CN102332981A - Three-layer key encryption method and bank transaction system - Google Patents

Three-layer key encryption method and bank transaction system Download PDF

Info

Publication number
CN102332981A
CN102332981A CN201110308110A CN201110308110A CN102332981A CN 102332981 A CN102332981 A CN 102332981A CN 201110308110 A CN201110308110 A CN 201110308110A CN 201110308110 A CN201110308110 A CN 201110308110A CN 102332981 A CN102332981 A CN 102332981A
Authority
CN
China
Prior art keywords
key
master key
plaintext
atmc
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110308110A
Other languages
Chinese (zh)
Inventor
崔再彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN VODATONE INDUSTRY Co Ltd
Original Assignee
SHENZHEN VODATONE INDUSTRY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN VODATONE INDUSTRY Co Ltd filed Critical SHENZHEN VODATONE INDUSTRY Co Ltd
Priority to CN201110308110A priority Critical patent/CN102332981A/en
Publication of CN102332981A publication Critical patent/CN102332981A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a three-layer key encryption method and a bank transaction system, wherein the method comprises the following steps of: providing an initialized master key in a plaintext way; decrypting the ciphertext of the master key by using the initialized master key to generate the plaintext of the master key; and decrypting the ciphertext of a working key by using the plaintext of the master key to generate the plaintext of the working key. As the initialized master key in a three-layer key encryption system is dynamically updated, the initialized master key which is firstly generated through an encryption machine can fail after being used once only, and the internal control risk is effectively prevented. Simultaneously, the master key is replaced frequently, thereby effectively preventing data from being cracked, being tampered, causing transmission failure and other risks in the network transmission process. The three-layer key encryption method provided by the invention is particularly suitable for bank transaction systems and can effectively ensure the safety of transactions.

Description

The encryption method of three layers of key and bank transaction system
Technical field
The present invention relates to a kind of data encryption technology, especially relate to a kind of encryption method of three layers of key, and the bank transaction system that uses this encryption method to realize.
Background technology
We know; Financial industry has a lot of data on network, to transmit, comprise from preposition to main frame, from self-aided terminal to preposition etc.; These data pass on network; We are easy to expect the problem of fail safe, if these data are stolen or tackled by the people, how we dare has been saved in bank.Can explain that thus financial industry is because of relatively more responsive to data, so the encryption of data is also relatively paid attention to accordingly.
Suppose that we have one piece of data; It is the message that ATM (Automatic Teller Machine) withdraws the money; Comprise a people's magnetic card number, password, the amount of money of withdrawing the money, need these data be passed to front end processor from an ATM device now and handle that these data are comparison secrets; If stolen (such as through bank special-purpose internal network or other modes) by the people, just can take the money in the account away with this card number and password.
Since the possibility that the assurance transaction data is not stolen is very little; We are conversion thinking once why not: if transaction data is encrypted; Even steal the transaction data after the encryption, also be some useless mess codes, can improve the fail safe of bank transaction system so to a certain extent.
Such as, after big pre-processing system receives the transaction data that ATM reports, need handle transaction data is counter, promptly with the opposite data processing of the complete step of ATM, can obtain data expressly.Further consider again: if because certain reason, the amount of money of withdrawing the money in the message has been changed, and will cause the amount of money of the account in the last account amount of money that shows of ATM and the big pre-processing system inconsistent like this.Therefore, need add an authentication mechanism, when big pre-processing system was received message that ATM sends, the data in can confirmation message were not modified in network transmission process.
Therefore, the safety of bank transaction system relates to each link of trading processing, needs a kind of safe cipher mode to guarantee transaction security.
Summary of the invention
Embodiments of the invention propose a kind of encryption method of using three layers of key in bank transaction system; Initial master key dynamically updates; And the frequent replacing of master key, thereby solve various transaction data were cracked, were distorted, transmit the failure equivalent risk in the network transmission process of bank transaction system problem.
The present invention adopts following technical scheme to realize: a kind of encryption method of three layers of key, and it comprises step:
With clear-text way the initialization master key is provided;
Use the initialization master key that the ciphertext of master key is deciphered, produce the plaintext of master key;
Use the plaintext of master key, the ciphertext of working key is deciphered, produce the plaintext of working key.
Wherein, use the initialization master key ciphertext of master key to be deciphered through the 3DES algorithm.
Wherein, use the plaintext of master key the ciphertext of working key to be deciphered through the 3DES algorithm.
Wherein, the plaintext of this master key is as the initialization master key of next time.
In addition, the present invention also provides a kind of bank transaction system, and said system comprises ATMC, ATMP, the bank's background system that links to each other with ATMP; Bank's background system comprises and comprises big pre-processing system, the encryption equipment that links to each other with big pre-processing system and billing and accounting system at least;
By ATMC to encryption equipment application master key; The master key that encryption equipment returns with the ciphertext form, identifying code; ATMC uses the initial master key that expressly provides to decrypt the plaintext of master key and calculate identifying code, if identifying code is consistent, then the plaintext of master key is write the code keypad of ATMC;
ATMC is to bank's background system request working key; Bank's background system can return ciphertext, the identifying code of working key; ATMC uses the decrypt ciphertext of master key to working key; Produce the plaintext and the identifying code of working key,, then the plaintext of working key is write the code keypad of ATMC if identifying code is consistent;
ATMC uses the plaintext of working key to adopt the mode of ISO ANSI X9.8 to encrypt and produces PIN BLOCK data, and carries out computing by the MAC algorithm, and the MAC operation result is with sending ATMP on the transaction message;
By ATMP checking PIN BLOCK and MAC operation result.
Wherein, initial master key is to be produced by encryption equipment.
Wherein, encryption equipment produces A-key and B key, and it is exactly initial master key that A-key and B key carry out behind the XOR.
Wherein, identifying code is to use master key or working key to encrypt generation to 8 zero.
Wherein, Working key comprises personal identification number data encryption key and message data encryption key; The personal identification number data encryption key is used for holder's individual number of the account, password are encrypted, and the message data encryption key is used for encrypting the communication packet between ATMC and the ATMP.
Compared with prior art, the present invention has following beneficial effect:
Owing to the initial master key in three layers of secret key encryption system dynamically updates, after can only using once, the initial master key that the first pass encryption equipment produces will lose efficacy, effectively taken precautions against the internal control risk.Simultaneously, the frequent replacing of master key prevents effectively that also data are cracked, are distorted, transmit the failure equivalent risk in network transmission process.Three layers of secret key encryption method that the present invention proposes especially are suitable for use in the bank transaction system, can effectively guarantee to guarantee transaction security.
Description of drawings
Fig. 1 is the schematic flow sheet that three layers of secret key encryption are handled;
Fig. 2 is the sketch map of bank transaction system;
Fig. 3 is the schematic flow sheet that bank transaction system is handled by three layers of secret key encryption.
Embodiment
The flow chart that three layers of secret key encryption as shown in Figure 1 are handled:
The ground floor key is that (Initial Master Key IMK), is used to adopt 3DES algorithm for encryption/deciphering master key to the initialization master key.In a preferred embodiment, initialization master key length is 16 byte 128 bit lengths.For easy to use, generally can be converted into binary-coded decimal provides, and so just is 32 ASC code characters.
Second layer key is that (Master Key MK), adopts the 3rd layer of 3DES/DES algorithm for encryption/deciphering to master key.In a preferred embodiment, master key length is 128 of 16 bytes, representes with 32 ASC code characters.
The 3rd layer of key is working key, comprises personal identification number data encryption key (PIK) and message data encryption key (MAK).PIK is used for holder's individual number of the account, password are encrypted, and length is 128 of 16 bytes, can be expressed as 32 ASC sign indicating numbers.MAK is used for communication packet is encrypted, if the MAC AES is 3DES, then length is 16 bytes; If adopt the des encryption algorithm, then length is 8 bytes.
In three layers of secret key encryption system, initialization master key (Initial MK) is expressly to provide, to use the 3DES algorithm to use the initialization master key to decipher the ciphertext of master key (MK), to produce the plaintext of master key; Then, the 3DES algorithm re-uses the plaintext of master key, and the ciphertext of PIK and MAK is deciphered, and produces the plaintext of PIK and MAK.So just can use the plaintext of PIK to adopt ISO ANSI X9.8 standard that PIN BLOCK (the 3DES/DES algorithm uses PIK that holder's personal key and account are carried out the cryptographic calculation generation) is encrypted, use MAK that the significant data in the transaction message is encrypted.
Wherein, in the ISO ANSI X9.8 standard, PIN BLOCK form equals PIN step-by-step XOR primary account number (PAN):
Wherein, the PIN form is as shown in table 1 below:
The position Length Explanation
1 1 BYTE PIN length
2 7 BYTE 6-12 position PIN (each character accounts for 4 BIT, the not enough right F that mends)
Table 1
The PAN form is as shown in table 2 below:
The position Length Explanation
1 2 BYTE %H0000
2 6 BYTE Get 12 on the right side (not comprising rightmost check digit) of primary account number
Table 2
For example: expressly PIN is: 123456,
Suppose: the PAN:1234 5,678 9,012 3,456 78 on the magnetic card
PAN:6789 0,123 4567 under the intercepting
Then, being used for the PAN that PIN encrypts is: 0x00 0x00 0x67 0x89 0x01 0x23 0x45 0x67
PIN BLOCK is: 0x06 0x12 0x34 0x56 0xFF 0xFF 0xFF 0xFF
The result of XOR: 0x00 0x00 0x67 0x89 0x01 0x23 0x45 0x67
The result is: 0x06 0x12 0x53 0xDF 0xFE 0xDC 0xBA 0x98
As shown in Figure 2, be the instance that three layers of secret key encryption system specifically is used in bank transaction system.
ATM (ATM; Automatic Teller Machine) C end or ATMC (ATM Control) operate in the Control Software among the ATM; Mainly by main frame, the module of depositing and withdrawing, print module, code keypad module, transport passage, paper money tank module etc. and form, wherein code keypad is to be used for carrying out hardware encryption to use.Wherein, initialization master key (Initial MK), master key (MK), working key (comprising PIK and MAK) all are to write in the code keypad.
ATM P end (ATM Preconsole) or ATMP or ATM front-end system circle are mainly used in functions such as realizing atm device management, communication mode standardization, transaction message format conversion and forwarding between ATM host service system and bank's background system.ATMP passes through the ICP/IP protocol communication according to the message format of bank's regulation, is transmitted to big pre-processing system behind the transaction request message of responsible reception ATMC.
After big pre-processing system was received the transaction request message that ATMP transmits, big pre-processing system was sent to encryption equipment with the transaction request message and is carried out encrypting and authenticating, authentication through after send to account system and handle.
Encryption equipment mainly is used for producing key and carries out data authentication.
The Account Disposal that account system is concluded the business.
In conjunction with shown in Figure 3.Specifically, bank transaction system is following by the flow process that three layers of key carry out encryption:
Initial master key is to be produced by the encryption equipment in bank's background system, generally produces A-key and B key, and A, B key all are 32 characters, and it is exactly initial master key that A, B key carry out behind the XOR.A, B key generally separately leave two message in cipher inside front covers in.
The bank ATM keeper distinguishes typing A-key and B key among an ATMC therein, generally respectively by two people typing respectively back-to-back, guarantees the safety of initial master key.By ATMC A-key and B key are carried out obtaining initial master key behind the XOR, and initial master key is kept in the code keypad of ATMC.Initial master key can only be provided with at the operation interface that ATMC provides, and can not from the code keypad of ATMC, read initial master key.
After initial master key is provided with completion; By the encryption equipment application master key of ATMC to bank's background system; The master key that encryption equipment returns is to return with the ciphertext form of encrypting through initial master key, needs the code keypad that uses initial master key to decrypt the master key plaintext and write ATMC.
For the master key that guarantees to decrypt is correct, encryption equipment also can return identifying code simultaneously, and identifying code is that encryption equipment uses master key to encrypt generation to 8 zero; ATMC also encrypts 8 zero with the master key that decrypts, if the identifying code that encryption equipment returns in the result of encryption and the bank background system is identical, the master key that then returns is effective.This master key is exactly the initial master key of next time.
PIK and MAK general designation working key.After getting access to master key, ATMC sends the encryption equipment request working key of message to bank's background system once more, and bank's background system can return the identifying code of ciphertext, PIK and the MAK of PIK and MAK.ATMC uses the decrypt ciphertext of master key to PIK, MAK, produces PIK and MAK expressly, uses PIK and MAK to encrypt the correctness of verifying PIK and MAK to 8 zero equally.PIK that checking is passed through and MAK write the code keypad of ATMC.
After successfully applying for PIK and MAK; Just can use PIK to adopt the mode of ISO ANSI X9.8 to encrypt and produce PIN BLOCK data (promptly holder's individual number of the account, password being encrypted); Use MAK that the transaction significant data is adopted MAC algorithm computing (being that ATMC uses MAK that the communication packet between ATMC and the ATMP is encrypted), the MAC operation result of generation is with sending ATMP on the transaction message.
After receiving the communication message of ATMC, ATMP adopts with the same mode of ATMC and calculates PIN BLOCK and MAC operation result, as a result unanimity then message pass through, promptly ATMP passes through the authentication of transaction data.
In sum,, will lose efficacy after the initial master key that the first pass encryption equipment produces can only use once, effectively take precautions against the internal control risk owing to the initial master key in three layers of secret key encryption system dynamically updates.Simultaneously, the frequent replacing of master key prevents effectively that also data are cracked, are distorted, transmit the failure equivalent risk in network transmission process.
The above is merely preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of within spirit of the present invention and principle, being done, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. the encryption method of three layers of key is characterized in that, said method comprises step:
With clear-text way the initialization master key is provided;
Use the initialization master key that the ciphertext of master key is deciphered, produce the plaintext of master key;
Use the plaintext of master key, the ciphertext of working key is deciphered, produce the plaintext of working key.
2. according to the encryption method of the said three layers of key of claim 1, it is characterized in that, use the initialization master key ciphertext of master key to be deciphered through the 3DES algorithm.
3. according to the encryption method of the said three layers of key of claim 1, it is characterized in that, use the plaintext of master key the ciphertext of working key to be deciphered through the 3DES algorithm.
4. according to the encryption method of claim 1 or 2 or 3 said three layers of key, it is characterized in that the plaintext of this master key is as the initialization master key of next time.
5. bank transaction system, said system comprises ATMC, ATMP, the bank's background system that links to each other with ATMP; Bank's background system comprises and comprises big pre-processing system, the encryption equipment that links to each other with big pre-processing system and billing and accounting system at least; It is characterized in that:
By ATMC to encryption equipment application master key; The master key that encryption equipment returns with the ciphertext form, identifying code; ATMC uses the initial master key that expressly provides to decrypt the plaintext of master key and calculate identifying code, if identifying code is consistent, then the plaintext of master key is write the code keypad of ATMC;
ATMC is to bank's background system request working key; Bank's background system can return ciphertext, the identifying code of working key; ATMC uses the decrypt ciphertext of master key to working key; Produce the plaintext and the identifying code of working key,, then the plaintext of working key is write the code keypad of ATMC if identifying code is consistent;
ATMC uses the plaintext of working key to adopt the mode of ISO ANSI X9.8 to encrypt and produces PIN BLOCK data, and carries out computing by the MAC algorithm, and the MAC operation result is with sending ATMP on the transaction message;
By ATMP checking PIN BLOCK and MAC operation result.
6. according to the said bank transaction system of claim 5, it is characterized in that the plaintext of this master key is as the initialization master key of next time.
7. according to the said bank transaction system of claim 5, it is characterized in that initial master key is to be produced by encryption equipment.
8. according to the said bank transaction system of claim 7, it is characterized in that encryption equipment produces A-key and B key, it is exactly initial master key that A-key and B key carry out behind the XOR.
9. according to the said bank transaction system of claim 5, it is characterized in that identifying code is to use master key or working key to encrypt generation to 8 zero.
10. according to the said bank transaction system of claim 5; It is characterized in that; Working key comprises personal identification number data encryption key and message data encryption key; The personal identification number data encryption key is used for holder's individual number of the account, password are encrypted, and the message data encryption key is used for encrypting the communication packet between ATMC and the ATMP.
CN201110308110A 2011-10-12 2011-10-12 Three-layer key encryption method and bank transaction system Pending CN102332981A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110308110A CN102332981A (en) 2011-10-12 2011-10-12 Three-layer key encryption method and bank transaction system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110308110A CN102332981A (en) 2011-10-12 2011-10-12 Three-layer key encryption method and bank transaction system

Publications (1)

Publication Number Publication Date
CN102332981A true CN102332981A (en) 2012-01-25

Family

ID=45484594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110308110A Pending CN102332981A (en) 2011-10-12 2011-10-12 Three-layer key encryption method and bank transaction system

Country Status (1)

Country Link
CN (1) CN102332981A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152167A (en) * 2013-03-20 2013-06-12 东信和平科技股份有限公司 Intelligent card PIN (personal identification number) encrypted transmission method and intelligent card PIN encrypted transmission system
CN103903367A (en) * 2012-12-28 2014-07-02 北京握奇数据系统有限公司 Method and system for loading-in-air of financial IC card embedded into mobile terminal
CN104464048A (en) * 2014-11-14 2015-03-25 中国建设银行股份有限公司 Electronic coded lock unlocking method and electronic coded lock unlocking device
CN104506509A (en) * 2014-12-15 2015-04-08 广东汇卡商务服务有限公司 Multifunctional security authentication terminal and authentication method based on terminal
CN105306201A (en) * 2014-06-13 2016-02-03 广州涌智信息科技有限公司 Encrypted data transmission method
CN105554010A (en) * 2015-12-28 2016-05-04 上海瀚银信息技术有限公司 Password encryption method and system and intelligent terminal
CN105574445A (en) * 2015-12-22 2016-05-11 广州广电运通金融电子股份有限公司 Safety communication method and device for self-service terminal equipment hardware
CN106357394A (en) * 2016-08-29 2017-01-25 福建新大陆支付技术有限公司 Secure method of filling key for Parent POS
CN106411523A (en) * 2016-08-24 2017-02-15 中国银行股份有限公司 Generation and check methods and devices for bank card passwords, and system
CN106875174A (en) * 2017-02-13 2017-06-20 四川商通实业有限公司 One kind is without card method of payment
CN106934886A (en) * 2017-02-28 2017-07-07 南京东屋电气有限公司 A kind of dynamic puzzle-lock OTC keys are set and update method
CN107292618A (en) * 2016-04-11 2017-10-24 阿里巴巴集团控股有限公司 Ciphertext data change the treating method and apparatus of close failure in database
CN107861877A (en) * 2017-11-21 2018-03-30 中国银行股份有限公司 The encryption method and device of banking system automatic test message
CN109102659A (en) * 2018-07-24 2018-12-28 苏州浪潮智能软件有限公司 A method of promoting bank self-help terminal security performance
CN111314070A (en) * 2020-02-13 2020-06-19 上海雷龙信息科技有限公司 Internet communication key generation system and method thereof
CN111404683A (en) * 2020-03-31 2020-07-10 中国建设银行股份有限公司 Self-service equipment master key generation method, server and self-service equipment
CN112532567A (en) * 2019-09-19 2021-03-19 中国移动通信集团湖南有限公司 Transaction encryption method and POSP system
CN114039728A (en) * 2021-12-24 2022-02-11 中电长城(长沙)信息技术有限公司 Message encryption and decryption method and system

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903367A (en) * 2012-12-28 2014-07-02 北京握奇数据系统有限公司 Method and system for loading-in-air of financial IC card embedded into mobile terminal
CN103152167A (en) * 2013-03-20 2013-06-12 东信和平科技股份有限公司 Intelligent card PIN (personal identification number) encrypted transmission method and intelligent card PIN encrypted transmission system
CN105306201A (en) * 2014-06-13 2016-02-03 广州涌智信息科技有限公司 Encrypted data transmission method
CN105306201B (en) * 2014-06-13 2018-09-28 广州涌智信息科技有限公司 A method of transmission is encrypted to data
CN104464048B (en) * 2014-11-14 2016-09-14 中国建设银行股份有限公司 A kind of electronic password lock method for unlocking and device
CN104464048A (en) * 2014-11-14 2015-03-25 中国建设银行股份有限公司 Electronic coded lock unlocking method and electronic coded lock unlocking device
CN104506509A (en) * 2014-12-15 2015-04-08 广东汇卡商务服务有限公司 Multifunctional security authentication terminal and authentication method based on terminal
CN105574445A (en) * 2015-12-22 2016-05-11 广州广电运通金融电子股份有限公司 Safety communication method and device for self-service terminal equipment hardware
WO2017107328A1 (en) * 2015-12-22 2017-06-29 广州广电运通金融电子股份有限公司 Secure communication method and apparatus for self-service terminal device hardware
CN105574445B (en) * 2015-12-22 2018-08-31 广州广电运通金融电子股份有限公司 A kind of safety communicating method and device of self-help terminal equipment hardware
CN105554010A (en) * 2015-12-28 2016-05-04 上海瀚银信息技术有限公司 Password encryption method and system and intelligent terminal
CN107292618A (en) * 2016-04-11 2017-10-24 阿里巴巴集团控股有限公司 Ciphertext data change the treating method and apparatus of close failure in database
US10884862B2 (en) 2016-04-11 2021-01-05 Advanced New Technologies Co., Ltd. Method and apparatus for processing failure of cipher change of ciphertext in database
CN107292618B (en) * 2016-04-11 2020-04-28 阿里巴巴集团控股有限公司 Method and device for processing ciphertext data encryption failure in database
CN106411523A (en) * 2016-08-24 2017-02-15 中国银行股份有限公司 Generation and check methods and devices for bank card passwords, and system
CN106357394A (en) * 2016-08-29 2017-01-25 福建新大陆支付技术有限公司 Secure method of filling key for Parent POS
CN106875174A (en) * 2017-02-13 2017-06-20 四川商通实业有限公司 One kind is without card method of payment
CN106934886A (en) * 2017-02-28 2017-07-07 南京东屋电气有限公司 A kind of dynamic puzzle-lock OTC keys are set and update method
CN106934886B (en) * 2017-02-28 2019-02-26 南京东屋电气有限公司 A kind of setting of dynamic puzzle-lock OTC key and update method
CN107861877A (en) * 2017-11-21 2018-03-30 中国银行股份有限公司 The encryption method and device of banking system automatic test message
CN109102659A (en) * 2018-07-24 2018-12-28 苏州浪潮智能软件有限公司 A method of promoting bank self-help terminal security performance
CN112532567A (en) * 2019-09-19 2021-03-19 中国移动通信集团湖南有限公司 Transaction encryption method and POSP system
CN111314070A (en) * 2020-02-13 2020-06-19 上海雷龙信息科技有限公司 Internet communication key generation system and method thereof
CN111404683A (en) * 2020-03-31 2020-07-10 中国建设银行股份有限公司 Self-service equipment master key generation method, server and self-service equipment
CN111404683B (en) * 2020-03-31 2022-11-15 中国建设银行股份有限公司 Self-service equipment master key generation method, server and self-service equipment
CN114039728A (en) * 2021-12-24 2022-02-11 中电长城(长沙)信息技术有限公司 Message encryption and decryption method and system

Similar Documents

Publication Publication Date Title
CN102332981A (en) Three-layer key encryption method and bank transaction system
US10129020B2 (en) Efficient methods for protecting identity in authenticated transmissions
US9948624B2 (en) Key downloading method, management method, downloading management method, device and system
CN103729945B (en) A kind of method and system of secure download terminal master key
CN102082790B (en) Method and device for encryption/decryption of digital signature
US20160028548A1 (en) Key downloading method, management method, downloading management method, device and system
CN107786550B (en) A kind of safety communicating method of self-service device, safe communication system and self-service device
CN101656007B (en) Safe system realizing one machine with multiple ciphers on POS machine and method thereof
CN101131756A (en) Security authentication system, device and method for electric cash charge of mobile paying device
CN1689297A (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
CN102377566A (en) Security processing device and system for electric meter data
CN101115060A (en) Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system
CN106682903A (en) Feedback verification method of bank payment permission authentication information
CN102857503B (en) A kind of safe finger print data radio transmitting method
CN101938353B (en) Method for remotely resetting personal identification number (PIN) of key device
CN103138925B (en) Hair fastener method of operation, IC-card sheet and card-issuing equipment
CN102571346B (en) Method and device for preventing password of intelligent secret key device user from being stolen
CN109726584A (en) Cloud database key management system
CN101572698B (en) Network transmission common encryption method for files
CN106790210A (en) Data safety exchange method, end side safety device and service side safety device
CN102685126A (en) System and method of identity authentication for network platform
WO2019165572A1 (en) Data transmission method and system
CN204414831U (en) A kind of public security certificate printer
CN103383793A (en) Method and system for achieving invoice identification with browser
CN214475131U (en) Visual card transaction system based on digital currency payment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120125