Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

An operation request processing method and system

An operation request processing and operation request technology, which is applied in the field of information security, can solve the problems of limited application range of data transmission and invisible full ciphertext data transmission data, etc.

Active Publication Date: 2016-11-30
TENDYRON CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention aims to solve the problems of invisible data and limited application range of data transmission in full ciphertext data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An operation request processing method and system
  • An operation request processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0030] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for processing an operation request, wherein the method includes: after the background system server receives the operation request information, generates response information according to the first preset security level, and sends the response information to the network through the third-party system server The terminal; the network terminal generates feedback information according to the second preset security level after receiving the response information, and sends the feedback information to the background system server through the third-party system server; the background system server executes the operation request after receiving the feedback information. By classifying the confidentiality level of the data to be transmitted, the communication data can be made translucent, and part of the communication data can be transmitted in plain text. Under the premise of ensuring the absolute security of the data to be transmitted with the highest confidentiality level, it can also be transmitted at a lower and higher confidentiality level. Under the premise that the plaintext of the high-level data to be transmitted is visible, the integrity and security of the high-level confidentiality-level data to be transmitted is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an operation request processing method and system. Background technique [0002] The existing online business in the financial industry usually adopts the communication method of full ciphertext transmission to ensure the safe transaction between the bank background and the network terminal. [0003] The commonly used communication method is: the network terminal is connected to the bank processing center, and the handshake principle is used to establish an end-to-end logical security channel with the processing center. All communication data between the bank processing center and the security device is encrypted. The form of ciphertext + MAC is used to circulate on the physical channel to achieve the purpose of communication security. [0004] Among them, the network terminal may include security devices (for example: smart password devices, USB Key devices...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products