Key encryption storage method, acquisition method and device thereof
A key encryption and key technology, applied in the field of information security, can solve problems affecting ciphertext security, private key leakage, etc., to achieve the effect of improving security and increasing the difficulty of cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.
[0034] The key encryption storage method, acquisition method and device thereof in the embodiments of the present application are described below with reference to the accompanying drawings.
[0035] figure 1 is a schematic flowchart of a key encryption storage method according to an embodiment of the present application.
[0036] Such as figure 1 As shown, the key encryption storage method includes the following steps:
[0037] Step 101, when it is detected that the key to be protected is stored in the target device, the d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


