WO2012075764A1 - 关键参数的存储方法及终端设备 - Google Patents

关键参数的存储方法及终端设备 Download PDF

Info

Publication number
WO2012075764A1
WO2012075764A1 PCT/CN2011/072931 CN2011072931W WO2012075764A1 WO 2012075764 A1 WO2012075764 A1 WO 2012075764A1 CN 2011072931 W CN2011072931 W CN 2011072931W WO 2012075764 A1 WO2012075764 A1 WO 2012075764A1
Authority
WO
WIPO (PCT)
Prior art keywords
segmentation
key parameters
terminal device
encryption
original key
Prior art date
Application number
PCT/CN2011/072931
Other languages
English (en)
French (fr)
Inventor
滕文星
王延平
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012075764A1 publication Critical patent/WO2012075764A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Definitions

  • the present invention relates to the field of communications, and in particular, to a method and a terminal device for storing key parameters.
  • BACKGROUND When a terminal accesses a service, changes information of an application user, and accesses after restarting, the terminal performs authentication.
  • the purpose of authentication is to verify the legitimacy of the terminal and protect the interests of legitimate users, while avoiding unnecessary losses to the operators.
  • there are many algorithms for authentication for example, the COMP 128-1 algorithm in the Global System for Mobile communications (GSM), and the third generation mobile communications (3G).
  • GSM Global System for Mobile communications
  • 3G Third Generation mobile communications
  • CAVE Cellular Authentication Voice Encryption
  • AKA Milenage algorithm-based authentication and key agreement in 3G, Long Term Evolution (LTE) Key Agreement
  • the terminal and the base station each hold a key, the key cannot be transmitted, and then the public key is randomly generated. Can be transmitted over the air.
  • the mobile station and the base station respectively generate respective "authentication codes” through the “authentication feature procedure” by using the respective public keys and keys, and then compare the authentication codes of the two, and if the authentication codes are the same, the authentication passes; Otherwise, the authentication will not pass.
  • the IQ of criminals is getting higher and higher, and the means of committing crimes are becoming more and more sophisticated.
  • Some lawless elements use terminal devices such as fixed stations and data cards as the integrated card and authentication key.
  • the feature stored on the terminal relies on tools, over-the-air (OTA) numbering, etc. to find the key storage location, thereby illegally obtaining the key, and the illegally acquired key and electronic sequence.
  • the information such as the Electronic Serial Number (ESN) is burned onto a new card, and the new card with the key can be authenticated and become a legal card for illegal activities.
  • the card fee is cheaper than that of the ordinary card. Therefore, there is a certain market. It can be seen that the criminals use the above methods to steal the card and rely on the sale of the card for illegal interests. .
  • the interests of both providers and users in order to prevent similar unlawful conduct, related technology provides two methods: (1) the key parameters for the local storage; (2) the key parameters of simple processing.
  • a primary object of the present invention is to provide a storage solution of key parameters to at least solve one of the problems in the related art that the criminals can easily acquire the key parameters of the terminal storage, thereby causing damage to the interests of the operator and the user.
  • a storage method of key parameters is provided.
  • the storage method of the key parameters according to the present invention includes the following steps: processing the original key parameters of the key stored in the terminal device according to a predetermined policy, wherein the predetermined policy includes an encryption algorithm and a segmentation rule; and the processed data is used. Discrete memory is scatter-stored.
  • processing the original key parameters of the key stored in the terminal device according to a predetermined policy comprises: encrypting the original key parameters according to an encryption algorithm, and segmenting the new sequence generated after the encryption according to the segmentation rule; or The original key parameters are segmented according to the segmentation rule, and each segment of the segmented data is encrypted according to an encryption algorithm.
  • the processed data is distributed and stored in a discrete memory, including: a correspondence between the processed data and its storage location; a correspondence between the processed data and its storage location and a predetermined policy, and the original key parameters are restored. .
  • the method further comprises: verifying the original key parameters after the restoration.
  • the encryption algorithm includes at least one of the following: a random algorithm, an AES algorithm, a DES algorithm, a null, an exclusive OR.
  • the segmentation rule includes at least one of the following: the number of segments, the size of each segment after segmentation, the order of segments, and the content of segments.
  • the terminal device includes: a pre-processing module configured to process the original key parameters of the stored key according to a predetermined policy, wherein the predetermined policy includes an encryption algorithm and a segmentation rule; and the storage module is configured to pre-process The processed data of the module is stored in discrete memory using discrete memory.
  • the pre-processing module comprises: a first encryption unit configured to encrypt the original key parameters according to an encryption algorithm; and a first segmentation unit configured to encrypt the new sequence generated by the first encryption unit according to a segmentation rule Or segmentation unit; or, the second segmentation unit is configured to segment the original key parameter according to the segmentation rule; the second encryption unit is configured to encrypt each segment of the data segmented by the second segmentation unit according to an encryption algorithm .
  • the terminal device further includes: a recording module configured to record a correspondence between the processed data of the preprocessing module and its storage location; and a recovery module configured to process the processed data according to the predetermined policy and the preprocessing module recorded by the recording module Correspondence of storage locations to restore original key parameters.
  • the terminal device further comprises: a verification module, configured to verify the original key parameters after the restoration.
  • FIG. 1 is a flowchart of a method for storing key parameters according to an embodiment of the present invention
  • FIG. 2 is a structural block diagram of a terminal device according to an embodiment of the present invention
  • FIG. 3 is a terminal device according to a preferred embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a key parameter storage algorithm involved in a module according to a preferred embodiment of the present invention
  • 5 is a flow chart of a key parameter decentralized encrypted storage algorithm according to a preferred embodiment 3 of the present invention
  • FIG. 6 is a flow chart of a key parameter acquisition process according to a preferred embodiment 4 of the present invention.
  • Step S102 The original key parameters of the key stored in the terminal device are predetermined.
  • the policy is processed, wherein the predetermined policy includes an encryption algorithm and a segmentation rule; and in step S104, the processed data is distributed and stored using discrete memory.
  • the discrete memory is used for distributed storage, which solves the problem that the criminals in the related art easily acquire the key parameters of the terminal storage and damage the interests of the operator and the user. , improve the security and performance of the system.
  • the original key parameters may be encrypted according to an encryption algorithm, and then the new sequence generated after the encryption is segmented according to the segmentation rule; or, the original key parameters are first performed according to the segmentation rule. Segmentation, and then encrypt each segment of the data according to the encryption algorithm.
  • This approach can increase the flexibility of the system.
  • the correspondence between the processed data and its storage location may be recorded; and the original key parameters are restored according to the correspondence between the processed data and its storage location and the predetermined policy. This can increase the effectiveness and orderliness of the system.
  • the original key parameters after the restoration are verified. This method can ensure that the key parameters have been correctly restored and improve the accuracy of the system.
  • the foregoing encryption algorithm includes at least one of the following: a random algorithm, an advanced encryption standard
  • the segmentation rule includes at least one of the following: the number of segments, the size of each segment after segmentation, the order of segments, and the content of segments.
  • the method is simple to implement and has high operability.
  • a terminal device is also provided in this embodiment. 2 is a structural block diagram of a terminal device according to an embodiment of the present invention. As shown in FIG.
  • the terminal device 20 includes: a pre-processing module 22 configured to process original key parameters of a stored key according to a predetermined policy, where The predetermined policy includes an encryption algorithm and a segmentation rule.
  • the storage module 24 is coupled to the pre-processing module 22, and configured to use the discrete memory to perform distributed storage. After the pre-processing module 22 encrypts and segments the key parameters, the storage module 24 uses discrete memory for distributed storage, which solves the problem that the illegal elements in the related art can easily acquire the key parameters of the terminal storage, thereby causing damage to operators and users. The issue of interest has improved the security and performance of the system.
  • FIG. 3 is a structural block diagram of a terminal device according to a preferred embodiment of the present invention. As shown in FIG.
  • the pre-processing module 22 includes: a first encryption unit 222 and a first segmentation unit 224, or a second segmentation unit 226 and The second encryption unit 228.
  • the first encryption unit 222 is configured to encrypt the original key parameters according to the encryption algorithm.
  • the first segmentation unit 224 is coupled to the first encryption unit 222 and configured to encrypt the new sequence generated by the first encryption unit 222. Segmentation according to the segmentation rule; the second segmentation unit 226 is configured to segment the original key parameters according to the segmentation rule; the second encryption unit 228 is coupled to the second segmentation unit 226, and is set to the second segment
  • Each segment of data segmented by segment unit 226 is encrypted according to an encryption algorithm.
  • the terminal device 20 further includes: a recording module 32 coupled to the storage module 24, configured to record the correspondence between the processed data of the preprocessing module 22 and its storage location; the recovery module 34, coupled to the recording module 32, is configured to be The predetermined relationship between the processed data of the pre-processing module 22 and the storage location recorded by the predetermined policy and recording module 32 restores the original key parameters.
  • the terminal device 20 further includes: a verification module 36 coupled to the recovery module 34, configured to verify the original key parameters after the restoration.
  • Preferred embodiment 1 For the case where the criminals find the parameters by finding the fixed position, these key parameters can be divided into multiple segments, and the segments are distributed in different locations and stored, and then combined. However, if it is only a simple segmentation, the criminals can also obtain these key parameters by searching the segmentation parameter method separately - find the relevant position and piece together the segments.
  • the first embodiment encrypts the original data, and then divides the encrypted data into multiple segments and stores them in different locations in a distributed manner, so as to prevent the criminals from directly reading in the plaintext by using various means. Take or speculate on the illegal behavior of key parameters.
  • the preferred embodiment of the present invention provides a key parameter decentralized encryption storage solution, including the following processing steps: Step 1: Encrypt the original key parameters to generate a new sequence, so that the illegal elements cannot directly search for the relevant plaintext. . Step 2: Segment the new sequence, determine the number and size of the segments, and number each segment so that it can be reorganized by number in the future. Each segment is allocated a storage space of sufficient size to store each segment in the storage space. , record the address of each segment of storage space and the correspondence between the segments.
  • the original key parameters may be processed in advance to make the culture unclear.
  • the processing method may be a certain fixed rule, for example, a uniform divisible or different value, or a non-operation, etc., so that the execution efficiency is high, but the rules are simple, and the deciphering is better; Some encryption algorithms, such as AES, DES, etc., have good confidentiality, but the operation speed is slow.
  • the number of segments may be a fixed value, or may be randomly generated in a certain range; the segment size of the segment may also be a fixed size segment, or a certain rule may be specified. Segmentation;
  • the location of the storage can be a fixed location or dynamically selected. The random approach can increase the difficulty of finding segments, making the cost of obtaining parameters more than the benefits that might be obtained.
  • FIG. 4 is a schematic diagram of a key parameter storage algorithm involved in a module according to a preferred embodiment of the present invention and its relationship. As shown in FIG.
  • the system can be divided into four modules, including a parameter encryption module and a parameter segmentation module.
  • the location allocation module and the storage parameter module are described in detail below.
  • a parameter encryption module configured to encrypt the original key parameters so that they are not presented in the plaintext in the memory
  • the parameter segmentation module is configured to divide the parameter strings, and determine the number, size, order, and content of the segments
  • a module configured to determine a storage order and a storage location of each segment
  • a storage module configured to perform storage functions of each segment and related information (eg, number of segments, segment size, segment location, etc.).
  • Step S502 obtaining original key parameters.
  • Step S504 Encrypt the obtained original key parameters by using an encryption algorithm (for example, a random key).
  • the key required for encryption can use a random key. The advantage of this is that you need to add 4 dances compared to the fixed key.
  • Step S506 determining whether the encryption is successful. If the encryption is successful, the process proceeds to step 4 to S508, otherwise, the process proceeds to step S522. In step S508, a new parameter sequence is generated, and the random key is saved, so that the next access parameter is used. Step S510, segmenting the new parameter value.
  • step S512 it is determined whether the segmentation is successful. If the segmentation is successful, the process proceeds to step S514, otherwise, the process proceeds to step S524.
  • step S514 the number of segments N is stored, and the segment order is numbered. At the same time, the segment order and the size (eg, length) of each segment are recorded.
  • step S516, determining a storage location for each segment. These locations should be discretely scattered throughout the memory space. The location information corresponding to the segment is saved for subsequent reading.
  • step S520 N parameter segments are stored in N locations. And each segment number, segment size and address can be stored in an array.
  • step S520 the parameter storage is successful, and the process ends.
  • step S522 determining whether the number of times the encryption is unsuccessful is less than 3 times. If it is less than 3 times, the process proceeds to step S504 to reacquire the random key to encrypt the original key parameters; otherwise, the process proceeds to step S524. It should be noted that the number of unsuccessful encryptions is defined as 3 times according to the empirical value. In the specific implementation process, it can be set by itself, and is not limited to this value.
  • step S524 the parameter storage fails, and the process ends. Preferred Embodiment 4 FIG.
  • Step S602 The number of segments N stored, for example, can be acquired three times in succession. If the acquisition is unsuccessful, the process proceeds to step S622. If the acquisition is successful, the process proceeds to step S604.
  • Step S604 acquiring a segmentation information storage data structure (for example, an array), wherein the data structure stores a sequence of segments and a storage location pointer of each segment. The storage location can be found by the pointer, and the storage content of the storage location is obtained according to the size of the segment saved in the data structure.
  • a segmentation information storage data structure for example, an array
  • Step S606 determining whether the data structure is obtained successfully. If successful, the process proceeds to step S608, otherwise, the process proceeds to step S622.
  • Step S608 according to the correspondence between the segmentation order and the address, splicing the segments into one whole. For example, each segment can be found in order and stitched together as a whole.
  • Step S610 determining whether the splicing is successful. If the splicing is successful, the process proceeds to step S612, and if an abnormality occurs (for example, the storage location is out of bounds, etc.), the parameter acquisition failure processing is entered.
  • an abnormality for example, the storage location is out of bounds, etc.
  • Step S612 obtaining a saved random key.
  • step S614 it is determined whether the acquisition of the random key is successful. If the acquisition is successful, the process proceeds to step S616, and if the acquisition fails, the process proceeds to step S622.
  • step S616, running a decryption algorithm according to the key parameter to obtain an original key parameter. That is, the decoding obtains the original key parameters.
  • step S618, the parameter is used, and at the same time, the encrypted storage process is repeated, and the key parameters are saved again. After the parameters are used, in order to ensure the security of the random key, the random key can be replaced again.
  • the key parameters are encrypted by the encryption algorithm, and then encrypted and re-segmented.
  • the stored procedure is consistent with the above process, and the number of segments is also randomly selected. , determine the segment size, storage location, etc., and finally save the key parameters again.
  • step S620 the parameter storage is successful, and the process ends.
  • step S622 the parameter acquisition fails, the return fails, and the process ends.
  • the key parameter decentralized encryption storage scheme of the embodiment of the present invention can effectively suppress the stealing number of the criminal by using the discrete memory to perform the decentralized storage after encrypting and segmenting the key parameters. Behavior, thereby effectively protecting the legitimate interests of businesses and users.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Description

关键 的存储方法及终端设备 技术领域 本发明涉及通信领域, 尤其涉及一种关键参数的存储方法及终端设备。 背景技术 终端在业务接入、 申请用户相关信息更改和重启后接入等情况下, 会进 行鉴权。 鉴权的目的是为了检验终端的合法性、 保护合法用户的利益, 同时 还要避免给运营商带来不必要的损失。 目前, 鉴权的算法很多, 例如, 全球 移动通信系统 ( Global System for Mobile communications, 简称为 GSM ) 中 的 COMP 128-1 算法、 第 3 代移动通信 ( the third generation mobile communications,简称为 3G )中的蜂窝鉴权和语音力口密( Cellular Authentication Voice Encryption, 简称为 CAVE ) 算法, 还是 3G、 长期演进 ( Long Term Evolution , 简称为 LTE ) 中的基于 Milenage 算法的鉴权和密钥同意 ( Authentication and key Agreement, 简称为 AKA )鉴权。 大多釆用的方式是 "公钥 -密钥"的终端和网络间的双向认证机制, 即, 终端和基站各自保存一 个密钥, 该密钥是不能传输的, 然后随机产生公钥, 公钥可以在空中传输。 移动台和基站分别利用各自的公钥和密钥通过"鉴权特征程序"产生各自的 "鉴权码,,, 然后比较两者的鉴权码, 如果鉴权码相同, 表明鉴权通过; 否则 鉴权不通过。 随着科技发展, 犯罪分子的智商越来越高, 作案手段也越来越高明, 有 些不法分子就利用固定台、 数据卡等终端设备为机卡一体且鉴权密钥存储在 终端上的特点, 依靠工具、 空中下载 (Over -The- Air, 简称为 OTA )放号等 手段找到密钥存储位置, 从而非法获取密钥, 并把该非法获取的密钥、 电子 序列号 ( Electronic Serial Number, 简称为 ESN ) 等信息烧制到一张新卡上, 而有密钥的新卡能通过鉴权, 成为了一张合法的卡, 用它来进行非法活动。 这种卡资费比普通卡的资费要便宜, 所以, 有一定的市场。 可见, 不法分子 利用上述手段盗号制卡, 并依靠兜售这种卡谋取非法利益, 损害了运营商和 用户双方的利益。 为了防止类似的非法行为, 相关技术中, 提供了两种方法: ( 1 ) 将关键 参数换地方存储; (2 ) 将关键参数进行简单的处理。 但是, 将关键参数换地方存储, 通过不法分子自己放号还是可以找到新 的存储号码的位置, 获取关键参数, 而将关键参数进行简单的处理, 这种方 法也可以通过不法分子多次放号找到存储位置, 对比放号前后的 AKEY ( Authentication-Key, 鉴权码)值由此得到关键参数计算公式, 同样能获取 关键参数。 发明内容 本发明的主要目的在于提供一种关键参数的存储方案, 以至少解决上述 相关技术中不法分子容易获取终端存储的关键参数而导致损害运营商和用户 利益的问题之一。 为了实现上述目的, 根据本发明的一个方面, 提供了一种关键参数的存 储方法。 根据本发明的关键参数的存储方法, 包括以下步骤: 将终端设备中存储 的密钥的原始关键参数按照预定策略进行处理, 其中, 预定策略包括加密算 法和分段规则; 将处理后的数据使用离散的内存进行分散存储。 优选地, 将终端设备中存储的密钥的原始关键参数按照预定策略进行处 理包括: 将原始关键参数按照加密算法进行加密, 并对加密后生成的新的数 列按照分段规则进行分段; 或者, 将原始关键参数按照分段规则进行分段, 并对分段后的每段数据按照加密算法进行加密。 优选地, 将处理后的数据使用离散的内存进行分散存储包括: 记录处理 后的数据与其存储位置的对应关系; 居处理后的数据与其存储位置的对应 关系及预定策略, 对原始关键参数进行恢复。 优选地, 对原始关键参数进行恢复之后, 该方法还包括: 对恢复后的原 始关键参数进行验证。 优选地, 加密算法至少包括以下之一: 随机算法、 AES算法、 DES算法、 取非、 取异或。 优选地, 分段规则至少包括以下之一: 分段的数量、 分段后每段的大小、 分段的顺序、 分段的内容。 为了实现上述目的, 根据本发明的另一方面, 还提供了一种终端设备。 根据本发明的终端设备, 包括: 预处理模块, 设置为将存储的密钥的原 始关键参数按照预定策略进行处理, 其中, 预定策略包括加密算法和分段规 则; 存储模块, 设置为将预处理模块处理后的数据使用离散的内存进行分散 存储。 优选地, 预处理模块包括: 第一加密单元, 设置为将原始关键参数按照 加密算法进行加密; 第一分段单元, 设置为对第一加密单元加密后生成的新 的数列按照分段规则进行分段; 或者, 第二分段单元, 设置为将原始关键参 数按照分段规则进行分段; 第二加密单元, 设置为对第二分段单元分段后的 每段数据按照加密算法进行加密。 优选地, 该终端设备还包括: 记录模块, 设置为记录预处理模块处理后 的数据与其存储位置的对应关系; 恢复模块, 设置为根据预定策略及记录模 块记录的预处理模块处理后的数据与其存储位置的对应关系, 对原始关键参 数进行恢复。 优选地, 该终端设备还包括: 验证模块, 设置为对恢复后的原始关键参 数进行验证。 通过本发明, 釆用将关键参数进行加密和分段后, 使用离散的内存进行 分散存储的方式, 解决了相关技术中不法分子容易获取终端存储的关键参数 而导致损害运营商和用户利益的问题, 提高了系统的安全性和性能。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是根据本发明实施例的关键参数的存储方法的流程图; 图 2是根据本发明实施例的终端设备的结构框图; 图 3是根据本发明优选实施例的终端设备的结构框图; 图 4是根据本发明优选实施例二的关键参数存储算法涉及模块及其关系 示意图; 图 5 是根据本发明优选实施例三的关键参数分散加密存储算法的流程 图; 以及 图 6是根据本发明优选实施例四的关键参数获取过程的流程图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互组合。 在本实施例中,根据本发明的实施例 ,提供了一种关键参数的存储方法。 图 1是根据本发明实施例的关键参数的存储方法的流程图, 如图 1所示, 该 方法包括以下步 4聚: 步骤 S 102,将终端设备中存储的密钥的原始关键参数按照预定策略进行 处理, 其中, 预定策略包括加密算法和分段规则; 步骤 S 104, 将处理后的数据使用离散的内存进行分散存储。 通过上述步骤, 釆用将关键参数进行加密和分段后, 使用离散的内存进 行分散存储的方式, 解决了相关技术中不法分子容易获取终端存储的关键参 数而导致损害运营商和用户利益的问题, 提高了系统的安全性和性能。 优选地, 在步骤 S 102 中, 可以先将原始关键参数按照加密算法进行加 密, 再对加密后生成的新的数列按照分段规则进行分段; 或者, 先将原始关 键参数按照分段规则进行分段, 再对分段后的每段数据按照加密算法进行加 密。 该方法可以增加系统的灵活性。 优选地, 在步骤 S 104 中, 可以记录处理后的数据与其存储位置的对应 关系; 根据处理后的数据与其存储位置的对应关系及预定策略, 对原始关键 参数进行恢复。 这样可以增加系统的有效性和有序性。 优选地, 对原始关键参数进行恢复之后, 对恢复后的原始关键参数进行 验证。 该方法可以保证关键参数已被正确恢复, 提高系统的准确性。 优选地, 上述加密算法至少包括以下之一: 随机算法、 高级加密标准
( Advanced Encryption Standard, 简称为 AES ) 算法、 数据加密标准 (Data Encryption Standard, 简称为 DES ) 算法、 取非、 取异或。 该方法实现简单、 可操作性强。 优选地, 上述分段规则至少包括以下之一: 分段的数量、 分段后每段的 大小、 分段的顺序、 分段的内容。 该方法实现简单、 可操作性强。 对应于上述的方法, 在本实施例中还提供了一种终端设备。 图 2是根据 本发明实施例的终端设备的结构框图, 如图 2所示, 该终端设备 20 包括: 预处理模块 22 , 设置为将存储的密钥的原始关键参数按照预定策略进行处 理, 其中, 预定策略包括加密算法和分段规则; 存储模块 24 , 耦合至预处理 模块 22 , 设置为将预处理模块处理后的数据使用离散的内存进行分散存储。 通过上述装置, 预处理模块 22 将关键参数进行加密和分段后, 存储模 块 24 使用离散的内存进行分散存储, 解决了相关技术中不法分子容易获取 终端存储的关键参数而导致损害运营商和用户利益的问题, 提高了系统的安 全性和性能。 图 3是根据本发明优选实施例的终端设备的结构框图, 如图 3所示, 预 处理模块 22包括: 第一加密单元 222和第一分段单元 224 , 或者, 第二分段 单元 226和第二加密单元 228。 其中, 第一加密单元 222 , 设置为将原始关 键参数按照加密算法进行加密;第一分段单元 224 ,耦合至第一加密单元 222 , 设置为对第一加密单元 222加密后生成的新的数列按照分段规则进行分段; 第二分段单元 226 , 设置为将原始关键参数按照分段规则进行分段; 第二加 密单元 228 , 耦合至第二分段单元 226 , 设置为对第二分段单元 226分段后 的每段数据按照加密算法进行加密。 优选地, 终端设备 20还包括: 记录模块 32 , 耦合至存储模块 24 , 设置 为记录预处理模块 22处理后的数据与其存储位置的对应关系; 恢复模块 34 , 耦合至记录模块 32 , 设置为根据预定策略及记录模块 32记录的预处理模块 22处理后的数据与其存储位置的对应关系, 对原始关键参数进行恢复。 优选地, 终端设备 20还包括: 验证模块 36 , 耦合至恢复模块 34 , 设置 为对恢复后的原始关键参数进行验证。 下面结合优选实施例和附图对上述实施例的实现过程进行详细说明。 优选实施例一 针对不法分子通过查找固定位置来找到参数的情况, 可以将这些关键参 数分成多段, 并将分段分散在不同的位置存储起来, 使用时再组合起来。 但 如果仅仅是简单分段, 不法分子还是可以通过分别搜索分段参数方法——查 出相关位置, 并将分段拼凑起来, 同样可以获取这些关键参数。 为了加强关 键参数的管理, 本实施例首先对原始数据进行加密, 再将加密后的数据分成 多段, 并分散地存储在不同位置, 这样就可以制止不法分子依靠利用各种手 段直接在明文中读取或者推测关键参数的违法行为。 具体地, 本发明优选实施例提供了一种关键参数分散加密存储方案, 包 括如下处理步 4聚: 步骤 1 , 对原始关键参数进行加密处理, 生成新数列, 使得不法分子无 法直接搜索到相关明文。 步骤 2, 将新数列分段, 确定分段的段数和大小, 将每段编号, 以便今 后取用时按编号重组起来, 为每段分配一个足够大小的存储空间, 将每段存 入存储空间中, 记录每段存储空间的地址和与分段间的——对应关系。 优选地, 在步骤 1中, 为了阻止不法分子备份找到关键参数, 可以预先 对原始关键参数进行处理, 使其不明文化。 在具体实施过程中, 处理的方式 可以是某种固定规则, 例如, 对数值进行统一的取异或, 或者取非操作等, 这样做法执行效率高, 但是规则简单, 比较好破译; 也可以是某种加密算法, 例如, AES , DES等, 这些算法保密性好, 但运算速度较慢。 优选地, 在步骤 2中, 分段数量可以是一个固定值, 也可以釆用在某个 范围内随机生成的方式; 分段的段大小也可以是固定大小段, 也可以指定某 个规则来分段; 存储的位置可以是固定位置, 也可以动态选择。 随机的方式 可以增加查找分段的难度, 使得获取参数的开销超过可能获得的利益。 除了上述步 4聚外, 还可以釆取其他的措施强化这种保护机制, 例如: 釆 用加密的方式处理原始数据, 为了保护密钥,可以在每次访问完关键参数后 , 重新生成密钥。 另外, 也可先分段, 再对每一段分别加密, 处理完成后再存 储。 通过本实施例可以很好地利用加密参数、 分散位置存储的方式, 有效地 制止不法分子找到关键参数, 从而避免了他们盗号制卡的行为, 有效地保护 了运营商和用户的合法利益。 优选实施例二 图 4是根据本发明优选实施例二的关键参数存储算法涉及模块及其关系 示意图, 如图 4所示, 该系统可以分为四个模块, 包括参数加密模块、 参数 分割模块、 位置分配模块和存储参数模块, 下面对各模块进行详细说明。 参数加密模块, 用于对原始关键参数进行加密, 使其不按照明文呈现在 内存中; 参数分割模块, 用于对参数串进行划分, 并确定分段的数量、 大小、 顺序、 内容; 位置分配模块, 用于确定每个分段的存储顺序和存储位置; 存 储模块, 用于完成各个分段及其相关信息 (例如, 分段数、 分段大小和分段 位置等) 的存储功能。 关键参数通过这 4个模块, 可以完成分散加密存储, 从而达到安全的保管关键参数的目的。 优选实施例三 图 5 是根据本发明优选实施例三的关键参数分散加密存储算法的流程 图, 如图 5所示, 该流程可以包括以下步^^ 步骤 S 502 , 获取原始关键参数。 步骤 S504, 使用某种加密算法 (例如, 随机密钥), 对获取的原始关键 参数进行加密处理。 加密时所需的密钥可以使用随机密钥, 这样做的好处是 相比固定密钥, 需要增加 4舞测。 步骤 S506, 判断是否加密成功。 如果加密成功, 进入步 4聚 S508, 否则, 进入步骤 S522。 步骤 S508, 产生新参数数列, 将随机密钥保存起来, 以便下次访问参数 使用。 步骤 S510, 对新参数值分段。 例如, 可以按照随机数进行分段。 在具体 实施过程中, 为了同时兼顾速率和保密性, 可以取 2 ~ 8间的离散整数 N。 步骤 S512, 判断是否分段成功。 如果分段成功, 进入步骤 S514, 否则, 进入步骤 S524。 步骤 S514, 将段数 N存储起来, 对分段顺序进行编号。 同时, 记录该 分段顺序和每个分段的大小 (例如, 长度)。 步骤 S516, 为每个分段确定一个存储位置。 这些位置应该是离散地分散 在内存空间里。 将分段对应的位置信息保存起来, 以便后续读取。 步骤 S518, 根据分段顺序和地址间的对应关系, 将每个分段存储到对应 的分配位置中去。 例如, 按照顺序, 将 N个参数段存储到 N个位置。 并将每 个段编号、 段的大小和地址可以存入一个数组中。 步骤 S520, 参数存储成功, 该流程结束。 步骤 S522, 判断加密不成功的次数是否小于 3次。 若小于 3次, 则重新 进入步骤 S504, 重新获取随机密钥, 对原始关键参数进行加密; 否则, 进入 步骤 S524。需要说明的是,这里加密不成功的次数定义为 3次是根据经验值, 在具体实施过程中, 可以 居需要, 自行设定, 并不限于该值。 步骤 S524, 参数存储失败, 该流程结束。 优选实施例四 图 6是根据本发明优选实施例四的关键参数获取过程的流程图, 如图 6 所示, 在需要使用原始关键参数时, 获取该原始关键参数的步骤如下: 步骤 S602, 获取存储的分段数 N, 例如, 可以连续获取 3次, 如果获取 不成功, 进入步骤 S622, 如果获取成功, 进入步骤 S604。 步骤 S604, 获取分段信息保存数据结构 (比如, 数组), 数据结构中保 存有分段的顺序和每个分段的存储位置指针。通过该指针可以找到存储位置, 根据数据结构中保存的分段的大小分别得到存储位置的存储内容。 例如, 获 取保存的数组, 数组中记录了每个段的编号、 段的大小和地址。 步骤 S606, 判断是否获取上述数据结构成功。 若成功, 进入步骤 S608, 否则, 进入步骤 S622。 步骤 S608, 根据分段顺序和地址间的对应关系, 拼接各个分段为一个整 体。 例如, 可以按照顺序查找每个分段, 并且拼接为一个整体。 步骤 S610, 判断是否拼接成功。 如果拼接成功, 进入步骤 S612, 如果 出现异常(例如, 存储位置越界等), 进入参数获取失败处理。 为了确保拼接 的参数为之前的参数, 可以使用某些验证算法。 步骤 S612, 获取保存的随机密钥。 步骤 S614,判断获取随机密钥是否成功。如果获取成功,进入步骤 S616, 如果获取失败, 进入步骤 S622。 步骤 S616, 根据密钥参数运行解密算法, 得到原始关键参数。 即, 解码 得到原始关键参数。 步骤 S618, 使用该参数, 同时, 重复加密存储过程, 将关键参数再次保 存起来。 参数使用完毕后, 为了确保随机密钥的安全性, 可以重新更换随机 密钥, 通过加密算法对关键参数进行加密, 加密后重新分段保存, 存储过程 和上述过程一致, 同样随机选择分段数, 确定分段大小、 存储位置等, 最后 再次保存一次关键参数。 步骤 S620, 参数存储成功, 该流程结束。 步骤 S622, 参数获取失败, 返回失败, 该流程结束。 综上所述, 通过本发明实施例的关键参数分散加密存储方案, 釆用将关 键参数进行加密和分段后, 使用离散的内存进行分散存储的方式, 能够有效 地制止不法分子的盗取号行为, 从而有效地保护商家和用户的合法利益。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 并 且在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步 4聚, 或者 将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作 成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件 结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。

Claims

权 利 要 求 书
1. 一种关键参数的存储方法, 包括以下步骤:
将终端设备中存储的密钥的原始关键参数按照预定策略进行处理, 其中, 所述预定策略包括加密算法和分段规则;
将处理后的数据使用离散的内存进行分散存储。
2. 根据权利要求 1所述的方法, 其中, 将所述终端设备中存储的所述密钥 的所述原始关键参数按照所述预定策略进行处理包括:
将所述原始关键参数按照所述加密算法进行加密, 并对加密后生成 的新的数列按照所述分段规则进行分段; 或者
将所述原始关键参数按照所述分段规则进行分段, 并对分段后的每 段数据按照所述加密算法进行加密。
3. 根据权利要求 1所述的方法, 其中, 将所述处理后的数据使用离散的所 述内存进行分散存储包括:
记录所述处理后的数据与其存储位置的对应关系;
根据所述处理后的数据与其存储位置的对应关系及所述预定策略, 对所述原始关键参数进行恢复。
4. 根据权利要求 3所述的方法, 其中, 对所述原始关键参数进行恢复之后, 还包括:
对恢复后的所述原始关键参数进行验证。
5. 根据权利要求 1所述的方法, 其中, 所述加密算法至少包括以下之一: 随机算法、 高级加密标准 AES算法、 数据加密标准 DES算法、 取非、 取异或。
6. 根据权利要求 1至 5中任一项所述的方法, 其中, 所述分段规则至少包 括以下之一: 分段的数量、 分段后每段的大小、 分段的顺序、 分段的内 容。
7. —种终端设备, 包括:
预处理模块, 设置为将存储的密钥的原始关键参数按照预定策略进 行处理, 其中, 所述预定策略包括加密算法和分段规则;
存储模块, 设置为将所述预处理模块处理后的数据使用离散的内存 进行分散存储。
8. 根据权利要求 7所述的终端设备, 其中, 所述预处理模块包括:
第一加密单元, 设置为将所述原始关键参数按照所述加密算法进行 加密; 第一分段单元, 设置为对所述第一加密单元加密后生成的新的数 列按照所述分段规则进行分段; 或者,
第二分段单元, 设置为将所述原始关键参数按照所述分段规则进行 分段; 第二加密单元, 设置为对所述第二分段单元分段后的每段数据按 照所述加密算法进行加密。
9. 根据权利要求 7所述的终端设备, 其中, 所述终端设备还包括:
记录模块, 设置为记录所述预处理模块处理后的数据与其存储位置 的对应关系;
恢复模块, 设置为根据所述预定策略及所述记录模块记录的所述预 处理模块处理后的数据与其存储位置的对应关系, 对所述原始关键参数 进行恢复。
10. 根据权利要求 9所述的终端设备, 其中, 所述终端设备还包括:
验证模块, 设置为对恢复后的所述原始关键参数进行验证。
PCT/CN2011/072931 2010-12-06 2011-04-18 关键参数的存储方法及终端设备 WO2012075764A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010574473.4 2010-12-06
CN2010105744734A CN102075322A (zh) 2010-12-06 2010-12-06 关键参数的存储方法及终端设备

Publications (1)

Publication Number Publication Date
WO2012075764A1 true WO2012075764A1 (zh) 2012-06-14

Family

ID=44033678

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/072931 WO2012075764A1 (zh) 2010-12-06 2011-04-18 关键参数的存储方法及终端设备

Country Status (2)

Country Link
CN (1) CN102075322A (zh)
WO (1) WO2012075764A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102955747B (zh) * 2011-08-24 2015-05-20 群联电子股份有限公司 金钥传送方法、存储器控制器与存储器储存装置
CN102404111B (zh) * 2011-12-28 2016-07-06 桂林电子科技大学 一种采用不确定加密算法的分段加密方法
CN102708069B (zh) * 2012-05-12 2016-11-16 北京深思数盾科技股份有限公司 安卓系统中内存数据的保护方法
CN103490875A (zh) * 2013-09-30 2014-01-01 上海新储集成电路有限公司 一种大容量智能卡密钥的保护方法
CN105681329A (zh) * 2016-02-29 2016-06-15 浪潮(苏州)金融技术服务有限公司 一种数据处理的方法和装置
CN107493166A (zh) * 2016-06-13 2017-12-19 阿里巴巴集团控股有限公司 一种私钥的存储和读取方法、装置以及服务器
CN105871550B (zh) * 2016-06-13 2019-04-09 四川特伦特科技股份有限公司 一种实现数字信号加密传输的系统
CN113360922A (zh) * 2021-06-01 2021-09-07 广东电网有限责任公司电力调度控制中心 一种电力系统云计算平台的自动化配置方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1386250A (zh) * 2000-06-08 2002-12-18 布尔Cp8公司 在嵌入式微芯片系统,尤其是智能卡的存储器中安全存储敏感数据的方法和实现该方法的嵌入式系统
WO2009089015A1 (en) * 2008-01-07 2009-07-16 Security First Corporation Systems and methods for securing data using multi-factor or keyed dispersal
CN101754219A (zh) * 2009-12-28 2010-06-23 中国人民解放军信息工程大学 标识分配和分离存储方法、标识替换传输方法及系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1386250A (zh) * 2000-06-08 2002-12-18 布尔Cp8公司 在嵌入式微芯片系统,尤其是智能卡的存储器中安全存储敏感数据的方法和实现该方法的嵌入式系统
WO2009089015A1 (en) * 2008-01-07 2009-07-16 Security First Corporation Systems and methods for securing data using multi-factor or keyed dispersal
CN101754219A (zh) * 2009-12-28 2010-06-23 中国人民解放军信息工程大学 标识分配和分离存储方法、标识替换传输方法及系统

Also Published As

Publication number Publication date
CN102075322A (zh) 2011-05-25

Similar Documents

Publication Publication Date Title
WO2012075764A1 (zh) 关键参数的存储方法及终端设备
CN103201998B (zh) 用于保护移动装置中的本地资源的数据处理
WO2017201809A1 (zh) 终端通信方法及系统
WO2015184834A1 (zh) 一种嵌入式存储设备文件的加解密方法、装置及终端
CN106790156B (zh) 一种智能设备绑定方法及装置
CN112953707A (zh) 密钥加密方法、解密方法及数据加密方法、解密方法
CN114036565B (zh) 隐私信息检索系统及隐私信息检索方法
KR20200085230A (ko) 디바이스에 대한 총체적 모듈 인증
US11381964B2 (en) Cellular network authentication control
KR101729960B1 (ko) 신뢰 보안 플랫폼 모듈을 이용한 보안 애플리케이션 인증 및 관리 방법 및 장치
EP2756696A1 (en) Systems and methods for encoding exchanges with a set of shared ephemeral key data
JP2007174633A (ja) トークンデバイス及びセキュアメモリデバイスのためのバインディング鍵をセキュアに取得するためのコンピュータ実施方法、および、トークンデバイスとセキュアメモリデバイスとをセキュアにバインドするシステム
KR20170091609A (ko) 모바일 단말 상의 데이터를 암호화/복호화하는 방법 및 장치
WO2018010480A1 (zh) eSIM卡锁网方法、终端及锁网认证服务器
KR100847145B1 (ko) 불법 액세스 포인트 검출 방법
CN111401901B (zh) 生物支付设备的认证方法、装置、计算机设备和存储介质
US10484187B2 (en) Cellular network authentication
RU2015114703A (ru) Телекоммуникационная чип-карта
CN111065101A (zh) 基于区块链的5g通信信息加解密方法、设备及存储介质
CN114175574A (zh) 无线安全协议
Zheng et al. Trusted computing-based security architecture for 4G mobile networks
CN114189343A (zh) 互相认证的方法和装置
KR101358375B1 (ko) 스미싱 방지를 위한 문자메시지 보안 시스템 및 방법
CN109302442B (zh) 一种数据存储证明方法及相关设备
CN109075974B (zh) 指纹算法库与指纹传感器的绑定认证方法及指纹识别系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11847633

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11847633

Country of ref document: EP

Kind code of ref document: A1