CN114584388A - Software compatibility processing method based on artificial intelligence and cloud platform - Google Patents

Software compatibility processing method based on artificial intelligence and cloud platform Download PDF

Info

Publication number
CN114584388A
CN114584388A CN202210256124.0A CN202210256124A CN114584388A CN 114584388 A CN114584388 A CN 114584388A CN 202210256124 A CN202210256124 A CN 202210256124A CN 114584388 A CN114584388 A CN 114584388A
Authority
CN
China
Prior art keywords
target
access command
access
compatible
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210256124.0A
Other languages
Chinese (zh)
Other versions
CN114584388B (en
Inventor
吴笛
王国政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongshun Heying Technology Co ltd
Original Assignee
Yinchuan Chengmu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yinchuan Chengmu Technology Co ltd filed Critical Yinchuan Chengmu Technology Co ltd
Priority to CN202210256124.0A priority Critical patent/CN114584388B/en
Publication of CN114584388A publication Critical patent/CN114584388A/en
Application granted granted Critical
Publication of CN114584388B publication Critical patent/CN114584388B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a software compatibility processing method based on artificial intelligence and a cloud platform, relating to the technical field of artificial intelligence, wherein the software compatibility processing method based on artificial intelligence comprises the following steps: the method comprises the steps of obtaining a first access instruction aiming at a target terminal, determining a compatible matching vector set, obtaining a second access instruction based on the first access instruction and compatible elements included in a target compatible vector under the condition that the first access instruction meets a device matching identifier included in the target compatible vector, and executing the second access instruction through a verification server, so that the keyboard and mouse device can be compatibly accessed into the target terminal.

Description

Software compatibility processing method based on artificial intelligence and cloud platform
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a software compatibility processing method based on artificial intelligence and a cloud platform.
Background
Artificial Intelligence (Artificial Intelligence), abbreviated in english as AI. The method is a new technical science for researching and developing theories, methods, technologies and application systems for simulating, extending and expanding human intelligence.
At present, with the development of artificial intelligence, the brands of the types of the artificial intelligence Keyboard and Mouse devices increase, and the updating speed of the computer device system increases, many device manufacturers have drivers corresponding to their own KVM (Keyboard Video Mouse, Keyboard, Video, and Mouse port) Keyboard and Mouse devices, so that a user needs to update the corresponding drivers every time the user changes the Keyboard and Mouse devices or the computer devices, and furthermore, the user wants to directly switch the Keyboard and Mouse devices may not be able to smoothly switch due to the fact that the software drivers are incompatible because of the difference of the manufacturers or the problems of the computer devices themselves.
In view of the above, it is necessary for those skilled in the art to provide an artificial intelligence based software compatibility processing scheme applicable to KVM.
Disclosure of Invention
The invention aims to provide a software compatibility processing method based on artificial intelligence and a cloud platform.
In a first aspect, an embodiment of the present invention provides a software compatibility processing method based on artificial intelligence, which is applied to a computer device, where the computer device is in communication connection with a verification server, and both the computer device and the verification server are in communication connection with multiple terminals, and the method includes:
acquiring a first access instruction aiming at a target terminal, wherein the first access instruction comprises a first access command and a keyboard and mouse identifier, and the keyboard and mouse identifier is used for indicating a target keyboard and mouse data file;
determining a compatible matching vector set according to a target terminal and a target keyboard and mouse data file, wherein the compatible matching vector set has a corresponding relation with the target terminal, the compatible matching vector set comprises at least one compatible matching vector, and each compatible matching vector comprises a device matching identifier and a corresponding relation between compatible elements;
if the first access command meets the equipment matching identification included in the target compatible vector, acquiring a second access command according to the first access command and the compatible elements included in the target compatible vector, wherein the target compatible vector belongs to the compatible matching vectors included in the compatible matching vector set;
and sending a second access instruction to the authentication server so that the authentication server executes a second access command according to the second access instruction, wherein the second access instruction comprises the second access command.
Optionally, the obtaining the second access command according to the first access command and the compatible element included in the target compatible vector includes:
if the first access command corresponds to the unidirectional output device, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector;
generating a second access command according to the output format and the first access command;
or, acquiring the second access command according to the first access command and the compatible element included in the target compatible vector, including:
if the first access command corresponds to the unidirectional output device, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector;
generating a third access command according to the first access command;
and generating a second access command according to the output format and the third access command.
Optionally, sending a second access instruction to the authentication server, so that the authentication server executes a second access command according to the second access instruction, includes:
sending a second access instruction to the authentication server so that the authentication server executes the output format and the first access command according to the second access instruction;
receiving a command verification receipt aiming at the first access command and sent by the verification server;
or, sending the second access instruction to the authentication server, so that the authentication server executes the second access command according to the second access instruction, including:
sending a second access instruction to the authentication server so that the authentication server executes the output format and the third access command according to the second access instruction;
and receiving a command verification receipt which is sent by the verification server and aims at the third access command.
Optionally, sending a second access instruction to the authentication server, so that the authentication server executes a second access command according to the second access instruction, includes:
sending a second access instruction to the authentication server so that the authentication server executes the first access command and outputs the format according to the second access instruction;
receiving a command verification receipt aiming at the first access command and sent by the verification server;
receiving a command verification receipt aiming at an output format and sent by a verification server;
or, sending the second access instruction to the authentication server, so that the authentication server executes the second access command according to the second access instruction, including:
sending a second access instruction to the authentication server so that the authentication server executes the first access command and outputs the format according to the second access instruction;
receiving a command verification receipt aiming at the third access command and sent by the verification server;
and receiving a command verification receipt aiming at the output format and sent by the verification server.
Optionally, the method further comprises:
if the first access command meets a first target compatible sub-vector included in the target compatible vector, acquiring a fourth access command according to the first access command and a first sub-compatible element included in the target compatible vector, wherein the first target compatible sub-vector is included in the target compatible vector;
sending a third access instruction to the authentication server so that the authentication server executes a fourth access command according to the third access instruction, wherein the third access instruction comprises the fourth access command;
receiving a command verification receipt aiming at the fourth access command and sent by the verification server;
if the command verification receipt aiming at the fourth access command meets a second target compatible sub-vector included by the target compatible vector, acquiring a fifth access command according to the first access command and a second sub-compatible element included by the target compatible vector, wherein the second target compatible sub-vector is included in the target compatible vector;
and sending a fourth access instruction to the authentication server so that the authentication server executes a fifth access command according to the fourth access instruction, wherein the fourth access instruction comprises the fifth access command.
Optionally, the computer equipment package intercepting unit, a first number of detecting units, and a recording unit;
before obtaining the first access indication for the target terminal, the method further comprises:
the intercepting unit receives a safety detection instruction from target keyboard and mouse equipment, and the safety detection instruction is used for accessing the recording unit;
initiating a detection instruction to a second number of detection units in the first number of detection units, wherein the detection instruction is used for acquiring digital signatures corresponding to the detection units;
for a target detection unit in the second number of detection units, detecting a digital signature set included in a detection instruction received by the target detection unit;
detecting the detection content of the safety detection indication in response to the detection of the digital signature set included in the detection indication passing;
and creating a target digital signature in response to the detection content detection pass of the security detection instruction and in response to the detection instruction detection pass received by the target detection unit, wherein the detection instruction received by the target detection unit comprises: the digital signature set generated by the previous node and the detection content of the safety detection indication;
writing a detection serial number of a target detection unit in the target digital signature;
writing a detection index of a target detection unit in the target digital signature;
calculating the signature information of a last signature by adopting a hash function, and writing the signature information of the last signature into the target digital signature;
signing the target digital signature by adopting a first key of the target detection unit, and writing a unique identifier of the target detection unit into the target digital signature;
the target digital signature comprises a detection serial number of a target detection unit, a detection index of the target detection unit, signature information of a last signature of the target digital signature and identity information of the target detection unit, the digital signature set comprises a second number of digital signatures recorded by a preset knowledge graph, and each digital signature is generated by one detection unit;
for a target digital signature in the digital signature set, in response to the fact that signature information included in the target digital signature is matched with signature information of a previous signature, acquiring a second secret key of a target detection unit according to a detection serial number of the target detection unit included in the target digital signature;
detecting the digital fingerprint of the target detection unit included in the target digital signature by adopting a second key of the target detection unit;
determining that the target digital signature passes detection in response to the digital fingerprint of the target detection unit passing detection, wherein the digital signature set passes detection means that the second number of digital signatures all pass detection;
in response to the detection of the digital signature set passing, combining the detection indexes of the second number of detection units, and determining the authority possessed by the target keyboard and mouse device;
and responding to the safety detection instruction based on the authority possessed by the target keyboard and mouse device, wherein the step of responding to the safety detection instruction comprises the step of acquiring a first access instruction aiming at the target terminal.
Optionally, obtaining the second key of the target detection unit according to the detection serial number of the target detection unit included in the target digital signature includes:
and acquiring a second key corresponding to the detection serial number of the target detection unit from a preset corresponding relation to obtain the second key of the target detection unit, wherein the preset corresponding relation comprises the corresponding relation between the detection serial number of the detection unit and the second key.
Optionally, obtaining the second key of the target detection unit according to the detection serial number of the target detection unit included in the target digital signature includes:
acquiring a signature of the target detection unit from the detection serial number of the target detection unit;
and acquiring a second key of the target detection unit based on the signature of the target detection unit, wherein the signature of the target detection unit is recorded in the detection serial number of the target detection unit in the form of a tree-shaped signature set.
In a second aspect, an embodiment of the present invention provides a software compatibility processing cloud platform based on artificial intelligence, which is applied to a computer device, the computer device is in communication connection with a verification server, both the computer device and the verification server are in communication connection with a plurality of terminals, and the cloud platform includes:
the device comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring a first access instruction aiming at a target terminal, the first access instruction comprises a first access command and a keyboard and mouse identifier, and the keyboard and mouse identifier is used for indicating a target keyboard and mouse data file;
the determining module is used for determining a compatible matching vector set according to the target terminal and the target keyboard and mouse data file, wherein the compatible matching vector set has a corresponding relation with the target terminal, the compatible matching vector set comprises at least one compatible matching vector, and each compatible matching vector comprises a device matching identifier and a corresponding relation between compatible elements; if the first access command meets the equipment matching identification included in the target compatible vector, acquiring a second access command according to the first access command and the compatible elements included in the target compatible vector, wherein the target compatible vector belongs to the compatible matching vectors included in the compatible matching vector set;
and the sending module is used for sending a second access instruction to the authentication server so that the authentication server executes a second access command according to the second access instruction, wherein the second access instruction comprises the second access command.
Optionally, the determining module is specifically configured to:
if the first access command corresponds to the unidirectional output device, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector; generating a second access command according to the output format and the first access command;
or, the determining module is specifically configured to:
if the first access command corresponds to the unidirectional output device, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector; generating a third access command according to the first access command; and generating a second access command according to the output format and the third access command.
Compared with the prior art, the beneficial effects provided by the invention comprise: by adopting the software compatibility processing method based on artificial intelligence and the cloud platform provided by the embodiment of the invention, a first access instruction aiming at a target terminal is obtained, wherein the first access instruction comprises a first access command and a key mouse identifier, and the key mouse identifier is used for indicating a target key mouse data file; determining a compatible matching vector set according to the target terminal and the target keyboard and mouse data file, wherein the compatible matching vector set has a corresponding relation with the target terminal, the compatible matching vector set comprises at least one compatible matching vector, and each compatible matching vector comprises a device matching identifier and a corresponding relation between compatible elements; further, if the first access command meets the device matching identifier included in the target compatible vector, acquiring a second access command according to the first access command and the compatible element included in the target compatible vector, wherein the target compatible vector belongs to the compatible matching vectors included in the compatible matching vector set; and finally, sending a second access instruction to the verification server so that the verification server executes a second access command according to the second access instruction, wherein the second access instruction comprises the second access command.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments will be briefly described below. It is appreciated that the following drawings depict only certain embodiments of the invention and are therefore not to be considered limiting of its scope. It is obvious to a person skilled in the art that other relevant figures can also be derived from these figures without inventive effort.
FIG. 1 is an interaction diagram of an artificial intelligence-based software compatibility processing system according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of a method for processing artificial intelligence-based software compatibility according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of a structure of an artificial intelligence based software compatibility processing cloud platform according to an embodiment of the present invention;
fig. 4 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
Furthermore, the terms "first," "second," and the like are used merely to distinguish one description from another, and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly stated or limited, the terms "disposed" and "connected" are to be interpreted broadly, and for example, "connected" may be a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; the connection may be direct or indirect via an intermediate medium, and may be a communication between the two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The following detailed description of embodiments of the invention refers to the accompanying drawings.
Fig. 1 is an interaction diagram of an artificial intelligence-based software compatibility processing system according to an embodiment of the present disclosure. The artificial intelligence based software compatibility processing system may include a computer device 100 and an authentication server 200 communicatively connected to the computer device 100, the computer device 100 and the authentication server 200 each being communicatively connected to a plurality of terminals 300. The artificial intelligence based software compatibility processing system shown in fig. 1 is only one possible example, and in other possible embodiments, the artificial intelligence based software compatibility processing system may include only a part of the components shown in fig. 1 or may also include other components.
In this embodiment, the terminal 300 may include a mobile device, a tablet computer, a laptop computer, etc., or any combination thereof. In some embodiments, the mobile device may include a smart home device, a wearable device, a smart mobile device, a virtual reality device, an augmented reality device, or the like, or any combination thereof. In some embodiments, the smart home devices may include control devices of smart electrical devices, smart monitoring devices, smart televisions, smart cameras, and the like, or any combination thereof. In some embodiments, the wearable device may include a smart bracelet, a smart lace, smart glass, a smart helmet, a smart watch, a smart garment, a smart backpack, a smart accessory, or the like, or any combination thereof. In some embodiments, the smart mobile device may include a smartphone, a personal digital assistant, a gaming device, and the like, or any combination thereof. In some embodiments, the virtual reality device and/or the augmented reality device may include a virtual reality helmet, virtual reality glass, a virtual reality patch, an augmented reality helmet, augmented reality glass, an augmented reality patch, or the like, or any combination thereof. For example, the virtual reality device and/or augmented reality device may include various virtual reality products and the like.
In this embodiment, the computer device 100, the verification server 200, and the plurality of terminals 300 in the artificial intelligence based software compatibility processing system may cooperatively perform the artificial intelligence based software compatibility processing method described in the following method embodiments, and specific steps performed by the computer device 100, the verification server 200, and the plurality of terminals 300 may refer to the detailed description of the following method embodiments.
To solve the technical problem in the foregoing background art, fig. 2 is a flowchart illustrating an artificial intelligence based software compatibility processing method provided in an embodiment of the present disclosure, where the artificial intelligence based software compatibility processing method provided in this embodiment can be executed by the computer device 100 shown in fig. 1, and the following describes the artificial intelligence based software compatibility processing method in detail.
In step 201, a first access indication for a target terminal 300 is obtained.
The first access instruction comprises a first access command and a keyboard and mouse identification, and the keyboard and mouse identification is used for indicating a target keyboard and mouse data file.
In the embodiment of the present invention, the computer device 100 may perform access management of a keyboard and mouse device on the plurality of terminals 300, may acquire a first access instruction for the target terminal 300, where the target terminal 300 may be any one of the plurality of terminals 300, and a first access command in the first access instruction is used to access a device corresponding to a keyboard and mouse identifier included in the first access instruction to the target terminal 300. The computer device 100 may pre-store a plurality of keyboard and mouse data files, each keyboard and mouse data file may be configured with a corresponding keyboard and mouse identifier, and after the computer device 100 receives the keyboard and mouse identifier included in the first access instruction, the corresponding target keyboard and mouse data file may be determined based on the keyboard and mouse identifier.
Step 202, determining a compatible matching vector set according to the target terminal 300 and the target keyboard and mouse data file.
The compatible matching vector set has a corresponding relationship with the target terminal 300, and the compatible matching vector set includes at least one compatible matching vector, and each compatible matching vector includes a device matching identifier and a corresponding relationship between compatible elements.
In the embodiment of the present invention, as described above, the keyboard and mouse data file pre-stored in the computer device 100 may be configured with a plurality of compatible matching vector sets, and may determine a compatible matching vector corresponding to the target keyboard and mouse data file, where the compatible matching vector set has a corresponding relationship with the target terminal 300, that is, the compatible matching vector set is used to determine the device compatibility of the target terminal 300. In the embodiment of the present invention, the compatible matching vector set includes at least one compatible matching vector, that is, at least one compatible configuration vector is used to configure the device compatibility of the target terminal 300, optionally, the device matching identifier included in the compatible configuration vector may be a model type of the corresponding keyboard and mouse device, and the compatible element may be a device descriptor used to implement compatibility, USB (Universal Serial Bus, abbreviated as Universal Serial Bus) data, and the like.
Step 203, if the first access command meets the device matching identifier included in the target compatible vector, acquiring a second access command according to the first access command and the compatible element included in the target compatible vector.
And the target compatible vector belongs to the compatible matching vectors included in the compatible matching vector set.
In the embodiment of the present invention, a target compatible vector capable of implementing compatible access may be configured for different devices in advance, and when it is determined through the foregoing steps that the first access command satisfies a device matching identifier included in the target compatible vector, that is, it is determined that data such as a compatible element of a keyboard and mouse device corresponding to the device matching identifier is stored in advance, the second access command may be obtained according to the first access command and the compatible element included in the target compatible vector. In the embodiment of the present invention, the second access command may refer to that the key mouse meeting the foregoing condition identifies the corresponding key mouse device to access the target terminal 300.
Step 204, sending a second access instruction to the authentication server 200, so that the authentication server 200 executes a second access command according to the second access instruction, where the second access instruction includes the second access command.
A second access instruction may be sent to the authentication server 200, so that the authentication server 200 executes a second access command according to the second access instruction, that is, the authentication server 200 identifies the corresponding keystroke device to access the target terminal 300 through the keystroke device meeting the foregoing conditions (that is, the second access command). Through the steps, the compatibility of the keyboard and mouse equipment when the keyboard and mouse equipment is accessed into the terminal 300 can be improved, and the compatibility access of the keyboard and mouse equipment can be realized without manual excessive operation in the whole process.
On the basis of the foregoing, as an alternative embodiment, the foregoing step 203 may be implemented by the following steps.
Sub-step 203-1, if the first access command corresponds to a unidirectional output device, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector.
Sub-step 203-2, generating a second access command according to the output format and the first access command.
In the embodiment of the present invention, the keyboard and mouse device triggering the first access command may be a unidirectional output device, such as an ordinary mouse or a keyboard, and at this time, an output format corresponding to the first access command may be configured, so as to generate the second access command according to the output format and the first access command.
Alternatively, the foregoing step 203 may be implemented in alternative embodiments as follows.
Sub-step 203-3, if the first access command corresponds to a unidirectional output device, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector.
Sub-step 203-4, generating a third access command according to the first access command.
Sub-step 203-5, generating a second access command according to the output format and the third access command.
In the embodiment of the present invention, the keyboard and mouse device for triggering the first access command may be a unidirectional output device, such as a mouse or a keyboard with multiple functions, and may have functions of switching light, setting Macro (Macro), and the like. The basic functions of the mouse or the keyboard and the output formats of the expanded output functions such as light switching and macro setting can be correspondingly generated, the third access command is generated based on the output formats, the second access command can be further generated according to the output formats and the third access command, and the verification server 200 can execute the second access command to realize the access of the keyboard and mouse equipment and ensure the compatible access of the related expanded functions of the keyboard and mouse equipment.
On this basis, as an alternative embodiment, the aforementioned step 204 may be implemented by the following steps.
Sub-step 204-1, sending a second access indication to the authentication server 200, such that the authentication server 200 executes the output format and the first access command according to the second access indication.
Sub-step 204-2, receiving a command authentication receipt for the first access command sent by authentication server 200.
As described above, in the case that the keyboard and mouse device is a one-way output device, such as a common mouse or a keyboard, the second access instruction may be sent to the authentication server 200, so that the authentication server 200 executes the output format and the first access command on the target terminal 300, it should be understood that, in order to ensure the correct transmission of the subsequent instruction, the command authentication receipt sent back by the authentication server 200 may be received to provide a basis for backtracking and authentication for the subsequent operation.
Alternatively, the foregoing step 204 can also be implemented by the following embodiments.
Sub-step 204-3, sending the authentication server 200 a second access indication comprising information to cause the authentication server 200 to execute the output format and the third access command according to the second access indication.
Sub-step 204-4, receiving a command authentication receipt for the third access command sent by the authentication server 200.
As described above, on the basis that the keyboard and mouse device is a mouse or a keyboard with functions of switching light, setting macro, and the like, the second access instruction may be sent to the authentication server 200, so that the authentication server 200 executes a corresponding output format and a third access command to access the target terminal 300 by the keyboard and mouse device, and similarly, the command authentication receipt for the third access command sent by the authentication server 200 may be received to serve as a basis for performing backtracking and authentication subsequently.
On the basis, in order to express the scheme provided by the present invention more clearly, the foregoing step 204 can also be implemented by the following specific steps.
Sub-step 204-5, sending the authentication server 200 a second access indication comprising to cause the authentication server 200 to execute the first access command and the output format according to the second access indication.
Sub-step 204-6, receiving a command authentication receipt for the first access command sent by the authentication server 200.
Sub-step 204-7, receiving a command validation receipt for the output format sent by the validation server 200.
Alternatively, the foregoing step 204 can also be implemented by the following embodiments.
Sub-step 204-8 of sending the authentication server 200 a second access indication comprising to cause the authentication server 200 to execute the first access command and the output format according to the second access indication.
Sub-step 204-9, receiving a command authentication receipt for the third access command sent by the authentication server 200.
Sub-step 204-10, receiving a command validation receipt for the output format sent by the validation server 200.
On the basis, the first access command and the command verification receipt in the corresponding output format, and the third access command and the command verification receipt in the corresponding output format can be respectively received, so that the follow-up management is more convenient, faster and clearer.
In addition, the following examples are provided in the embodiments of the present invention.
In step 205, if the first access command satisfies the first target compatible sub-vector included in the target compatible vector, a fourth access command is obtained according to the first access command and the first sub-compatible element included in the target compatible vector.
Wherein the first target compatible sub-vector is included in the target compatible vector.
Step 206, sending a third access instruction to the authentication server 200, so that the authentication server 200 executes a fourth access command according to the third access instruction.
Wherein the third access indication comprises a fourth access command.
Step 207, receiving a command verification receipt for the fourth access command sent by the verification server 200.
In step 208, if the command verification receipt for the fourth access command satisfies the second target compatible sub-vector included in the target compatible vector, the fifth access command is obtained according to the first access command and the second sub-compatible element included in the target compatible vector.
Wherein the second target compatible sub-vector is included in the target compatible vector.
Step 209, sending a fourth access instruction to the authentication server 200, so that the authentication server 200 executes a fifth access command according to the fourth access instruction.
Wherein the fourth access indication comprises a fifth access command.
On the basis of the foregoing, besides the keyboard and mouse device, in the embodiment of the present invention, there may also be a device that accesses the target terminal 300 through a USB or other interface, such as an audio device, a video device, a bluetooth device (bluetooth transmitter), or a wireless signal transmitter, and moreover, the keyboard and mouse device may also have functions of audio output, bluetooth connection, or wireless signal transmission, and the compatible access of the device may be implemented by generating a corresponding fourth access command or a corresponding fifth access command.
In addition, embodiments of the present invention provide embodiments such as the following to generate compatible match vectors.
(1) And acquiring the device adaptation range, the device parameters, the device matching identification and the compatible elements.
The device matching identification comprises an event and a rule hit condition, and the compatible element comprises a rule behavior and a rule mapping.
(2) And generating a compatible matching vector according to the equipment adaptation range, the equipment parameters, the equipment matching identification and the compatible elements.
In order to more clearly describe the scheme of the present invention, the foregoing step 203 may further include, for example, the following implementation manner.
In sub-step 203-6, if the first access command corresponds to a unidirectional input device, the target interface corresponding to the target terminal 300 is determined according to the first access command and the compatible elements included in the target compatible vector.
Sub-step 203-7, generating a second access command based on the target interface and the first access command.
As previously described, keyboard and mouse access may also be achieved by examples such as:
(1) if the command verification receipt for the fourth access command does not satisfy the second target compatible sub-vector, a first access indication is sent to the verification server 200, so that the verification server 200 executes the first access command according to the first access indication.
(2) If the first access command does not satisfy any compatible matching vector in the compatible matching vector set, a first access indication is sent to the authentication server 200, so that the authentication server 200 executes the first access command according to the first access indication.
In order to secure the computer device 100 and the respective terminals 300, the computer device 100 includes an interception unit, a first number of detection units, and a recording unit. Before the foregoing step 201, the following embodiments of the present invention can be implemented as well.
Step 301, the interception unit receives a security detection instruction from the target keymouse device.
Wherein the security detection indication is used to access the recording unit.
Step 302, initiating a detection indication to a second number of detection units of the first number of detection units.
The detection instruction is used for acquiring the digital signature corresponding to the detection unit.
Step 303, for a target detection unit of the second number of detection units, detecting a digital signature set included in the detection instruction received by the target detection unit.
And 304, detecting the detection content of the security detection indication in response to the detection pass of the digital signature set included in the detection indication.
Step 305, responding to the detection content of the security detection indication, and responding to the detection indication received by the target detection unit, and creating the target digital signature.
The detection instruction received by the target detection unit includes: a set of digital signatures that have been generated by a previous node, and the detection content of the security detection indication.
Step 306, writing the detection serial number of the target detection unit in the target digital signature.
In step 307, the detection index of the target detection unit is written in the target digital signature.
And step 308, calculating the signature information of the last signature by using a hash function, and writing the signature information of the last signature into the target digital signature.
Step 309, signing the target digital signature by using the first key of the target detection unit, and writing the unique identifier of the target detection unit in the target digital signature.
The target digital signature comprises a detection serial number of a target detection unit, a detection index of the target detection unit, signature information of a last signature of the target digital signature and identity information of the target detection unit, the digital signature set comprises a second number of digital signatures recorded by a preset knowledge graph, and each digital signature is generated by one detection unit.
And step 310, for the target digital signature in the digital signature set, in response to that the signature information included in the target digital signature matches with the signature information of the previous signature, acquiring a second key of the target detection unit according to the detection serial number of the target detection unit included in the target digital signature.
And 311, detecting the digital fingerprint of the target detection unit included in the target digital signature by using the second key of the target detection unit.
In step 312, in response to the digital fingerprint detection of the target detection unit passing, it is determined that the target digital signature detection passes.
Wherein the digital signature set detection pass means that the second number of digital signatures are all detected pass.
And 313, in response to the detection of the digital signature set passing, combining the detection indexes of the second number of detection units and determining the authority possessed by the target keyboard and mouse device.
And step 314, responding to the safety detection instruction based on the authority of the target keyboard and mouse device.
Wherein responding to the security detection indication comprises performing the step of obtaining a first access indication for the target terminal 300.
On the basis of the above, in order to avoid access of an illegal device, before the step 201 is executed, when the target keymouse device that wants to access the target terminal 300 is initially physically accessed (i.e., a corresponding interface is inserted), interception verification is performed without setting related software, and after the authority that the target keymouse device has is determined through the above steps (legal), the hardware access of the target keymouse device is completed in response to the security detection instruction, and the configuration related to the compatibility is started.
On the basis of the foregoing, as an alternative embodiment, the foregoing step 310 may be implemented by the following embodiments.
And a substep 310-1 of obtaining a second key corresponding to the detection sequence number of the target detection unit from the preset corresponding relationship to obtain the second key of the target detection unit.
The preset corresponding relation comprises a corresponding relation between the detection serial number of the detection unit and the second key.
On the basis of the foregoing, the foregoing step 310 may also be implemented by the following steps.
In sub-step 310-2, the signature of the target detection unit is obtained from the detection sequence number of the target detection unit.
And a substep 310-3 of obtaining the second key of the target detection unit based on the signature of the target detection unit, wherein the signature of the target detection unit is recorded in the detection serial number of the target detection unit in the form of a tree-shaped signature set.
It should be understood that the computer device 100 may further include a login unit, and the login unit receives a login request from the target keymouse device, where the login request includes a user account and password information for requesting login, and before the foregoing step 301 is performed, the target keymouse device may be configured with an account in advance, for example, the following embodiments may be referred to specifically.
(1) And responding to successful login of the user account number and the password information, and generating a safety identity tag of the target keyboard and mouse device by the login unit.
The safety identity label comprises user account information and login information of target keyboard and mouse equipment login.
(2) The login unit sends a security identity tag to the target keyboard and mouse device.
Wherein, the safety detection indication carries a safety identity label.
The embodiment of the present invention provides a software compatibility processing system based on artificial intelligence, which is applied to a computer device 100, wherein the computer device 100 is in communication connection with a verification server 200, and both the computer device 100 and the verification server 200 are in communication connection with a plurality of terminals 300, as shown in fig. 3, the software compatibility processing system based on artificial intelligence comprises:
the obtaining module 1101 is configured to obtain a first access instruction for the target terminal 300, where the first access instruction includes a first access command and a key and mouse identifier, and the key and mouse identifier is used to indicate a target key and mouse data file.
A determining module 1102, configured to determine a compatible matching vector set according to the target terminal 300 and the target keyboard and mouse data file, where the compatible matching vector set has a correspondence with the target terminal 300, the compatible matching vector set includes at least one compatible matching vector, and each compatible matching vector includes a device matching identifier and a correspondence between compatible elements; and if the first access command meets the equipment matching identification included by the target compatible vector, acquiring a second access command according to the first access command and the compatible element included by the target compatible vector, wherein the target compatible vector belongs to the compatible matching vector included by the compatible matching vector set.
A sending module 1103, configured to send a second access instruction to the authentication server 200, so that the authentication server 200 executes a second access command according to the second access instruction, where the second access instruction includes the second access command.
Further, the determining module 1102 is specifically configured to:
if the first access command corresponds to the unidirectional output device, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector; generating a second access command according to the output format and the first access command;
or, the determining module 1102 is specifically configured to:
if the first access command corresponds to the unidirectional output device, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector; generating a third access command according to the first access command; and generating a second access command according to the output format and the third access command.
Further, the sending module 1103 is specifically configured to:
sending a second access instruction to the authentication server 200, so that the authentication server 200 executes the output format and the first access command according to the second access instruction; receiving a command verification receipt for the first access command sent by the verification server 200;
or, the sending module 1103 is specifically configured to:
sending a second access instruction to the authentication server 200, so that the authentication server 200 executes the output format and the third access command according to the second access instruction; a command authentication receipt for the third access command sent by the authentication server 200 is received.
Further, the sending module 1103 is further specifically configured to:
sending a second access instruction to the authentication server 200, so that the authentication server 200 executes the first access command and outputs the format according to the second access instruction; receiving a command authentication receipt for the first access command sent by the authentication server 200; receiving a command validation receipt for the output format sent by the validation server 200;
or, the sending module 1103 is further specifically configured to:
sending a second access instruction to the authentication server 200, so that the authentication server 200 executes the first access command and outputs the format according to the second access instruction; receiving a command authentication receipt for the third access command sent by the authentication server 200; a command validation receipt for the output format sent by the validation server 200 is received.
Further, the determining module 1102 is further configured to:
if the first access command meets a first target compatible sub-vector included in the target compatible vector, acquiring a fourth access command according to the first access command and a first sub-compatible element included in the target compatible vector, wherein the first target compatible sub-vector is included in the target compatible vector; sending a third access instruction to the authentication server 200, so that the authentication server 200 executes a fourth access command according to the third access instruction, wherein the third access instruction comprises the fourth access command; receiving a command authentication receipt for the fourth access command sent by the authentication server 200; if the command verification receipt aiming at the fourth access command meets a second target compatible sub-vector included by the target compatible vector, acquiring a fifth access command according to the first access command and a second sub-compatible element included by the target compatible vector, wherein the second target compatible sub-vector is included in the target compatible vector; and sending a fourth access instruction to the authentication server 200, so that the authentication server 200 executes a fifth access command according to the fourth access instruction, wherein the fourth access instruction comprises the fifth access command.
Further, the computer device 100 includes an intercepting unit, a first number of detecting units, and a recording unit, and the cloud platform further includes a detecting module 1104 for:
the intercepting unit receives a safety detection instruction from target keyboard and mouse equipment, and the safety detection instruction is used for accessing the recording unit; initiating a detection instruction to a second number of detection units in the first number of detection units, wherein the detection instruction is used for acquiring digital signatures corresponding to the detection units; for a target detection unit in the second number of detection units, detecting a digital signature set included in a detection instruction received by the target detection unit; detecting the detection content of the safety detection indication in response to the detection pass of the digital signature set included in the detection indication; and creating a target digital signature in response to the detection content detection pass of the security detection instruction and in response to the detection instruction detection pass received by the target detection unit, wherein the detection instruction received by the target detection unit comprises: the digital signature set generated by the previous node and the detection content of the safety detection indication; writing a detection serial number of a target detection unit in the target digital signature; writing a detection index of a target detection unit in the target digital signature; calculating the signature information of a last signature by adopting a hash function, and writing the signature information of the last signature into the target digital signature; signing the target digital signature by adopting a first key of the target detection unit, and writing a unique identifier of the target detection unit into the target digital signature; the target digital signature comprises a detection serial number of a target detection unit, a detection index of the target detection unit, signature information of a last signature of the target digital signature and identity information of the target detection unit, the digital signature set comprises a second number of digital signatures recorded by a preset knowledge graph, and each digital signature is generated by one detection unit; for a target digital signature in the digital signature set, in response to the fact that signature information included in the target digital signature is matched with signature information of a previous signature, acquiring a second secret key of a target detection unit according to a detection serial number of the target detection unit included in the target digital signature; detecting the digital fingerprint of the target detection unit included in the target digital signature by adopting a second key of the target detection unit; determining that the target digital signature passes detection in response to the digital fingerprint of the target detection unit passing detection, wherein the digital signature set passes detection means that the second number of digital signatures all pass detection; in response to the passing of the detection of the digital signature set, combining the detection indexes of a second number of detection units and determining the authority possessed by the target keyboard and mouse device; responding to the security detection instruction based on the authority possessed by the target keyboard and mouse device, wherein responding to the security detection instruction comprises executing the step of acquiring the first access instruction aiming at the target terminal 300.
Further, the detection unit is specifically configured to:
and acquiring a second key corresponding to the detection serial number of the target detection unit from a preset corresponding relation to obtain the second key of the target detection unit, wherein the preset corresponding relation comprises the corresponding relation between the detection serial number of the detection unit and the second key.
Further, the detection unit is specifically configured to:
acquiring a signature of the target detection unit from the detection serial number of the target detection unit;
and acquiring a second key of the target detection unit based on the signature of the target detection unit, wherein the signature of the target detection unit is recorded in the detection serial number of the target detection unit in the form of a tree-shaped signature set.
It should be noted that, for the foregoing implementation principle of the artificial intelligence based software compatibility processing system, reference may be made to the implementation principle of the artificial intelligence based software compatibility processing method, which is not described herein again. It should be understood that the above division of each module of the cloud platform is only a division of a logical function, and when the actual implementation is implemented, all or part of the division may be integrated into one physical entity, or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the software compatibility processing system based on artificial intelligence may be a processing element separately set up, or may be implemented by being integrated in a chip of the cloud platform, or may be stored in a memory of the cloud platform in the form of program codes, and a processing element of the cloud platform calls and executes the functions of the determining module 1102. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others. For another example, when some of the above modules are implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can call program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
The embodiment of the present invention provides a computer device 100, where the computer device 100 includes a processor and a non-volatile memory storing computer instructions, and when the computer instructions are executed by the processor, the computer device 100 executes the aforementioned software compatibility processing system based on artificial intelligence. As shown in fig. 4, fig. 4 is a block diagram of a computer device 100 according to an embodiment of the present invention. The computer device 100 includes an artificial intelligence based software compatibility processing system, a memory 111, a processor 112, and a communication unit 113.
To facilitate the transfer or interaction of data, the elements of the memory 111, the processor 112 and the communication unit 113 are electrically connected to each other, directly or indirectly. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The artificial intelligence based software compatibility processing system includes at least one software functional module which may be stored in the memory 111 in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the computer device 100. The processor 112 is used for executing the artificial intelligence based software compatibility processing system stored in the memory 111, such as a software function module and a computer program included in the artificial intelligence based software compatibility processing system.
The embodiment of the present invention provides a readable storage medium, where the readable storage medium includes a computer program, and when the computer program runs, the computer device 100 where the readable storage medium is located is controlled to execute the foregoing online secure transaction method.
To sum up, the embodiment of the present invention provides a software compatibility processing method and a cloud platform based on artificial intelligence, in which a first access instruction for a target terminal is obtained, where the first access instruction includes a first access command and a key and mouse identifier, and the key and mouse identifier is used to indicate a target key and mouse data file; determining a compatible matching vector set according to the target terminal and the target keyboard and mouse data file, wherein the compatible matching vector set has a corresponding relation with the target terminal, the compatible matching vector set comprises at least one compatible matching vector, and each compatible matching vector comprises a device matching identifier and a corresponding relation between compatible elements; further, if the first access command meets the device matching identifier included in the target compatible vector, acquiring a second access command according to the first access command and the compatible element included in the target compatible vector, wherein the target compatible vector belongs to the compatible matching vectors included in the compatible matching vector set; and finally, sending a second access instruction to the verification server so that the verification server executes a second access command according to the second access instruction, wherein the second access instruction comprises the second access command.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated. The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated.

Claims (10)

1. A software compatibility processing method based on artificial intelligence is applied to computer equipment, the computer equipment is in communication connection with an authentication server, the computer equipment and the authentication server are both in communication connection with a plurality of terminals, and the method comprises the following steps:
acquiring a first access instruction aiming at a target terminal, wherein the first access instruction comprises a first access command and a keyboard and mouse identifier, and the keyboard and mouse identifier is used for indicating a target keyboard and mouse data file;
determining a compatible matching vector set according to the target terminal and the target keyboard and mouse data file, wherein the compatible matching vector set has a corresponding relation with the target terminal, the compatible matching vector set comprises at least one compatible matching vector, and each compatible matching vector comprises a device matching identifier and a corresponding relation between compatible elements;
if the first access command meets the equipment matching identification included in the target compatible vector, acquiring a second access command according to the first access command and the compatible elements included in the target compatible vector, wherein the target compatible vector belongs to the compatible matching vectors included in the compatible matching vector set;
and sending a second access instruction to the authentication server so that the authentication server executes the second access command according to the second access instruction, wherein the second access instruction comprises the second access command.
2. The method of claim 2, wherein obtaining a second access command according to the first access command and the compatible element included in the target compatibility vector comprises:
if the first access command corresponds to unidirectional output equipment, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector;
generating the second access command according to the output format and the first access command;
or, the obtaining a second access command according to the first access command and the compatible element included in the target compatible vector includes:
if the first access command corresponds to unidirectional output equipment, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector;
generating a third access command according to the first access command;
and generating the second access command according to the output format and the third access command.
3. The method of claim 2, wherein sending the second access indication to the authentication server to cause the authentication server to execute the second access command according to the second access indication comprises:
sending the second access instruction to the authentication server, so that the authentication server executes the output format and the first access command according to the second access instruction;
receiving a command verification receipt sent by the verification server for the first access command;
or, the sending the second access instruction to the authentication server to enable the authentication server to execute the second access command according to the second access instruction includes:
sending the second access instruction to the authentication server, so that the authentication server executes the output format and the third access command according to the second access instruction;
receiving a command authentication receipt for the third access command sent by the authentication server.
4. The method of claim 2, wherein sending the second access indication to the authentication server to cause the authentication server to execute the second access command according to the second access indication comprises:
sending the second access instruction to the authentication server, so that the authentication server executes the first access command and the output format according to the second access instruction;
receiving a command verification receipt sent by the verification server for the first access command;
receiving a command verification receipt sent by the verification server for the output format;
or, the sending the second access instruction to the authentication server to enable the authentication server to execute the second access command according to the second access instruction includes:
sending the second access instruction to the authentication server, so that the authentication server executes the first access command and the output format according to the second access instruction;
receiving a command verification receipt sent by the verification server and aiming at the third access command;
and receiving a command verification receipt aiming at the output format and sent by the verification server.
5. The method of claim 1, further comprising:
if the first access command meets a first target compatible sub-vector included in the target compatible vector, acquiring a fourth access command according to the first access command and a first sub-compatible element included in the target compatible vector, wherein the first target compatible sub-vector is included in the target compatible vector;
sending a third access instruction to the authentication server to enable the authentication server to execute the fourth access command according to the third access instruction, wherein the third access instruction comprises the fourth access command;
receiving a command verification receipt sent by the verification server for the fourth access command;
if the command verification receipt for the fourth access command satisfies a second target compatible sub-vector included in the target compatible vector, acquiring a fifth access command according to the first access command and a second sub-compatible element included in the target compatible vector, where the second target compatible sub-vector is included in the target compatible vector;
sending a fourth access instruction to the authentication server to enable the authentication server to execute the fifth access command according to the fourth access instruction, wherein the fourth access instruction comprises the fifth access command.
6. The method of claim 1, wherein the computer device package intercepting unit, a first number of detecting units, and a recording unit;
before the obtaining the first access indication for the target terminal, the method further comprises:
the intercepting unit receives a safety detection instruction from target keyboard and mouse equipment, and the safety detection instruction is used for accessing the recording unit;
initiating a detection instruction to a second number of detection units in the first number of detection units, wherein the detection instruction is used for acquiring digital signatures corresponding to the detection units;
for a target detection unit in the second number of detection units, detecting a digital signature set included in a detection instruction received by the target detection unit;
detecting the detection content of the security detection indication in response to the detection of the digital signature set included in the detection indication passing;
responding to the detection content of the security detection indication, and responding to the detection content of the detection indication received by the target detection unit, and creating a target digital signature, wherein the detection indication received by the target detection unit comprises: a digital signature set generated by a previous node and detection content of the security detection indication;
writing the detection serial number of the target detection unit in the target digital signature;
writing a detection index of the target detection unit in the target digital signature;
calculating the signature information of a last signature by adopting a hash function, and writing the signature information of the last signature into the target digital signature;
signing the target digital signature by adopting a first secret key of the target detection unit, and writing a unique identifier of the target detection unit into the target digital signature;
the target digital signature comprises a detection serial number of the target detection unit, a detection index of the target detection unit, signature information of a last signature of the target digital signature and identity information of the target detection unit, the digital signature set comprises a second number of digital signatures recorded by a preset knowledge graph, and each digital signature is generated by one detection unit;
for a target digital signature in the digital signature set, in response to that signature information included in the target digital signature is matched with signature information of a previous signature, acquiring a second key of a target detection unit according to a detection serial number of the target detection unit included in the target digital signature;
detecting the digital fingerprint of the target detection unit included in the target digital signature by adopting a second key of the target detection unit;
determining that the target digital signature passes detection in response to the digital fingerprint of the target detection unit passing detection, wherein the digital signature set passes detection means that the second number of digital signatures all pass detection;
in response to the detection of the digital signature set passing, combining the detection indexes of the second number of detection units, and determining the authority possessed by the target keyboard and mouse device;
responding to the safety detection instruction based on the authority of the target keyboard and mouse device, wherein the responding to the safety detection instruction comprises the step of acquiring a first access instruction aiming at a target terminal.
7. The method according to claim 6, wherein the obtaining the second key of the target detection unit according to the detection serial number of the target detection unit included in the target digital signature comprises:
and acquiring a second key corresponding to the detection serial number of the target detection unit from a preset corresponding relation to obtain the second key of the target detection unit, wherein the preset corresponding relation comprises the corresponding relation between the detection serial number of the detection unit and the second key.
8. The method according to claim 6, wherein the obtaining the second key of the target detection unit according to the detection serial number of the target detection unit included in the target digital signature comprises:
acquiring a signature of the target detection unit from the detection serial number of the target detection unit;
and acquiring a second key of the target detection unit based on the signature of the target detection unit, wherein the signature of the target detection unit is recorded in the detection serial number of the target detection unit in the form of a tree-shaped signature set.
9. A software compatibility processing cloud platform based on artificial intelligence is applied to computer equipment, the computer equipment is in communication connection with a verification server, the computer equipment and the verification server are both in communication connection with a plurality of terminals, and the cloud platform comprises:
the device comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring a first access instruction aiming at a target terminal, the first access instruction comprises a first access command and a keyboard and mouse identifier, and the keyboard and mouse identifier is used for indicating a target keyboard and mouse data file;
a determining module, configured to determine a compatible matching vector set according to the target terminal and the target keyboard and mouse data file, where the compatible matching vector set has a correspondence with the target terminal, the compatible matching vector set includes at least one compatible matching vector, and each compatible matching vector includes a device matching identifier and a correspondence between compatible elements; if the first access command meets the equipment matching identification included in the target compatible vector, acquiring a second access command according to the first access command and the compatible elements included in the target compatible vector, wherein the target compatible vector belongs to the compatible matching vectors included in the compatible matching vector set;
a sending module, configured to send a second access instruction to the authentication server, so that the authentication server executes the second access command according to the second access instruction, where the second access instruction includes the second access command.
10. The cloud platform of claim 9, wherein the determination module is specifically configured to:
if the first access command corresponds to unidirectional output equipment, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector; generating the second access command according to the output format and the first access command;
or, the determining module is specifically configured to:
if the first access command corresponds to unidirectional output equipment, generating an output format corresponding to the first access command according to the first access command and compatible elements included in the target compatible vector; generating a third access command according to the first access command; and generating the second access command according to the output format and the third access command.
CN202210256124.0A 2022-03-16 2022-03-16 Software compatibility processing method based on artificial intelligence and cloud platform Active CN114584388B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210256124.0A CN114584388B (en) 2022-03-16 2022-03-16 Software compatibility processing method based on artificial intelligence and cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210256124.0A CN114584388B (en) 2022-03-16 2022-03-16 Software compatibility processing method based on artificial intelligence and cloud platform

Publications (2)

Publication Number Publication Date
CN114584388A true CN114584388A (en) 2022-06-03
CN114584388B CN114584388B (en) 2023-03-28

Family

ID=81781216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210256124.0A Active CN114584388B (en) 2022-03-16 2022-03-16 Software compatibility processing method based on artificial intelligence and cloud platform

Country Status (1)

Country Link
CN (1) CN114584388B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5428367A (en) * 1991-07-08 1995-06-27 Mikan; Peter J. Computer mouse simulator having see-through touchscreen device and external electronic interface therefor
US20060139330A1 (en) * 2004-12-29 2006-06-29 Kutch Patrick G Adaptive mouse re-direction
CN205229976U (en) * 2015-11-23 2016-05-11 浪潮集团有限公司 KVM system of compatible multiple mouse type
CN207067948U (en) * 2017-06-22 2018-03-02 佛山市顺德区顺达电脑厂有限公司 Key mouse that switchable type is wireless
CN207249662U (en) * 2017-07-26 2018-04-17 刘清钧 Adaptive usb synchronizers
CN209433397U (en) * 2018-12-17 2019-09-24 南京艾拓维讯信息技术有限公司 Multichannel usb signal switching device
CN112612699A (en) * 2020-12-21 2021-04-06 上海金途信息科技有限公司 General automatic test equipment for HID (high intensity discharge) human-computer interaction scene use case
CN112905033A (en) * 2021-03-25 2021-06-04 深圳市乐翔电气有限公司 Wireless keyboard and mouse connection method and device, intelligent terminal and storage medium
CN114116459A (en) * 2021-11-05 2022-03-01 浙江吉利控股集团有限公司 Software compatibility verification method and computer-readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5428367A (en) * 1991-07-08 1995-06-27 Mikan; Peter J. Computer mouse simulator having see-through touchscreen device and external electronic interface therefor
US20060139330A1 (en) * 2004-12-29 2006-06-29 Kutch Patrick G Adaptive mouse re-direction
CN205229976U (en) * 2015-11-23 2016-05-11 浪潮集团有限公司 KVM system of compatible multiple mouse type
CN207067948U (en) * 2017-06-22 2018-03-02 佛山市顺德区顺达电脑厂有限公司 Key mouse that switchable type is wireless
CN207249662U (en) * 2017-07-26 2018-04-17 刘清钧 Adaptive usb synchronizers
CN209433397U (en) * 2018-12-17 2019-09-24 南京艾拓维讯信息技术有限公司 Multichannel usb signal switching device
CN112612699A (en) * 2020-12-21 2021-04-06 上海金途信息科技有限公司 General automatic test equipment for HID (high intensity discharge) human-computer interaction scene use case
CN112905033A (en) * 2021-03-25 2021-06-04 深圳市乐翔电气有限公司 Wireless keyboard and mouse connection method and device, intelligent terminal and storage medium
CN114116459A (en) * 2021-11-05 2022-03-01 浙江吉利控股集团有限公司 Software compatibility verification method and computer-readable storage medium

Also Published As

Publication number Publication date
CN114584388B (en) 2023-03-28

Similar Documents

Publication Publication Date Title
US20210397748A1 (en) Method and apparatus for processing biometric information in electronic device
US10700861B2 (en) System and method for generating a recovery key and managing credentials using a smart blockchain contract
US10735427B2 (en) Method and apparatus for managing program of electronic device
US11706199B2 (en) Electronic device and method for generating attestation certificate based on fused key
US10044510B2 (en) Storing and using data with secure circuitry
CN108377272B (en) Method and system for managing terminal of Internet of things
WO2018086469A1 (en) Data storage method utilized in non-volatile storage space in integrated circuit, and trusted integrated circuit
US20170201378A1 (en) Electronic device and method for authenticating identification information thereof
US20200084050A1 (en) Factory data storage and recovery
US20220005046A1 (en) Payment method using biometric authentication and electronic device therefor
KR102208631B1 (en) Method for inputting/outputting security information and Electronic device using the same
US20210390209A1 (en) Electronic device, method for providing personal information using same, and computer-readable recording medium for recording same
US20210194679A1 (en) Electronic device sharing key with external electronic device and operating method for electronic device
CN108574658B (en) Application login method and device
CN114584388B (en) Software compatibility processing method based on artificial intelligence and cloud platform
EP3926992B1 (en) Electronic device, and authentication method in electronic device
KR102657388B1 (en) Electronic device for selecting key used for encryption based on an information quantity of data to be encrypted and method for the same
US20160078469A1 (en) Application Purchasing Method, And Terminal
CN112560104B (en) Data storage method and safety information platform based on cloud computing and block chain
US20150220720A1 (en) Electronic device and method for controlling access to given area thereof
KR20200097100A (en) Electronic device and method for veryfying integrity of application
CN111737580B (en) Information verification method and device, computer equipment and readable storage medium
KR20190052405A (en) Computer security system and method using authentication function in smart phone
US10659599B2 (en) Certificate loading method and related product
US10289948B2 (en) Maintenance system, and computer readable recording medium storing a maintenance program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220928

Address after: Room 501, unit 3, building 2, No. 138, Sanzhong Road, Liubei District, Liuzhou City, Guangxi Zhuang Autonomous Region 545000

Applicant after: Wu Di

Address before: 750000 No. 80, Zongmu lane, Xingqing District, Yinchuan City, Ningxia Hui Autonomous Region

Applicant before: Yinchuan chengmu Technology Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230116

Address after: 518000 B4-603, Building B, Kexing Science Park, No. 15, Keyuan Road, Science Park Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong Province

Applicant after: Shenzhen Zhongshun Heying Technology Co.,Ltd.

Address before: Room 501, unit 3, building 2, No. 138, Sanzhong Road, Liubei District, Liuzhou City, Guangxi Zhuang Autonomous Region 545000

Applicant before: Wu Di

GR01 Patent grant
GR01 Patent grant