PIN switch encryption method
A technology of trans-encryption and PIN code, which is applied in the direction of user identity/authority verification, etc., can solve the problems of transformation costs, keys do not have dynamic generation characteristics, etc., and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0061] ● Financial institutions provide the following key information before issuing financial IC cards:
[0062] 1) User master key: 11111111111111111111111111111111 (for card issuance);
[0063] 2) PIK protection key KEK: 3333333333333333333333333333333 (used to protect PIK);
[0064] 3) When the OTA server applies for the PIK ciphertext, the financial system assigns the key PIK used to encrypt the PIN plaintext: 00010203040506070001020304050607; the financial system uses KEK to encrypt and protect the PIK, obtain the PIK ciphertext, and return it to the OTA server. The encrypted PIK ciphertext: A851A269EF9B271BA851A269EF9B271BA5173AD5;
[0065] ●User account password, that is, the account PIN code is 123456.
[0066] The SIM card encryption process is as follows:
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 