CN103490878A - Methods for dynamic secret key storing and stored secret key reading and deleting - Google Patents

Methods for dynamic secret key storing and stored secret key reading and deleting Download PDF

Info

Publication number
CN103490878A
CN103490878A CN201310482716.5A CN201310482716A CN103490878A CN 103490878 A CN103490878 A CN 103490878A CN 201310482716 A CN201310482716 A CN 201310482716A CN 103490878 A CN103490878 A CN 103490878A
Authority
CN
China
Prior art keywords
key system
cipher key
jump
secret key
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310482716.5A
Other languages
Chinese (zh)
Other versions
CN103490878B (en
Inventor
沈树康
李红兵
黄强
卞正青
李金梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai SAND Information Technology System Co Ltd
Original Assignee
Shanghai SAND Information Technology System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai SAND Information Technology System Co Ltd filed Critical Shanghai SAND Information Technology System Co Ltd
Priority to CN201310482716.5A priority Critical patent/CN103490878B/en
Publication of CN103490878A publication Critical patent/CN103490878A/en
Application granted granted Critical
Publication of CN103490878B publication Critical patent/CN103490878B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses methods for dynamic secret key storing and stored secret key reading and deleting. The storing method comprises the steps of firstly judging whether a secret key system is established or not, establishing the secret key system and storing secret key information in the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, and encrypting the secret key information after the secret key information is searched; the reading method comprises the steps of firstly judging whether the secret key system is established or not, establishing the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, decrypting the secret key information after the secret key information is searched, and reading the secret key information; the deleting method comprises the steps of firstly judging whether the secret key system is established or not, exiting the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, and deleting the secret key information after the secret key information is searched. The methods are based on a multi-application system, the limitations to secret key index rows/columns and limitations to secret key group number are solved, and meanwhile, the utilization ratio of relatively-tight storage resources of embedded devices is increased greatly on the basis that the needs of customers on the maximum number of applications are met.

Description

A kind of key dynamic storage method and the storage after read, delet method
Technical field
The present invention relates to reading after a kind of key dynamic storage method and storage, delet method, can be used for the financial terminal product and other relate to the product of information security, belong to information security field.
Background technology
What traditional financial terminal equipment (EFT-POS) key storage adopted is static storage mode, and is limited to the configuration of hardware, generally can only store the 5*10 group key.What early stage POS terminal adopted is single application system, and an equipment can only be installed a set of application program, so, for single cover application, 50 group keys are enough.But the continuous increase along with the market demand, present POS terminal all progressively starts to adopt many application systems, an equipment is installed many cover application simultaneously, and different application all needs to store several groups of even tens group keys, more and more to the requirement of single device number of applications in the face of market, traditional key storage mode is the demand of satisfying the market more.And the index of traditional secrete key storage is all generally the mode that adopts the row and column combination, restriction based on 5*10, row can only be 0-4, row can only be 0-9, this is for the fail safe of key itself, and the alternative of cipher key index all has been subject to very large challenge and restriction.
Because old cipher key system is to be based upon on the storage chip that separate space is very little, size only has the memory space of 5*10*8 byte, so old key storage mode, this memory space of direct control hardware, the row and column combination of usining inside program is operated memory space as index.Row (0-4), row (0-9).Key is that stored in clear is in the hardware memory space the inside.
Summary of the invention
The technical problem to be solved in the present invention is: the large capacity quick storage of a kind of energy be provided and read and have reading after the key dynamic storage method of safety protection function and storage, delet method, having solved the circumscribed problem of memory capacity of existing key storage system.
In order to solve the problems of the technologies described above, technical scheme of the present invention has been to provide a kind of key dynamic storage method, it is characterized in that, comprises the following steps:
Step 1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 1-2; If cipher key system creates, jump to step 1-3;
Step 1-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 1-7;
Step 1-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 1-4; If there is no, jump to step 1-5;
Step 1-4: find corresponding concordance list group, jump to step 1-8;
Step 1-5: whether the application number allotment that judges current preset is full, if full, jumps to step 1-6; If also available free, jump to step 1-7;
Step 1-6: exit this cipher key system;
Step 1-7: select an idle concordance list group, jump to step 1-11;
Step 1-8: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 1-9; If index does not exist, jump to step 1-10;
Step 1-9: read by call number the particular location that key information is present in the key storage space, jump to step 1-13;
Step 1-10: judge whether available free key storage space, if having, jump to step 1-11; If no, jump to step 1-6;
Step 1-11: select the memory location of the key storage space of 1 free time as current key, and sorted in selected key storage position to this, jumps to step 1-12;
Step 1-12: upgrade concordance list group information, jump to step 1-9;
Step 1-13: by encryption chip, the key plain that store is encrypted to ciphertext, then is stored in corresponding position, jump to step 1-14;
Step 1-14: upgrade cipher key system.
Preferably, described establishment cipher key system comprises the following steps:
Step 4-1: the variable of definition cipher key system structure size, initialization simultaneously;
Step 4-2: configuring cipher key system basic information region data;
Step 4-3: the key file that creates corresponding size according to the size of cipher key system structure;
Step 4-4: the data of cipher key system structure variable are written in key file, create cipher key system and complete.
Preferably, described cipher key system structure comprises cipher key system essential information, cipher key system index information, key storage spatial information.
Preferably, in described step 4-2, configuring cipher key system basic information region data are specially and read the current system time as the cipher key system creation-time, and the cipher key system sign is configured to successfully indicate.
Read method after a kind of key dynamic memory, is characterized in that, comprises the following steps:
Step 2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 2-2; If cipher key system creates, jump to step 2-3;
Step 2-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 2-6;
Step 2-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 2-4; If there is no, jump to step 2-6;
Step 2-4: find corresponding concordance list group, jump to step 2-5;
Step 2-5: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 2-7; If index does not exist, jump to step 2-6;
Step 2-6: exit this cipher key system;
Step 2-7: read by call number the particular location that key information is present in the key storage space, jump to step 2-8;
Step 2-8: read the information of this location key, jump to step 2-9;
Step 2-9: use the encryption chip decryption key information.
Delet method after a kind of key dynamic memory, is characterized in that, comprises following three kinds of deletion modes:
(1) cipher key system is deleted:
Step 3-1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-1-2; If cipher key system creates, jump to step 3-1-3;
Step 3-1-2: exit this cipher key system;
Step 3-1-3: change cipher key system essential information is not designated and creates;
(2) delete certain cover application:
Step 3-2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-2-2; If cipher key system creates, jump to step 3-2-3;
Step 3-2-2: exit this cipher key system;
Step 3-2-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 3-2-4; If there is no, jump to step 3-2-2;
Step 3-2-4: find corresponding concordance list group, jump to step 3-2-5;
Step 3-2-5: change manipulative indexing table group is designated the free time, jumps to step 3-2-6;
Step 3-2-6: change cipher key system essential information;
(3) delete certain group key under certain cover application:
Step 3-3-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-3-2; If cipher key system creates, jump to step 3-3-3;
Step 3-3-2: exit this cipher key system;
Step 3-3-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 3-3-4; If there is no, jump to step 3-3-2;
Step 3-3-4: find corresponding concordance list group, jump to step 3-2-5;
Step 3-3-5: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 3-3-6; If index does not exist, jump to step 3-3-2;
Step 3-3-6: read by call number the particular location that key information is present in the key storage space, jump to step 3-3-7;
Step 3-3-7: the change corresponding stored is designated the free time, jumps to step 3-2-8;
Step 3-3-8: upgrade index table information.
The present invention is reading after a kind of brand-new key dynamic storage method for financial POS terminal and of this sort information safety devices and storage, delet method.The method is based on many application systems, solved restriction and the restriction of set of cipher key number of ranks in the cipher key index, simultaneously, increased the safe storage mechanism of key, quick search mechanism, deleting mechanism etc. flexibly, can inquire about fast, add and delete key, on the Demand Base of the maximum application program quantity that meets the client, greatly improved the embedded device utilance of nervous memory resource relatively, the method that can effectively save memory space simultaneously.
The present invention also has following advantage:
(1) can support the nearly key storage of 10 cover application, can meet the need of market fully;
(2) every cover application maximum is supported 800 group keys, has solved the problem of key storage insufficient space;
(3) ranks in call number are counted span and are 0~255, can meet the requirement of client to the call number resource fully;
(4) key storage adopts the storage mode of dynamic assignment, order sequence, so can read fast and preserve key, and, without the memory space that distributes in advance whole 256 * 256, greatly improved the embedded device utilance of nervous memory resource relatively;
(5) key storage all adopts encrypted test mode, and the encryption and decryption of ciphertext operation all processes by encryption chip, has greatly strengthened the fail safe of cipher key system;
(6) key storage is corresponding with concrete application, so very convenient delete function flexibly can be provided, that is: can support to delete whole cipher key system, deletes all keys corresponding to certain cover application, delete certain group key corresponding to certain cover application.
The accompanying drawing explanation
Fig. 1 is cipher key system essential information structure chart;
Fig. 2 is the concordance list structure chart;
Fig. 3 is key storage space structure figure;
The flow chart that Fig. 4 is the cipher key system memory function;
The flow chart that Fig. 5 is the cipher key system read functions;
The flow chart that Fig. 6 is the cipher key system delete function;
Fig. 7 is for creating the flow chart of key.
Embodiment
For the present invention is become apparent, hereby with preferred embodiment, and coordinate accompanying drawing to be described in detail below.
The present invention is by selecting one independently to have the main control chip of nonvolatile mass storage in sheet and the safety chip of an encryption and decryption special use is realized, wherein, the memory space of cipher key system is divided into 3 parts: the 1st part is to record the essential information of cipher key system, as shown in Figure 1, the cipher key system essential information comprises that cipher key system exists the application (the current application key existed) of sign, cipher key system creation-time, the current existence of cipher key system, concrete application message (application number that key is corresponding) etc.; The 2nd part is cipher key index information, employing be the sortord of dichotomy, corresponding one group of different application number independently sorts, every group of beginning simultaneously comprises the sign whether this group has been used; The 3rd part is exactly the real key information of storage, and as shown in Figure 3, it comprises that free mark, the 1st group are to the 800th group key information.Wherein, what the key of storage all adopted is the encrypted test mode storage, and the operation of key encryption and decryption is to process by independent encryption chip, has so just guaranteed the fail safe of key storage and use fully.
As shown in Figure 2, the concordance list structure in the present embodiment is applied as example with 10 covers, and it comprises free mark, group number, the 1st group to the 800th group key index.
As shown in Figure 4, be the flow chart of cipher key system memory function.In financial POS terminal equipment, application, for the use of key, can only be that corresponding key is used in corresponding application, can not use the key that non-self application number is corresponding, so, in cipher key system, application number is the Constitution Elements an of necessity.Consider that most POS application programs are all to adopt row and column to identify as cipher key index, in order to keep compatible, so concordance list of the present invention is also to adopt ranks to identify as index.During key storage, must bring application number and call number into, wherein, call number is comprised of 2 bytes, and the 1st byte represents line number, and the 2nd byte represents columns, and application number also is comprised of 2 bytes, supports at most 65536 cover application programs on representation theory.
During key storage, its storage content is: application number A, call number B, key information C.
A kind of key dynamic storage method comprises the following steps:
Step 1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, consider that thereby the hardware memory random value that powers on may repeat cause erroneous judgement with prefabricated value, this sign is defined as 3 bytes, value is 0xaa, thereby at utmost reduce hardware data, disturbs, and has guaranteed the high reliability of system, if cipher key system does not create, jump to step 1-2; If cipher key system creates, jump to step 1-3;
Step 1-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 1-7;
Step 1-3: start to search from cipher key system essential information the inside, whether have the application number A that will preserve key, if exist, jump to step 1-4; If there is no, jump to step 1-5;
Step 1-4: find the concordance list group that A is corresponding, jump to step 1-8;
Step 1-5: whether the application number allotment (concordance list group number) that judges current preset has expired (accompanying drawing 2, Fig. 3 are applied as example with 10 covers), if full, jumps to step 1-6; If also available free, jump to step 1-7;
Step 1-6: exit this cipher key system;
Step 1-7: select an idle concordance list group, jump to step 1-11;
Step 1-8: after finding the concordance list group that A is corresponding, whether the index that to search current call number be B exists, because corresponding 800 group indexes of a group index table, index search efficiency according to the order of sequence is very low, so this cipher key system adopts the sequence storage, the mode of binary search, greatly improved the efficiency of index search, if index exists, jump to step 1-9; If index does not exist, jump to step 1-10;
Step 1-9: read by call number the particular location that key information is present in the key storage space, jump to step 1-13;
Step 1-10: judge whether available free key storage space, if having, jump to step 1-11; If no, jump to step 1-6;
Step 1-11: select the memory location of the key storage space of 1 free time as current key, and sorted in selected key storage position to this, jumps to step 1-12;
Step 1-12: upgrade concordance list group information, jump to step 1-9;
Step 1-13: by encryption chip, the key plain that will store (being key information C) is encrypted to ciphertext, then be stored in corresponding position, the advantage of design is like this, be difficult to find concrete key by ranks, even and if find also and can only obtain ciphertext, can't decode and obtain expressly, so data are very safe, jump to step 1-14;
Step 1-14: upgrade cipher key system.
Wherein, creating cipher key system comprises the following steps:
Step 4-1: the variable of definition cipher key system structure size, initialization simultaneously, the cipher key system structure comprises cipher key system essential information, cipher key system index information, key storage spatial information;
Step 4-2: configuring cipher key system basic information region data, read the current system time as the cipher key system creation-time, the cipher key system sign is configured to successfully indicate;
Step 4-3: the key file that creates corresponding size according to the size of cipher key system structure;
Step 4-4: the data of cipher key system structure variable are written in key file, create cipher key system and complete.
As shown in Figure 5, be the flow chart of cipher key system read functions.The memory function of its principle and Fig. 4 is the same, unique when different, when finding that application number or call number do not exist, has just exited, and no longer continues to carry out.But, in order to guarantee whole cipher key system and can be from the normal operation of initial condition, if find non-existent words while reading key, system all can be fixed and be usingd one group of default value key and return to financial POS terminal equipment as key information.
When key reads, its reading of content is: application number A, call number B.
Read method after a kind of key dynamic memory comprises the following steps:
Step 2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 2-2; If cipher key system creates, jump to step 2-3;
Step 2-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 2-6;
Step 2-3: start to search from cipher key system essential information the inside, whether have the application number A that will preserve key, if exist, jump to step 2-4; If there is no, jump to step 2-6;
Step 2-4: find the concordance list group that A is corresponding, jump to step 2-5;
Step 2-5: after finding the concordance list group that A is corresponding, search by the mode of binary search the index that current call number is B and whether exist, if index exists, jump to step 2-7; If index does not exist, jump to step 2-6;
Step 2-6: exit this cipher key system;
Step 2-7: read by call number the particular location that key information is present in the key storage space, jump to step 2-8;
Step 2-8: read the information of this location key, jump to step 2-9;
Step 2-9: use the encryption chip decryption key information.
As shown in Figure 6, be the flow chart of cipher key system delete function.A demand of often carrying for the client, to delete the key that application is preserved while deleting exactly client's application program simultaneously, for old static keys system, be difficult to realize, and for present dynamic key system, just be very easy to realize, as long as known application number, just can delete all key informations below this application number.
Delet method after a kind of key dynamic memory comprises following three kinds of deletion modes:
(1) cipher key system is deleted:
Step 3-1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-1-2; If cipher key system creates, jump to step 3-1-3;
Step 3-1-2: exit this cipher key system;
Step 3-1-3: change cipher key system essential information is not designated and creates;
(2) delete certain cover application A:
Step 3-2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-2-2; If cipher key system creates, jump to step 3-2-3;
Step 3-2-2: exit this cipher key system;
Step 3-2-3: start to search from cipher key system essential information the inside, whether have the application number A that will preserve key, if exist, jump to step 3-2-4; If there is no, jump to step 3-2-2;
Step 3-2-4: find the concordance list group that A is corresponding, jump to step 3-2-5;
Step 3-2-5: change manipulative indexing table group is designated the free time, jumps to step 3-2-6;
Step 3-2-6: change cipher key system essential information;
(3) delete certain the group key B under certain cover application A:
Step 3-3-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-3-2; If cipher key system creates, jump to step 3-3-3;
Step 3-3-2: exit this cipher key system;
Step 3-3-3: start to search from cipher key system essential information the inside, whether have the application number A that will preserve key, if exist, jump to step 3-3-4; If there is no, jump to step 3-3-2;
Step 3-3-4: find the concordance list group that A is corresponding, jump to step 3-2-5;
Step 3-3-5: after finding the concordance list group that A is corresponding, search by the mode of binary search the index that current call number is B and whether exist, if index exists, jump to step 3-3-6; If index does not exist, jump to step 3-3-2;
Step 3-3-6: read by call number the particular location that key information is present in the key storage space, jump to step 3-3-7;
Step 3-3-7: the change corresponding stored is designated the free time, jumps to step 3-2-8;
Step 3-3-8: upgrade index table information.
The present invention by for the utilization of application number and the storage mode of dynamic order, can inquire about, adds and delete key fast, and due to key storage based on application number, so very convenient and flexible for the deletion action of key.Under the prerequisite that meets client's maximum application program requirements, greatly saved limited memory space simultaneously.In addition, by adopting safety chip, key information is carried out to the encryption and decryption operation, there is very high fail safe.

Claims (6)

1. a key dynamic storage method, is characterized in that, comprises the following steps:
Step 1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 1-2; If cipher key system creates, jump to step 1-3;
Step 1-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 1-7;
Step 1-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 1-4; If there is no, jump to step 1-5;
Step 1-4: find corresponding concordance list group, jump to step 1-8;
Step 1-5: whether the application number allotment that judges current preset is full, if full, jumps to step 1-6; If also available free, jump to step 1-7;
Step 1-6: exit this cipher key system;
Step 1-7: select an idle concordance list group, jump to step 1-11;
Step 1-8: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 1-9; If index does not exist, jump to step 1-10;
Step 1-9: read by call number the particular location that key information is present in the key storage space, jump to step 1-13;
Step 1-10: judge whether available free key storage space, if having, jump to step 1-11; If no, jump to step 1-6;
Step 1-11: select the memory location of the key storage space of 1 free time as current key, and sorted in selected key storage position to this, jumps to step 1-12;
Step 1-12: upgrade concordance list group information, jump to step 1-9;
Step 1-13: by encryption chip, the key plain that store is encrypted to ciphertext, then is stored in corresponding position, jump to step 1-14;
Step 1-14: upgrade cipher key system.
2. a kind of key dynamic storage method as claimed in claim 1, is characterized in that, described establishment cipher key system comprises the following steps:
Step 4-1: the variable of definition cipher key system structure size, initialization simultaneously;
Step 4-2: configuring cipher key system basic information region data;
Step 4-3: the key file that creates corresponding size according to the size of cipher key system structure;
Step 4-4: the data of cipher key system structure variable are written in key file, create cipher key system and complete.
3. a kind of key dynamic storage method as claimed in claim 2, is characterized in that, described cipher key system structure comprises cipher key system essential information, cipher key system index information, key storage spatial information.
4. a kind of key dynamic storage method as claimed in claim 2, it is characterized in that, in described step 4-2, configuring cipher key system basic information region data are specially and read the current system time as the cipher key system creation-time, and the cipher key system sign is configured to successfully indicate.
5. the read method after a kind of key dynamic memory as claimed in claim 1, is characterized in that, comprises the following steps:
Step 2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 2-2; If cipher key system creates, jump to step 2-3;
Step 2-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 2-6;
Step 2-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 2-4; If there is no, jump to step 2-6;
Step 2-4: find corresponding concordance list group, jump to step 2-5;
Step 2-5: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 2-7; If index does not exist, jump to step 2-6;
Step 2-6: exit this cipher key system;
Step 2-7: read by call number the particular location that key information is present in the key storage space, jump to step 2-8;
Step 2-8: read the information of this location key, jump to step 2-9;
Step 2-9: use the encryption chip decryption key information.
6. the delet method after a kind of key dynamic memory as claimed in claim 1, is characterized in that, comprises following three kinds of deletion modes:
(1) cipher key system is deleted:
Step 3-1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-1-2; If cipher key system creates, jump to step 3-1-3;
Step 3-1-2: exit this cipher key system;
Step 3-1-3: change cipher key system essential information is not designated and creates;
(2) delete certain cover application:
Step 3-2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-2-2; If cipher key system creates, jump to step 3-2-3;
Step 3-2-2: exit this cipher key system;
Step 3-2-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 3-2-4; If there is no, jump to step 3-2-2;
Step 3-2-4: find corresponding concordance list group, jump to step 3-2-5;
Step 3-2-5: change manipulative indexing table group is designated the free time, jumps to step 3-2-6;
Step 3-2-6: change cipher key system essential information;
(3) delete certain group key under certain cover application:
Step 3-3-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-3-2; If cipher key system creates, jump to step 3-3-3;
Step 3-3-2: exit this cipher key system;
Step 3-3-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 3-3-4; If there is no, jump to step 3-3-2;
Step 3-3-4: find corresponding concordance list group, jump to step 3-2-5;
Step 3-3-5: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 3-3-6; If index does not exist, jump to step 3-3-2;
Step 3-3-6: read by call number the particular location that key information is present in the key storage space, jump to step 3-3-7;
Step 3-3-7: the change corresponding stored is designated the free time, jumps to step 3-2-8;
Step 3-3-8: upgrade index table information.
CN201310482716.5A 2013-10-15 2013-10-15 Reading after a kind of key dynamic storage method and storage, delet method Active CN103490878B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310482716.5A CN103490878B (en) 2013-10-15 2013-10-15 Reading after a kind of key dynamic storage method and storage, delet method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310482716.5A CN103490878B (en) 2013-10-15 2013-10-15 Reading after a kind of key dynamic storage method and storage, delet method

Publications (2)

Publication Number Publication Date
CN103490878A true CN103490878A (en) 2014-01-01
CN103490878B CN103490878B (en) 2016-09-21

Family

ID=49830854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310482716.5A Active CN103490878B (en) 2013-10-15 2013-10-15 Reading after a kind of key dynamic storage method and storage, delet method

Country Status (1)

Country Link
CN (1) CN103490878B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107155165A (en) * 2016-03-04 2017-09-12 柯尼卡美能达株式会社 Communication processing system, processing unit and communication processing method
CN107609870A (en) * 2017-09-02 2018-01-19 福建新大陆支付技术有限公司 More application key management method, system and POS terminals for POS
CN108628925A (en) * 2017-12-12 2018-10-09 百富计算机技术(深圳)有限公司 The method that the method for key write-in, key use
CN109086597A (en) * 2018-07-12 2018-12-25 百富计算机技术(深圳)有限公司 Cipher key access method, key management method, storage medium and computer equipment
CN112235102A (en) * 2020-09-29 2021-01-15 北京智芯微电子科技有限公司 Hybrid key storage and management method and storage device
CN112804054A (en) * 2021-01-27 2021-05-14 上海商米科技集团股份有限公司 Financial POS (point of sale) key capacity expansion system and key interaction method between AP (access point) chip and SP (service provider) chip
CN113315626A (en) * 2020-02-27 2021-08-27 阿里巴巴集团控股有限公司 Communication method, key management method, device, system and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1932810A (en) * 2005-09-13 2007-03-21 李晓耕 Method for storing and sharing data utilizing encrypted technology
CN101101617A (en) * 2007-07-13 2008-01-09 华中科技大学 Cipher processor for avoiding reciphering and method for accessing data using same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1932810A (en) * 2005-09-13 2007-03-21 李晓耕 Method for storing and sharing data utilizing encrypted technology
CN101101617A (en) * 2007-07-13 2008-01-09 华中科技大学 Cipher processor for avoiding reciphering and method for accessing data using same

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107155165B (en) * 2016-03-04 2020-09-08 柯尼卡美能达株式会社 Communication processing system, processing device, and communication processing method
CN107155165A (en) * 2016-03-04 2017-09-12 柯尼卡美能达株式会社 Communication processing system, processing unit and communication processing method
CN107609870A (en) * 2017-09-02 2018-01-19 福建新大陆支付技术有限公司 More application key management method, system and POS terminals for POS
CN107609870B (en) * 2017-09-02 2023-05-30 福建新大陆支付技术有限公司 Multi-application key management method and system for POS (point of sale) and POS terminal
CN108628925B (en) * 2017-12-12 2021-05-28 百富计算机技术(深圳)有限公司 Method for writing key and method for using key
CN108628925A (en) * 2017-12-12 2018-10-09 百富计算机技术(深圳)有限公司 The method that the method for key write-in, key use
CN109086597A (en) * 2018-07-12 2018-12-25 百富计算机技术(深圳)有限公司 Cipher key access method, key management method, storage medium and computer equipment
WO2020011100A1 (en) * 2018-07-12 2020-01-16 百富计算机技术(深圳)有限公司 Key access method, key management method, storage medium, and computer device
CN113315626A (en) * 2020-02-27 2021-08-27 阿里巴巴集团控股有限公司 Communication method, key management method, device, system and storage medium
CN113315626B (en) * 2020-02-27 2023-01-10 阿里巴巴集团控股有限公司 Communication method, key management method, device, system and storage medium
CN112235102A (en) * 2020-09-29 2021-01-15 北京智芯微电子科技有限公司 Hybrid key storage and management method and storage device
CN112235102B (en) * 2020-09-29 2023-07-21 北京智芯微电子科技有限公司 Hybrid key storage and management method and storage device
CN112804054A (en) * 2021-01-27 2021-05-14 上海商米科技集团股份有限公司 Financial POS (point of sale) key capacity expansion system and key interaction method between AP (access point) chip and SP (service provider) chip

Also Published As

Publication number Publication date
CN103490878B (en) 2016-09-21

Similar Documents

Publication Publication Date Title
CN103490878A (en) Methods for dynamic secret key storing and stored secret key reading and deleting
CN103150397B (en) A kind of data directory creation method, data retrieval method and system
CN102063385A (en) Memory management method and system
CN103488481A (en) Application program control method, terminal equipment and remote control system
CN102799660A (en) JAVA card object management method
CN101853357A (en) Software protection method
CN102147736B (en) Method and device for installing software
CN104899049A (en) File deletion method and device
CN106033303A (en) Information searching and identifying method and device
CN106303064A (en) A kind of schedule adding method, device and terminal unit
CN101551820B (en) Generation method and apparatus for index database of points of interest attribute
CN103888424A (en) Cluster-type data encryption system and data processing method thereof
CN102568049B (en) Method, device and system for sending student card reading data
DE60135017D1 (en) SELECT THE DATA PACKAGES
CN104834553A (en) Service concurrent processing method for user terminal and user terminal
CN103809947A (en) Automatic release method and system for development requirement
CN102523112A (en) Information processing method and equipment
CN100487657C (en) Method for automatically memory leakage and memory out-of-range in inlaid system
CN107819595B (en) Network slice management device
CN103593310A (en) Method and device for identifying external storage equipment
CN104036773A (en) Method and system for playing recorded text content through anti-counterfeiting identification device
CN105120310A (en) Method and apparatus for playing information
CN110401941B (en) Cache data security management method in esim card
CN107357803A (en) Searching method, mobile device and the device with store function of five application page
CN106485158A (en) A kind of transparent encryption method based on hdfs and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant