A storage method, device, equipment and storage medium for a key-value pair
A key-value pair and storage instruction technology, applied in the computer field, can solve problems such as security threats, reduction in the security of plaintext storage, and tampering of stored content.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] figure 1 It is a flow chart of a method for storing key-value pairs provided by Embodiment 1 of the present invention. This embodiment is applicable to the storage of key-value pairs. This method can be implemented by the storage device for key-value pairs in the embodiment of the present invention. implementation, the device can be implemented in software and / or hardware, such as figure 1 As shown, the method specifically includes the following steps:
[0070] S110. Acquire a storage instruction of a key-value pair.
[0071] Among them, key-value storage is the simplest organizational form of the database. Key: It is the number of the stored value. Value: the data to be stored.
[0072] Specifically, the way to obtain the storage instruction of the key-value pair can be to generate the storage instruction of the key-value pair after the key-value pair is formed, and then obtain the storage instruction of the key-value pair; it can also be the number of key-value pa...
Embodiment 2
[0099] figure 2 It is a flow chart of a key-value pair storage method in Embodiment 2 of the present invention. This embodiment is optimized based on the above embodiment. In this embodiment, sending an encryption request according to the storage instruction includes: according to The storage instruction generates request data for obtaining a password; encrypts the request data by a first AES key to generate a first ciphertext; encrypts the first ciphertext by an RSA public key to obtain an encryption request; sends The encrypted request.
[0100] Such as figure 2 As shown, the method of this embodiment specifically includes the following steps:
[0101] S210. Acquire a storage instruction of a key-value pair.
[0102] S220. Generate request data for obtaining a password according to the storage instruction.
[0103] Wherein, the request data is used to generate a password.
[0104] Wherein, the request data is data for requesting the server to generate a password.
[...
Embodiment 3
[0132] image 3 It is a schematic structural diagram of a key-value pair storage device provided by Embodiment 3 of the present invention. This embodiment is applicable to the storage of key-value pairs, and the device can be implemented in software and / or hardware, and the device can be integrated in any device that provides the function of storing key-value pairs, such as image 3 As shown, the storage device for the key-value pair specifically includes: an acquisition module 310 , a sending module 320 , a decryption module 330 , a generation module 340 and a storage module 350 .
[0133] Wherein, the obtaining module 310 is used to obtain the storage instruction of the key-value pair;
[0134] The sending module 320 is configured to send an encryption request according to the storage instruction, the encryption request includes request data mixed and encrypted by the public key and the first key, and the request data is used to generate a password;
[0135] The decryption...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


