CN113556226B - Mobile terminal secret key safe storage method - Google Patents
Mobile terminal secret key safe storage method Download PDFInfo
- Publication number
- CN113556226B CN113556226B CN202110661439.9A CN202110661439A CN113556226B CN 113556226 B CN113556226 B CN 113556226B CN 202110661439 A CN202110661439 A CN 202110661439A CN 113556226 B CN113556226 B CN 113556226B
- Authority
- CN
- China
- Prior art keywords
- storage
- unit
- value
- mobile terminal
- segment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a mobile terminal secret key safe storage method which is specifically realized through a cloud server, a secret key acquisition unit and a mobile terminal in a storage system, wherein the cloud server is used for storing a fixed secret key acquired by the secret key acquisition unit, and specifically completes the storage of the fixed secret key in a storage preprocessing mode and obtains a storage comparison table; the fixed keys are scattered, so that other people are prevented from invading the cloud server to steal information, and even if the information is invading, the corresponding fixed keys cannot be acquired according to the corresponding rules; the mobile terminal is used for obtaining an orientation value after marking the request signal, carrying out equipment recognition processing on the orientation value to obtain an authentication ID, and fusing the authentication ID and the initiation time to form request information; and finally, the mobile terminal is used for transmitting the request information to the cloud server for authentication and extracting the fixed key according to the authentication result.
Description
Technical Field
The invention belongs to the field of technology, and particularly relates to a mobile terminal key safe storage method.
Background
In recent years, with the development of the mobile internet, a large amount of important data such as personal information and privacy data are collected on a mobile terminal, and once the data are revealed in the network transmission process, serious consequences are brought to users, so that the information security problem is increasingly outstanding. Therefore, encryption processing is necessary to be performed on the data transmitted by the network to ensure the security of the data transmission, so that key storage is a key for ensuring the security of the data. In general, the fixed key written in the source code is easy to obtain through decompilation and other means; the random secret key generated by a specific algorithm can also be obtained by means of decompilation, man-in-the-middle attack and the like to generate the algorithm and even the random secret key, so that the security is difficult to guarantee.
Therefore, it is necessary to provide a solution to the problem of low security of key storage in the internet environment in the conventional encryption technology, and for this purpose, the present application provides a solution for security storage of keys at a mobile terminal. According to the method, the mobile terminal user key is stored in the remote server, so that the unsafe problem of local data storage is solved. When the mobile terminal needs to use the secret key, the mobile terminal sends an asymmetrically encrypted (preventing man-in-the-middle attack) data request to the server, obtains a secret key matched with the mobile terminal from the server, and then carries out secret key negotiation with a communication party, in the negotiation process, in order to prevent man-in-the-middle attack, the transmitted data is also asymmetrically encrypted, the negotiated session secret key is only effective in the data transmission process, the life cycle of the session secret key in a memory is reduced, and white box attack is prevented, thereby ensuring the data transmission safety.
To achieve this, a solution is first provided.
Disclosure of Invention
The invention aims to provide a mobile terminal secret key safe storage method.
The aim of the invention can be achieved by the following technical scheme:
a mobile terminal key safe storage method is realized through a storage system; the specific storage system comprises a cloud server, a key acquisition unit and a mobile terminal;
the cloud server is used for storing the fixed key acquired by the key acquisition unit, particularly finishing the storage of the fixed key in a storage preprocessing mode, and acquiring a storage comparison table;
the mobile terminal is used for obtaining an orientation value after marking the request signal, then carrying out equipment recognition processing on the orientation value to obtain an authentication ID, and fusing the authentication ID and the initiation time to form request information;
and the mobile terminal is used for transmitting the request information to the cloud server for authentication and extracting the fixed key according to the authentication result.
Further, the cloud server comprises a storage module and a self-organizing unit;
the storage module comprises X1 storage units, X1 is a preset value, and X1 is fifteen in detail;
the key acquisition unit is used for acquiring a fixed key of a corresponding mobile terminal, transmitting the fixed key to the self-compiling unit in the cloud server, receiving the fixed key transmitted by the key acquisition unit by the self-compiling unit, and carrying out storage pretreatment on the fixed key to obtain a stored and dispersed comparison table; and the storage of the fixed key is completed.
Further, the value of X1 must be equal to or greater than ten.
Further, the specific steps of the storage pretreatment are as follows:
step one: obtaining a corresponding fixed key;
step two: meanwhile, intercepting a time stamp for acquiring the fixed key, wherein the time stamp is acquired in a month and day time division mode to obtain a time digital group Ci, wherein i=1..8; wherein Ci is represented as the ith number which is sequentially arranged after the dimension is removed by the timestamp;
step three: then obtaining the length of the fixed key, wherein the length value is represented by Cd;
step four: the time digital group is subjected to normalization processing, specifically, a normalization value G is calculated by means of a formula, and the calculation formula of the normalization value G is as follows:
wherein QG { x } is a value in bits of the data in brackets;
step five: dividing the length Cd of the fixed key by G to obtain a numerical value marked as a segmentation value and a remainder; g segments are obtained according to the segment values and the remainder;
the fixed key is divided into G segments, the segments are labeled Pj, j=1..g;
step six: then, obtaining X1 storage units in the storage module, and sequentially marking the storage units as Di, i=1..X1; di represents a memory cell labeled i;
step seven: dislocation storage is carried out on the segment Pj;
step eight: obtaining a dispersion comparison table; and the storage of the fixed key is completed.
Further, the specific way of dislocation storage in the seventh step is as follows:
g is obtained, and when G is an odd number, the G is stored in a staggered one-storing mode, specifically:
the first segment P1 is acquired, let i=g, i.e. the storage unit DG is acquired; storing the first segment P1 from the G-th storage unit; sequentially storing the rest segments P2-PG into subsequent storage units of DG, namely carrying out assignment on i=G in a gradually increasing mode, and if the segments are not stored yet after the first bit is carried out, adopting the last bit; after the storage position of each segment corresponds to the sequence from front to back, a storage comparison table is formed;
when G is not an odd number, the storage is performed in a dislocation two-storage mode, specifically:
the first segment P1 is acquired, let i=g, i.e. the storage unit DG is acquired; storing the first segment P1 from the G-th storage unit; sequentially storing the rest segments P2-PG into a storage unit in front of the DG, namely performing assignment on the i=G in a gradually decreasing mode, and if the segments are not stored yet after the first bit is performed, continuing from the last bit; after the storage position of each segment and the sequence of the segments from front to back are corresponded, a dispersion comparison table is formed.
Further, the specific way of obtaining G segments according to the segment value and the remainder in the fifth step is as follows:
when the remainder is zero, the fixed key is automatically divided into G segments by taking the length of the segment value as one segment, and the length of each segment is the corresponding segment value;
if the remainder is not zero, dividing the length of the last segment into the length of the last segment value plus the remainder;
resulting in G segments.
Further, the mobile terminal comprises an interaction unit, a request analysis unit, a data request unit and a random marking unit;
when a user needs to extract a fixed key, a request signal is initiated through a data request unit and transmitted to a random marking unit, the random marking unit automatically performs marking processing after receiving the request signal transmitted by the data request unit, and the marking processing step only exists in a device appointed by an administrator; obtaining an orientation value;
the random marking unit is used for returning the orientation value to the data request unit, the data request unit transmits the orientation value to the request analysis unit after receiving the orientation value transmitted by the random marking unit, the request analysis unit receives the orientation value transmitted by the data request unit and carries out equipment approval processing, and the equipment approval processing step only designates that equipment exists in an administrator; the device acknowledges that the specific steps of the treatment are as follows:
s01: acquiring a fixed ID of mobile terminal equipment;
s02: then obtaining a corresponding orientation value;
s03: selecting from the first character, acquiring a corresponding character of a first orientation value, and marking the character as a hit character;
s04: then, the hit character is arranged at the first bit of the fixed ID to form a new authentication ID;
s05: fusing the authentication ID and the initiation time to form request information;
transmitting the request information to a self-organizing unit in the cloud server through an interaction unit, wherein the self-organizing unit automatically acquires an ID address of the request information after receiving the request information transmitted by the interaction unit; the self-organizing unit is used for carrying out identity authentication, and the identity authentication mode is as follows:
SS1: after the corresponding request information is acquired;
SS2: automatically calling an analysis rule in the self-organizing unit, wherein the analysis rule is a marking process and a device recognition process of the mobile terminal and is used for splicing the ID address into a contact ID according to the initiating time;
SS3: when the contact ID is consistent with the authentication ID, the identity authentication is automatically passed, otherwise, no processing is performed, and an identity authentication failure signal is returned;
SS4: after passing the authentication, automatically extracting the fixed key according to the stored and dispersed comparison table;
SS5: obtaining a fixed key;
the self-compiling unit is used for returning the fixed key to the mobile terminal.
Further, the specific steps of the marking process are as follows:
s1: acquiring a time stamp initiated by a request signal, and marking the time stamp as initiation time;
s2: adding the time of the time stamp and the numerical value of the position of the minute, and taking the numerical value on the bit;
s3: the obtained value is marked as an orientation value.
The invention has the beneficial effects that:
the method is specifically realized by a cloud server, a key acquisition unit and a mobile terminal in a storage system, wherein the cloud server is used for storing the fixed key acquired by the key acquisition unit, and specifically completes the storage of the fixed key in a storage preprocessing mode, and a storage comparison table is obtained; the fixed keys are scattered, so that other people are prevented from invading the cloud server to steal information, and even if the information is invading, the corresponding fixed keys cannot be acquired according to the corresponding rules;
the mobile terminal is used for obtaining an orientation value after marking the request signal, carrying out equipment recognition processing on the orientation value to obtain an authentication ID, and fusing the authentication ID and the initiation time to form request information; and finally, the mobile terminal is used for transmitting the request information to the cloud server for authentication and extracting the fixed key according to the authentication result. Through the corresponding steps placed on the appointed equipment and the two-phase verification with the cloud server, the confirmation of the equipment correctness is completed, the related information is prevented from being stolen on other equipment, the fixed key can be extracted only by the appointed equipment, and the condition that the ID address is changed and the personal account is stolen is avoided.
Drawings
The present invention is further described below with reference to the accompanying drawings for the convenience of understanding by those skilled in the art.
Fig. 1 is a system block diagram of the present invention.
Detailed Description
As shown in fig. 1, a mobile terminal key secure storage method is implemented through a storage system; the specific storage system comprises a cloud server, a key acquisition unit and a mobile terminal;
the cloud server comprises a storage module and a self-organizing unit; the mobile terminal comprises an interaction unit, a request analysis unit, a data request unit and a random marking unit;
the storage module comprises X1 storage units, X1 is a preset numerical value, the specific value of X1 can be fifteen, and the value of X1 must be more than or equal to ten;
the key acquisition unit is used for acquiring the fixed key of the corresponding mobile terminal and transmitting the fixed key to the self-compiling unit in the cloud server, and the self-compiling unit receives the fixed key transmitted by the key acquisition unit and performs storage preprocessing on the fixed key, wherein the specific steps of the storage preprocessing are as follows:
step one: obtaining a corresponding fixed key;
step two: meanwhile, intercepting a time stamp for acquiring the fixed key, wherein the time stamp is acquired in a month and day time division mode to obtain a time digital group Ci, wherein i=1..8; wherein Ci is represented as the ith number which is sequentially arranged after the dimension is removed by the timestamp;
step three: then obtaining the length of the fixed key, wherein the length value is represented by Cd;
step four: the time digital group is subjected to normalization processing, specifically, a normalization value G is calculated by means of a formula, and the calculation formula of the normalization value G is as follows:
wherein QG { x } is a value in bits of the data in brackets;
step five: dividing the length Cd of the fixed key by G to obtain a numerical value marked as a segmentation value and a remainder; when the remainder is zero, the fixed key is automatically divided into G segments by taking the length of the segment value as one segment, and the length of each segment is the corresponding segment value;
if the remainder is not zero, dividing the length of the last segment into the length of the last segment value plus the remainder;
obtaining G segments;
the fixed key is divided into G segments, the segments are labeled Pj, j=1..g;
step six: then, obtaining X1 storage units in the storage module, and sequentially marking the storage units as Di, i=1..X1; di represents a memory cell labeled i;
step seven: the segment Pj is subjected to dislocation storage, and the specific dislocation storage mode is as follows:
g is obtained, and when G is an odd number, the G is stored in a staggered one-storing mode, specifically:
the first segment P1 is acquired, let i=g, i.e. the storage unit DG is acquired; storing the first segment P1 from the G-th storage unit; sequentially storing the rest segments P2-PG into subsequent storage units of DG, namely carrying out assignment on i=G in a gradually increasing mode, and if the segments are not stored yet after the first bit is carried out, adopting the last bit; after the storage position of each segment corresponds to the sequence from front to back, a storage comparison table is formed;
when G is not an odd number, the storage is performed in a dislocation two-storage mode, specifically:
the first segment P1 is acquired, let i=g, i.e. the storage unit DG is acquired; storing the first segment P1 from the G-th storage unit; sequentially storing the rest segments P2-PG into a storage unit in front of the DG, namely performing assignment on the i=G in a gradually decreasing mode, and if the segments are not stored yet after the first bit is performed, continuing from the last bit; after the storage position of each segment corresponds to the sequence from front to back, a storage comparison table is formed;
step eight: obtaining a dispersion comparison table; and the storage of the fixed key is completed;
when a user needs to extract a fixed key, a request signal is initiated through a data request unit and transmitted to a random marking unit, the random marking unit automatically performs marking processing after receiving the request signal transmitted by the data request unit, and the marking processing step only exists in a device appointed by an administrator; the marking process comprises the following specific steps:
s1: acquiring a time stamp initiated by a request signal, and marking the time stamp as initiation time;
s2: adding the time of the time stamp and the numerical value of the position of the minute, and taking the numerical value on the bit;
s3: marking the obtained value as an orientation value;
the random marking unit is used for returning the orientation value to the data request unit, the data request unit transmits the orientation value to the request analysis unit after receiving the orientation value transmitted by the random marking unit, the request analysis unit receives the orientation value transmitted by the data request unit and carries out equipment approval processing, and the equipment approval processing step only designates that equipment exists in an administrator; the device acknowledges that the specific steps of the treatment are as follows:
s01: acquiring a fixed ID of mobile terminal equipment;
s02: then obtaining a corresponding orientation value;
s03: selecting from the first character, acquiring a corresponding character of a first orientation value, and marking the character as a hit character;
s04: then, the hit character is arranged at the first bit of the fixed ID to form a new authentication ID;
s05: fusing the authentication ID and the initiation time to form request information;
transmitting the request information to a self-organizing unit in the cloud server through an interaction unit, wherein the self-organizing unit automatically acquires an ID address of the request information after receiving the request information transmitted by the interaction unit; the self-organizing unit is used for carrying out identity authentication, and the identity authentication mode is as follows:
SS1: after the corresponding request information is acquired;
SS2: automatically calling an analysis rule in the self-organizing unit, wherein the analysis rule is a marking process and a device recognition process of the mobile terminal and is used for splicing the ID address into a contact ID according to the initiating time;
SS3: when the contact ID is consistent with the authentication ID, the identity authentication is automatically passed, otherwise, no processing is performed, and an identity authentication failure signal is returned;
SS4: after passing the authentication, automatically extracting the fixed key according to the stored and dispersed comparison table;
SS5: obtaining a fixed key;
the self-compiling unit is used for returning the fixed key to the mobile terminal.
The method is specifically realized through a cloud server, a key acquisition unit and a mobile terminal in a storage system, wherein the cloud server is used for storing the fixed key acquired by the key acquisition unit, and specifically completes the storage of the fixed key in a storage preprocessing mode, and a storage comparison table is obtained; the fixed keys are scattered, so that other people are prevented from invading the cloud server to steal information, and even if the information is invading, the corresponding fixed keys cannot be acquired according to the corresponding rules;
the mobile terminal is used for obtaining an orientation value after marking the request signal, carrying out equipment recognition processing on the orientation value to obtain an authentication ID, and fusing the authentication ID and the initiation time to form request information; and finally, the mobile terminal is used for transmitting the request information to the cloud server for authentication and extracting the fixed key according to the authentication result. Through the corresponding steps placed on the appointed equipment and the two-phase verification with the cloud server, the confirmation of the equipment correctness is completed, the related information is prevented from being stolen on other equipment, the fixed key can be extracted only by the appointed equipment, and the condition that the ID address is changed and the personal account is stolen is avoided.
The foregoing is merely illustrative of the structures of this invention and various modifications, additions and substitutions for those skilled in the art can be made to the described embodiments without departing from the scope of the invention or from the scope of the invention as defined in the accompanying claims.
Claims (4)
1. The mobile terminal secret key safe storage method is characterized in that the method is realized through a storage system; the specific storage system comprises a cloud server, a key acquisition unit and a mobile terminal;
the cloud server is used for storing the fixed key acquired by the key acquisition unit, particularly finishing the storage of the fixed key in a storage preprocessing mode, and acquiring a storage comparison table;
the mobile terminal is used for obtaining an orientation value after marking the request signal, then carrying out equipment recognition processing on the orientation value to obtain an authentication ID, and fusing the authentication ID and the initiation time to form request information;
the mobile terminal is used for transmitting the request information to the cloud server for authentication and extracting the fixed key according to the authentication result;
the cloud server comprises a storage module and a self-organizing unit;
the storage module comprises X1 storage units, wherein X1 is a preset value;
the key acquisition unit is used for acquiring a fixed key of a corresponding mobile terminal, transmitting the fixed key to the self-compiling unit in the cloud server, receiving the fixed key transmitted by the key acquisition unit by the self-compiling unit, and carrying out storage pretreatment on the fixed key to obtain a stored and dispersed comparison table; and the storage of the fixed key is completed;
the specific steps of the storage pretreatment are as follows:
step one: obtaining a corresponding fixed key;
step two: meanwhile, intercepting a time stamp for acquiring the fixed key, wherein the time stamp is acquired in a month and day time division mode to obtain a time digital group Ci, wherein i=1..8; wherein Ci is represented as the ith number which is sequentially arranged after the dimension is removed by the timestamp;
step three: then obtaining the length of the fixed key, wherein the length value is represented by Cd;
step four: the time digital group is subjected to normalization processing, specifically, a normalization value G is calculated by means of a formula, and the calculation formula of the normalization value G is as follows:
wherein QG { x } is a value in bits of the data in brackets;
step five: dividing the length Cd of the fixed key by G to obtain a numerical value marked as a segmentation value and a remainder; g segments are obtained according to the segment values and the remainder;
the fixed key is divided into G segments, the segments are labeled Pj, j=1..g;
step six: then, obtaining X1 storage units in the storage module, and sequentially marking the storage units as Di, i=1..X1; di represents a memory cell labeled i;
step seven: dislocation storage is carried out on the segment Pj; the specific mode of dislocation storage is as follows:
g is obtained, and when G is an odd number, the G is stored in a staggered one-storing mode, specifically:
the first segment P1 is acquired, let i=g, i.e. the storage unit DG is acquired; storing the first segment P1 from the G-th storage unit; sequentially storing the rest segments P2-PG into subsequent storage units of DG, namely carrying out assignment on i=G in a gradually increasing mode, and if the segments are not stored yet after the first bit is carried out, adopting the last bit; after the storage position of each segment corresponds to the sequence from front to back, a storage comparison table is formed;
when G is not an odd number, the storage is performed in a dislocation two-storage mode, specifically:
the first segment P1 is acquired, let i=g, i.e. the storage unit DG is acquired; storing the first segment P1 from the G-th storage unit; sequentially storing the rest segments P2-PG into a storage unit in front of the DG, namely performing assignment on the i=G in a gradually decreasing mode, and if the segments are not stored yet after the first bit is performed, continuing from the last bit; after the storage position of each segment corresponds to the sequence from front to back, a storage comparison table is formed;
step eight: obtaining a dispersion comparison table; and the storage of the fixed key is completed;
the specific way of obtaining G segments according to the segment value and remainder is as follows:
when the remainder is zero, the fixed key is automatically divided into G segments by taking the length of the segment value as one segment, and the length of each segment is the corresponding segment value;
if the remainder is not zero, dividing the length of the last segment into the length of the last segment value plus the remainder;
resulting in G segments.
2. The method for securely storing a mobile terminal key according to claim 1, wherein the value of X1 must be equal to or greater than ten.
3. The mobile terminal key secure storage method according to claim 1, wherein the mobile terminal comprises an interaction unit, a request analysis unit, a data request unit and a random marking unit;
when a user needs to extract a fixed key, a request signal is initiated through a data request unit and transmitted to a random marking unit, the random marking unit automatically performs marking processing after receiving the request signal transmitted by the data request unit, and the marking processing step only exists in a device appointed by an administrator; obtaining an orientation value;
the random marking unit is used for returning the orientation value to the data request unit, the data request unit transmits the orientation value to the request analysis unit after receiving the orientation value transmitted by the random marking unit, the request analysis unit receives the orientation value transmitted by the data request unit and carries out equipment approval processing, and the equipment approval processing step only designates that equipment exists in an administrator; the device acknowledges that the specific steps of the treatment are as follows:
s01: acquiring a fixed ID of mobile terminal equipment;
s02: then obtaining a corresponding orientation value;
s03: selecting from the first character, acquiring a corresponding character of a first orientation value, and marking the character as a hit character;
s04: then, the hit character is arranged at the first bit of the fixed ID to form a new authentication ID;
s05: fusing the authentication ID and the initiation time to form request information;
transmitting the request information to a self-organizing unit in the cloud server through an interaction unit, wherein the self-organizing unit automatically acquires an ID address of the request information after receiving the request information transmitted by the interaction unit; the self-organizing unit is used for carrying out identity authentication, and the identity authentication mode is as follows:
SS1: after the corresponding request information is acquired;
SS2: automatically calling an analysis rule in the self-organizing unit, wherein the analysis rule is a marking process and a device recognition process of the mobile terminal and is used for splicing the ID address into a contact ID according to the initiating time;
SS3: when the contact ID is consistent with the authentication ID, the identity authentication is automatically passed, otherwise, no processing is performed, and an identity authentication failure signal is returned;
SS4: after passing the authentication, automatically extracting the fixed key according to the stored and dispersed comparison table;
SS5: obtaining a fixed key;
the self-compiling unit is used for returning the fixed key to the mobile terminal.
4. The method for securely storing a mobile terminal key according to claim 1, wherein the marking process comprises the specific steps of:
s1: acquiring a time stamp initiated by a request signal, and marking the time stamp as initiation time;
s2: adding the time of the time stamp and the numerical value of the position of the minute, and taking the numerical value on the bit;
s3: the obtained value is marked as an orientation value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110661439.9A CN113556226B (en) | 2021-06-15 | 2021-06-15 | Mobile terminal secret key safe storage method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110661439.9A CN113556226B (en) | 2021-06-15 | 2021-06-15 | Mobile terminal secret key safe storage method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113556226A CN113556226A (en) | 2021-10-26 |
CN113556226B true CN113556226B (en) | 2023-07-28 |
Family
ID=78102106
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110661439.9A Active CN113556226B (en) | 2021-06-15 | 2021-06-15 | Mobile terminal secret key safe storage method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113556226B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102164122A (en) * | 2010-02-16 | 2011-08-24 | 株式会社理光 | Mediation apparatus, installation system, installation method, and installation program |
CN104580487A (en) * | 2015-01-20 | 2015-04-29 | 成都信升斯科技有限公司 | Mass data storage system and processing method |
CN105656864A (en) * | 2014-11-27 | 2016-06-08 | 航天恒星科技有限公司 | TCM-based key management system and management method |
US9419954B1 (en) * | 2014-06-10 | 2016-08-16 | Lockheed Martin Corporation | Storing and transmitting sensitive data |
CN108234662A (en) * | 2018-01-09 | 2018-06-29 | 江苏徐工信息技术股份有限公司 | A kind of secure cloud storage method with active dynamic key distribution mechanisms |
CN111447053A (en) * | 2020-03-24 | 2020-07-24 | 重庆邮电大学 | Data secure transmission method and system based on chaotic logic mapping and RC4 stream cipher |
CN112513844A (en) * | 2018-07-24 | 2021-03-16 | 三星电子株式会社 | Secure element for processing and authenticating digital keys and method of operation thereof |
CN112784250A (en) * | 2021-01-27 | 2021-05-11 | 深圳融安网络科技有限公司 | Identity authentication method, client, server and storage medium |
-
2021
- 2021-06-15 CN CN202110661439.9A patent/CN113556226B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102164122A (en) * | 2010-02-16 | 2011-08-24 | 株式会社理光 | Mediation apparatus, installation system, installation method, and installation program |
US9419954B1 (en) * | 2014-06-10 | 2016-08-16 | Lockheed Martin Corporation | Storing and transmitting sensitive data |
CN105656864A (en) * | 2014-11-27 | 2016-06-08 | 航天恒星科技有限公司 | TCM-based key management system and management method |
CN104580487A (en) * | 2015-01-20 | 2015-04-29 | 成都信升斯科技有限公司 | Mass data storage system and processing method |
CN108234662A (en) * | 2018-01-09 | 2018-06-29 | 江苏徐工信息技术股份有限公司 | A kind of secure cloud storage method with active dynamic key distribution mechanisms |
CN112513844A (en) * | 2018-07-24 | 2021-03-16 | 三星电子株式会社 | Secure element for processing and authenticating digital keys and method of operation thereof |
CN111447053A (en) * | 2020-03-24 | 2020-07-24 | 重庆邮电大学 | Data secure transmission method and system based on chaotic logic mapping and RC4 stream cipher |
CN112784250A (en) * | 2021-01-27 | 2021-05-11 | 深圳融安网络科技有限公司 | Identity authentication method, client, server and storage medium |
Non-Patent Citations (1)
Title |
---|
一种对称密钥的密钥管理方法及系统;苏威积;汤敬浩;李剑;;信息安全研究(第01期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113556226A (en) | 2021-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107528688A (en) | A kind of keeping of block chain key and restoration methods, device based on encryption commission technology | |
CN107925581A (en) | 1:N organism authentications, encryption, signature system | |
CN110070363B (en) | Account management method and verification method in block chain network and terminal equipment | |
CN112751855A (en) | Cross-browser user data security management system based on encryption technology | |
CN101944216A (en) | Two-factor online transaction safety authentication method and system | |
CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
CN115242514B (en) | Privacy set intersection method and system based on state secret, electronic equipment and storage medium | |
CN110138548A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system | |
CN111475690B (en) | Character string matching method and device, data detection method and server | |
CN105791277A (en) | Identity authentication method | |
CN111698253A (en) | Computer network safety system | |
CN115333809A (en) | Data desensitization and restoration method based on symmetric encryption | |
CN112398920A (en) | Medical privacy data protection method based on block chain technology | |
CN114547589A (en) | Privacy-protecting user registration and user authentication method and device | |
CN110287717A (en) | A kind of data sharing method based on cloud computing | |
CN110098925A (en) | Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system | |
CN112287371B (en) | Method and device for storing industrial data and computer equipment | |
CN101667255A (en) | Security authentication method, device and system for radio frequency identification | |
CN113556226B (en) | Mobile terminal secret key safe storage method | |
CN116049792B (en) | Face registration and recognition method and face data protection system | |
CN114866317B (en) | Multi-party data security calculation method and device, electronic equipment and storage medium | |
CN104009851A (en) | One-time pad bidirectional authentication safe logging technology for internet bank | |
CN115396149A (en) | Efficient authentication key exchange method based on privacy protection | |
CN117201197B (en) | Personal communication network encryption method | |
CN110581820A (en) | Financial science and technology application system and method based on IPV6 and biological recognition technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |