CN103905196B - A kind of PIN turns encryption method - Google Patents

A kind of PIN turns encryption method Download PDF

Info

Publication number
CN103905196B
CN103905196B CN201210583757.9A CN201210583757A CN103905196B CN 103905196 B CN103905196 B CN 103905196B CN 201210583757 A CN201210583757 A CN 201210583757A CN 103905196 B CN103905196 B CN 103905196B
Authority
CN
China
Prior art keywords
pin
key
ciphertexts
pik
financial institution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210583757.9A
Other languages
Chinese (zh)
Other versions
CN103905196A (en
Inventor
赵敏
张江涛
计进波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Watchdata Co ltd
Original Assignee
Beijing WatchData System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchData System Co Ltd filed Critical Beijing WatchData System Co Ltd
Priority to CN201210583757.9A priority Critical patent/CN103905196B/en
Publication of CN103905196A publication Critical patent/CN103905196A/en
Application granted granted Critical
Publication of CN103905196B publication Critical patent/CN103905196B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

Turn encryption method the invention discloses a kind of PIN, mobile terminal SIM is encrypted generation PIN ciphertexts to account PIN code first, and PIN ciphertexts are sent to OTA servers, and PIN ciphertexts are carried out by OTA server calls encryption equipment turning encryption afterwards, obtain the new PIN ciphertexts of financial institution's requirement;When payment transaction is moved, the new PIN ciphertexts that financial institution receives are decrypted and obtain user's PIN code, it is whether correct with the whether consistent PIN code to verify user input of user's PIN code of financial institution backstage preservation by comparing user's PIN code for obtaining of decryption.PIN in the present invention turns encryption method and instead of code keypad, the encryption process for completing individual subscriber PIN of safety.The method dynamically generates PIN working keys, and the maximized safety that ensure that PIN code improves the security of the finance account of terminal user.

Description

A kind of PIN turns encryption method
Technical field
The present invention relates to the PIN security technology areas in mobile-payment system, and in particular in a kind of mobile-payment system PIN turn encryption method.
Background technology
In recent years, mobile payment industry development is rapid, and mobile payment is turning into a kind of emerging, easily payer Formula, operator, city one-card, Third-party payment platform and each big bank all actively pushing forward advancing for mobile payment, Also has there are various mobile payment products and corresponding mobile payment software systems in the market, but safety is always that mobile payment is produced The most concerned problem in crowd side is respectively related in industry chain, the mobile payment product by means of/credit function is based especially on, how maximized guarantor The safety of the finance account of user is protected, into the most important thing of Liao Ge banks propulsion mobile payment work.
It is mostly close by arranging with terminal using credit card issuer at present in the mobile-payment system that bank dominates completion is built The mode of key is completed, and protects the safety of PIN code, terminal to be responsible for encryption by symmetrical encryption and decryption technology, and credit card issuer is decrypted school Test.This kind of method there is also some drawbacks ensure that the safety of PIN to a certain degree simultaneously:
1)The key of agreement has quantity to limit and key does not have dynamic formation characteristic;
2)Banking system need to be directed to mobile payment correlation function increases special PIN verifying functions, it is desirable to have improvement cost.
The content of the invention
For defect present in prior art, turn encryption method it is an object of the invention to provide a kind of PIN, by this Method put forward the security of PIN code.
To achieve the above object, the technical solution adopted by the present invention is as follows:
A kind of PIN turns encryption method, comprises the following steps:
(1)Mobile terminal SIM is encrypted generation PIN ciphertexts to account PIN code, and is saved in SIM;Described Account PIN code refers to the PIN of the user's financial IC card provided by financial institution;
(2)PIN ciphertexts are sent to OTA servers by mobile terminal, and OTA server calls its encryption equipments enters to PIN ciphertexts Row turns encryption, generates new PIN ciphertexts, and be sent to financial institution server.
Further, a kind of PIN as described above turns encryption method, step(1)In, mobile terminal SIM is to account PIN code Be encrypted generation PIN ciphertexts concrete mode be:
(1-1)Individual subscriber master key is obtained, dispersion factor is generated;Described individual subscriber master key is by financial institution In previously generating and writing financial IC card;
(1-2)Individual subscriber master key is disperseed using dispersion factor, generating process key;
(1-3)Generation PIN ciphertexts are encrypted to account PIN code using process key.
Further, a kind of PIN as described above turns encryption method, described individual subscriber master key be financial institution to When financial IC card is provided at family, the user's master key in financial institution server is divided the card Application Serial Number of financial IC card Dissipate what is obtained;User's master key is the hair fastener key that financial institution provides financial IC card, and the key is logged in OTA servers simultaneously In encryption equipment;Card Application Serial Number is the card number of financial IC card.
Further, a kind of PIN as described above turns encryption method, step(1-1)In, the byte long of described dispersion factor It is 8 bytes to spend, and is constituted by random number and using transaction count;If random number and application transaction count are less than 8 bytes, most right The bytes of 0x80 to 8 are mended at end, if still less than 8 bytes, continuing to fill up the bytes of 0x00 to 8.
Further, a kind of PIN as described above turns encryption method, step(2)In, be sent to for PIN ciphertexts by mobile terminal During OTA servers, while card Application Serial Number, dispersion factor are sent into OTA servers.
Further, a kind of PIN as described above turns encryption method, and described OTA servers timing is to financial institution services Device is registered, and financial institution server returns to PIK ciphertexts to OTA servers when registering;Described PIK ciphertexts are by financial machine Structure server encrypts what is obtained using key-encrypting key KEK to key PIK;Key PIK is financial institution server distribution Key for encrypting account PIN code;Key-encrypting key KEK is financial institution server distribution for protecting key PIK Key;
Further, a kind of PIN as described above turns encryption method, step(2)In, OTA server calls its encryption equipments pair PIN ciphertexts carry out turning encryption, and the concrete mode for obtaining new PIN ciphertexts is:
(2-1)The timing of OTA servers is registered to financial institution server, and financial institution server is returned to OTA servers PIK ciphertexts;
(2-2)PIN ciphertexts that OTA servers will send on mobile terminal SIM, card Application Serial Number, dispersion factor and PIK ciphertexts obtained by registering are sent to encryption equipment;
(2-3)Encryption equipment is disperseed using card Application Serial Number user's master key built-in to its, obtains user People's master key;
(2-4)Individual subscriber master key is disperseed using dispersion factor, generating process key;
(2-5)PIN ciphertexts are decrypted using process key obtains account PIN code;
(2-6)PIK ciphertexts are decrypted using KEK and obtain key PIK, account PIN code is encrypted using key PIK obtains new PIN ciphertexts.
Further, a kind of PIN as described above turns encryption method, step(1-3)In, using process key to account PIN Before code encryption, PINBLOCK is generated according to account PIN code, generation PIN ciphertexts are encrypted to PINBLOCK using process key.
Further, a kind of PIN as described above turns encryption method, step(2-6)In, using key PIK to account PIN Before code encryption, PINBLOCK is generated according to account PIN code, generation PIN ciphertexts are encrypted to PINBLOCK using key PIK.
Further, a kind of PIN as described above turns encryption method, when being encrypted to PINBLOCK, the encryption of use Algorithm is DES algorithms.
The beneficial effects of the present invention are:PIN of the present invention turns encryption method, instead of code keypad, safe Complete encryption, the decrypting process of individual subscriber PIN;While the method avoids the mobile-payment system of financial institution and is directed to The system upgrade that PIN safety problems are made, the maximized safety that ensure that PIN code.
Brief description of the drawings
Fig. 1 is the flow chart that a kind of PIN of the invention turns encryption method;
Fig. 2 is that a kind of PIN turns the detailed maps of encryption method in specific embodiment;
Fig. 3 is that mobile terminal SIM obtains the schematic diagram of PIN code ciphertext to the encryption of account PIN code in specific embodiment;
The schematic diagram that Fig. 4 turns to encrypt for OTA servers in specific embodiment to PIN;
Fig. 5 is the flow chart for turning to encrypt to PIN inside encryption equipment in specific embodiment.
Specific embodiment
With reference to Figure of description, the present invention is described in further detail with specific embodiment.
The english abbreviation in technical terms involved in the method for the present invention is explained first:
Figures 1 and 2 show that flow chart and present embodiment PIN that a kind of PIN of the invention turns encryption method turn encryption side The detail flowchart of method, the method is comprised the following steps:
Step S11:Terminal SIM is to account PIN code encryption generation PIN ciphertexts;
User initiates to supplement with money in mobile terminal, pays, the association requests such as transfer accounts when, using OTA technologies by aerial mode To operate binding financial institution account(Such as bank account)In fund, by funds transfer to electronic cash wallet or payment, turn To third-party platform, in operating process, user needs the input operation amount of money and financial institution's binding account PIN code to account.The present invention Described in account PIN code refer to user financial IC card PIN, such as bank card password.User is in mobile terminal After input account PIN, PIN code is encrypted by mobile terminal SIM first, the PIN code ciphertext after generation encryption.Enter The concrete mode of row encryption is as shown in Figure 3:
(1)Individual subscriber master key is obtained, dispersion factor is generated;Described individual subscriber master key is taken by financial institution During business device is previously generated and writes financial IC card;
(2)Individual subscriber master key is disperseed using dispersion factor, generating process key;
(3)Generation PIN ciphertexts are encrypted to account PIN code using process key.
SIM is to obtain individual subscriber master key, individual subscriber master key to the precondition that account PIN code is encrypted When being financial institution's distribution financial IC card, write in application personalization process, be by financial institution(Such as bank)'s During user's master key card Application Serial Number dispersion in background server is obtained and writes card, to ensure every use blocked Family individual's master key is unique.Wherein, user's master key is by financial institution(Such as bank)The encryption equipment of server is generated and protected Deposit, card Application Serial Number is the card number of financial IC card, bank's card number of such as user, and decentralized algorithm is prior art.This Dispersion factor is constituted by random number and using transaction count in invention, and transaction count is the registration of application transaction counter ATC, with Transaction count increase.Random number is unpredictable number, and this guarantees the uniqueness of dispersion factor, each dispersion factor is not Identical, the process key of generation is also just different, it is ensured that one-time pad.The byte length of dispersion factor be 8 bytes, if random number and Using transaction count less than 8 bytes, then the bytes of 0x80 to 8 are mended in low order end, if still continuing to fill up 0x00 to 8 less than 8 bytes Byte.
After carrying out disperseing to obtain process key to individual subscriber master key by dispersion factor, by process key to account PIN code computations go out PIN ciphertexts, and PIN code is needed to carry out treatment generation PINBLOCK before being encrypted, and specific generating mode is pressed According to ANSIX9.8Format specifications, PIN code AES uses DES algorithms.
Step S12:OTA server calls its encryption equipments carries out turning encryption to PIN ciphertexts, obtains new PIN ciphertexts;
The step is core procedure of the invention, and the PIN ciphertexts that the step is obtained are the PIN that financial sector can be processed directly Ciphertext, basis is provided for follow-up financial institution is decrypted checking.
After SIM completes the encryption of account PIN code, PIN ciphertexts are carried in card upstream request message and are sent to OTA clothes Business device, while the dispersion factor generated in the card Application Serial Number of financial IC card, step S11 is sent into OTA services simultaneously Device, is carried out turning encryption afterwards by its encryption equipment of OTA server calls to PIN ciphertexts.Turn mode such as Fig. 4 and Fig. 5 of encryption It is shown, comprise the following steps:
(1)The timing of OTA servers is registered to financial institution server, and financial institution receives registering for OTA servers please After asking, PIK ciphertexts are returned to OTA servers by the server of financial institution;Described PIK ciphertexts are by the clothes of financial institution Business device encrypts what is obtained using key-encrypting key KEK to key PIK;Key PIK is financial institution's distribution for encrypting account The key of family PIN code;Key-encrypting key KEK is the key for protecting key PIK of financial institution's distribution;
(2)PIN ciphertexts, card Application Serial Number, dispersion factor and label that OTA servers will send on mobile terminal SIM PIK ciphertexts to gained are sent in the encryption equipment of OTA servers;
(3)Encryption equipment is disperseed using card Application Serial Number user's master key built-in to its, obtains individual subscriber Master key;
(4)Individual subscriber master key is disperseed using dispersion factor, generating process key;
(5)PIN ciphertexts are decrypted using process key obtains account PIN code;
(6)PIK ciphertexts are decrypted using KEK and obtain key PIK, account PIN code is encrypted using key PIK obtains new PIN ciphertexts.
OTA servers receive the data of mobile terminal transmission(PIN ciphertexts, dispersion factor, card sequence number etc.)Afterwards, adjust PIN code ciphertext is carried out with encryption equipment turn encryption.OTA servers have the function that timing is registered to the server of financial institution, In theory, OTA servers can when every time turn encryption to financial institution server application PIK ciphertexts, but in practice, Timing is registered to financial institution during OTA servers, obtains PIK ciphertexts, can typically be set one day and be obtained once, is received every time Register after request, PIK ciphertexts can be returned to OTA servers by financial institution server.Wherein, PIK ciphertexts are by financial institution Server generation, what is obtained is encrypted to key PIK using key-encrypting key KEK by financial institution server;Key PIK is The key for encrypting account PIN code of financial institution's distribution.OTA servers are got PIN ciphertexts, dispersion after PIK ciphertexts The factor, card sequence number and PIK ciphertexts are sent in its encryption equipment, as shown in figure 4, after encryption equipment receives above-mentioned data, it is first The process key for decrypting PIN ciphertexts is first generated, PIN ciphertexts are then decrypted by process key, obtain account PIN code, afterwards Encryption equipment is decrypted to PIK ciphertexts by its built-in key-encrypting key KEK and obtains key PIK, finally by key PIK to account The new PIN ciphertexts that PIN code encryption generation financial institution server can be processed directly.In present embodiment, due to step S11 In account PIN code is processed into PINBLOCK first, then encrypt PINBLOCK generation PIN ciphertexts, it is corresponding, in the step What decryption PIN ciphertexts were obtained is also PINBLOCK, as shown in Figure 5, by the PIK PIN ciphertexts new to PINBLOCK encryption generations, And be sent in the server of financial institution.
By the treatment of step S11 and step S12, complete PIN code turns encryption, and generating financial institution can be direct The PIN ciphertexts for the treatment of.In actual applications, user initiate to supplement with money in mobile terminal, pay, the related mobile payment transaction such as transfer accounts During request, its account PIN code is input into mobile terminal, afterwards by step S11 and step S12 by OTA servers encryption equipment New PIN ciphertexts of generation and after being sent to corresponding financial sector, in theory financial institution to receive the PIN for completing to turn encryption close Wen Hou, it is possible to use the key PIK in its server obtains account PIN code to the PIN ciphertexts decryption for receiving, by the account PIN code is compared with the account PIN code of storage in its backstage, illustrates that password authentification passes through if consistent, and user password is closed Method, otherwise authentication failed.
The method of the present invention is a kind of method for turning encryption to PIN, encrypts to generate financial institution for example by this turn The PIN ciphertexts that bank can directly be processed, so the treatment to financial institution's background server does not have in the present embodiment Describe in detail, the relevant treatment carried out by financial institution is commonly referred to as what is carried out by financial institution server in the present invention Reason, including the generation of PIK ciphertexts that OTA servers are obtained to financial institution server, and financial institution server decrypt PIN code Comparison method of PIN etc. is stored with backstage afterwards.
The present invention turns encryption method and instead of code keypad by the PIN of mobile-payment system, and the completion for being capable of safety is used Encryption, the decrypting process of family individual PIN, entirely turn ciphering process and are completed in encryption equipment, and the work of dynamic generation PIN protections is close Key, maximization ensure that the safety of the finance account of terminal user.The maximized safety for protecting PIN code.Building simultaneously During mobile-payment system, the improvement cost for PIN safety problems is saved, promoted financial IC card in mobile payment industry Development.
The present invention is further detailed with reference to specific embodiment.
Embodiment
● provide following key information before financial institution's distribution financial IC card:
1) user's master key:11111111111111111111111111111111(For hair fastener);
2) PIK protection keys KEK:33333333333333333333333333333333(For protecting PIK);
3) during OTA servers application PIK ciphertexts, financial sector distributes the key PIK for encrypting PIN plaintexts: 00010203040506070001020304050607;Financial sector, to PIK encipherment protections, obtains PIK ciphertexts using KEK, and Return to OTA servers, the PIK ciphertexts that KEK is obtained after being encrypted to key PIK: A851A269EF9B271BA851A269EF9B271BA5173AD5;
● user account password is that account PIN code is 123456.
SIM ciphering process is as follows:
【It is known】
1) individual subscriber master key:9E90DE82745E6852FE94F6FBD7AC4BF0 (write during financial institution's hair fastener, Card Application Serial Number dispersion by user's master key to financial IC is obtained);
2) card Application Serial Number(IC-card number):1122334455667788 (being write during financial institution's hair fastener);
3) user account password and account PIN code:123456 (user inputs);
【Calculate PIN ciphertexts】
1) dispersion factor is produced(Random number【12345678】+ apply transaction technology【1234】):1234567812348000;
2) individual subscriber master key is disperseed by dispersion factor, draws process key:
964C8D22B3FE47037807874F2620BC74;
3) according to ANSIX9.8Format, treatment account PIN code obtains PINBLOCK in plain text:
061253DFFEDCBA98;
4) process key is encrypted in plain text to PINBLOCK, draws PIN ciphertexts:3CD2B91103BDF6F5.
● OTA server calls its encryption equipments, it is as follows that realization turns ciphering process:
【It is known】
1) PIN ciphertexts:3CD2B91103BDF6F5 (send) on mobile terminal SIM;
2) card Application Serial Number:1122334455667788 (being sent on mobile terminal SIM);
3) dispersion factor:1234567812348000 (being sent on mobile terminal SIM);
4) PIK ciphertexts:A851A269EF9B271BA851A269EF9B271BA5173AD5 (financial sector return);
5) user's master key:11111111111111111111111111111111 (financial institution provide and typing OTA add Close machine);
6) PIK protection keys KEK:33333333333333333333333333333333 (financial institution's offer and typings OTA encryption equipments).
【Turn computations】
1) user's master key is once disperseed using card Application Serial Number, obtains individual subscriber master key: 9E90DE82745E6852FE94F6FBD7AC4BF0;
2) individual subscriber master key carries out twice dispersing using dispersion factor, obtains process key: 964C8D22B3FE47037807874F2620BC74;
3) process key is decrypted to PIN ciphertexts, obtains PINBLOCK in plain text:061253DFFEDCBA98;
4) KEK is decrypted to PIK, obtains PIK in plain text:00010203040506070001020304050607;
5) using PIK, to PINBLOCK, encryption obtains the PIN ciphertexts that financial sector can be verified in plain text in plain text: 860D7008189BA96E。
● financial sector verification user cipher process is as follows:
【It is known】
1) the PIN ciphertexts that OTA servers send:860D7008189BA96E;
2) for encrypting the key PIK of PIN plaintexts:00010203040506070001020304050607(For OTA clothes Business device request generation).
【Verification is calculated】
1) PIN ciphertexts are decrypted using PIK, obtains PINBLOCK in plain text:061253DFFEDCBA98
2) according to ANSIX9.8Format, PIN is obtained in plain text:123456;
3)Compare the PIN that obtains of decryption whether consistent with the account PIN code stored in financial institution background server in plain text Judge whether user cipher is correct, the account PIN code 123456 that obtains is decrypted in the present embodiment with financial institution backstage storage Account PIN code is consistent, is verified, and can be traded.
Obviously, those skilled in the art can carry out various changes and modification without deviating from essence of the invention to the present invention God and scope.So, if these modifications of the invention and modification belong to the scope of the claims in the present invention and its equivalent technology Within, then the present invention is also intended to comprising these changes and modification.

Claims (9)

1. a kind of PIN turns encryption method, comprises the following steps:
(1) mobile terminal SIM is encrypted generation PIN ciphertexts to account PIN code, and is saved in SIM;Described account PIN code refers to the PIN of the user's financial IC card provided by financial institution;
(2) PIN ciphertexts are sent to OTA servers by mobile terminal, and OTA server calls its encryption equipments is turned to PIN ciphertexts Encryption, generates new PIN ciphertexts, and be sent to financial institution server;Described OTA servers timing is to financial institution services Device is registered, and financial institution server returns to PIK ciphertexts to OTA servers when registering;Described PIK ciphertexts are by financial machine Structure server encrypts what is obtained using key-encrypting key KEK to key PIK;Key PIK is financial institution server distribution Key for encrypting account PIN code;Key-encrypting key KEK is financial institution server distribution for protecting key PIK Key.
2. a kind of PIN as claimed in claim 1 turns encryption method, it is characterised in that:In step (1), mobile terminal SIM pair Account PIN code be encrypted generation PIN ciphertexts concrete mode be:
(1-1) obtains individual subscriber master key, generates dispersion factor;Described individual subscriber master key is advance by financial institution In generating and writing financial IC card;
(1-2) is disperseed using dispersion factor to individual subscriber master key, generating process key;
(1-3) encrypts generation PIN ciphertexts to account PIN code using process key.
3. a kind of PIN as claimed in claim 2 turns encryption method, it is characterised in that:Described individual subscriber master key is gold When melting mechanism and providing financial IC card to user, the card application sequence of user's master key in financial institution server to financial IC card Row number carries out disperseing what is obtained;User's master key is the hair fastener key that financial institution provides financial IC card, key typing simultaneously In OTA server for encrypting machines;Card Application Serial Number is the card number of financial IC card.
4. a kind of PIN as claimed in claim 2 turns encryption method, it is characterised in that:In step (1-1), described dispersion because The byte length of son is 8 bytes, is constituted by random number and using transaction count;If random number and application transaction count are less than 8 words Section, then mend the bytes of 0x80 to 8, if still less than 8 bytes, continuing to fill up the bytes of 0x00 to 8 in low order end.
5. a kind of PIN as described in one of claim 2 to 4 turns encryption method, it is characterised in that:In step (2), mobile terminal When PIN ciphertexts are sent into OTA servers, while card Application Serial Number, dispersion factor are sent into OTA servers.
6. a kind of PIN as claimed in claim 1 turns encryption method, it is characterised in that:In step (2), OTA server calls its Encryption equipment carries out turning encryption to PIN ciphertexts, and the concrete mode for obtaining new PIN ciphertexts is:
The timing of (2-1) OTA servers is registered to financial institution server, and it is close that financial institution server returns to PIK to OTA servers Text;
PIN ciphertexts that (2-2) OTA servers will send on mobile terminal SIM, card Application Serial Number, dispersion factor and register The PIK ciphertexts of gained are sent to encryption equipment;
(2-3) encryption equipment is disperseed using card Application Serial Number user's master key built-in to its, obtains individual subscriber master Key;
(2-4) is disperseed using dispersion factor to individual subscriber master key, generating process key;
(2-5) is decrypted to PIN ciphertexts using process key and is obtained account PIN code;
(2-6) decrypts PIK ciphertexts and obtains key PIK using KEK, account PIN code is encrypted using key PIK obtains new PIN Ciphertext.
7. a kind of PIN as claimed in claim 6 turns encryption method, it is characterised in that:In step (1-3), process key is used Before being encrypted to account PIN code, PINBLOCK is generated according to account PIN code, life is encrypted to PINBLOCK using process key Into PIN ciphertexts.
8. a kind of PIN as claimed in claim 7 turns encryption method, it is characterised in that:In step (2-6), using key PIK pairs Before the encryption of account PIN code, PINBLOCK is generated according to account PIN code, generation is encrypted to PINBLOCK using key PIK PIN ciphertexts.
9. a kind of PIN as claimed in claim 8 turns encryption method, it is characterised in that:When being encrypted to PINBLOCK, use AES be DES algorithms.
CN201210583757.9A 2012-12-28 2012-12-28 A kind of PIN turns encryption method Expired - Fee Related CN103905196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210583757.9A CN103905196B (en) 2012-12-28 2012-12-28 A kind of PIN turns encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210583757.9A CN103905196B (en) 2012-12-28 2012-12-28 A kind of PIN turns encryption method

Publications (2)

Publication Number Publication Date
CN103905196A CN103905196A (en) 2014-07-02
CN103905196B true CN103905196B (en) 2017-05-31

Family

ID=50996353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210583757.9A Expired - Fee Related CN103905196B (en) 2012-12-28 2012-12-28 A kind of PIN turns encryption method

Country Status (1)

Country Link
CN (1) CN103905196B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104715365B (en) * 2015-03-13 2018-09-07 江苏创新睿智科技有限公司 A method of stored value card space transference is realized based on Bluetooth transmission channel
CN106533660B (en) * 2015-09-14 2019-08-20 杭州海康威视数字技术股份有限公司 The acquisition methods and device of secrete key of smart card
CN105635168B (en) * 2016-01-25 2019-01-22 恒宝股份有限公司 A kind of application method of offline transaction device and its security key
CN106503993A (en) * 2016-10-26 2017-03-15 中国银联股份有限公司 Based on the method for payment and its system that pay labelling realization
CN106779703B (en) * 2016-11-29 2020-10-27 中国银行股份有限公司 Dynamic realization method and device for centralized management of bank card key
CN108154365B (en) * 2017-12-19 2020-02-14 恒宝股份有限公司 Safety equipment, method and system for generating dynamic two-dimensional code
CN108616516A (en) * 2018-04-03 2018-10-02 四川新网银行股份有限公司 A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
CN108718317A (en) * 2018-06-12 2018-10-30 飞天诚信科技股份有限公司 A kind of method and device of personal identification number protection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277515A (en) * 2007-03-26 2008-10-01 黄金富 Cash register system using authentication information of mobile phone access network and method for collection and payment
CN101853453A (en) * 2009-04-03 2010-10-06 中兴通讯股份有限公司 System and method for realizing mobile payment
TW201239790A (en) * 2011-03-17 2012-10-01 Chun-Yu Chu Dynamic transaction password authentication system and method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277515A (en) * 2007-03-26 2008-10-01 黄金富 Cash register system using authentication information of mobile phone access network and method for collection and payment
CN101853453A (en) * 2009-04-03 2010-10-06 中兴通讯股份有限公司 System and method for realizing mobile payment
TW201239790A (en) * 2011-03-17 2012-10-01 Chun-Yu Chu Dynamic transaction password authentication system and method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
智能电表的设计和实现;陈杰;《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》;20120615(第6期);正文第20-21页3.2部分 *

Also Published As

Publication number Publication date
CN103905196A (en) 2014-07-02

Similar Documents

Publication Publication Date Title
CN103905196B (en) A kind of PIN turns encryption method
US11068608B2 (en) Mutual authentication of software layers
CN107925572B (en) Secure binding of software applications to communication devices
US20200372503A1 (en) Transaction messaging
US9705672B2 (en) Key management method and system
CN101131756B (en) Security authentication system, device and method for electric cash charge of mobile paying device
CN106062799B (en) Method and system for secure authentication of a user and a mobile device without a secure element
JP2016533048A (en) How to secure wireless communication between a mobile application and a gateway
CN103701812A (en) TMK (Terminal Master Key) secure downloading method and system
US11880832B2 (en) Method and system for enhancing the security of a transaction
CN105162607A (en) Authentication method and system of payment bill voucher
CN101329786A (en) Method and system for acquiring bank card magnetic track information or payment application for mobile terminal
EP3702991A1 (en) Mobile payments using multiple cryptographic protocols
US11922428B2 (en) Security for contactless transactions
CN108460597B (en) Key management system and method
US20200167778A1 (en) Trusted communication in transactions
US20180191511A1 (en) Method and system for authentication
CN106204040A (en) A kind of mobile payment communication security system and application process thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100102 Beijing city Chaoyang District Wangjing Lize Park No. 101 Qiming International Building 7

Patentee after: BEIJING WATCHDATA Co.,Ltd.

Address before: 100102 Beijing city Chaoyang District Wangjing Lize Park No. 101 Qiming International Building 7

Patentee before: BEIJING WATCH DATA SYSTEM Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170531

Termination date: 20211228