Unlock instant, AI-driven research and patent intelligence for your innovation.

Identified card number information transmission verification method and system

An information transmission and verification method technology, applied in the field of card number information transmission verification methods and systems, can solve problems such as hacking of confidential data, and achieve the effects of preventing man-in-the-middle attacks, preventing tampering, and ensuring security.

Active Publication Date: 2015-11-11
SHANGHAI PEOPLENET SECURITY TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are many insecure factors in data exchange on the Internet, especially some confidential data are more vulnerable to hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identified card number information transmission verification method and system
  • Identified card number information transmission verification method and system
  • Identified card number information transmission verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will describe the embodiments or prior art that need to be used Attached picture For a brief introduction, it is obvious that the following description Attached picture These are only some embodiments of the present invention. For those skilled in the art, they can also use these Attached picture get other Attached picture .

[0056] As a specific embodiment of the present invention, figure 1 Schematic flowchart of an embodiment of an identification card number information transmission verification method provided by the present invention picture . The present invention provides a method for verifying transmission of identified card number information, comprising:

[0057] The client and the server generate session keys for encrypting card number information respectively;

[0058] The client uses the first algorithm to calcula...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identified card number information transmission verification method. The method comprises the following steps: respectively storing a public encryption algorithm and a public decryption algorithm in a client and a server, and respectively generating session keys for encrypting card number information; adopting a first algorithm to compute the card number information through the client to obtain identification information; encrypting the card number information through the combination of the public encryption algorithm and the session key so as to generate the first data; the client sending the identification information and the first data to the server; the server decrypting the received first data through the pubic decryption algorithm and the session key to obtain the card number information; the server adopting the card number information computed through the adoption of the first algorithm to generate check information; comparing the check information with the received identification information to check whether the decrypted card number information is legal. Through the adoption of the method disclosed by the invention, the data content in network transmission can be prevented from tampering, the repudiation is prevented, the man-in-the-middle attack is prevented, and the better technical prospect is realized.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a card number information transmission verification method and system. Background technique [0002] With the rapid development of information network technology, network technology is applied in various fields. The openness and sharing of the network make the confidentiality and accuracy of the information transmitted in the network cannot be guaranteed. Data leakage and data tampering incidents in the network are intensifying, and APT, hackers, Trojan horses, viruses, and insiders are hard to guard against. The confidential transmission of data in the network has become a focus of the information society, and corresponding preventive measures must be taken. [0003] There are many insecure factors in data exchange on the Internet, especially some confidential data are more vulnerable to hackers. We choose to encrypt the data transmitted in the network. Even if the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14
CPCH04L9/14H04L63/0428H04L63/123
Inventor 谈剑锋姜立稳潘洪波王力钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH