CN105653970A - Secret key processing method and apparatus - Google Patents

Secret key processing method and apparatus Download PDF

Info

Publication number
CN105653970A
CN105653970A CN201510242396.5A CN201510242396A CN105653970A CN 105653970 A CN105653970 A CN 105653970A CN 201510242396 A CN201510242396 A CN 201510242396A CN 105653970 A CN105653970 A CN 105653970A
Authority
CN
China
Prior art keywords
key
progress
safe
internal memory
processing process
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510242396.5A
Other languages
Chinese (zh)
Inventor
钟焰涛
傅文治
蒋罗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510242396.5A priority Critical patent/CN105653970A/en
Publication of CN105653970A publication Critical patent/CN105653970A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an embodiment of a secret key processing method applied to an electronic device equipped with an encryption module. A safety module executes a data safety treating process; and during the data safety treating process, a secret key used during the process is read into an internal memory of the electronic device. The secret key processing method comprises steps of first, acquiring a progress sign generated during the data safety treating process executed by the safety module, and deleting a secret key in the internal memory of the electronic device when the progress sign is a preset progress sign during the safety treating process. A technical problem that the secret key can be easily stolen by a rogue program can be solved, so safety of the secret key can be improved and safety of the electronic device can be enhanced. Besides, the invention further provides a secret key processing apparatus to guarantee practical use and realization of the method.

Description

A kind of cipher key processing method and device
Technical field
The application relates to electronics secret key safety technical field, especially a kind of application cipher key processing method on an electronic device and device.
Background technology
Generally, data, in order to the safety of data ensureing to be stored in electronics, can be performed safe handling process by mobile phone, and this safe handling process can be called data safe processing process. Such as, to being stored to, data wherein carry out data encryption to mobile phone.
It should be noted that, mobile phone is when performing data safe processing process, it is necessary to use key. Usually, key storage, in the external storage of mobile phone, is carry out in the internal memory of mobile phone due to data safe processing process, therefore, key needs to call in the internal memory of mobile phone from the external storage of mobile phone, but, the key safety being in mobile phone EMS memory is lower.
Summary of the invention
In view of this, this application provides a kind of cipher key processing method, in order to solve the technical problem that in electronics internal memory, key safety is lower. In addition, present invention also provides a kind of key handling device, in order to ensure the application in practice of described method and realization.
For realizing described object, the technical scheme that the application provides is as follows:
A kind of cipher key processing method, is applied to the electronics being provided with safe module, and the method comprises:
Obtain the progress mark that described safe module performs in data safe processing process to generate; Wherein, described safe module performs described data safe processing process according to the key in described electronics internal memory;
When described progress be designated default progress corresponding to described data safe processing process identify, delete the key in described electronics internal memory.
Preferably, in above-mentioned cipher key processing method, the described safe module of described acquisition performs the mark of the progress in data safe processing process, comprising:
Monitor the progress mark that described safe module is performing in data safe processing process to generate.
Preferably, in above-mentioned cipher key processing method, the described safe module of described acquisition performs the mark of the progress in data safe processing process, comprising:
Receive in the data safe processing process of described safe module transmission the progress mark generated.
Preferably, in above-mentioned cipher key processing method, described key storage is in variable, and the key in the described electronics internal memory of described deletion, comprising:
Obtaining target value, wherein, described target value and described key are not identical;
It is described target value by the key replacement in described variable.
Preferably, in above-mentioned cipher key processing method, described acquisition target value, comprising:
Generate random value, and using described random value as target value.
Preferably, in above-mentioned cipher key processing method, described acquisition target value, comprising:
Obtain preset value, and using described preset value as target value.
Preferably, in above-mentioned cipher key processing method, the internal memory address of described variable is stored in pointer; Correspondingly, the method also comprises:
Discharge in described pointer the internal memory space that the described internal memory address stored represents.
Present invention also provides a kind of key handling device, be applied to the electronics being provided with safe module, this device comprises:
Progress mark acquiring unit, for obtaining the progress mark that described safe module performs in data safe processing process to generate; Wherein, described safe module performs described data safe processing process according to the key in described electronics internal memory;
Internal memory key deletes unit, for when described progress be designated default progress corresponding to described data safe processing process identify, delete the key in described electronics internal memory.
Preferably, in above-mentioned key handling device, described progress mark acquiring unit comprises:
First progress mark obtains subelement, for monitoring the progress mark that described safe module is performing in data safe processing process to generate.
Preferably, in above-mentioned key handling device, described progress mark acquiring unit comprises:
2nd progress mark obtains subelement, for receiving in the data safe processing process of described safe module transmission the progress mark generated.
The cipher key processing method that the embodiment of the present application provides, is applied in the electronics being provided with encryption module. The key that data safe processing process uses, for performing data safe processing process, when safe module performs the process of data safe processing, can be read in the internal memory of electronics by safe module. First the present embodiment obtains the progress mark that safe module performs in data safe processing process to generate, when this progress be designated default progress corresponding to this safe handling process identify, delete the key in electronics internal memory, to solve the technical problem that key is easily stolen by malice program, thus improve the security of key, and then improve the security of electronics.
Certainly, the arbitrary product implementing the application might not need to reach above-described all advantages simultaneously.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, it is briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only the embodiment of the application, for those of ordinary skill in the art, under the prerequisite not paying creative work, it is also possible to obtain other accompanying drawing according to the accompanying drawing provided.
The schema of the cipher key processing method embodiment that Fig. 1 provides for the application;
A kind of implementation schema of the key in the deletion electronics internal memory that Fig. 2 provides for the application;
Another kind of implementation schema of the key in the deletion electronics internal memory that Fig. 3 provides for the application;
The structural representation of the key handling device embodiment that Fig. 4 provides for the application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only some embodiments of the present application, instead of whole embodiments. Based on the embodiment in the application, those of ordinary skill in the art are not making other embodiments all obtained under creative work prerequisite, all belong to the scope of the application's protection.
See Fig. 1, it illustrates the flow process of the cipher key processing method that the embodiment of the present application provides. This embodiment is applied on the electronics being provided with safe module, and electronics can be desk-top computer, notebook, mobile phone and PAD etc., and certainly, electronics can also be specially other forms, and the application is also not specifically limited. As shown in Figure 1, this embodiment can specifically comprise step S101��step S102.
Step S101: obtain the progress mark that described safe module performs in data safe processing process to generate; Wherein, described safe module performs described data safe processing process according to the key in described electronics internal memory.
Wherein, safe module can be encryption module or deciphering module, correspondingly, when safe module is encryption module, the data safe processing process that safe module performs is data encryption process, when safe module is deciphering module, the data safe processing process that safe module performs is data decrypting process. Data encryption process and data decrypting process can see any one implementations of the prior art, and the application does not specifically limit.
It should be noted that, the data safe processing process that safe module performs comprises multiple step, and each step performs to terminate to generate corresponding mark, and mark represents that step is finished. For convenience of description, it is possible to the mark generated after step being completed is called that progress identifies. The specific form of progress mark can be multiple, and such as progress mark can be the function return of value of the function performing each step in encryption module, and certainly, function return of value is only that a kind of example illustrates, the progress mark in the application is not limited thereto.
Step S102: when described progress be designated default progress corresponding to described data safe processing process identify, delete the key in described electronics internal memory.
In enforcement, pre-set progress mark, for convenience of description, this progress pre-set mark is called that default progress identifies. Preset progress mark be according to data safe processing process finish using key opportunity point arrange, owing to different data safe processing processes puts, on different opportunitys, key of finishing using, consequently, it is desirable to identify for different data safe processing processes arranges each self-corresponding default progress.
Such as, when safe module is encryption module, the data safe processing process that safe module performs is data encryption process. Specifically, when encryption module performs data encryption process, first data to be encrypted and key are called in internal memory, recycle this encrypt data to be encrypted of this double secret key, to generate enciphered data, finally enciphered data is written in the external storage of electronics. In this case, data processing process, when be-encrypted data is generated enciphered data, just no longer needs key, therefore, it is possible to the progress mark step generating enciphered data terminated, and is set to the default progress mark that data encryption process is corresponding.
Such as, when safe module is deciphering module, the data safe processing process that safe module performs is data decrypting process. Specifically, when deciphering module performs data decrypting process, first data to be decrypted and key are called in, in internal memory, recycling this decrypt data to be decrypted of this double secret key, to obtain the data after deciphering. In this case, data safe processing process, when data deciphering to be decrypted is generated the data after deciphering, just no longer needs key, therefore, by the progress mark at the end of the step of the data after generation deciphering, the default progress mark that data decrypting process is corresponding can be set to.
Therefore, after step S101 gets the progress mark that safe module generates in data safe processing process, progress mark corresponding with this data safe processing process for this progress mark can be compared, so that whether the progress mark in determining step S101 identifies as the default progress that the data safe processing process of the safe module execution in step S101 is corresponding. If illustrating that this data safe processing process has been finished using key, therefore, it is possible to delete the key in electronics internal memory.
Certainly, the default progress mark in above-mentioned is only that a kind of example illustrates, presetting progress mark can also be other specific forms, and such as, the progress mark of presetting can be the mark that safe handling module performs data safe processing end of processing. That is, the progress mark of presetting not is the end mark of certain step in data safe processing process, but the end of whole data safe processing process mark, compared to the former, default progress mark is set to the latter, the real-time deleting key is slightly poor, but implementation is more simple. In a particular application, it is possible to select corresponding implementation according to practical situation for presetting progress mark.
Such as the introduction at background technology place, key, when carrying out data safe processing process, is read in internal memory by mobile phone, and the key safety in internal memory is lower. Contriver finds through research, and the reason that key safety is lower is, after key is read to internal memory by mobile phone, just no longer key is carried out subsequent disposal, causes the key being transferred internal memory to stop in internal memory always, until mobile phone shutdown.
It is appreciated that, the electronics such as mobile phone and desk-top computer the difference is that, mobile phone, when non-working condition, often can not shut down, but for screen lock state. Such as, mobile phone is performing after data safe processing process in safe module, it is possible to enter screen lock state. In this case, the key that data safe processing process uses can stop in mobile phone EMS memory always. And, under normal circumstances, this kind of screen lock state meeting last longer, add the safety technique means in mobile phone and the same not as electronicss such as desk-top computers complete, therefore, the key in mobile phone EMS memory is more easily stolen by malice program, causes bigger threat to mobile phone safe. But, utilize the cipher key processing method that above-described embodiment provides, it is ensured that the safety of the key in mobile phone, thus improve the safety of data in mobile phone.
By above technical scheme it will be seen that the present embodiment provide cipher key processing method, be applied in be provided with encryption module electronics in, and this electronics can specifically but be not limited to mobile phone. The key that data safe processing process uses, for performing data safe processing process, when safe module performs the process of data safe processing, can be read in the internal memory of electronics by safe module. First the present embodiment obtains the progress mark that safe module performs in data safe processing process to generate, when this progress be designated default progress corresponding to this safe handling process identify, delete the key in electronics internal memory, to solve the technical problem that key is easily stolen by malice program, thus improve the security of key, and then improve the security of electronics.
In actual applications, it can be multiple that step S101 in embodiment shown in above-mentioned Fig. 1 obtains the implementation of the progress mark in described safe module execution data safe processing process, it should be noted that, in the different implementation of step S101, also there is difference in the structure of safe module.
Specifically, safe module can comprise transmission unit, the progress mark that this transmission unit is used for performing safe module in data safe processing process to generate is sent in the execution module of step S101, correspondingly, a kind of specific implementation that the progress that step S01 obtains in described safe module execution data safe processing process identifies comprises steps A 1.
Steps A 1: receive in the data safe processing process of described safe module transmission the progress mark generated.
Wherein, safe module is when performing data safe processing process, it is possible to after each step of this data safe processing process terminates, and generates progress mark, to represent that this step is finished. It should be noted that, the step of data safe processing process is different, then progress mark is also not quite similar. Such as, data safe processing process comprises the step obtaining be-encrypted data, then the progress that this step correspondence generates is designated the mark obtaining complete be-encrypted data; Data safe processing process comprises the step of encryption, then the progress that this step correspondence generates is designated the complete mark of encryption.
Safe module can comprise transmission unit, sending unit can be sent in the execution module of steps A 1 by the progress generated in data safe processing process mark, and then, what the execution module of steps A 1 got is the progress mark that the transmission unit in safe module sends, or it may be said that the progress mark that the execution module of the steps A 1 safe module that is passive reception sends.
In the first implementation above-mentioned, the progress mark that the safe module of the passive reception of the execution module of step S101 sends, but, the progress mark of all right safe CMOS macro cell of active obtaining of the execution module of step S101. Correspondingly, another specific implementation that the progress that step S01 obtains in described safe module execution data safe processing process identifies comprises step B1.
Step B1: monitor the progress mark that described safe module is performing in data safe processing process to generate.
Wherein, the execution module of B1 does not need to wait that safe module sends progress mark, but identifies in the progress of the safe CMOS macro cell of Real-Time Monitoring. In this kind of implementation, the concrete structure of safe module can not need to improve, therefore, it is achieved mode is simpler.
It should be noted that, the thought of the application is the key deleted in internal memory. Owing in actual applications, the internal memory structure of electronics is different, then the form preserving key in internal memory also may not be identical. Consequently, it is desirable to preserve the multi-form of key according to electronics at internal memory, the concrete mode of the key deleted in internal memory is carried out different settings.
Specifically, if a kind of file layout of key in electronics internal memory is, key is kept in the variable of electronics internal memory, and correspondingly, a kind of implementation that the step S102 in the embodiment shown in above-mentioned Fig. 1 deletes the key in electronics internal memory can refer to Fig. 2. As shown in Figure 2, this implementation can comprise step S201��step S202.
Step S201: obtain target value; Wherein, described target value and described key are not identical.
Wherein, variable in order to delete in electronics internal memory, it is necessary to obtain the numerical value different from the key in this variable, for convenience of description, this numerical value is called target value. Can selection of land, the mode generating target value can be stochastic generation target value, and the target value of this stochastic generation is called random value, specifically, when the progress that determining step S101 gets be designated the default progress corresponding with this data safe processing process identify, just stochastic generation target value.
In addition, it is also possible to pre-set the data value different from key, this data value of setting is called preset value. Correspondingly, the implementation generating target value can also be, obtains preset value, and using described preset value as target value.
Step S202: be described target value by the key replacement in described variable.
Wherein, after obtaining target value, it is just this target value obtained by the key replacement preserved in variable, thus realizes deleting the key in internal memory variable.
Can selection of land, another kind file layout of key in electronics internal memory is, it may also be useful to pointer store key, namely key is kept in the variable of internal memory, and the internal memory address of variable is stored in pointer. With reference to Fig. 3, it illustrates another kind of implementation schema of the key deleted in electronics internal memory. As shown in Figure 3, this implementation can comprise step S301��step S303. Wherein, the explanation about step S301 and step S302 can refer to the step S201 in Fig. 2 and step S202, does not repeat at this, is described by step S303 below.
Step S303: discharge in described pointer the internal memory space that the described internal memory address stored represents.
Specifically, owing to there is pointer in internal memory, pointed variable, comprises key in variable. Use target value by after the key replacement in variable, in order to prevent RAM leakage, in addition it is also necessary to release pointer, the internal memory space that the internal memory address that namely release pointer stores represents, or the internal memory space of the variable of release pointer sensing.
Below the key handling device that the application provides is introduced, it is necessary to explanation, can refer to the explanation of cipher key processing method provided above about the explanation of key handling device, do not repeat below.
Corresponding cipher key processing method embodiment described in above-mentioned Fig. 1, this application provides the embodiment of the key handling device being applied on the electronics being provided with safe module. As shown in Figure 4, this device embodiment can specifically comprise: progress mark acquiring unit 100 and internal memory key delete unit 200. Wherein:
Progress mark acquiring unit 100, for obtaining the progress mark that described safe module performs in data safe processing process to generate; Wherein, described safe module performs described data safe processing process according to the key in described electronics internal memory;
Internal memory key deletes unit 200, for when described progress be designated default progress corresponding to described data safe processing process identify, delete the key in described electronics internal memory.
From above technical scheme, the key handling application of installation that the present embodiment provides is on the electronics being provided with safe module, safe module is when performing data safe processing process, need to read in internal memory by the key being stored in electronics external storage, in order to ensure secret key safety, progress mark acquiring unit 100 in the present embodiment can get the progress mark that safe module is performing in data safe processing process to generate, and then internal memory key delete unit 200 when described progress be designated default progress corresponding to described data safe processing process identify, delete the key in described electronics internal memory, thus avoid the technical problem that the key in internal memory is easily stolen, and then ensure the safety of key.
Can selection of land, described progress mark acquiring unit 100 can specifically comprise:
First progress mark obtains subelement, for monitoring the progress mark that described safe module is performing in data safe processing process to generate.
Or, described progress mark acquiring unit 100 can specifically comprise:
2nd progress mark obtains subelement, for receiving in the data safe processing process of described safe module transmission the progress mark generated.
Can selection of land, the key storage that the safe module of above-mentioned electronics uses in variable, correspondingly, described internal memory key delete unit 200 comprise:
Target value obtains subelement, for obtaining target value; Wherein, described target value and described key are not identical;
Target value replaces subelement, for being described target value by the key replacement in described variable.
Wherein, target value acquisition subelement can specifically comprise:
Random value generates subelement, for generating random value, and using described random value as target value.
Or, target value obtains subelement and can specifically comprise:
Preset value obtains subelement, for obtaining preset value, and using described preset value as target value.
Can selection of land, the internal memory address of described variable is stored in pointer; Correspondingly, this key handling device also comprises:
Internal memory space releasing unit, for discharging in described pointer the internal memory space that the described internal memory address stored represents.
It should be noted that, each embodiment in this specification sheets all adopts the mode gone forward one by one to describe, each embodiment emphasis illustrate be the difference with other embodiments, between each embodiment identical similar part mutually see.
Also it should be noted that, herein, the such as relational terms of first and second grades and so on is only used for separating an entity or operation with another entity or operational zone, and not necessarily requires or imply to there is any this kind of actual relation or sequentially between these entities or operation. And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, so that comprise the process of a series of key element, method, article or equipment not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise the key element intrinsic for this kind of process, method, article or equipment. When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising above-mentioned key element and also there is other identical element.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are enable to realize or use the application. To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein when not departing from the spirit or scope of the application, can realize in other embodiments. Therefore, the application can not be limited in these embodiments shown in this article, but be met the widest scope consistent with principle disclosed herein and features of novelty.

Claims (10)

1. a cipher key processing method, it is characterised in that, it is applied to the electronics being provided with safe module, the method comprises:
Obtain the progress mark that described safe module performs in data safe processing process to generate; Wherein, described safe module performs described data safe processing process according to the key in described electronics internal memory;
When described progress be designated default progress corresponding to described data safe processing process identify, delete the key in described electronics internal memory.
2. cipher key processing method according to claim 1, it is characterised in that, the described safe module of described acquisition performs the mark of the progress in data safe processing process, comprising:
Monitor the progress mark that described safe module is performing in data safe processing process to generate.
3. cipher key processing method according to claim 1, it is characterised in that, the described safe module of described acquisition performs the mark of the progress in data safe processing process, comprising:
Receive in the data safe processing process of described safe module transmission the progress mark generated.
4. cipher key processing method according to claim 1, it is characterised in that, described key storage is in variable, and the key in the described electronics internal memory of described deletion, comprising:
Obtaining target value, wherein, described target value and described key are not identical;
It is described target value by the key replacement in described variable.
5. cipher key processing method according to claim 4, it is characterised in that, described acquisition target value, comprising:
Generate random value, and using described random value as target value.
6. cipher key processing method according to claim 4, it is characterised in that, described acquisition target value, comprising:
Obtain preset value, and using described preset value as target value.
7. cipher key processing method according to claim 4, it is characterised in that, the internal memory address of described variable is stored in pointer; Correspondingly, the method also comprises:
Discharge in described pointer the internal memory space that the described internal memory address stored represents.
8. a key handling device, it is characterised in that, it is applied to the electronics being provided with safe module, this device comprises:
Progress mark acquiring unit, for obtaining the progress mark that described safe module performs in data safe processing process to generate; Wherein, described safe module performs described data safe processing process according to the key in described electronics internal memory;
Internal memory key deletes unit, for when described progress be designated default progress corresponding to described data safe processing process identify, delete the key in described electronics internal memory.
9. key handling device according to claim 8, it is characterised in that, described progress mark acquiring unit comprises:
First progress mark obtains subelement, for monitoring the progress mark that described safe module is performing in data safe processing process to generate.
10. key handling device according to claim 8, it is characterised in that, described progress mark acquiring unit comprises:
2nd progress mark obtains subelement, for receiving in the data safe processing process of described safe module transmission the progress mark generated.
CN201510242396.5A 2015-05-13 2015-05-13 Secret key processing method and apparatus Pending CN105653970A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510242396.5A CN105653970A (en) 2015-05-13 2015-05-13 Secret key processing method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510242396.5A CN105653970A (en) 2015-05-13 2015-05-13 Secret key processing method and apparatus

Publications (1)

Publication Number Publication Date
CN105653970A true CN105653970A (en) 2016-06-08

Family

ID=56482089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510242396.5A Pending CN105653970A (en) 2015-05-13 2015-05-13 Secret key processing method and apparatus

Country Status (1)

Country Link
CN (1) CN105653970A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106971119A (en) * 2017-02-24 2017-07-21 江苏信源久安信息科技有限公司 The key data in database safe read-write authentication method of trusted identity
CN109684030A (en) * 2018-11-22 2019-04-26 海光信息技术有限公司 Virutal machine memory key generating device and method, encryption method and SoC system
CN117289867A (en) * 2023-09-28 2023-12-26 河北润博星原科技发展有限公司 Information processing platform based on big data processing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1750458A (en) * 2004-09-16 2006-03-22 华为技术有限公司 Key managing device and method
CN101950347A (en) * 2010-09-21 2011-01-19 烟台海颐软件股份有限公司 Method and system for encrypting data
CN104506504A (en) * 2014-12-16 2015-04-08 成都驰通数码***有限公司 Security mechanism and security device for confidential information of card-free terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1750458A (en) * 2004-09-16 2006-03-22 华为技术有限公司 Key managing device and method
CN101950347A (en) * 2010-09-21 2011-01-19 烟台海颐软件股份有限公司 Method and system for encrypting data
CN104506504A (en) * 2014-12-16 2015-04-08 成都驰通数码***有限公司 Security mechanism and security device for confidential information of card-free terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106971119A (en) * 2017-02-24 2017-07-21 江苏信源久安信息科技有限公司 The key data in database safe read-write authentication method of trusted identity
CN109684030A (en) * 2018-11-22 2019-04-26 海光信息技术有限公司 Virutal machine memory key generating device and method, encryption method and SoC system
CN109684030B (en) * 2018-11-22 2021-05-04 海光信息技术股份有限公司 Virtual machine memory key generation device and method, encryption method and SoC system
CN117289867A (en) * 2023-09-28 2023-12-26 河北润博星原科技发展有限公司 Information processing platform based on big data processing
CN117289867B (en) * 2023-09-28 2024-06-14 上海豪生酒店管理有限公司 Information processing platform based on big data processing

Similar Documents

Publication Publication Date Title
CN101404056B (en) Software protection method, apparatus and equipment
CN103106372B (en) For lightweight privacy data encryption method and the system of android system
CN103259651B (en) A kind of method and system to terminal data encryption and decryption
CN105812332A (en) Data protection method
CN105260668A (en) File encryption method and electronic device
CN104077533A (en) Sensitive data operating method and device
CN109543435A (en) A kind of FPGA encryption protecting method, system and server
US10762231B2 (en) Protecting screenshots of applications executing in a protected workspace container provided in a mobile device
CN105095719B (en) A kind of unlocked by fingerprint method and its system and the electronic equipment with the system
CN108418785B (en) Password calling method, server and storage medium
CN105653969A (en) Data processing method, apparatus and electronic equipment
CN101902576A (en) Video-encryption camera and encryption method thereof
CN105718794A (en) Safety protection method and system for virtual machine based on VTPM
CN105653970A (en) Secret key processing method and apparatus
CN103279715A (en) Database data encryption and decryption method and device
CN107832635A (en) Access right control method, device, equipment and computer-readable recording medium
CN105653998A (en) Identity card information reading method and apparatus thereof, and mobile terminal
US20180123789A1 (en) Apparatus and method for generating a key in a programmable hardware module
CN112839013B (en) Key transmission method, device and computer readable storage medium
CN100369017C (en) Encrypt device and method for static RAM programmable gate array chip
CN105515757A (en) Security information interaction equipment based on trusted execution environment
CN107589999B (en) Process communication safety channel establishing method in heaven-earth integrated engineering
CN103177224A (en) Data protection method and device used for terminal external storage card
CN110932853B (en) Key management device and key management method based on trusted module
CN112487444A (en) Database-based data encryption method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160608

RJ01 Rejection of invention patent application after publication