Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for identifying integrity of transaction information

A technology for transaction information and integrity, which is applied in the field of information security and can solve problems such as hidden dangers of user interests and security.

Active Publication Date: 2018-10-02
FEITIAN TECHNOLOGIES
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of information technology, people pay more and more attention to information security. For example, the upper computer and the terminal equipment encrypt the communication data and share the key to ensure information security, and the server guarantees information security by verifying the password authentication transmitted by the network client. , in the existing technology, the communication data in the communication process of the two parties generally involves important data, such as transaction amount, user name, password, etc., and these important data will be stored in the transaction information. Once the transaction information is illegally intercepted, it will be given to the user. The interests of the security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying integrity of transaction information
  • Method for identifying integrity of transaction information
  • Method for identifying integrity of transaction information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] According to Embodiment 1 of the present invention, a method for identifying the integrity of transaction information is provided, such as figure 1 shown, including:

[0037] Step s101: the terminal device receives the transaction instruction sent by the host computer, analyzes the transaction instruction to obtain the first message verification code and the transaction information to be verified.

[0038] Step s102: the terminal device generates a third key according to the internally stored first key; generates a fourth key according to the internally stored second key;

[0039] Wherein, the first key and the second key are preset known keys;

[0040] Specifically, starting from the fourth bit group of the first key, every four bits are alternately complemented to obtain the third key, and starting from the fourth bit group of the second key, every four bits are alternately complemented to obtain Fourth key.

[0041] For example: the first key is 01 23 45 67 89AB C...

Embodiment 2

[0077] Embodiment 2 of the present invention provides a method for identifying the integrity of transaction information, such as image 3 shown, including:

[0078] Step s301: the terminal device receives the transaction instruction sent by the host computer, analyzes the transaction instruction to obtain the first message verification code and the transaction information to be verified.

[0079] Step s302: The terminal device judges whether the known key in its storage space meets the third preset condition, if yes, execute step s303; if not, repeat the splicing of the known key, and take the leftmost 16 bytes of data to the first Export key assignment, execute step s304;

[0080] Specifically, the terminal device judges whether the key in its storage space meets the third preset condition: judge whether the length of the known key is 16 bytes, if yes, perform step s303; if not, repeat the splicing of the known key , take the leftmost 16-byte data to assign a value to the f...

Embodiment 3

[0108] Embodiment 3 of the present invention provides a device for authenticating the integrity of transaction information, such as Figure 4 shown, including:

[0109] The receiving module 10 is used to receive the transaction instruction sent by the host computer;

[0110] The parsing module 11 is configured to parse the transaction instruction received by the receiving module to obtain the first message verification code and the transaction information to be verified.

[0111] The segmentation module 12 is used to divide the transaction information to be verified obtained by the parsing module into blocks to obtain transaction information blocks;

[0112] The segmentation module is also used to obtain the first variable when segmenting the transaction information to be verified, and the first variable is used to record the number of transaction information blocks.

[0113] A storage module 13, configured to store the first key and the second key;

[0114] The first gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for identifying integrity of transaction information. The method comprises steps that a terminal device receives a transaction instruction sent by a host and analyzing the transaction instruction so as to obtain a first information verification code and to-be-verified transaction information; blocking the to-be verified transaction information so as toobtain transaction information blocks, according to the first secret key, generating a third secret key, according to a second secret key, generating a fourth secret key, and according to the transaction information blocks, the first secret key, the second secret key, the third secret key and the fourth secret key, carrying out calculation so as to generate a transaction information code; judgingwhether the transaction information code matches the first information verification code, if yes, determining that the transaction information is complete, executing the transaction instruction and returning a transaction result to the host and finishing; or else, determining that the transaction information is not complete, rejecting execution of the transaction instruction, returning an error code to the host and finishing the execution. In this way, according to the to-be-verified transaction information, to-be-verified trade information is subjected to processing for many times in a calculation process of the verification code, the important data in the transaction information is quite safe in the verification process.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for authenticating the integrity of transaction information. Background technique [0002] With the development of information technology, people pay more and more attention to information security. For example, the upper computer and the terminal equipment encrypt the communication data and share the key to ensure information security, and the server guarantees information security by verifying the password authentication transmitted by the network client. , in the existing technology, the communication data in the communication process of the two parties generally involves important data, such as transaction amount, user name, password, etc., and these important data will be stored in the transaction information. Once the transaction information is illegally intercepted, it will be given to the user. interests bring security risks. Contents of the invention [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/3829G06Q20/401
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products