CN102624710A - Sensitive information transmission method and sensitive information transmission system - Google Patents

Sensitive information transmission method and sensitive information transmission system Download PDF

Info

Publication number
CN102624710A
CN102624710A CN2012100471142A CN201210047114A CN102624710A CN 102624710 A CN102624710 A CN 102624710A CN 2012100471142 A CN2012100471142 A CN 2012100471142A CN 201210047114 A CN201210047114 A CN 201210047114A CN 102624710 A CN102624710 A CN 102624710A
Authority
CN
China
Prior art keywords
sensitive information
destination
key
source end
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100471142A
Other languages
Chinese (zh)
Other versions
CN102624710B (en
Inventor
姚承勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Landi Commercial Equipment Co Ltd filed Critical Fujian Landi Commercial Equipment Co Ltd
Priority to CN201210047114.2A priority Critical patent/CN102624710B/en
Publication of CN102624710A publication Critical patent/CN102624710A/en
Application granted granted Critical
Publication of CN102624710B publication Critical patent/CN102624710B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a sensitive information transmission method which is used for transmitting sensitive information from a source terminal to a destination terminal, wherein the sensitive information is stored at the source terminal. The sensitive information transmission method includes the following steps that S1, an RSA private key and an RSA public key are stored at the source terminal and the destination terminal respectively; S2, the source terminal is subjected to legal verification by aid of the RSA private key and the RSA public key; S3, if the source terminal is legal, the destination terminal sends a request of to the source terminal for downloading the sensitive information, and the source terminal encrypts the sensitive information and sends the encrypted sensitive information to the destination terminal. The method fully uses the asymmetrical character of the RSA public key and the private key, and when the source terminal is verified to be legal, the sensitive information is encrypted and is transmitted to the destination terminal from the source terminal so that the download problem of the initial key of symmetrical keys in the field of information safety is solved, the key transmission in the form of plaintext is avoided, and the management is convenient. The invention simultaneously discloses a sensitive information transmission system.

Description

A kind of sensitive information transmission method and system
Technical field
The present invention relates to the transmission method and the system of information security and encryption technology field, especially sensitive information.
Background technology
In the traditional financial POS initial key downloading mode; Normally in the security context of bank; Initial key (sensitive information) uses mode expressly, and (Key Load Device KLD) uses short distance communication (RS-232 etc.) to download in the POS terminal from the key download equipment; Perhaps directly on the POS terminal, import initial key by hand by the full-time staff.There is following defective in aforesaid way:
Shortcoming 1:KLD uses the short distance communication modes to inject key, and the plaintext of key not protectorate is exposed to the transmission course of communication media, is obtained data content by various watch-dogs easily, causes sensitive information to leak.
Shortcoming 2: key is the mode of manual input at the POS terminal directly, makes key carried out security context and use that certain security risk is arranged in the management, is prone to cause sensitive information to leak.
Summary of the invention
Based on the problems referred to above; The purpose of this invention is to provide a kind of sensitive information transmission method and system; This method and system is at first verified the legitimacy of transmission sources, transfers to destination after then sensitive information being encrypted, thereby make that sensitive information is difficult for being illegally accessed in transmission course.The present invention adopts following technological means to realize above-mentioned purpose:
A kind of sensitive information transmission method is used for that end is transferred to destination from the source with sensitive information, and said sensitive information is stored in the source end, it is characterized in that, may further comprise the steps:
S1. end and destination are stored a RSA private key and a RSA PKI respectively in the source;
S2. the source end is carried out legitimate verification;
S3. if above-mentioned source end is legal, then destination sends the request of downloading sensitive information to the source end, and the source end is encrypted the back with sensitive information, and end is sent to destination from the source.
Wherein, said step S2 specifically may further comprise the steps:
S21. produce some bytes at random as source end legitimate verification sign indicating number at destination;
S22. produce one group of traffic encryption key at random at destination, in order to encrypted sensitive information in transmission course;
S23. produce one group of transfer check key at random at destination, in order to the integrality of the sensitive information of verification transmission;
S24. utilize the RSA PKI that legitimacy identifying code, traffic encryption key, transfer check key are carried out computing at destination, and transfer to the source end to the ciphertext that computing obtains;
S25. the source termination is received above-mentioned ciphertext; Use the RSA private key that said ciphertext is carried out computing; Obtain source end legitimate verification sign indicating number, traffic encryption key, transfer check key expressly; The source end is stored said traffic encryption key, transfer check key, and the legitimate verification sign indicating number is transferred to destination carries out legitimate verification;
S26. destination receives said legitimate verification sign indicating number, and whether checking source end is legal.
Wherein, the end empirical tests is legal when said source, and said step S3 specifically may further comprise the steps:
S31. destination sends the request of downloading sensitive information to the source end;
S32. the source termination is received above-mentioned request, encrypts said sensitive information with above-mentioned traffic encryption key, and with the transfer check key sensitive information is carried out being transferred to destination after the verification;
S33. destination receives above-mentioned sensitive information, and the integrality of verification sensitive information, and after transmission was accomplished, source end and destination were deleted said legitimate verification sign indicating number, traffic encryption key, transfer check key respectively.
Wherein, said RSA private key and RSA PKI are generated by source end or third party device, and the source end is stored said private key, and destination is stored said PKI.
Wherein, said third party device is stored in the private key that generates in the smart card, and said source end reads the private key in the smart card.
Wherein, in step S22, adopt the TEK that generates at random as traffic encryption key.
Wherein, said TEK key adopts symmetric encipherment algorithm, comprises TDES or AES.
Wherein, in step S23, adopt TCK as said transfer check key.
Wherein, in step S23, adopt the MAC algorithm that the sensitive information integrality is carried out verification.
Wherein, this transmission method is used for the financial field, and said source end is a KLD equipment, and said destination is the POS machine, and said sensitive information is an initial key.
The present invention discloses a kind of sensitive information transmission system simultaneously, is used for that end is transferred to destination from the source with sensitive information, and said sensitive information is stored in the source end, it is characterized in that, comprising:
The source end, storage RSA private key;
Destination, storage RSA PKI;
Authentication unit carries out legitimate verification to the source end;
Transmitting element, if above-mentioned source end is legal, then destination sends the request of downloading sensitive information to the source end, the source end is encrypted the back with sensitive information, and end is sent to destination from the source.
Wherein, said demo plant comprises:
The legitimate verification sign indicating number is the some bytes that produce at random at destination, in order to the legitimacy of checking source end;
Traffic encryption key produces at destination at random, in order to encrypted sensitive information in transmission course;
The transfer check key produces at destination at random, in order to the integrality of the sensitive information of verification transmission;
Utilize the RSA PKI that legitimacy identifying code, traffic encryption key, transfer check key are carried out computing at destination, and transfer to the source end to the ciphertext that computing obtains; The source termination is received above-mentioned ciphertext; Use the RSA private key that said ciphertext is carried out computing; Obtain source end legitimate verification sign indicating number, traffic encryption key, transfer check key expressly; The source end is stored said traffic encryption key, transfer check key, and the legitimate verification sign indicating number is transferred to destination carries out legitimate verification; Destination receives said legitimate verification sign indicating number, and whether checking source end is legal.
Wherein, said transmitting element comprises:
Request unit is in order to send the request of downloading sensitive information from destination to the source end;
Ciphering unit, the source termination is received above-mentioned request, encrypts said sensitive information with above-mentioned traffic encryption key, and with the transfer check key sensitive information is carried out being transferred to destination after the verification;
Destination receives above-mentioned sensitive information, and the integrality of verification sensitive information, and after transmission was accomplished, source end and destination were deleted said legitimate verification sign indicating number, traffic encryption key, transfer check key respectively.
Wherein, said RSA private key and RSA PKI are generated by source end or third party device, and the source end is stored said private key, and destination is stored said PKI.
Wherein, said third party device is stored in the private key that generates in the smart card, and said source end reads the private key in the smart card.
Wherein, traffic encryption key is the TEK key that generates at random.
Wherein, said TEK key adopts symmetric encipherment algorithm, comprises TDES or AES.
Wherein, said transfer check key is the TCK that generates at random.
Wherein, adopt the MAC algorithm that the sensitive information integrality is carried out verification.
Wherein, this transmission system is used for the financial field, and said source end is a KLD equipment, and said destination is the POS machine, and said sensitive information is an initial key.
This method has made full use of the asymmetric property of RSA PKI and private key; After checking source end is legal; Sensitive information is encrypted the back, and end is transferred to destination from the source; Solved the initial key download problem of information security field symmetric key well, avoided the expressly key delivery of form, and made things convenient for management.
Description of drawings
Fig. 1 is the flow chart of the embodiment of a kind of sensitive information transmission method of the present invention;
Fig. 2 is the flow chart of the embodiment of a kind of sensitive information transmission method of the present invention;
Fig. 3 carries out the legality identification method flow chart for the present invention to the source end;
Fig. 4 for the present invention after checking source end is legal, sensitive information transfer process figure;
Fig. 5 is the structure chart of the embodiment of a kind of sensitive information transmission system of the present invention.
Embodiment
By specifying technology contents of the present invention, structural feature, realized purpose and effect, give explanation below in conjunction with execution mode and conjunction with figs. are detailed.
In the present invention, all should be referred to as sensitive information by the confidential information that nonowners obtains.In the financial POS field, sensitive information has and is not limited only to the various keys that are used for financial transaction, and bank card password that the holder held (PIN) and POS manufacturer are used to realize the encryption technology association key of POS safety.For ease of describing mechanism of the present invention, below adopt typical financial POS key to download case and set forth.But the present invention is not limited only to the financial POS key to download, and is delivered to the circuit TRANSEC transmission security safeguard measure of the other end from an end applicable to any sensitive information.
In the financial field, the POS machine is realizing that financial transaction needs to download symmetric key before using, and this symmetric key is a sensitive information, these symmetric keys by centralized stores in the middle of KLD.Because of the characteristic of symmetric key, need by the secret protection, can not in transmission or any process of using, be leaked.In general, a bank has only a KLD equipment, and this KLD equipment is in charge of the key download at thousands of POS terminals.In the financial field, initial key is the root key in the key code system, must exist with the plaintext form.In financial POS symmetric key system, initial key has and is not limited only to Master Key, Fixed Key, DUKPT Base Derivation Key or Initial Key etc.The effect of initial key is to be used for other working key of encrypt/decrypt, makes that working key can be with the form transmission of ciphertext.Because of initial key is to exist with the plaintext form, therefore transmission, the storage for initial key all is very responsive operation.Each financial POS could be realized finance trade function after must pouring into initial key.
See also Fig. 1 and Fig. 2, be the flow chart of the embodiment of sensitive information transmission method of the present invention.In this embodiment, sensitive information is an initial key, and the source end is KLD; Destination is the POS machine, and wherein KLD is the key download equipment, and it is a kind of high security equipment that meets bank information safety; Be used to store key expressly, and be responsible for downloading key to the POS terminal.This method may further comprise the steps:
S1. end and destination are stored a RSA private key and a RSA PKI respectively in the source;
S2. the source end is carried out legitimate verification;
S3. if above-mentioned source end is legal, then destination sends the request of downloading sensitive information to the source end, and the source end is encrypted the back with sensitive information, and end is sent to destination from the source.
Wherein, RSA private key and RSA PKI can be produced by KLD, also can be produced by third party device, and third party device is stored in the private key that generates in the smart card, and the source end reads the private key in the smart card.
Please refer to Fig. 3,, specifically may further comprise the steps for the present invention carries out the legality identification method flow chart to the source end:
S21. produce some bytes at random as source end legitimate verification sign indicating number at destination;
S22. produce one group of traffic encryption key at random at destination, in order to encrypted sensitive information in transmission course; S23. produce one group of transfer check key at random at destination, in order to the integrality of the sensitive information of verification transmission;
S24. utilize the RSA PKI that legitimacy identifying code, traffic encryption key, transfer check key are carried out computing at destination, and transfer to the source end to the ciphertext that computing obtains;
S25. the source termination is received above-mentioned ciphertext; Use the RSA private key that said ciphertext is carried out computing; Obtain source end legitimate verification sign indicating number, traffic encryption key, transfer check key expressly; The source end is stored said traffic encryption key, transfer check key, and the legitimate verification sign indicating number is transferred to destination carries out legitimate verification;
S26. destination receives said legitimate verification sign indicating number, and whether checking source end is legal.
In the present embodiment, source end legitimate verification sign indicating number, traffic encryption key, transfer check key are generated by the POS machine at random, and source end legitimate verification sign indicating number is some bytes; Traffic encryption key is used for the transmission course sensitive data, adopts the TEK key, and this key uses symmetric encipherment algorithm, can adopt several kinds of algorithms, TDES for example, and AES etc. are fit to the many situation of data amount transmitted.Adopt TCK as the transfer check key, also can adopt other keys, be used for the sensitive data integrality of verification transmission, adopt the MAC scheduling algorithm.
Please refer to Fig. 4, for the present invention the checking destination legal after, sensitive information transfer process figure.The source end through being verified as legal after, carry out following steps:
S31. destination sends the request of downloading sensitive information to the source end;
S32. the source termination is received above-mentioned request, encrypts said sensitive information with above-mentioned traffic encryption key, and with the transfer check key sensitive information is carried out being transferred to destination after the verification;
S33. destination receives above-mentioned sensitive information, and the integrality of verification sensitive information, and after transmission was accomplished, source end and destination were deleted said legitimate verification sign indicating number, traffic encryption key, transfer check key respectively.
Specifically, in the above-described embodiments, the POS machine sends the order bag to KLD request download initial key; KLD uses TEK to encrypt initial key, uses the verification of TCK calculating initial key, and is transferred to financial POS machine to the initial key after these encryptions.Financial POS machine uses TEK deciphering initial key, uses the integrality of TCK verification initial key, like the complete encrypted transmission process of then having accomplished sensitive data.If imperfect, then repeat above-mentioned steps S32 and S33, accomplish up to this initial key transmission.After transmission was accomplished, financial POS machine and KLD all deleted TAC, TEK and TCK, withdraw from transmission course.
Please refer to Fig. 5, be sensitive information transmission system structure chart of the present invention.This system comprises the source end, storage RSA private key; Destination, storage RSA PKI; Authentication unit carries out legitimate verification to the source end; Transmitting element, if above-mentioned source end is legal, then destination sends the request of downloading sensitive information to the source end, the source end is encrypted the back with sensitive information, and end is sent to destination from the source.
In the above-described embodiments, demo plant specifically comprises: the legitimate verification sign indicating number is the some bytes that produce at random at destination, in order to the legitimacy of checking source end; Traffic encryption key produces at destination at random, in order to encrypted sensitive information in transmission course; The transfer check key produces at destination at random, in order to the integrality of the sensitive information of verification transmission; Utilize the RSA PKI that legitimacy identifying code, traffic encryption key, transfer check key are carried out computing at destination, and transfer to the source end to the ciphertext that computing obtains; The source termination is received above-mentioned ciphertext; Use the RSA private key that said ciphertext is carried out computing; Obtain source end legitimate verification sign indicating number, traffic encryption key, transfer check key expressly; The source end is stored said traffic encryption key, transfer check key, and the legitimate verification sign indicating number is transferred to destination carries out legitimate verification; Destination receives said legitimate verification sign indicating number, and whether checking source end is legal.
In the present embodiment, transmitting element specifically comprises: request unit, in order to send the request of downloading sensitive information to the source end from destination; Ciphering unit, the source termination is received above-mentioned request, encrypts said sensitive information with above-mentioned traffic encryption key, and with the transfer check key sensitive information is carried out being transferred to destination after the verification; Destination receives above-mentioned sensitive information, and the integrality of verification sensitive information, and after transmission was accomplished, source end and destination were deleted said legitimate verification sign indicating number, traffic encryption key, transfer check key respectively.In this embodiment, downloading initial key with the financial field is example, and wherein, KLD, source end legitimate verification sign indicating number, traffic encryption key, transfer check key are described in above-mentioned sensitive information transmission method, repeat no more at this.
The present invention issues PKI in advance to each POS.The download PKI then need not special safety and misses, and is convenient to management.The RSA private key is stored in KLD inside, is only used by KLD.Therefore POS can utilize the computing of RSA to verify the legitimacy of KLD.
The present invention has made full use of the asymmetric property of RSA PKI and private key, produces at random interim encryption key TEK and TCK at POS machine end, has utilized the irreversible characteristic of RSA public key calculation, symmetrical transmission security key is sent to KLD safely to this.Can't crack TEK and TCK under the extraneous situation that can't obtain the RSA private key, and TEK and TCK produce at random, also are uncertain therefore, these mechanism have guaranteed that KLD use TEK and TCK encrypted sensitive message transmission are safe and reliable.
According to this flow process, sensitive information is encrypted by TEK, has guaranteed that the plaintext of sensitive information can't be obtained by the circuit monitoring.Sensitive information uses TCK to carry out verification, also guaranteed hindering and damaging and can in time be detected by the POS terminal on the line to have guaranteed the reliability of data.Because the irreversibility of RSA computing, POS uses the TEK that generates at random the RSA public key encryption to be transferred to KLD, and the KLD that only holds private key could decipher and obtain key plain, and this process has guaranteed the fail safe that temporary key produces.And sensitive information is in transmission course, encrypted by TEK, guaranteed that data do not leak.Sensitive information is by the TCK verification, and its integrality can in time be checked by POS.
It is that whole process need not operator's manual input key on the POS machine that the present invention also has characteristics, can improve the efficient of bank to the POS key management greatly.
Therefore the present invention has solved the initial key download problem of information security field symmetric key well, has avoided the expressly key delivery of form, and has made things convenient for management.
The above is merely embodiments of the invention; Be not so limit claim of the present invention; Every equivalent structure or equivalent flow process conversion that utilizes specification of the present invention and accompanying drawing content to be done; Or directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (20)

1. sensitive information transmission method is used for that end is transferred to destination from the source with sensitive information, and said sensitive information is stored in the source end, it is characterized in that, may further comprise the steps:
S1. end and destination are stored RSA private key and RSA PKI respectively in the source;
S2. utilize above-mentioned RSA private key and above-mentioned RSA PKI that the source end is carried out legitimate verification;
S3. if above-mentioned source end is legal, then destination sends the request of downloading sensitive information to the source end, and the source end is encrypted the back with sensitive information, and end is sent to destination from the source; If above-mentioned source end is illegal, finish.
2. a kind of sensitive information transmission method according to claim 1 is characterized in that said step
S2 specifically may further comprise the steps:
S21. produce some bytes at random as source end legitimate verification sign indicating number at destination;
S22. produce one group of traffic encryption key at random at destination, in order to encrypted sensitive information in transmission course;
S23. produce one group of transfer check key at random at destination, in order to the integrality of the sensitive information of verification transmission;
S24. utilize the RSA PKI that legitimacy identifying code, traffic encryption key, transfer check key are carried out computing at destination, and transfer to the source end to the ciphertext that computing obtains;
S25. the source termination is received above-mentioned ciphertext; Use the RSA private key that said ciphertext is carried out computing; Obtain source end legitimate verification sign indicating number, traffic encryption key, transfer check key expressly; The source end is stored said traffic encryption key, transfer check key, and the legitimate verification sign indicating number is transferred to destination carries out legitimate verification;
S26. destination receives said legitimate verification sign indicating number, and whether checking source end is legal.
3. a kind of sensitive information transmission method according to claim 2 is characterized in that the end empirical tests is legal when said source, and said step S3 specifically may further comprise the steps:
S31. destination sends the request of downloading sensitive information to the source end;
S32. the source termination is received above-mentioned request, encrypts said sensitive information with above-mentioned traffic encryption key, and with the transfer check key sensitive information is carried out being transferred to destination after the verification;
S33. destination receives above-mentioned sensitive information, and the integrality of verification sensitive information, and after transmission was accomplished, source end and destination were deleted said legitimate verification sign indicating number, traffic encryption key, transfer check key respectively.
4. a kind of sensitive information transmission method according to claim 1 is characterized in that, said RSA private key and RSA PKI are generated by source end or third party device, and the source end is stored said private key, and destination is stored said PKI.
5. a kind of sensitive information transmission method according to claim 4 is characterized in that, said third party device is stored in the private key that generates in the smart card, and said source end reads the private key in the smart card.
6. a kind of sensitive information transmission method according to claim 2 is characterized in that, in step S22, adopts the TEK that generates at random as traffic encryption key.
7. a kind of sensitive information transmission method according to claim 6 is characterized in that, said TEK key adopts symmetric encipherment algorithm, comprises TDES or AES.
8. a kind of sensitive information transmission method according to claim 2 is characterized in that, in step S23, adopts TCK as said transfer check key.
9. a kind of sensitive information transmission method according to claim 8 is characterized in that, in step S23, adopts the MAC algorithm that the sensitive information integrality is carried out verification.
10. according to the said a kind of sensitive information transmission method of claim 1, it is characterized in that this transmission method is used for the financial field, said source end is a KLD equipment, and said destination is the POS machine, and said sensitive information is an initial key.
11. a sensitive information transmission system is used for that end is transferred to destination from the source with sensitive information, said sensitive information is stored in the source end, it is characterized in that, comprising:
The source end, storage RSA private key;
Destination, storage RSA PKI;
Authentication unit carries out legitimate verification in order to utilize above-mentioned RSA private key and RSA PKI to the source end;
Transmitting element in order to legal when above-mentioned source end, sends the request of downloading sensitive information from destination to the source end, and the source end is encrypted the back with sensitive information, and end is sent to destination from the source.
12. a kind of sensitive information transmission system according to claim 11 is characterized in that said demo plant comprises:
The legitimate verification sign indicating number is the some bytes that produce at random at destination, in order to the legitimacy of checking source end;
Traffic encryption key produces at destination at random, in order to encrypted sensitive information in transmission course;
The transfer check key produces at destination at random, in order to the integrality of the sensitive information of verification transmission;
Utilize the RSA PKI that legitimacy identifying code, traffic encryption key, transfer check key are carried out computing at destination, and transfer to the source end to the ciphertext that computing obtains; The source termination is received above-mentioned ciphertext; Use the RSA private key that said ciphertext is carried out computing; Obtain source end legitimate verification sign indicating number, traffic encryption key, transfer check key expressly; The source end is stored said traffic encryption key, transfer check key, and the legitimate verification sign indicating number is transferred to destination carries out legitimate verification; Destination receives said legitimate verification sign indicating number, and whether checking source end is legal.
13. a kind of sensitive information transmission system according to claim 11 is characterized in that said transmitting element comprises:
Request unit is in order to send the request of downloading sensitive information from destination to the source end;
Ciphering unit, the source termination is received above-mentioned request, encrypts said sensitive information with above-mentioned traffic encryption key, and with the transfer check key sensitive information is carried out being transferred to destination after the verification;
Destination receives above-mentioned sensitive information, and the integrality of verification sensitive information, and after transmission was accomplished, source end and destination were deleted said legitimate verification sign indicating number, traffic encryption key, transfer check key respectively.
14. a kind of sensitive information transmission system according to claim 11 is characterized in that, said RSA private key and RSA PKI are generated by source end or third party device, and the source end is stored said private key, and destination is stored said PKI.
15. a kind of sensitive information transmission system according to claim 14 is characterized in that, said third party device is stored in the private key that generates in the smart card, and said source end reads the private key in the smart card.
16. a kind of sensitive information transmission system according to claim 12 is characterized in that, traffic encryption key is the TEK key that generates at random.
17. a kind of sensitive information transmission system according to claim 16 is characterized in that, said TEK key adopts symmetric encipherment algorithm, comprises TDES or AES.
18. a kind of sensitive information transmission system according to claim 12 is characterized in that, said transfer check key is the TCK that generates at random.
19. a kind of sensitive information transmission system according to claim 18 is characterized in that, adopts the MAC algorithm that the sensitive information integrality is carried out verification.
20. according to the said a kind of sensitive information transmission system of claim 11, it is characterized in that this transmission system is used for the financial field, said source end is a KLD equipment, said destination is the POS machine, and said sensitive information is an initial key.
CN201210047114.2A 2012-02-27 2012-02-27 Sensitive information transmission method and sensitive information transmission system Active CN102624710B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210047114.2A CN102624710B (en) 2012-02-27 2012-02-27 Sensitive information transmission method and sensitive information transmission system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210047114.2A CN102624710B (en) 2012-02-27 2012-02-27 Sensitive information transmission method and sensitive information transmission system

Publications (2)

Publication Number Publication Date
CN102624710A true CN102624710A (en) 2012-08-01
CN102624710B CN102624710B (en) 2015-03-11

Family

ID=46564395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210047114.2A Active CN102624710B (en) 2012-02-27 2012-02-27 Sensitive information transmission method and sensitive information transmission system

Country Status (1)

Country Link
CN (1) CN102624710B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714642A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system
CN103714637A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Method and system for sending transmission key and operation terminal
WO2014139344A1 (en) * 2013-03-15 2014-09-18 福建联迪商用设备有限公司 Key download method, management method, download management method and device, and system
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN105761066A (en) * 2016-02-04 2016-07-13 福建联迪商用设备有限公司 Bank card password protection method and system
CN107135070A (en) * 2017-04-25 2017-09-05 上海汇尔通信息技术有限公司 Method for implanting, framework and the system of RSA key pair and certificate
CN107888379A (en) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 A kind of method of secure connection, POS terminal and code keypad

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929367A (en) * 2005-09-10 2007-03-14 腾讯科技(深圳)有限公司 Game data-transmission method and system
CN101272301A (en) * 2008-05-07 2008-09-24 广州杰赛科技股份有限公司 Safety access method of wireless metropolitan area network
CN101431410A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Authentication method for network game client and server cluster

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929367A (en) * 2005-09-10 2007-03-14 腾讯科技(深圳)有限公司 Game data-transmission method and system
CN101431410A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Authentication method for network game client and server cluster
CN101272301A (en) * 2008-05-07 2008-09-24 广州杰赛科技股份有限公司 Safety access method of wireless metropolitan area network

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729940B (en) * 2013-03-15 2016-06-15 福建联迪商用设备有限公司 A kind of main cipher key T MK method for safely downloading of terminal and system
CN103714634A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Method and system for safely downloading terminal master key
CN103714634B (en) * 2013-03-15 2016-06-15 福建联迪商用设备有限公司 A kind of method of main key of secure download terminal and system
CN103714642A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system
WO2014139344A1 (en) * 2013-03-15 2014-09-18 福建联迪商用设备有限公司 Key download method, management method, download management method and device, and system
WO2014139342A1 (en) * 2013-03-15 2014-09-18 福建联迪商用设备有限公司 Key downloading method, management method, downloading management method, device and system
US9806889B2 (en) 2013-03-15 2017-10-31 Fujian Landi Commercial Equipment Co., Ltd. Key downloading method, management method, downloading management method, device and system
CN103714637B (en) * 2013-03-15 2016-03-16 福建联迪商用设备有限公司 A kind of transmission security key sending method and system, operating terminal
US9647845B2 (en) 2013-03-15 2017-05-09 Fujian Landi Commercial Equipment Co., Ltd Key downloading method, management method, downloading management method, device and system
CN103714637A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Method and system for sending transmission key and operation terminal
CN103729940A (en) * 2013-03-15 2014-04-16 福建联迪商用设备有限公司 Method and system for safe downloading of TMK
CN103716155B (en) * 2013-03-15 2016-08-17 福建联迪商用设备有限公司 A kind of method of automated maintenance POS terminal and operation terminal
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
US20180308097A1 (en) * 2016-02-04 2018-10-25 Fujian Landi Commercial Equipment Co., Ltd. Bankcard Password Protection Method and System
WO2017133204A1 (en) * 2016-02-04 2017-08-10 福建联迪商用设备有限公司 Bank card password protection method and system
CN105761066A (en) * 2016-02-04 2016-07-13 福建联迪商用设备有限公司 Bank card password protection method and system
CN107135070A (en) * 2017-04-25 2017-09-05 上海汇尔通信息技术有限公司 Method for implanting, framework and the system of RSA key pair and certificate
CN107888379A (en) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 A kind of method of secure connection, POS terminal and code keypad

Also Published As

Publication number Publication date
CN102624710B (en) 2015-03-11

Similar Documents

Publication Publication Date Title
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
US10769628B2 (en) Transaction messaging
CN103729941B (en) A kind of main cipher key T MK method for safely downloading of terminal and system
CN102624711B (en) Sensitive information transmission method and sensitive information transmission system
US9806889B2 (en) Key downloading method, management method, downloading management method, device and system
CN110881048B (en) Safety communication method and device based on identity authentication
CN107896147B (en) Method and system for negotiating temporary session key based on national cryptographic algorithm
CN102624710B (en) Sensitive information transmission method and sensitive information transmission system
WO2014139343A1 (en) Key downloading method, management method, downloading management method, apparatus and system
CN106227503A (en) Safety chip COS firmware update, service end, terminal and system
CN103716168A (en) Secret key management method and system
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN101247605A (en) Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN107104795B (en) Method, framework and system for injecting RSA key pair and certificate
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN107483388A (en) A kind of safety communicating method and its terminal and high in the clouds
CN102056156B (en) Computer Data Security is downloaded to the method and system of mobile terminal
CN1913547B (en) Card distributing user terminer, paying center, and method and system for protecting repaid card data
CN102594564A (en) Equipment for traffic guidance information security management
CN104883260A (en) Certificate information processing and verification methods, processing terminal, and verification server
CN105227312A (en) Intelligent code key password authentification extracting method
CN108323231B (en) Method for transmitting key, receiving terminal and distributing terminal
CN105120425A (en) M2M identification method and apparatus, internet of things terminal and M2M identification system
CN103532714A (en) Method and system for transmitting data from data provider to intelligent card
CN117749472A (en) Data encryption and transmission method for safety vision meter reading system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant