CN106911469A - Key read method and device - Google Patents

Key read method and device Download PDF

Info

Publication number
CN106911469A
CN106911469A CN201510982363.4A CN201510982363A CN106911469A CN 106911469 A CN106911469 A CN 106911469A CN 201510982363 A CN201510982363 A CN 201510982363A CN 106911469 A CN106911469 A CN 106911469A
Authority
CN
China
Prior art keywords
key
fragment data
key fragment
data
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510982363.4A
Other languages
Chinese (zh)
Inventor
郭军
李跃红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510982363.4A priority Critical patent/CN106911469A/en
Publication of CN106911469A publication Critical patent/CN106911469A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of key read method and device, it is related to network technique field, no longer be directly arranged in key in the code of application server by the present invention, but be stored in each public servicer by the form of burst, when key is needed to use, key fragment data read requests are sent to each public servicer for having key fragment data, obtain the key fragment data that each public servicer is returned, the key fragment data that will be obtained synthesizes key according to default composition rule, to realize that key reads, so as to the safety of key has been effectively ensured, and then the data interaction safety between application server and application program can be ensured.

Description

Key read method and device
Technical field
The present invention relates to network technique field, more particularly to a kind of key read method and device.
Background technology
With the development of network technology, either daily life, or work entertainment, Can't do without the figure of application program.
To carry out the security of data interaction between guarantee application program and application server, generally Need by application server and application program both sides by the number in data key interaction Encryption and decryption is carried out according to bag, but because the key of application server is typically to be directly present in inside it Code in, enabling touch code server is likely to be exposed the key per capita, difficult To ensure the safety of key, and then the data between application server and application program cannot be ensured Interaction safety.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes above mentioned problem or extremely to provide one kind A kind of key read method and device for partially solving the above problems.
According to one aspect of the present invention, there is provided a kind of key read method, including:
Sending the reading of key fragment data to each public servicer for having key fragment data please Ask;
Obtain the key fragment data that each public servicer is returned;
The key fragment data that will be obtained synthesizes key according to default composition rule, to realize key Read.
Alternatively, it is described to send key burst to each public servicer for having key fragment data Before data read request, methods described also includes:
Key to be stored is divided at least two key fragment datas according to default segmentation rule, And store to different public servers the key fragment data of segmentation respectively.
It is alternatively, described that by key to be stored, according to default segmentation rule, to be divided at least two close Key fragment data, and the key fragment data of segmentation is stored to different public services respectively Device, further includes:
It is at least two key fragment datas that key to be stored is blocked, and will block acquisition at least Two key fragment datas are stored to different public servers respectively;
Correspondingly, it is described that the key fragment data for obtaining is synthesized close according to default composition rule Key, further includes:
The key fragment data of acquisition is synthesized into key according to the mode blocked.
It is alternatively, described that by key to be stored, according to default segmentation rule, to be divided at least two close Key fragment data, and the key fragment data of segmentation is stored to different public services respectively Device, further includes:
It is at least two key fragment datas by key decomposition to be stored, is obtained decomposing at least Two key fragment datas are stored to different public servers respectively;
Correspondingly, it is described that the key fragment data for obtaining is synthesized close according to default composition rule Key, further includes:
The key fragment data of acquisition is synthesized into key according to the mode decomposed.
Alternatively, it is described to store to different public services the key fragment data of segmentation respectively Device, further includes:
Key fragment data to splitting is encrypted respectively, and the key after encryption is divided Sheet data is stored to different public servers respectively;
Correspondingly, it is described to obtain the key fragment data that each public servicer is returned, further wrap Include:
Receive and decrypt the key fragment data that each public servicer is returned.
Alternatively, it is described that the key fragment data for obtaining is synthesized close according to default composition rule Key, after realizing that key reads, methods described also includes:
The key is encrypted;
In response to the data interaction instruction of terminal triggering, place is decrypted to the key after encryption Reason, data interaction is realized with according to the key with the terminal.
Alternatively, it is described that the key fragment data for obtaining is synthesized close according to default composition rule Key, after realizing that key reads, methods described also includes:
The time point of record synthesis key, the time difference between current time and the time point During more than preset duration, the key is deleted, and perform described to there being key fragment data The step of each public servicer sends key fragment data read requests.
Alternatively, it is described to send key burst to each public servicer for having key fragment data Data read request, further includes:
Acquisition has the server address of each public servicer of key fragment data, according to described Server address sends key fragment data to each public servicer for having key fragment data Read requests.
According to another aspect of the present invention, there is provided a kind of key reading device, including:
Request transmitting unit, is suitable to send close to each public servicer for having key fragment data Key fragment data read requests;
Data capture unit, is suitable to obtain the key fragment data that each public servicer is returned;
Key synthesis unit, is suitable to close the key fragment data for obtaining according to default composition rule Into key, to realize that key reads.
Alternatively, described device also includes:
Segmentation memory cell, is suitable to according to default segmentation rule be divided into key to be stored at least Two key fragment datas, and the key fragment data of segmentation is stored to different public respectively Server.
Alternatively, the segmentation memory cell, be further adapted for blocking key to be stored be to Few two key fragment datas, at least two key fragment datas that will block acquisition are stored respectively To different public servers;
Correspondingly, the key synthesis unit, is further adapted for the key fragment data that will be obtained Mode according to blocking synthesizes key.
Alternatively, the segmentation memory cell, be further adapted for by key decomposition to be stored be to Few two key fragment datas, will decompose at least two key fragment datas for obtaining and store respectively To different public servers;
Correspondingly, the key synthesis unit, is further adapted for the key fragment data that will be obtained Mode according to decomposing synthesizes key.
Alternatively, the segmentation memory cell, is further adapted for the key fragment data to splitting It is encrypted respectively, and the key fragment data after encryption is stored to different public affairs respectively Common server;
Correspondingly, the data capture unit, is further adapted for receiving and decrypting each utility The key fragment data that device is returned.
Alternatively, described device also includes:
Cryptographic processing unit, is suitable to be encrypted the key;
Decryption interactive unit, is adapted for the data interaction instruction of terminal triggering, after encryption Key be decrypted treatment, realize data interaction with the terminal with according to the key.
Alternatively, described device also includes:
Key delete unit, be suitable to record synthesis key time point, current time with it is described When time difference between time point exceedes preset duration, the key is deleted, and call described asking Seek transmitting element.
Alternatively, the request transmitting unit, is further adapted for acquisition and has key fragment data Each public servicer server address, according to the server address to there being key burst Each public servicer of data sends key fragment data read requests.
No longer be directly arranged in key in the code of application server by the present invention, but by burst Form be stored in each public servicer, when key is needed to use, to there being key burst number According to each public servicer send key fragment data read requests, obtain each public servicer and return The key fragment data for returning, the key fragment data that will be obtained synthesizes close according to default composition rule Key, to realize that key reads, answers so as to the safety of key being effectively ensured, and then can having ensured With the data interaction safety between server and application program.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantage and benefit Will be clear understanding for those of ordinary skill in the art.Accompanying drawing is only used for showing to be preferable to carry out The purpose of mode, and it is not considered as limitation of the present invention.And in whole accompanying drawing, use Identical reference symbol represents identical part.In the accompanying drawings:
Fig. 1 is the schematic flow sheet of the key read method of one embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the key read method of one embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the key read method of one embodiment of the present invention;
Fig. 4 is the schematic flow sheet of the key read method of one embodiment of the present invention;
Fig. 5 is the schematic flow sheet of the key read method of one embodiment of the present invention;
Fig. 6 is the schematic flow sheet of the key read method of one embodiment of the present invention;
Fig. 7 is the structured flowchart of the key reading device of one embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiment of the invention is made further in detail Description.Following examples are used to illustrate the present invention, but are not limited to the scope of the present invention.
Fig. 1 is the schematic flow sheet of the key read method of one embodiment of the present invention;Reference Fig. 1, methods described includes:
S101:Key fragment data is sent to each public servicer for having key fragment data to read Take request;
It should be noted that the executive agent of the method for present embodiment is application server, institute The server that application server can be regarded as being carried out with application program data interaction is stated, it can be The background server of application program, it is of course also possible to be other servers, present embodiment pair This is not any limitation as.
It will be appreciated that in order to ensure key safety, so, it is necessary to ensure key fragment data Do not stored on same public server, that is to say, that the number of the public server Amount is usually multiple (i.e. at least two).
In implementing, read for the ease of sending key fragment data to each public server Request, can first obtain the mark of each public server for having key fragment data, according to described Identify to be read to each public server transmission key fragment data for having key fragment data and ask Ask.
It will be appreciated that the mark of the public server is to be used to distinguish public server Mark, for example:Server address, certainly, or public server IP address or MAC Address etc., present embodiment is not any limitation as to this.
S102:Obtain the key fragment data that each public servicer is returned;
In implementing, the key fragment data that public server is returned is in public service The key fragment data preserved on device, to avoid during each public server " return " key" fragment data The data delay being likely to occur, influences the normal operation of the application server, present embodiment In, the public server may be present in in the application server identical LAN, That is, the data interaction between the application server and public server is by LAN Internal data interactive mode is realized, so as to ensure to occur without data delay.
S103:The key fragment data that will be obtained synthesizes key according to default composition rule, with reality Existing key reads.
No longer be directly arranged in key in the code of application server by present embodiment, but passes through The form of burst is stored in each public servicer, when key is needed to use, is divided to there being key Each public servicer of sheet data sends key fragment data read requests, obtains each utility The key fragment data that device is returned, the key fragment data for obtaining is closed according to default composition rule Into key, to realize that key reads, so as to the safety of key has been effectively ensured, and then can protect Data interaction safety between barrier application server and application program.
Fig. 2 is the schematic flow sheet of the key read method of one embodiment of the present invention;Reference Fig. 2, methods described includes:
S200:Key to be stored is divided at least two key bursts according to default segmentation rule Data, and the key fragment data of segmentation is stored to different public servers respectively;
It should be noted that to cause there is key fragment data in public server, so, Application server can be advised key to be stored according to default segmentation when key to be stored is received At least two key fragment datas are then divided into, and the key fragment data of segmentation is stored respectively To different public servers.
It should be understood that the application server is stored to not by the key fragment data of segmentation After same public server, in addition it is also necessary to obtain and preserve the mark of each public server.
In implementing, the default segmentation rule is the reverse mistake of default composition rule Journey, that is to say, that included flow and the default synthesis rule in the default segmentation rule Included flow in then conversely, so, the application server is by key to be stored according to pre- If after segmentation rule is split, you can it is determined that composition rule is preset accordingly, and to described pre- If composition rule is preserved.
It will be appreciated that because application server may have multiple, that is to say, that, it is necessary to same The application server of one key may have multiple, but in fact, not each application server It is required to the process for carrying out Secret splitting and the storage of key fragment data, it is only necessary to should by first The process of Secret splitting and the storage of key fragment data, other application server are carried out with server The mark and default composition rule of reproducible each public server, so that directly to each public service Device sends key fragment data read requests.
If it will be appreciated that key fragment data is uploaded into each public clothes by way of plaintext Business device, is also relatively easy to cause Key Exposure, so, in present embodiment, can be to segmentation Key fragment data is encrypted respectively, and the key fragment data after encryption is deposited respectively Store up to different public servers, correspondingly, in the key fragment data that will be obtained according to default , it is necessary to be decrypted to key fragment data before composition rule synthesis key.
Certainly, it is further when the key fragment data to splitting is encrypted respectively Security is improved, multi-enciphering can be respectively carried out to key fragment data, also can be to different close Key fragment data uses different AESs, certainly, can also use other modes, this implementation Mode is not any limitation as to this.
S201:Key fragment data is sent to each public servicer for having key fragment data to read Take request;
S202:Obtain the key fragment data that each public servicer is returned;
S203:The key fragment data that will be obtained synthesizes key according to default composition rule, with reality Existing key reads.
S101~S103 is identical for the step of step S201~S203 is with the implementation method shown in Fig. 1, This is repeated no more.
Fig. 3 is the schematic flow sheet of the key read method of one embodiment of the present invention;Reference Fig. 3, methods described includes:
S300:It is at least two key fragment datas that key to be stored is blocked, and will block acquisition At least two key fragment datas store respectively to different public servers;
It will be appreciated that the efficiency in order to improve Split Key, in present embodiment, by cutting Disconnected mode carries out Secret splitting, that is to say, that it is at least two sections words to block key to be stored Symbol string, and the character string that will be obtained is used as key fragment data.
For example:Key to be stored is AAAABBBBCCCCDDDD, and it is 3 sections of characters to block String, 3 sections of character strings are respectively " AAA ", " ABBBBC " and " CCCDDDD ", now, Can be using character string as key fragment data, that is to say, that 3 key fragment datas are respectively " AAA ", " ABBBBC " and " CCCDDDD ", certainly, blocks for the ease of record Mode, 3 sequence numbers of key fragment data are can record, for example, by key fragment data The sequence number of " AAA " is designated as 1, and the sequence number of key fragment data " ABBBBC " is designated as into 2, The sequence number of key fragment data " CCCDDDD " is designated as 3.
Therefore, after key fragment data is uploaded into each public server, can record key point Corresponding relation between the mark of the sequence number of sheet data and each public server, and it is right by what is recorded Should be related to as the mode blocked.
S301:Key fragment data is sent to each public servicer for having key fragment data to read Take request;
S302:Obtain the key fragment data that each public servicer is returned;
S201~S203 is identical for the step of step S301~S302 is with the implementation method shown in Fig. 2, This is repeated no more.
S303:The key fragment data of acquisition is synthesized into key according to the mode blocked, to realize Key reads.
It will be appreciated that because the mode blocked is the sequence number and each public affairs of key fragment data Corresponding relation between the mark of common server, so, in the mark by each public server After obtaining key fragment data, can be according to the sequence number of the key fragment data to the key point Sheet data is combined, so as to synthesize key, realizes that key reads.
Fig. 4 is the schematic flow sheet of the key read method of one embodiment of the present invention;Reference Fig. 4, methods described includes:
S400:It is at least two key fragment datas by key decomposition to be stored, is obtained decomposing At least two key fragment datas store respectively to different public servers;
It will be appreciated that the synthesis difficulty in order to reduce key, in present embodiment, by dividing The mode of solution carries out Secret splitting, that is to say, that by key decomposition to be stored be at least two sections words Symbol string, and the character string that will be obtained is used as key fragment data.
For example:Key to be stored is AAAABBBBCCCCDDDD, is decomposed into 4 sections of characters String, 4 sections of character strings be respectively " AAAAAAAAAAAAAAAA ", " 0000111111111111 ", " 0000000011111111 " and " 0000000000001111 ", Now, can be using character string as key fragment data, that is to say, that 4 key fragment datas Respectively " AAAAAAAAAAAAAAAA ", " 0000111111111111 ", " 0000000011111111 " and " 0000000000001111 ", because the mode decomposed is not deposited In ordinal relation, so, the sequence number without recording key fragment data, without record key Corresponding relation between the mark of the sequence number of fragment data and each public server.
S401:Key fragment data is sent to each public servicer for having key fragment data to read Take request;
S402:Obtain the key fragment data that each public servicer is returned;
S201~S203 is identical for the step of step S401~S402 is with the implementation method shown in Fig. 2, This is repeated no more.
S403:The key fragment data of acquisition is synthesized into key according to the mode decomposed, to realize Key reads.
It will be appreciated that due to using decompose by the way of, in present embodiment, can be relatively simple Ground synthesis key, it is only necessary to using the summed result of key fragment data as key, realize It is easy.
Fig. 5 is the schematic flow sheet of the key read method of one embodiment of the present invention;Reference Fig. 5, methods described includes:
S501:Key fragment data is sent to each public servicer for having key fragment data to read Take request;
S502:Obtain the key fragment data that each public servicer is returned;
S503:The key fragment data that will be obtained synthesizes key according to default composition rule, with reality Existing key reads;
S101~S103 is identical for the step of step S501~S503 is with the implementation method shown in Fig. 1, This is repeated no more.
S504:The key is encrypted;
It will be appreciated that after application server carries out key reading, now, key is present in should With in the internal memory of server, if key is present in the application clothes by way of plaintext for a long time It is engaged in the internal memory of device, is easily caused Key Exposure, in present embodiment, after key reading, The key can be encrypted.
S505:In response to the data interaction instruction of terminal triggering, the key after encryption is solved Close treatment, data interaction is realized with according to the key with the terminal.
In implementing, when the application triggers data interaction in terminal is instructed, application Server needs to use the key to carry out data interaction with the application program in the terminal, now, Treatment can be decrypted to the key after encryption, so as to be realized with the terminal according to the key Data interaction.
Certainly, in order to be further ensured that the security of key, the number with the terminal can terminated After according to interaction, the key is encrypted again, that is to say, that key is except making Used time, encrypted state can be constantly in.
Fig. 6 is the schematic flow sheet of the key read method of one embodiment of the present invention;Reference Fig. 6, methods described includes:
S601:Key fragment data is sent to each public servicer for having key fragment data to read Take request;
S602:Obtain the key fragment data that each public servicer is returned;
S603:The key fragment data that will be obtained synthesizes key according to default composition rule, with reality Existing key reads;
S101~S103 is identical for the step of step S601~S603 is with the implementation method shown in Fig. 1, This is repeated no more.
S604:The time point of record synthesis key, between current time and the time point When time difference exceedes preset duration, the key, and return to step S601 are deleted.
It will be appreciated that in order to prevent because key storage is in the time on the application server The long potential safety hazard for causing, in present embodiment, at the time point of record synthesis key, is working as When time difference between preceding time and the time point exceedes preset duration, the key is deleted, That is, just send key fragment data to each public servicer again every Preset Time reading Request is taken, carries out synthesizing the process of key again.
In implementing, the preset duration can be configured as needed, for example:It is set to 12~24 hours, certainly, other durations can be also set to, present embodiment is not any limitation as to this.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of action Combination, but those skilled in the art should know, and the embodiment of the present invention is not received described The limitation of sequence of movement, because according to the embodiment of the present invention, some steps can be suitable using other Sequence is carried out simultaneously.Secondly, those skilled in the art should also know, be retouched in specification The embodiment stated belongs to preferred embodiment, and the involved action not necessarily present invention is implemented Necessary to example.
Fig. 7 is the structured flowchart of the key reading device of one embodiment of the present invention;Reference picture 7, described device includes:
Request transmitting unit 701, is suitable to be sent out to each public servicer for having key fragment data Send key fragment data read requests;
Data capture unit 702, is suitable to obtain the key fragment data that each public servicer is returned;
Key synthesis unit 703, the key fragment data for being suitable to obtain is advised according to default synthesis Then synthesize key, to realize that key reads.
In a kind of alternative embodiment of the invention, described device also includes:
Segmentation memory cell, is suitable to according to default segmentation rule be divided into key to be stored at least Two key fragment datas, and the key fragment data of segmentation is stored to different public respectively Server.
In a kind of alternative embodiment of the invention, the segmentation memory cell is further adapted for It is at least two key fragment datas that key to be stored is blocked, and will block at least two of acquisition Key fragment data is stored to different public servers respectively;
Correspondingly, the key synthesis unit, is further adapted for the key fragment data that will be obtained Mode according to blocking is combined, to synthesize key.
In a kind of alternative embodiment of the invention, the segmentation memory cell is further adapted for It is at least two key fragment datas by key decomposition to be stored, at least two for obtaining will be decomposed Key fragment data is stored to different public servers respectively;
Correspondingly, the key synthesis unit, is further adapted for the key fragment data that will be obtained Mode according to decomposing is combined, to synthesize key.
In a kind of alternative embodiment of the invention, the segmentation memory cell is further adapted for Key fragment data to splitting is encrypted respectively, and by the key burst number after encryption According to storing respectively to different public servers;
Correspondingly, the data capture unit, is further adapted for receiving and decrypting each utility The key fragment data that device is returned.
In a kind of alternative embodiment of the invention, described device also includes:
Cryptographic processing unit, is suitable to be encrypted the key;
Decryption interactive unit, is adapted for the data interaction instruction of terminal triggering, after encryption Key be decrypted treatment, realize data interaction with the terminal with according to the key.
In a kind of alternative embodiment of the invention, described device also includes:
Key delete unit, be suitable to record synthesis key time point, current time with it is described When time difference between time point exceedes preset duration, the key is deleted, and call described asking Seek transmitting element.
In a kind of alternative embodiment of the invention, the request transmitting unit is further adapted for Acquisition has the server address of each public servicer of key fragment data, according to the service Device address sends key fragment data and reads to each public servicer for having key fragment data Request.
For device embodiment, because it is substantially similar to embodiment of the method, so description It is fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
It should be noted that in all parts of device of the invention, to be realized according to it Function and logical partitioning has been carried out to part therein, but, the present invention is not only restricted to this, can To be repartitioned to all parts or be combined as needed, for example, can be by some portions Part is combined as single part, or some parts can be further broken into more sub-portions Part.
All parts embodiment of the invention can realize with hardware, or with one or many The software module run on individual processor is realized, or is realized with combinations thereof.This area It will be appreciated by the skilled person that microprocessor or digital signal processor can be used in practice (DSP) one of some or all parts in device according to embodiments of the present invention are realized A little or repertoire.The present invention is also implemented as performing method as described herein Some or all equipment or program of device are (for example, computer program and computer journey Sequence product).It is such to realize that program of the invention be stored on a computer-readable medium, Or can have the form of one or more signal.Such signal can be from internet net Downloaded on standing and obtained, or provided on carrier signal, or provided in any other form.
It should be noted that above-described embodiment the present invention will be described enters rather than to the present invention Row limitation, and those skilled in the art are without departing from the scope of the appended claims Alternative embodiment can be designed.In the claims, any ginseng that will should not be located between bracket Examine symbol construction into limitations on claims.Word "comprising" does not exclude the presence of the power of not being listed in Element or step in profit requirement.Word "a" or "an" before element is not arranged Except in the presence of multiple such elements.The present invention can be by means of including the hard of some different elements Part and realized by means of properly programmed computer.If being weighed in the unit for listing equipment for drying During profit is required, several in these devices can be come specific body by same hardware branch It is existing.The use of word first, second, and third does not indicate that any order.Can be by these Word is construed to title.
Embodiment of above is only suitable to illustrate of the invention, and not limitation of the present invention, it is relevant The those of ordinary skill of technical field, without departing from the spirit and scope of the present invention, Can also make a variety of changes and modification, therefore all equivalent technical schemes fall within the present invention Category, scope of patent protection of the invention should be defined by the claims.
The invention discloses A1, a kind of key read method, including:
Sending the reading of key fragment data to each public servicer for having key fragment data please Ask;
Obtain the key fragment data that each public servicer is returned;
The key fragment data that will be obtained synthesizes key according to default composition rule, to realize key Read.
A2, the method as described in A1, it is described to each utility for having key fragment data Before device sends key fragment data read requests, methods described also includes:
Key to be stored is divided at least two key fragment datas according to default segmentation rule, And store to different public servers the key fragment data of segmentation respectively.
A3, the method as described in A2, it is described to divide key to be stored according to default segmentation rule At least two key fragment datas are segmented into, and the key fragment data of segmentation is stored to not respectively Same public server, further includes:
It is at least two key fragment datas that key to be stored is blocked, and will block acquisition at least Two key fragment datas are stored to different public servers respectively;
Correspondingly, it is described that the key fragment data for obtaining is synthesized close according to default composition rule Key, further includes:
The key fragment data of acquisition is synthesized into key according to the mode blocked.
A4, the method as described in A2, it is described to divide key to be stored according to default segmentation rule At least two key fragment datas are segmented into, and the key fragment data of segmentation is stored to not respectively Same public server, further includes:
It is at least two key fragment datas by key decomposition to be stored, is obtained decomposing at least Two key fragment datas are stored to different public servers respectively;
Correspondingly, it is described that the key fragment data for obtaining is synthesized close according to default composition rule Key, further includes:
The key fragment data of acquisition is synthesized into key according to the mode decomposed.
A5, the method as any one of A2~A4, the key burst number that will split According to storing respectively to different public servers, further include:
Key fragment data to splitting is encrypted respectively, and the key after encryption is divided Sheet data is stored to different public servers respectively;
Correspondingly, it is described to obtain the key fragment data that each public servicer is returned, further wrap Include:
Receive and decrypt the key fragment data that each public servicer is returned.
A6, the method as any one of A1~A5, the key burst number that will be obtained Synthesize key according to according to default composition rule, after realizing that key reads, methods described is also wrapped Include:
The key is encrypted;
In response to the data interaction instruction of terminal triggering, place is decrypted to the key after encryption Reason, data interaction is realized with according to the key with the terminal.
A7, the method as any one of A1~A6, the key burst number that will be obtained Synthesize key according to according to default composition rule, after realizing that key reads, methods described is also wrapped Include:
The time point of record synthesis key, the time difference between current time and the time point During more than preset duration, the key is deleted, and perform described to there being key fragment data The step of each public servicer sends key fragment data read requests.
A8, the method as any one of A1~A7, it is described to there being key fragment data Each public servicer send key fragment data read requests, further include:
Acquisition has the server address of each public servicer of key fragment data, according to described Server address sends key fragment data to each public servicer for having key fragment data Read requests.
The invention also discloses B9, a kind of key reading device, including:
Request transmitting unit, is suitable to send close to each public servicer for having key fragment data Key fragment data read requests;
Data capture unit, is suitable to obtain the key fragment data that each public servicer is returned;
Key synthesis unit, is suitable to close the key fragment data for obtaining according to default composition rule Into key, to realize that key reads.
B10, the device as described in B9, described device also include:
Segmentation memory cell, is suitable to according to default segmentation rule be divided into key to be stored at least Two key fragment datas, and the key fragment data of segmentation is stored to different public respectively Server.
B11, the device as described in B10, the segmentation memory cell are further adapted for treating It is at least two key fragment datas that storage key is blocked, and will block at least two keys of acquisition Fragment data is stored to different public servers respectively;
Correspondingly, the key synthesis unit, is further adapted for the key fragment data that will be obtained Mode according to blocking synthesizes key.
B12, the device as described in B10, the segmentation memory cell are further adapted for treating Storage key decomposition is at least two key fragment datas, will decompose at least two keys for obtaining Fragment data is stored to different public servers respectively;
Correspondingly, the key synthesis unit, is further adapted for the key fragment data that will be obtained Mode according to decomposing synthesizes key.
B13, the device as any one of B10~B12, the segmentation memory cell, enter One step be suitable to split key fragment data be encrypted respectively, and by encryption after it is close Key fragment data is stored to different public servers respectively;
Correspondingly, the data capture unit, is further adapted for receiving and decrypting each utility The key fragment data that device is returned.
B14, the device as any one of B9~B13, described device also include:
Cryptographic processing unit, is suitable to be encrypted the key;
Decryption interactive unit, is adapted for the data interaction instruction of terminal triggering, after encryption Key be decrypted treatment, realize data interaction with the terminal with according to the key.
B15, the device as any one of B9~B14, described device also include:
Key delete unit, be suitable to record synthesis key time point, current time with it is described When time difference between time point exceedes preset duration, the key is deleted, and call described asking Seek transmitting element.
B16, the device as any one of B9~B15, the request transmitting unit are entered One step is suitable to obtain the server address of each public servicer for having key fragment data, according to The server address sends key burst to each public servicer for having key fragment data Data read request.

Claims (10)

1. a kind of key read method, including:
Sending the reading of key fragment data to each public servicer for having key fragment data please Ask;
Obtain the key fragment data that each public servicer is returned;
The key fragment data that will be obtained synthesizes key according to default composition rule, to realize key Read.
2. the method for claim 1, it is described to there being each public of key fragment data Before server sends key fragment data read requests, methods described also includes:
Key to be stored is divided at least two key fragment datas according to default segmentation rule, And store to different public servers the key fragment data of segmentation respectively.
3. method as claimed in claim 2, it is described by key to be stored according to default segmentation Rule is divided at least two key fragment datas, and the key fragment data of segmentation is deposited respectively Storage is further included to different public servers:
It is at least two key fragment datas that key to be stored is blocked, and will block acquisition at least Two key fragment datas are stored to different public servers respectively;
Correspondingly, it is described that the key fragment data for obtaining is synthesized close according to default composition rule Key, further includes:
The key fragment data of acquisition is synthesized into key according to the mode blocked.
4. method as claimed in claim 2, it is described by key to be stored according to default segmentation Rule is divided at least two key fragment datas, and the key fragment data of segmentation is deposited respectively Storage is further included to different public servers:
It is at least two key fragment datas by key decomposition to be stored, is obtained decomposing at least Two key fragment datas are stored to different public servers respectively;
Correspondingly, it is described that the key fragment data for obtaining is synthesized close according to default composition rule Key, further includes:
The key fragment data of acquisition is synthesized into key according to the mode decomposed.
5. the method as any one of claim 2~4, described by the key split point Sheet data is stored to different public servers respectively, is further included:
Key fragment data to splitting is encrypted respectively, and the key after encryption is divided Sheet data is stored to different public servers respectively;
Correspondingly, it is described to obtain the key fragment data that each public servicer is returned, further wrap Include:
Receive and decrypt the key fragment data that each public servicer is returned.
6. the method as any one of Claims 1 to 5, described by the key for obtaining point Sheet data synthesizes key according to default composition rule, after realizing that key reads, methods described Also include:
The key is encrypted;
In response to the data interaction instruction of terminal triggering, place is decrypted to the key after encryption Reason, data interaction is realized with according to the key with the terminal.
7. the method as any one of claim 1~6, described by the key for obtaining point Sheet data synthesizes key according to default composition rule, after realizing that key reads, methods described Also include:
The time point of record synthesis key, the time difference between current time and the time point During more than preset duration, the key is deleted, and perform described to there being key fragment data The step of each public servicer sends key fragment data read requests.
8. the method as any one of claim 1~7, it is described to there being key burst Each public servicer of data sends key fragment data read requests, further includes:
Acquisition has the server address of each public servicer of key fragment data, according to described Server address sends key fragment data to each public servicer for having key fragment data Read requests.
9. a kind of key reading device, including:
Request transmitting unit, is suitable to send close to each public servicer for having key fragment data Key fragment data read requests;
Data capture unit, is suitable to obtain the key fragment data that each public servicer is returned;
Key synthesis unit, is suitable to close the key fragment data for obtaining according to default composition rule Into key, to realize that key reads.
10. device as claimed in claim 9, described device also includes:
Segmentation memory cell, is suitable to according to default segmentation rule be divided into key to be stored at least Two key fragment datas, and the key fragment data of segmentation is stored to different public respectively Server.
CN201510982363.4A 2015-12-23 2015-12-23 Key read method and device Pending CN106911469A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510982363.4A CN106911469A (en) 2015-12-23 2015-12-23 Key read method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510982363.4A CN106911469A (en) 2015-12-23 2015-12-23 Key read method and device

Publications (1)

Publication Number Publication Date
CN106911469A true CN106911469A (en) 2017-06-30

Family

ID=59206131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510982363.4A Pending CN106911469A (en) 2015-12-23 2015-12-23 Key read method and device

Country Status (1)

Country Link
CN (1) CN106911469A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107516049A (en) * 2017-07-31 2017-12-26 广东美的制冷设备有限公司 Method for reading data, device, safety chip and computer equipment
CN107979461A (en) * 2017-10-27 2018-05-01 财付通支付科技有限公司 Secret key method for retrieving, device, terminal, key escrow server and computer-readable recording medium
CN109347630A (en) * 2018-10-16 2019-02-15 航天信息股份有限公司 A kind of tax controlling equipment cryptographic key distribution method and system
CN111355680A (en) * 2018-12-04 2020-06-30 李舒云 Key distribution method, key receiving method, electronic terminal and storage medium
CN111711515A (en) * 2020-05-18 2020-09-25 冠群信息技术(南京)有限公司 Three-party AES key synthesis method, encryption method and decryption method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621375A (en) * 2009-07-28 2010-01-06 成都市华为赛门铁克科技有限公司 Method, device and system for managing key
CN103023635A (en) * 2012-12-03 2013-04-03 广东欧珀移动通信有限公司 Method and device for message backup
US8561211B1 (en) * 2001-07-31 2013-10-15 Marvell International Ltd. System and method for enhanced piracy protection in a wireless personal communication device
CN103414682A (en) * 2013-04-07 2013-11-27 深圳大学 Method for cloud storage of data and system
JP2014060614A (en) * 2012-09-18 2014-04-03 Hitachi Solutions Ltd Encrypted data management system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8561211B1 (en) * 2001-07-31 2013-10-15 Marvell International Ltd. System and method for enhanced piracy protection in a wireless personal communication device
CN101621375A (en) * 2009-07-28 2010-01-06 成都市华为赛门铁克科技有限公司 Method, device and system for managing key
JP2014060614A (en) * 2012-09-18 2014-04-03 Hitachi Solutions Ltd Encrypted data management system
CN103023635A (en) * 2012-12-03 2013-04-03 广东欧珀移动通信有限公司 Method and device for message backup
CN103414682A (en) * 2013-04-07 2013-11-27 深圳大学 Method for cloud storage of data and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JIN LI等: ""Secure Deduplication with Efficient and Reliable Convergent Key Management"", 《IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS》 *
张青凤等: "《信息存储安全理论与应用[M]》", 30 September 2012 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107516049A (en) * 2017-07-31 2017-12-26 广东美的制冷设备有限公司 Method for reading data, device, safety chip and computer equipment
CN107979461A (en) * 2017-10-27 2018-05-01 财付通支付科技有限公司 Secret key method for retrieving, device, terminal, key escrow server and computer-readable recording medium
CN111600710A (en) * 2017-10-27 2020-08-28 财付通支付科技有限公司 Key storage method, device, terminal, server and readable medium
CN111600710B (en) * 2017-10-27 2023-01-13 财付通支付科技有限公司 Key storage method, device, terminal, server and readable medium
CN109347630A (en) * 2018-10-16 2019-02-15 航天信息股份有限公司 A kind of tax controlling equipment cryptographic key distribution method and system
CN111355680A (en) * 2018-12-04 2020-06-30 李舒云 Key distribution method, key receiving method, electronic terminal and storage medium
CN111711515A (en) * 2020-05-18 2020-09-25 冠群信息技术(南京)有限公司 Three-party AES key synthesis method, encryption method and decryption method
CN111711515B (en) * 2020-05-18 2022-04-26 冠群信息技术(南京)有限公司 Three-party AES key synthesis method, encryption method and decryption method

Similar Documents

Publication Publication Date Title
US11050561B2 (en) Multi-party security computing method and apparatus, and electronic device
US20210051001A1 (en) Multiparty secure computing method, device, and electronic device
US11038679B2 (en) Secure multi-party computation method and apparatus, and electronic device
Chu et al. Security and privacy analyses of internet of things children’s toys
CN106911469A (en) Key read method and device
CN103716330B (en) A kind of digital content encryption and decryption method and equipment
US10069809B2 (en) System and method for secure transmission of web pages using encryption of their content
CN1691574B (en) Rendering protected digital content within a network of computing devices or the like
CN104769606B (en) The system and method that the computer environment of safety is provided
CN110214325A (en) Data mask
CN103294961A (en) Method and device for file encrypting/decrypting
CN112487483A (en) Encrypted database flow auditing method and device
CN103853943B (en) program protection method and device
KR20050100596A (en) Content reproduction device, license issuing server, and content reproduction system
CN107516045A (en) Document protection method and device
JPWO2002027501A1 (en) Electronic information organization restoration method
CN110099062A (en) A kind of encryption method of network data, decryption method and relevant apparatus
CN106022158A (en) A takeout management system for file datas
CN117478303A (en) Block chain hidden communication method, system and computer equipment
CN103379133A (en) Safe and reliable cloud storage system
CN108846296A (en) Data encryption method and device, computer equipment and readable storage medium
CN106912044A (en) A kind of WiFi information processing methods and device
CN114374521A (en) Private data protection method, electronic equipment and storage medium
CN107729766B (en) Data storage method, data reading method and system thereof
CN114817970B (en) Data analysis method and system based on data source protection and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170630