CN112565258A - Storage method, storage device, computer equipment and storage medium of private key - Google Patents

Storage method, storage device, computer equipment and storage medium of private key Download PDF

Info

Publication number
CN112565258A
CN112565258A CN202011408645.0A CN202011408645A CN112565258A CN 112565258 A CN112565258 A CN 112565258A CN 202011408645 A CN202011408645 A CN 202011408645A CN 112565258 A CN112565258 A CN 112565258A
Authority
CN
China
Prior art keywords
private key
storage
partition
data
storage partition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011408645.0A
Other languages
Chinese (zh)
Other versions
CN112565258B (en
Inventor
生竹声
薛高飞
李德胜
郑隽一
张育铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Innovation Energy Automobile Intelligent Energy Equipment Innovation Center Jiangsu Co Ltd
Original Assignee
National Innovation Energy Automobile Intelligent Energy Equipment Innovation Center Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Innovation Energy Automobile Intelligent Energy Equipment Innovation Center Jiangsu Co Ltd filed Critical National Innovation Energy Automobile Intelligent Energy Equipment Innovation Center Jiangsu Co Ltd
Priority to CN202011408645.0A priority Critical patent/CN112565258B/en
Publication of CN112565258A publication Critical patent/CN112565258A/en
Application granted granted Critical
Publication of CN112565258B publication Critical patent/CN112565258B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention provides a storage method, a storage device, computer equipment and a storage medium of a private key, wherein the storage method comprises the following steps: the method comprises the steps of fragmenting a private key and partitioning a memory, wherein the size of the fragmentation is the same as that of the partition; calculating a Hash value of the private key, coding the Hash value according to sections, and determining the initial position of the private key fragment when the private key fragment is stored in a corresponding sub-partition of the first storage partition according to the section coding; storing the data of the private key into a corresponding sub-partition of the first storage partition in a ring mode according to the initial position; jumping, picking and dispersedly storing the data in the first storage partition into the corresponding second storage partition at preset intervals; and performing data tampering on the first storage partition to invalidate the data of the first storage partition. The storage method can conveniently realize the safe storage of the private key by the scattered storage of the private key without adding an additional hardware device, thereby reducing the possibility that the private key is violently cracked.

Description

Storage method, storage device, computer equipment and storage medium of private key
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and an apparatus for storing a private key, a computer device, and a non-transitory computer-readable storage medium.
Background
With the development of network-related industries, the problem of network communication security is increasingly prominent, and international standardization organizations have formulated standards and methods for ensuring communication security, wherein an asymmetric encryption method is a method widely applied to network communication security, and an asymmetric encryption algorithm needs two keys for encryption and decryption, the two keys being a Public Key (Public Key for short) and a Private Key (Private Key for short). Whether the PC side equipment or the embedded equipment or some non-specific symmetrical encryption chips are adopted, when the asymmetrical encryption method is adopted, the private key must be stored.
In the related technology, the storage method of the private key generally adopts simple transformation to the private key and then directly stores the whole private key in the storage medium, so that an attacker can easily traverse and read the content of the storage medium and simultaneously uses the content of the storage medium, the plaintext and the ciphertext as algorithm factors to carry out brute force cracking.
Disclosure of Invention
In order to solve the above technical problems, a first object of the present invention is to provide a method for storing a private key, which can conveniently implement secure storage of the private key by performing distributed storage on the private key without adding an additional hardware device, thereby reducing the possibility of brute force of the private key.
A second object of the present invention is to provide a storage device for a private key.
A third object of the invention is to propose a computer device.
A fourth object of the invention is to propose a non-transitory computer-readable storage medium.
The technical scheme adopted by the invention is as follows:
an embodiment of a first aspect of the present invention provides a method for storing a private key, including the following steps: the private key is divided into pieces, and a memory is partitioned; calculating a Hash value of the private key, coding the Hash value according to sections, and determining an initial position of the private key fragment when the private key fragment is stored in a first storage partition according to the section coding; storing data of a private key into the first storage partition in a ring mode according to the starting position; jumping, picking and dispersedly storing the data in the first storage partition into a corresponding second storage partition at preset intervals; and performing data tampering on the first storage partition to invalidate the data of the first storage partition.
The storage method of the private key provided by the invention can also have the following additional technical characteristics:
according to one embodiment of the invention, the data storage of the storage partition which does not store the data is realized by copying and performing data tampering on the data content of the first storage partition after the data invalidation.
According to an embodiment of the present invention, the preset interval number is calculated and obtained according to a Hash value of the private key.
According to an embodiment of the present invention, the preset number of intervals is 8 bits.
An embodiment of a second aspect of the present invention provides a storage apparatus for a private key, including: the fragmentation module is used for fragmenting the private key; a partitioning module to partition a memory; the determining module is used for calculating a Hash value of the private key, coding the Hash value according to sections, and determining the initial position of the private key fragment when the private key fragment is written in the corresponding sub-partition of the first storage partition according to the section coding; the storage module is used for storing data of a private key into corresponding sub-partitions of the first storage partition in an annular mode according to the initial position; the picking module is used for jumping, picking and dispersedly storing the data in the first storage partition into the corresponding second storage partition at preset intervals; the tampering module is used for carrying out data tampering on the first storage partition so as to invalidate the data of the first storage partition.
The storage device for the private key provided by the invention can also have the following additional technical characteristics:
according to one embodiment of the invention, the data storage of the storage partition which does not store the data is realized by copying and performing data tampering on the data content of the first storage partition after the data invalidation.
According to an embodiment of the present invention, the preset interval number is calculated and obtained according to a Hash value of the private key.
According to an embodiment of the present invention, the preset number of intervals is 8 bits.
An embodiment of a third aspect of the present invention provides a computer device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the method for storing a private key according to the embodiment of the first aspect of the present invention.
A fourth aspect of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for storing a private key according to the first aspect of the present invention.
The invention has the beneficial effects that:
the invention can conveniently realize the safe storage of the private key by the dispersed storage of the private key without adding additional hardware devices, thereby reducing the possibility that the private key is violently cracked.
Drawings
FIG. 1 is a flow diagram of a method of storing a private key according to one embodiment of the invention;
FIG. 2 is a schematic diagram of a method of storing a private key according to a first embodiment of the present invention;
fig. 3 is a schematic diagram of a method of storing a private key according to a first embodiment of the present invention;
figure 4 is a block schematic diagram of a storage device for private keys according to one embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flow chart of a method of storing a private key according to one embodiment of the present invention. As shown in fig. 1, the method comprises the steps of:
and S1, the private key is fragmented, and the memory is partitioned.
Specifically, as shown in FIG. 2, the memory of the present invention is partitioned twice, first, the memory is partitioned into M1, M2, … Mn, etc. for the first time, and then each partition is sub-partitioned, for example, M n is subdivided into 16 sub-partitions, M n-0, M n-1 … Mn-f, as shown in FIG. 2. The size of the private key fragment is the same as the size of the sub-partition of the storage area, wherein the size refers to the length of the stored sub-partition and is in bytes.
S2, calculating the Hash value of the private key, coding the Hash value according to the section, and determining the initial position of the private key fragment written in the corresponding sub-partition of the first storage partition n according to the section coding.
And S3, storing the data of the private key into the corresponding sub-partition of the first storage partition n in a circular mode according to the starting position.
And S4, jumping, picking and dispersedly storing the data in the first storage partition n to the corresponding second storage partition n' at preset intervals.
And S5, performing data tampering on the first storage partition n to invalidate the data of the first storage partition n.
Specifically, as shown in FIG. 2, the private key and the memory are partitioned and partitioned according to the same size, wherein H0-H f are the private key partition sequence codes, and M n-0-M n-f are the sub-partition sequence codes of the first memory partition n; H0-H f are the segment sequence codes of the Hash value of the private key. Calculating the Hash value of the private key, coding the Hash value according to sections, determining the initial position of the private key fragment when the private key fragment is stored in the memory partition according to the corresponding section value of the Hash value, and writing the initial position into the memory partition. When the writer reaches the bottom of the first storage partition, the contents of the subsequent private key data fragments are continuously written from the beginning of the first storage partition (in a ring mode).
The rightmost side in fig. 3 is the private key shard storage result of the first storage partition n after the processing of steps S1 and S2. In fig. 3, for the content in the rightmost first memory partition, the data is skipped and picked up at certain intervals (for example, 8bits) and stored in the second memory partition n', that is, the data is stored in a secondary distributed manner. Fig. 4 shows the result of data tampering on the content in the first memory partition n after all the content in the first memory partition n is dispersedly stored in the second memory partition n', and the data of the memory partition is invalid after the data is tampered.
The memory is divided into a plurality of partitions and sub-partitions, and the private key can be obtained through a single Hash value through a reverse process of scattered storage of the private key.
Therefore, the storage method can conveniently realize the safe storage of the private key through the dispersed storage of the private key without adding an additional hardware device, prevent the private key from being traversed and read, and reduce the possibility that the private key is violently cracked.
It should be noted that, in the embodiment of the present invention, in the first storage partition n and the second storage partition n ', the values of n and n ' may be obtained by calculating a Hash value of the private key, and the values of n and n ' are not equal to each other and are less than the maximum value of the number of storage partitions.
In the embodiment of the present invention, of the storage partitions processed in steps S1-S5 above, the storage partition not storing data (the storage partition not involved) is implemented by copying and performing data tampering on the data content of the first storage partition n after data invalidation.
In the embodiment of the present invention, the preset interval number is calculated and obtained according to the Hash value of the private key, for example, the preset interval number is 8 bits.
In summary, according to the method for storing the private key of the embodiment of the present invention, the private key is partitioned, and the memory is partitioned, wherein the size of the partition is the same as the size of the partition; calculating a Hash value of the private key, coding the Hash value according to sections, determining an initial position of the private key fragment when the private key fragment is stored in a first storage partition according to the section coding, storing data of the private key in a first storage partition in an annular mode according to the initial position, jumping, picking and dispersedly storing the data in the first storage partition into a corresponding second storage partition at preset intervals, and tampering the data of the first storage partition to invalidate the data of the first storage partition. The storage method can conveniently realize the safe storage of the private key by the scattered storage of the private key without adding an additional hardware device, thereby reducing the possibility that the private key is violently cracked.
Corresponding to the storage method of the private key, the invention also provides a storage device of the private key. Since the device embodiment of the present invention corresponds to the method embodiment described above, details that are not disclosed in the device embodiment may refer to the method embodiment described above, and are not described again in the present invention.
Figure 4 is a block schematic diagram of a storage device for private keys according to one embodiment of the present invention. As shown in fig. 4, the apparatus includes: the system comprises a fragmentation module 1, a partition module 2, a determination module 3, a storage module 4, a pickup module 5 and a tampering module 6.
The fragmentation module 1 is used for fragmenting the private key; the partition module 2 is used for partitioning the memory, wherein the size of the partition is the same as that of the partition; the determining module 3 is used for calculating a Hash value of the private key, coding the Hash value according to a section, and determining the initial position of the private key fragment written in the corresponding sub-partition of the first storage partition n according to the section coding; the storage module 4 is used for storing the data of the private key into the corresponding sub-partition of the first storage partition n in a ring manner according to the initial position; the picking module 5 is used for jumping, picking and dispersedly storing the data in the first storage partition into the corresponding second storage partition at preset intervals; the tampering module 6 is used for performing data tampering on the first storage partition so as to invalidate the data of the first storage partition.
Specifically, as shown in FIG. 2, the fragmentation module 1 and the partition module 2 fragment and partition the private key and the memory according to the same size, where H0-H f are private key fragmentation sequential codes, and M n-0-M n-f are sub-partition sequential codes of the first memory partition n; H0-H f are the segment sequence codes of the Hash value of the private key. The determining module 3 calculates a Hash value of the private key, encodes the Hash value according to a segment, determines the initial position of the private key fragment when the private key fragment is stored in a memory partition according to the corresponding segment value of the Hash value, and the memory module 4 writes the private key fragment into the memory partition. When the writer reaches the bottom of the first storage partition, the contents of the subsequent private key data fragments are continuously written from the beginning of the first storage partition.
The rightmost side in fig. 3 is the private key fragmentation storage result of the first storage partition n processed by the fragmentation module 1 and the partition module 2. In fig. 3, for the content in the rightmost first memory partition, the pickup module 5 skips the pickup data to be stored in the second memory partition n' at a certain number of intervals (for example, 8 bits). Fig. 4 shows the result of data tampering on the content in the first storage partition n by the tampering module 6 after the content in the first storage partition n is all stored in the second storage partition n' in a distributed manner, and the data in the storage partition is invalid after the tampering.
The memory is divided into a plurality of partitions and sub-partitions, and the private key can be obtained through a single Hash value through a reverse process of scattered storage of the private key.
Therefore, the storage device can conveniently realize the safe storage of the private key through the dispersed storage of the private key without adding an additional hardware device, thereby preventing the private key from being traversed and read and reducing the possibility that the private key is violently cracked.
According to one embodiment of the invention, the data storage of the storage partition which does not store the data is realized by copying the data content of the first storage partition n after the data invalidation and performing data tampering.
In the embodiment of the present invention, the preset interval number is calculated and obtained according to the Hash value of the private key, for example, the preset interval number is 8 bits.
According to the storage device of the private key, the fragmentation module fragments the private key, the partition module partitions a storage, the fragmentation size is the same as the partition size, the determining module calculates a Hash value of the private key, the Hash value is coded according to sections, the initial position of the private key fragment when the private key fragment is written in a corresponding sub-partition of the storage partition is determined according to the section coding, the storage module stores data of the private key in a corresponding sub-partition of a first storage partition in an annular mode according to the initial position, the picking module picks up the data in the first storage partition in a jumping mode at preset intervals and stores the data in a corresponding second storage partition in a scattered mode, and the tampering module performs data tampering on the first storage partition so as to enable the data of the first storage partition to be invalid. Therefore, the device can conveniently realize the safe storage of the private key through the dispersed storage of the private key without adding an additional hardware device, and the possibility that the private key is violently cracked is reduced.
The invention also provides a computer device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein when the processor executes the program, the storage method of the private key is realized.
According to the computer device of the embodiment of the invention, when a computer program stored on a memory is operated by a processor, a private key is divided into pieces, the memory is partitioned, wherein the size of each piece is the same as that of each partition, a Hash value of the private key is calculated, the Hash value is coded according to the sections, the initial position of the private key when the private key is written in the corresponding sub-partition of the first memory partition is determined according to the section coding, the data of the private key is stored in the corresponding sub-partition of the first memory partition in a ring mode according to the initial position, the data in the first memory partition is jumped, picked up and stored in the corresponding second memory partition in a scattered mode at preset intervals, data tampering is carried out on the first memory partition, so that the data of the first memory partition is invalidated, and safe storage of the private key can be conveniently realized without adding extra hardware devices through scattered storage of the private key, the possibility of brute force cracking of the private key is reduced.
The invention also proposes a non-transitory computer-readable storage medium on which a computer program is stored which, when executed by a processor, implements the method of storing a private key of the invention described above.
According to the non-transitory computer-readable storage medium of an embodiment of the present invention, when a computer program stored thereon is executed by a processor, a private key is fragmented, and a memory is partitioned, where the size of the fragment is the same as the size of the partition, a Hash value of the private key is calculated, the Hash value is encoded in segments, a start position of the private key fragment when being written in a corresponding sub-partition of a first storage partition is determined according to the segment encoding, data of the private key is stored in a ring manner in the corresponding sub-partition of the first storage partition according to the start position, the data in the first storage partition is jumped to be picked up and stored dispersedly into a corresponding second storage partition at preset intervals, data tampering is performed on the first storage partition to invalidate the data of the first storage partition, and thus secure storage of the private key can be conveniently achieved without adding an additional hardware device by dispersedly storing the private key, the possibility of brute force cracking of the private key is reduced.
In the description of the present invention, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. The meaning of "plurality" is two or more unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction. In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. A method for storing a private key, comprising the steps of:
the private key is divided into pieces, and a memory is partitioned;
calculating a Hash value of the private key, coding the Hash value according to sections, and determining an initial position of the private key fragment when the private key fragment is written in a corresponding sub-partition of a first storage partition according to the section coding;
storing data of a private key into corresponding sub-partitions of the first storage partition in a ring manner according to the initial position;
jumping, picking and dispersedly storing the data in the first storage partition into a corresponding second storage partition at preset intervals;
and performing data tampering on the first storage partition to invalidate the data of the first storage partition.
2. The storage method of the private key, according to claim 1, wherein the data storage is realized by copying and performing data tampering on the data content of the first storage partition after data invalidation.
3. The method as claimed in claim 1, wherein the predetermined interval number is calculated and obtained according to a Hash value of the private key.
4. The method of claim 3, wherein the predetermined number of intervals is 8 bits.
5. An apparatus for storing a private key, comprising:
the fragmentation module is used for fragmenting the private key;
a partitioning module to partition a memory;
the determining module is used for calculating a Hash value of the private key, coding the Hash value according to sections, and determining the initial position of the private key fragment when the private key fragment is stored in a corresponding sub-partition of the first storage partition according to the section coding;
the storage module is used for storing data of a private key into corresponding sub-partitions of the first storage partition in an annular mode according to the initial position;
the picking module is used for jumping, picking and dispersedly storing the data in the first storage partition into the corresponding second storage partition at preset intervals;
the tampering module is used for carrying out data tampering on the first storage partition so as to invalidate the data of the first storage partition.
6. The storage device of private keys according to claim 5,
and the data storage is realized by copying the data content of the first storage partition after the data invalidation and performing data tampering.
7. The apparatus as claimed in claim 5, wherein the predetermined interval number is calculated and obtained according to the Hash value of the private key.
8. The apparatus of claim 7, wherein the predetermined number of intervals is 8 bits.
9. Computer device, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method of storing a private key according to any one of claims 1 to 4 when executing the program.
10. A non-transitory computer-readable storage medium on which a computer program is stored, the program, when executed by a processor, implementing a method of storing a private key according to any one of claims 1-4.
CN202011408645.0A 2020-12-04 2020-12-04 Storage method, storage device, computer equipment and storage medium of private key Active CN112565258B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011408645.0A CN112565258B (en) 2020-12-04 2020-12-04 Storage method, storage device, computer equipment and storage medium of private key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011408645.0A CN112565258B (en) 2020-12-04 2020-12-04 Storage method, storage device, computer equipment and storage medium of private key

Publications (2)

Publication Number Publication Date
CN112565258A true CN112565258A (en) 2021-03-26
CN112565258B CN112565258B (en) 2023-01-31

Family

ID=75048286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011408645.0A Active CN112565258B (en) 2020-12-04 2020-12-04 Storage method, storage device, computer equipment and storage medium of private key

Country Status (1)

Country Link
CN (1) CN112565258B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067799A (en) * 2018-09-28 2018-12-21 歌尔科技有限公司 Data transmission method, system and equipment
CN109379184A (en) * 2018-09-28 2019-02-22 北京金山安全软件有限公司 Block chain private key storage method and device and electronic equipment
CN109388335A (en) * 2017-08-10 2019-02-26 中国移动通信集团宁夏有限公司 A kind of date storage method and system
CN111404682A (en) * 2020-03-17 2020-07-10 江苏恒宝智能系统技术有限公司 Android environment key segmentation processing method and device
CN111428254A (en) * 2020-03-24 2020-07-17 财付通支付科技有限公司 Key storage method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388335A (en) * 2017-08-10 2019-02-26 中国移动通信集团宁夏有限公司 A kind of date storage method and system
CN109067799A (en) * 2018-09-28 2018-12-21 歌尔科技有限公司 Data transmission method, system and equipment
CN109379184A (en) * 2018-09-28 2019-02-22 北京金山安全软件有限公司 Block chain private key storage method and device and electronic equipment
CN111404682A (en) * 2020-03-17 2020-07-10 江苏恒宝智能系统技术有限公司 Android environment key segmentation processing method and device
CN111428254A (en) * 2020-03-24 2020-07-17 财付通支付科技有限公司 Key storage method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN112565258B (en) 2023-01-31

Similar Documents

Publication Publication Date Title
US9811678B2 (en) Method and system for transferring data and instructions through a host file system
KR101318985B1 (en) Apparatus and method for securing contents in cloud computing
US20090113558A1 (en) Progressive boot for a wireless device
US9977598B2 (en) Electronic device and a method for managing memory space thereof
EP3809708B1 (en) Video data storage method and device in cloud storage system
US10804930B2 (en) Compressed data layout with variable group size
US20150278530A1 (en) Method and apparatus for storing redeem code, and method and apparatus for verifying redeem code
US20060259681A1 (en) Method and apparatus for storing compressed code without an index table
CN112799595A (en) Data processing method, device and storage medium
US11042480B2 (en) System, method and apparatus for secure functions and cache line data
CN112565258B (en) Storage method, storage device, computer equipment and storage medium of private key
CN113849859A (en) Linux kernel modification method, terminal device and storage medium
US10942856B2 (en) System, method and apparatus for secure functions and cache line data
CN107832021B (en) Electronic evidence fixing method, terminal equipment and storage medium
CN107395772B (en) Management method and management system for repeated data
CN114153396B (en) Data processing method and device, data storage device and terminal device
US11886581B1 (en) Rapid verification of executing processes
US20170090801A1 (en) System for storing and reading of a message authentication code in an external memory and related method
CN113791735A (en) Video data storage method and device, computer equipment and storage medium
CN111967001A (en) Decoding and coding safety isolation method based on double containers
CN113407492B (en) Method and device for storing file fragments and reorganizing file fragments and file protection system
CN115001818B (en) Lightweight cloud data security deduplication method for resisting random block generation attack
JP7261343B1 (en) Data storage transmission system and method for smart electrical and electronic devices
US20110264706A1 (en) Generating unique identifiers
CN112929395B (en) Cloud data deduplication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 213000 5-a201, chuangyangang, Changzhou science and Education City, No. 18, Changwu Middle Road, Wujin District, Changzhou City, Jiangsu Province

Applicant after: Guochuang mobile energy innovation center (Jiangsu) Co.,Ltd.

Address before: Room 354, No. 18, Xinya Road, Wujin high tech Industrial Development Zone, Changzhou City, Jiangsu Province

Applicant before: National innovation energy automobile intelligent energy equipment innovation center (Jiangsu) Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant