CN103714637B - A kind of transmission security key sending method and system, operating terminal - Google Patents

A kind of transmission security key sending method and system, operating terminal Download PDF

Info

Publication number
CN103714637B
CN103714637B CN201310740380.8A CN201310740380A CN103714637B CN 103714637 B CN103714637 B CN 103714637B CN 201310740380 A CN201310740380 A CN 201310740380A CN 103714637 B CN103714637 B CN 103714637B
Authority
CN
China
Prior art keywords
data
wcrt
sign
key
pack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310740380.8A
Other languages
Chinese (zh)
Other versions
CN103714637A (en
Inventor
洪逸轩
苏文龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN2013100846716A external-priority patent/CN103220270A/en
Priority claimed from CN2013100846538A external-priority patent/CN103237005A/en
Priority claimed from CN2013100846735A external-priority patent/CN103220271A/en
Priority claimed from CN2013100843972A external-priority patent/CN103237004A/en
Application filed by Fujian Landi Commercial Equipment Co Ltd filed Critical Fujian Landi Commercial Equipment Co Ltd
Priority to CN201310740380.8A priority Critical patent/CN103714637B/en
Publication of CN103714637A publication Critical patent/CN103714637A/en
Application granted granted Critical
Publication of CN103714637B publication Critical patent/CN103714637B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a kind of transmission security key sending method and system, and the method comprising the steps of: operating terminal gathers TK from POS terminal; Operating terminal carries out packing to TK and generates packing data Pack; Operating terminal use work certificate WCRT corresponding private key WCRT_prk signs to Pack and signature time Time_sign and encloses WCRT; Cryptographic hash Hash1 is calculated to Pack and Time_sign; After using the corresponding WCRT_prk of WCRT to be sent to server to Hash1 encryption generating ciphertext C_sign, checking WCRT legitimacy; Verify that legal rear extraction PKI WCRT_pu is decrypted ciphertext C_sign, obtain expressly Hash2; Pack and Time_sign is calculated and generates cryptographic hash Hash3; Contrast Hash2 and Hash3, if consistent decision data is not distorted, otherwise decision data is distorted.

Description

A kind of transmission security key sending method and system, operating terminal
Technical field
The present invention relates to E-Payment field, particularly relate to a kind of transmission security key sending method and system, operating terminal.
Background technology
Bank card (BANKCard) is more and more universal as the means of payment, common bank card paying system comprises point of sales terminal (PointOfSale, POS), POS receives single system (POSP), code keypad (PINPAD) and hardware encipher machine (HardwareandSecurityModule, HSM).Wherein POS terminal can accept bank card information, has communication function, and the equipment that the instruction accepting teller completes financial transaction information and exchanges for information about; POS receives single system and manages concentratedly POS terminal, comprises parameter downloads, and key is downloaded, and accepts, processes or forward the transaction request of POS terminal, and to POS terminal loopback transaction results information, is the system of centralized management and transaction processing; Code keypad (PINPAD) is that the key relevant to various financial transaction carries out safe storage protection, and is encrypted the safety equipment of protection to PIN; Hardware encipher machine (HSM) is the peripheral hardware devices be encrypted transmission data, for the encryption and decryption of PIN, the correctness verifying message and document source and storage key.Personal identification code (PersonalIdentificationNumber, PIN), i.e. personal identification number are the data messages identifying holder's identity legitimacy in on-line transaction, and in cyber-net system, any link does not allow to occur in mode expressly; Terminal master key (TerminalMasterKey, TMK), during POS terminal work, to the master key that working key is encrypted, encrypting storing is in system database; POS terminal is widely used in bank card and pays occasion, and such as manufacturer's shopping, hotel accommodations etc. are a kind of indispensable modernization means of payment, has incorporated the various occasions of people's life.Bank card; particularly debit card; generally all be provided with PIN by holder; carrying out in payment process; POS terminal is except above sending the data such as the magnetic track information of bank card; also want holder to input the identity legitimacy of PIN for issuing bank checking holder, guarantee bank card safety of payment, the property safety of protection holder.Reveal to prevent PIN or be cracked; require from terminal to issuing bank in whole information interactive process; whole process carries out safety encipher protection to PIN; do not allow any link in computer network system; PIN occurs in mode expressly, and the POS terminal therefore accepting input PIN at present all requires to be equipped with key management system.
The key code system of POS terminal is divided into secondary: terminal master key (TMK) and working key (WK).Wherein TMK is in WK renewal process, is encrypted protection to WK.Share unique TMK between every platform POS terminal and POS, must have safeguard protection, guarantee can only write device participate in calculating, and can not read; TMK is a very crucial root key, if TMK is intercepted, working key is just cracked than being easier to, by serious threat bank card safety of payment.So can secure download TMK to POS terminal, become the key of whole POS terminal security.Conclude existing TMK download scenarios below as follows:
1, the female POS scheme of key: user receives the single system hardware encipher machine traffic encryption key the same with key female POS input at POS.POS terminal receives single system initiating terminal master key download request by the female POS of key to POS, POS receives single system and drives hardware encipher machine stochastic generation terminal master key, and by traffic encryption key encrypted transmission to the female POS of key, POS terminal is transferred to again after the female POS traffic encryption key deciphering of key, POS terminal obtains terminal master key expressly, be saved in POS terminal code keypad, thus realize POS terminal and POS and receive the synchronous of terminal master key between single system.
2, IC-card decrypt scheme: user injects the same traffic encryption key in POS receipts single system hardware encipher machine with IC-card.IC-card is inserted POS terminal by user, POS terminal receives single system initiating terminal master key download request to POS, POS receives single system and drives hardware encipher machine stochastic generation terminal master key, and by traffic encryption key encrypted transmission to POS terminal, traffic encryption key decryption terminal master key ciphertext in POS terminal IC-card, obtain terminal master key expressly, be saved in POS terminal code keypad, thus realize POS terminal and POS and receive the synchronous of terminal master key between single system.
Above-mentioned two schemes has following shortcoming: terminal master key expressly appears at outside safety equipment, and for taking precautions against Key Exposure risk, the download of terminal master key must control to carry out at the safe machine room of administrative center, by manually concentrating download terminal master key.Thus bring that " maintenance centre's machine room workload is large; Need to be transported to administrative center's safe machine room download key after equipment dispatches from the factory and just can be deployed to trade company, transportation cost rises; In order to concentrate under fill key, need a large amount of staff and working time, maintenance cost is large, maintenance period is long " etc. problem.
Summary of the invention
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is:
A kind of transmission security key sending method is provided, comprises step: operating terminal collects transmission security key TK from POS terminal; Operating terminal carries out packing to transmission security key TK and generates packing data Pack, packing data Pack comprises the public key certificate sequence number Serial_pu of version number Ver_pack, POS terminal sequence number SN, encryption TK data, TK data parameters Para_tk, TK data ciphertext C_tk; Operating terminal is sent to server after being signed by packing data.
Wherein, described " operating terminal carries out packing to transmission security key TK and generates packing data Pack " specifically comprises step:
According to different pieces of information curriculum offering difference bag version number Ver_pack;
POS terminal sequence number SN is obtained from the POS terminal producing transmission security key TK;
At least one TK data ciphertext C_tk that generation and the encryption that uses public-key generate POS terminal is obtained from the POS terminal producing transmission security key TK;
The TK data parameters Para_tk comprising the version of TK, the algorithm types of the use of TK, length parameter and TK data ciphertext number is obtained from the POS terminal producing transmission security key TK.
Wherein, described " operating terminal is sent to server after being signed by packing data " specifically comprises step:
Operating terminal use work certificate WCRT corresponding private key WCRT_prk, carries out signature operation to packing data Pack and signature time Time_sign entirety, and encloses the legal work certificate WCRT of server authentication.
Wherein, described signature operation specifically comprises step: calculate cryptographic hash Hash1 to packing data Pack and signature time Time_sign; Use work certificate corresponding private key WCRT_prk encrypts generating ciphertext C_sign to cryptographic hash Hash1, and this ciphertext is signed data C_sign.
Wherein, described signature operation also comprises step:
After server receives the packing data of signature, the legitimacy of checking work certificate WCRT;
Verify legal after, extract PKI WCRT_pu from work certificate WCRT, the signature C_sign decrypt data that the WCRT_pu that uses public-key generates packing data Pack and signature time Time_sign, obtain expressly Hash2;
Hash is calculated to packing data Pack and signature time Time_sign, generates cryptographic hash Hash3;
Whether Hash2 with Hash3 be consistent in contrast, if consistent decision data is not distorted, if inconsistent, decision data is distorted.
Another technical solution used in the present invention is:
A kind of operating terminal is provided, comprises:
TK acquisition module, for collecting transmission security key TK from POS terminal;
Packetization module, packing data Pack is generated for carrying out packing to transmission security key TK, packing data Pack comprises the public key certificate sequence number Serial_pu of version number Ver_pack, POS terminal sequence number SN, encryption TK data, TK data parameters Para_tk, TK data ciphertext C_tk; And
Signature blocks, is sent to server after being signed by packing data.
Wherein, described packetization module comprises:
Module is set, for wrapping version number Ver_pack according to different pieces of information curriculum offering difference;
First extraction module, for extracting POS terminal sequence number SN in the POS terminal from generation transmission security key TK;
Second extraction module, for being extracted in POS terminal at least one TK data ciphertext C_tk that the encryption that generates and use public-key generates in the POS terminal from generation transmission security key TK; And
3rd extraction module, for extracting the TK data parameters Para_tk comprising the version of TK, the algorithm types of the use of TK, length parameter and TK data ciphertext number from the POS terminal producing transmission security key TK.
Wherein, described signature blocks, specifically for operating terminal use work certificate WCRT corresponding private key WCRT_prk, is carried out signature operation to packing data Pack and signature time Time_sign entirety, and is enclosed the legal work certificate WCRT of server authentication.
Wherein, described signature blocks specifically comprises:
First computing module, for calculating cryptographic hash Hash1 to packing data Pack and signature time Time_sign; And
Encrypting module, for using work certificate corresponding private key WCRT_prk to cryptographic hash Hash1 generating ciphertext C_sign, this ciphertext is signed data C_sign.
Another technical solution used in the present invention is:
A kind of transmission security key transmitting system, the server comprising at least one operating terminal and communicate to connect with operating terminal, described operating terminal is described above, described server comprises: server identity correction verification module, for receive signature when server packing data after, the legitimacy of checking work certificate WCRT; Deciphering module, for after the checking of server identity correction verification module is legal, extract PKI WCRT_pu from work certificate WCRT, the WCRT_pu that uses public-key is decrypted the signed data C_sign that packing data Pack and signature time Time_sign generates, and obtains expressly Hash2; Second computing module, for calculating Hash to packing data Pack and signature time Time_sign, generates cryptographic hash Hash3; And determination module, whether consistent for contrasting Hash2 with Hash3, if consistent decision data is not distorted, if inconsistent, decision data is distorted.
A kind of transmission security key sending method of the present invention and system, operating terminal, generate packing data by transmission security key TK is packed and be sent to server after carrying out signature operation, server carries out authentication determination again, confirm that transmission data are not tampered, what achieve transmission security key TK safety transfers to server from POS terminal collection.Avoid transmission security key TK to be distorted by intercepting in transmitting procedure, and then ensure that the master key that equipment end can not be tampered from the download of Server remote safety.
Accompanying drawing explanation
Fig. 1 is the structured flowchart of a kind of operating terminal in an embodiment of the present invention;
Fig. 2 is the functional block diagram of packetization module in Fig. 1;
Fig. 3 is the functional block diagram of signature blocks in Fig. 1;
Fig. 4 is the system chart of a kind of transmission security key transmitting system in an embodiment of the present invention;
Fig. 5 is the process flow diagram of a kind of transmission security key sending method in an embodiment of the present invention;
Fig. 6 is flowchart transmission security key packing being generated packing data;
Fig. 7 is the concrete flowchart being sent to server after packing data is signed by operating terminal;
Fig. 8 is another implementation method process flow diagram of transmission security key sending method described in Fig. 7.
Main element symbol description
Operating terminal 1; TK acquisition module 10; Packetization module 20; Signature blocks 30;
Module 21 is set; First extraction module 22; Second extraction module 23; 3rd extraction module 24;
First computing module 31; Encrypting module 32; Server identity correction verification module 40;
Deciphering module 50; Second computing module 60; Determination module 70.
Embodiment
By describing technology contents of the present invention, structural attitude in detail, realized object and effect, accompanying drawing is coordinated to be explained in detail below in conjunction with embodiment.
For solving the technical matters existed in background technology, the present invention adopts a kind of new master key download scenarios, TK(TransmissionKey is produced at random by POS terminal, transmission security key), TK after producing is stored in the code keypad of POS terminal, and TK is sent to KMS(KeyManagementSystem, key management system, for office terminal master key TMK by transmission mode required under various application scenarios) in.
As POS terminal application download terminal master key TMK, KMS system uses TK ciphering terminal master key TMK, and the terminal master key ciphertext after encryption is sent to POS terminal, POS terminal is decrypted master key ciphertext with TK after receiving, obtain terminal master key TMK, and terminal master key TMK is kept in code keypad.
So, by TK ciphering terminal master key TMK, enable TMK carry out remote transmission, facilitate the secure download of TMK.In some scenarios, operating terminal is adopted to gather the TK of POS terminal generation, and be responsible for TK being transferred to MTMS system (MaterialTrackingManagementSystem by operating terminal, Tracing Material system, mainly use in plant produced), TK is managed by MTMS systematic unity, and TK is sent to corresponding KMS system, MTMS system and KMS system produce arranging key respectively by the first hardware encipher machine and the second hardware encipher machine, and MTMS system and KMS system through consultation key carry out transmission and the certification of data.Described course of conveying is by CA center (CertificateAuthority, certificate authority, adopt PublicKeyInfrastructure public key infrastructure technology, network ID authentication service is provided specially, be responsible for signing and issuing and managing digital certificate, and there is third party's trust authority that is authoritative and fairness) differentiate the identity of operating terminal, MTMS system and KMS system.Adopt the rights management that operating terminal collection TK can facilitate the acquisition operations of TK (can realize a key collection etc.) and TK to gather; Adopt MTMS system conveniently to TK unified management, data search and the download of POS terminal during after-sales service later can be facilitated, can realize, by manufacture order bulk transfer TK, facilitating the transfer management of TK by MTMS system, prevent TK from misinformating to the object of mistake; Introducing CA center can prevent pseudo-terminal and pseudo-KMS system from stealing TK.Above by being sent to bank's end after POS terminal collect and transmit cipher key T K, TMK is encrypted, then the transmission security of TMK can be ensured by the method for the TMK of POS terminal remote download after TK encryption.
The TK of POS terminal generation is gathered at described employing operating terminal, and be responsible for TK to be transferred to MTMS system by operating terminal, managed in the scheme of TK by MTMS systematic unity, because operating terminal needs support terminal master key remote download function, need to ensure transmission security key TK data to be transferred to server from operating terminal safely, confirm after server carries out again authentication determination that transmission data are not tampered, change the unified KT significantly reducing KMS system that uploads of third party into by the scattered TK of uploading of original POS terminal and receive work load.Given this, the technical scheme of solution is provided for this problem below.
Referring to Fig. 1, is the structured flowchart of a kind of operating terminal in one embodiment of the present invention.This operating terminal comprises TK acquisition module 10, packetization module 20 and signature blocks 30.Comprise private key and corresponding operating terminal certificate in described operating terminal 1, described TK acquisition module 10 collects transmission security key TK for operating terminal from POS terminal; Described packetization module 20 carries out packing process for operating terminal to transmission security key TK, generate packing data Pack, wherein, packing data Pack comprises the public key certificate sequence number Serial_pu of version number Ver_pack, POS terminal sequence number SN, encryption TK data, TK data parameters Para_tk, TK data ciphertext C_tk; Described signature blocks 30 is sent to server after being signed by packing data Pack for operating terminal.Described POS terminal sequence number SN, for afterwards by this packing data, issues concrete terminal device; Which public key decryptions the PKI sequence number of described encryption TK data, use for determining afterwards; Described server is the Tracing Material system MTMS of POS terminal, described packing data also can comprise multiple TK parameter, multiple TK data and packing data rise time, described multiple TK parameter is for representing different TK forms, and when the described rise time completes packing for reviewing these data and transmit.
Referring to Fig. 2, is the functional block diagram of packetization module in Fig. 1.Packetization module 20 comprises and arranges module 21, first extraction module 22, second extraction module 23 and the 3rd extraction module 24.Described first extraction module 22 is for extracting the sequence number SN of POS terminal in the POS terminal from generation transmission security key TK; At least one TK data ciphertext C_tk that described second extraction module 23 generates for being extracted in POS terminal the encryption that generates and use public-key in the POS terminal from generation transmission security key TK; Described 3rd extraction module 24 comprises the TK data parameters Para_tk of the version of TK, the algorithm types of the use of TK, length parameter and TK data ciphertext number for extracting from the POS terminal producing transmission security key TK.
Referring to Fig. 3, is the functional block diagram of signature blocks in Fig. 1.Described signature blocks 30, specifically for using work certificate WCRT corresponding private key WCRT_prk, is carried out signature operation to packing data Pack and signature time Time_sign entirety, and is enclosed the legal work certificate WCRT of server authentication.
Signature blocks 30 comprises the first computing module 31 and encrypting module 32.Described first computing module 31 carries out calculating cryptographic hash Hash1 for the signature time Time_sign of the packing data Pack that generates packetization module 20 and packing data Pack; Encrypting module 32 encrypts generating ciphertext C_sign for using corresponding private key WCRT_prk in work certificate to the cryptographic hash Hash1 that described first computing module calculates, and this ciphertext is signed data C_sign, after signature terminates, signed data is sent to server.
Refer to Fig. 4, it is the system chart of a kind of transmission security key transmitting system in an embodiment of the present invention, this transmission security key transmitting system comprises operating terminal described at least one, also comprise the server communicated to connect with operating terminal, described server comprises: server identity correction verification module 40, deciphering module 50, second computing module 60 and determination module 70.Wherein, described server identity correction verification module 40 for after the packing data that receives signature when server and signed data C_sign, the legitimacy of the certificate WCRT that works in certifying signature data; Described deciphering module 50, for when checking work certificate WCRT legal after, from work certificate WCRT, extract PKI WCRT_pu, the WCRT_pu that uses public-key is decrypted the signed data C_sign that packing data Pack and signature time Time_sign generates, and obtains expressly Hash2; Described second computing module 60, for calculating Hash to packing data Pack and signature time Time_sign, generates cryptographic hash Hash3; Whether described determination module 70 is consistent with Hash3 for contrasting cryptographic hash Hash2, then judges that transmission security key TK data are not tampered if consistent, if inconsistent, then judges that transmission security key TK Data Data is distorted.
Referring to Fig. 5, is the process flow diagram of a kind of transmission security key sending method in one embodiment of the present invention.The method comprises:
Step S101, operating terminal collect transmission security key TK from POS terminal;
Step S201, operating terminal carry out packing to transmission security key TK and generate packing data Pack, packing data Pack comprises the public key certificate sequence number Serial_pu of version number Ver_pack, POS terminal sequence number SN, encryption TK data, TK data parameters Para_tk, TK data ciphertext C_tk; Described POS terminal sequence number SN, for afterwards by this packing data, issues concrete terminal device; Which public key decryptions the PKI sequence number of described encryption TK data, use for determining afterwards; Described packing data also can comprise multiple TK parameter, multiple TK data, the version number of encrypted transmission cipher key T K and packing data rise time, described multiple TK parameter is for representing different TK forms, the version number of described encrypted transmission cipher key T K, described version number, selects corresponding version number to upgrade for during system upgrade afterwards.It is when complete packing and transmit that the described rise time is used for reviewing these data.
Step S301, operating terminal are sent to server after being signed by packing data Pack.
Referring to Fig. 6, is flowchart transmission security key packing being generated packing data.The method comprises:
Step S201, according to different pieces of information curriculum offering difference bag version number Ver_pack;
Step S202, obtain POS terminal sequence number SN from the POS terminal producing transmission security key TK;
Step S203, to obtain from the POS terminal producing transmission security key TK and to generate POS terminal and at least one TK data ciphertext C_tk that the encryption that uses public-key generates;
Step S204, obtain the TK data parameters Para_tk comprising the version of TK, the algorithm types of the use of TK, length parameter and TK data ciphertext number from the POS terminal producing transmission security key TK;
Referring to Fig. 7, is the concrete flowchart being sent to server after packing data is signed by operating terminal.Described " operating terminal is sent to server after being signed by packing data " specifically comprises step:
The private key WCRT_prk that step S301, operating terminal use work certificate WCRT are corresponding carries out signature operation to packing data Pack and signature time Time_sign entirety, and encloses the legal work certificate WCRT of server authentication;
Step S302, be sent to server.
In Fig. 7, operating terminal is sent to server after being signed by packing data, and its signature operation specifically comprises:
Cryptographic hash Hash1 is calculated to packing data Pack and signature time Time_sign; Use work certificate corresponding private key WCRT_prk encrypts generating ciphertext C_sign to cryptographic hash Hash1, and this ciphertext is signed data C_sign.
Refer to Fig. 8, a kind of transmission security key sending method also comprises:
After step S401, the packing data receiving signature when server and signed data C_sign, the legitimacy of the certificate WCRT that works in certifying signature data;
Step S501, when checking work certificate WCRT legal after, PKI WCRT_pu is extracted from work certificate WCRT, the WCRT_pu that uses public-key is decrypted the signed data C_sign that packing data Pack and signature time Time_sign generates, and obtains expressly Hash2;
Step S601, to packing data Pack and signature time Time_sign calculate Hash, generate cryptographic hash Hash3;
Whether cryptographic hash Hash2 is consistent with Hash3 for step S701, contrast, then performs step S703, judges that transmission security key TK data are not tampered if consistent, if inconsistent, then perform step S702 and judges that transmission security key TK Data Data is distorted.
A kind of transmission security key sending method of the present invention and system, operating terminal, generate packing data by transmission security key TK is packed and be sent to server after carrying out signature operation, server carries out authentication determination again, confirm that transmission data are not tampered, what achieve transmission security key TK safety transfers to server from POS terminal collection.Not only avoid transmission security key TK to be distorted by intercepting in transmitting procedure, and ensure that the master key that equipment end can not be tampered from the download of Server remote safety.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (8)

1. a transmission security key sending method, is characterized in that, comprises step:
Operating terminal is from POS terminal collect and transmit cipher key T K;
Operating terminal carries out packing to transmission security key TK and generates packing data Pack, packing data Pack comprises the public key certificate sequence number Serial_pu of version number Ver_pack, POS terminal sequence number SN, encryption TK data, TK data parameters Para_tk, TK data ciphertext C_tk;
Operating terminal is sent to server after being signed by packing data;
Wherein said " operating terminal carries out packing to transmission security key TK and generates packing data Pack " specifically comprises step:
According to different pieces of information curriculum offering difference bag version number Ver_pack;
POS terminal sequence number SN is obtained from the POS terminal producing transmission security key TK;
At least one TK data ciphertext C_tk that generation and the encryption that uses public-key generate POS terminal is obtained from the POS terminal producing transmission security key TK;
The TK data parameters Para_tk comprising the version of TK, the algorithm types of the use of TK, length parameter and TK data ciphertext number is obtained from the POS terminal producing transmission security key TK.
2. a kind of transmission security key sending method according to claim 1, is characterized in that, described " operating terminal is sent to server after being signed by packing data " specifically comprises step:
Operating terminal use work certificate WCRT corresponding private key WCRT_prk, carries out signature operation to packing data Pack and signature time Time_sign entirety, and encloses the legal work certificate WCRT of server authentication.
3. a kind of transmission security key sending method according to claim 2, it is characterized in that, described signature operation specifically comprises step:
Cryptographic hash Hash1 is calculated to packing data Pack and signature time Time_sign;
Use work certificate corresponding private key WCRT_prk encrypts generating ciphertext C_sign to cryptographic hash Hash1, and this ciphertext is signed data C_sign.
4. a kind of transmission security key sending method according to claim 3, is characterized in that, also comprise step:
After server receives the packing data of signature, the legitimacy of checking work certificate WCRT;
Verify legal after, extract PKI WCRT_pu from work certificate WCRT, the signature C_sign decrypt data that the WCRT_pu that uses public-key generates packing data Pack and signature time Time_sign, obtain expressly Hash2;
Hash is calculated to packing data Pack and signature time Time_sign, generates cryptographic hash Hash3;
Whether Hash2 with Hash3 be consistent in contrast, if consistent decision data is not distorted, if inconsistent, decision data is distorted.
5. an operating terminal, is characterized in that, comprising:
TK acquisition module, for from POS terminal collect and transmit cipher key T K;
Packetization module, packing data Pack is generated for carrying out packing to transmission security key TK, packing data Pack comprises the public key certificate sequence number Serial_pu of version number Ver_pack, POS terminal sequence number SN, encryption TK data, TK data parameters Para_tk, TK data ciphertext C_tk; And
Signature blocks, is sent to server after being signed by packing data;
Wherein said packetization module comprises:
Module is set, for wrapping version number Ver_pack according to different pieces of information curriculum offering difference;
First extraction module, for extracting POS terminal sequence number SN in the POS terminal from generation transmission security key TK;
Second extraction module, for being extracted in POS terminal at least one TK data ciphertext C_tk that the encryption that generates and use public-key generates in the POS terminal from generation transmission security key TK; And
3rd extraction module, for extracting the TK data parameters Para_tk comprising the version of TK, the algorithm types of the use of TK, length parameter and TK data ciphertext number from the POS terminal producing transmission security key TK.
6. a kind of operating terminal according to claim 5, it is characterized in that, described signature blocks is specifically for operating terminal use work certificate WCRT corresponding private key WCRT_prk, signature operation is carried out to packing data Pack and signature time Time_sign entirety, and encloses the legal work certificate WCRT of server authentication.
7. a kind of operating terminal according to claim 6, is characterized in that, described signature blocks specifically comprises:
First computing module, for calculating cryptographic hash Hash1 to packing data Pack and signature time Time_sign; And
Encrypting module, for using work certificate corresponding private key WCRT_prk to cryptographic hash Hash1 generating ciphertext C_sign, this ciphertext is signed data C_sign.
8. a transmission security key transmitting system, is characterized in that, the server comprising at least one operating terminal and communicate to connect with operating terminal, and described operating terminal is as described in claim 5-7 any one, and described server comprises:
Server identity correction verification module, for receive signature when server packing data after, the legitimacy of checking work certificate WCRT;
Deciphering module, for after the checking of server identity correction verification module is legal, extract PKI WCRT_pu from work certificate WCRT, the WCRT_pu that uses public-key is decrypted the signed data C_sign that packing data Pack and signature time Time_sign generates, and obtains expressly Hash2;
Second computing module, for calculating Hash to packing data Pack and signature time Time_sign, generates cryptographic hash Hash3; And
Determination module, whether consistent for contrasting Hash2 with Hash3, if consistent decision data is not distorted, if inconsistent, decision data is distorted.
CN201310740380.8A 2013-03-15 2013-12-27 A kind of transmission security key sending method and system, operating terminal Active CN103714637B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310740380.8A CN103714637B (en) 2013-03-15 2013-12-27 A kind of transmission security key sending method and system, operating terminal

Applications Claiming Priority (13)

Application Number Priority Date Filing Date Title
CN2013100846735 2013-03-15
CN201310084673.5 2013-03-15
CN2013100843972 2013-03-15
CN2013100846716A CN103220270A (en) 2013-03-15 2013-03-15 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310084397.2 2013-03-15
CN2013100846716 2013-03-15
CN2013100846538 2013-03-15
CN201310084671.6 2013-03-15
CN201310084653.8 2013-03-15
CN2013100846538A CN103237005A (en) 2013-03-15 2013-03-15 Method and system for key management
CN2013100846735A CN103220271A (en) 2013-03-15 2013-03-15 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN2013100843972A CN103237004A (en) 2013-03-15 2013-03-15 Key download method, key management method, method, device and system for download management
CN201310740380.8A CN103714637B (en) 2013-03-15 2013-12-27 A kind of transmission security key sending method and system, operating terminal

Publications (2)

Publication Number Publication Date
CN103714637A CN103714637A (en) 2014-04-09
CN103714637B true CN103714637B (en) 2016-03-16

Family

ID=50363015

Family Applications (28)

Application Number Title Priority Date Filing Date
CN201310740644.XA Active CN103714638B (en) 2013-03-15 2013-12-27 A kind of method and system of quick position terminal master key failed download
CN201310740231.1A Active CN103714635B (en) 2013-03-15 2013-12-27 A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN201310741948.8A Active CN103714639B (en) 2013-03-15 2013-12-27 A kind of method and system that realize the operation of POS terminal security
CN201310740642.0A Active CN103731259B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and systems
CN201310740360.0A Active CN103714636B (en) 2013-03-15 2013-12-27 A kind of method of batch capture and upload transfers cipher key T K data and operating terminal
CN201310740158.8A Active CN103716320B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and systems
CN201310740537.7A Active CN103746800B (en) 2013-03-15 2013-12-27 TMK (terminal master key) safe downloading method and system
CN201310740540.9A Active CN103716154B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and systems
CN201310740308.5A Active CN103729941B (en) 2013-03-15 2013-12-27 A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740430.2A Active CN103729943B (en) 2013-03-15 2013-12-27 A kind of method and system transmission security key being imported KMS system
CN201310742991.6A Active CN103714641B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK method for safely downloading and system
CN201310740285.8A Active CN103729940B (en) 2013-03-15 2013-12-27 A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740226.0A Active CN103714634B (en) 2013-03-15 2013-12-27 A kind of method of main key of secure download terminal and system
CN201310740574.8A Active CN103729945B (en) 2013-03-15 2013-12-27 A kind of method and system of secure download terminal master key
CN201310742886.2A Active CN103716321B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and systems
CN201310740264.6A Active CN103701812B (en) 2013-03-15 2013-12-27 TMK (Terminal Master Key) secure downloading method and system
CN201310740567.8A Active CN103729944B (en) 2013-03-15 2013-12-27 A kind of method and system of secure download terminal master key
CN201310742681.4A Active CN103714640B (en) 2013-03-15 2013-12-27 A kind of sending method of transmission security key and system
CN201310740410.5A Active CN103729942B (en) 2013-03-15 2013-12-27 Transmission security key is transferred to the method and system of key server from terminal server
CN201310740100.3A Active CN103714633B (en) 2013-03-15 2013-12-27 A kind of method of safe generating transmission key and POS terminal
CN201310742686.7A Active CN103745351B (en) 2013-03-15 2013-12-27 A kind of acquisition method and system for transmitting cipher key T K
CN201310740188.9A Active CN103716153B (en) 2013-03-15 2013-12-27 Terminal master key TMK safety downloading method and systems
CN201310742661.7A Active CN103716167B (en) 2013-03-15 2013-12-27 Method and device for safely collecting and distributing transmission keys
CN201310741949.2A Active CN103731260B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and system
CN201310740244.9A Active CN103701609B (en) 2013-03-15 2013-12-27 A kind of server and the method and system operating terminal two-way authentication
CN201310742648.1A Active CN103716155B (en) 2013-03-15 2013-12-27 A kind of method of automated maintenance POS terminal and operation terminal
CN201310740380.8A Active CN103714637B (en) 2013-03-15 2013-12-27 A kind of transmission security key sending method and system, operating terminal
CN201310742713.0A Active CN103701610B (en) 2013-03-15 2013-12-27 A kind of acquisition method and system for transmitting cipher key T K

Family Applications Before (26)

Application Number Title Priority Date Filing Date
CN201310740644.XA Active CN103714638B (en) 2013-03-15 2013-12-27 A kind of method and system of quick position terminal master key failed download
CN201310740231.1A Active CN103714635B (en) 2013-03-15 2013-12-27 A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN201310741948.8A Active CN103714639B (en) 2013-03-15 2013-12-27 A kind of method and system that realize the operation of POS terminal security
CN201310740642.0A Active CN103731259B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and systems
CN201310740360.0A Active CN103714636B (en) 2013-03-15 2013-12-27 A kind of method of batch capture and upload transfers cipher key T K data and operating terminal
CN201310740158.8A Active CN103716320B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and systems
CN201310740537.7A Active CN103746800B (en) 2013-03-15 2013-12-27 TMK (terminal master key) safe downloading method and system
CN201310740540.9A Active CN103716154B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and systems
CN201310740308.5A Active CN103729941B (en) 2013-03-15 2013-12-27 A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740430.2A Active CN103729943B (en) 2013-03-15 2013-12-27 A kind of method and system transmission security key being imported KMS system
CN201310742991.6A Active CN103714641B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK method for safely downloading and system
CN201310740285.8A Active CN103729940B (en) 2013-03-15 2013-12-27 A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740226.0A Active CN103714634B (en) 2013-03-15 2013-12-27 A kind of method of main key of secure download terminal and system
CN201310740574.8A Active CN103729945B (en) 2013-03-15 2013-12-27 A kind of method and system of secure download terminal master key
CN201310742886.2A Active CN103716321B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and systems
CN201310740264.6A Active CN103701812B (en) 2013-03-15 2013-12-27 TMK (Terminal Master Key) secure downloading method and system
CN201310740567.8A Active CN103729944B (en) 2013-03-15 2013-12-27 A kind of method and system of secure download terminal master key
CN201310742681.4A Active CN103714640B (en) 2013-03-15 2013-12-27 A kind of sending method of transmission security key and system
CN201310740410.5A Active CN103729942B (en) 2013-03-15 2013-12-27 Transmission security key is transferred to the method and system of key server from terminal server
CN201310740100.3A Active CN103714633B (en) 2013-03-15 2013-12-27 A kind of method of safe generating transmission key and POS terminal
CN201310742686.7A Active CN103745351B (en) 2013-03-15 2013-12-27 A kind of acquisition method and system for transmitting cipher key T K
CN201310740188.9A Active CN103716153B (en) 2013-03-15 2013-12-27 Terminal master key TMK safety downloading method and systems
CN201310742661.7A Active CN103716167B (en) 2013-03-15 2013-12-27 Method and device for safely collecting and distributing transmission keys
CN201310741949.2A Active CN103731260B (en) 2013-03-15 2013-12-27 A kind of terminal master key TMK safety downloading method and system
CN201310740244.9A Active CN103701609B (en) 2013-03-15 2013-12-27 A kind of server and the method and system operating terminal two-way authentication
CN201310742648.1A Active CN103716155B (en) 2013-03-15 2013-12-27 A kind of method of automated maintenance POS terminal and operation terminal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201310742713.0A Active CN103701610B (en) 2013-03-15 2013-12-27 A kind of acquisition method and system for transmitting cipher key T K

Country Status (2)

Country Link
CN (28) CN103714638B (en)
WO (5) WO2014139408A1 (en)

Families Citing this family (112)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714638B (en) * 2013-03-15 2015-09-30 福建联迪商用设备有限公司 A kind of method and system of quick position terminal master key failed download
CN105281896B (en) * 2014-07-17 2018-11-27 深圳华智融科技股份有限公司 A kind of key POS machine Activiation method and system based on elliptic curve
CN104270346B (en) * 2014-09-12 2017-10-13 北京天行网安信息技术有限责任公司 The methods, devices and systems of two-way authentication
CN105991536A (en) * 2014-11-07 2016-10-05 天地融科技股份有限公司 Data interaction system
CN104363090A (en) * 2014-11-19 2015-02-18 成都卫士通信息产业股份有限公司 Secret key distribution device and method for enhancing safety of banking terminal equipment
CN105681263B (en) * 2014-11-20 2019-02-12 广东华大互联网股份有限公司 A kind of secrete key of smart card remote application method and application system
CN104486323B (en) * 2014-12-10 2017-10-31 福建联迪商用设备有限公司 A kind of POS terminal controlled networking activation method and device safely
CN104410641B (en) * 2014-12-10 2017-12-08 福建联迪商用设备有限公司 A kind of POS terminal controlled networking activation method and device safely
US9485250B2 (en) * 2015-01-30 2016-11-01 Ncr Corporation Authority trusted secure system component
CN105989472A (en) * 2015-03-06 2016-10-05 华立科技股份有限公司 Wireless mobile configuration, wireless payment configuration and wireless payment configuration method of electric energy measurement system, and public commodity wireless payment configuration
CN106204034B (en) * 2015-04-29 2019-07-23 中国电信股份有限公司 Using the mutual authentication method and system of interior payment
CN105117665B (en) * 2015-07-16 2017-10-31 福建联迪商用设备有限公司 A kind of end product pattern and the method and system of development mode handoff-security
CN105184121A (en) * 2015-09-02 2015-12-23 上海繁易电子科技有限公司 Hardware authorization system and method using remote server
CN106559218A (en) * 2015-09-29 2017-04-05 中国电力科学研究院 A kind of safe acquisition method of intelligent substation continuous data
CN105243542B (en) * 2015-11-13 2021-07-02 咪付(广西)网络技术有限公司 Dynamic electronic certificate authentication method
CN105260884A (en) * 2015-11-18 2016-01-20 北京微智全景信息技术有限公司 POS machine key distributing method and device
CN105530241B (en) * 2015-12-07 2018-12-28 咪付(广西)网络技术有限公司 The authentication method of mobile intelligent terminal and POS terminal
CN105574722A (en) * 2015-12-11 2016-05-11 福建新大陆支付技术有限公司 Authorization IC card based remote online authorization method for payment terminal
CN105930718A (en) * 2015-12-29 2016-09-07 中国银联股份有限公司 Method and apparatus for switching point-of-sale (POS) terminal modes
CN105656669B (en) * 2015-12-31 2019-01-01 福建联迪商用设备有限公司 The remote repairing method of electronic equipment, is repaired equipment and system at equipment
CN105681032B (en) 2016-01-08 2017-09-12 腾讯科技(深圳)有限公司 Method for storing cipher key, key management method and device
CN105743654A (en) * 2016-02-02 2016-07-06 上海动联信息技术股份有限公司 POS machine secret key remote downloading service system and secret key downloading method
CN105790934B (en) * 2016-03-04 2019-03-15 中国银联股份有限公司 A kind of adaptive POS terminal configuration method configures power assignment method with it
CN107294722A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of terminal identity authentication method, apparatus and system
CN105978856B (en) * 2016-04-18 2019-01-25 随行付支付有限公司 A kind of POS machine key downloading method, apparatus and system
CN106059771A (en) * 2016-05-06 2016-10-26 上海动联信息技术股份有限公司 Intelligent POS machine secret key management system and method
CN106097608B (en) * 2016-06-06 2018-07-27 福建联迪商用设备有限公司 Remote cipher key method for down loading and system, acquirer and target POS terminal
CN106127461A (en) * 2016-06-16 2016-11-16 中国银联股份有限公司 Bi-directional verification method of mobile payment and system
CN107563712A (en) * 2016-06-30 2018-01-09 中兴通讯股份有限公司 A kind of mobile terminal punch card method, device, equipment and system
CN106027247A (en) * 2016-07-29 2016-10-12 宁夏丝路通网络支付有限公司北京分公司 Method for remotely issuing POS key
CN106100854A (en) * 2016-08-16 2016-11-09 黄朝 The reverse authentication method of terminal unit based on authority's main body and system
CN107800538B (en) * 2016-09-01 2021-01-29 中电长城(长沙)信息技术有限公司 Remote key distribution method for self-service equipment
US11018860B2 (en) 2016-10-28 2021-05-25 Microsoft Technology Licensing, Llc Highly available and reliable secret distribution infrastructure
CN106571915A (en) * 2016-11-15 2017-04-19 中国银联股份有限公司 Terminal master key setting method and apparatus
CN106603496B (en) * 2016-11-18 2019-05-21 新智数字科技有限公司 A kind of guard method, smart card, server and the communication system of data transmission
CN106656488B (en) * 2016-12-07 2020-04-03 百富计算机技术(深圳)有限公司 Key downloading method and device for POS terminal
CN106712939A (en) * 2016-12-27 2017-05-24 百富计算机技术(深圳)有限公司 Offline key transmission method and device
US10432730B1 (en) 2017-01-25 2019-10-01 United States Of America As Represented By The Secretary Of The Air Force Apparatus and method for bus protection
CN106953731B (en) * 2017-02-17 2020-05-12 福建魔方电子科技有限公司 Authentication method and system for terminal administrator
CN107466455B (en) * 2017-03-15 2021-05-04 深圳大趋智能科技有限公司 POS machine security verification method and device
US10296477B2 (en) 2017-03-30 2019-05-21 United States of America as represented by the Secretary of the AirForce Data bus logger
CN106997533B (en) * 2017-04-01 2020-10-13 福建实达电脑设备有限公司 POS terminal product safety production authorization management system and method
CN107094138B (en) * 2017-04-11 2019-09-13 郑州信大捷安信息技术股份有限公司 A kind of smart home safe communication system and communication means
CN107070925A (en) * 2017-04-18 2017-08-18 上海赛付网络科技有限公司 A kind of terminal applies and the anti-tamper method of background service communication packet
CN107104795B (en) * 2017-04-25 2020-09-04 上海汇尔通信息技术有限公司 Method, framework and system for injecting RSA key pair and certificate
CN107301437A (en) * 2017-05-31 2017-10-27 江苏普世祥光电技术有限公司 A kind of control system of square landscape lamp
CN107360652A (en) * 2017-05-31 2017-11-17 江苏普世祥光电技术有限公司 A kind of control method of square landscape lamp
CN107358441B (en) * 2017-06-26 2020-12-18 北京明华联盟科技有限公司 Payment verification method and system, mobile device and security authentication device
WO2019023979A1 (en) * 2017-08-02 2019-02-07 福建联迪商用设备有限公司 Method for generating configurable pos machine secret key pair, and storage medium
CN107666420B (en) * 2017-08-30 2020-12-15 宁波梦居智能科技有限公司 Method for production control and identity authentication of intelligent home gateway
CN107392591B (en) * 2017-08-31 2020-02-07 恒宝股份有限公司 Online recharging method and system for industry card and Bluetooth read-write device
CN107888379A (en) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 A kind of method of secure connection, POS terminal and code keypad
WO2019080095A1 (en) * 2017-10-27 2019-05-02 福建联迪商用设备有限公司 Financial payment terminal activation method and system
CN107835170B (en) * 2017-11-04 2021-04-20 上海动联信息技术股份有限公司 Intelligent Pos equipment safety authorization dismantling system and method
CN107993062A (en) * 2017-11-27 2018-05-04 百富计算机技术(深圳)有限公司 POS terminal method of commerce, device, computer equipment and readable storage medium storing program for executing
CN107944250B (en) * 2017-11-28 2021-04-13 艾体威尔电子技术(北京)有限公司 Key acquisition method applied to POS machine
CN107919962B (en) * 2017-12-22 2021-01-15 国民认证科技(北京)有限公司 Internet of things equipment registration and authentication method
CN108365950A (en) * 2018-01-03 2018-08-03 深圳怡化电脑股份有限公司 The generation method and device of financial self-service equipment key
CN108390851B (en) * 2018-01-05 2020-07-03 郑州信大捷安信息技术股份有限公司 Safe remote control system and method for industrial equipment
WO2019136736A1 (en) * 2018-01-15 2019-07-18 福建联迪商用设备有限公司 Software encryption terminal, payment terminal, and software package encryption and decryption method and system
WO2019153119A1 (en) * 2018-02-06 2019-08-15 福建联迪商用设备有限公司 Method for transmitting key, receiving terminal and distribution terminal
CN108446539B (en) * 2018-03-16 2023-01-13 福建深空信息技术有限公司 Software authorization method and software authorization file generation system
CN108496194A (en) * 2018-03-21 2018-09-04 福建联迪商用设备有限公司 A kind of method, server-side and the system of verification terminal legality
CN108496323B (en) * 2018-03-21 2020-01-21 福建联迪商用设备有限公司 Certificate importing method and terminal
CN108513704B (en) * 2018-04-17 2021-01-19 福建联迪商用设备有限公司 Remote distribution method and system of terminal master key
CN108737106B (en) * 2018-05-09 2021-06-01 深圳壹账通智能科技有限公司 User authentication method and device on block chain system, terminal equipment and storage medium
CN108833088A (en) * 2018-05-22 2018-11-16 珠海爱付科技有限公司 A kind of POS terminal Activiation method
CN110581829A (en) * 2018-06-08 2019-12-17 中国移动通信集团有限公司 Communication method and device
CN109218293B (en) * 2018-08-21 2021-09-21 西安得安信息技术有限公司 Use method of distributed password service platform key management
CN109347625B (en) * 2018-08-31 2020-04-24 阿里巴巴集团控股有限公司 Password operation method, work key creation method, password service platform and equipment
CN109326061B (en) * 2018-09-10 2021-10-26 惠尔丰(中国)信息系统有限公司 Anti-cutting method of intelligent POS
CN109274684B (en) * 2018-10-31 2020-12-29 中国—东盟信息港股份有限公司 Internet of things terminal system based on integration of eSIM communication and navigation service and implementation method thereof
CN109547208B (en) * 2018-11-16 2021-11-09 交通银行股份有限公司 Online distribution method and system for master key of financial electronic equipment
CN109670289B (en) * 2018-11-20 2020-12-15 福建联迪商用设备有限公司 Method and system for identifying legality of background server
CN109508995A (en) * 2018-12-12 2019-03-22 福建新大陆支付技术有限公司 A kind of off line authorization method and payment terminal based on payment terminal
CN109510711B (en) * 2019-01-08 2022-04-01 深圳市网心科技有限公司 Network communication method, server, client and system
CN111627174A (en) * 2019-02-28 2020-09-04 南京摩铂汇信息技术有限公司 Bluetooth POS equipment and payment system
CN110011794B (en) * 2019-04-11 2021-08-13 北京智芯微电子科技有限公司 Cipher machine key attribute testing method
CN109995532A (en) * 2019-04-11 2019-07-09 晏福平 A kind of online management method and system of terminal master key
CN110061848B (en) * 2019-04-17 2021-09-14 飞天诚信科技股份有限公司 Method for safely importing secret key of payment terminal, payment terminal and system
CN110545542B (en) * 2019-06-13 2023-03-14 银联商务股份有限公司 Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN112532567A (en) * 2019-09-19 2021-03-19 中国移动通信集团湖南有限公司 Transaction encryption method and POSP system
CN110855442A (en) * 2019-10-10 2020-02-28 北京握奇智能科技有限公司 PKI (public key infrastructure) technology-based inter-device certificate verification method
CN111132154B (en) * 2019-12-26 2022-10-21 飞天诚信科技股份有限公司 Method and system for negotiating session key
CN111193748B (en) * 2020-01-06 2021-12-03 惠州市德赛西威汽车电子股份有限公司 Interactive key security authentication method and system
CN111275440B (en) * 2020-01-19 2023-11-10 中钞科堡现金处理技术(北京)有限公司 Remote key downloading method and system
TWI775061B (en) * 2020-03-30 2022-08-21 尚承科技股份有限公司 Protection system and method for soft/firmware or data
CN111597512B (en) * 2020-03-31 2023-10-31 尚承科技股份有限公司 Soft firmware or data protection system and protection method
CN111526013B (en) * 2020-04-17 2023-05-05 中国人民银行清算总中心 Key distribution method and system
CN111884804A (en) * 2020-06-15 2020-11-03 上海祥承通讯技术有限公司 Remote key management method
CN111815811B (en) * 2020-06-22 2022-09-06 合肥智辉空间科技有限责任公司 Electronic lock safety coefficient
CN111950999A (en) * 2020-07-28 2020-11-17 银盛支付服务股份有限公司 Method and system for realizing IC card based secret key filling safety on POS machine
CN111931206A (en) * 2020-07-31 2020-11-13 银盛支付服务股份有限公司 Data encryption method based on APP
CN112134849B (en) * 2020-08-28 2024-02-20 国电南瑞科技股份有限公司 Dynamic trusted encryption communication method and system for intelligent substation
CN112311528B (en) * 2020-10-17 2023-06-23 深圳市德卡科技股份有限公司 Data security transmission method based on cryptographic algorithm
CN112291232B (en) * 2020-10-27 2021-06-04 中国联合网络通信有限公司深圳市分公司 Safety capability and safety service chain management platform based on tenants
CN112332978B (en) * 2020-11-10 2022-09-20 上海商米科技集团股份有限公司 Remote key injection method based on key agreement
CN112396416A (en) * 2020-11-18 2021-02-23 上海商米科技集团股份有限公司 Method for loading certificate of intelligent POS equipment
CN112560058B (en) * 2020-12-17 2022-12-30 山东华芯半导体有限公司 SSD partition encryption storage system based on intelligent password key and implementation method thereof
CN112968776B (en) * 2021-02-02 2022-09-02 中钞科堡现金处理技术(北京)有限公司 Method, storage medium and electronic device for remote key exchange
CN113037494B (en) * 2021-03-02 2023-05-23 福州汇思博信息技术有限公司 Burning piece mirror image file signature method and terminal
CN113450511A (en) * 2021-03-25 2021-09-28 深圳怡化电脑科技有限公司 Transaction method of acceptance terminal equipment and bank system and acceptance terminal equipment
CN113132980B (en) * 2021-04-02 2023-10-13 四川省计算机研究院 Key management system method and device applied to Beidou navigation system
CN113328851B (en) * 2021-04-21 2022-01-14 北京连山科技股份有限公司 Method and system for randomly transmitting secret key under multilink condition
CN113708923A (en) * 2021-07-29 2021-11-26 银盛支付服务股份有限公司 Method and system for remotely downloading master key
CN113645221A (en) * 2021-08-06 2021-11-12 中国工商银行股份有限公司 Encryption method, device, equipment, storage medium and computer program
CN113810391A (en) * 2021-09-01 2021-12-17 杭州视洞科技有限公司 Cross-machine-room communication bidirectional authentication and encryption method
CN113612612A (en) * 2021-09-30 2021-11-05 阿里云计算有限公司 Data encryption transmission method, system, equipment and storage medium
CN114423003B (en) * 2021-12-29 2024-01-30 中国航空工业集团公司西安飞机设计研究所 Airplane key comprehensive management method and system
CN114499891A (en) * 2022-03-21 2022-05-13 宁夏凯信特信息科技有限公司 Signature server system and signature verification method
CN114726521A (en) * 2022-04-14 2022-07-08 广东好太太智能家居有限公司 Intelligent lock temporary password generation method and electronic equipment
CN116865966B (en) * 2023-09-04 2023-12-05 中量科(南京)科技有限公司 Encryption method, device and storage medium for generating working key based on quantum key

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624710A (en) * 2012-02-27 2012-08-01 福建联迪商用设备有限公司 Sensitive information transmission method and sensitive information transmission system
CN102624711A (en) * 2012-02-27 2012-08-01 福建联迪商用设备有限公司 Sensitive information transmission method and sensitive information transmission system
CN103269266A (en) * 2013-04-27 2013-08-28 北京宏基恒信科技有限责任公司 Safety authentication method and system of dynamic password

Family Cites Families (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS57157371A (en) * 1981-03-24 1982-09-28 Sharp Corp Electronic cash register
JP2993833B2 (en) * 1993-11-29 1999-12-27 富士通株式会社 POS system
JPH10112883A (en) * 1996-10-07 1998-04-28 Hitachi Ltd Radio communication exchange system, exchange, public key management device, mobile terminal and mobile terminal recognizing method
BRPI0009229B8 (en) * 1999-03-22 2021-05-25 Purac Biochem Bv lactic acid purification process on an industrial scale.
CN1127033C (en) * 2000-07-20 2003-11-05 天津南开戈德集团有限公司 Radio mobile network point of sale (POS) terminal system and operation method thereof
US7110986B1 (en) * 2001-04-23 2006-09-19 Diebold, Incorporated Automated banking machine system and method
KR100641824B1 (en) * 2001-04-25 2006-11-06 주식회사 하렉스인포텍 A payment information input method and mobile commerce system using symmetric cipher system
JP2002366285A (en) * 2001-06-05 2002-12-20 Matsushita Electric Ind Co Ltd Pos terminal
GB2401293B (en) * 2002-01-17 2004-12-22 Toshiba Res Europ Ltd Data transmission links
JP2003217028A (en) * 2002-01-24 2003-07-31 Tonfuu:Kk Operation situation monitoring system for pos terminal device
US7395427B2 (en) * 2003-01-10 2008-07-01 Walker Jesse R Authenticated key exchange based on pairwise master key
JP2005117511A (en) * 2003-10-10 2005-04-28 Nec Corp Quantum cipher communication system and quantum cipher key distributing method used therefor
KR101282972B1 (en) * 2004-03-22 2013-07-08 삼성전자주식회사 Authentication between a device and a portable storage
US20060093149A1 (en) * 2004-10-30 2006-05-04 Shera International Ltd. Certified deployment of applications on terminals
DE102005022019A1 (en) * 2005-05-12 2007-02-01 Giesecke & Devrient Gmbh Secure processing of data
KR100652125B1 (en) * 2005-06-03 2006-12-01 삼성전자주식회사 Mutual authentication method for managing and authenticating between service provider, terminal and user identify module at one time and terminal, and the system thereof
CN100583743C (en) * 2005-07-22 2010-01-20 华为技术有限公司 Distributing method for transmission key
EP2013831A4 (en) * 2006-02-22 2010-12-22 Hypercom Corp Secure electronic transaction system
JP2007241351A (en) * 2006-03-06 2007-09-20 Cela System:Kk Customer/commodity integrated management system by customer/commodity/purchase management system (including pos) and mobile terminal
EP1833009B1 (en) * 2006-03-09 2019-05-08 First Data Corporation Secure transaction computer network
US7818264B2 (en) * 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
CN101064695A (en) * 2007-05-16 2007-10-31 杭州看吧科技有限公司 P2P(Peer to Peer) safe connection method
CN101145913B (en) * 2007-10-25 2010-06-16 东软集团股份有限公司 A method and system for network security communication
WO2009070041A2 (en) * 2007-11-30 2009-06-04 Electronic Transaction Services Limited Payment system and method of operation
CN101541002A (en) * 2008-03-21 2009-09-23 展讯通信(上海)有限公司 Web server-based method for downloading software license of mobile terminal
CN101615322B (en) * 2008-06-25 2012-09-05 上海富友金融网络技术有限公司 Mobile terminal payment method and mobile terminal payment system for realizing magnetic payment function
JP4666240B2 (en) * 2008-07-14 2011-04-06 ソニー株式会社 Information processing apparatus, information processing method, program, and information processing system
CN101686225A (en) * 2008-09-28 2010-03-31 中国银联股份有限公司 Methods of data encryption and key generation for on-line payment
KR20100052668A (en) * 2008-11-11 2010-05-20 노틸러스효성 주식회사 Method for on-line sharing of tmk(terminal master key) between atm and host
JP5329184B2 (en) * 2008-11-12 2013-10-30 株式会社日立製作所 Public key certificate verification method and verification server
CN101425208B (en) * 2008-12-05 2010-11-10 浪潮齐鲁软件产业有限公司 Method for safely downloading cipher key of finance tax-controlling cashing machine
CN101527714B (en) * 2008-12-31 2012-09-05 飞天诚信科技股份有限公司 Method, device and system for accreditation
CN101930644B (en) * 2009-06-25 2014-04-16 中国银联股份有限公司 Method for safely downloading master key automatically in bank card payment system and system thereof
CN101719895A (en) * 2009-06-26 2010-06-02 中兴通讯股份有限公司 Data processing method and system for realizing secure communication of network
CN101593389B (en) * 2009-07-01 2012-04-18 中国建设银行股份有限公司 Key management method and key management system for POS terminal
CN101631305B (en) * 2009-07-28 2011-12-07 交通银行股份有限公司 Encryption method and system
CN101656007B (en) * 2009-08-14 2011-02-16 通联支付网络服务股份有限公司 Safe system realizing one machine with multiple ciphers on POS machine and method thereof
CN102064939B (en) * 2009-11-13 2013-06-12 福建联迪商用设备有限公司 Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
CN101710436B (en) * 2009-12-01 2011-12-14 中国建设银行股份有限公司 Method and system for controlling POS terminal and POS terminal management equipment
CN101807994B (en) * 2009-12-18 2012-07-25 北京握奇数据系统有限公司 Method and system for application data transmission of IC card
CN102148799B (en) * 2010-02-05 2014-10-22 中国银联股份有限公司 Key downloading method and system
CN201656997U (en) * 2010-04-28 2010-11-24 中国工商银行股份有限公司 Device for generating transmission key
CN101807997B (en) * 2010-04-28 2012-08-22 中国工商银行股份有限公司 Device and method for generating transmission key
CN102262760A (en) * 2010-05-28 2011-11-30 杨筑平 Transaction secrecy method, acceptance apparatus and submission software
US8856509B2 (en) * 2010-08-10 2014-10-07 Motorola Mobility Llc System and method for cognizant transport layer security (CTLS)
CN101938520B (en) * 2010-09-07 2015-01-28 中兴通讯股份有限公司 Mobile terminal signature-based remote payment system and method
CN101976403A (en) * 2010-10-29 2011-02-16 北京拉卡拉网络技术有限公司 Phone number payment platform, payment trading system and method thereof
CN102013982B (en) * 2010-12-01 2012-07-25 银联商务有限公司 Long-distance encryption method, management method, as well as encryption management method, device and system
CN102903189A (en) * 2011-07-25 2013-01-30 上海昂贝电子科技有限公司 Terminal transaction method and device
CN102394749B (en) * 2011-09-26 2014-03-05 深圳市文鼎创数据科技有限公司 Line protection method, system, information safety equipment and application equipment for data transmission
CN102521935B (en) * 2011-12-15 2013-12-11 福建联迪商用设备有限公司 Method and apparatus for state detection of POS machine
CN102592369A (en) * 2012-01-14 2012-07-18 福建联迪商用设备有限公司 Method for self-service terminal access to financial transaction center
CN102647274B (en) * 2012-04-12 2014-10-08 福建联迪商用设备有限公司 POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof
CN102707972B (en) * 2012-05-02 2016-03-09 银联商务有限公司 A kind of POS terminal method for updating program and system
CN102768744B (en) * 2012-05-11 2016-03-16 福建联迪商用设备有限公司 A kind of remote safe payment method and system
CN102868521B (en) * 2012-09-12 2015-03-04 成都卫士通信息产业股份有限公司 Method for enhancing secret key transmission of symmetrical secret key system
CN103116505B (en) * 2012-11-16 2016-05-25 福建联迪商用设备有限公司 A kind of method that Auto-matching is downloaded
CN103117855B (en) * 2012-12-19 2016-07-06 福建联迪商用设备有限公司 A kind of method of the method generating digital certificate and backup and recovery private key
CN103237005A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Method and system for key management
CN103220270A (en) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103714638B (en) * 2013-03-15 2015-09-30 福建联迪商用设备有限公司 A kind of method and system of quick position terminal master key failed download
CN103237004A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Key download method, key management method, method, device and system for download management
CN103220271A (en) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624710A (en) * 2012-02-27 2012-08-01 福建联迪商用设备有限公司 Sensitive information transmission method and sensitive information transmission system
CN102624711A (en) * 2012-02-27 2012-08-01 福建联迪商用设备有限公司 Sensitive information transmission method and sensitive information transmission system
CN103269266A (en) * 2013-04-27 2013-08-28 北京宏基恒信科技有限责任公司 Safety authentication method and system of dynamic password

Also Published As

Publication number Publication date
CN103714636A (en) 2014-04-09
CN103731260B (en) 2016-09-28
CN103716320B (en) 2017-08-01
CN103714639A (en) 2014-04-09
CN103716153A (en) 2014-04-09
CN103716167B (en) 2017-01-11
CN103729940B (en) 2016-06-15
CN103701610A (en) 2014-04-02
CN103746800B (en) 2017-05-03
WO2014139408A1 (en) 2014-09-18
CN103729945B (en) 2015-11-18
CN103716154B (en) 2017-08-01
CN103714640B (en) 2016-02-03
WO2014139411A1 (en) 2014-09-18
CN103714637A (en) 2014-04-09
CN103716154A (en) 2014-04-09
CN103714638B (en) 2015-09-30
CN103701812B (en) 2017-01-25
CN103729943A (en) 2014-04-16
CN103746800A (en) 2014-04-23
CN103729940A (en) 2014-04-16
CN103716155B (en) 2016-08-17
CN103716155A (en) 2014-04-09
CN103714639B (en) 2016-05-04
CN103729942A (en) 2014-04-16
CN103729941B (en) 2016-06-15
CN103731260A (en) 2014-04-16
CN103716153B (en) 2017-08-01
CN103714641A (en) 2014-04-09
CN103714636B (en) 2015-12-02
CN103701610B (en) 2018-04-17
CN103729942B (en) 2016-01-13
CN103714640A (en) 2014-04-09
CN103701609B (en) 2016-09-28
CN103714634B (en) 2016-06-15
CN103701609A (en) 2014-04-02
CN103701812A (en) 2014-04-02
CN103729945A (en) 2014-04-16
CN103729941A (en) 2014-04-16
CN103729943B (en) 2015-12-30
CN103714634A (en) 2014-04-09
CN103714633A (en) 2014-04-09
WO2014139412A1 (en) 2014-09-18
WO2014139403A1 (en) 2014-09-18
CN103731259B (en) 2017-08-01
CN103731259A (en) 2014-04-16
CN103714641B (en) 2016-03-30
CN103745351A (en) 2014-04-23
CN103716321B (en) 2017-08-29
CN103716167A (en) 2014-04-09
CN103714635B (en) 2015-11-11
CN103716320A (en) 2014-04-09
CN103716321A (en) 2014-04-09
CN103714635A (en) 2014-04-09
CN103714638A (en) 2014-04-09
WO2014139406A1 (en) 2014-09-18
CN103745351B (en) 2017-09-29
CN103729944B (en) 2015-09-30
CN103714633B (en) 2016-05-04
CN103729944A (en) 2014-04-16

Similar Documents

Publication Publication Date Title
CN103714637B (en) A kind of transmission security key sending method and system, operating terminal
CN103714642B (en) Key downloading method, management method, downloading management method and device and system
CN103729946B (en) Key downloading method, management method, downloading management method and device and system
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
CN103716168A (en) Secret key management method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: Hong Yixuan

Inventor after: Su Wenlong

Inventor before: Su Wenlong

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: SU WENLONG TO: HONG YIXUAN SU WENLONG

C14 Grant of patent or utility model
GR01 Patent grant