data block of an electronic signature file, and the electronic signature file includes the first data block and a second data block; the data required by an operation command is an electronic signature file, so the terminal device still needs to obtain the required data, i.e. the second data, such as the second data block of the electronic signature file, from the key security device at this time.
And step S170, executing the operation instruction according to the data block in the first data and the second data.
As a preferred embodiment, when the first data block and the second data block in the first data are different data segments in one file, the first data block and the second data block need to be merged first, that is, the first data block and the second data block are merged first, and then corresponding operation instructions are executed.
As a preferred embodiment, step S170 executes the operation instruction according to the data block and the second data in the first data, specifically, the application layer executes the operation instruction according to the data block and the second data in the first data.
Therefore, according to the key security device interaction method provided by the embodiment of the present invention, when the data acquired from the key security device does not include the data required by the operation instruction in the idle state of the terminal device, the required data is acquired from the key security device through bluetooth connection with the key security device, so that the problem of how to realize interaction with the key security device when the first data acquired from the key security device does not include the data required by the operation instruction due to the limited time of the terminal device in the idle state is solved.
Illustratively, an implementation procedure of the key security device interaction method of the present embodiment is as follows:
1. carrying out Bluetooth connection with the key safety equipment;
2. judging whether an operation command is received, if so, executing 4, otherwise, executing 3;
3. reading data from the key security device and caching the data in the memory, and executing step 2;
4. and if the operation command is judged to be a data reading command, reading uncached data from the key safety equipment according to the cached data, merging and returning, and executing step 2. For example, if the cached data block 1 and the data block 2 are read in advance, and the operation command needs to read the data block 2 and the data block 3, the data block 3 is read to the key security device and merged with the cached data block 2 and returned.
Example two
The key security device interaction method as shown in fig. 2 includes the following steps:
step S210, in an idle state, acquiring first data from the key security equipment; the first data includes at least one data block.
As a preferred implementation manner, in this embodiment, the length of the data block in the first data acquired from the key security device in the idle state is not greater than a preset length, such as 256 bytes.
Because the time that the terminal device is in the idle state is limited, the length of the data block in the first data is limited, that is, the length of the data block acquired from the key security device at one time in the idle state is not greater than the preset length. After a data block with the length not greater than a preset length is obtained, whether an operation instruction is obtained or not is inquired; therefore, the situation that the terminal device reads the first data in advance to influence the execution of the operation instruction and cause inconvenience to the use of a user is avoided.
Step S220, if the operation instruction is obtained, the operation state is changed to the working state.
Step S230, if the first data includes the data block required by the operation instruction, executing the operation instruction according to the corresponding data block in the first data.
Steps S220 and S230 correspond to S120 and S130 in the first embodiment, respectively, and are not described again.
In this embodiment, the key security device interaction method further includes the following steps:
step S240, if the operation instruction is not obtained within the preset time, obtaining a new data block from the key security device, where the new data block is a data block that is not obtained from the key security device in the idle state.
For example, the terminal device goes to an idle state within 50ms of acquiring the first data from the key security device, or the terminal device does not acquire a new operation instruction within 50ms of executing a certain operation instruction, and acquires a new data block from the key security device.
The obtained new data block may be from a different segment of the same file as the data block in the first data obtained in the previous stage, or from a different file.
The new data block represents a data block that has not been acquired from the key security device in the previous idle state, but was acquired from the key security device in the current idle state. For example, a first data block of the electronic signature file is a first data, and a second data block of the electronic signature file is a new data block.
Because the time that the terminal device is in the idle state is limited, the length of the data block in the first data is limited, namely the length of the data block acquired from the key security device at one time in the idle state is not more than the preset length; the other data block is obtained in the later idle state, so that the situation that the execution of the operation instruction is influenced when the terminal device reads the data block of the first data in advance and inconvenience is caused to the use of a user can be avoided, and the terminal device can cache more data of the key safety device for the subsequent operation instruction to use the cached data block; therefore, when the operation instruction needs to use the data, the data acquired from the key security device when the terminal device is in the idle state can be directly utilized, and the data does not need to be read from the key security device in a low-speed Bluetooth communication mode, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interactive experience of the user in the process of using the key security device is improved.
Illustratively, an implementation procedure of the key security device interaction method of the present embodiment is as follows:
1. carrying out Bluetooth connection with the key safety equipment, and initializing the current state into an idle state;
2. judging whether an operation command is received, if so, executing 5, otherwise, executing 3;
3. judging whether the current state is an idle state, if so, executing 4, otherwise, judging whether an operation command is received within 50ms, if so, executing 5, otherwise, setting the current state to be the idle state, and executing 4;
4. reading a data block from the key security device and caching the data block in a memory, wherein the data length of the read data block is 256 bytes, and executing 2;
5. and setting the current state as a working state, judging whether the operation command is a read data command, if so, reading the uncached data block from the key safety equipment according to the cached data block, otherwise, processing the operation command, and executing step 2.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. With such an understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments or some parts of the embodiments, such as:
a storage medium storing a computer program which, when executed by a processor, implements the steps of the aforementioned key security device interaction method.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like, as in example three.
EXAMPLE III
An electronic device as shown in fig. 3 comprises a memory 200, a processor 300 and a program stored in the memory 200, the program being configured to be executed by the processor 300, the processor 300 implementing the steps of the above-mentioned key security device interaction method when executing the program.
The electronic device in this embodiment and the method in the foregoing embodiment are based on two aspects of the same inventive concept, and the method implementation process has been described in detail in the foregoing, so that those skilled in the art can clearly understand the structure and implementation process of the electronic device in this embodiment according to the foregoing description, and for the sake of brevity of the description, details are not repeated here.
According to the electronic device provided by the embodiment of the invention, the first data can be obtained from the key security device in advance in the idle state, so that the data block in the first data can be used by a subsequent operation instruction; therefore, when the operation instruction needs to use the first data, the first data acquired from the key security device when the terminal device is in the idle state can be directly utilized, and the data does not need to be read from the key security device in a low-speed Bluetooth communication mode, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interactive experience of the user in the process of using the key security device is improved.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.

Claims (10)

1. A key security device interaction method is characterized by comprising the following steps:
in an idle state, acquiring first data from the key security equipment; the first data comprises at least one data block;
if the operation instruction is obtained, the operation state is changed to a working state;
and if the first data comprises the data block required by the operation instruction, executing the operation instruction according to the corresponding data block in the first data.
2. The key security device interaction method of claim 1, further comprising the steps of:
if the data required by the operation instruction comprises second data, acquiring the second data from the key security equipment; the second data is data which is required by the operation instruction and is not acquired from the key security equipment in an idle state;
and executing the operation instruction according to the second data.
3. The key security device interaction method of claim 1, further comprising the steps of:
if the data required by the operation instruction comprises a data block in the first data and second data, acquiring the second data from the key security equipment; the second data is data which is not acquired from the key security equipment in an idle state;
and executing the operation instruction according to the data block in the first data and the second data.
4. The key security device interaction method of claim 1, wherein: in the idle state, before the first data is acquired from the key security device, the method further includes the following steps:
and carrying out Bluetooth connection with the key safety equipment, and initializing the current state into an idle state.
5. The key security device interaction method of claim 1, wherein: the slave key security device acquires first data, specifically, the drive layer acquires the first data from the key security device; the executing the operation instruction according to the corresponding data block in the first data is specifically that the application layer executes the operation instruction according to the corresponding data block in the first data.
6. The key security device interaction method of any one of claims 1-5, wherein: the operation instruction comprises a read data command.
7. The key security device interaction method of any one of claims 1-5, wherein: and in the idle state, the length of the data block in the first data acquired from the key security equipment is not more than the preset length.
8. The key security device interaction method of claim 7, wherein: in the idle state, after the first data is acquired from the key security device, the method further includes the following steps:
and if the operation instruction is not obtained within the preset time length, obtaining a new data block from the key safety equipment, wherein the new data block is the data block which is not obtained from the key safety equipment in the idle state.
9. An electronic device, characterized in that: comprising a memory, a processor and a program stored in the memory, the program being configured to be executed by the processor, the processor when executing the program implementing the steps of the key security device interaction method according to any of the claims 1-8.
10. A storage medium storing a computer program, characterized in that: the computer program implementing the steps of the key security device interaction method according to any one of claims 1-8 when executed by a processor.
CN201811045218.3A 2018-09-07 2018-09-07 Key security device interaction method, electronic device and storage medium Active CN110890957B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811045218.3A CN110890957B (en) 2018-09-07 2018-09-07 Key security device interaction method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811045218.3A CN110890957B (en) 2018-09-07 2018-09-07 Key security device interaction method, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN110890957A true CN110890957A (en) 2020-03-17
CN110890957B CN110890957B (en) 2023-06-23

Family

ID=69744693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811045218.3A Active CN110890957B (en) 2018-09-07 2018-09-07 Key security device interaction method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN110890957B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605236A (en) * 2009-07-10 2009-12-16 杭州华三通信技术有限公司 Method for controlling remote camera in the multi-frame session and multipoint control unit
US7921282B1 (en) * 2007-08-20 2011-04-05 F5 Networks, Inc. Using SYN-ACK cookies within a TCP/IP protocol
WO2012091577A1 (en) * 2010-12-29 2012-07-05 Motorola Solutions, Inc. Method and apparatus for dynamically switching a security device between on-demand and in-advance operation
CN102724770A (en) * 2012-05-09 2012-10-10 中国联合网络通信集团有限公司 Method, device and system for switching state of user equipment
CN105704688A (en) * 2016-01-04 2016-06-22 努比亚技术有限公司 Communication service processing device, method and system
CA2979054A1 (en) * 2015-03-12 2016-09-15 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
CN106462900A (en) * 2014-05-12 2017-02-22 密钥对株式会社 Security token for certificate authentication and driving method therefor
CN106912045A (en) * 2017-01-03 2017-06-30 青岛海信电器股份有限公司 A kind of company of returning method and apparatus of intelligent TV set Wireless Fidelity Wi Fi
CN107205254A (en) * 2017-06-22 2017-09-26 北京农业信息技术研究中心 The access of mobile sink node and the anti-interference method and system of tight delay constraint

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7921282B1 (en) * 2007-08-20 2011-04-05 F5 Networks, Inc. Using SYN-ACK cookies within a TCP/IP protocol
CN101605236A (en) * 2009-07-10 2009-12-16 杭州华三通信技术有限公司 Method for controlling remote camera in the multi-frame session and multipoint control unit
WO2012091577A1 (en) * 2010-12-29 2012-07-05 Motorola Solutions, Inc. Method and apparatus for dynamically switching a security device between on-demand and in-advance operation
CN102724770A (en) * 2012-05-09 2012-10-10 中国联合网络通信集团有限公司 Method, device and system for switching state of user equipment
CN106462900A (en) * 2014-05-12 2017-02-22 密钥对株式会社 Security token for certificate authentication and driving method therefor
CA2979054A1 (en) * 2015-03-12 2016-09-15 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
CN105704688A (en) * 2016-01-04 2016-06-22 努比亚技术有限公司 Communication service processing device, method and system
CN106912045A (en) * 2017-01-03 2017-06-30 青岛海信电器股份有限公司 A kind of company of returning method and apparatus of intelligent TV set Wireless Fidelity Wi Fi
CN107205254A (en) * 2017-06-22 2017-09-26 北京农业信息技术研究中心 The access of mobile sink node and the anti-interference method and system of tight delay constraint

Also Published As

Publication number Publication date
CN110890957B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
CN110032512B (en) Debugging method of small program, related equipment and terminal
EP3140732B1 (en) Startup accelerating method and apparatus
EP3309676B1 (en) Method and apparatus for providing screenshot service on terminal device and storage medium and device
US11853767B2 (en) Inter-core data processing method, system on chip and electronic device
CN112350861B (en) Log acquisition method, device, computer equipment and storage medium
KR20130142073A (en) Method and terminal for using mobile memory card to boot up mobile phone operating system
CN109582377A (en) BIOS option amending method, device, equipment and storage medium
CN111078316B (en) Layout file loading method and device, storage medium and electronic equipment
KR100894993B1 (en) Apparatus and method for updating boot logo in portable terminal
CN111273955A (en) Thermal restoration plug-in optimization method and device, storage medium and electronic equipment
CN109413256B (en) Contact person information processing method and device, storage medium and electronic equipment
CN111142900A (en) Program updating method and device and terminal equipment
CN112463199A (en) System upgrading method and terminal
CN111143017B (en) Cloud operation system interaction processing method, client and cloud operation system
CN112565238A (en) Method for popping privacy policy, client and computer-readable storage medium
CN110321321B (en) Snapshot read-write method, device and equipment for network block equipment and storage medium
CN108021459B (en) Method and device for sending dotting logs across processes
CN111767558A (en) Data access monitoring method, device and system
CN111615171A (en) Access method and device of wireless local area network
CN110890957A (en) Key security device interaction method, electronic device and storage medium
CN111488207A (en) Application process keep-alive method, device, network equipment and storage medium
CN114070892A (en) Data transmission method and device
CN116610648A (en) Log storage method and device, electronic equipment and storage medium
CN114024878A (en) Data transmission method, device, medium and equipment
CN113805854A (en) Method, system and device for realizing Hook of application layer based on Linux system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant