Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Unified Import Method of Card Encryption Data

A data and unified technology, applied in the direction of digital data protection, electronic digital data processing, other database retrieval, etc., can solve the problems of only opening, card encryption data leakage, difficult to unify format storage, etc., to improve security and realize Flexibility, the effect of reducing manual intervention factors

Active Publication Date: 2018-01-26
SHANGHAI HANDPAL INFORMATION TECH SERVICE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, when importing encrypted data from different suppliers into a unified encrypted database of an intermediary, there are often the following problems: First, the format parameters of encrypted data provided by different suppliers vary widely. It is difficult to save the card-encrypted data in a unified format in the card-encrypted database. When saving, it is usually necessary to analyze the card-encrypted data first, and then import the data into it
Moreover, in some cases, the supplier may modify the storage form of the card encryption data according to its own needs, which will cause the file format parameters given by the supplier to change each time. In this case, it is necessary to make corresponding code modifications on the storage side , or can only open the encrypted data, and write it as a general template module for import
In the above process, manual intervention is inevitable (such as opening the encrypted data, or writing a general template based on the encrypted data, etc.), so there is a risk of the encrypted data being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Unified Import Method of Card Encryption Data
  • A Unified Import Method of Card Encryption Data
  • A Unified Import Method of Card Encryption Data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] This embodiment provides a method for importing card-encrypted data based on a card-encrypted file provided by the same supplier. In this embodiment, corresponding identification templates are preformed and saved according to the card encryption files provided by different suppliers.

[0059] So-called recognition templates, which are used to indicate:

[0060] Where and in what form the serial number data is stored; and

[0061] The storage location and storage form of password data.

[0062] In this embodiment, a corresponding identification template is generated in advance according to the encrypted file provided by the supplier (it may be the first encrypted file provided by a new supplier).

[0063] The specific structure of the recognition template will be described in detail below.

[0064] The definition of storage location and storage form here is the same as the above explanation, and at the same time, the identification template can be used to indicate other...

Embodiment 2

[0075] In this embodiment, the above-mentioned unified import method is as follows figure 1 shown, including:

[0076] Step S1, obtaining the encrypted file provided by the supplier;

[0077] Step S2, select the identification template corresponding to the supplier according to the encrypted file;

[0078] Step S3: Identify the encrypted file according to the selected identification template to extract each piece of encrypted data included in the encrypted file, and save it in a encrypted database with a unified storage format, and then return to step S1.

[0079] In this example, if figure 2 As shown, step S1 specifically includes:

[0080] Step S11, using a first input unit to import the card-encrypted file package;

[0081] In this embodiment, the card-encrypted file is encapsulated in an encrypted card-encrypted file package, and the first input unit has a certain authority. For example, if the first input unit is used to log in to the system, a certain input authorit...

Embodiment 3

[0089] In this example, if figure 1 As shown, the above unified import method specifically includes:

[0090] Step S1, obtaining the encrypted file provided by the supplier;

[0091] Step S2, select the identification template corresponding to the supplier according to the encrypted file;

[0092] Step S3: Identify the encrypted file according to the selected identification template to extract each piece of encrypted data included in the encrypted file, and save it in a encrypted database with a unified storage format, and then return to step S1.

[0093] In this example, if image 3 As shown, the above step S3 specifically includes:

[0094] Step S31, matching a piece of unmatched card-encrypted data in the card-encrypted file with the selected identification template, and outputting a corresponding matching result;

[0095] In this embodiment, for a piece of card-encrypted data that has not been matched in the card-encrypted file, the selected corresponding identificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of software, in particular to a unified guiding-in method of card password data. The unified guiding-in method of the card password data specifically comprises the following steps of forming and storing corresponding recognition templates in advance according to card password files provided by different suppliers; acquiring the card password files provided by the supplies; selecting the recognition templates of the corresponding supplies according to the card password files; recognizing the card password files according to the selected recognition templates so as to extract card password data in the card password files; storing the card password data in a card password database with a unified storage format; and then returning the card password data. By the improved method, codes do not need to be corrected when data formats of new suppliers or the existing suppliers are changed, access operation can be finished by relevant templates manufactured according to data files, and the flexibility and the convenience are quite high.

Description

technical field [0001] The invention relates to the field of data import, in particular to a unified import method of card-encrypted data. Background technique [0002] In the prior art, when importing encrypted data from different suppliers into a unified encrypted database of an intermediary, there are often the following problems: First, the format parameters of encrypted data provided by different suppliers vary widely. It is difficult to save the card-encrypted data in a unified format in the card-encrypted database. When saving, it is usually necessary to analyze the card-encrypted data first, and then import the data in it. Moreover, in some cases, the supplier may modify the storage form of the card encryption data according to its own needs, which will cause the file format parameters given by the supplier to change each time. In this case, it is necessary to make corresponding code modifications on the storage side , or you can only open the encrypted data and wri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F17/30
CPCG06F16/90G06F21/6218G06F2221/2107G06F2221/2141
Inventor 鲍灵铭
Owner SHANGHAI HANDPAL INFORMATION TECH SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products