摘要:
The present application presents a method and an apparatus for synchronizing time by parsing satellite navigation data. A service application obtains current time of a system and caches it as a first time variable, receives and parses the satellite navigation data to obtain all character strings, obtains a character string as a current character string to be processed, determines a type of a system protocol identifier, if it is a preset system protocol identifier, converts a time field of the current character string to be processed into a local time zone time value for storing, obtains the current time and stores it as a second time variable, obtains a first time compensation value according to the first and second time variables, obtains satellite navigation time according to the first time compensation value and the maximum local time zone time value and sets system time as satellite navigation time.
摘要:
A method for realizing secure communication, comprises: Step 1, a card reader is powered on, determine a system working mode, perform an apple device verification and execute Step 2 if the system working mode is apple mode; execute Step 2 if the system working mode is USB mode; Step 2, wait for receiving an instruction, determine a first preset byte of the instruction, perform corresponding operation if the first preset byte is a first preset value; decrypt the instruction according to an initial encryption key, a key serial number and an algorithm corresponding to an algorithm flag, send the decrypted instruction to a card and execute Step 3 if the first preset byte is a second preset value; Step 3, when data returned by the card is received, the key serial number is updated, the algorithm according to the algorithm flag, the initial encryption key and the updated key serial number are configured to encrypt the data returned by the card, send the encrypted data to an upper computer via a corresponding interface according to the system working mode. According to the present invention, after a key agreement between the card reader and the upper computer, the key is updated, data is encrypted or decrypted by the updated key to improve safety of data communication.
摘要:
The present invention belongs to the field of intelligent cards, and disclosed is a method for managing an application on a card. The method comprises: after receiving data sent by a running environment, a card content management module checking a card state; when the card state is not a first preset state or a second preset state, checking the received data; and when the received data meets a preset format, continuing to receive the data sent by the running environment to obtain a complete command, and performing a corresponding command to implement an association of applications on a card. The beneficial effects of the present invention are to provide a method for managing an application on a card, so that loading, installation, update, personalization, and deletion of an application on the card can be implemented.
摘要:
Disclosed is a method for implementing precomputation of a large number in an embedded system. A modulo module, a modulo adding module, and a Montgomery modular multiplier are invoked according to a data format of a modulus length and a value of each data bit of a binary number corresponding to the modulus length, to perform an iterative operation, so that a precomputation result of a large number can be obtained when the modulus length is an arbitrary value, thereby improving the data processing speed.
摘要:
A mnemonic phrase management method. The method comprises: generating a random number having a first preset length and performing calculation on the random number; splicing the random number and data having a second preset length acquired from the random number calculation result to obtain a first spliced value; grouping the first spliced value according to a third preset length; sequentially searching an offset storage area for corresponding indexes according to values of the groups; obtaining mnemonic phrase starting offset addresses and mnemonic phrase lengths according to the indexes; and acquiring corresponding mnemonic phrases from a mnemonic phrase storage area according to the mnemonic phrase starting offset addresses and the mnemonic phrase lengths and sequentially storing the mnemonic phrases into a mnemonic phrase buffer. The present invention relates to the field of information security. Compared with the prior art, the present invention can greatly reduce storage space, solve the problem of space limitation of a security chip, and save more space for applications, is applicable to existing security chips, and meets production requirements of hardware devices.
摘要:
A method for communication between a server and an authenticator. The method comprises: a server generating a first client identifier, a first authenticator identifier and a first session key according to a request sent by a client, and broadcasting, by means of the client, data comprising the first client identifier; an authenticator scanning the broadcast data, acquiring a third key to verify the first client identifier, if verification is successful, generating a second authenticator identifier and a second session key, making a notification of the successful verification, stopping scanning, and broadcasting broadcast data comprising the second authenticator identifier; the client stopping broadcasting, and scanning the broadcast data sent by the authenticator, acquiring and verifying the second authenticator identifier in the broadcast data, and if verification is successful, establishing a Bluetooth connection with the authenticator; and the client performing handshake and encrypted communication operation with the authenticator. By means of the present invention, data not being stolen during a transmission process can be ensured, thereby improving the data security during the transmission process, and ensuring the interests of a user.
摘要:
A working method for a key device and a key device, including: a smart key apparatus receives an authentication instruction, determines a type of the authentication instruction, parses a FIDO2 authentication instruction to obtain a credential if the instruction is the FIDO2 authentication instruction, checks whether the credential is complete by using a changing key corresponding to the FIDO2, if a check is successful, the credential is registered in a FIDO2 mode, and the authentication response is generated and returned to the client; and if the check fails, whether the credential is complete is checked by using the changing key corresponding to a U2F, and the credential is registered in a U2F mode if a check is successful, the authentication response is generated and returned to the client, and an error response is returned to the client if the check fails.
摘要:
Disclosed is a working method of a dynamic token. The present invention relates to the field of communications. The method comprises: when a token is awakened, the awakening identification type at a flag bit is determined; if the type is a key awakening identification, the key value is detected, and a corresponding operation is performed according to the key pressed; if the type is a Bluetooth data awakening identification, Bluetooth data is received, and when the Bluetooth data has been received, the Bluetooth data is stored in a received data temporary storage region, and the Bluetooth data awakening identification is reset; if the type is Bluetooth connection awakening identification, that Bluetooth has been connected is displayed, and after fourth preset period has passed, the screen is cleared, and the Bluetooth connection awakening identification is reset; if the type is Bluetooth disconnection awakening identification, that Bluetooth has been disconnected is displayed, the received data temporary storage region is cleared, and the Bluetooth disconnection awakening identification is reset; and if the type is an awakening identification of other types, a corresponding operation according to the awakening identification is performed.
摘要:
Disclosed is an implementation method for driving of software and hardware supporting OpenSC. The method is implemented by middleware invoking an interface function, and comprises invocation of a function for initializing an interface, invocation of functions for establishing an encrypted communications environment, selecting a file interface, and selecting a file to operate, invocation of a function for setting a safe environment interface, and invocation of functions for building an APDU for setting a safe environment and setting a safe environment and a signature interface by sending the APDU, and building of a signed APDU and execution, by sending the APDU, of a signature operation on an original text to be signed.
摘要:
A method for rapidly generating coordinate points in an embedded system, comprising: according to a preset segment number of segmentation and a preset step size, segmenting a numerical value to be calculated and then grouping each data segment, and calculating an initial point value corresponding to each digit in a group of data of each data segment; detecting the value of each digit in the current data group of all data segments, subjecting the initial point value corresponding to the digit with a value of 1 and an intermediate point value to point addition operation, and updating the intermediate point value using the point addition operation result; judging whether a next data group of each data segment exists, if it does not exist, taking the intermediate point value as a resulting coordinate point value and storing same, and ending; and if it exists, subjecting the intermediate point value to a point doubling operation for a preset step size frequency, and updating the intermediate point value using the point doubling operation result, taking a next data group of each data segment as a new current data group, and continuing to perform a point addition and point doubling operation. The present invention can rapidly generate coordinate points, is effectively applied to the generation of key pairs and signatures, and greatly improves the operation speed.