An operation request processing method and system

An operation request processing and operation request technology, which is applied in the field of information security, can solve the problems of limited application range of data transmission and invisible full ciphertext data transmission data, etc.

Active Publication Date: 2017-01-25
TENDYRON CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention aims to solve the problems of invisible data and limited application range of data transmission in full ciphertext data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An operation request processing method and system
  • An operation request processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0030] In the description of the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientation or positional relationship indicated by "vertical", "horizontal", "top", "bottom", "inner", "outer" etc. is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an operation request processing method and system. The operation request processing method comprises the steps that after receiving an operation request message, a background system server generates a response message according to a first preset security class and sends the response message to a network terminal; after receiving the response message, the network terminal generates a feedback message according to a second preset security class and sends the feedback message to the background system server; after receiving the feedback message, the background system server executes an operation request. By conducting security classification on data to be transmitted, semi-transparency of communication data is realized, a part of the communication data are transmitted in the form of plaintexts, and the integrity and the safety of the data to be transmitted with a higher security class can also be guaranteed on the premises that the absolute security of the data to be transmitted with the highest security class is guaranteed and the plaintexts of the data to be transmitted with the higher security class and the plaintexts of the data to be transmitted with a lower security class are visible.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to an operation request processing method and system. Background technique [0002] The existing online business of the financial industry usually adopts the communication method of full ciphertext transmission to ensure safe transactions between the bank back office and the network terminal. [0003] The usual method of communication is: the network terminal connects to the bank processing center, and uses the handshake principle to establish an end-to-end logical secure channel with the processing center. All communication data between the bank processing center and the security device are encrypted, and all these communication data are Use the form of ciphertext + MAC to flow on the physical channel to achieve the purpose of communication security. [0004] Among them, the network terminal may include networked devices such as security devices (such as smart password...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products