CN107609870A - More application key management method, system and POS terminals for POS - Google Patents
More application key management method, system and POS terminals for POS Download PDFInfo
- Publication number
- CN107609870A CN107609870A CN201710783531.6A CN201710783531A CN107609870A CN 107609870 A CN107609870 A CN 107609870A CN 201710783531 A CN201710783531 A CN 201710783531A CN 107609870 A CN107609870 A CN 107609870A
- Authority
- CN
- China
- Prior art keywords
- key
- pos
- financial transaction
- list
- apply
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
The invention discloses a kind of more application key management method, system and POS terminals for POS, wherein method includes S1:POS security service programs create SQLite database key files in POS terminal;S2:It is key list corresponding to each financial transaction application creates in the SQLite database keys file, for storing one or more keys of financial transaction application;S3:After financial transaction application call cipher key operation interface, security service program obtains the application name of the financial transaction application, and as the key table name of current operation, operation is performed to the key list.By the above-mentioned means, the present invention can realize the Key-insulated applied more, flexible management key, autgmentability is strong.
Description
Technical field
The present invention relates to POS security technology areas, more particularly, to a kind of more application key management methods for POS,
System and POS terminal.
Background technology
In recent years, increasing Third-party payment mechanism has been added to the receipts list business of POS terminal, supports Android
Also in promoting the use of step by step, POS terminal additionally provides perhaps the intelligent POS of system in addition to providing traditional receipts single function
More abundant value-added service, such as prepaid card is accepted, reward voucher management, integration managing and client information management.As can be seen here,
POS terminal must be able to support more application functions, to realize the various application demands of trade company.And POS more application demands certainly will be wanted
Ask POS to support the key management applied more, that is, realize the Key-insulated of each application, an application can not access another should
Key, to prevent sensitive information from leaking.
For applying key management more, in the prior art, some by it is different using different cipher key index come
Realize, this method there are many constraints to application, is not easy to extend;The more applications having are by creating multiple key files come real
It is existing, a key file, such a method are uniquely specified using application name+Key Tpe+cipher key index as key file name
Although more flexible, the problem of new is brought, i.e., manages key by way of file system, it is necessary to consider key power down
The design of protection, in addition, the lookup of key and renewal speed are slower, it have impact on POS performances and Consumer's Experience.
The content of the invention
The technical problems to be solved by the invention are:There is provided it is a kind of for POS more application key management methods, system and
POS terminal, the Key-insulated of more applications can be achieved, flexible management key, autgmentability is strong, and can lift inquiry, renewal efficiency.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:It is close to provide a kind of more applications for POS
Key management method, including at least following steps:
S1:POS security service programs create SQLite database key files in POS terminal;
S2:It is key list corresponding to each financial transaction application creates in the SQLite database keys file, uses
In the one or more keys for storing financial transaction application;
S3:After financial transaction application call cipher key operation interface, security service program obtains the financial transaction application
Application name, and as the key table name of current operation, operation is performed to the key list.
Wherein, the title of the key list is consistent with corresponding financial transaction Apply Names.
Wherein, the key is stored in the form of key data record in the key list, and the key data record includes key rope
Draw, the MAC check values of key code system, Key Tpe, key length, ciphertext cipher key content and counterpart keys record.
Wherein, the key list performs inquiry, renewal and the additions and deletions operation of key data record by standard SQL language.
In order to solve the above technical problems, the present invention also provide it is a kind of apply key management system for POS more, including:
File creation module, SQLite database key files are created in POS terminal for POS security service programs;And
Table creation module, for being that each financial transaction application establishment is corresponding in the SQLite database keys file
Key list, for store the financial transaction application one or more keys;
Execution module, for after financial transaction application call cipher key operation interface, security service program to obtain the gold
Melt the application name of transaction application, and as the key table name of current operation, operation is performed to the key list.
Wherein, the title of the key list is consistent with corresponding financial transaction Apply Names.
Wherein, the key is stored in the form of key data record in the key list, and the key data record includes key rope
Draw, the MAC check values of key code system, Key Tpe, key length, ciphertext cipher key content and counterpart keys record.
Wherein, the key list performs inquiry, renewal and the additions and deletions operation of key data record by standard SQL language.
To solve the above problems, the present invention also provides a kind of POS terminal, including more applications for POS described above
Key management system.
The beneficial effects of the present invention are:Prior art is different from, POS security service programs of the present invention are created in POS terminal
SQLite database key files are built, and are in this document key list corresponding to each financial transaction application establishment, for depositing
Store up one or more keys of financial transaction application.Because each financial transaction application only corresponds to unique key list, therefore
The Key-insulateds of the achievable more applications of the present invention, flexible management key, autgmentability are strong.
Brief description of the drawings
Fig. 1 is more schematic flow sheets using key management method that the present invention is used for POS;
Fig. 2 is the management system schematic diagram of the specific embodiment of the invention.
Embodiment
To describe the technology contents of the present invention, the objects and the effects in detail, below in conjunction with embodiment and coordinate attached
Figure is explained.
First it should be noted that the advantage of SQLite databases is a lot, as code is increased income, EMS memory occupation amount is small, inquiry
Efficiency high, support view, support that concurrently reading, transaction operation are atoms, i.e., being collapsed suddenly in system or event occurs suddenly in power supply
When barrier, the integrality of data is can guarantee that, this is particularly important to key management.The advantages of being based on the above, it is of the invention
Technical scheme employs SQLite databases to realize the key management applied more.
Fig. 1 is refer to, present invention offer is a kind of to apply key management method more for POS, including at least following steps:
S1:POS security service programs create SQLite database key files in POS terminal;
S2:It is key list corresponding to each financial transaction application creates in the SQLite database keys file, uses
In the one or more keys for storing financial transaction application;
S3:After financial transaction application call cipher key operation interface, security service program obtains the financial transaction application
Application name, and as the key table name of current operation, operation is performed to the key list.
Prior art is different from, POS security service programs of the present invention create SQLite database keys text in POS terminal
Part, and be in this document key list corresponding to each financial transaction application establishment, for storing the one of financial transaction application
Individual or multiple keys.Because each financial transaction application only corresponds to unique key list, and therefore apply can be achieved in the present invention more
Key-insulated, flexible management key, autgmentability is strong.
Wherein, the title of the key list is consistent with corresponding financial transaction Apply Names.
Wherein, the key is stored in the form of key data record in the key list, and the key data record includes key rope
Draw, the MAC check values of key code system, Key Tpe, key length, ciphertext cipher key content and counterpart keys record.
Wherein, the key list performs inquiry, renewal and the additions and deletions operation of key data record by standard SQL language.
Accordingly, the present invention also provide it is a kind of apply key management system for POS more, including:
File creation module, SQLite database key files are created in POS terminal for POS security service programs;And
Table creation module, for being that each financial transaction application establishment is corresponding in the SQLite database keys file
Key list, for store the financial transaction application one or more keys;
Execution module, for after financial transaction application call cipher key operation interface, security service program to obtain the gold
Melt the application name of transaction application, and as the key table name of current operation, operation is performed to the key list.
Wherein, the title of the key list is consistent with corresponding financial transaction Apply Names.
Wherein, the key is stored in the form of key data record in the key list, and the key data record includes key rope
Draw, the MAC check values of key code system, Key Tpe, key length, ciphertext cipher key content and counterpart keys record.
Wherein, the key list performs inquiry, renewal and the additions and deletions operation of key data record by standard SQL language.
Using the above method, the present invention also provides a kind of POS terminal, including more applications for POS described above are close
Key management system.
As shown in Fig. 2 in a specific embodiment, every POS terminal of the present invention all contains one specially
For storing the SQLite database files of key, multiple key lists are contained in this database file, each application corresponding one
It is individual to contain some key data records in key list uniquely with application name identical key list, a record just corresponding one it is close
Key, include the MAC of cipher key index, key code system, Key Tpe, key length, ciphertext cipher key content and this key data record
Check value.
Each financial transaction application program of POS terminal has a unique application name, and financial transaction application program is led to
Cross the interface for calling security service program to provide and operate key.In financial transaction application call cipher key operation interface,
Security service program can first obtain the application name of this application program, then be used as the key list currently to be operated using this application name
Name, then this key list is inquired about, updated, the operation such as additions and deletions.As can be seen here, any one application in POS terminal
Energy accesses and its application name identical key list, can not access the key list of other application, thereby ensure that between applying more
Key-insulated.The operations such as the inquiry of key, renewal, additions and deletions are realized by the sql like language of standard, are thereby ensured that quick
Inquiry and more new key exactly.
POS is as follows more using the specific implementation flow of key management based on SQLite:
1. create SQLite database key files:That is during every POS terminal initialization, POS security service program is all
Can be that it creates a SQLite database key file, for depositing all financial transaction keys of the POS terminal.
2. key list is applied in establishment:After POS terminal is mounted with financial transaction application, it is also necessary to download finance by receipts single file and hand over
Key used in easily, POS terminal could be used for financial transaction.POS security service program is in SQLite database keys text
It is that each application creates unique key list in part, for depositing key used in each application, key table name is equal to application
Name.Often increase a financial transaction application, POS security service program will increase one newly in SQLite database key files
Individual key list.
3. key list is applied in operation:One financial transaction application can include multiple keys, and each key is close with one
Key record storage is in key list corresponding to application, by cipher key index come query key and more new key.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalents that bright specification and accompanying drawing content are made, or the technical field of correlation is directly or indirectly used in, similarly include
In the scope of patent protection of the present invention.
Claims (9)
1. a kind of apply key management method more for POS, it is characterised in that including at least following steps:
S1:POS security service programs create SQLite database key files in POS terminal;
S2:It is key list corresponding to each financial transaction application creates in the SQLite database keys file, for depositing
Store up one or more keys of financial transaction application;
S3:After financial transaction application call cipher key operation interface, security service program obtains the application of the financial transaction application
Name, and as the key table name of current operation, operation is performed to the key list.
2. apply key management method for POS according to claim 1, it is characterised in that the name of the key list more
Claim consistent with corresponding financial transaction Apply Names.
3. apply key management method for POS according to claim 1, it is characterised in that the key is with key more
Record form is stored in the key list, and the key data record includes cipher key index, key code system, Key Tpe, key length
The MAC check values of degree, ciphertext cipher key content and counterpart keys record.
4. apply key management method for POS according to claim 3, it is characterised in that the key list passes through more
Standard SQL language performs inquiry, renewal and the additions and deletions operation of key data record.
5. a kind of apply key management system more for POS, it is characterised in that including:
File creation module, SQLite database key files are created in POS terminal for POS security service programs;And
Table creation module, for be in the SQLite database keys file corresponding to each financial transaction application creates it is close
Key table, for storing one or more keys of financial transaction application;
Execution module, for after financial transaction application call cipher key operation interface, security service program to obtain the finance and handed over
The application name easily applied, and as the key table name of current operation, operation is performed to the key list.
6. apply key management system for POS according to claim 5, it is characterised in that the name of the key list more
Claim consistent with corresponding financial transaction Apply Names.
7. apply key management system for POS according to claim 5, it is characterised in that the key is with key more
Record form is stored in the key list, and the key data record includes cipher key index, key code system, Key Tpe, key length
The MAC check values of degree, ciphertext cipher key content and counterpart keys record.
8. apply key management system for POS according to claim 7, it is characterised in that the key list passes through more
Standard SQL language performs inquiry, renewal and the additions and deletions operation of key data record.
9. a kind of POS terminal, it is characterised in that including applying key for POS described in any one of claim 5~7 more
Management system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710783531.6A CN107609870B (en) | 2017-09-02 | 2017-09-02 | Multi-application key management method and system for POS (point of sale) and POS terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710783531.6A CN107609870B (en) | 2017-09-02 | 2017-09-02 | Multi-application key management method and system for POS (point of sale) and POS terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107609870A true CN107609870A (en) | 2018-01-19 |
CN107609870B CN107609870B (en) | 2023-05-30 |
Family
ID=61057220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710783531.6A Active CN107609870B (en) | 2017-09-02 | 2017-09-02 | Multi-application key management method and system for POS (point of sale) and POS terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107609870B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109639419A (en) * | 2018-12-29 | 2019-04-16 | 北京深思数盾科技股份有限公司 | Cryptographic key protection method, cipher key storage device and terminal device |
WO2020011100A1 (en) * | 2018-07-12 | 2020-01-16 | 百富计算机技术(深圳)有限公司 | Key access method, key management method, storage medium, and computer device |
CN112235102A (en) * | 2020-09-29 | 2021-01-15 | 北京智芯微电子科技有限公司 | Hybrid key storage and management method and storage device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103490878A (en) * | 2013-10-15 | 2014-01-01 | 上海杉德金卡信息系统科技有限公司 | Methods for dynamic secret key storing and stored secret key reading and deleting |
CN103595730A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Ciphertext cloud storage method and system |
US20150363478A1 (en) * | 2008-07-11 | 2015-12-17 | Michael N. Haynes | Systems, Devices, and/or Methods for Managing Data |
CN105718539A (en) * | 2016-01-18 | 2016-06-29 | 浪潮通用软件有限公司 | Database application method and apparatus |
WO2016197222A2 (en) * | 2015-06-11 | 2016-12-15 | Muxi Tecnologia Em Pagamentos S.A. | Point of sale apparatuses, methods and systems |
-
2017
- 2017-09-02 CN CN201710783531.6A patent/CN107609870B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150363478A1 (en) * | 2008-07-11 | 2015-12-17 | Michael N. Haynes | Systems, Devices, and/or Methods for Managing Data |
CN103490878A (en) * | 2013-10-15 | 2014-01-01 | 上海杉德金卡信息系统科技有限公司 | Methods for dynamic secret key storing and stored secret key reading and deleting |
CN103595730A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Ciphertext cloud storage method and system |
WO2016197222A2 (en) * | 2015-06-11 | 2016-12-15 | Muxi Tecnologia Em Pagamentos S.A. | Point of sale apparatuses, methods and systems |
CN105718539A (en) * | 2016-01-18 | 2016-06-29 | 浪潮通用软件有限公司 | Database application method and apparatus |
Non-Patent Citations (2)
Title |
---|
李俊凤: "SQLite数据库在嵌入式中间件系统中的应用", 《计算机与现代化》 * |
陈睿: "加密数据库系统的密钥管理", 《计算机与信息技术》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020011100A1 (en) * | 2018-07-12 | 2020-01-16 | 百富计算机技术(深圳)有限公司 | Key access method, key management method, storage medium, and computer device |
CN109639419A (en) * | 2018-12-29 | 2019-04-16 | 北京深思数盾科技股份有限公司 | Cryptographic key protection method, cipher key storage device and terminal device |
CN112235102A (en) * | 2020-09-29 | 2021-01-15 | 北京智芯微电子科技有限公司 | Hybrid key storage and management method and storage device |
CN112235102B (en) * | 2020-09-29 | 2023-07-21 | 北京智芯微电子科技有限公司 | Hybrid key storage and management method and storage device |
Also Published As
Publication number | Publication date |
---|---|
CN107609870B (en) | 2023-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106897909A (en) | A kind of electronic invoice printing and the cloud service system and method for storage | |
CN104158889B (en) | Card information querying method and Cloud Server | |
CN107609870A (en) | More application key management method, system and POS terminals for POS | |
CN109146654B (en) | Accounting method and system and electronic equipment | |
CN101588242A (en) | Method and system for realizing authority management | |
CN110134930A (en) | Electronic contract management method, device, computer equipment and storage medium | |
CN109241384A (en) | A kind of method for visualizing and device of scientific research information | |
CN101075989B (en) | Method and system for verifying field validity | |
CN102117292A (en) | File secondary generation and query method | |
US7552145B1 (en) | Method and system of restating telecommunications data by a batch-driven integrated rules module | |
CN101577685B (en) | Information inquiry method and system | |
CN110069248A (en) | Call method, device, equipment and the computer readable storage medium of interface data | |
CN102592215A (en) | Rapid online payment method and server | |
CN101710322A (en) | Method and system for associating information | |
CN107451301B (en) | Processing method, device, equipment and storage medium for real-time delivery bill mail | |
CN102609494A (en) | Method for processing data of machine account and device | |
CN105847329A (en) | Stock data server based management device and method | |
CN101556577A (en) | Method for organizing documents and program codes together by using XML file | |
CN110427602A (en) | A method of quick, safe creation and transmission electronic contract based on template | |
CN108958871A (en) | Page configuration of opening an account method, apparatus, system and computer readable storage medium | |
US20120005324A1 (en) | Method and System for Operations Management in a Telecommunications Terminal | |
CN113032706A (en) | Implementation method and system for quickly building webpage | |
CN112434058A (en) | Data interaction method based on Java and MySQL and computer readable medium | |
CN105718536A (en) | Mobile terminal order query method and system | |
CN106022677A (en) | Express delivery management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |