Encryption system adapted for various key types

An encryption system and key technology, which is applied in the field of key management system, can solve the problems of poor scalability of the chip card encryption system, poor transaction security, inability to adapt to various types of keys, etc., and achieve high transaction security and expansion good sex effect

Inactive Publication Date: 2021-03-26
湖南万慧通科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the encryption system of the chip card has poor scalability, cannot adapt to the needs of various types of keys, and has poor transaction security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption system adapted for various key types

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with specific embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them.

[0018] refer to figure 1 , an encryption system adapted to multiple key types provided by this scheme, including a server, a client and an encryption end based on Derived Unique Key Per Transaction, the encryption end is used to encrypt transactions between the server and the client .

[0019] The server, the server generates a key, and imports the Derived Unique Key Per Transaction application into the transaction card; the transaction card uses an on-chip COS system; the server generates an Initial PIN Encryption Key according to the Key Serial Number as a backup .

[0020] The client injects the Initial PIN Encryption Key into the terminal application, encrypts the personal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption system suitable for various key types. The system comprises a server, a client and an encryption terminal based on a Derived Unique Key Per Transaction. The encryption terminal is used for encrypting a transaction between the server and the client; the server is used for generating a secret key and importing a Derived Unique Key Per Transaction application into the transaction card; the server generates an Initial PIN Encryption Key secret key according to the Key Serial Number; the client injects an Initial PIN Encryption Key into a terminal application,encrypts a personal password PIN, encrypts sensitive data, decrypts the sensitive data, and finally calculates a value of transaction message legality verification data MAC, and the client is providedwith interfaces of Base Derivation Key, Initial PIN Encryption Key, Key Encryption Key and PIN Encryption Key key types. The system is good in expansibility, can meet the requirements of various secret keys, and is high in transaction safety.

Description

technical field [0001] The invention relates to the technical field of key management systems, in particular to an encryption system adapted to various key types. Background technique [0002] With the deepening of the information age, chips have gradually become the core of information products in various fields, ranging from communication satellites to common mobile phones, ID cards, bank cards, cars, and Internet of Things devices in daily life. In the digital age, information loss and leaks can become hidden dangers affecting personal, social and even national security at any time. The most important thing to ensure information security is to ensure the security of chips that are the core of information products. At present, the security chip industry has been listed as one of the national information security strategies. Under the vigorous promotion of the policy, a large number of security chips used in different fields and even different business scenarios have emerg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3823G06Q20/3829
Inventor 易红维
Owner 湖南万慧通科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products