Font Size: a A A

Research And Implementation Of Security Technology. Unionpay Network

Posted on:2007-09-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y LuanFull Text:PDF
GTID:2208360215985388Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the project of the financial information system, security designing is an important aspect. As a huge nationally financial information system, China UniPay System(CUPS) has high demands on security performance and covers greater security technology content. Nowadays, credit card holders are using their cards more than before with the improvement of social environment for credit card.The position of CUPS is rising and becoming more and more improtant. However, the risk of the card security is also increasing. In that case, how to ensure the safety and stabilization for the operation of CUPS relates to the stabilization of our country's finance industry.Hence, in this essay, the author will probe into the security technology and its application for CUPS with his experience in this industry.In this paper, we shall first briefly summarize the network architecture, communication, message structure and transaction processing of CUPS. At the same time we analyse the main security risk spot and security technology demands of CUPS in network , self-help equipment and card spheres. Improving in security of CUPS V2.0 standard is also in our analyzing.Combined with author's work experience there is a focus on introducing the security overall design about CUPS, Encryption techniques, Message Authentication techniques, IC card techniques application in CUPS and other security technology application in CUPS. This article includes three sections. Overall design is the first section including the base demand of security in CUPS, security designing goal and principle, security architecture and the main solution. Encryption's application and implement is in second section. It is about summarize of encryption,class of encryption lgorithm, management of key, encryption and decryption process of message, authenticating process of transaction information, interface designing of encryption machine and security technology application in IC card. It mainly discusses generating, distributing and real time exchanging the bank master key. It also includes encryption algorithm, the encrypted transferring process of important information in exchanging message, IC card password checking, authenticating process of transaction information and interface function of bank's encryption machine. In other security application, it introduces the network redundance configuration plan and network security techniques and configuration of CUPS, authentication between member bank and CUPS, checking out about the card's validity and transaction monitoring about abnormal card.In the above discuss we introduce the crucial technology in detail, including Design workflow and source code or interface function. Finally, it reviews and summarizes the work and puts forward the prospects...
Keywords/Search Tags:Information Security, Encryption, Message Authentication, Banking Card
PDF Full Text Request
Related items