Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and system for inter-system secret key synchronization

A key synchronization and key technology, applied in key distribution, can solve the problems of long key consumption cycle and unrealistic keys, and achieve the effect of convenient operation and high security

Inactive Publication Date: 2015-01-28
CHINA CONSTRUCTION BANK
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing method needs to manually change the key on the POS terminal, which takes a long period of time to manually modify the key on the terminal, and it is unrealistic for the administrator to go to the merchant to manually modify the key on the terminal one by one

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for inter-system secret key synchronization
  • Method and system for inter-system secret key synchronization
  • Method and system for inter-system secret key synchronization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The embodiment of the present invention provides a method and system for key synchronization between systems, which are used for realizing key synchronization between different encryption machine systems, with convenient operation and high security.

[0042] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0043] The terms "first", "second", "third", "fourth", etc. (if any) in the specification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for inter-system secret key synchronization. A first system database acquires a first secret key to be synchronized; the first secret key is decrypted to be first plain text through first encryption equipment; the first plain text is encrypted based on the symmetric encryption algorithm to obtain first cipher text; the first cipher text is written into synchronous data, and the synchronous data are transmitted to a second system database; the first cipher text in the synchronous data is acquired and then is decrypted to be the first plain text based on the symmetric encryption algorithm; the first plain text is encrypted through second encryption equipment to obtain a second secret key. According to the method and system, the secret key does not need to be modified manually, secret key synchronization between different encryption equipment systems is achieved, operation is convenient, and security is high.

Description

Technical field [0001] The present invention relates to the field of key synchronization, in particular to a method and system for key synchronization between systems. Background technique [0002] POS terminal keys are divided into two levels: key encryption key (KEY) and working key (WK). The key encryption key (KEY) is used to encrypt and protect the working key (WK). Each POS terminal shares a unique KEY with the POS processing center. KEK has security protection measures and can only be written to the POS terminal and participate in operations. Cannot be read. When the POS terminal obtains the working key from the POS processing center, it encrypts and decrypts it through the shared KEY, and the working key is an important basis for the POS processing center to verify whether the POS terminal is a legitimate terminal. At present, KEY is generated by the IABMS system (merchant, terminal information management system) through a random algorithm, and synchronized to the POS p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 付小丽杨蔚然侯戬揭育柱郭敏鸿罗恕人成亮吴兴威邱文超王雨
Owner CHINA CONSTRUCTION BANK
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More