Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method of 8583 protocol

An encryption and decryption, protocol technology, applied in the field of encryption and decryption of the 8583 protocol, can solve problems such as sensitive information leakage, and achieve the effect of preventing sensitive information leakage

Active Publication Date: 2019-05-21
八维通科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims to solve the problem that the current 8583 protocol transmission may cause sensitive information leakage, and provides an encryption and decryption method of the 8583 protocol that can prevent the leakage of sensitive information by encrypting and decrypting the 8583 protocol data packets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] An encryption and decryption method of the 8583 protocol. The terminal adopting the 8583 protocol is equipped with a master secret key. When encrypting, the bitmap domain in the 8583 protocol data packet is first encrypted with DES using the master key as the key, and the encrypted data is used Replace the original bitmap field, and then encrypt and replace the 55 field data in the 8583 protocol data packet, and finally process the encrypted data in the 8583 protocol data packet into ciphertext; when decrypting, first reverse process the ciphertext to obtain the decrypted data , and then analyze the decrypted data to obtain the bitmap field, and use the master key to decrypt the bitmap field with DES to obtain the original bitmap field, and finally restore the encrypted 55 field data;

[0012] The process of encrypting and replacing the 55-field data in the 8583 protocol data packet is as follows: first, according to the 8583 standard, arrange all the tags appearing in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption method of a 8583 protocol. the terminal adopting the 8583 protocol is provided with a main secret key; The encryption method comprises the following steps: firstly, carrying out DES encryption on a bitmap domain in a 8583 protocol data packet by taking a main secret key as a secret key; the encrypted data is used for replacing an original bitmapdomain, then 55-domain data in the 8583 protocol data packet is encrypted and replaced, and finally the encrypted data in the 8583 protocol data packet is processed into a ciphertext; During decryption, firstly, a ciphertext is reversely processed to obtain decrypted data, secondly, the decrypted data is analyzed to obtain a bitmap domain, DES decryption is carried out on the bitmap domain by using a main key to obtain an original bitmap domain, and finally, the encrypted 55-domain data is restored. According to the method, the 8583 protocol data packet is encrypted and decrypted, and sensitive information can be prevented from being leaked in the information transmission process.

Description

technical field [0001] The invention relates to the technical field of network information communication encryption and decryption, in particular to an encryption and decryption method of the 8583 protocol. Background technique [0002] The 8583 protocol is a communication protocol based on the packet format of the ISO8583 international standard message. The 8583 packet consists of a maximum of 128 fields. Each field has a unified regulation and can be divided into fixed length and variable length. The first part of the 8583 package is a bitmap, which is the key to pack and unpack to determine the fields. basis of data. The 8583 protocol is mostly used in the development of POS machines. The 8583 protocol is an open protocol, and its format is open, so that anyone can analyze the 8583 data packet according to the public document, which may lead to sensitive information (such as merchant number, terminal number, bank card data, etc.) )Give way. [0003] At present, UnionP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
Inventor 夏俊杨宏旭陈刚方超
Owner 八维通科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products