CN114513297A - POS machine data encryption method and device - Google Patents

POS machine data encryption method and device Download PDF

Info

Publication number
CN114513297A
CN114513297A CN202210092812.8A CN202210092812A CN114513297A CN 114513297 A CN114513297 A CN 114513297A CN 202210092812 A CN202210092812 A CN 202210092812A CN 114513297 A CN114513297 A CN 114513297A
Authority
CN
China
Prior art keywords
data
key
pos machine
information
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210092812.8A
Other languages
Chinese (zh)
Inventor
刘利强
戴燎元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Guanzhang Technology Co ltd
Original Assignee
Hunan Guanzhang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Guanzhang Technology Co ltd filed Critical Hunan Guanzhang Technology Co ltd
Priority to CN202210092812.8A priority Critical patent/CN114513297A/en
Publication of CN114513297A publication Critical patent/CN114513297A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a POS machine data encryption method, which comprises the following steps: encrypting the transaction information and the identification information of the POS machine and sending the encrypted transaction information and the identification information to a Unionpay background management system, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data; the encryption method is based on an improved AES and RSA mixed algorithm, and the transaction data with high privacy degree of the POS machine is encrypted in an enhanced mode through the mixed algorithm combining the improved AES algorithm combined with the time stamp technology and the RSA algorithm for enhancing prime number judgment. The invention also provides a POS machine device. The invention improves the data encryption method of the POS machine, realizes the reduction of the data encryption time and complexity and ensures the security quality of encryption.

Description

POS machine data encryption method and device
Technical Field
The invention relates to the technical field of financial data encryption, in particular to a POS machine data encryption method and device.
Background
The POS machine is a sale terminal with a non-cash settlement function, and because the transaction of a bank card is involved, the POS machine has high requirements on the safety performance of the bank card, and important data in the POS machine must be ensured not to be stolen. The wireless POS realizes an efficient, quick and safe consumption mode, so that the use site of the POS is not limited by wired communication, the difficulty or impossible factor of card holding consumption is solved, and the card can be swiped for payment in any place with a mobile phone signal.
In the prior art, a data encryption mode of a POS machine generally adopts a DES or 3DES algorithm to encrypt data, and an international standard encryption algorithm 3DES is adopted to encrypt and protect sensitive data such as a user account number, a password and the like, so as to ensure the security of transaction data of a wireless POS system.
Therefore, the following problems exist in the prior art:
1. because the DES algorithm has short key length, the original DES password has strong key length easy to be cracked due to the enhancement of the computer operation capacity; the 3DES algorithm is designed to provide a relatively simple method of avoiding similar attacks by increasing the key length of DES, which is more secure than the original DES algorithm, but still has limited security performance.
2. The encryption transmission data by adopting other complex algorithms has low operation speed, influences the data transmission efficiency of the POS machine and limits the use of the POS machine.
Disclosure of Invention
Technical problem to be solved
In order to solve the technical problems, the invention provides a data encryption method and a data encryption device for a POS machine, wherein the data encryption safety is improved through an improved AES and RSA mixed algorithm, and the data transmission efficiency is ensured by selectively enhancing encryption on user information with high privacy degree, such as a user account and a password.
(II) technical scheme
In order to solve the technical problems and achieve the purpose of the invention, the invention is realized by the following technical scheme:
a POS machine data encryption method comprises the following steps:
s1, acquiring transaction information and identification information generated by the POS machine, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
s2, dividing the transaction information into two kinds of data information with high privacy and low privacy, and respectively storing the two kinds of data information into corresponding storage spaces; the information with high privacy comprises a user account and a password; the information with low privacy comprises merchant information, commodity data and time data;
s3, encrypting the two kinds of data information with high privacy and low privacy respectively, specifically: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and S4, sending the encrypted data and the identification information to the Unionpay background management system.
The improved AES and RSA mixing algorithm in step S3 is specifically:
and encrypting the AES key by using the RSA public key to obtain an encrypted key, and encrypting the data of the POS machine by combining the encrypted key with an improved AES algorithm.
The improved AES algorithm, specifically step S31, is:
s311, selecting encryption parameters: selecting a 128-bit key, selecting 10 encryption rounds, determining an initial key W [0, 3], and creating a new S box;
s312, key expansion: performing despreading according to the initial key to obtain a key required by each round, specifically generating a key W [ n ] related to time by using a timestamp; the key expansion method is as follows:
Figure BDA0003489836230000021
wherein, 43 is more than or equal to n and is an integer, t is a time stamp, the function g is composed of three parts, namely word circulation, byte substitution and round constant XOR:
(1) word circulation: 4 bytes in the key W [ n ] are circularly left-shifted by one byte;
(2) byte replacement: and carrying out byte substitution on the result of the first step by using an S box, wherein the byte substitution is the same as the byte substitution step in the encryption process.
(3) Round constant XOR: the result of the second step is xored with a round constant Rcon j, j representing the number of rounds. Rcon is implemented using a look-up table.
S313, performing round key addition operation on the plaintext S [0,15] to be encrypted and the initial key W [0, 3] to obtain an intermediate state matrix S1[0,15 ];
s314, carrying out byte substitution, row shifting, column confusion and round key addition operation on S1[0,15] in sequence, and repeating for 8 times to obtain an intermediate state matrix S2[0,15 ];
s315, carrying out byte substitution, row shifting and round key addition operations on the intermediate state matrix S2[0,15] in sequence to obtain an output ciphertext C [0,15 ].
Furthermore, in order to improve the operation speed, an M matrix is used for replacing a matrix in forward column confusion and reverse column confusion operation in the original AES algorithm, so that the time consumed by reverse column confusion operation is reduced, the forward column confusion operation and the reverse column confusion operation consume the same operation resources, and the problems of time consumption, non-coincidence encryption and decryption and the like are solved;
further, the column confusion matrix
Figure BDA0003489836230000022
The column obfuscation operation is specifically:
Figure BDA0003489836230000023
the matrix S is a state matrix;
the encryption of the AES key by the RSA algorithm can realize the effect of improving the security of the key, but can also increase the operation time, in order to further shorten the encryption time, the invention improves the RSA algorithm, and shortens the encryption time by the RSA algorithm for enhancing the prime number judgment.
The modified RSA algorithm specifically comprises step S32:
s321, random large number generation: randomly generating a group of large arrays N;
s322, large array screening: screening the large array N through a Kamichael special sum table;
s323, optimizing a Solovay-Strassen algorithm by utilizing a Montgomery rapid power algorithm;
s324, generating large prime numbers p and q: combining the steps S321-S323 and the enhanced prime number judgment algorithm to generate two large prime numbers p and q;
s325, RSA encryption AES key: inputting an AES key, and generating an RSA key by using two large prime numbers p and q to encrypt the AES key to generate an encrypted AES key.
The present invention also provides a POS device, which specifically includes:
the data generation module is used for generating transaction information and identification information, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
the data classification module is used for acquiring the transaction information and the identification information generated by the POS machine, dividing the transaction information into two kinds of data information, namely high privacy and low privacy, and storing the two kinds of data information into corresponding storage spaces respectively;
the data encryption module is used for encrypting two kinds of data information with high privacy and low privacy respectively, and specifically comprises the following steps: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and the data sending module is used for sending the encrypted data and the identification information to the Unionpay background management system.
In addition, to achieve the above object, the present invention also provides a computer readable storage medium having stored thereon POS data encryption program instructions executable by one or more processors to implement the steps of the POS data encryption method as described above.
(III) advantageous effects
Compared with the prior art, the invention has the beneficial effects that:
(1) the data with high privacy in the transaction data of the POS machine is encrypted in an original mode by selecting improved encryption, so that the encryption security is selectively improved, and the encryption complexity is controlled.
(2) By combining the time stamp AES algorithm, the time information of POS machine transaction data is utilized to improve the encryption algorithm, the safe updating and synchronization of the secret key are realized, and the problem of potential threat from a source node to a destination node is solved.
(3) By improving the matrix in the column confusion operation, the time consumed by the reverse column confusion operation is reduced, and the forward column confusion operation and the reverse column confusion operation consume the same operation resource.
(4) The complexity of the encryption time of the RSA is reduced through the RSA algorithm for enhancing the prime number judgment, and meanwhile, the encryption safety quality is not influenced.
Drawings
FIG. 1 is a flow chart of a POS transaction processing method provided by an embodiment of the invention;
FIG. 2 is a schematic diagram of a hybrid encryption method based on AES and RSA algorithms according to an embodiment of the present invention;
fig. 3 is a schematic diagram of generating a time-dependent key using a timestamp according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to explain the technical content of the present invention in detail, the purpose and technical effects achieved are explained in detail below with reference to the embodiments and the accompanying drawings.
Referring to fig. 1, the POS transaction processing method includes:
s1, acquiring transaction information and identification information generated by the POS machine, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
the transaction data comprises a plurality of categories, and if all data are encrypted by adopting a traditional encryption method, the transmission safety of the data with higher privacy is difficult to ensure; because the improved encryption method is complex and the arithmetic operation time is long, if the improved encryption method is used for encrypting all data, the problem of overlong encryption time is inevitably brought, and therefore, the following method is adopted for data encryption:
s2, dividing the transaction information into two kinds of data information with high privacy and low privacy, and respectively storing the two kinds of data information into corresponding storage spaces; the information with high privacy comprises a user account and a password; the information with low privacy comprises merchant information, commodity data and time data;
s3, encrypting the two kinds of data information with high privacy and low privacy respectively, specifically: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
the encryption mode can realize that data with higher privacy is encrypted more safely, meanwhile, the effectiveness of encryption time is considered, and a proper traditional encryption method is adopted for the data with lower privacy, so that the calculation resource and the calculation time are saved while the targeted data encryption is realized.
Step S3, encrypting the high-privacy data by using the improved AES and RSA mixture algorithm specifically includes: the AES key is encrypted by using the RSA public key to obtain an encrypted key, the data of the POS machine is encrypted by combining the encrypted key with an improved AES algorithm, and a mixed encryption method based on the AES and the RSA algorithm is briefly described in figure 2;
for the reason that the key of the traditional AES algorithm is relatively fixed and still the threat of brute force cracking cannot be avoided, the invention provides the method for generating the key related to time by utilizing the timestamp, thereby realizing the safe updating and synchronization of the key, being more suitable for solving the potential threat from a source node to a target node and improving the safety of the algorithm, and the specific implementation steps are as follows:
further, in step S31 of the modified AES algorithm, referring to fig. 3, a schematic diagram of generating a time-dependent key expansion by using a timestamp includes the following specific steps:
s311, selecting encryption parameters: selecting a 128-bit key, selecting 10 encryption rounds, determining an initial key W [0, 3], and creating a new S box;
s312, key expansion: according to the initial key de-expansion, the key needed by each round is obtained, in particular, the time-related key W is generated by utilizing the time stampn(ii) a The key expansion method is as follows:
Figure BDA0003489836230000041
wherein, 43 is more than or equal to n and is an integer, t is a time stamp, the function g is composed of three parts, namely word circulation, byte substitution and round constant XOR:
(1) word circulation: 4 bytes in the key W [ n ] are circularly left-shifted by one byte;
(2) byte replacement: and carrying out byte substitution on the result of the first step by using an S box, wherein the byte substitution is the same as the byte substitution step in the encryption process.
(3) The round constants XOR: the result of the second step is xored with a round constant Rcon j, j representing the number of rounds. Rcon is implemented using a look-up table.
S313, performing round key addition operation on plaintext S [0,15] to be encrypted and an initial key W [0, 3] to obtain an intermediate state matrix S1[0,15 ];
s314, carrying out byte substitution, row shifting, column confusion and round key addition operation on S1[0,15] in sequence, and repeating for 8 times to obtain an intermediate state matrix S2[0,15 ];
s315, carrying out byte substitution, row shifting and round key addition operations on the intermediate state matrix S2[0,15] in sequence to obtain an output ciphertext C [0,15 ].
Furthermore, in order to improve the operation speed, an M matrix is used for replacing a matrix in forward column confusion and reverse column confusion operation in the original AES algorithm, so that the time consumed by reverse column confusion operation is reduced, and the forward column confusion operation and the reverse column confusion operation consume the same operation resources; the method comprises the following steps of reducing the execution of XOR operation for both forward column confusion and reverse column confusion, and improving the operation speed by reducing the encryption time consumption and the decryption time consumption together, wherein the specific operations are as follows:
further, the air conditioner is provided with a fan,
Figure BDA0003489836230000042
the column obfuscation operation is specifically:
Figure BDA0003489836230000043
the encryption of the AES key by the RSA algorithm can achieve the effect of improving the security of the key, but also can increase the operation time, in order to further shorten the encryption time, the invention improves the RSA algorithm, and shortens the encryption time by the RSA algorithm for enhancing prime number judgment.
The modified RSA algorithm step S32 includes the following steps:
s321, random large number generation: randomly generating a group of large arrays N;
s322, large array screening: screening the large array N through a Kamichael special sum table;
s323, optimizing a Solovay-Strassen algorithm by utilizing a Montgomery rapid power algorithm;
s324, generating large prime numbers p and q: combining the steps S321-S323 and the enhanced prime number judgment algorithm to generate two large prime numbers p and q;
s325, RSA encryption AES key: inputting an AES key, and generating an RSA key by using two large prime numbers p and q to encrypt the AES key to generate an encrypted AES key.
The data with high privacy in the transaction data of the POS machine is encrypted in an original mode by selecting improved encryption, so that the encryption safety is selectively improved, and the encryption complexity is controlled; by combining the AES algorithm of the timestamp, the time information of the transaction data of the POS machine is utilized to improve the encryption algorithm, so that the safe updating and synchronization of the secret key are realized, and the potential threat from a source node to a destination node is solved; by improving the matrix in the column confusion operation, the time consumed by the reverse column confusion operation is reduced, so that the forward column confusion operation and the reverse column confusion operation consume the same operation resource; the complexity of the encryption time of the RSA is reduced through the RSA algorithm for enhancing the prime number judgment, and meanwhile, the encryption safety quality is not influenced.
And S4, sending the encrypted data and the identification information to the Unionpay background management system.
In the embodiment, the improved encryption algorithm is combined with the characteristics of the data to be encrypted, so that the transmission safety of the whole data is improved, the encryption time and the operation resources are effectively controlled, and the effective improvement of the conventional POS machine data encryption method is realized.
An embodiment of the present invention further provides a POS device, which specifically includes:
the data generation module is used for generating transaction information and identification information, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
the data classification module is used for acquiring the transaction information and the identification information generated by the POS machine, dividing the transaction information into two kinds of data information, namely high privacy and low privacy, and storing the two kinds of data information into corresponding storage spaces respectively;
the data encryption module is used for encrypting two kinds of data information with high privacy and low privacy respectively, and specifically comprises the following steps: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and the data sending module is used for sending the encrypted data and the identification information to the Unionpay background management system.
Furthermore, an embodiment of the present invention also provides a computer-readable storage medium, where the computer-readable storage medium stores POS data encryption program instructions, and the POS data encryption program instructions are executable by one or more processors to implement the steps of the POS data encryption method described above.
The above-mentioned embodiments are merely illustrative of the preferred embodiments of the present invention, and do not limit the scope of the present invention, and various modifications and improvements made to the technical solution of the present invention by those skilled in the art without departing from the spirit of the present invention shall fall within the protection scope defined by the claims of the present invention.

Claims (10)

1. A POS machine data encryption method is characterized by comprising the following steps:
s1, acquiring transaction information and identification information generated by the POS machine, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
s2, dividing the transaction information into two kinds of data information with high privacy and low privacy, and respectively storing the two kinds of data information into corresponding storage spaces;
s3, encrypting the two kinds of data information with high privacy and low privacy respectively, specifically: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and S4, sending the encrypted data and the identification information to the Unionpay background management system.
2. The data encryption method for the POS machine according to claim 1, wherein the step S3 of encrypting the high-privacy data by using the modified AES and RSA mixture algorithm specifically comprises: the method comprises the steps that an RSA public key is used for encrypting an AES key to obtain an encrypted key, and data of the POS machine are encrypted through the encrypted key and an improved AES algorithm;
the improved AES algorithm comprises the following specific steps:
s311, selecting encryption parameters: selecting a 128-bit key, selecting 10 encryption rounds, determining an initial key W [0, 3], and creating a new S box;
s312, key expansion: and obtaining the key needed by each round according to the initial key despreading, specifically generating a time-dependent key W [ n ] by using a time stamp.
3. The data encryption method of the POS machine according to claim 2, wherein the key expansion mode is as follows:
Figure FDA0003489836220000011
wherein, 43 is more than or equal to n and is an integer, t is a time stamp, the function g is composed of three parts, namely word circulation, byte substitution and round constant XOR:
word circulation: 4 bytes in the key W [ n ] are circularly left-shifted by one byte;
byte replacement: carrying out byte substitution on the result of the first step by using an S box, wherein the byte substitution is the same as the byte substitution in the encryption process;
round constant XOR: the result of the second step is xored with a round constant Rcon j, j representing the number of rounds, Rcon being implemented with a look-up table.
4. The POS machine data encryption method according to claim 3, wherein the step S3 further comprises:
s313, performing round key addition operation on plaintext S [0,15] to be encrypted and an initial key W [0, 3] to obtain an intermediate state matrix S1[0,15 ];
s314, carrying out byte substitution, row shifting, column confusion and round key addition operation on S1[0,15] in sequence, and repeating for 8 times to obtain an intermediate state matrix S2[0,15 ];
s315, the intermediate state matrix S2[0,15] obtained in the step S314 is subjected to byte substitution, row shifting and round key adding operation in sequence to obtain an output ciphertext C [0,15 ].
5. The POS machine data encryption method according to claim 1 or 3, wherein the forward column confusion operation matrix and the reverse column confusion operation matrix in the column confusion operation are equal.
6. The POS machine data encryption method according to claim 5, wherein the column obfuscation operation is specifically:
Figure FDA0003489836220000012
7. the POS machine data encryption method according to claim 3 or 6, wherein the modified RSA algorithm comprises the following specific steps:
s321, random large number generation: randomly generating a group of large arrays N;
s322, large array screening: screening the large array N through a Kamichael special sum table;
s323, optimizing a Solovay-Strassen algorithm by utilizing a Montgomery rapid power algorithm;
s324, generating large prime numbers p and q: combining the steps S321-S323 and the enhanced prime number judgment algorithm to generate two large prime numbers p and q;
s325, RSA encryption AES key: inputting an AES key, and generating an RSA key by using two large prime numbers p and q to encrypt the AES key to generate an encrypted AES key.
8. The POS machine data encryption method according to claim 1, wherein the information with high privacy comprises a user account number and a password; the information with low privacy comprises merchant information, commodity data and time data.
9. A POS device of the POS device data encryption method of any one of claims 1-8, wherein the device comprises:
the data generation module is used for generating transaction information and identification information, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
the data classification module is used for acquiring the transaction information and the identification information generated by the POS machine, dividing the transaction information into two kinds of data information, namely high privacy and low privacy, and storing the two kinds of data information into corresponding storage spaces respectively;
the data encryption module is used for encrypting two kinds of data information with high privacy and low privacy respectively, and specifically comprises the following steps: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and the data sending module is used for sending the encrypted data and the identification information to the Unionpay background management system.
10. A computer readable storage medium having stored thereon POS data encryption program instructions executable by one or more processors to perform the steps of the POS data encryption method of any one of claims 1-8.
CN202210092812.8A 2022-01-26 2022-01-26 POS machine data encryption method and device Pending CN114513297A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210092812.8A CN114513297A (en) 2022-01-26 2022-01-26 POS machine data encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210092812.8A CN114513297A (en) 2022-01-26 2022-01-26 POS machine data encryption method and device

Publications (1)

Publication Number Publication Date
CN114513297A true CN114513297A (en) 2022-05-17

Family

ID=81549189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210092812.8A Pending CN114513297A (en) 2022-01-26 2022-01-26 POS machine data encryption method and device

Country Status (1)

Country Link
CN (1) CN114513297A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115760126A (en) * 2023-01-10 2023-03-07 北京厚方科技有限公司 Financial transaction information encryption method
CN116361840A (en) * 2023-06-02 2023-06-30 深圳市力博实业有限公司 Bank self-service equipment data security management system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115760126A (en) * 2023-01-10 2023-03-07 北京厚方科技有限公司 Financial transaction information encryption method
CN116361840A (en) * 2023-06-02 2023-06-30 深圳市力博实业有限公司 Bank self-service equipment data security management system

Similar Documents

Publication Publication Date Title
Wang et al. Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map
US6125185A (en) System and method for encryption key generation
EP1440535B1 (en) Memory encrytion system and method
CN114513297A (en) POS machine data encryption method and device
JPH10511778A (en) Method of executing a communication protocol between two processing devices using a secret key
Thangavel et al. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
CN107078904A (en) Mixed cipher key is exported
CN102904712A (en) Information encrypting method
Song et al. A fast parallel batch image encryption algorithm using intrinsic properties of chaos
Bashir et al. A novel gray scale image encryption scheme based on pixels’ swapping operations
Alarood et al. IES: Hyper-chaotic plain image encryption scheme using improved shuffled confusion-diffusion
CN107491317A (en) A kind of symmetrical encryption and decryption method and systems of AES for accelerating platform based on isomery
US8619985B2 (en) Table splitting for cryptographic processes
CN106651734A (en) Binary two-dimensional code image encryption and decryption method and device
Abd El-Wahed et al. Efficiency and security of some image encryption algorithms
CN107425971A (en) Terminal and its data method for encryption/decryption and device without certificate
Vyakaranal et al. Performance analysis of symmetric key cryptographic algorithms
Majumdar et al. A novel DNA-inspired encryption strategy for concealing cloud storage
Zhou et al. Implementation of cryptographic algorithm in dynamic QR code payment system and its performance
Ahmad et al. A secure network communication protocol based on text to barcode encryption algorithm
Shoukat et al. A survey about latest trends and research issues of cryptographic elements
Zinabu et al. Enhanced efficiency of advanced encryption standard (EE-AES) algorithm
Thangapalani et al. Securing Medical Image Transmission using Memetic Algorithm
Abusukhon et al. Analyzing the efficiency of Text-to-Image encryption algorithm
Kar et al. An improved data security using DNA sequencing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination