A key storage method and device

A key storage and key technology, applied in the field of information security, can solve problems such as key theft and key loss

Active Publication Date: 2021-03-26
BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, currently a complete key is stored in a hardware wallet, if the hardware wallet storing the key is lost, the key will also be lost
In this case, the hardware wallet may be cracked by means of brute force cracking, resulting in the key being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key storage method and device
  • A key storage method and device
  • A key storage method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0082] In order to improve the security of key storage, the embodiments of the present application provide a key storage method and device, which are applied to a client, and the client is connected to the first storage and connected to the second storage. Among them, storage methods include:

[0083] After it is determined that both the first memory and the second memory match, the key to be stored is decomposed to obtain a first target number of subkeys to be stored;

[0084] From ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application provide a key storage method and device. The method includes: after determining that the key to be stored matches both the first memory and the second memory, decomposing the key to be stored to obtain a first target number of sub-keys to be stored; determining a first sub-key to be stored, a second sub-key to be stored and a third sub-key to be stored from the obtained sub-key to be stored; the first sub-key to be stored is sent to the first memory for storage, the second sub-key to be stored is sent to the second memory for storage, and the third sub-key to be stored is stored locally at the client. As a result of that technical proposal provided by the embodiments of the present application, a key to be stored is decomposed into a plurality of copies and stored in a client, a first memory and a second memory respectively. Only when the stored sub-key is obtained from any two of the client, the first memory and the second memory, can the complete key be obtained, thereby improving the security of the key storage.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a key storage method and device. Background technique [0002] In order to ensure the security of the account and digital currency, the account or digital currency will be set with a corresponding key. Only the correct key can be used to enter the account or withdraw digital currency. Therefore, the importance of the key is self-evident. Generally speaking, the key will be stored in the network, and secure network technology is used to ensure the safe storage of the key. But no matter how secure the technology is, there may be loopholes, which may lead to the risk of key theft. In order to solve this problem, hardware wallets came into being. [0003] The hardware wallet is a new type of key storage method. The hardware wallet stores the digital asset key separately in a chip to isolate the key from the network. Only when the key needs to be used, the ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0897
Inventor 雷超然李伟胡建东张康宗
Owner BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products