Methods for dynamic secret key storing and stored secret key reading and deleting

A dynamic storage and key storage technology, applied in the field of information security, can solve problems such as storage capacity limitations, achieve fast reading and storage, enhance security, and meet market demand.

Active Publication Date: 2014-01-01
上海杉德金卡信息系统科技有限公司
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a dynamic key storage method and a method for reading and deleting keys after storage, which can be stored and read in large capacity quickly and has security protection function, which solves the problem of existing key storage problems. The problem of the limitation of the storage capacity of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods for dynamic secret key storing and stored secret key reading and deleting
  • Methods for dynamic secret key storing and stored secret key reading and deleting
  • Methods for dynamic secret key storing and stored secret key reading and deleting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to make the present invention more comprehensible, preferred embodiments are described in detail below with accompanying drawings.

[0074] The present invention is realized by selecting an independent main control chip with on-chip non-volatile large-capacity memory and a dedicated security chip for encryption and decryption, wherein the storage space of the key system is divided into three parts: the first The part is to record the basic information of the key system, such as figure 1 As shown, the basic information of the key system includes the existence identifier of the key system, the creation time of the key system, the applications currently existing in the key system (currently existing application keys), specific application information (the application number corresponding to the key), etc. ;The second part is the key index information, which adopts the sorting method of dichotomy. Different application numbers correspond to a group of independent s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses methods for dynamic secret key storing and stored secret key reading and deleting. The storing method comprises the steps of firstly judging whether a secret key system is established or not, establishing the secret key system and storing secret key information in the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, and encrypting the secret key information after the secret key information is searched; the reading method comprises the steps of firstly judging whether the secret key system is established or not, establishing the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, decrypting the secret key information after the secret key information is searched, and reading the secret key information; the deleting method comprises the steps of firstly judging whether the secret key system is established or not, exiting the secret key system if the secret key system is not established, searching the secret key information in the secret key system if the secret key system is established, and deleting the secret key information after the secret key information is searched. The methods are based on a multi-application system, the limitations to secret key index rows / columns and limitations to secret key group number are solved, and meanwhile, the utilization ratio of relatively-tight storage resources of embedded devices is increased greatly on the basis that the needs of customers on the maximum number of applications are met.

Description

technical field [0001] The invention relates to a method for dynamically storing keys and a method for reading and deleting keys after storage, which can be used in financial terminal products and other products involving information security, and belongs to the field of information security. Background technique [0002] Traditional financial terminal equipment (EFT-POS) key storage adopts a static storage method, and is limited by hardware configuration, generally only 5*10 groups of keys can be stored. Early POS terminals used a single-application system, that is, only one set of applications can be installed on one device, so for a single application, 50 sets of keys are enough. However, with the continuous increase of market demand, the current POS terminals are gradually adopting multi-application systems, that is, multiple sets of applications are installed on one device at the same time, and different applications need to store several sets or even dozens of sets of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 沈树康李红兵黄强卞正青李金梅
Owner 上海杉德金卡信息系统科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products