Method, Terminal and Security Carrier for Adaptive Switching of Cryptographic Algorithm System

A self-adaptive switching and security carrier technology, applied in the field of financial data processing, can solve the problems of incompatibility of the old key system

Active Publication Date: 2017-06-23
CHINA UNIONPAY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a country, region or industry needs to use a new key system internally according to its own conditions, the problem of incompatibility between the new and old key systems will arise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, Terminal and Security Carrier for Adaptive Switching of Cryptographic Algorithm System
  • Method, Terminal and Security Carrier for Adaptive Switching of Cryptographic Algorithm System
  • Method, Terminal and Security Carrier for Adaptive Switching of Cryptographic Algorithm System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following introduces some of the possible embodiments of the present invention, which are intended to provide a basic understanding of the present invention, but are not intended to identify key or decisive elements of the present invention or limit the scope of protection. It is easy to understand that, according to the technical solution of the present invention, those skilled in the art may propose other alternative implementation manners without changing the essence and spirit of the present invention. Therefore, the following specific embodiments and drawings are only exemplary descriptions of the technical solution of the present invention, and should not be regarded as the entirety of the present invention or as a limitation or restriction on the technical solution of the present invention.

[0024] refer to figure 1 , which shows a flowchart of a method for implementing adaptive switching of multiple cryptographic algorithm systems in an external application...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a terminal and a security carrier for self-adaptive switching of a cryptographic algorithm system. In one embodiment of the present invention, the method for adaptive switching of cryptographic algorithm systems includes sending an application selection command to a security carrier that interacts with the external application; receiving a response to the application selection command from the security carrier, The response includes a secure bearer algorithm indicator; by comparing the secure bearer algorithm indicator with the algorithm list supported by the external application, determine the cryptographic algorithm system to be used; and send an application initialization command to the secure bearer, the The application initialization command includes a transaction algorithm indicator that identifies the cryptographic algorithm system to be used.

Description

technical field [0001] The present invention relates to the field of financial data processing, and more specifically, relates to a method for adaptively switching multiple encryption algorithm systems, a terminal and a security carrier. Background technique [0002] At present, my country's financial industry is vigorously promoting the localization of encryption algorithms. After a few years, newly issued financial IC cards and mobile payment IC cards will all support the national encryption algorithm, and the financial acceptance network will also complete the transformation of the national encryption algorithm. On the one hand, the financial acceptance network that supports the national encryption algorithm still needs to accept existing IC cards that support the international algorithm. At the same time, the IC cards issued by overseas card issuers only support the international algorithm, which requires the acceptance network to also support the international algorithm....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06G06Q20/34
Inventor 谭颖徐燕军徐志忠李伟李洁吴水炯
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products