CN109240858A - Data recovery method and device, digital wallet equipment and readable storage medium - Google Patents
Data recovery method and device, digital wallet equipment and readable storage medium Download PDFInfo
- Publication number
- CN109240858A CN109240858A CN201811141408.5A CN201811141408A CN109240858A CN 109240858 A CN109240858 A CN 109240858A CN 201811141408 A CN201811141408 A CN 201811141408A CN 109240858 A CN109240858 A CN 109240858A
- Authority
- CN
- China
- Prior art keywords
- equipment
- subdata
- identifier
- digital wallet
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1456—Hardware arrangements for backup
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Abstract
The embodiment of the invention provides a data recovery method and device, digital wallet equipment and a readable storage medium. The method comprises the following steps: when a data recovery instruction is received, determining a first identifier of a first storage device which is in communication connection with the digital wallet device, and determining a second identifier of a second storage device which is in plug-in electrical connection with the first storage device; determining target equipment of data to be recovered based on the first identification and the second identification; restoring the subdata required to be stored by the target equipment by utilizing the subdata stored by the non-target equipment; after the sub data required to be stored by the target device is restored, each of the non-target device and the target device stores: dividing target data to obtain two sub data of first sub data, second sub data and third sub data, wherein the sub data stored in any two devices are not identical; the target data includes: the private key or private key encrypts the file. In this way, the security of the private key can be improved.
Description
Technical field
The present invention relates to block chain technical fields, more particularly to a kind of data reconstruction method, device, digital wallet equipment
And readable storage medium storing program for executing.
Background technique
With the development of technology, more and more users manage digital goods using the digital wallet installed in electronic equipment
Coin (such as bit coin and Lai Te coin etc.).Wherein, which is referred to as digital wallet equipment.The digital wallet is base
In the wallet of block chain technology, and private key is the exclusive evidence for managing the digital cash in digital wallet.
Inventor has found in the implementation of the present invention, and complete private key, this kind of storage side are stored in digital wallet
Formula makes complete private key be easy disposably to be stolen by malicious user, and the private key also can be with when the digital wallet device losses
Loss so that private key safety is lower.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of data reconstruction method, device, digital wallet equipment and readable deposits
Storage media, to improve the safety of private key.Specific technical solution is as follows:
In a first aspect, being applied to digital wallet equipment, this method the embodiment of the invention provides a kind of data reconstruction method
May include:
When receiving data recovery instruction, determining have communication connection with the foundation of digital wallet equipment first stores equipment
First identifier, and determine with first storage equipment plug be electrically connected second store equipment second identifier;
Based on first identifier and second identifier, determine in digital wallet equipment, the first storage equipment and the second storage equipment
One equipment of data to be restored, as target device;
The subdata stored using non-targeted equipment restores the subdata stored needed for target device;Wherein, to mesh
After the subdata stored needed for marking device is restored, it is stored in each non-targeted equipment and target device: to number of targets
According to two one's share of expenses for a joint undertaking data being split in obtained first subdata, the second subdata and third subdata, and any two
The subdata stored in a equipment is not exactly the same;Target data includes: private key or private key encryption file.
Optionally, in embodiments of the present invention, it is based on first identifier and second identifier, determines digital wallet equipment, first
An equipment for storing data to be restored in equipment and the second storage equipment the step of as target device, may include:
Judge whether recorded first identifier and second identifier in digital wallet equipment;
If in digital wallet equipment record have first identifier and do not recorded second identifier, determine the second storage equipment be to
Restore the target device of data.
Optionally, in embodiments of the present invention, this method can also include:
If in digital wallet equipment record have second identifier and do not recorded first identifier, determine the first storage equipment be to
Restore the target device of data.
Optionally, in embodiments of the present invention, this method can also include:
If not recorded second identifier and first identifier in digital wallet equipment, determine that digital wallet equipment is number to be restored
According to target device.
Optionally, in embodiments of the present invention, if record has first identifier and do not recorded second in digital wallet equipment
Mark determines the step of the second storage equipment is the target device of data to be restored, may include:
If record has first identifier and has not recorded second identifier in digital wallet equipment, detection second identifier corresponding the
Whether two storage equipment are initialization apparatus;
If the second storage equipment is initialization apparatus, determine that the second storage equipment is the target device of data to be restored.
Optionally, in embodiments of the present invention, it after receiving data and restoring instruction, and is set determining with digital wallet
It is standby to establish the first identifier for having the first storage equipment of communication connection, and determine second be electrically connected with the first storage equipment plug
Before the step of storing the second identifier of equipment, this method can also include:
Whether detection digital wallet equipment stores equipment with first and establishes communication connection, and whether the first storage equipment inserts
It pulls out and is electrically connected to the second storage equipment;
If it is not, prompt user establishes the communication connection of digital wallet equipment and the first storage equipment, and prompt user by the
One storage equipment plug is electrically connected to the second storage equipment.
Optionally, in embodiments of the present invention, prompt user establishes the communication of digital wallet equipment and the first storage equipment
The step of connection may include:
Prompt user establishes digital wallet equipment and connects with the wireless communication of the first storage equipment;Wherein, wireless communication connects
Connect includes: Bluetooth communication connection or the connection of wireless near field communication NFC communication.
Optionally, in embodiments of the present invention, the first subdata, the second subdata and third subdata are secret using presetting
What close partitioning algorithm was split target data.
Second aspect, the embodiment of the invention also provides a kind of Data Recapture Units, are applied to digital wallet equipment, the dress
It sets and may include:
First determining module, for when receiving data recovery instruction, determining establish with digital wallet equipment to have communication
The first identifier of first storage equipment of connection, and determine that be electrically connected with the first storage equipment plug second stores the of equipment
Two marks;
Second determining module determines digital wallet equipment, the first storage equipment for being based on first identifier and second identifier
With an equipment of data to be restored in the second storage equipment, as target device;
Recovery module, the subdata for being stored using non-targeted equipment restore the subnumber stored needed for target device
According to;Wherein, it after the subdata of the storage needed for target device is restored, is deposited in each non-targeted equipment and target device
It contains: two one's share of expenses for a joint undertaking numbers target data being split in obtained first subdata, the second subdata and third subdata
According to, and the subdata stored in any two equipment is not exactly the same;Target data includes: private key or private key encryption file.
Optionally, in embodiments of the present invention, which may include:
Judging submodule, for judging whether recorded first identifier and second identifier in digital wallet equipment;
First determines submodule, in the digital wallet equipment record have first identifier and do not recorded second identifier
When, determine that the second storage equipment is the target device of data to be restored.
Optionally, in embodiments of the present invention, the second determining module can also include:
Second determines submodule, in the digital wallet equipment record have second identifier and do not recorded first identifier
When, determine that the first storage equipment is the target device of data to be restored.
Optionally, in embodiments of the present invention, the second determining module can also include:
Third determines submodule, for determining when not recorded second identifier and first identifier in digital wallet equipment
Digital wallet equipment is the target device of data to be restored.
Optionally, in embodiments of the present invention, third determines that submodule specifically can be used for:
If record has first identifier and has not recorded second identifier in digital wallet equipment, detection second identifier corresponding the
Whether two storage equipment are initialization apparatus;
If the second storage equipment is initialization apparatus, determine that the second storage equipment is the target device of data to be restored.
Optionally, in embodiments of the present invention, which can also include:
Detection module, for after receiving data and restoring instruction, and it is determining establish with digital wallet equipment have it is logical
The first identifier of first storage equipment of letter connection, and determine the second storage equipment being electrically connected with the first storage equipment plug
Before second identifier, whether detection digital wallet equipment stores equipment with first and establishes communication connection, and the first storage equipment
Whether plug is electrically connected to the second storage equipment;
Cue module, for not establishing communication connection, and the first storage with the first storage equipment when digital wallet equipment
Equipment does not plug when being electrically connected to the second storage equipment, and user is prompted to establish the communication of digital wallet equipment and the first storage equipment
Connection, and prompt user that the first storage equipment plug is electrically connected to the second storage equipment.
Optionally, in embodiments of the present invention, cue module specifically can be used for:
Prompt user establishes digital wallet equipment and connects with the wireless communication of the first storage equipment;Wherein, wireless communication connects
Connect includes: Bluetooth communication connection or the connection of wireless near field communication NFC communication.
Optionally, in embodiments of the present invention, the first subdata, the second subdata and third subdata are secret using presetting
What close partitioning algorithm was split target data.
The third aspect the embodiment of the invention also provides a kind of digital wallet equipment, including processor, communication interface, is deposited
Reservoir and communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the program stored on memory, realizes the side of any of the above-described data reconstruction method
Method step.
Fourth aspect is stored with meter the embodiment of the invention also provides a kind of readable storage medium storing program for executing in readable storage medium storing program for executing
Calculation machine program realizes the method and step of any of the above-described data reconstruction method when computer program is executed by processor.
5th aspect, the embodiment of the invention also provides a kind of application programs, when it runs in digital wallet equipment,
So that digital wallet equipment executes: the method and step of any of the above-described data reconstruction method.
In embodiments of the present invention, digital wallet equipment can be when receiving data recovery instruction, the determining and number
Wallet equipment establishes the first identifier for having the first storage equipment of communication connection, and determines and be electrically connected with the first storage equipment plug
Second storage equipment second identifier.It is then possible to determine that digital wallet is set based on the first identifier and the second identifier
An equipment of data to be restored in standby, the first storage equipment and the second storage equipment, and the equipment of the data to be restored is made
For target device.Later, it can use the subdata that non-targeted equipment is stored to restore the subnumber stored needed for target device
According to.Wherein, it after the subdata of the storage needed for target device is restored, is deposited in each non-targeted equipment and target device
Contain two one's share of expenses for a joint undertaking data in the first subdata, the second subdata and third subdata, and the son stored in any two equipment
Data transformation is identical.Wherein, first subdata, the second subdata and third subdata are after being split to target data
Obtained, which includes private key or private key encryption file.In this way, realizing the son to storage required in target device
The recovery of data.Furthermore, it is possible to by the digital wallet equipment, the first storage equipment and the second storage equipment to the first subnumber
Dispersion storage is carried out according to, the second subdata and third subdata, increases malicious user and steals the difficulty of private key, to improve private
The safety of key, and then can guarantee the safety of assets in digital wallet.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow chart of data reconstruction method provided in an embodiment of the present invention;
Fig. 2 is the schematic diagram of hardware wallet provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of Data Recapture Unit provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of digital wallet equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In order to solve the technical problems existing in the prior art, the embodiment of the invention provides a kind of data reconstruction method,
Device, digital wallet equipment and readable storage medium storing program for executing.
Data reconstruction method provided in an embodiment of the present invention is illustrated below with reference to Fig. 1 and Fig. 2.
Data reconstruction method provided in an embodiment of the present invention can be applied to digital wallet equipment.In the digital wallet equipment
Digital wallet (i.e. digital wallet client) is installed.The digital wallet equipment includes but is not limited to desktop computer, plate
Computer and smartwatch.
Referring to Fig. 1, data reconstruction method provided in an embodiment of the present invention be may include steps of:
S101: when receiving data recovery instruction, determining have communication connection with the foundation of digital wallet equipment first is deposited
The first identifier of equipment is stored up, and determines the second identifier for the second storage equipment being electrically connected with the first storage equipment plug;
Wherein, the first storage equipment is data-storable equipment.Specifically, the first storage equipment can deposit for one
Store up disk, i.e. the first storage dish.Similarly, the second storage equipment is also data-storable equipment.Specifically, the second storage equipment
It can be another storage dish, i.e. the second storage dish.Moreover, digital wallet equipment, the first storage equipment and the second storage equipment
It, can be separated for three independent equipment.
In the present embodiment, when digital wallet equipment, which receives data, restores instruction, digital wallet equipment is not aware that
Which need equipment to carry out data recovery to.At this point, digital wallet equipment, which can first determine to establish with itself, communication connection
The first identifier of first storage equipment, and determine the second mark of the second storage equipment being electrically connected with the first storage equipment plug
Know.
Communication connection is established when digital wallet equipment stores equipment with first, and the first storage equipment plug is electrically connected to
When the second storage equipment, digital wallet equipment can send identification information acquisition request to the first storage equipment.So, it first deposits
After storage equipment receives the identification information acquisition request, the second of the second storage equipment can be obtained from the second storage equipment
Mark;Then, the first identifier of the first storage equipment and the second identifier are sent to digital wallet equipment.In this way, digital money
Packet equipment can be obtained the first identifier of the first storage equipment and the second identifier of the second storage equipment.
Since before determining first identifier and second identifier, the first storage equipment may not established with digital wallet equipment
Communication connection, the first storage equipment, which may also not plug, is electrically connected to the second storage equipment.Thus, in order to successfully get first
The first identifier of equipment and the second identifier of the second storage equipment are stored, digital wallet equipment is determining first identifier and the second mark
Before knowledge, it can also detect whether digital wallet equipment with the first storage equipment establishes communication connection, and first stores equipment
Whether plug is electrically connected to the second storage equipment.Wherein, the side of communication connection whether is established between any one detection device
The mode that plug electrical connection whether is established between formula and detection device may be applicable to the embodiment of the present invention, not do herein in detail
It states.
Wherein, whether digital wallet equipment detection digital wallet equipment stores equipment with first and establishes communication connection, and
Whether the first storage equipment, which plugs, is electrically connected to the operation of the second storage equipment and is specifically as follows: first detecting digital wallet equipment is
It is no to establish communication connection with the first storage equipment.If detecting, digital wallet equipment establishes communication link with the first storage equipment
It connects, then can detect the first storage equipment again and whether plug and be electrically connected to the second storage equipment.
If detecting, the plug of the first storage equipment is electrically connected to the second storage equipment, and digital wallet equipment can execute:
Determine the operation of the first identifier of the first storage equipment and the second identifier of the second storage equipment.If detecting the first storage equipment
It does not plug and is electrically connected to the second storage equipment, then digital wallet equipment can prompt user: the first storage equipment plug is electrically connected
It is connected to the second storage equipment.
If detecting that digital wallet equipment is not established with the first storage equipment to communicate to connect, abandons the first storage of detection and set
Standby whether plug is electrically connected to the second storage equipment.In that case, then it is assumed that digital wallet equipment is not set with the first storage
It is standby to establish communication connection, and the first storage equipment does not plug and is electrically connected to the second storage equipment.At this point, digital wallet equipment can be with
Prompt user: the communication connection of digital wallet equipment and the first storage equipment is established, and the first storage equipment plug is electrically connected
To the second storage equipment.
Specifically, user can be prompted to establish digital wallet equipment to connect with the wireless communication of the first storage equipment.Wherein,
Wireless communication connection includes: Bluetooth communication connection or NFC (Near Field Communication, wireless near field communication) logical
Letter connection.That is, digital wallet equipment can carry out Bluetooth communication or NFC communication with the first storage equipment, certainly not
It is confined to this.
In addition, the first identifier of the first storage equipment includes but is not limited to: user gives the first storage equipment setting
Self-defined title and this first storage equipment product ID.Similarly, this second storage equipment second identifier include but
It is not limited to: the product ID of self-defined title and the second storage equipment that user is arranged to the second storage equipment.
In addition, plug electrical connection refers to the electrical connection established by connecting-disconnecting interface.Wherein it is possible to by way of plug/unplug,
Foundation/releasing first stores the communication connection between equipment and the second storage equipment.Specifically, the first storage equipment can pass through
The plug of USB (Universal Serial Bus, universal serial bus) interface is electrically connected to the second storage equipment.In this way, first
Serial communication can be carried out between storage equipment and the second storage equipment.
S102: being based on first identifier and second identifier, determines that digital wallet equipment, the first storage equipment and the second storage are set
An equipment of data to be restored in standby, as target device;
S103: the subdata stored using non-targeted equipment restores the subdata stored needed for target device;Wherein,
After the subdata of the storage needed for target device is restored, it is stored in each non-targeted equipment and target device: right
Target data is split two one's share of expenses for a joint undertaking data in obtained first subdata, the second subdata and third subdata, and
The subdata stored in any two equipment is not exactly the same;Target data includes: private key or private key encryption file.
After digital wallet equipment stores the first identifier of equipment and the second identifier of the second storage equipment in acquisition first,
It can be determined according to the first identifier and the second identifier and need which equipment to carry out data recovery to.And it is possible to will be to
An equipment for carrying out data recovery is denoted as target device, and each equipment for not needing to carry out data recovery is denoted as a non-mesh
Marking device.
Wherein, it is stored in each non-targeted equipment: obtained first subdata, second is split to target data
Two one's share of expenses for a joint undertaking data in subdata and third subdata, and the subdata stored in two non-targeted equipment is not exactly the same.Its
In, which includes: private key or private key encryption file.
Specifically, when record has first identifier but do not recorded second identifier in digital wallet equipment, digital wallet is set
It is standby to determine that the second storage equipment is the target device of data to be restored.Certainly, it is recorded in detecting digital wallet equipment
After having first identifier but not recorded second identifier, digital wallet equipment can also detect corresponding second storage of second identifier
Whether equipment is initialization apparatus, detecting the second storage equipment be initialization apparatus, then determine second storage equipment be to
Restore the target device of data.In this way, not stored the second storage equipment for having data after initialization can be determined as target
Equipment.
In addition, when record has second identifier but do not recorded first identifier in digital wallet equipment, digital wallet equipment
It can determine that the first storage equipment is the target device of data to be restored.When do not recorded in digital wallet equipment second identifier and
When not recorded first identifier, digital wallet equipment can determine that digital wallet equipment itself is that the target of data to be restored is set
It is standby.
After the target device for determining data to be restored, since digital wallet equipment, the first storage equipment and second are deposited
It is stored in two non-targeted equipment in storage equipment: obtained first subdata, the second son is split to target data
Data and third subdata.Therefore, it is possible to by the first subdata, the second subdata and third subdata in target device to
The subdata of storage is restored.In this way, by any in digital wallet equipment, the first storage equipment and the second storage equipment
Two equipment can restore private key, improve the safety of private key.
In one implementation, digital wallet equipment obtain two non-targeted equipment in store the first subdata,
After second subdata and third subdata, subdata restoration principles can be based on, the first subdata, the second subnumber are directly utilized
Subdata to be stored in target device is restored according to third subdata.Wherein, subdata restoration principles are as follows: make pair
After the subdata stored needed for target device is restored, two one's share of expenses for a joint undertaking numbers are stored in each non-targeted equipment and target device
According to, and the subdata stored in any two equipment is not exactly the same.
For example, it when digital wallet equipment and the first storage equipment are non-targeted equipment, and is deposited in digital wallet equipment
The first subdata and the second subdata are contained, when being stored with the first subdata and third subdata in the first storage equipment, number
Wallet equipment can from the digital wallet equipment itself and first storage equipment in obtain: the first subdata, the second subdata and
Third subdata, and can determine that the second storage equipment subdata to be stored is the second subdata and third subdata.To,
Digital wallet equipment directly can extract the second subdata from three one's shares of expenses for a joint undertaking data obtained based on subdata restoration principles
With third subdata.Then, second subdata and third subdata the second storage is transferred to by the first storage equipment to set
In standby, to realize the recovery to subdata to be stored in the second storage equipment.
In another example when digital wallet equipment and the second storage equipment are non-targeted equipment, and stored in digital wallet equipment
There are the first subdata and the second subdata, when being stored with the second subdata and third subdata in the second storage equipment, digital money
Packet equipment can be obtained from the digital wallet equipment itself and the second storage equipment: the first subdata, the second subdata and the
Three subdatas, and can determine that the first storage equipment subdata to be stored is the first subdata and third subdata.To number
Word wallet equipment can based on subdata restoration principles directly be extracted from three one's shares of expenses for a joint undertaking data obtained first subdata and
Third subdata.Then, first subdata and third subdata are stored into the first storage equipment, to realize to first
Store the recovery of subdata to be stored in equipment.
In another implementation, digital wallet equipment is from the digital wallet equipment itself and the first storage equipment
It obtains:, can also be first with the first subdata, the second subdata after the first subdata, the second subdata and third subdata
Restore target data with third subdata.Then, target data is split using default secret partitioning algorithm, to divide
Obtain first object subdata, the second target subdata and third target subdata.
Wherein, first object subdata, the second target subdata and the third target subdata divided can be distinguished
It is identical as the first subdata, the second subdata and third subdata.It certainly, can also in order to further increase the safety of private key
So that first object subdata, the second target subdata and third target subdata and the first subdata, second that segmentation obtains
Subdata and third subdata be not identical, and this is also rational.
When first object subdata, the second target subdata and the third target subdata that segmentation obtains and the first subnumber
When according to, the second subdata and not identical third subdata, which can also utilize first object subdata, second
Target subdata replaces the first subdata, the second subdata stored originally.Then, by first object subdata and third mesh
Mark subdata is sent to the first storage equipment, the first object subdata and third target for receiving the first storage equipment utilization
Subdata replaces the first subdata and third subdata stored originally.In addition, the digital wallet equipment also pass through this first
It stores equipment and the second target subdata and third target subdata is sent to the second storage equipment, store the second storage equipment
The second target subdata and third target subdata.Then, it will record in digital wallet equipment: for dispersing storage target
The first identifier of first storage equipment of data and the second identifier of the second storage equipment.In this way, can be to the second storage equipment
Subdata to be stored is restored.Moreover, it is also possible to first object subdata, the second target subdata and third target
Data carry out dispersion storage, increase malicious user and steal the difficulty of private key, to improve the safety of private key, and then can protect
Demonstrate,prove the safety of assets in digital wallet.
Wherein, system composed by the digital wallet equipment, the first storage equipment and the second storage equipment can be referred to as such as
Hardware wallet 100 shown in Fig. 2.As shown in Fig. 2, the hardware wallet 100 includes: that digital wallet equipment 101, first stores equipment
102 and second store equipment 103.Wherein, which can pass through bluetooth module as shown in Figure 2 and first
It stores equipment 102 and carries out Bluetooth communication.First storage equipment 102 and the second storage equipment 103 can pass through plug electrical connection
Mode is communicatively coupled.
In addition, digital wallet equipment 101, first are deposited after the subdata of the storage needed for target device is restored
It is stored in storage equipment 102 and the second storage equipment 103: obtained first subdata, second is split to target data
Two one's share of expenses for a joint undertaking data in subdata and third subdata, and the subdata stored in any two equipment is not exactly the same.
Wherein, since digital wallet equipment 101, first stores in equipment 102 and the second storage equipment 103 in any appliance
The first subdata, the second subdata and third subdata will not be stored simultaneously.Thus, when digital wallet equipment 101, first stores
When any appliance in equipment 102 and the second storage equipment 103 is lost, private key safety reduction can be made.This is because when using
When any appliance in two equipment is lost at family again, private key can not then restore.
Wherein, the first subdata, the second subdata and third subdata can be digital wallet equipment utilization default secret
It is obtained that shared algorithm is split calculating to target data.Wherein, it can preferably be designed by privacy sharing algorithm: needle
To the fractionation scheme and recovery scheme of target data.It is subsequent to be based on the privacy sharing algorithm pair for this kind of partitioning scheme
First subdata, the second subdata and third subdata carry out data and restore to calculate, and recovery obtains target data.In addition, this kind
Partitioning scheme, malicious user could restore target data after needing to know the privacy sharing algorithm, improve malice and use
The difficulty of family recovery target data.
Certainly, the first subdata, the second subdata and third subdata are also possible to digital wallet equipment to target data
What progress obtained after directly cutting, this is also rational.For this kind of cutting mode, it is subsequent can be to the first subdata, second
Subdata and the second subdata are spliced, so as to restore to obtain target data.
Wherein, when target data is private key, digital wallet equipment can be split private key, wherein private key is pipe
Manage the exclusive evidence of the digital cash in digital wallet.When target data is private key encryption file, digital wallet equipment can be with
Private key encryption file is split.This kind is for the mode that is split to private key encryption file, even if so that malicious user
The first subdata, the second subdata and third subdata can be taken, and utilizes the first subdata, the second subdata and third
Data are restored to obtain target data, it is also difficult to be decrypted to target data, improve the difficulty that malicious user obtains private key.
The private key encryption file can be using RSA cryptographic algorithms or DES (Data Encryption Standard, it is right
Claim Encryption Algorithm) what computations obtained is carried out to private key, it is not limited thereto certainly.
In embodiments of the present invention, digital wallet equipment can be when receiving data recovery instruction, the determining and number
Wallet equipment establishes the first identifier for having the first storage equipment of communication connection, and determines and be electrically connected with the first storage equipment plug
Second storage equipment second identifier.It is then possible to determine that digital wallet is set based on the first identifier and the second identifier
An equipment of data to be restored in standby, the first storage equipment and the second storage equipment, and the equipment of the data to be restored is made
For target device.Later, it can use the subdata that non-targeted equipment is stored to restore the subnumber stored needed for target device
According to.Wherein, it after the subdata of the storage needed for target device is restored, is deposited in each non-targeted equipment and target device
Contain two one's share of expenses for a joint undertaking data in the first subdata, the second subdata and third subdata, and the son stored in any two equipment
Data transformation is identical.Wherein, first subdata, the second subdata and third subdata are after being split to target data
Obtained, which includes private key or private key encryption file.In this way, realizing the son to storage required in target device
The recovery of data.Furthermore, it is possible to by the digital wallet equipment, the first storage equipment and the second storage equipment to the first subnumber
Dispersion storage is carried out according to, the second subdata and third subdata, increases malicious user and steals the difficulty of private key, to improve private
The safety of key, and then can guarantee the safety of assets in digital wallet.
Corresponding to above method embodiment, the embodiment of the invention provides a kind of Data Recapture Units, are applied to digital money
Packet equipment, referring to Fig. 3, the apparatus may include:
First determining module 301, for when receiving data recovery instruction, determination to have logical with the foundation of digital wallet equipment
The first identifier of first storage equipment of letter connection, and determine the second storage equipment being electrically connected with the first storage equipment plug
Second identifier;
Second determining module 302 determines digital wallet equipment, the first storage for being based on first identifier and second identifier
An equipment of data to be restored in equipment and the second storage equipment, as target device;
Recovery module 303, the subdata for being stored using non-targeted equipment restore the son stored needed for target device
Data;Wherein, after the subdata of the storage needed for target device is restored, in each non-targeted equipment and target device
It is stored with: two one's shares of expenses for a joint undertaking in obtained first subdata, the second subdata and third subdata is split to target data
Data, and the subdata stored in any two equipment is not exactly the same;Target data includes: private key or private key encryption text
Part.
Using device provided in an embodiment of the present invention, digital wallet equipment can be when receiving data recovery instruction, really
The fixed and digital wallet equipment establishes the first identifier for having the first storage equipment of communication connection, and determines and the first storage equipment
The second identifier of second storage equipment of plug electrical connection.It is then possible to be determined based on the first identifier and the second identifier
An equipment of data to be restored in digital wallet equipment, the first storage equipment and the second storage equipment, and by the number to be restored
According to equipment as target device.Later, it can use the subdata that non-targeted equipment is stored to restore needed for target device
The subdata of storage.Wherein, after the subdata of the storage needed for target device is restored, each non-targeted equipment and mesh
Two one's share of expenses for a joint undertaking data being stored in marking device in the first subdata, the second subdata and third subdata, and any two equipment
The subdata of middle storage is not exactly the same.Wherein, first subdata, the second subdata and third subdata are to target data
It is split rear obtained, which includes private key or private key encryption file.In this way, realizing to institute in target device
The recovery for the subdata that need to be stored.Furthermore, it is possible to pass through the digital wallet equipment, the first storage equipment and the second storage equipment pair
First subdata, the second subdata and third subdata carry out dispersion storage, increase the difficulty that malicious user steals private key, thus
The safety of private key is improved, and then can guarantee the safety of assets in digital wallet.
Optionally, in one embodiment of the invention, the second determining module 302 may include:
Judging submodule, for judging whether recorded first identifier and second identifier in digital wallet equipment;
First determines submodule, in the digital wallet equipment record have first identifier and do not recorded second identifier
When, determine that the second storage equipment is the target device of data to be restored.
Optionally, in another embodiment of the present invention, the second determining module 302 can also include:
Second determines submodule, in the digital wallet equipment record have second identifier and do not recorded first identifier
When, determine that the first storage equipment is the target device of data to be restored.
Optionally, in yet another embodiment of the present invention, the second determining module 302 can also include:
Third determines submodule, for determining when not recorded second identifier and first identifier in digital wallet equipment
Digital wallet equipment is the target device of data to be restored.
Optionally, third determines that submodule specifically can be used for:
If record has first identifier and has not recorded second identifier in digital wallet equipment, detection second identifier corresponding the
Whether two storage equipment are initialization apparatus;
If the second storage equipment is initialization apparatus, determine that the second storage equipment is the target device of data to be restored.
Optionally, in embodiments of the present invention, which can also include:
Detection module, for after receiving data and restoring instruction, and it is determining establish with digital wallet equipment have it is logical
The first identifier of first storage equipment of letter connection, and determine the second storage equipment being electrically connected with the first storage equipment plug
Before second identifier, whether detection digital wallet equipment stores equipment with first and establishes communication connection, and the first storage equipment
Whether plug is electrically connected to the second storage equipment;
Cue module, for not establishing communication connection, and the first storage with the first storage equipment when digital wallet equipment
Equipment does not plug when being electrically connected to the second storage equipment, and user is prompted to establish the communication of digital wallet equipment and the first storage equipment
Connection, and prompt user that the first storage equipment plug is electrically connected to the second storage equipment.
Optionally, in embodiments of the present invention, cue module specifically can be used for:
Prompt user establishes digital wallet equipment and connects with the wireless communication of the first storage equipment;Wherein, wireless communication connects
Connect includes: Bluetooth communication connection or the connection of wireless near field communication NFC communication.
Optionally, in embodiments of the present invention, the first subdata, the second subdata and third subdata are secret using presetting
What close partitioning algorithm was split target data.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of digital wallet equipment, referring to fig. 4, should
Digital wallet equipment includes processor 401, communication interface 402, memory 403 and communication bus 404, wherein processor 401,
Communication interface 402, memory 403 complete mutual communication by communication bus 404,
Memory 403, for storing computer program;
Processor 401 when for executing the program stored on memory 403, realizes any of the above-described item data recovery side
The method and step of method.
In embodiments of the present invention, digital wallet equipment can be when receiving data recovery instruction, the determining and number
Wallet equipment establishes the first identifier for having the first storage equipment of communication connection, and determines and be electrically connected with the first storage equipment plug
Second storage equipment second identifier.It is then possible to determine that digital wallet is set based on the first identifier and the second identifier
An equipment of data to be restored in standby, the first storage equipment and the second storage equipment, and the equipment of the data to be restored is made
For target device.Later, it can use the subdata that non-targeted equipment is stored to restore the subnumber stored needed for target device
According to.Wherein, it after the subdata of the storage needed for target device is restored, is deposited in each non-targeted equipment and target device
Contain two one's share of expenses for a joint undertaking data in the first subdata, the second subdata and third subdata, and the son stored in any two equipment
Data transformation is identical.Wherein, first subdata, the second subdata and third subdata are after being split to target data
Obtained, which includes private key or private key encryption file.In this way, realizing the son to storage required in target device
The recovery of data.Furthermore, it is possible to by the digital wallet equipment, the first storage equipment and the second storage equipment to the first subnumber
Dispersion storage is carried out according to, the second subdata and third subdata, increases malicious user and steals the difficulty of private key, to improve private
The safety of key, and then can guarantee the safety of assets in digital wallet.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, the readable storages
Dielectric memory contains computer program, and the side of any of the above-described data reconstruction method is realized when computer program is executed by processor
Method step.
The computer program stored in readable storage medium storing program for executing provided in an embodiment of the present invention is by the processing of digital wallet equipment
After device executes, digital wallet equipment can be when receiving data recovery instruction, and determination has logical with digital wallet equipment foundation
The first identifier of first storage equipment of letter connection, and determine the second storage equipment being electrically connected with the first storage equipment plug
Second identifier.It is then possible to determined based on the first identifier and the second identifier digital wallet equipment, the first storage equipment and
An equipment of data to be restored in second storage equipment, and using the equipment of the data to be restored as target device.Later, may be used
Restore the subdata of storage needed for target device with the subdata stored using non-targeted equipment.Wherein, it is set to target
After the subdata of standby required storage is restored, the first subdata, the are stored in each non-targeted equipment and target device
Two one's share of expenses for a joint undertaking data in two subdatas and third subdata, and the subdata stored in any two equipment is not exactly the same.Its
In, first subdata, the second subdata and third subdata are that rear obtained, the number of targets is split to target data
According to including private key or private key encryption file.In this way, realizing the recovery of the subdata to storage required in target device.Moreover,
It can be by the digital wallet equipment, the first storage equipment and the second storage equipment to the first subdata, the second subdata and the
Three subdatas carry out dispersion storage, increase malicious user and steal the difficulty of private key, to improve the safety of private key, Jin Erke
To guarantee the safety of assets in digital wallet.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of application programs, when it is in digital wallet
When being run in equipment, so that digital wallet equipment executes: the method and step of any of the above-described data reconstruction method.
After application program provided in an embodiment of the present invention is executed by the processor of digital wallet equipment, digital wallet equipment can
It is determining that the of the first storage equipment for having communication connection is established with the digital wallet equipment with when receiving data and restoring instruction
One mark, and determine the second identifier for the second storage equipment being electrically connected with the first storage equipment plug.It is then possible to based on should
First identifier and the second identifier store data to be restored in equipment to determine that digital wallet equipment, first store equipment and second
An equipment, and using the equipment of the data to be restored as target device.Later, it can use what non-targeted equipment was stored
Subdata restores the subdata stored needed for target device.Wherein, the subdata of the storage needed for target device carries out extensive
After multiple, it is stored in each non-targeted equipment and target device in the first subdata, the second subdata and third subdata
Two one's share of expenses for a joint undertaking data, and the subdata stored in any two equipment is not exactly the same.Wherein, first subdata, the second subnumber
According to third subdata be target data is split it is rear obtained, the target data include private key or private key encryption text
Part.In this way, realizing the recovery of the subdata to storage required in target device.Furthermore, it is possible to by the digital wallet equipment,
First storage equipment and the second storage equipment carry out dispersion storage to the first subdata, the second subdata and third subdata, increase
Add malicious user to steal the difficulty of private key, to improve the safety of private key, and then can guarantee assets in digital wallet
Safety.
The communication bus that above-mentioned digital wallet equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral
Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, control bus etc..For just
It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned digital wallet equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), also may include non-easy
The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also
To be storage device that at least one is located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processing, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete
Door or transistor logic, discrete hardware components.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program
Product includes one or more computer instructions.When loading on computers and executing the computer program instructions, all or
It partly generates according to process or function described in the embodiment of the present invention.The computer can be general purpose computer, dedicated meter
Calculation machine, computer network or other programmable devices.The computer instruction can store in computer readable storage medium
In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer
Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center
User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or
Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or
It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with
It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk
Solid State Disk (SSD)) etc..
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device,
For digital wallet equipment and readable storage medium storing program for executing, since it is substantially similar to the method embodiment, so be described relatively simple,
The relevent part can refer to the partial explaination of embodiments of method.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (10)
1. a kind of data reconstruction method, which is characterized in that be applied to digital wallet equipment, which comprises
When receiving data recovery instruction, determining have communication connection with digital wallet equipment foundation first stores equipment
First identifier, and determining second be electrically connected with the first storage equipment plug stores the second identifier of equipment;
Based on the first identifier and the second identifier, the digital wallet equipment, the first storage equipment and institute are determined
An equipment for stating data to be restored in the second storage equipment, as target device;
The subdata stored using the non-targeted equipment restores the subdata stored needed for the target device;Wherein, exist
After restoring to the subdata of storage needed for the target device, stored in each non-targeted equipment and the target device
Have: two one's share of expenses for a joint undertaking data target data being split in obtained first subdata, the second subdata and third subdata,
And the subdata stored in any two equipment is not exactly the same;The target data includes: private key or private key encryption file.
2. the method according to claim 1, wherein it is described be based on the first identifier and the second identifier,
Determine the digital wallet equipment, in the first storage equipment and the second storage equipment one of data to be restored set
It is standby, the step of as target device, comprising:
Judge whether recorded the first identifier and the second identifier in the digital wallet equipment;
If record has the first identifier and do not recorded the second identifier in the digital wallet equipment, described second is determined
Store the target device that equipment is data to be restored.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
If record has the second identifier and do not recorded the first identifier in the digital wallet equipment, described first is determined
Store the target device that equipment is data to be restored.
4. according to the method described in claim 2, it is characterized in that, the method also includes:
If not recorded the second identifier and the first identifier in the digital wallet equipment, determine that the digital wallet is set
Standby is the target device of data to be restored.
5. if according to the method described in claim 2, it is characterized in that, record has described the in the digital wallet equipment
One identifies and has not recorded the second identifier, determines that the second storage equipment is the step of the target device of data to be restored
Suddenly, comprising:
If record has the first identifier and has not recorded the second identifier in the digital wallet equipment, detection described second
Identify whether the corresponding second storage equipment is initialization apparatus;
If the second storage equipment is initialization apparatus, determine that the second storage equipment is that the target of data to be restored is set
It is standby.
6. method according to any one of claims 1-5, which is characterized in that after receiving data and restoring instruction,
And the first identifier for having the first storage equipment of communication connection is established in the determination and the digital wallet equipment, and determine with
Before the step of second identifier of second storage equipment of the first storage equipment plug electrical connection, the method also includes:
Detect whether the digital wallet equipment with the first storage equipment establishes communication connection, and described first stores and set
Standby whether plug is electrically connected to the second storage equipment;
If it is not, prompt user establishes the communication connection of the digital wallet equipment and the first storage equipment, and prompt user
The first storage equipment plug is electrically connected to the second storage equipment.
7. according to the method described in claim 6, it is characterized in that, the prompt user establishes the digital wallet equipment and institute
The step of stating the communication connection of the first storage equipment, comprising:
Prompt user establishes the digital wallet equipment and connects with the wireless communication of the first storage equipment;Wherein, the nothing
Line communication connection includes: Bluetooth communication connection or the connection of wireless near field communication NFC communication.
8. a kind of Data Recapture Unit, which is characterized in that be applied to digital wallet equipment, described device includes:
First determining module, for when receiving data recovery instruction, determining establish with the digital wallet equipment to have communication
The first identifier of first storage equipment of connection, and determining the second storage equipment being electrically connected with the first storage equipment plug
Second identifier;
Second determining module determines the digital wallet equipment, described for being based on the first identifier and the second identifier
An equipment of data to be restored in first storage equipment and the second storage equipment, as target device;
Recovery module, the subdata for being stored using the non-targeted equipment restore storage needed for the target device
Subdata;Wherein, after the subdata of the storage needed for the target device is restored, each non-targeted equipment and described
It is stored in target device: obtained first subdata, the second subdata and third subdata is split to target data
In two one's share of expenses for a joint undertaking data, and the subdata stored in any two equipment is not exactly the same;The target data includes: private key
Or private key encryption file.
9. a kind of digital wallet equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein
Processor, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the program stored on memory, realizes any method step in claim 1-7
Suddenly.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter in the readable storage medium storing program for executing
Any method and step in claim 1-7 is realized when calculation machine program is executed by processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811141408.5A CN109240858A (en) | 2018-09-28 | 2018-09-28 | Data recovery method and device, digital wallet equipment and readable storage medium |
PCT/CN2019/105466 WO2020063354A1 (en) | 2018-09-28 | 2019-09-11 | Block chain private key storage and recovery method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811141408.5A CN109240858A (en) | 2018-09-28 | 2018-09-28 | Data recovery method and device, digital wallet equipment and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109240858A true CN109240858A (en) | 2019-01-18 |
Family
ID=65053996
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811141408.5A Pending CN109240858A (en) | 2018-09-28 | 2018-09-28 | Data recovery method and device, digital wallet equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109240858A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020063354A1 (en) * | 2018-09-28 | 2020-04-02 | 北京金山安全软件有限公司 | Block chain private key storage and recovery method, device and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6754820B1 (en) * | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
CN101359981A (en) * | 2008-09-27 | 2009-02-04 | 腾讯科技(深圳)有限公司 | Method, apparatus and system for data packet redundant encoding and decoding |
CN101621375A (en) * | 2009-07-28 | 2010-01-06 | 成都市华为赛门铁克科技有限公司 | Method, device and system for managing key |
CN101694778A (en) * | 2009-09-27 | 2010-04-14 | 卢林发 | Method for preventing loss of data and movable data memory |
CN102685199A (en) * | 2012-01-18 | 2012-09-19 | 吴昊 | File safety storage method based on multiple network nodes |
-
2018
- 2018-09-28 CN CN201811141408.5A patent/CN109240858A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6754820B1 (en) * | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
CN101359981A (en) * | 2008-09-27 | 2009-02-04 | 腾讯科技(深圳)有限公司 | Method, apparatus and system for data packet redundant encoding and decoding |
CN101621375A (en) * | 2009-07-28 | 2010-01-06 | 成都市华为赛门铁克科技有限公司 | Method, device and system for managing key |
CN101694778A (en) * | 2009-09-27 | 2010-04-14 | 卢林发 | Method for preventing loss of data and movable data memory |
CN102685199A (en) * | 2012-01-18 | 2012-09-19 | 吴昊 | File safety storage method based on multiple network nodes |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020063354A1 (en) * | 2018-09-28 | 2020-04-02 | 北京金山安全软件有限公司 | Block chain private key storage and recovery method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106779636B (en) | Block chain digital currency wallet based on mobile phone earphone interface | |
US10050982B1 (en) | Systems and methods for reverse-engineering malware protocols | |
Yang | Security enhanced EMV-based mobile payment protocol | |
CN111383021B (en) | Node management method, device, equipment and medium based on block chain network | |
WO2020060094A1 (en) | Node device constituting blockchain network and method for operation of node device | |
CN109756582A (en) | Information recording method, device, node and storage medium in block chain network | |
CN108701188A (en) | In response to detecting the potential system and method for extorting software for modification file backup | |
EP3200167A1 (en) | Information transaction infrastructure | |
WO2016164275A1 (en) | Security system for data communications including key management and privacy | |
EP3031001A1 (en) | Secure data storage | |
CN110599342B (en) | Block chain-based identity information authorization method and device | |
CN109474420A (en) | A kind of private key backup method and relevant device | |
EP3967019A1 (en) | Transferring digital assets possession over a unidirectional connection | |
CN109076054A (en) | System and method for managing the encryption key of single-sign-on application program | |
CN111401895A (en) | Decentralized chain-crossing transfer-in and transfer-out method and system | |
US20150288703A1 (en) | Data possession verification system and method | |
CN110009339A (en) | Data processing method and device based on block chain | |
CN113326515A (en) | Control method, control program, and information processing apparatus | |
CN109146468A (en) | A kind of backup and restoration methods of the logical card of number | |
CN106685945B (en) | Service request processing method, service handling number verification method and terminal thereof | |
CN108229210A (en) | A kind of method, terminal and computer readable storage medium for protecting data | |
CN108121904A (en) | Unlocking method, device, electronic equipment and server | |
US20130138571A1 (en) | Systems and Protocols for Anonymous Mobile Payments with Personal Secure Devices | |
CN109240858A (en) | Data recovery method and device, digital wallet equipment and readable storage medium | |
EP3340094B1 (en) | Method for renewal of cryptographic whiteboxes under binding of new public key and old identifier |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |