Unlock instant, AI-driven research and patent intelligence for your innovation.

PIN switch encryption method

A technology of trans-encryption and PIN code, which is applied in the direction of user identity/authority verification, etc., can solve the problems of transformation costs, keys do not have dynamic generation characteristics, etc., and achieve the effect of ensuring security

Inactive Publication Date: 2014-07-02
BEIJING WATCH DATA SYST
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) The number of agreed keys is limited and the keys do not have the feature of dynamic generation;
[0005] 2) The banking system needs to add a special PIN verification function for mobile payment-related functions, which requires transformation costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PIN switch encryption method
  • PIN switch encryption method
  • PIN switch encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0061] ● Financial institutions provide the following key information before issuing financial IC cards:

[0062] 1) User master key: 11111111111111111111111111111111 (for card issuance);

[0063] 2) PIK protection key KEK: 3333333333333333333333333333333 (used to protect PIK);

[0064] 3) When the OTA server applies for the PIK ciphertext, the financial system assigns the key PIK used to encrypt the PIN plaintext: 00010203040506070001020304050607; the financial system uses KEK to encrypt and protect the PIK, obtain the PIK ciphertext, and return it to the OTA server. The encrypted PIK ciphertext: A851A269EF9B271BA851A269EF9B271BA5173AD5;

[0065] ●User account password, that is, the account PIN code is 123456.

[0066] The SIM card encryption process is as follows:

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a PIN switch encryption method. The method comprises the steps that a mobile terminal SIM card encrypts an account PIN code to generate a PIN ciphertext, and sends the PIN ciphertext to an OTA server; the OTA server calls an encryption machine to carry out switch encryption on the PIN ciphertext, so as to acquire a new PIN ciphertext required by a financial institution; when mobile payment transaction is carried out, the new PIN ciphertext received by the financial institution is decrypted to acquire a user PIN code; and whether the user PIN code acquired by decryption is consistent with a user PIN code saved by a financial institution background is judged to validate whether a PIN password input by a user is correct. According to the invention, the PIN switch encryption method is used to replace a password keyboard; encryption and decryption processes of the personal PIN of the user are safely completed; through the method, a PIN working secret key is dynamically generated; the safety of the PIN code is ensured to the greatest extent; and the safety of a financial account of the terminal user is improved.

Description

technical field [0001] The invention relates to the technical field of PIN security in a mobile payment system, in particular to a method for trans-encrypting a PIN in a mobile payment system. Background technique [0002] In recent years, the mobile payment industry has developed rapidly, and mobile payment is becoming an emerging and convenient payment method. Operators, city cards, third-party payment platforms and major banks are all actively promoting the development of mobile payment. Various mobile payment products and corresponding mobile payment software systems have also appeared on the Internet, but security has always been the most concerned issue for all stakeholders in the mobile payment industry chain, especially mobile payment products based on debit / credit functions, how to maximize Protecting the security of users' financial accounts has become the top priority for banks to promote mobile payment. [0003] At present, in the construction of mobile payment ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 赵敏张江涛计进波
Owner BEIJING WATCH DATA SYST