CN103905196A - PIN switch encryption method - Google Patents

PIN switch encryption method Download PDF

Info

Publication number
CN103905196A
CN103905196A CN201210583757.9A CN201210583757A CN103905196A CN 103905196 A CN103905196 A CN 103905196A CN 201210583757 A CN201210583757 A CN 201210583757A CN 103905196 A CN103905196 A CN 103905196A
Authority
CN
China
Prior art keywords
pin
key
ciphertext
financial institution
pik
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210583757.9A
Other languages
Chinese (zh)
Other versions
CN103905196B (en
Inventor
赵敏
张江涛
计进波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Watchdata Co ltd
Original Assignee
Beijing WatchData System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchData System Co Ltd filed Critical Beijing WatchData System Co Ltd
Priority to CN201210583757.9A priority Critical patent/CN103905196B/en
Publication of CN103905196A publication Critical patent/CN103905196A/en
Application granted granted Critical
Publication of CN103905196B publication Critical patent/CN103905196B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a PIN switch encryption method. The method comprises the steps that a mobile terminal SIM card encrypts an account PIN code to generate a PIN ciphertext, and sends the PIN ciphertext to an OTA server; the OTA server calls an encryption machine to carry out switch encryption on the PIN ciphertext, so as to acquire a new PIN ciphertext required by a financial institution; when mobile payment transaction is carried out, the new PIN ciphertext received by the financial institution is decrypted to acquire a user PIN code; and whether the user PIN code acquired by decryption is consistent with a user PIN code saved by a financial institution background is judged to validate whether a PIN password input by a user is correct. According to the invention, the PIN switch encryption method is used to replace a password keyboard; encryption and decryption processes of the personal PIN of the user are safely completed; through the method, a PIN working secret key is dynamically generated; the safety of the PIN code is ensured to the greatest extent; and the safety of a financial account of the terminal user is improved.

Description

A kind of PIN turns encryption method
Technical field
The present invention relates to the PIN safe practice field in mobile-payment system, be specifically related to the encryption method that turns of PIN in a kind of mobile-payment system.
Background technology
In recent years, mobile payment industry development is rapid, mobile payment is becoming a kind of emerging, the means of payment easily, operator, city one-card, third party's payment platform and each big bank are all actively pushing forward advancing of mobile payment, various mobile payment products and corresponding mobile payment software systems on market, are also there are, but safety is in mobile payment industrial chain, respectively to relate to the problem that crowd side is concerned about most always, especially the mobile payment product based on borrow/credit function, the how safety of maximized protection user's finance account, Cheng Liaoge bank advances the most important thing of mobile payment work.
During the mobile-payment system of having dominated in bank is at present built, mostly adopt credit card issuer and terminal to complete by the mode of agreement key, by the safety of symmetrical encryption and decryption technology protection PIN code, terminal is responsible for encryption, and credit card issuer is decrypted verification.This kind of method be in the safety that has to a certain degree guaranteed PIN, but also have some drawbacks simultaneously:
1) key of agreement has restricted number and key not to have dynamic formation characteristic;
2) banking system need increase special PIN verifying function for mobile payment correlation function, need to have improvement cost.
Summary of the invention
For the defect existing in prior art, the object of the present invention is to provide a kind of PIN to turn encryption method, proposed the fail safe of PIN code by the method.
For achieving the above object, the technical solution used in the present invention is as follows:
A kind of PIN turns encryption method, comprises the following steps:
(1) mobile terminal SIM card is encrypted and generates PIN ciphertext account PIN code, and is saved in SIM card; Described account PIN code refers to the PIN of user's financial IC card of being provided by financial institution;
(2) PIN ciphertext is sent to OTA server by mobile terminal, and its encryption equipment of OTA server calls turns encryption to PIN ciphertext, generates new PIN ciphertext, and send to financial institution server.
Further, a kind of PIN as above turns encryption method, and in step (1), the concrete mode that mobile terminal SIM card is encrypted generation PIN ciphertext to account PIN code is:
(1-1) obtain individual subscriber master key, generate dispersion factor; Described individual subscriber master key is generated in advance and is write in financial IC card by financial institution;
(1-2) use dispersion factor to disperse individual subscriber master key, generative process key;
(1-3) use procedure key is encrypted and is generated PIN ciphertext account PIN code.
Further, a kind of PIN as above turns encryption method, and described individual subscriber master key is financial institution while providing financial IC card to user, and the user's master key in financial institution server disperses to obtain to the card application sequence number of financial IC card; User's master key is the hair fastener key that financial institution provides financial IC card, and this key is logged in OTA server for encrypting machine simultaneously; Card application sequence number is the card number of financial IC card.
Further, a kind of PIN as above turns encryption method, and in step (1-1), the byte length of described dispersion factor is 8 bytes, is made up of random number and application transaction count; If random number and application transaction count less than 8 bytes are mended 0x80 to 8 byte at low order end, if less than 8 bytes still continue to fill 0x00 to 8 byte.
Further, a kind of PIN as above turns encryption method, in step (2), when PIN ciphertext is sent to OTA server by mobile terminal, card application sequence number, dispersion factor is sent to OTA server simultaneously.
Further, a kind of PIN as above turns encryption method, and described OTA server timing is registered to financial institution server, and while registering, financial institution server returns to PIK ciphertext to OTA server; Described PIK ciphertext is used key-encrypting key KEK that key PIK is encrypted and obtained by financial institution server; Key PIK be financial institution server distribute for encrypting the key of account PIN code; Key-encrypting key KEK is the key for the protection of key PIK that financial institution server distributes;
Further, a kind of PIN as above turns encryption method, and in step (2), its encryption equipment of OTA server calls turns encryption to PIN ciphertext, and the concrete mode that obtains new PIN ciphertext is:
(2-1) timing of OTA server is registered to financial institution server, and financial institution server returns to PIK ciphertext to OTA server;
(2-2) the PIK ciphertext of the PIN ciphertext of sending in mobile terminal SIM card, card application sequence number, dispersion factor and the gained of registering is sent to encryption equipment by OTA server;
(2-3) encryption equipment uses card application sequence number to disperse its built-in user's master key, obtains individual subscriber master key;
(2-4) use dispersion factor to disperse individual subscriber master key, generative process key;
(2-5) use procedure key obtains account PIN code to PIN decrypt ciphertext;
(2-6) use KEK deciphering PIK ciphertext to obtain key PIK, use key PIK to encrypt and obtain new PIN ciphertext account PIN code.
Further, a kind of PIN as above turns encryption method, and in step (1-3), use procedure key generates PINBLOCK according to account PIN code before account PIN code is encrypted, and use procedure key is encrypted and generates PIN ciphertext PINBLOCK.
Further again, a kind of PIN as above turns encryption method, in step (2-6), before using key PIK to encrypt account PIN code, generates PINBLOCK according to account PIN code, uses key PIK to be encrypted and to generate PIN ciphertext PINBLOCK.
Further, a kind of PIN as above turns encryption method, and when PINBLOCK is encrypted, the cryptographic algorithm of employing is DES algorithm.
Beneficial effect of the present invention is: PIN of the present invention turns encryption method, has substituted code keypad, the encryption, the decrypting process that have completed individual subscriber PIN of safety; The method makes the mobile-payment system of financial institution avoid the system upgrade of making for PIN safety problem simultaneously, the maximized safety that guarantees PIN code.
Accompanying drawing explanation
Fig. 1 is the flow chart that a kind of PIN of the present invention turns encryption method;
Fig. 2 is the detailed maps that in embodiment, a kind of PIN turns encryption method;
Fig. 3 is that in embodiment, mobile terminal SIM card is encrypted the schematic diagram that obtains PIN code ciphertext to account PIN code;
Fig. 4 is the schematic diagram that in embodiment, OTA server turns encryption to PIN;
Fig. 5 is the flow chart that in embodiment, encryption equipment inside turns encryption to PIN.
Embodiment
Below in conjunction with Figure of description and embodiment, the present invention is described in further detail.
First the english abbreviation in technical terms involved in method of the present invention is explained:
Figure BDA00002672255500041
Fig. 1 and Fig. 2 show a kind of PIN of the present invention and turn the flow chart of encryption method and present embodiment PIN and turn the detail flowchart of encryption method, and the method comprises the following steps:
Step S11: terminal SIM card is encrypted and generated PIN ciphertext account PIN code;
When user initiates the association requests such as to supplement, pay, transfer accounts with money at mobile terminal, utilize OTA technology to operate the fund in binding financial institution's account (as bank account) by aerial mode, by funds transfer to electronic cash wallet or payment, transfer accounts to third-party platform, in operating process, user needs the input operation amount of money and the binding account PIN of financial institution password.Account PIN code described in the present invention refers to the PIN of user's financial IC card, as bank card password.User, after mobile terminal input account PIN, is first encrypted PIN code by mobile terminal SIM card, generates the PIN code ciphertext after encrypting.The concrete mode being encrypted is as shown in Figure 3:
(1) obtain individual subscriber master key, generate dispersion factor; Described individual subscriber master key is generated in advance and is write in financial IC card by financial institution server;
(2) use dispersion factor to disperse individual subscriber master key, generative process key;
(3) use procedure key is encrypted and is generated PIN ciphertext account PIN code.
The precondition that SIM card is encrypted account PIN code is to obtain individual subscriber master key, when individual subscriber master key is financial institution's distribution financial IC card, in application personalization process, write, for example, to disperse to obtain and write in card by the user's master key card application sequence in the background server of financial institution (bank) number, unique to guarantee the individual subscriber master key of every card.Wherein, user's master key is for example, to be generated and preserved by the encryption equipment of financial institution (bank) server, and card application sequence number is the card number of financial IC card, bank's card number of for example user, and decentralized algorithm is prior art.In the present invention, dispersion factor is made up of random number and application transaction count, and transaction count is the registration of application transaction counter ATC, along with transaction count increases.Random number is unpredictable number, and this has just guaranteed the uniqueness of dispersion factor, and each dispersion factor is all not identical, and the process key of generation is also just different, guarantees one-time pad.The byte length of dispersion factor is 8 bytes, if random number and application transaction count less than 8 bytes are mended 0x80 to 8 byte at low order end, if less than 8 bytes still continue to fill 0x00 to 8 byte.
By dispersion factor, individual subscriber master key is disperseed to obtain after process key, by process key, account PIN code computations is gone out to PIN ciphertext, PIN code is encrypted front needs and processes generation PINBLOCK, concrete generating mode is according to ANSIX9.8Format standard, and PIN code cryptographic algorithm adopts DES algorithm.
Its encryption equipment of step S12:OTA server calls turns encryption to PIN ciphertext, obtains new PIN ciphertext;
This step is core procedure of the present invention, and the PIN ciphertext that this step obtains is the PIN ciphertext that financial sector can directly be processed, and provides basis for follow-up financial institution is decrypted checking.
SIM card completes after the encryption of account PIN code, PIN ciphertext is carried in card upstream request message and sends to OTA server, the dispersion factor generating in the card application sequence of financial IC card number, step S11 is sent to OTA server simultaneously simultaneously, by its encryption equipment of OTA server calls, PIN ciphertext is turned to encryption afterwards.Turn the mode of encryption as shown in Figure 4 and Figure 5, comprise the following steps:
(1) timing of OTA server is registered to financial institution server, and financial institution receives after the request of registering of OTA server, returns to PIK ciphertext by the server of financial institution to OTA server; Described PIK ciphertext is to use key-encrypting key KEK that key PIK is encrypted and obtained by the server of financial institution; Key PIK be financial institution distribute for encrypting the key of account PIN code; Key-encrypting key KEK is the key for the protection of key PIK that financial institution distributes;
(2) OTA server sends to the PIK ciphertext of the PIN ciphertext of sending in mobile terminal SIM card, card application sequence number, dispersion factor and the gained of registering in the encryption equipment of OTA server;
(3) encryption equipment uses card application sequence number to disperse its built-in user's master key, obtains individual subscriber master key;
(4) use dispersion factor to disperse individual subscriber master key, generative process key;
(5) use procedure key obtains account PIN code to PIN decrypt ciphertext;
(6) use KEK deciphering PIK ciphertext to obtain key PIK, use key PIK to encrypt and obtain new PIN ciphertext account PIN code.
OTA server receives after the data (PIN ciphertext, dispersion factor, card sequence number etc.) of mobile terminal transmission, calls encryption equipment PIN code ciphertext is turned to encryption.OTA server has the function that timing is registered to the server of financial institution, in theory, OTA server can be to financial institution server application PIK ciphertext at every turn in the time turning encryption, but in reality, when OTA server, timing is registered to financial institution, obtains PIK ciphertext, generally can set one day and obtain once, receive after the request of registering, financial institution server can return to OTA server PIK ciphertext at every turn.Wherein, PIK ciphertext is generated by financial institution server, and encryption obtains to key PIK to use key-encrypting key KEK by financial institution server; Key PIK be financial institution distribute for encrypting the key of account PIN code.OTA server sends to PIN ciphertext, dispersion factor, card sequence number and PIK ciphertext in its encryption equipment after getting PIK ciphertext, as shown in Figure 4, encryption equipment receives after above-mentioned data, first generate the process key for deciphering PIN ciphertext, then by process key deciphering PIN ciphertext, obtain account PIN code, encryption equipment obtains key PIK by its built-in key-encrypting key KEK to PIK decrypt ciphertext afterwards, finally by key PIK, account PIN code is encrypted and is generated the new PIN ciphertext that financial institution server can directly be processed.In present embodiment, owing to first account PIN code being processed into PINBLOCK in step S11, then encrypt the PIN ciphertext that PINBLOCK generates, corresponding, that in this step, decipher that PIN ciphertext obtains is also PINBLOCK, as shown in Figure 5, by PIK, PINBLOCK is encrypted and generates new PIN ciphertext, and send in the server of financial institution.
By the processing of step S11 and step S12, complete the encryption that turns of PIN code, generate the PIN ciphertext that financial institution can directly process.In actual applications, user initiates to supplement with money at mobile terminal, pay, while the relevant mobile payment transaction request such as transferring accounts, input its account PIN code at mobile terminal, generate new PIN ciphertext and send to after corresponding financial sector by the encryption equipment of OTA server through step S11 and step S12 afterwards, financial institution has received after the PIN ciphertext that turns encryption in theory, can use the key PIK in its server to obtain account PIN code to the PIN decrypt ciphertext receiving, by the account PIN code and its backstage in the account PIN code of storing compare, if unanimously, illustrate that password authentification passes through, user password is legal, otherwise authentication failed.
Method of the present invention is a kind of method that PIN is turned to encryption, encrypt by this turning the PIN ciphertext that can directly process to generate for example bank of financial institution, so in the present embodiment the processing of financial institution's background server is not described in detail, in the present invention the relevant treatment of being undertaken by financial institution is all commonly referred to as to the processing of being undertaken by financial institution server, comprise the generation of the PIK ciphertext that OTA server obtains to financial institution server, and after financial institution server deciphering PIN code with the comparison method of backstage storage PIN etc.
The present invention turns encryption method by the PIN of mobile-payment system and has substituted code keypad; encryption, the decrypting process of completing user individual PIN that can be safe; the whole ciphering process that turns completes in encryption equipment; dynamically generate the working key of PIN protection, maximize the safety of the finance account that has guaranteed terminal use.The maximized safety of protecting PIN code.Building in mobile-payment system process, save the improvement cost for PIN safety problem simultaneously, promoted the development of financial IC card in mobile payment industry.
Below in conjunction with specific embodiment, the present invention is further detailed.
Embodiment
● financial institution's distribution financial IC card prerequisite supplies following key information:
1) user's master key: 11111111111111111111111111111111(is for hair fastener);
2) PIK Protective Key KEK:33333333333333333333333333333333(is for the protection of PIK);
3), when OTA server application PIK ciphertext, financial sector is divided to be used in and is encrypted PIN key PIK:00010203040506070001020304050607 expressly; Financial sector is used KEK to PIK encipherment protection, obtains PIK ciphertext, and returns to OTA server, the PIK ciphertext that KEK obtains after key PIK is encrypted: A851A269EF9B271BA851A269EF9B271BA5173AD5;
● user account password is that account PIN code is 123456.
SIM card ciphering process is as follows:
[known]
1) individual subscriber master key: 9E90DE82745E6852FE94F6FBD7AC4BF0 (financial institution writes when hair fastener, by user's master key, the card application sequence of financial IC number is disperseed to obtain);
2) card application sequence number (IC-card number): 1122334455667788 (financial institution writes when hair fastener);
3) user account password and account PIN code: 123456 (user's inputs);
[calculating PIN ciphertext]
1) produce dispersion factor (random number [12345678]+application transaction technology [1234]): 1234567812348000;
2) by dispersion factor, individual subscriber master key is disperseed, draws process key:
964C8D22B3FE47037807874F2620BC74;
3), according to ANSIX9.8Format, process account PIN code and obtain PINBLOCK expressly:
061253DFFEDCBA98;
4) process key, to PINBLOCK plain text encryption, draws PIN ciphertext: 3CD2B91103BDF6F5.
● its encryption equipment of OTA server calls, it is as follows that realization turns ciphering process:
[known]
1) PIN ciphertext: 3CD2B91103BDF6F5 (sending in mobile terminal SIM card);
2) card application sequence number: 1122334455667788 (sending in mobile terminal SIM card);
3) dispersion factor: 1234567812348000 (sending in mobile terminal SIM card);
4) PIK ciphertext: A851A269EF9B271BA851A269EF9B271BA5173AD5 (financial sector is returned);
5) user's master key: 11111111111111111111111111111111 (financial institution provides and typing OTA encryption equipment);
6) PIK Protective Key KEK:33333333333333333333333333333333 (financial institution provides and typing OTA encryption equipment).
[turning computations]
1) user's master key uses card application sequence number once to disperse, and obtains individual subscriber master key: 9E90DE82745E6852FE94F6FBD7AC4BF0;
2) individual subscriber master key uses dispersion factor to carry out twice dispersing, obtains process key: 964C8D22B3FE47037807874F2620BC74;
3) process key, to PIN decrypt ciphertext, obtains PINBLOCK expressly: 061253DFFEDCBA98;
4) KEK deciphers PIK, obtains PIK expressly: 00010203040506070001020304050607;
5) use PIK expressly PINBLOCK plain text encryption to be obtained to the PIN ciphertext that financial sector can verification: 860D7008189BA96E.
● financial sector verified users cryptographic processes is as follows:
[known]
1) the PIN ciphertext that OTA server sends: 860D7008189BA96E;
2) for encrypting, PIN key PIK:00010203040506070001020304050607(expressly generates for OTA server request).
[verification calculating]
1) use PIK to PIN decrypt ciphertext, obtain PINBLOCK expressly: 061253DFFEDCBA98
2), according to ANSIX9.8Format, obtain PIN expressly: 123456;
3) PIN that comparison deciphering obtains expressly judges that with whether the account PIN code of storing in financial institution background server is consistent whether user cipher is correct, the account PIN code 123456 that in the present embodiment, deciphering obtains is consistent with the account PIN code of financial institution's backstage storage, be verified, can conclude the business.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technology thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (10)

1. PIN turns an encryption method, comprises the following steps:
(1) mobile terminal SIM card is encrypted and generates PIN ciphertext account PIN code, and is saved in SIM card; Described account PIN code refers to the PIN of user's financial IC card of being provided by financial institution;
(2) PIN ciphertext is sent to OTA server by mobile terminal, and its encryption equipment of OTA server calls turns encryption to PIN ciphertext, generates new PIN ciphertext, and send to financial institution server.
2. a kind of PIN as claimed in claim 1 turns encryption method, it is characterized in that: in step (1), the concrete mode that mobile terminal SIM card is encrypted generation PIN ciphertext to account PIN code is:
(1-1) obtain individual subscriber master key, generate dispersion factor; Described individual subscriber master key is generated in advance and is write in financial IC card by financial institution;
(1-2) use dispersion factor to disperse individual subscriber master key, generative process key;
(1-3) use procedure key is encrypted and is generated PIN ciphertext account PIN code.
3. a kind of PIN as claimed in claim 2 turns encryption method, it is characterized in that: described individual subscriber master key is financial institution while providing financial IC card to user, the user's master key in financial institution server disperses to obtain to the card application sequence number of financial IC card; User's master key is the hair fastener key that financial institution provides financial IC card, and this key is logged in OTA server for encrypting machine simultaneously; Card application sequence number is the card number of financial IC card.
4. a kind of PIN as claimed in claim 2 turns encryption method, it is characterized in that: in step (1-1), the byte length of described dispersion factor is 8 bytes, is made up of random number and application transaction count; If random number and application transaction count less than 8 bytes are mended 0x80 to 8 byte at low order end, if less than 8 bytes still continue to fill 0x00 to 8 byte.
5. a kind of PIN as described in one of claim 2 to 4 turns encryption method, it is characterized in that: in step (2), when PIN ciphertext is sent to OTA server by mobile terminal, card application sequence number, dispersion factor are sent to OTA server simultaneously.
6. a kind of PIN as claimed in claim 5 turns encryption method, it is characterized in that: described OTA server timing is registered to financial institution server, and while registering, financial institution server returns to PIK ciphertext to OTA server; Described PIK ciphertext is used key-encrypting key KEK that key PIK is encrypted and obtained by financial institution server; Key PIK be financial institution server distribute for encrypting the key of account PIN code; Key-encrypting key KEK is the key for the protection of key PIK that financial institution server distributes.
7. a kind of PIN as claimed in claim 6 turns encryption method, it is characterized in that: in step (2), its encryption equipment of OTA server calls turns encryption to PIN ciphertext, and the concrete mode that obtains new PIN ciphertext is:
(2-1) timing of OTA server is registered to financial institution server, and financial institution server returns to PIK ciphertext to OTA server;
(2-2) the PIK ciphertext of the PIN ciphertext of sending in mobile terminal SIM card, card application sequence number, dispersion factor and the gained of registering is sent to encryption equipment by OTA server;
(2-3) encryption equipment uses card application sequence number to disperse its built-in user's master key, obtains individual subscriber master key;
(2-4) use dispersion factor to disperse individual subscriber master key, generative process key;
(2-5) use procedure key obtains account PIN code to PIN decrypt ciphertext;
(2-6) use KEK deciphering PIK ciphertext to obtain key PIK, use key PIK to encrypt and obtain new PIN ciphertext account PIN code.
8. a kind of PIN as claimed in claim 7 turns encryption method, it is characterized in that: in step (1-3), use procedure key generates PINBLOCK according to account PIN code before account PIN code is encrypted, and use procedure key is encrypted and generates PIN ciphertext PINBLOCK.
9. a kind of PIN as claimed in claim 8 turns encryption method, it is characterized in that: in step (2-6), before using key PIK to encrypt account PIN code, generate PINBLOCK according to account PIN code, use key PIK to be encrypted and to generate PIN ciphertext PINBLOCK.
10. a kind of PIN as claimed in claim 9 turns enciphered method, it is characterized in that: when PINBLOCK is encrypted, the cryptographic algorithm of employing is DES algorithm.
CN201210583757.9A 2012-12-28 2012-12-28 A kind of PIN turns encryption method Expired - Fee Related CN103905196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210583757.9A CN103905196B (en) 2012-12-28 2012-12-28 A kind of PIN turns encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210583757.9A CN103905196B (en) 2012-12-28 2012-12-28 A kind of PIN turns encryption method

Publications (2)

Publication Number Publication Date
CN103905196A true CN103905196A (en) 2014-07-02
CN103905196B CN103905196B (en) 2017-05-31

Family

ID=50996353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210583757.9A Expired - Fee Related CN103905196B (en) 2012-12-28 2012-12-28 A kind of PIN turns encryption method

Country Status (1)

Country Link
CN (1) CN103905196B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104715365A (en) * 2015-03-13 2015-06-17 江苏创新睿智科技有限公司 Method for achieving E-wallet load credit over air based on Bluetooth transmission channel
CN105635168A (en) * 2016-01-25 2016-06-01 恒宝股份有限公司 Off-line transaction device and security key using method thereof
CN106503993A (en) * 2016-10-26 2017-03-15 中国银联股份有限公司 Based on the method for payment and its system that pay labelling realization
CN106533660A (en) * 2015-09-14 2017-03-22 杭州海康威视数字技术股份有限公司 Intelligent card secret key acquisition method and intelligent card secret key acquisition device
CN106779703A (en) * 2016-11-29 2017-05-31 中国银行股份有限公司 A kind of dynamic realizing method and device of the centralized management of bank card key
CN108154365A (en) * 2017-12-19 2018-06-12 恒宝股份有限公司 A kind of safety equipment for generating dynamic two-dimension code, method and system
CN108616516A (en) * 2018-04-03 2018-10-02 四川新网银行股份有限公司 A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
CN108718317A (en) * 2018-06-12 2018-10-30 飞天诚信科技股份有限公司 A kind of method and device of personal identification number protection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277515A (en) * 2007-03-26 2008-10-01 黄金富 Cash register system using authentication information of mobile phone access network and method for collection and payment
CN101853453A (en) * 2009-04-03 2010-10-06 中兴通讯股份有限公司 System and method for realizing mobile payment
TW201239790A (en) * 2011-03-17 2012-10-01 Chun-Yu Chu Dynamic transaction password authentication system and method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277515A (en) * 2007-03-26 2008-10-01 黄金富 Cash register system using authentication information of mobile phone access network and method for collection and payment
CN101853453A (en) * 2009-04-03 2010-10-06 中兴通讯股份有限公司 System and method for realizing mobile payment
TW201239790A (en) * 2011-03-17 2012-10-01 Chun-Yu Chu Dynamic transaction password authentication system and method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈杰: "智能电表的设计和实现", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104715365A (en) * 2015-03-13 2015-06-17 江苏创新睿智科技有限公司 Method for achieving E-wallet load credit over air based on Bluetooth transmission channel
CN104715365B (en) * 2015-03-13 2018-09-07 江苏创新睿智科技有限公司 A method of stored value card space transference is realized based on Bluetooth transmission channel
CN106533660A (en) * 2015-09-14 2017-03-22 杭州海康威视数字技术股份有限公司 Intelligent card secret key acquisition method and intelligent card secret key acquisition device
CN106533660B (en) * 2015-09-14 2019-08-20 杭州海康威视数字技术股份有限公司 The acquisition methods and device of secrete key of smart card
CN105635168A (en) * 2016-01-25 2016-06-01 恒宝股份有限公司 Off-line transaction device and security key using method thereof
CN105635168B (en) * 2016-01-25 2019-01-22 恒宝股份有限公司 A kind of application method of offline transaction device and its security key
CN106503993A (en) * 2016-10-26 2017-03-15 中国银联股份有限公司 Based on the method for payment and its system that pay labelling realization
CN106779703A (en) * 2016-11-29 2017-05-31 中国银行股份有限公司 A kind of dynamic realizing method and device of the centralized management of bank card key
CN108154365A (en) * 2017-12-19 2018-06-12 恒宝股份有限公司 A kind of safety equipment for generating dynamic two-dimension code, method and system
CN108154365B (en) * 2017-12-19 2020-02-14 恒宝股份有限公司 Safety equipment, method and system for generating dynamic two-dimensional code
CN108616516A (en) * 2018-04-03 2018-10-02 四川新网银行股份有限公司 A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
CN108718317A (en) * 2018-06-12 2018-10-30 飞天诚信科技股份有限公司 A kind of method and device of personal identification number protection

Also Published As

Publication number Publication date
CN103905196B (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US11068608B2 (en) Mutual authentication of software layers
US10785287B2 (en) Secure binding of software application to a communication device
US20200372503A1 (en) Transaction messaging
CN103905196B (en) A kind of PIN turns encryption method
CN103729945B (en) A kind of method and system of secure download terminal master key
EP4027576B1 (en) Efficient methods for protecting identity in authenticated transmissions
US9705672B2 (en) Key management method and system
CN101131756B (en) Security authentication system, device and method for electric cash charge of mobile paying device
US8620824B2 (en) Pin protection for portable payment devices
US11379849B2 (en) Security for contactless transactions
KR100642940B1 (en) System and method for authentication data delivery of smart card
US20200167778A1 (en) Trusted communication in transactions
WO2017039539A1 (en) Method and system for secure online transaction using integrated circuit card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100102 Beijing city Chaoyang District Wangjing Lize Park No. 101 Qiming International Building 7

Patentee after: BEIJING WATCHDATA Co.,Ltd.

Address before: 100102 Beijing city Chaoyang District Wangjing Lize Park No. 101 Qiming International Building 7

Patentee before: BEIJING WATCH DATA SYSTEM Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170531

Termination date: 20211228