CN103490878A - Methods for dynamic secret key storing and stored secret key reading and deleting - Google Patents
Methods for dynamic secret key storing and stored secret key reading and deleting Download PDFInfo
- Publication number
- CN103490878A CN103490878A CN201310482716.5A CN201310482716A CN103490878A CN 103490878 A CN103490878 A CN 103490878A CN 201310482716 A CN201310482716 A CN 201310482716A CN 103490878 A CN103490878 A CN 103490878A
- Authority
- CN
- China
- Prior art keywords
- key system
- cipher key
- jump
- secret key
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses methods for dynamic secret key storing and stored secret key reading and deleting. The storing method comprises the steps of firstly judging whether a secret key system is established or not, establishing the secret key system and storing secret key information in the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, and encrypting the secret key information after the secret key information is searched; the reading method comprises the steps of firstly judging whether the secret key system is established or not, establishing the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, decrypting the secret key information after the secret key information is searched, and reading the secret key information; the deleting method comprises the steps of firstly judging whether the secret key system is established or not, exiting the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, and deleting the secret key information after the secret key information is searched. The methods are based on a multi-application system, the limitations to secret key index rows/columns and limitations to secret key group number are solved, and meanwhile, the utilization ratio of relatively-tight storage resources of embedded devices is increased greatly on the basis that the needs of customers on the maximum number of applications are met.
Description
Technical field
The present invention relates to reading after a kind of key dynamic storage method and storage, delet method, can be used for the financial terminal product and other relate to the product of information security, belong to information security field.
Background technology
What traditional financial terminal equipment (EFT-POS) key storage adopted is static storage mode, and is limited to the configuration of hardware, generally can only store the 5*10 group key.What early stage POS terminal adopted is single application system, and an equipment can only be installed a set of application program, so, for single cover application, 50 group keys are enough.But the continuous increase along with the market demand, present POS terminal all progressively starts to adopt many application systems, an equipment is installed many cover application simultaneously, and different application all needs to store several groups of even tens group keys, more and more to the requirement of single device number of applications in the face of market, traditional key storage mode is the demand of satisfying the market more.And the index of traditional secrete key storage is all generally the mode that adopts the row and column combination, restriction based on 5*10, row can only be 0-4, row can only be 0-9, this is for the fail safe of key itself, and the alternative of cipher key index all has been subject to very large challenge and restriction.
Because old cipher key system is to be based upon on the storage chip that separate space is very little, size only has the memory space of 5*10*8 byte, so old key storage mode, this memory space of direct control hardware, the row and column combination of usining inside program is operated memory space as index.Row (0-4), row (0-9).Key is that stored in clear is in the hardware memory space the inside.
Summary of the invention
The technical problem to be solved in the present invention is: the large capacity quick storage of a kind of energy be provided and read and have reading after the key dynamic storage method of safety protection function and storage, delet method, having solved the circumscribed problem of memory capacity of existing key storage system.
In order to solve the problems of the technologies described above, technical scheme of the present invention has been to provide a kind of key dynamic storage method, it is characterized in that, comprises the following steps:
Step 1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 1-2; If cipher key system creates, jump to step 1-3;
Step 1-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 1-7;
Step 1-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 1-4; If there is no, jump to step 1-5;
Step 1-4: find corresponding concordance list group, jump to step 1-8;
Step 1-5: whether the application number allotment that judges current preset is full, if full, jumps to step 1-6; If also available free, jump to step 1-7;
Step 1-6: exit this cipher key system;
Step 1-7: select an idle concordance list group, jump to step 1-11;
Step 1-8: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 1-9; If index does not exist, jump to step 1-10;
Step 1-9: read by call number the particular location that key information is present in the key storage space, jump to step 1-13;
Step 1-10: judge whether available free key storage space, if having, jump to step 1-11; If no, jump to step 1-6;
Step 1-11: select the memory location of the key storage space of 1 free time as current key, and sorted in selected key storage position to this, jumps to step 1-12;
Step 1-12: upgrade concordance list group information, jump to step 1-9;
Step 1-13: by encryption chip, the key plain that store is encrypted to ciphertext, then is stored in corresponding position, jump to step 1-14;
Step 1-14: upgrade cipher key system.
Preferably, described establishment cipher key system comprises the following steps:
Step 4-1: the variable of definition cipher key system structure size, initialization simultaneously;
Step 4-2: configuring cipher key system basic information region data;
Step 4-3: the key file that creates corresponding size according to the size of cipher key system structure;
Step 4-4: the data of cipher key system structure variable are written in key file, create cipher key system and complete.
Preferably, described cipher key system structure comprises cipher key system essential information, cipher key system index information, key storage spatial information.
Preferably, in described step 4-2, configuring cipher key system basic information region data are specially and read the current system time as the cipher key system creation-time, and the cipher key system sign is configured to successfully indicate.
Read method after a kind of key dynamic memory, is characterized in that, comprises the following steps:
Step 2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 2-2; If cipher key system creates, jump to step 2-3;
Step 2-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 2-6;
Step 2-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 2-4; If there is no, jump to step 2-6;
Step 2-4: find corresponding concordance list group, jump to step 2-5;
Step 2-5: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 2-7; If index does not exist, jump to step 2-6;
Step 2-6: exit this cipher key system;
Step 2-7: read by call number the particular location that key information is present in the key storage space, jump to step 2-8;
Step 2-8: read the information of this location key, jump to step 2-9;
Step 2-9: use the encryption chip decryption key information.
Delet method after a kind of key dynamic memory, is characterized in that, comprises following three kinds of deletion modes:
(1) cipher key system is deleted:
Step 3-1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-1-2; If cipher key system creates, jump to step 3-1-3;
Step 3-1-2: exit this cipher key system;
Step 3-1-3: change cipher key system essential information is not designated and creates;
(2) delete certain cover application:
Step 3-2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-2-2; If cipher key system creates, jump to step 3-2-3;
Step 3-2-2: exit this cipher key system;
Step 3-2-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 3-2-4; If there is no, jump to step 3-2-2;
Step 3-2-4: find corresponding concordance list group, jump to step 3-2-5;
Step 3-2-5: change manipulative indexing table group is designated the free time, jumps to step 3-2-6;
Step 3-2-6: change cipher key system essential information;
(3) delete certain group key under certain cover application:
Step 3-3-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-3-2; If cipher key system creates, jump to step 3-3-3;
Step 3-3-2: exit this cipher key system;
Step 3-3-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 3-3-4; If there is no, jump to step 3-3-2;
Step 3-3-4: find corresponding concordance list group, jump to step 3-2-5;
Step 3-3-5: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 3-3-6; If index does not exist, jump to step 3-3-2;
Step 3-3-6: read by call number the particular location that key information is present in the key storage space, jump to step 3-3-7;
Step 3-3-7: the change corresponding stored is designated the free time, jumps to step 3-2-8;
Step 3-3-8: upgrade index table information.
The present invention is reading after a kind of brand-new key dynamic storage method for financial POS terminal and of this sort information safety devices and storage, delet method.The method is based on many application systems, solved restriction and the restriction of set of cipher key number of ranks in the cipher key index, simultaneously, increased the safe storage mechanism of key, quick search mechanism, deleting mechanism etc. flexibly, can inquire about fast, add and delete key, on the Demand Base of the maximum application program quantity that meets the client, greatly improved the embedded device utilance of nervous memory resource relatively, the method that can effectively save memory space simultaneously.
The present invention also has following advantage:
(1) can support the nearly key storage of 10 cover application, can meet the need of market fully;
(2) every cover application maximum is supported 800 group keys, has solved the problem of key storage insufficient space;
(3) ranks in call number are counted span and are 0~255, can meet the requirement of client to the call number resource fully;
(4) key storage adopts the storage mode of dynamic assignment, order sequence, so can read fast and preserve key, and, without the memory space that distributes in advance whole 256 * 256, greatly improved the embedded device utilance of nervous memory resource relatively;
(5) key storage all adopts encrypted test mode, and the encryption and decryption of ciphertext operation all processes by encryption chip, has greatly strengthened the fail safe of cipher key system;
(6) key storage is corresponding with concrete application, so very convenient delete function flexibly can be provided, that is: can support to delete whole cipher key system, deletes all keys corresponding to certain cover application, delete certain group key corresponding to certain cover application.
The accompanying drawing explanation
Fig. 1 is cipher key system essential information structure chart;
Fig. 2 is the concordance list structure chart;
Fig. 3 is key storage space structure figure;
The flow chart that Fig. 4 is the cipher key system memory function;
The flow chart that Fig. 5 is the cipher key system read functions;
The flow chart that Fig. 6 is the cipher key system delete function;
Fig. 7 is for creating the flow chart of key.
Embodiment
For the present invention is become apparent, hereby with preferred embodiment, and coordinate accompanying drawing to be described in detail below.
The present invention is by selecting one independently to have the main control chip of nonvolatile mass storage in sheet and the safety chip of an encryption and decryption special use is realized, wherein, the memory space of cipher key system is divided into 3 parts: the 1st part is to record the essential information of cipher key system, as shown in Figure 1, the cipher key system essential information comprises that cipher key system exists the application (the current application key existed) of sign, cipher key system creation-time, the current existence of cipher key system, concrete application message (application number that key is corresponding) etc.; The 2nd part is cipher key index information, employing be the sortord of dichotomy, corresponding one group of different application number independently sorts, every group of beginning simultaneously comprises the sign whether this group has been used; The 3rd part is exactly the real key information of storage, and as shown in Figure 3, it comprises that free mark, the 1st group are to the 800th group key information.Wherein, what the key of storage all adopted is the encrypted test mode storage, and the operation of key encryption and decryption is to process by independent encryption chip, has so just guaranteed the fail safe of key storage and use fully.
As shown in Figure 2, the concordance list structure in the present embodiment is applied as example with 10 covers, and it comprises free mark, group number, the 1st group to the 800th group key index.
As shown in Figure 4, be the flow chart of cipher key system memory function.In financial POS terminal equipment, application, for the use of key, can only be that corresponding key is used in corresponding application, can not use the key that non-self application number is corresponding, so, in cipher key system, application number is the Constitution Elements an of necessity.Consider that most POS application programs are all to adopt row and column to identify as cipher key index, in order to keep compatible, so concordance list of the present invention is also to adopt ranks to identify as index.During key storage, must bring application number and call number into, wherein, call number is comprised of 2 bytes, and the 1st byte represents line number, and the 2nd byte represents columns, and application number also is comprised of 2 bytes, supports at most 65536 cover application programs on representation theory.
During key storage, its storage content is: application number A, call number B, key information C.
A kind of key dynamic storage method comprises the following steps:
Step 1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, consider that thereby the hardware memory random value that powers on may repeat cause erroneous judgement with prefabricated value, this sign is defined as 3 bytes, value is 0xaa, thereby at utmost reduce hardware data, disturbs, and has guaranteed the high reliability of system, if cipher key system does not create, jump to step 1-2; If cipher key system creates, jump to step 1-3;
Step 1-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 1-7;
Step 1-3: start to search from cipher key system essential information the inside, whether have the application number A that will preserve key, if exist, jump to step 1-4; If there is no, jump to step 1-5;
Step 1-4: find the concordance list group that A is corresponding, jump to step 1-8;
Step 1-5: whether the application number allotment (concordance list group number) that judges current preset has expired (accompanying drawing 2, Fig. 3 are applied as example with 10 covers), if full, jumps to step 1-6; If also available free, jump to step 1-7;
Step 1-6: exit this cipher key system;
Step 1-7: select an idle concordance list group, jump to step 1-11;
Step 1-8: after finding the concordance list group that A is corresponding, whether the index that to search current call number be B exists, because corresponding 800 group indexes of a group index table, index search efficiency according to the order of sequence is very low, so this cipher key system adopts the sequence storage, the mode of binary search, greatly improved the efficiency of index search, if index exists, jump to step 1-9; If index does not exist, jump to step 1-10;
Step 1-9: read by call number the particular location that key information is present in the key storage space, jump to step 1-13;
Step 1-10: judge whether available free key storage space, if having, jump to step 1-11; If no, jump to step 1-6;
Step 1-11: select the memory location of the key storage space of 1 free time as current key, and sorted in selected key storage position to this, jumps to step 1-12;
Step 1-12: upgrade concordance list group information, jump to step 1-9;
Step 1-13: by encryption chip, the key plain that will store (being key information C) is encrypted to ciphertext, then be stored in corresponding position, the advantage of design is like this, be difficult to find concrete key by ranks, even and if find also and can only obtain ciphertext, can't decode and obtain expressly, so data are very safe, jump to step 1-14;
Step 1-14: upgrade cipher key system.
Wherein, creating cipher key system comprises the following steps:
Step 4-1: the variable of definition cipher key system structure size, initialization simultaneously, the cipher key system structure comprises cipher key system essential information, cipher key system index information, key storage spatial information;
Step 4-2: configuring cipher key system basic information region data, read the current system time as the cipher key system creation-time, the cipher key system sign is configured to successfully indicate;
Step 4-3: the key file that creates corresponding size according to the size of cipher key system structure;
Step 4-4: the data of cipher key system structure variable are written in key file, create cipher key system and complete.
As shown in Figure 5, be the flow chart of cipher key system read functions.The memory function of its principle and Fig. 4 is the same, unique when different, when finding that application number or call number do not exist, has just exited, and no longer continues to carry out.But, in order to guarantee whole cipher key system and can be from the normal operation of initial condition, if find non-existent words while reading key, system all can be fixed and be usingd one group of default value key and return to financial POS terminal equipment as key information.
When key reads, its reading of content is: application number A, call number B.
Read method after a kind of key dynamic memory comprises the following steps:
Step 2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 2-2; If cipher key system creates, jump to step 2-3;
Step 2-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 2-6;
Step 2-3: start to search from cipher key system essential information the inside, whether have the application number A that will preserve key, if exist, jump to step 2-4; If there is no, jump to step 2-6;
Step 2-4: find the concordance list group that A is corresponding, jump to step 2-5;
Step 2-5: after finding the concordance list group that A is corresponding, search by the mode of binary search the index that current call number is B and whether exist, if index exists, jump to step 2-7; If index does not exist, jump to step 2-6;
Step 2-6: exit this cipher key system;
Step 2-7: read by call number the particular location that key information is present in the key storage space, jump to step 2-8;
Step 2-8: read the information of this location key, jump to step 2-9;
Step 2-9: use the encryption chip decryption key information.
As shown in Figure 6, be the flow chart of cipher key system delete function.A demand of often carrying for the client, to delete the key that application is preserved while deleting exactly client's application program simultaneously, for old static keys system, be difficult to realize, and for present dynamic key system, just be very easy to realize, as long as known application number, just can delete all key informations below this application number.
Delet method after a kind of key dynamic memory comprises following three kinds of deletion modes:
(1) cipher key system is deleted:
Step 3-1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-1-2; If cipher key system creates, jump to step 3-1-3;
Step 3-1-2: exit this cipher key system;
Step 3-1-3: change cipher key system essential information is not designated and creates;
(2) delete certain cover application A:
Step 3-2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-2-2; If cipher key system creates, jump to step 3-2-3;
Step 3-2-2: exit this cipher key system;
Step 3-2-3: start to search from cipher key system essential information the inside, whether have the application number A that will preserve key, if exist, jump to step 3-2-4; If there is no, jump to step 3-2-2;
Step 3-2-4: find the concordance list group that A is corresponding, jump to step 3-2-5;
Step 3-2-5: change manipulative indexing table group is designated the free time, jumps to step 3-2-6;
Step 3-2-6: change cipher key system essential information;
(3) delete certain the group key B under certain cover application A:
Step 3-3-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-3-2; If cipher key system creates, jump to step 3-3-3;
Step 3-3-2: exit this cipher key system;
Step 3-3-3: start to search from cipher key system essential information the inside, whether have the application number A that will preserve key, if exist, jump to step 3-3-4; If there is no, jump to step 3-3-2;
Step 3-3-4: find the concordance list group that A is corresponding, jump to step 3-2-5;
Step 3-3-5: after finding the concordance list group that A is corresponding, search by the mode of binary search the index that current call number is B and whether exist, if index exists, jump to step 3-3-6; If index does not exist, jump to step 3-3-2;
Step 3-3-6: read by call number the particular location that key information is present in the key storage space, jump to step 3-3-7;
Step 3-3-7: the change corresponding stored is designated the free time, jumps to step 3-2-8;
Step 3-3-8: upgrade index table information.
The present invention by for the utilization of application number and the storage mode of dynamic order, can inquire about, adds and delete key fast, and due to key storage based on application number, so very convenient and flexible for the deletion action of key.Under the prerequisite that meets client's maximum application program requirements, greatly saved limited memory space simultaneously.In addition, by adopting safety chip, key information is carried out to the encryption and decryption operation, there is very high fail safe.
Claims (6)
1. a key dynamic storage method, is characterized in that, comprises the following steps:
Step 1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 1-2; If cipher key system creates, jump to step 1-3;
Step 1-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 1-7;
Step 1-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 1-4; If there is no, jump to step 1-5;
Step 1-4: find corresponding concordance list group, jump to step 1-8;
Step 1-5: whether the application number allotment that judges current preset is full, if full, jumps to step 1-6; If also available free, jump to step 1-7;
Step 1-6: exit this cipher key system;
Step 1-7: select an idle concordance list group, jump to step 1-11;
Step 1-8: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 1-9; If index does not exist, jump to step 1-10;
Step 1-9: read by call number the particular location that key information is present in the key storage space, jump to step 1-13;
Step 1-10: judge whether available free key storage space, if having, jump to step 1-11; If no, jump to step 1-6;
Step 1-11: select the memory location of the key storage space of 1 free time as current key, and sorted in selected key storage position to this, jumps to step 1-12;
Step 1-12: upgrade concordance list group information, jump to step 1-9;
Step 1-13: by encryption chip, the key plain that store is encrypted to ciphertext, then is stored in corresponding position, jump to step 1-14;
Step 1-14: upgrade cipher key system.
2. a kind of key dynamic storage method as claimed in claim 1, is characterized in that, described establishment cipher key system comprises the following steps:
Step 4-1: the variable of definition cipher key system structure size, initialization simultaneously;
Step 4-2: configuring cipher key system basic information region data;
Step 4-3: the key file that creates corresponding size according to the size of cipher key system structure;
Step 4-4: the data of cipher key system structure variable are written in key file, create cipher key system and complete.
3. a kind of key dynamic storage method as claimed in claim 2, is characterized in that, described cipher key system structure comprises cipher key system essential information, cipher key system index information, key storage spatial information.
4. a kind of key dynamic storage method as claimed in claim 2, it is characterized in that, in described step 4-2, configuring cipher key system basic information region data are specially and read the current system time as the cipher key system creation-time, and the cipher key system sign is configured to successfully indicate.
5. the read method after a kind of key dynamic memory as claimed in claim 1, is characterized in that, comprises the following steps:
Step 2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 2-2; If cipher key system creates, jump to step 2-3;
Step 2-2: read the current time, as the creation-time of this cipher key system, then, total Space Reconstruction one time, complete initialization action, jump to step 2-6;
Step 2-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 2-4; If there is no, jump to step 2-6;
Step 2-4: find corresponding concordance list group, jump to step 2-5;
Step 2-5: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 2-7; If index does not exist, jump to step 2-6;
Step 2-6: exit this cipher key system;
Step 2-7: read by call number the particular location that key information is present in the key storage space, jump to step 2-8;
Step 2-8: read the information of this location key, jump to step 2-9;
Step 2-9: use the encryption chip decryption key information.
6. the delet method after a kind of key dynamic memory as claimed in claim 1, is characterized in that, comprises following three kinds of deletion modes:
(1) cipher key system is deleted:
Step 3-1-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-1-2; If cipher key system creates, jump to step 3-1-3;
Step 3-1-2: exit this cipher key system;
Step 3-1-3: change cipher key system essential information is not designated and creates;
(2) delete certain cover application:
Step 3-2-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-2-2; If cipher key system creates, jump to step 3-2-3;
Step 3-2-2: exit this cipher key system;
Step 3-2-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 3-2-4; If there is no, jump to step 3-2-2;
Step 3-2-4: find corresponding concordance list group, jump to step 3-2-5;
Step 3-2-5: change manipulative indexing table group is designated the free time, jumps to step 3-2-6;
Step 3-2-6: change cipher key system essential information;
(3) delete certain group key under certain cover application:
Step 3-3-1: enter cipher key system, according to cipher key system, exist sign to judge whether this cipher key system creates, if cipher key system does not create, jump to step 3-3-2; If cipher key system creates, jump to step 3-3-3;
Step 3-3-2: exit this cipher key system;
Step 3-3-3: start to search from cipher key system essential information the inside, whether have the application number that will preserve key, if exist, jump to step 3-3-4; If there is no, jump to step 3-3-2;
Step 3-3-4: find corresponding concordance list group, jump to step 3-2-5;
Step 3-3-5: after finding corresponding concordance list group, search current index and whether exist, if index exists, jump to step 3-3-6; If index does not exist, jump to step 3-3-2;
Step 3-3-6: read by call number the particular location that key information is present in the key storage space, jump to step 3-3-7;
Step 3-3-7: the change corresponding stored is designated the free time, jumps to step 3-2-8;
Step 3-3-8: upgrade index table information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310482716.5A CN103490878B (en) | 2013-10-15 | 2013-10-15 | Reading after a kind of key dynamic storage method and storage, delet method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310482716.5A CN103490878B (en) | 2013-10-15 | 2013-10-15 | Reading after a kind of key dynamic storage method and storage, delet method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103490878A true CN103490878A (en) | 2014-01-01 |
CN103490878B CN103490878B (en) | 2016-09-21 |
Family
ID=49830854
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310482716.5A Active CN103490878B (en) | 2013-10-15 | 2013-10-15 | Reading after a kind of key dynamic storage method and storage, delet method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103490878B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107155165A (en) * | 2016-03-04 | 2017-09-12 | 柯尼卡美能达株式会社 | Communication processing system, processing unit and communication processing method |
CN107609870A (en) * | 2017-09-02 | 2018-01-19 | 福建新大陆支付技术有限公司 | More application key management method, system and POS terminals for POS |
CN108628925A (en) * | 2017-12-12 | 2018-10-09 | 百富计算机技术(深圳)有限公司 | The method that the method for key write-in, key use |
CN109086597A (en) * | 2018-07-12 | 2018-12-25 | 百富计算机技术(深圳)有限公司 | Cipher key access method, key management method, storage medium and computer equipment |
CN112235102A (en) * | 2020-09-29 | 2021-01-15 | 北京智芯微电子科技有限公司 | Hybrid key storage and management method and storage device |
CN112804054A (en) * | 2021-01-27 | 2021-05-14 | 上海商米科技集团股份有限公司 | Financial POS (point of sale) key capacity expansion system and key interaction method between AP (access point) chip and SP (service provider) chip |
CN113315626A (en) * | 2020-02-27 | 2021-08-27 | 阿里巴巴集团控股有限公司 | Communication method, key management method, device, system and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1932810A (en) * | 2005-09-13 | 2007-03-21 | 李晓耕 | Method for storing and sharing data utilizing encrypted technology |
CN101101617A (en) * | 2007-07-13 | 2008-01-09 | 华中科技大学 | Cipher processor for avoiding reciphering and method for accessing data using same |
-
2013
- 2013-10-15 CN CN201310482716.5A patent/CN103490878B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1932810A (en) * | 2005-09-13 | 2007-03-21 | 李晓耕 | Method for storing and sharing data utilizing encrypted technology |
CN101101617A (en) * | 2007-07-13 | 2008-01-09 | 华中科技大学 | Cipher processor for avoiding reciphering and method for accessing data using same |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107155165B (en) * | 2016-03-04 | 2020-09-08 | 柯尼卡美能达株式会社 | Communication processing system, processing device, and communication processing method |
CN107155165A (en) * | 2016-03-04 | 2017-09-12 | 柯尼卡美能达株式会社 | Communication processing system, processing unit and communication processing method |
CN107609870A (en) * | 2017-09-02 | 2018-01-19 | 福建新大陆支付技术有限公司 | More application key management method, system and POS terminals for POS |
CN107609870B (en) * | 2017-09-02 | 2023-05-30 | 福建新大陆支付技术有限公司 | Multi-application key management method and system for POS (point of sale) and POS terminal |
CN108628925B (en) * | 2017-12-12 | 2021-05-28 | 百富计算机技术(深圳)有限公司 | Method for writing key and method for using key |
CN108628925A (en) * | 2017-12-12 | 2018-10-09 | 百富计算机技术(深圳)有限公司 | The method that the method for key write-in, key use |
CN109086597A (en) * | 2018-07-12 | 2018-12-25 | 百富计算机技术(深圳)有限公司 | Cipher key access method, key management method, storage medium and computer equipment |
WO2020011100A1 (en) * | 2018-07-12 | 2020-01-16 | 百富计算机技术(深圳)有限公司 | Key access method, key management method, storage medium, and computer device |
CN113315626A (en) * | 2020-02-27 | 2021-08-27 | 阿里巴巴集团控股有限公司 | Communication method, key management method, device, system and storage medium |
CN113315626B (en) * | 2020-02-27 | 2023-01-10 | 阿里巴巴集团控股有限公司 | Communication method, key management method, device, system and storage medium |
CN112235102A (en) * | 2020-09-29 | 2021-01-15 | 北京智芯微电子科技有限公司 | Hybrid key storage and management method and storage device |
CN112235102B (en) * | 2020-09-29 | 2023-07-21 | 北京智芯微电子科技有限公司 | Hybrid key storage and management method and storage device |
CN112804054A (en) * | 2021-01-27 | 2021-05-14 | 上海商米科技集团股份有限公司 | Financial POS (point of sale) key capacity expansion system and key interaction method between AP (access point) chip and SP (service provider) chip |
Also Published As
Publication number | Publication date |
---|---|
CN103490878B (en) | 2016-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103490878A (en) | Methods for dynamic secret key storing and stored secret key reading and deleting | |
CN103150397B (en) | A kind of data directory creation method, data retrieval method and system | |
CN102063385A (en) | Memory management method and system | |
CN103488481A (en) | Application program control method, terminal equipment and remote control system | |
CN102799660A (en) | JAVA card object management method | |
CN101853357A (en) | Software protection method | |
CN102147736B (en) | Method and device for installing software | |
CN104899049A (en) | File deletion method and device | |
CN106033303A (en) | Information searching and identifying method and device | |
CN106303064A (en) | A kind of schedule adding method, device and terminal unit | |
CN101551820B (en) | Generation method and apparatus for index database of points of interest attribute | |
CN103888424A (en) | Cluster-type data encryption system and data processing method thereof | |
CN102568049B (en) | Method, device and system for sending student card reading data | |
DE60135017D1 (en) | SELECT THE DATA PACKAGES | |
CN104834553A (en) | Service concurrent processing method for user terminal and user terminal | |
CN103809947A (en) | Automatic release method and system for development requirement | |
CN102523112A (en) | Information processing method and equipment | |
CN100487657C (en) | Method for automatically memory leakage and memory out-of-range in inlaid system | |
CN107819595B (en) | Network slice management device | |
CN103593310A (en) | Method and device for identifying external storage equipment | |
CN104036773A (en) | Method and system for playing recorded text content through anti-counterfeiting identification device | |
CN105120310A (en) | Method and apparatus for playing information | |
CN110401941B (en) | Cache data security management method in esim card | |
CN107357803A (en) | Searching method, mobile device and the device with store function of five application page | |
CN106485158A (en) | A kind of transparent encryption method based on hdfs and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |