银行pin加密整个过程范文模板 18页.docx
- 文档编号:5377966
- 上传时间:2022-12-15
- 格式:DOCX
- 页数:12
- 大小:20.93KB
银行pin加密整个过程范文模板 18页.docx
《银行pin加密整个过程范文模板 18页.docx》由会员分享,可在线阅读,更多相关《银行pin加密整个过程范文模板 18页.docx(12页珍藏版)》请在冰豆网上搜索。
银行pin加密整个过程范文模板18页
本文部分内容来自网络整理,本司不为其真实性负责,如有异议或侵权请及时联系,本司将立即删除!
==本文为word格式,下载后可方便编辑和修改!
==
银行pin加密整个过程
篇一:
银行整体安全设计
**商业银行整体安全设计
201X年7月
范福胜
1
2
3术语.....................................................................................................................................................................5概述.....................................................................................................................................................................6整体安全目标.....................................................................................................................................................7
3.1
3.2
3.3
3.4
3.5
4用户密码处理全过程加密..........................................................................................................................7集中安全管理..............................................................................................................................................7加密设备集中管理......................................................................................................................................7安全功能接口标准统一..............................................................................................................................8提高管理效率..............................................................................................................................................8全行安全系统框架.............................................................................................................................................9
4.1
4.2全行安全系统架构......................................................................................................................................9安全系统架构说明......................................................................................................................................9
5数据安全设计...................................................................................................................................................11
5.1
5.2
5.3
5.4
5.5
5.6分段设计....................................................................................................................................................11传输段的安全设计....................................................................................................................................11PIN加密传输的实现.................................................................................................................................12密钥设计....................................................................................................................................................12安全传输选用的算法................................................................................................................................12PIN存储安全设计.....................................................................................................................................13
5.6.1
5.6.2
5.6.3
5.6.4
5.7依据账户类型设计............................................................................................................................13密钥设计............................................................................................................................................13安全处理流程....................................................................................................................................13PIN的存储算法................................................................................................................................14CVV安全生成验证设计...........................................................................................................................14
5.7.1
5.7.2
5.7.3依据卡类型设计................................................................................................................................14密钥设计............................................................................................................................................14安全处理流程....................................................................................................................................14
5.8
5.9
6密码信封的批量打印................................................................................................................................15密码迁移....................................................................................................................................................15节点密钥设计...................................................................................................................................................16
6.1
6.2
6.3
6.4
6.5密钥关系图................................................................................................................................................16核心系统....................................................................................................................................................16第三方机构................................................................................................................................................16ATM设备...................................................................................................................................................17柜面............................................................................................................................................................17
7业务信息流加密过程.......................................................................................................................................18
7.1用户密码流................................................................................................................................................18
7.1.1
7.1.2
7.1.3
7.2
8柜面业务密码....................................................................................................................................18ATM业务密码...................................................................................................................................19第三方机构密码................................................................................................................................20报文安全控制流........................................................................................................................................21柜面密码键盘初始化和启用过程...................................................................................................................22
8.1
8.2
8.3
8.4密码键盘初始化过程图示........................................................................................................................22密码键盘初始化过程说明........................................................................................................................23密码键盘启用过程说明............................................................................................................................23密码键盘编码说明....................................................................................................................................23
9网点柜面ZMK的更新过程............................................................................................................................24
9.1
9.2
9.3ZMK的更新过程流程图示......................................................................................................................24ZMK的更新过程流程图示说明..............................................................................................................25ZMK更新启发机制..................................................................................................................................25
10网点柜面ZPK更新.........................................................................................................................................26
柜面ZPK更新图示..............................................................................................................................2610.1
10.2ZPK密钥下载更新过程说明....................................................................................................................26
11CVV迁移.........................................................................................................................................................28
标准CVV算法.....................................................................................................................................28
非标准CVV算法.................................................................................................................................2811.111.2
12一机一密改造...................................................................................................................................................29
终端初始化方案....................................................................................................................................2912.1
13密码服务平台配置和接口...............................................................................................................................30
设备配置................................................................................................................................................30
实施周期................................................................................................................................................30
提交开发接口库....................................................................................................................................30
提交的接口功能....................................................................................................................................31
其它专用接口........................................................................................................................................3113.113.213.313.413.5
14实施步骤和建议...............................................................................................................................................32
综合前置系统................................................................
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 银行pin加密整个过程范文模板 18页 银行 pin 加密 整个过程 范文 模板 18