CN107301545B - Transaction verification method based on timestamp - Google Patents

Transaction verification method based on timestamp Download PDF

Info

Publication number
CN107301545B
CN107301545B CN201710245368.8A CN201710245368A CN107301545B CN 107301545 B CN107301545 B CN 107301545B CN 201710245368 A CN201710245368 A CN 201710245368A CN 107301545 B CN107301545 B CN 107301545B
Authority
CN
China
Prior art keywords
issuer
timestamp
operator
key
order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710245368.8A
Other languages
Chinese (zh)
Other versions
CN107301545A (en
Inventor
谢振东
苏浩伟
陈欢
温晓丽
袁勇
邹大毕
陈君
郭峰
宋秉麟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yang Cheng Tong Co ltd
Original Assignee
Guangzhou Yang Cheng Tong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yang Cheng Tong Co ltd filed Critical Guangzhou Yang Cheng Tong Co ltd
Priority to CN201710245368.8A priority Critical patent/CN107301545B/en
Publication of CN107301545A publication Critical patent/CN107301545A/en
Application granted granted Critical
Publication of CN107301545B publication Critical patent/CN107301545B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention discloses a transaction verification method based on a timestamp, which comprises the following steps: initializing a system, wherein an issuer acquires a system clock from an operator to complete time synchronization, the operator generates an operator timestamp master key, and the issuer generates an issuer timestamp master key; the operator timestamp sub-keys obtained by dispersing the operator timestamp master keys are issued to the issuer, and the user obtains the operator timestamp sub-keys and the issuer timestamp sub-keys obtained by dispersing the issuer timestamp master keys from the issuer; in the transaction process, a user operates to complete an order and submits the order to an operator, and the order is doubly encrypted by an operator timestamp sub-key and an account issuer timestamp sub-key; the operator verifies the order by using the operator timestamp master key, and submits the order to the issuer after the order passes; the issuer verifies the order with the issuer timestamp and completes the payment if passed. The invention can realize double verification and further improve the safety and the effectiveness of payment verification.

Description

Transaction verification method based on timestamp
Technical Field
The invention relates to the technical field of transaction verification, in particular to a transaction verification method based on a timestamp.
Background
With the development of mobile payment methods, higher requirements are put on the verification of payment. The payment verification requires safety and effectiveness, most verification methods at present adopt a unilateral verification method of an operator, the verification of an issuer is lacked, and the counterfeit transaction of the operator can cause the loss of the issuer.
Disclosure of Invention
The invention aims at the problems and provides a transaction verification method based on time stamps, which adopts a double time stamp mechanism, wherein one time stamp key is controlled by a terminal operator and is used for preventing duplication and retransmission, and the other time stamp key is controlled by an account issuer and is used for preventing the terminal operator from forging transactions.
In order to solve the above problems, the present invention intends to adopt the following technical solution, and a transaction verification method based on a timestamp includes the following steps:
1) initializing the system, acquiring a system clock from an operator by an issuer to complete time synchronization, generating an operator timestamp master key by the operator, and generating an issuer timestamp master key by the issuer;
2) the operator timestamp sub-keys obtained by dispersing the operator timestamp main keys are issued to the issuer, and the user obtains the operator timestamp sub-keys and the issuer timestamp sub-keys obtained by dispersing the issuer timestamp main keys from the issuer;
3) in the transaction process, the user operates to complete an order and submits the order to the operator, and the order is doubly encrypted by the operator timestamp sub-key and the account issuer timestamp sub-key;
4) the operator verifies the order by using the operator timestamp master key, and submits the order to the issuer after the order passes;
5) and the issuer verifies the order by using the issuer timestamp, and if the order passes, the payment is completed.
Furthermore, the operator timestamp master key is produced by two modes, one mode is that a random number key mode is adopted, and the operator generates a key corresponding to the date every day and sends the key down through a protocol; and secondly, a fixed key mode is adopted, and the key is stored in a security verification module arranged in an operator.
Further, the issuer timestamp master key is generated by a random number method, the issuer generates a root key corresponding to a date every day, and the root key is stored in the secure device of the issuer.
Further, the system clock is synchronously acquired by the operator server through the internet NTP.
Further, the transaction verification method adopts a two-dimensional code verification mode, and the operator timestamp sub-key and the account issuer timestamp sub-key serve as components of the two-dimensional code data.
The invention can realize double verification, further improve the safety and effectiveness of payment verification; meanwhile, the method can prevent an operator from forging the transaction order, so that the transaction order has non-repudiation.
Drawings
FIG. 1 is a schematic block diagram of transaction verification according to an embodiment of the present invention;
fig. 2 is a block diagram of MAC computation in accordance with an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the present invention provides a transaction verification method based on time stamp, which implements dual verification of an operator and an issuer, and includes the following steps:
1) initializing the system, acquiring a system clock from an operator by an issuer to complete time synchronization, generating an operator timestamp master key by the operator, and generating an issuer timestamp master key by the issuer;
2) the operator timestamp sub-keys obtained by dispersing the operator timestamp main keys are issued to the issuer, and the user obtains the operator timestamp sub-keys and the issuer timestamp sub-keys obtained by dispersing the issuer timestamp main keys from the issuer;
3) in the transaction process, the user operates to complete an order and submits the order to the operator, and the order is doubly encrypted by the operator timestamp sub-key and the account issuer timestamp sub-key;
4) the operator verifies the order by using the operator timestamp master key, and submits the order to the issuer after the order passes;
5) and the issuer verifies the order by using the issuer timestamp, and if the order passes, the payment is completed.
In a preferred embodiment, the cipher types of the operator timestamp master key and the issuer timestamp master key are both 16 byte 3DES keys. The operator timestamp master key adopts a random number key mode, and the operator generates a key corresponding to the date every day and sends the key down through a protocol; the issuer timestamp master key is generated by means of random numbers, the issuer generates a root key for each day, the root key being stored in the issuer's secure device.
Before transaction, a user firstly initiates an account application to an issuer, and applies for issuing a certificate through giving the user, wherein the certificate comprises user information and time information, a timestamp master key (an operator or the issuer) takes the user information and the time information as dispersion factors to obtain a timestamp subkey, and a specific algorithm is as follows: the timestamp master key takes 16 bytes obtained by adding the 8-byte dispersion factor and the negation value of the 8-byte dispersion factor to calculate 3des as a timestamp subkey.
In the transaction process, the user APP encrypts data by using the operator timestamp subkey and the issuer timestamp subkey to generate a two-dimensional code. The operator scans the two-dimensional code, verifies the timestamp of the operator, and generates an order and submits the order to the issuer after the verification is passed; and the issued order is subjected to issuer timestamp verification, and the order is completed if the verification is successful.
The verification method of the timestamp (operator or issuer) is that the timestamp sub-key calculates the MAC for the preset time and the verification data, such as the timestamp sub-key calculates the MAC for the certificate issuing date (4 bytes) + the two-dimensional code generation time (4 bytes) + the payment type (3 bytes).
The MAC calculation steps are as follows:
1. taking 8 16-system numbers 00,00,00,00,00,00,00 and 00 as initial values;
2. the authentication data needed to compute the MAC is divided into data blocks in units of 8 bytes, labeled D1, D2., Dn. The last data block Dn may be 1-8 bytes;
3. if the length of the last data block is 8, adding 16-system numbers 80,00,00,00, 00; if the last data block length is equal to 7, then add a 16-ary number 80; if the last data block is less than 7, adding a 16-system number 80, and repeatedly adding a 16-system number 00 until 8 bytes are reached;
4. encrypting the verification data with corresponding key, calculating by using 8-byte initial value and 8-byte initial value as shown in FIG. 2
Figure 828884DEST_PATH_IMAGE002
Carrying out XOR operation on the data blocks to obtain 8-byte data, and then encrypting the 8-byte data by utilizing a left half part DES (same as 8 bytes) of a 16-byte key; the resulting encrypted 8-byte data and
Figure 705573DEST_PATH_IMAGE004
carrying out XOR operation on the data blocks to obtain new 8-byte data, and then encrypting the new 8-byte data by utilizing the left half part DES of the 16-byte key; and so on until and
Figure 528036DEST_PATH_IMAGE006
carrying out exclusive or operation on the data blocks, and encrypting the finally obtained 8-byte data by using a 16-byte left half part DES; the encrypted 8-byte data is decrypted by using a 16-byte right half part DES (which is also 8 bytes) to obtain decrypted data (8 bytes); then, encrypting the decrypted data by using the left half part DES of the 16-byte key to obtain 8-byte encrypted data, and taking the first four bytes of the encrypted data as a result; and comparing the obtained result with the verification value, if the result is consistent with the verification value, the verification is successful, and otherwise, the verification fails.
The transaction verification method based on the timestamp can realize double verification and further improve the safety and the effectiveness of payment verification; meanwhile, the method can prevent an operator from forging the transaction order, so that the transaction order has non-repudiation.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention, and the scope of the present invention is not limited thereto, and any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (3)

1. A method for time stamp based transaction verification, comprising the steps of:
1) initializing the system, acquiring a system clock from an operator by an issuer to complete time synchronization, generating an operator timestamp master key by the operator, and generating an issuer timestamp master key by the issuer;
2) the operator timestamp sub-keys obtained by dispersing the operator timestamp main keys are issued to the issuer, and the user obtains the operator timestamp sub-keys and the issuer timestamp sub-keys obtained by dispersing the issuer timestamp main keys from the issuer;
3) in the transaction process, the user operates to complete an order and submits the order to the operator, and the order is doubly encrypted by the operator timestamp sub-key and the account issuer timestamp sub-key;
4) the operator verifies the order by using the operator timestamp master key, and submits the order to the issuer after the order passes;
5) the issuer verifies the order with the issuer timestamp, and payment is completed if the order passes;
the operator timestamp master key is produced by two modes, namely, a random number key mode is adopted, and the operator generates a key corresponding to the date every day and sends the key down through a protocol; secondly, a fixed key mode is adopted, and a key is stored in a security verification module arranged in an operator;
the issuer timestamp master key is generated by a random number mode, the issuer generates a root key corresponding to the date every day, and the root key is stored in the secure device of the issuer.
2. The timestamp based transaction verification method of claim 1, wherein said system clock is synchronously acquired by the operator server through the internet NTP.
3. A method as claimed in any one of claims 1 to 2, wherein the transaction verification method uses a two-dimensional code verification method, and the operator timestamp sub-key and the account issuer timestamp sub-key are part of the two-dimensional code data.
CN201710245368.8A 2017-04-14 2017-04-14 Transaction verification method based on timestamp Active CN107301545B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710245368.8A CN107301545B (en) 2017-04-14 2017-04-14 Transaction verification method based on timestamp

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710245368.8A CN107301545B (en) 2017-04-14 2017-04-14 Transaction verification method based on timestamp

Publications (2)

Publication Number Publication Date
CN107301545A CN107301545A (en) 2017-10-27
CN107301545B true CN107301545B (en) 2020-09-01

Family

ID=60137537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710245368.8A Active CN107301545B (en) 2017-04-14 2017-04-14 Transaction verification method based on timestamp

Country Status (1)

Country Link
CN (1) CN107301545B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654367B (en) * 2018-08-31 2023-05-12 创新先进技术有限公司 Method for cryptographic operation and creation of working key, cryptographic service platform and device
CN111160915B (en) * 2018-11-08 2024-01-09 腾讯科技(深圳)有限公司 Riding code verification method and device, traffic code scanning equipment and terminal equipment
CN112073188B (en) * 2020-08-31 2023-01-24 北京市商汤科技开发有限公司 Authentication method, device, equipment and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102842081A (en) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 Method for generating two-dimensional code and implementing mobile payment by mobile phone
CN103888264A (en) * 2014-04-08 2014-06-25 北京爱创科技股份有限公司 Inter-mobile-phone data transferring method based on background data exchange, terminal and system
CN105868981A (en) * 2016-04-11 2016-08-17 万集融合信息技术(北京)有限公司 Mobile payment method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10063374B2 (en) * 2015-05-31 2018-08-28 Massachusetts Institute Of Technology System and method for continuous authentication in internet of things

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102842081A (en) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 Method for generating two-dimensional code and implementing mobile payment by mobile phone
CN103888264A (en) * 2014-04-08 2014-06-25 北京爱创科技股份有限公司 Inter-mobile-phone data transferring method based on background data exchange, terminal and system
CN105868981A (en) * 2016-04-11 2016-08-17 万集融合信息技术(北京)有限公司 Mobile payment method and system

Also Published As

Publication number Publication date
CN107301545A (en) 2017-10-27

Similar Documents

Publication Publication Date Title
US11856104B2 (en) Methods for secure credential provisioning
US20220224551A1 (en) Mutual authentication of confidential communication
US9806889B2 (en) Key downloading method, management method, downloading management method, device and system
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
CN103729945B (en) A kind of method and system of secure download terminal master key
CN102307096B (en) Data cryption system for Pseudo-Rivest, Shamir and Adleman (RSA)-key-based recently public key cryptography algorithm
WO2019166001A1 (en) Token generation and verification method and smart terminal
WO2015161683A1 (en) Unified apk signing method and system thereof
CN101262341A (en) A mixed encryption method in session system
CN105553662A (en) Dynamic digital right management method and system based on identification password
CN107301545B (en) Transaction verification method based on timestamp
CN111526007B (en) Random number generation method and system
CN110969431A (en) Safe trusteeship method, equipment and system of block chain digital currency private key
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN110545169B (en) Block chain method and system based on asymmetric key pool and implicit certificate
CN114692218A (en) Electronic signature method, equipment and system for individual user
CN103905196A (en) PIN switch encryption method
CN112738051A (en) Data information encryption method, system and computer readable storage medium
CN101651538A (en) Method for safe transmission of data based on creditable password module
CN101808100B (en) Method and system for solving replay of remote update of information safety device
CN112737783B (en) Decryption method and device based on SM2 elliptic curve
CN114139177A (en) Token generation method, system and device
EP3185504A1 (en) Security management system for securing a communication between a remote server and an electronic device
CN112398647A (en) Consumable dynamic encryption method for channel distribution management
CN116886317B (en) Method, system and equipment for distributing secret key between server and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant