{"id":3875,"date":"2020-06-17T09:58:00","date_gmt":"2020-06-17T07:58:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=3875"},"modified":"2024-08-09T03:31:09","modified_gmt":"2024-08-09T01:31:09","slug":"atsec-morefun-kif-p2pe-v2-0","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/atsec-morefun-kif-p2pe-v2-0\/","title":{"rendered":"atsec\u4e2d\u56fd\u5b8c\u6210\u798f\u5efa\u9b54\u65b9KIF\u7684P2PE V2.0\u8bc4\u4f30\u548c\u9a8c\u8bc1"},"content":{"rendered":"\n

\u4e2d\u56fd\uff0c\u5317\u4eac<\/strong> – atsec\u4e2d\u56fd\u5f88\u8363\u5e78\u5730\u5ba3\u5e03\u57282020\u5e746\u6708\u5b8c\u6210\u4e86\u798f\u5efa\u9b54\u65b9\u7535\u5b50\u79d1\u6280\u6709\u9650\u516c\u53f8\uff08\u4ee5\u4e0b\u7b80\u79f0\u201cMorefun\u201d\uff09KIF\uff08Key Injection Facility\uff09\u7684P2PE\uff08Point-to-Point Encryption\uff09 v2.0\u5b89\u5168\u8bc4\u4f30\uff0c\u5e76\u83b7\u5f97\u4e86\u652f\u4ed8\u5361\u4ea7\u4e1a\u5b89\u5168\u6807\u51c6\u59d4\u5458\u4f1a\uff08PCI SSC\uff1aPayment Card Industry Security Standard Council\uff09\u7684\u9a8c\u8bc1\u3002<\/p>\n\n\n\n

\u6210\u529f\u7684\u8bc4\u4f30\u7ed3\u679c\u53d1\u5e03\u5728PCI SSC\u5b98\u65b9\u7f51\u7ad9\u7684P2PE\u7ec4\u4ef6\u5217\u8868\u4e0a\uff1a
https:\/\/www.pcisecuritystandards.org\/assessors_and_solutions\/point_to_point_encryption_components<\/a><\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

P2PE\u7684\u76ee\u6807\u662f\u63a8\u8fdbPCI\u8ba4\u53ef\u7684P2PE\u89e3\u51b3\u65b9\u6848\u7684\u5f00\u53d1\u3001\u8ba4\u53ef\u548c\u90e8\u7f72\u3002\u8be5\u65b9\u6848\u901a\u8fc7\u5bf9\u52a0\u5bc6\u73af\u5883\u4e2dPOS\u7ec8\u7aef\u6240\u83b7\u53d6\u7684\u6570\u636e\u8fdb\u884c\u52a0\u5bc6\uff0c\u63d0\u9ad8\u6301\u5361\u4eba\u6570\u636e\u7684\u5b89\u5168\u4fdd\u62a4\uff1b\u6301\u5361\u4eba\u6570\u636e\u5728\u9700\u8981\u7684\u65f6\u5019\u5728\u89e3\u5bc6\u73af\u5883\u901a\u8fc7\u89e3\u5bc6\u73af\u8282\u83b7\u53d6\uff0c\u4ece\u800c\u53ef\u4ee5\u6709\u6548\u7684\u5728\u4e24\u70b9\u4e4b\u95f4\u53bb\u9664\u660e\u6587\u5361\u53f7\u6570\u636e\u3002<\/p>\n\n\n\n

P2PE\u6807\u51c6\u88ab\u516c\u8ba4\u4e3aPCI\u4ea7\u4e1a\u5185\u590d\u6742\u5ea6\u8f83\u9ad8\u9700\u8981\u5f88\u5f3a\u6d4b\u8bc4\u80fd\u529b\u80cc\u666f\u7684\u6280\u672f\u6807\u51c6\uff0c\u5176\u4e2d\u6db5\u76d6\u548c\u5173\u8054\u4e86\u8bf8\u591aPCI\u4ee5\u53ca\u4fe1\u606f\u5b89\u5168\u4ea7\u4e1a\u6807\u51c6\uff0c\u5305\u62ec\u4f46\u4e0d\u9650\u4e8ePCI DSS\u3001PCI PA DSS\u3001PIN Security\uff0c\u4ee5\u53caPTS\u548cFIPS 140\u7b49\u3002PCI P2PE\u6807\u51c6\u516d\u4e2a\u9886\u57df\u5305\u62ec\uff1a
Domain 1\uff1a\u52a0\u5bc6\u8bbe\u5907\u548c\u5e94\u7528\u7ba1\u7406\uff08Encryption Device and Application Management\uff09Domain 2\uff1a\u5e94\u7528\u5b89\u5168\uff08Application Security\uff09Domain 3\uff1aP2PE\u89e3\u51b3\u65b9\u6848\u7ba1\u7406\uff08P2PE Solution Management\uff09Domain 4\uff1a\u5546\u6237\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1a\u5206\u79bb\u5546\u6237\u89e3\u5bc6\u548c\u52a0\u5bc6\u73af\u5883\uff08Merchant-Managed Solutions: Separation between Merchant Encryption and Decryption Environments\uff09Domain 5\uff1a\u89e3\u5bc6\u73af\u5883\uff08Decryption Environment\uff09Domain 6\uff1aP2PE\u5bc6\u94a5\u64cd\u4f5c\u548c\u8bbe\u5907\u7ba1\u7406\uff08P2PE Cryptographic Key Operations and Device Management\uff09<\/p>\n\n\n\n

\u5168\u7403\u7684\u5546\u6237\u548c\u6536\u5355\u673a\u6784\u5e94\u8be5\u6709\u6548\u5730\u91c7\u7528\u7ecf\u8fc7\u6d4b\u8bc4\u548c\u9a8c\u8bc1\u7684P2PE\u89e3\u51b3\u65b9\u6848\uff0c\u4f20\u7edf\u7684P2PE\u89e3\u51b3\u65b9\u6848\u53ef\u4ee5\u5e2e\u52a9\u7cbe\u7b80\u6301\u5361\u4eba\u6570\u636e\u73af\u5883\u4ee5\u53caPCI DSS\u8bc4\u4f30\u7684\u8303\u56f4\uff0c\u540c\u65f6\u8fdb\u4e00\u6b65\u63d0\u9ad8\u6574\u4f53\u5b89\u5168\u6c34\u5e73\u3002<\/p>\n\n\n\n

atsec\u4e2d\u56fd\u4f5c\u4e3aPCI QSA\u3001ASV\u3001QPA\u3001PA QSA\u3001P2PE\u30013DS assessor\u3001SSF assessor\u548cPFI\uff0c\u63d0\u4f9b\u5168\u9762\u7684\u670d\u52a1\uff0c\u8d21\u732e\u4e8e\u673a\u6784\u7684PCI\u5b89\u5168\u5408\u89c4\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"

\u4e2d\u56fd\uff0c\u5317\u4eac – atsec\u4e2d\u56fd\u5f88\u8363\u5e78\u5730\u5ba3\u5e03\u57282020\u5e746\u6708\u5b8c\u6210\u4e86\u798f\u5efa\u9b54\u65b9\u7535\u5b50\u79d1\u6280\u6709\u9650\u516c\u53f8 […]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[11],"tags":[],"_links":{"self":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/3875"}],"collection":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/comments?post=3875"}],"version-history":[{"count":1,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/3875\/revisions"}],"predecessor-version":[{"id":3880,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/3875\/revisions\/3880"}],"wp:attachment":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/media?parent=3875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/categories?post=3875"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/tags?post=3875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}