A method for identifying the integrity of transaction information

A technology for transaction information and integrity, which is applied in the field of information security and can solve problems such as hidden dangers of user interests and security.

Active Publication Date: 2021-07-20
FEITIAN TECHNOLOGIES
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of information technology, people pay more and more attention to information security. For example, the upper computer and the terminal equipment encrypt the communication data and share the key to ensure information security, and the server guarantees information security by verifying the password authentication transmitted by the network client. , in the existing technology, the communication data in the communication process of the two parties generally involves important data, such as transaction amount, user name, password, etc., and these important data will be stored in the transaction information. Once the transaction information is illegally intercepted, it will be given to the user. The interests of the security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for identifying the integrity of transaction information
  • A method for identifying the integrity of transaction information
  • A method for identifying the integrity of transaction information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] According to Embodiment 1 of the present invention, a method for identifying the integrity of transaction information is provided, such as figure 1 shown, including:

[0037] Step s101: the terminal device receives the transaction instruction sent by the host computer, analyzes the transaction instruction to obtain the first message verification code and the transaction information to be verified.

[0038] Step s102: the terminal device generates a third key according to the internally stored first key; generates a fourth key according to the internally stored second key;

[0039] Wherein, the first key and the second key are preset known keys;

[0040] Specifically, starting from the fourth bit group of the first key, every four bits are alternately complemented to obtain the third key, and starting from the fourth bit group of the second key, every four bits are alternately complemented to obtain Fourth key.

[0041] For example: the first key is 01 23 45 67 89AB C...

Embodiment 2

[0077] Embodiment 2 of the present invention provides a method for identifying the integrity of transaction information, such as image 3 shown, including:

[0078] Step s301: the terminal device receives the transaction instruction sent by the host computer, analyzes the transaction instruction to obtain the first message verification code and the transaction information to be verified.

[0079] Step s302: The terminal device judges whether the known key in its storage space meets the third preset condition, if yes, execute step s303; if not, repeat the splicing of the known key, and take the leftmost 16 bytes of data to the first Export key assignment, execute step s304;

[0080] Specifically, the terminal device judges whether the key in its storage space meets the third preset condition: judge whether the length of the known key is 16 bytes, if yes, perform step s303; if not, repeat the splicing of the known key , take the leftmost 16-byte data to assign a value to the f...

Embodiment 3

[0108] Embodiment 3 of the present invention provides a device for authenticating the integrity of transaction information, such as Figure 4 shown, including:

[0109] The receiving module 10 is used to receive the transaction instruction sent by the host computer;

[0110] The parsing module 11 is configured to parse the transaction instruction received by the receiving module to obtain the first message verification code and the transaction information to be verified.

[0111] The segmentation module 12 is used to divide the transaction information to be verified obtained by the parsing module into blocks to obtain transaction information blocks;

[0112] The segmentation module is also used to obtain the first variable when segmenting the transaction information to be verified, and the first variable is used to record the number of transaction information blocks.

[0113] A storage module 13, configured to store the first key and the second key;

[0114] The first gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and device for authenticating the integrity of transaction information, the method comprising: a terminal device receives a transaction instruction sent by a host computer, parses the transaction instruction to obtain a first message verification code and transaction information to be verified; the transaction information to be verified is divided into blocks to obtain Transaction information block, generate a third key based on the first key, generate a fourth key based on the second key, generate a fourth key based on the transaction information block, the first key, the second key, the third key and the fourth key Perform calculations to generate authentication message verification codes; judge whether the authentication message verification code matches the first message verification code, if yes, the transaction information is complete, execute the transaction instruction, return the transaction result to the upper computer, and end; otherwise, the transaction information is incomplete, Refuse to execute the transaction order, return an error code to the host computer, and end. Therefore, in the process of calculating the verification code according to the transaction information to be verified, the transaction information to be verified is processed multiple times, and the important data in the transaction information is more secure during the verification process.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for authenticating the integrity of transaction information. Background technique [0002] With the development of information technology, people pay more and more attention to information security. For example, the upper computer and the terminal equipment encrypt the communication data and share the key to ensure information security, and the server guarantees information security by verifying the password authentication transmitted by the network client. , in the existing technology, the communication data in the communication process of the two parties generally involves important data, such as transaction amount, user name, password, etc., and these important data will be stored in the transaction information. Once the transaction information is illegally intercepted, it will be given to the user. interests bring security risks. Contents of the invention [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/3829G06Q20/401
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products