摘要:
A method for dynamically switching between different device configurations to improve the utilization of the device and save the cost. The method comprises the steps of obtaining the current configuration information of a device connected to a host; and if the current configuration of the device does not meet the requirements of the host, switching the current configuration of the device to a suitable one for the host. A system for the same is also provided to improve the utilization of the device and save the cost.
摘要:
A method and system for program protection based on a .NET card. The method includes compiling, by a first device, first source code into a first assembly, and storing the first assembly to a .NET card. Information of a remotely invoked class in the first source code is extracted to form a new class. A remote invocation instruction is written in the new class to generate second source code. The second source code is compiled into a second assembly, and the .NET card and the second assembly are provided to a second device. The second device executes the second assembly, remotely invoking the class in the first source code, executing the class at the .NET card via an interface of the .NET card, and receiving an execution result returned by the .NET card. The system includes a .NET card, a first device and a second device.
摘要:
The present invention relating to computer security field provides a method for safe operation and a system thereof. The method includes: loading the compressed kernel of a safe operating system to a memory of a computer, decompressing the driver of a security device to the memory of the computer; a security master process inquiring the security device and determining whether the security device is legitimate, and if so, the safe operating system creates a security sub-process with which the safe operating system performing information interaction with the security device; verifying whether a user is legitimate, if so, permitting the safe operating system to run properly; otherwise, performing exception handling. The system includes an operating system storage device, a security device and a computer. The presented invention provides a solution that a kernel program of a safe operating system is cooperated with a security device by starting the safe operating system. In the whole process of the computer operation, the kernel of the safe operating system works with the security device, and the security device completes the verification of the user ID and the processing of file data encryption/decryption, which assures the security of the computer operation.
摘要:
The invention provides a device with a USB interface which can be used as a time-sharing standard I/O interface. The device includes a USB interface module, a status detecting module, a power extracting module and a switch module. The power extracting module is connected to the USB interface module, the switch module is connected to the USB interface module, and the status detecting module is connected to the switch module and the USB interface module. With an interface used in a time-sharing way according to the invention, the device can transfer data according to the USB protocol or standard I/O interface protocol depending on the tool used. When the data needs to be transferred according to the I/O interface protocol, there is no need to open the casing of the USB device and it is more convenient to use because the I/O interface protocol can be defined by the user.
摘要:
The invention discloses a portable information security device in the security field. In order to solve the problem that the USB Key transfers data at low speed and may occupy more CPU resources with USB master/slave protocol, and to meet the demand on development of the next generation of interface technology, the invention provides a portable security device, based on serial ATA protocol, comprising an eSATA interface unit, a memory unit, a privilege management unit, an algorithm unit and a control unit.
摘要:
The present invention relates to an information security device of Universal Serial Bus (USB) Human Interface Device (HID) class and the data transmission method for the same. With a master chip that has a built-in HID descriptor and a USB interface chip connected to the master chip, the device of the present invention itself may be designed to be compact and easy to use, and provide powerful functions. With the USB HID interface, the device user does not need to install a driver and the user can use the device anywhere and anytime. And the user does not need to manage the driver whose version updates constantly, consider the compatibility of various product drivers, face the risk caused by the driver when running OS, and worry about the pollution to the system resulted from the installation and uninstallation of the driver. CPU, SCM or smart card chip used as the master chip ensures that the security of identity authentication is reliable. Moreover, the security of identity authentication device can be further improved by adding biometric identification module and/or the like.
摘要:
The present invention relates to a secure transmission method and apparatus, particularly to a security control method for a data transmission process and a software protection apparatus using the same, where data transmitted between a computer running protected software and the software protection apparatus is in a cipher-text form, and thus a plain text does not appear in a communication line during the whole process. Moreover, since a random number is involved for scrambling and the data is encrypted, hence commands sent from the protected software to and those returned from the software protection apparatus change constantly even when the same command is sent from the sending end. In this way, it will be more difficult for a cracker to crack, thus securing the transmission of private confidential data.
摘要:
The present invention relates to a fingerprint image capture process control method and the apparatus thereof particularly to a method for capturing and mapping fingerprint images and the apparatus for the same. The present invention determines the proper direction of mosaicing the slices to get correct fingerprint image by comparing the leading and trailing image blocks of two adjacent slices (frames) and uses the direction that is more affinitive as forward capture direction after the comparison. In addition, the identification of image direction may be processed repeatedly while mosaicing the slices, and calibrating the capture direction at any time while mosaicing the slices is allowed, thereby the error rate in mosaicing the slices is reduced and the efficiency of capturing and mapping fingerprint images is increased.
摘要:
The invention provides a working key generation method and device and a computer readable storage medium, and belongs to the technical field of information security. The method comprises the following steps: the terminal receiving an operation instruction sent by an upper computer, obtaining a working key purpose and a working key algorithm according to the operation instruction, setting the working key purpose as a first purpose by the terminal, generating derived data according to the first purpose, a master key identifier, a first numerical value and a master key algorithm, determining the length of a working key according to the working key algorithm, obtaining data in a working key buffer area as a key, generating the working key according with the length of the working key according to the key and the derived data, executing corresponding operation according to the operation instruction and the working key, and returning an operation result to the upper computer. Compared with an encryption scheme in the prior art, the method provided by the invention is safer and wider in application range.
摘要:
An intelligent key device and a verification method therefor. The verification method comprises: determining the type of an instruction by means of an intelligent key device; determining a key area according to the type of the instruction; acquiring a biometric verification identifier corresponding to the key area; determining, according to the biometric verification identifier, a biometric verification mode corresponding to the key area; and executing a corresponding operation according to the biometric verification mode. According to the present invention, a user can realize multiple verification modes of biometric features according to a key area in the process of performing verification using the intelligent key device, such that different verification requirements of the user for the key used in different application scenarios are met.