Method and device for protecting personal identification code

An identification code and field filling technology, applied in the field of information security, can solve problems such as personal identification code leakage, and achieve the effect of preventing leakage

Inactive Publication Date: 2018-10-30
FEITIAN TECHNOLOGIES
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the identity verification performed in the electronic transaction process has the following defects: during identity verification, the user enters the personal identification code on the terminal and then transmits it to the verification device for verification of the personal identification code, there is a risk of personal identification code leakage Risks, bringing opportunities for illegal theft of personal identification codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting personal identification code
  • Method and device for protecting personal identification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides a method for personal identification code protection, including:

[0032] Step S1, the device receives the plaintext personal identification code and encryption parameters, and determines the encryption mode according to the encryption parameters. When the encryption mode is the first encryption mode, execute step S2; when the encryption mode is the second encryption mode, execute step S3;

[0033] Step S2, the device sets the control field data to the first preset value, and uses the sixth preset value to organize the filling field data, organizes the plaintext data packet according to the control field data, the plaintext personal identification code and the filling field data, and uses the The account domain data performs the first preset processing on the plaintext data packet, and encrypts the processing result with the pre-stored encryption key to obtain the ciphertext data packet; sends the ciphertext data packet to the server;

[0034] S...

Embodiment 2

[0053] This embodiment provides a method for personal identification code protection, see figure 1 ,include:

[0054] Step 101, the device receives a plain text personal identification code and encryption parameters;

[0055] Specifically, in this embodiment, the clear text personal identification code received by the device is specifically 1234;

[0056] The encryption parameters include at least the encryption mode identifier; it also includes account domain data or data transmission format;

[0057] When the encryption mode is 01, the encryption parameters also include: account domain data; when the encryption mode is 03, the encryption parameters also include: data transmission format; when the encryption mode is 04, the encryption parameters also include: account domain Data; when the encryption mode is 05, the encryption parameters also include: account domain data;

[0058] Step 102, the device judges whether the plaintext personal identification code is legal, and i...

Embodiment 3

[0156] This embodiment provides a personal identification code protection device, see figure 2 ,include:

[0157] The receiving module 11 is used to receive plaintext personal identification codes and encryption parameters;

[0158] The first judging module 12 is configured to determine the encryption mode according to the encryption parameters received by the receiving module 11;

[0159] The first encryption mode module 13 includes:

[0160] The first control field data generating unit 131 is configured to set the control field data to a first preset value when the first judging module 12 determines that the encryption mode is the first encryption mode;

[0161] The first padding field data generating unit 132 is configured to use the sixth preset value to organize padding field data when the first judging module 12 determines that the encryption mode is the first encryption mode;

[0162] The first plaintext data packet generating unit 133 is configured to generate the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information safety, in particular to a method and device for protecting a personal identification code. The method comprises the steps that the device receives the plaintext personal identification code and determines an encryption mode, when the encryption mode is a first encryption mode, a sixth preset value is used for organizing filling domain data, according to control domain data, the plaintext personal identification code and the filling domain data, a plaintext data package is organized, account domain data in an encryption parameter is used for conducting first preset processing on the plaintext data package, and a prestored encryption key is used for encrypting a processing result to obtain a plaintext data package; the plaintext data packageis sent to a server; when the encryption mode is a second encryption mode, a random number is generated and used as filling domain data, according to the control domain data, the plaintext personal identification code and the filling domain data, a plaintext data package is organized, and a prestored encryption key is used for encrypting the plaintext data package to obtain a ciphertext data package; the ciphertext data package is sent to the server, and accordingly the personal identification code is safer during transmission.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for protecting a personal identification code. Background technique [0002] With the rapid development of electronic information technology, the use of financial cards for electronic transactions has become increasingly popular in daily life. In the prior art, in order to improve the security of electronic transactions, identity verification is required in the process of electronic transactions. Most of the existing identity verification methods are that the user of the financial card performs data interaction with the upper computer of the financial card (the upper computer can be used for transaction Terminal (for example, POS machine) input personal identification code, and personal identification code is transmitted to verification equipment for verification. [0003] In the prior art, the identity verification performed in the electronic transaction ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3226H04L63/0435H04L63/0442H04L63/205
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products