CN110890957B - Key security device interaction method, electronic device and storage medium - Google Patents

Key security device interaction method, electronic device and storage medium Download PDF

Info

Publication number
CN110890957B
CN110890957B CN201811045218.3A CN201811045218A CN110890957B CN 110890957 B CN110890957 B CN 110890957B CN 201811045218 A CN201811045218 A CN 201811045218A CN 110890957 B CN110890957 B CN 110890957B
Authority
CN
China
Prior art keywords
data
operation instruction
security device
key security
data block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811045218.3A
Other languages
Chinese (zh)
Other versions
CN110890957A (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excelsecu Data Technology Co Ltd
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201811045218.3A priority Critical patent/CN110890957B/en
Publication of CN110890957A publication Critical patent/CN110890957A/en
Application granted granted Critical
Publication of CN110890957B publication Critical patent/CN110890957B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a key security device interaction method, an electronic device and a storage medium, wherein the method comprises the following steps: in an idle state, acquiring first data from the key security device; if the operation instruction is acquired, the operation state is changed into the working state; and if the first data comprise the data required by the operation instruction, executing the operation instruction according to the corresponding data in the first data. Acquiring first data from the key safety device in advance in an idle state so as to be used by a subsequent operation instruction; when the operation instruction needs to use the data block in the first data, the data block acquired from the key safety equipment in the idle state of the terminal equipment can be directly utilized, and the data block is not required to be read from the key safety equipment in a Bluetooth communication mode with a lower speed, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interactive experience of the user in the process of using the key safety equipment is improved.

Description

Key security device interaction method, electronic device and storage medium
Technical Field
The present invention relates to a key security device technology, and in particular, to a key security device interaction method, an electronic device, and a storage medium.
Background
The communication rate of the current BLE technology is also low, and the method is basically applied to some small-data-volume communication scenes, but key security devices, such as bluetooth shields, still have some usage scenes, and data of tens of kbytes or even tens of kbytes need to be transmitted. Some operations, such as a user, typically require reading data from certain files on the key security device, which may have tens of kbytes of data.
The use of BLE to transfer these larger data typically takes several seconds or even tens of seconds, waiting for tens of seconds for each use for user interaction can significantly impact the user experience. Existing methods typically increase transmission speed by adjusting parameters such as smaller connection intervals, but such methods have limited improvements and can result in poor compatibility with terminal devices, such as android system devices.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the purposes of the invention is to provide a key security device interaction method, which can solve the problem that the existing key security device interaction method for improving the transmission speed by adjusting parameters such as smaller connection interval and the like so as to reduce waiting of users has limited promotion.
The second objective of the present invention is to provide an electronic device, which can solve the problem that the existing key security device interaction method for improving the transmission speed by adjusting parameters such as smaller connection interval, so as to reduce waiting of users has limited improvement.
It is a further object of the present invention to provide a storage medium storing a computer program, which can solve the problem that the conventional key security device interaction method for improving the transmission speed by adjusting parameters such as a smaller connection interval to reduce waiting time of a user has a limited improvement.
One of the purposes of the invention is realized by adopting the following technical scheme:
a key security device interaction method, comprising the steps of:
in an idle state, acquiring first data from the key security device; the first data includes at least one data block;
if the operation instruction is acquired, the operation state is changed into the working state;
and if the first data comprises the data block required by the operation instruction, executing the operation instruction according to the corresponding data block in the first data.
Further, the key security device interaction method further comprises the following steps:
if the data required by the operation instruction comprises second data, acquiring the second data from the key security equipment; the second data is the data which is required by the operation instruction and is not acquired from the key security device in the idle state;
and executing the operation instruction according to the second data.
Further, the key security device interaction method further comprises the following steps:
if the data required by the operation instruction comprise the data block in the first data and the second data, acquiring the second data from the key security equipment; the second data is data which is not acquired from the key security device in the idle state;
and executing the operation instruction according to the data block in the first data and the second data.
Further, in the idle state, before the first data is acquired from the key security device, the method further includes the following steps:
and carrying out Bluetooth connection with the key security device, and initializing the current state to be an idle state.
Further, the first data is obtained from the key security device, specifically, the driving layer obtains the first data from the key security device; and executing the operation instruction according to the corresponding data block in the first data, specifically, executing the operation instruction by an application layer according to the corresponding data block in the first data.
Further, the operation instruction includes a read data command.
Further, the length of the data block in the first data acquired from the key security device in the idle state is not greater than a preset length.
Further, in the idle state, after the first data is acquired from the key security device, the method further includes the following steps:
and if the operation instruction is not acquired within the preset time, acquiring a new data block from the key safety equipment, wherein the new data block is the data block which is not acquired from the key safety equipment in the idle state.
The second purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprising a memory, a processor and a program stored in the memory, the program being configured to be executed by the processor, the processor executing the program to carry out the steps of the key security device interaction method described above.
The third purpose of the invention is realized by adopting the following technical scheme:
a storage medium storing a computer program which, when executed by a processor, performs the steps of the key security device interaction method described above.
Compared with the prior art, the embodiment of the invention has the beneficial effects that: acquiring first data from the key safety device in advance in an idle state so as to use a data block in the first data for subsequent operation instructions; when the operation instruction needs to use the first data, the first data acquired from the key safety equipment in the idle state of the terminal equipment can be directly utilized, and the data is not required to be read from the key safety equipment in a Bluetooth communication mode with a low speed, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interaction experience of the user in the process of using the key safety equipment is improved.
Drawings
Fig. 1 is a flow chart of a key security device interaction method according to a first embodiment of the present invention;
fig. 2 is a flow chart of a key security device interaction method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to a third embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and detailed description, wherein it is to be understood that, on the premise of no conflict, the following embodiments or technical features may be arbitrarily combined to form new embodiments.
Example 1
Fig. 1 is a schematic flow chart of a key security device interaction method, which is used for a terminal device, such as a mobile phone, a tablet, a special read-write device, etc., which can establish bluetooth communication with a key security device.
The key security device interaction method comprises the following steps:
step S110, when the terminal equipment is in an idle state, acquiring first data from the key security equipment; the first data includes at least one data block.
In this embodiment, the first data represents data obtained from the key security device when the terminal device is in the idle state, and is not limited to any type of data, and may be preset according to actual application, where the data is required to be obtained from the key security device when the terminal device is in the idle state; for example, larger files, such as files above 1 kbyte; the data usage may also be preset in the terminal device, for example, the obtained first data is an electronic signature file, and is generally ten K bytes or twenty K bytes. When the terminal equipment is in an idle state, one or more first data are acquired from the key security equipment, and the types and the purposes of the first data can be the same or different.
The terminal equipment is provided with a program for interacting with the key safety equipment, and the terminal equipment actively generates or executes an instruction for interacting with the key safety equipment through the operation of a user, namely, when the instruction is operated, the terminal equipment is in a working state; when the terminal device does not generate or execute the instruction for interaction with the key security device, the terminal device is in an idle state.
And when the terminal equipment is in an idle state, acquiring first data from the key security equipment, and using a data block in the first data for subsequent operation instructions. When the operation instruction needs to use the data block in the first data, the data block in the first data acquired from the key safety device in the idle state of the terminal device can be directly utilized, and the part of data is not required to be read from the key safety device in a Bluetooth communication mode with a lower speed, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interaction experience of the user in the process of using the key safety device is improved.
When the operation instruction needs to use the data blocks in the first data, the data blocks in one or more first data acquired from the key security device by the terminal device in the idle state can be directly utilized, and the types and the purposes of the data blocks in the acquired first data can be the same or different. For example, although the terminal device acquires the data block of the plurality from the key security device in step S110, the operation instruction at a certain moment only needs to acquire one data block of the first data from the key security device using the terminal device in the idle state.
As a preferred embodiment, the terminal device is provided with a program for interacting with the key security device, the program comprising a driver layer for establishing a connection with the key security device, and an application layer for handling specific instructions. In step S110, the first data is obtained from the key security device, specifically, the drive layer obtains the first data from the key security device.
As a preferred embodiment, after bluetooth connection is performed between the terminal device and the key security device, the current state is initialized to be an idle state; the first data is then obtained from the key security device.
Namely, after the terminal equipment is connected with the key safety equipment, reading some data blocks from the key safety equipment and caching the read data blocks as acquired first data.
As a preferred embodiment, after bluetooth connection is performed between the terminal device and the key security device, the current state is initialized to be an idle state; the first data is then acquired from the key security device before the operation instruction is not acquired.
Step S120, if the operation instruction is obtained, the operation state is changed to the working state.
The terminal device generates or executes an instruction interacting with the key security device, i.e. an operation instruction, at initiative or through operation of a user, and the terminal device is converted into a working state.
When the operation instruction is acquired, the operation instruction can wait for proper time to be converted into a working state after acquiring a section of complete data from the key safety equipment; the data acquisition from the key security device can also be stopped in an interrupt mode, and the key security device is immediately switched to the working state.
Step S130, if the first data includes a data block required by the operation instruction, executing the operation instruction according to a corresponding data block in the first data.
For example, when the terminal device is in an idle state, the first data acquired from the key security device includes a complete electronic signature file, and the data required by a certain operation instruction is also the electronic signature file, so that the terminal device can execute the operation instruction, such as performing operations of identity verification and the like, according to the electronic signature file in the first data.
In a preferred embodiment, the operation instruction comprises a read data command, for example, a certain operation instruction comprises a command for reading data of an electronic signature file.
As a preferred embodiment, the terminal device is provided with a program for interacting with the key security device, the program comprising a driver layer for establishing a connection with the key security device, and an application layer for handling specific instructions.
In a preferred embodiment, step S130 executes the operation instruction according to the corresponding data block in the first data, specifically, the application layer executes the operation instruction according to the corresponding data block in the first data.
According to the key security equipment interaction method provided by the embodiment of the invention, the first data is obtained from the key security equipment in advance in an idle state, and a data block in the first data is used for a subsequent operation instruction; when the operation instruction needs to use the first data, the first data acquired from the key safety equipment in the idle state of the terminal equipment can be directly utilized, and the data is not required to be read from the key safety equipment in a Bluetooth communication mode with a low speed, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interaction experience of the user in the process of using the key safety equipment is improved.
As a preferred embodiment, the key security device interaction method further comprises the steps of:
step S140, if the data required by the operation instruction includes the second data, acquiring the second data from the key security device. The second data is data that is required by the operation instruction and is not acquired from the key security device in the idle state.
In the present embodiment, the second data represents data acquired from the key security device when the terminal device is not in the idle state. Since the terminal device is in the idle state for a limited time, the first data acquired from the key security device may sometimes not include data required for the operation instruction.
For example, the first data acquired from the key security device by the terminal device in the idle state does not include the electronic signature file, that is, the second data, and the data required for a certain operation instruction is the electronic signature file; the terminal device therefore still has to obtain the required data, i.e. the second data, e.g. the electronic signature file, from the key security device. For another example, when the terminal device is in an idle state, the first data acquired from the key security device only includes a part of the electronic signature file, and the other part which is not acquired is the second data; therefore, when an operation instruction needs an electronic signature file, the terminal device acquires another part of the electronic signature file, namely the second data, from the key security device.
In a preferred embodiment, the operation instruction comprises a read data command, for example, a certain operation instruction comprises a command for reading data of an electronic signature file.
And step S150, executing the operation instruction according to the second data.
After the terminal device obtains the second data from the key security device, the terminal device can execute the operation instruction, such as identity verification, according to the second data, such as the electronic signature file.
As a preferred embodiment, step S150 executes the operation instruction according to the second data, specifically, the application layer executes the operation instruction according to the second data.
As a preferred embodiment, the key security device interaction method further comprises the steps of:
step S160, if the data required by the operation instruction includes the corresponding data block and the second data in the first data, the second data is acquired from the key security device. The second data is data that is not acquired from the key security device while in the idle state.
In the present embodiment, the second data represents data acquired from the key security device when the terminal device is not in the idle state. Since the terminal device is in the idle state for a limited time, the first data acquired from the key security device may sometimes not include the data required for the operation instruction. For example, the first data acquired from the key security device by the terminal device in the idle state includes only the first data block, and the data required for the operation instruction includes not only the first data block but also the second data block, that is, the second data block. The first data block and the second data block can be different data segments in one file or different files.
For example, the first data acquired from the key security device by the terminal device in the idle state includes only the first data block of the electronic signature file, and the electronic signature file includes the first data block and the second data block; the data required by a certain operation instruction is an electronic signature file, so that the terminal device still needs to acquire the required data, i.e. the second data, such as the second data block of the electronic signature file, from the key security device.
Step S170, executing the operation instruction according to the data block in the first data and the second data.
In a preferred embodiment, when the first data block and the second data block in the first data are different data segments in one file, the first data block and the second data block need to be combined first, that is, the first data and the second data are combined first, and then corresponding operation instructions are executed.
In a preferred embodiment, step S170 executes the operation instruction according to the data block in the first data and the second data, specifically, the application layer executes the operation instruction according to the data block in the first data and the second data.
Therefore, according to the key security device interaction method provided by the embodiment of the invention, when the data acquired from the key security device does not comprise the data required by the operation instruction in the idle state of the terminal device, the required data is acquired from the key security device through Bluetooth connection with the key security device, so that the problem of how to realize interaction with the key security device when the first data acquired from the key security device does not comprise the data required by the operation instruction due to the limited time of the terminal device in the idle state is solved.
An implementation procedure of the key security device interaction method of this embodiment is as follows:
1. bluetooth connection is carried out with the secret key safety equipment;
2. judging whether an operation command is received, if so, executing 4, otherwise, executing 3;
3. reading data from the key safety equipment, caching the data in a memory, and executing the step 2;
4. if the operation command is judged to be a data reading command, the uncached data is read from the key safety equipment according to the cached data, and the data is returned after being combined, and the step 2 is executed. For example, having read cached data block 1 and data block 2 in advance, the operation command requires reading data block 2 and data block 3, then reading data block 3 to the key security device and merging back with cached data block 2.
Example two
The key security device interaction method as shown in fig. 2 comprises the following steps:
step S210, acquiring first data from the key security device in an idle state; the first data includes at least one data block.
In a preferred embodiment, the length of the data block in the first data acquired from the key security device in the idle state is not greater than a preset length, such as 256 bytes.
Because the terminal equipment is in the idle state for a limited time, the length of the data block in the first data is limited, namely the length of the data block acquired from the key security equipment at one time in the idle state is not more than the preset length. After acquiring a data block with the length not greater than a preset length, inquiring whether an operation instruction is acquired; therefore, the problem that the terminal equipment pre-reads the first data to influence the execution of the operation instruction and inconvenience is caused to the use of a user is avoided.
Step S220, if the operation instruction is acquired, the operation state is changed to the working state.
Step S230, if the first data includes a data block required by the operation instruction, executing the operation instruction according to a corresponding data block in the first data.
Steps S220 and S230 correspond to steps S120 and S130 in the first embodiment, respectively, and are not described again.
In this embodiment, the key security device interaction method further includes the steps of:
step S240, if the operation instruction is not acquired within the preset time, acquiring a new data block from the key security device, wherein the new data block is a data block acquired from the key security device when the key security device is not in an idle state.
For example, the terminal device transitions to the idle state within 50ms of acquiring the first data from the key security device, or the terminal device does not acquire a new operation instruction within 50ms of executing a certain operation instruction, and acquires a new data block from the key security device.
The new data block obtained may be derived from different segments of the same file as the data block in the first data obtained in the previous stage, or may be derived from different files.
The new data block represents a data block that has not been acquired from the key security device in the previous idle state, but has been acquired from the key security device in the current idle state. For example, the first data block of the electronic signature file is first data, and the second data block of the electronic signature file is a new data block.
Because the terminal equipment is in the idle state for a limited time, the length of the data block in the first data is limited, namely the length of the data block acquired from the key security equipment at one time in the idle state is not more than the preset length; and acquiring another data block in the latter idle state, so that the terminal device can be prevented from affecting the execution of the operation instruction when the terminal device pre-reads the data block of the first data, causing inconvenience to the use of the user, and can buffer more data of the key security device for the subsequent operation instruction to use the buffered data block; when the operation instruction needs to use the data, the data acquired from the key safety equipment in the idle state of the terminal equipment can be directly utilized, and the data is not required to be read from the key safety equipment in a Bluetooth communication mode with a low speed, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interaction experience of the user in the process of using the key safety equipment is improved.
An implementation procedure of the key security device interaction method of this embodiment is as follows:
1. bluetooth connection is carried out with the key safety equipment, and the current state is initialized to be an idle state;
2. judging whether an operation command is received, if so, executing 5, otherwise, executing 3;
3. judging whether the current state is an idle state, if yes, executing 4, otherwise, judging whether an operation command is received within 50ms, if yes, executing 5, otherwise, setting the current state as the idle state, and executing 4;
4. reading a data block from the key safety equipment and caching the data block in a memory, wherein the data length of the read data block is < =256 bytes, and executing 2;
5. and setting the current state as a working state, judging whether the operation command is a data reading command, if so, reading an uncached data block from the key security device according to the cached data block, otherwise, processing the operation command, and executing the step 2.
From the above description of embodiments, it will be apparent to those skilled in the art that the present invention may be implemented in software plus a necessary general hardware platform. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments or some parts of the embodiments of the present invention, such as:
a storage medium storing a computer program which, when executed by a processor, performs the steps of the aforementioned key security device interaction method.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like, as in example three.
Example III
An electronic device as shown in fig. 3 comprises a memory 200, a processor 300 and a program stored in the memory 200, the program being configured to be executed by the processor 300, the processor 300 implementing the steps of the key security device interaction method described above when executing the program.
The electronic device in this embodiment and the method in the foregoing embodiment are based on two aspects under the same inventive concept, and the detailed description of the implementation process of the method has been described above, so those skilled in the art can clearly understand the structure and implementation process of the electronic device in this embodiment according to the foregoing description, and for brevity of description, the details are not repeated here.
The electronic device provided by the embodiment of the invention can obtain the first data from the key safety device in advance in the idle state so as to use the data block in the first data for the subsequent operation instruction; when the operation instruction needs to use the first data, the first data acquired from the key safety equipment in the idle state of the terminal equipment can be directly utilized, and the data is not required to be read from the key safety equipment in a Bluetooth communication mode with a low speed, so that the execution time of the operation instruction and the waiting time of a user are reduced, and the interaction experience of the user in the process of using the key safety equipment is improved.
The above embodiments are only preferred embodiments of the present invention, and the scope of the present invention is not limited thereto, but any insubstantial changes and substitutions made by those skilled in the art on the basis of the present invention are intended to be within the scope of the present invention as claimed.

Claims (9)

1. A key security device interaction method, comprising the steps of:
s1: bluetooth connection is carried out with the key safety equipment, and the current state is initialized to be an idle state; acquiring first data from the key security device in an idle state; the first data includes at least one data block;
s2: judging whether an operation instruction is received, if yes, executing S5, otherwise executing S3;
s5: setting the current state as a working state, judging whether the operation instruction is a data reading instruction, if so, reading an uncached data block from the key safety equipment according to the cached data block, otherwise, processing the operation instruction;
if the first data comprises the data block required by the operation instruction, executing the operation instruction according to the corresponding data block in the first data;
if the operation instruction is not acquired within the preset time, returning to S2, converting to an idle state, and acquiring a new data block from the key security equipment;
s3: judging whether the current state is an idle state, if yes, executing S4, otherwise, judging whether an operation instruction is received within 50ms, if yes, executing S5, otherwise, setting the current state as the idle state, and executing S4;
s4: and reading the data block from the key safety device and caching the data block in the memory, wherein the data length of the read data block is less than or equal to 256 bytes, and executing S2.
2. The key security device interaction method of claim 1, further comprising the following
The steps are as follows:
if the data required by the operation instruction comprises second data, acquiring the second data from the key security equipment; the second data is required by the operation instruction and is not transmitted from the key security device in the idle state
The acquired data;
and executing the operation instruction according to the second data.
3. The key security device interaction method of claim 1, further comprising the following
The steps are as follows:
if the data required by the operation instruction comprises a data block in the first data and the second data, then the data block is encrypted
The key safety device acquires second data; the second data is not obtained from the key security device in the idle state
The data is fetched;
and executing the operation instruction according to the data block in the first data and the second data.
4. The key security device interaction method of claim 1, wherein: the slave key
The security device obtains first data, specifically, the driving layer obtains the first data from the key security device; the root of the plant
Executing the operation instruction according to the corresponding data block in the first data, specifically, the application layer according to the first data
And executing the operation instruction by a corresponding data block in data.
5. The key security device interaction method of any of claims 1-4, wherein:
the operation instructions include a read data instruction.
6. The key security device interaction method of any of claims 1-4, wherein:
and in the idle state, the length of a data block in the first data acquired from the key security device is not more than a preset length.
7. The key security device interaction method of claim 6, wherein: the idle shape
In a state, after the first data is acquired from the key security device, the method further comprises the following steps:
if the operation instruction is not acquired within the preset time, acquiring a new data block from the key security equipment, wherein the operation instruction is not acquired within the preset time
The new data block is a data block that was not acquired from the key security device while in the idle state.
8. An electronic device, characterized in that: comprising a memory, a processor and a memory
Is configured to be executed by a processor, the processor implementing the program as
The steps of a key security device interaction method of any of claims 1-7.
9. A storage medium storing a computer program, characterized in that: the meter
Implementing a key security device exchange as claimed in any one of claims 1 to 7 when a computer program is executed by a processor
The method comprises the steps of.
CN201811045218.3A 2018-09-07 2018-09-07 Key security device interaction method, electronic device and storage medium Active CN110890957B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811045218.3A CN110890957B (en) 2018-09-07 2018-09-07 Key security device interaction method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811045218.3A CN110890957B (en) 2018-09-07 2018-09-07 Key security device interaction method, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN110890957A CN110890957A (en) 2020-03-17
CN110890957B true CN110890957B (en) 2023-06-23

Family

ID=69744693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811045218.3A Active CN110890957B (en) 2018-09-07 2018-09-07 Key security device interaction method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN110890957B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115103358A (en) * 2022-05-06 2022-09-23 东信和平科技股份有限公司 Smart card access authentication method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605236A (en) * 2009-07-10 2009-12-16 杭州华三通信技术有限公司 Method for controlling remote camera in the multi-frame session and multipoint control unit
CN102724770A (en) * 2012-05-09 2012-10-10 中国联合网络通信集团有限公司 Method, device and system for switching state of user equipment
CN105704688A (en) * 2016-01-04 2016-06-22 努比亚技术有限公司 Communication service processing device, method and system
CN107205254A (en) * 2017-06-22 2017-09-26 北京农业信息技术研究中心 The access of mobile sink node and the anti-interference method and system of tight delay constraint

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7921282B1 (en) * 2007-08-20 2011-04-05 F5 Networks, Inc. Using SYN-ACK cookies within a TCP/IP protocol
WO2012091577A1 (en) * 2010-12-29 2012-07-05 Motorola Solutions, Inc. Method and apparatus for dynamically switching a security device between on-demand and in-advance operation
KR101604009B1 (en) * 2014-05-12 2016-03-17 주식회사 키페어 Hardware Security Module for Certification and Processing Method thereof
US10630686B2 (en) * 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
CN106912045B (en) * 2017-01-03 2020-04-17 青岛海信电器股份有限公司 Smart television wireless fidelity Wi-Fi back connection method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605236A (en) * 2009-07-10 2009-12-16 杭州华三通信技术有限公司 Method for controlling remote camera in the multi-frame session and multipoint control unit
CN102724770A (en) * 2012-05-09 2012-10-10 中国联合网络通信集团有限公司 Method, device and system for switching state of user equipment
CN105704688A (en) * 2016-01-04 2016-06-22 努比亚技术有限公司 Communication service processing device, method and system
CN107205254A (en) * 2017-06-22 2017-09-26 北京农业信息技术研究中心 The access of mobile sink node and the anti-interference method and system of tight delay constraint

Also Published As

Publication number Publication date
CN110890957A (en) 2020-03-17

Similar Documents

Publication Publication Date Title
EP3140732B1 (en) Startup accelerating method and apparatus
CN106375465B (en) A kind of data migration method and server
CN114449503A (en) Bluetooth connection method and Bluetooth connection device
CN110222046B (en) List data processing method, device, server and storage medium
CN110890957B (en) Key security device interaction method, electronic device and storage medium
CN111294377B (en) Dependency network request sending method, terminal device and storage medium
CN111273955A (en) Thermal restoration plug-in optimization method and device, storage medium and electronic equipment
CN109636460B (en) Service processing method, device, equipment and storage medium
WO2023221941A1 (en) Image processing method and apparatus, device, and storage medium
CN111143017B (en) Cloud operation system interaction processing method, client and cloud operation system
CN111767558A (en) Data access monitoring method, device and system
CN114584826B (en) Video dynamic downloading method and device, electronic equipment and storage medium
KR20200108348A (en) Data transfer
CN114070892A (en) Data transmission method and device
CN113805854A (en) Method, system and device for realizing Hook of application layer based on Linux system and storage medium
CN110727422B (en) Multi-language performance improving method and system based on front-end isomorphic framework
CN112423099A (en) Video loading method and device and electronic equipment
CN110262856B (en) Application program data acquisition method, device, terminal and storage medium
CN112905464A (en) Application running environment data processing method and device
CN108810596B (en) Video editing method and device and terminal
CN110909081A (en) Back-end data fusion rendering service method
CN110769027A (en) Service request processing method and device, computer equipment and storage medium
CN113821248B (en) Service method of vehicle-end software, vehicle-end software and related equipment thereof
CN114996169B (en) Device diagnosis method, device, electronic device, and storage medium
CN114222005B (en) Request processing method, apparatus, device, computer readable storage medium and product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant