Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, system and terminal in transaction process

A technology of data encryption and encryption, applied in the field of data security, can solve the problems of data leakage, data security, hidden dangers, etc., and achieve the effect of reducing the scope of assessment, reducing the workload and cost of security certification, and reducing the workload of development

Active Publication Date: 2020-12-18
PAX COMP TECH SHENZHEN
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a data encryption method, system and terminal in the transaction process, so as to solve the problems in the prior art that easily cause data leakage and hidden dangers of data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, system and terminal in transaction process
  • Data encryption method, system and terminal in transaction process
  • Data encryption method, system and terminal in transaction process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It shows an implementation process of a data encryption method in a transaction process provided by an embodiment of the present invention, and the subject of execution of the process in this embodiment may be a terminal, such as a POS terminal.

[0030] Such as figure 1 As shown, a data encryption method in a transaction process provided by an embodiment of the present invention includes:

[0031] In step S101, a white list and encryption parameters are initialized, and the white list is a list for configuring account data processing methods.

[0032] In this embodiment, after the whitelist is established and before the account data in the transaction card is processed, the process of initializing the whitelist (namely, the account data processing mode configuration list) and encryption parameters is completed. After the initialization is successful, step S102 can be executed to obtain the plaintext of the account data. If the initialization of the whitelis...

Embodiment 2

[0083] Such as image 3 As shown, the data encryption system 100 in the transaction process provided by an embodiment of the present invention is used to perform figure 1 The method step in the corresponding embodiment, it comprises:

[0084] The initialization module 110 is configured to initialize a white list and encryption parameters, the white list is a configuration list of account data processing methods.

[0085] The account data obtaining module 120 is configured to obtain the clear text of the account data in the transaction card after the initialization is successful.

[0086] The account data analysis module 130 is configured to analyze the plaintext of the account data, and select a corresponding target encryption method and target encryption parameters based on the white list and the encryption parameters.

[0087] The account data encryption module 140 is configured to desensitize the plaintext of the account data according to the target encryption method and ...

Embodiment 3

[0103] Figure 4 It is a schematic diagram of a terminal provided by an embodiment of the present invention. Such as Figure 4 As shown, the terminal 4 in this embodiment includes: a processor 40 , a memory 41 and a computer program 42 stored in the memory 41 and executable on the processor 40 . When the processor 40 executes the computer program 42, it realizes the steps in each embodiment as described in Embodiment 1, for example figure 1 Steps S101 to S105 are shown. Alternatively, when the processor 40 executes the computer program 42, it realizes the functions of each module / unit in each system embodiment as described in Embodiment 2, for example image 3 The functions of the modules 110 to 150 are shown.

[0104] The terminal 4 refers to a terminal with data processing capabilities, including but not limited to POS terminals, computers, workstations, and even smart phones with excellent performance, palmtop computers, tablet computers, personal digital assistants (PD...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption method, a system and a terminal in a transaction process, wherein the method comprises the following steps: initializing a whitelist and encryption parameters,wherein the whitelist is an account data processing mode configuration list. After the initialization is successful, the account data plaintext in the transaction card is obtained; Analyzing the plaintext of the account data, selecting a corresponding target encryption mode and a target encryption parameter based on the whitelist and the encryption parameter; According to the target encryption mode and the target encryption parameter, desensitizing the account data plaintext to obtain the account data ciphertext; The account data ciphertext and the related data information are sent to the background transaction processing system to complete the transaction. The invention can effectively reduce the range of the plaintext of the account data in the transaction link, can reduce the workloadof implementing the security measures in each link, and realizes the encryption processing of the account data in the terminal.

Description

technical field [0001] The invention belongs to the technical field of data security, and in particular relates to a data encryption method, system and terminal in a transaction process. Background technique [0002] POS terminal (point of sale) is a multi-functional terminal. It is installed in the special merchants and acceptance outlets of credit cards and connected with computers to form a network to realize automatic transfer of electronic funds. It has the functions of supporting consumption, pre-authorization, and balance inquiry. and transfer functions. [0003] In the current era of revolutionary innovation in payment, the online transaction business engaged in by the current third-party payment institutions has the advantages of convenience and speed, but with the explosive growth of the number of customers, there will be huge hidden financial risks. Network transmission is easy to be attacked by hackers, leading to data leakage and potential data security risks. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38G06Q20/34
CPCG06Q20/341G06Q20/3829
Inventor 李丽君
Owner PAX COMP TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products