Three-layer key encryption method and bank transaction system

An encryption method and technology of a transaction system, applied in the field of bank transaction systems, can solve problems such as transmission failure, transaction data being cracked, and tampered with, and achieve the effect of ensuring transaction security, preventing internal control risks, and preventing cracking.

Inactive Publication Date: 2012-01-25
深圳市沃达通实业有限公司
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention proposes an encryption method using a three-layer key in the bank transaction system. The initial master key is dynamically updated, and the master ke

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-layer key encryption method and bank transaction system
  • Three-layer key encryption method and bank transaction system
  • Three-layer key encryption method and bank transaction system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Such as figure 1 The flow chart of the three-layer key encryption process shown:

[0030] The first-level key is the Initial Master Key (IMK), which is used to encrypt / decrypt the master key using the 3DES algorithm. In a preferred embodiment, the length of the initialization master key is 16 bytes and 128 bits in length. For the convenience of use, it is generally converted into BCD code and provided, so it is 32 ASC code characters.

[0031] The second layer key is the master key (Master Key, MK), and the 3DES / DES algorithm is used to encrypt / decrypt the third layer. In a preferred embodiment, the length of the master key is 16 bytes and 128 bits, represented by 32 ASC code characters.

[0032] The third layer of keys is the work key, including personal password data encryption key (PIK) and message data encryption key (MAK). PIK is used to encrypt the cardholder's personal account number and password, with a length of 16 bytes and 128 bits, which can be expressed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a three-layer key encryption method and a bank transaction system, wherein the method comprises the following steps of: providing an initialized master key in a plaintext way; decrypting the ciphertext of the master key by using the initialized master key to generate the plaintext of the master key; and decrypting the ciphertext of a working key by using the plaintext of the master key to generate the plaintext of the working key. As the initialized master key in a three-layer key encryption system is dynamically updated, the initialized master key which is firstly generated through an encryption machine can fail after being used once only, and the internal control risk is effectively prevented. Simultaneously, the master key is replaced frequently, thereby effectively preventing data from being cracked, being tampered, causing transmission failure and other risks in the network transmission process. The three-layer key encryption method provided by the invention is particularly suitable for bank transaction systems and can effectively ensure the safety of transactions.

Description

technical field [0001] The invention relates to a data encryption technology, in particular to an encryption method of a three-layer key, and a bank transaction system realized by using the encryption method. Background technique [0002] We know that the financial industry has a lot of data to be transmitted on the network, including from the front-end to the host, from the self-service terminal to the front-end, etc. These data are uploaded and passed on the network, and we can easily think about security issues. If If these data are stolen or intercepted, how dare we deposit money in the bank. This shows that because the financial industry is more sensitive to data, it also pays more attention to data encryption. [0003] Suppose we have a piece of data, which is an ATM (Automatic Teller Machine) withdrawal message, including a person's magnetic card number, password, and withdrawal amount. Now we need to transfer this data from an ATM machine to the front-end computer f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06Q40/00
Inventor 崔再彬
Owner 深圳市沃达通实业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products