Unlock instant, AI-driven research and patent intelligence for your innovation.

A storage method, device, equipment and storage medium for a key-value pair

A key-value pair and storage instruction technology, applied in the computer field, can solve problems such as security threats, reduction in the security of plaintext storage, and tampering of stored content.

Active Publication Date: 2021-02-19
BEIJING CHENGSHI WANGLIN INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in the face of rooted Android phones, permission control has little effect. Attackers can open xml files through the command line terminal to read sensitive data.
[0005] 2. Plaintext storage leads to a decrease in security. As mentioned above, key-value pair plaintext storage causes sensitive data to be obtained by attackers unsuspectingly, which in turn leads to security threats.
[0006] 3. The storage content can be tampered with. An attacker can not only read the file content, but also tamper with some data to change the behavior of the application to achieve the purpose of the attack.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A storage method, device, equipment and storage medium for a key-value pair
  • A storage method, device, equipment and storage medium for a key-value pair
  • A storage method, device, equipment and storage medium for a key-value pair

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] figure 1 It is a flow chart of a method for storing key-value pairs provided by Embodiment 1 of the present invention. This embodiment is applicable to the storage of key-value pairs. This method can be implemented by the storage device for key-value pairs in the embodiment of the present invention. implementation, the device can be implemented in software and / or hardware, such as figure 1 As shown, the method specifically includes the following steps:

[0070] S110. Acquire a storage instruction of a key-value pair.

[0071] Among them, key-value storage is the simplest organizational form of the database. Key: It is the number of the stored value. Value: the data to be stored.

[0072] Specifically, the way to obtain the storage instruction of the key-value pair can be to generate the storage instruction of the key-value pair after the key-value pair is formed, and then obtain the storage instruction of the key-value pair; it can also be the number of key-value pa...

Embodiment 2

[0099] figure 2 It is a flow chart of a key-value pair storage method in Embodiment 2 of the present invention. This embodiment is optimized based on the above embodiment. In this embodiment, sending an encryption request according to the storage instruction includes: according to The storage instruction generates request data for obtaining a password; encrypts the request data by a first AES key to generate a first ciphertext; encrypts the first ciphertext by an RSA public key to obtain an encryption request; sends The encrypted request.

[0100] Such as figure 2 As shown, the method of this embodiment specifically includes the following steps:

[0101] S210. Acquire a storage instruction of a key-value pair.

[0102] S220. Generate request data for obtaining a password according to the storage instruction.

[0103] Wherein, the request data is used to generate a password.

[0104] Wherein, the request data is data for requesting the server to generate a password.

[...

Embodiment 3

[0132] image 3 It is a schematic structural diagram of a key-value pair storage device provided by Embodiment 3 of the present invention. This embodiment is applicable to the storage of key-value pairs, and the device can be implemented in software and / or hardware, and the device can be integrated in any device that provides the function of storing key-value pairs, such as image 3 As shown, the storage device for the key-value pair specifically includes: an acquisition module 310 , a sending module 320 , a decryption module 330 , a generation module 340 and a storage module 350 .

[0133] Wherein, the obtaining module 310 is used to obtain the storage instruction of the key-value pair;

[0134] The sending module 320 is configured to send an encryption request according to the storage instruction, the encryption request includes request data mixed and encrypted by the public key and the first key, and the request data is used to generate a password;

[0135] The decryption...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key-value pair storage method, device, equipment and storage medium. The method includes: obtaining a storage instruction of a key-value pair; sending an encryption request according to the storage instruction, the encryption request including request data mixed and encrypted by a public key and a first key, and the request data is used to generate a password; decrypting Received encrypted password, obtain described password, described encrypted password comprises the password that is encrypted by private key and first key mixing, and described private key is corresponding to described public key; Generates the second key according to described password; By encrypting the key-value pair with the generated second key and storing the encrypted key-value pair, the security of key-value pair storage can be improved through the technical solution of the present invention.

Description

technical field [0001] Embodiments of the present invention relate to computer technology, and in particular, to a storage method, device, device, and storage medium for a key-value pair. Background technique [0002] The Android platform provides a variety of options for persistent data storage. Among them, shared preferences (Sharedpreferences) provide a general framework that can save and retrieve permanent key-value pairs of primitive data types. Sharedpreferences will save the key-value pair to the specified XML file, and the general file path is " / data / data / package name / shared_prefs / file name.xml". [0003] In the process of developing Android applications, some key-value pairs need to be stored to complete the corresponding functions, but Sharedpreferences will have some security flaws, as follows: [0004] 1. There are security flaws in permission control, although basic permission control is provided, for example: only the current application is allowed to access t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/78H04L9/06H04L9/08H04L9/14H04L9/30H04L29/06
Inventor 朴智康
Owner BEIJING CHENGSHI WANGLIN INFORMATION TECH CO LTD