Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, terminal device and system for encrypting security configuration files

A security configuration and terminal equipment technology, applied in security communication devices, transmission systems, digital transmission systems, etc., can solve the problems of a large amount of effort, manual labor, and high cost

Active Publication Date: 2019-07-12
NCR CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, updating internal systems to accommodate improved algorithms, key types, and key lengths can be costly and manual labor-intensive for businesses that need to frequently update equipment and software across the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, terminal device and system for encrypting security configuration files
  • A method, terminal device and system for encrypting security configuration files
  • A method, terminal device and system for encrypting security configuration files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] first reference Figure 1A ,1B and 1C, according to an example embodiment, the graphs are graphs of a first handshake to establish a communication session using an encrypted security profile. The components in the figures are shown in a greatly simplified fashion, only those components necessary for understanding certain embodiments of the invention are shown.

[0039] The diagram includes an enterprise host device and a client device, and shows the process of first establishing a communication session between the host device and the client device and determining the security profile used during the session. Host devices and client devices are considered endpoints for establishing a secure communication session with each other. Endpoints can be secure input / output modules (SIOMs) or peripherals such as printers, scanners, PIN pads, encrypted PIN pads, magnetic stripe readers (MSR), monitors, keyboards, value-media dispensers ), touch screen monitors, etc.).

[0040] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

When two endpoint devices first establish a session, they communicate with each other in a secure session by negotiating encrypted communication. Each endpoint device transmits its available security profile to the other endpoint. Then, select a specific security profile that defines the encryption and authentication of data used between the two endpoint devices during a secure session.

Description

technical field [0001] The invention relates to an encrypted security configuration file. Background technique [0002] Online or electronic security is a very important issue in the industry. It seems like every month brings news of a major corporate security breach. Organizations experiencing such security breaches include government agencies, retail stores, social media companies, and even large banks. [0003] Anytime a business thinks it has security measures in place to fix a security breach, hackers are quick to figure out new ways to compromise their systems. In some cases, the damage is not even done within the enterprise's systems, but through the network transmission lines entering or leaving the enterprise system; The password method (assuming a password is used). [0004] Cryptographic systems are in a state of continuous change. While encryption techniques and concepts don't change much over time - algorithms, key types, and key lengths do change frequentl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/06
CPCG06F21/71G06F21/82G06F21/85H04L63/205H04L63/0428H04L63/20
Inventor 斯塔夫罗斯·安东纳柯基斯布兰得利·威廉·科瑞恩
Owner NCR CORP