Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for securely transmitting equipment information

A technology for safe transmission of equipment information, applied in the field of information security, can solve problems such as reducing the security of CPU card information, and achieve the effect of safe transmission

Active Publication Date: 2012-10-17
FEITIAN TECHNOLOGIES
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the current process of processing security device information, the inventors have found that at least the following problems exist in the prior art: the CPU card encrypts the data packet after receiving the data packet. Traditional encryption only encrypts the entire data, and the encryption key used is in the The CPU card is readable outside, thus reducing the security of the CPU card information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securely transmitting equipment information
  • Method for securely transmitting equipment information
  • Method for securely transmitting equipment information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] see figure 1 , Embodiment 1 provides a method for securely transmitting device information, specifically including:

[0044] Step 1-1: The card receives the data packet and judges whether the second byte of the data packet is equal to a fixed value;

[0045] If yes, go to step 1-2; if no, go to step 1-8.

[0046] In this embodiment, the second byte of the data packet has a fixed value of 0XF8.

[0047] Step 1-2: The card performs a first operation on the data field of the data packet, and generates a first key according to the result of the first operation;

[0048] In this embodiment, a specified key must participate in the first operation. The specified key is the key agreed by both parties inside the card and outside the card, and cannot be read outside the card. The first operation includes, but is not limited to, symmetric encryption, asymmetric encryption, random number encryption, data hashing, bit operations, and combinations thereof. Part or all of the dat...

Embodiment 2

[0071] see figure 2 , Embodiment 2 provides a method for specifically processing security device information, specifically including:

[0072] Step 201: the card receives the data packet and judges whether the second byte of the data packet is equal to a fixed value;

[0073] If yes, go to step 202; if no, go to step 218.

[0074] In this embodiment, the second byte of the data packet has a fixed value of 0XF8.

[0075] Specifically, if the second byte of the received data packet is 0XF8, the data packet is composed of a data header and a data field, wherein the first five bytes of the high-order end are the data header, and the remaining part is the data field.

[0076] For example: The received data packet is: 80F80201082012040917375080, the data header is: 80F8020108, and the data field is: 2012040917375080.

[0077] Step 202: judging whether the preset byte of the data header of the data packet meets the first preset requirement, if yes, execute step 204, if no, execut...

Embodiment 3

[0157] see image 3 , Embodiment 3 provides a method for decrypting the security device information in Embodiment 2, specifically including:

[0158] Step 301: Receive the result data and analyze it to obtain the encrypted data in the card and the second key;

[0159] In this embodiment, the specific received result data is:

[0160] 6963626320636172642020202020202020202020900758403049921820FF35DF1F4AE18C1E5F7EEED7449D59D76618237FFF0075D5C88B918020303F4FE0DA9380CED691E7405183A10FBD61E7405183A10FBD61231234454545454545454545454545454545FFFF1012FFFFB0D6D68C11987977

[0161] After parsing, the encrypted card data is obtained as follows:

[0162] 6963626320636172642020202020202020202020900758403049921820FF35DF1F4AE18C1E5F7EEED7449D59D76618237FFF0075D5C88B918020303F4FE0DA9380CED691E7405183A10FBD61E7405183A10FBD61231234454545454545454545454545454545FFFF1012FFFF

[0163] The second key is: B0D6D68C11987977

[0164] Step 302: Using the specified key to perform a first operation on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for securely transmitting equipment information, relating to the filed of information security. By the method, a data packet is integrally encrypted after a CPU (Central Processing Unit) card receives the data packet and an adopted encryption key is readable outside the CPU card, thereby solving the problem that the information security of the CPU card is low. The method comprises the following steps: receiving the data packet and judging whether the second byte of the data packet is equal to a fixed value by the card; carrying out corresponding operation if the second byte of the data packet is not equal to the fixed value; carrying out the first operation on the data field of the data packet to generate a first key if the second byte of the data packet is equal to the fixed value; then carrying out the second operation to generate a second key; carrying out the third operation on the second key by using the first key to generate a third key; carrying out encryption operation on the key part of the data marked in the card by using the third key; substituting the key part of the data marked in the card by using the encrypted result, wherein other parts are not changed; and then splicing with the second key in sequence to obtain result data, and sending the result data.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for securely transmitting device information. Background technique [0002] The traditional magnetic stripe card technology is simple, and the magnetic stripe information is easy to be copied. Cases of counterfeiting magnetic stripe cards and stealing magnetic stripe information frequently occur, which cause huge losses to cardholders and card issuers. The CPU card has relatively high technical content, which greatly reduces the chance of being forged and copied. [0003] The mobile phone can use the CPU card to make mobile payment. The mobile payment service is an electronic transaction service for payment, payment or consumption through mobile phones launched by mobile operators in cooperation with the financial sector. As one of the means of electronic payment in the future, mobile payment will become the most convenient payment method for people especially after...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products