A storage method and security device for confidential information of a cardless terminal
A terminal and secret-related technology, which is applied in the field of information security, can solve problems such as hidden dangers of secret-related data security, illegal authorization of terminals, illegal changes, etc., and achieve the effect of increasing difficulty, putting security into practical use, and increasing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] Example one, figure 1 It shows a flow chart of the security mechanism for the secret-related information of the cardless terminal provided in this embodiment. The security mechanism of the secret-related information of the cardless terminal shown in this embodiment is characterized in that it includes the following steps.
[0024] S101. When storing secret-related data, obtain secret-related data from the second memory, split the secret-related data into M data units, encrypt the M data units with a data protection key, and generate M encrypted data units, Use the root key to encrypt the data protection key, generate a single encrypted data protection key unit, generate a key offset random number, and insert the single encrypted data protection key unit into M encrypted data units according to the key offset random number , The storage cell string is generated, and the storage cell string is stored in the first memory.
[0025] S102. When using secret-related data, read the...
Embodiment 2
[0031] Example two, figure 2 Shows a schematic diagram of the storage unit string in the security mechanism of the confidential information of the cardless terminal of this example, image 3 It shows a schematic diagram of the circular buffer area in the security mechanism of the secret-related information of the cardless terminal in this embodiment. This embodiment, as an optimization and extension of the first embodiment, provides a detailed description of the security mechanism for the confidential information of the cardless terminal provided in the second embodiment on the basis of the first embodiment.
[0032] In step S101, specifically, the step of splitting the secret-related data into M data units, encrypting the M data units with a data protection key, and generating M encrypted data units further includes: splitting the secret-related data Divided into M data units with the same length, the length of the data unit is N times 16 bytes; a data protection key is generate...
Embodiment 3
[0057] Example three, Figure 4 It shows a structural diagram of a security device for secret-related information of a cardless terminal in this embodiment. The security device for secret-related information of a cardless terminal is characterized by comprising: an encrypted memory, which is used to obtain secret-related data from a second memory when secret-related data is stored, and split the secret-related data into M data Unit, use the data protection key to encrypt M data units, generate M encrypted data units, use the root key to encrypt the data protection key, generate a single encrypted data protection key unit, generate a key offset random number, according to The key offset random number inserts a single encrypted data protection key unit into M encrypted data units, generates a storage unit string, and sends the storage unit string to the first memory; the first memory is used to store the storage unit string ; Load the user, used to read the storage unit string f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


