Unlock instant, AI-driven research and patent intelligence for your innovation.

Wired terminal to network controller encryption method

A technology of wired terminals and encryption methods, which is applied to electrical components, transmission systems, etc., can solve problems such as data leakage and data without encryption methods, and achieve the effect of increasing security performance

Inactive Publication Date: 2018-10-09
惠尔丰信息系统有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There is no relevant encryption method for the data passing through the telephone line in the existing financial transactions. When the lines are connected in parallel and eavesdropped, it is easy to cause data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wired terminal to network controller encryption method
  • Wired terminal to network controller encryption method
  • Wired terminal to network controller encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0026] the term:

[0027] TPDU: Transport Protocol Data Unit. Represents a message sent from one transport entity to another;

[0028] EDS: encryption definition part, part of TPDU, defines how to encrypt messages;

[0029] KIN: key index number, which is set by the acquirer for a terminal, so that each terminal has its own independent transaction key;

[0030] ID=70: Encrypted message;

[0031] ID=60: unencrypted or decrypted message.

[0032] refer to figure 1 Shown, a kind of encryption method from wired terminal to network controller, it comprises the following steps

[0033] 100. When starting the wired terminal, sign in the network controller and establish data interconnection, and pre-register several keys in the wired terminal.

[0034] Every time you start a wired terminal, you first need to sign in on the network controller to prevent the hardware and software of the wired terminal from being tampered with. During the sign-in process, the network controller and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a wired terminal to network controller encryption method, which comprises the steps that 1, the wired terminal signs in at the network controller and establishes data interconnection when being started, and a plurality of keys are inputted into the wired terminal in advance; 2, when a message is transmitted, one key is randomly selected to perform encryption on the message, and an encrypted definition including the key is generated; 3, a data stream including the encrypted definition and the encrypted message is transmitted to the network controller; and 4, the networkcontroller receives the data stream, recognizes the encrypted definition in the data stream and selects a corresponding key according to indication of the encrypted definition to decrypt the encrypted message. The wired terminal to network controller encryption method has a characteristic of ensuring the security of transaction data when the wired terminal is used for a transaction.

Description

technical field [0001] The invention relates to the field of electronic payment, in particular to an encryption method from a limited terminal to a network controller. Background technique [0002] There is no relevant encryption method for data passing through telephone lines in existing financial transactions, and it is easy to cause data leakage when the lines are connected in parallel and eavesdropped. Contents of the invention [0003] The purpose of the present invention is to provide an encryption method from a wired terminal to a network controller, which has the feature of ensuring the security of the data flow when the limited terminal trades. [0004] Above-mentioned purpose of the present invention is achieved through the following technical solutions: [0005] An encryption method from a wired terminal to a network controller, comprising the following steps [0006] Step 1. When starting the wired terminal, sign in the network controller and establish data i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/123
Inventor 王蔚
Owner 惠尔丰信息系统有限公司