CN105260884A - POS machine key distributing method and device - Google Patents

POS machine key distributing method and device Download PDF

Info

Publication number
CN105260884A
CN105260884A CN201510800013.1A CN201510800013A CN105260884A CN 105260884 A CN105260884 A CN 105260884A CN 201510800013 A CN201510800013 A CN 201510800013A CN 105260884 A CN105260884 A CN 105260884A
Authority
CN
China
Prior art keywords
key
terminal
pos
pos machine
master key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510800013.1A
Other languages
Chinese (zh)
Inventor
罗幸福
李岩
侯锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING WEIPASS PANORAMA INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING WEIPASS PANORAMA INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING WEIPASS PANORAMA INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING WEIPASS PANORAMA INFORMATION TECHNOLOGY Co Ltd
Priority to CN201510800013.1A priority Critical patent/CN105260884A/en
Publication of CN105260884A publication Critical patent/CN105260884A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/206Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

The invention provides a POS machine key distributing method and device and belongs to the network communication field. According to the POS machine key distributing method provided by the invention, a terminal main key ciphertext is obtained through accessing specified network resources; a terminal POS machine encryption public key is obtained and is adopted to encrypt the terminal main key; and the encrypted terminal main key is transmitted to a terminal POS machine. Compared with a terminal main key distributing mode in the prior art, the POS machine key distributing method of the invention can assist in ensuring the timeliness of the terminal main key in a transmission process and improving the security of communication codes.

Description

POS cryptographic key distribution method and device
Technical field
The present invention relates to network communication field, in particular to POS cryptographic key distribution method and device.
Background technology
Along with the development of internet and development of Mobile Internet technology, mobile phone, GPS locator etc. rely on the equipment of internet to enter into the life of the general common people.Especially fast payment aspect, it is when relying on internet and mobile Internet, instead of to a great extent and pay in cash, make people when carrying out entity shopping, no longer need to carry a large amount of cashes, but by the mode of swiping the card or other are similar, by network, the fund in oneself electronic account is given to seller, and then complete payment action.
Carry out the use that quick payment depends on POS, during use, Transaction Information first carries out inputting (as payment, project etc.) by businessman, afterwards by swiping the card and being inputted the mode of password by buyer, by all the other information polishings, and then generate trading card.Finally by the mode of Internet Transmission, trading card is sent to Net silver center (Unionpay), the money in buyer bank, demonstrating password for after correct, has just been given to seller by Net silver center.
The action paid is actually the money in buyer bank; transmission gives seller; in order to reinforcing security (preventing other people from therefrom snatching password) during payment, usually when trading card is sent to Net silver center by network, the trading card sent can be encrypted.Crack trading card to prevent other people, and then learned the bank card information of buyer, made the information leakage of buyer.
In correlation technique, POS inside can be provided with the module of encryption, when trading card is sent to Net silver center by POS, can the terminal master key in POS be used in advance to be encrypted.This terminal master key is managed by Net silver center or exclusive delivering key mechanism and is issued.As shown in Figure 1, a large amount of terminal master keys first can be sent to female POS 12 by network by Net silver center 11, and terminal master key, again by point-to-point data line transfer mode, is transferred to the terminal POS machine 13 of specifying by female POS 12.Wherein, a terminal master key is only supplied to a terminal POS machine 13, female POS 12 is when being transferred to terminal POS machine 13 by terminal master key, the information (as identification code, or other codes) of first identification terminal POS 13 more corresponding with this information terminal master key can be sent to this terminal POS machine 13.
But in actual use, Net silver center 11 before terminal master key being sent to female POS 12, can pass through artificial input, or code keypad mouth can input the mode of this low rate communication, to the system transmitting terminal master key at Net silver center 11.And the speed that the input mode of this low rate communication not only inputs is slow, and be easy to occur erroneous input, and then the terminal master key causing terminal POS machine 13 finally to receive is wrong.
To sum up, in correlation technique, when carrying out terminal master key distribution, easily there is mistake.
Summary of the invention
The object of the present invention is to provide POS distribution method and device, to reduce the mistake that terminal master key causes when distributing.
First aspect, embodiments provides POS cryptographic key distribution method, comprising:
Obtain destination network addresses;
Access described destination network addresses, and obtain terminal master key;
The encryption key obtained in advance is used to be encrypted described terminal master key;
Terminal master key after described encryption is sent to terminal POS machine.
In conjunction with first aspect, embodiments provide the first possible embodiment of first aspect, wherein, described encryption key obtains as follows:
The request obtaining encrypted public key is sent to described terminal POS machine;
Obtain the encrypted public key that described terminal POS machine sends, and using described encrypted public key as described encryption key.
In conjunction with first aspect, embodiments provide the embodiment that the second of first aspect is possible, wherein, described acquisition destination network addresses comprises:
Obtain the pressing instruction of keyboard region;
According to pre-set transform mode, by instruction morphing for described pressing be destination network addresses.
In conjunction with first aspect, embodiments provide the third possible embodiment of first aspect, wherein, describedly to comprise instruction morphing for described pressing for destination network addresses:
According to described pressing instruction, search the geocoding corresponding to described pressing instruction in a database, and using described geocoding as described destination network addresses.
In conjunction with first aspect, embodiments provide the 4th kind of possible embodiment of first aspect, wherein, using before the encryption key that obtains in advance is encrypted described terminal master key described in step, also comprising:
The decruption key be arranged in deciphering module is used to be decrypted the described terminal master key got.
In conjunction with first aspect, embodiments provide the 5th kind of possible embodiment of first aspect, wherein, described sending to described terminal POS machine obtains the request of encrypted public key and comprises:
By accessing described destination network addresses, obtain the address corresponding with described terminal master key;
The request obtaining encrypted public key is sent to described address.
In conjunction with first aspect, embodiments provide the 6th kind of possible embodiment of first aspect, wherein, described being sent to terminal POS machine by terminal master key after described encryption comprises:
Terminal master key after described encryption is sent to described address; The decrypted private key corresponding with described encrypted public key is used to be decrypted described terminal master key, to obtain described terminal master key to make terminal POS machine.
In conjunction with first aspect, embodiments provide the 7th kind of possible embodiment of first aspect, wherein, also comprise:
Obtain login account and login password;
Described login account and login password is verified in the cipher table preset;
If described in be verified, then perform described in step and obtain destination network addresses.
Second aspect, the embodiment of the present invention additionally provides POS key distribution device, comprising:
First acquisition module, for obtaining destination network addresses;
Access modules, for accessing described destination network addresses, and obtains terminal master key;
Encrypting module, is encrypted described terminal master key for using the encryption key obtained in advance;
Sending module, for sending the terminal master key after described encryption to terminal POS machine.
In conjunction with second aspect, embodiments provide the first possible embodiment of second aspect, wherein, described encryption key is by such as lower module acquisition:
Request module, for sending the request obtaining encrypted public key to described terminal POS machine;
Second acquisition module, for obtaining the encrypted public key that described terminal POS machine sends, and using described encrypted public key as described encryption key.
The POS cryptographic key distribution method that the embodiment of the present invention provides, the mode by accessing specified network is adopted to obtain terminal master key, be by the staff at Unionpay center mode typing manually with terminal master key of the prior art and assign, cause easily occurring that when inputting mistake is compared, it by prestoring terminal master key in destination network addresses, female POS is when needs obtain terminal master key, first can obtain the address of objective network, again by this destination network addresses of access, and then get terminal master key, the encryption key obtained in advance is used to be encrypted stating terminal master key afterwards, again the terminal master key after encryption is sent to terminal POS machine, terminal POS machine is made can directly to get the terminal master key be stored on network, ensure that terminal master key transmission process in, can not due to hand by mistake and mistake assign terminal master key.
For making above-mentioned purpose of the present invention, feature and advantage become apparent, preferred embodiment cited below particularly, and coordinate appended accompanying drawing, be described in detail below.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, be to be understood that, the following drawings illustrate only some embodiment of the present invention, therefore the restriction to scope should be counted as, for those of ordinary skill in the art, under the prerequisite not paying creative work, other relevant accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 shows in correlation technique, and the signal code at POS place issues architectural schematic;
Fig. 2 shows the basic flow sheet of the POS cryptographic key distribution method that the embodiment of the present invention provides.
Embodiment
Below in conjunction with accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.The assembly of the embodiment of the present invention describing and illustrate in usual accompanying drawing herein can be arranged with various different configuration and design.Therefore, below to the detailed description of the embodiments of the invention provided in the accompanying drawings and the claimed scope of the present invention of not intended to be limiting, but selected embodiment of the present invention is only represented.Based on embodiments of the invention, the every other embodiment that those skilled in the art obtain under the prerequisite not making creative work, all belongs to the scope of protection of the invention.
Use POS to swipe the card and become a requisite part in life, the appearance of bankcard consumption also simplifies the consumption difficulty of people to a certain extent.In conventional art, if the article that people want make purchases worth more larger, then buyer needs to carry a large amount of cashes and seller concludes the business, or use the mode of changing thing with thing, the universal equivalent (as gold bar) that use value is higher and the other side exchange, but this mode of changing thing with thing then reduces the existence sense of banknote, also makes banknote lose meaning.And the appearance of POS improves this situation to a great extent.Consumer is when consuming, and except giving of commodity, the mode that buyer can be transferred accounts by network is remitted money to seller.
During concrete use, usually first there is seller to operate POS, and in POS, input corresponding essential information (title etc. as transaction item), and carry out swiping the card action, afterwards, by the password of buyer's input card.POS is after getting the information of card, the password of input and essential information by swiping the card, just trading card (comprising the information of card, the password of input and essential information) is sent according to set mode to network-side (Net silver center), network-side is after the correctness demonstrating trading card, just remittance action can be completed, and the successful result of feedback trading.In order to ensure that trading card can not be stolen by other people when transmitting; usually encryption technology can be used; the trading card of transmission is encrypted before transmitting; again the trading card after encryption is sent to network-side; and the result that corresponding decryption technology can be used network-side to be returned is decrypted, and print corresponding document.
Before the action carrying out above-mentioned encryption and decryption, POS needs to get encryption key and decruption key (these two keys are referred to as terminal master key), otherwise is difficult to normal work.In the related, issuing of terminal master key controlled by Net silver center.As shown in Figure 1, the POS that above-mentioned seller and buyer carry out exchange's use is called as terminal POS machine 13, except terminal POS machine 13, also has female POS 12 and Net silver center 11.Specifically when distribution terminal master key, normally manually inputted by the staff at Net silver center 11, and give female POS 12 by Internet Transmission, then be handed down to the terminal POS machine 13 of specifying by female POS 12.But when transmission, due to the problem manually inputted, result in key energy wrong (artificial input error) that Net silver center 11 sends to female POS 12; And time female POS 12 assigns terminal master key to terminal POS machine 13, special code keypad mouth must be used, transmitted by the mode of physical transmission line, this makes assigning of terminal master key need to consume very large cost of labor (female POS 12 and terminal POS must near transmitting).
In view of this, this application provides POS cryptographic key distribution method, as shown in Figure 2, comprise the steps:
S101, obtains destination network addresses;
S102, the access destination network address, and obtain terminal master key;
S103, uses the encryption key obtained in advance to be encrypted terminal master key;
S104, sends the terminal master key after encryption to terminal POS machine.
Wherein, step S101 before execution, needs to be stored in by terminal master key on the server corresponding to destination network addresses by associated mechanisms (as Net silver center).Alternatively, destination network addresses is previously stored with terminal master key.
Afterwards, step S101 is performed, by female POS access destination network address.This destination network addresses can have two kinds of obtain manners, and the first is stored in advance in female POS, selected by staff, or tune goes out this destination network addresses.The second needs by operating personnel scene input destination network addresses.These two kinds of modes are compared, the first security poor (other people can by resolving female POS to get this destination network addresses), but can avoid because staff forgets destination network addresses, and cannot work.The security of the second is then complete to be grasped by staff.
Step S102 is after getting destination network addresses, female POS just can by the mode of the access destination network address, get terminal master key (illustrate above, store terminal master key in the server corresponding to destination network addresses).The obtain manner of this terminal master key can be, corresponding to destination network addresses to server be directly sent to female POS kind.
Step S103, after female POS gets terminal master key, needs, by female POS, this terminal master key is handed down to terminal POS machine.But in order to ensure the security of key, needing first to be encrypted terminal master key, then performing step S104, the terminal master key after encryption is sent to terminal POS machine.
Specifically, encryption key can obtain as follows:
The request obtaining encrypted public key is sent to terminal POS machine;
Obtain the encrypted public key that terminal POS machine sends, and using encrypted public key as encryption key.
Wherein, it should be noted that, terminal POS, when dispatching from the factory, can store encrypted public key and corresponding decrypted private key in its security module.Because the two is stored in security module, its security is safer compared to general password.
Female POS is after sending the request obtaining encrypted public key to terminal POS machine, terminal POS machine then can return corresponding encrypted public key to female POS.Stepmother's POS using the encrypted public key that gets as encryption key, perform step S103.
Concrete, step S101, obtaining destination network addresses can comprise the steps:
Obtain the pressing instruction of keyboard region;
According to pre-set transform mode, will press instruction morphing is destination network addresses.
Specifically, staff can assign instruction by the keyboard region of female POS to the CPU of female POS.This instruction can be divided into two kinds, and the first transfers by pressing instruction (pressing instruction accordingly as pressing physical button or touch screen generate) destination network addresses be pre-stored in female POS; The second directly inputs destination network addresses by pressing instruction to female POS.No matter use which kind of mode, the CPU of female POS kind all can generate destination network addresses accordingly.
If adopt the mode of destination network addresses transferred from female POS, then step will press and instruction morphingly can to perform in the following manner for destination network addresses:
According to pressing instruction, search the geocoding of pressing corresponding to instruction in a database, and using geocoding as destination network addresses.
Concrete, in female POS, CPU has corresponding database, the geocoding of destination network addresses is previously stored with in this database, female POS, after getting pressing instruction, just can use this pressing instruction (or pressing code corresponding to instruction) to search corresponding geocoding.
In order to ensure that terminal master key can not be divulged a secret in the process being transferred to female POS by destination network addresses, can the terminal master key be stored in destination network addresses be encrypted in advance, then be stored in destination network addresses; Can also be that terminal master key is first encrypted before terminal master key is issued female POS by the server corresponding to destination network addresses, then sends.And then terminal master key accessed by female POS is through encryption.Thus, use before the encryption key that obtains in advance is encrypted terminal master key in step, also comprise:
The decruption key be arranged in deciphering module is used to be decrypted the terminal master key got.
It should be noted that, the decruption key (being stored in the key in deciphering module) that female POS uses can be prestore equally, or inputted by artificial mode.
Concrete, step sends to terminal POS machine the request obtaining encrypted public key and comprises:
By the access destination network address, obtain the address corresponding with terminal master key;
The request obtaining encrypted public key is sent to address.
Namely, female POS obtains address by the access destination network address, and wherein, address is corresponding with terminal master key, and namely address is the address of terminal POS machine, and terminal master key also sends to this logical terminal POS machine.
And then the terminal master key after encryption sends to terminal POS machine and comprises the steps: by step
Terminal master key after encryption is sent to address; The decrypted private key corresponding with encrypted public key is used to be decrypted terminal master key, to obtain terminal master key to make terminal POS machine.
Namely the terminal master key (terminal master key after using the encrypted public key that carries of terminal POS to be encrypted) after encryption is sent to terminal POS machine.And then terminal POS machine just can get this terminal master key, terminal POS machine uses the decrypted private key corresponding with encrypted public key to be decrypted, and can get terminal master key expressly.
It should be noted that, female POS, when being operated, needs first to verify whether operating personnel have corresponding operating right.Namely the POS cryptographic key distribution method that provides of the application, also comprises the steps:
Obtain login account and login password;
Login account and login password is verified in the cipher table preset;
If be verified, then perform step and obtain destination network addresses.
Wherein, login account and password are entered in terminal POS machine by operating personnel.Then, terminal POS machine or the server corresponding to terminal POS machine are verified the login account accessed by previous step and login password.If the verification passes, just can perform step S101. by this kind of mode, can ensure that female POS can not be operated by incoherent personnel to a certain extent.
Exemplify a concrete example below, the POS cryptographic key distribution method that the application provides be described,
1, key administrator operates female POS, input keeper's account and key;
2, female POS, after verifying that account and password are all correct, allows keeper to input destination network addresses;
3, female POS, after the destination network addresses getting keeper's input, accesses this network address, and then obtains terminal master key and the relevant information (as trade company number and terminal POS plane No.) of encryption;
4, distribution operating personnel control female POS, first input corresponding operating personnel's account and password;
5, female POS, after verification operation personnel account and password are correct, just allows operating personnel to carry out subsequent operation;
6, operating personnel select the terminal POS machine of specifying and relevant information, determine the device number (address) of terminal POS machine;
7, female POS is to its encrypted public key of terminal POS machine request;
8, terminal POS machine returns its encrypted public key;
9, the decruption key that female POS uses operating personnel to input is decrypted terminal master key and relevant information;
10, female POS uses the encrypted public key received to be encrypted;
11, the terminal master key after encryption is sent to terminal POS machine by female POS;
12, terminal POS machine uses the decrypted private key corresponding with encrypted public key to be decrypted, and then gets terminal master key expressly;
13, terminal POS machine uses terminal master key to carry out encryption and decryption operation, carries out data interaction with Net silver center.
The embodiment of the present application additionally provides the POS key distribution device corresponding with said method, comprising:
First acquisition module, for obtaining destination network addresses;
Access modules, for the access destination network address, and obtains terminal master key;
Encrypting module, is encrypted terminal master key for using the encryption key obtained in advance;
Sending module, for sending the terminal master key after encryption to terminal POS machine.
Preferably, encryption key is by such as lower module acquisition:
Request module, for sending the request obtaining encrypted public key to terminal POS machine;
Second acquisition module, for obtaining the encrypted public key that terminal POS machine sends, and using encrypted public key as encryption key.
Those skilled in the art can be well understood to, and for convenience and simplicity of description, the specific works process of the system of foregoing description, device and unit, with reference to the corresponding process in preceding method embodiment, can not repeat them here.
If described function using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part of the part that technical scheme of the present invention contributes to prior art in essence in other words or this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection domain of claim.

Claims (10)

1.POS machine cryptographic key distribution method, is characterized in that, comprising:
Obtain destination network addresses;
Access described destination network addresses, and obtain terminal master key;
The encryption key obtained in advance is used to be encrypted described terminal master key;
Terminal master key after described encryption is sent to terminal POS machine.
2. POS cryptographic key distribution method according to claim 1, is characterized in that, described encryption key obtains as follows:
The request obtaining encrypted public key is sent to described terminal POS machine;
Obtain the encrypted public key that described terminal POS machine sends, and using described encrypted public key as described encryption key.
3. POS cryptographic key distribution method according to claim 1, is characterized in that, described acquisition destination network addresses comprises:
Obtain the pressing instruction of keyboard region;
According to pre-set transform mode, by instruction morphing for described pressing be destination network addresses.
4. POS cryptographic key distribution method according to claim 3, is characterized in that, describedly comprises instruction morphing for described pressing for destination network addresses:
According to described pressing instruction, search the geocoding corresponding to described pressing instruction in a database, and using described geocoding as described destination network addresses.
5. POS cryptographic key distribution method according to claim 1, is characterized in that,
Using before the encryption key that obtains in advance is encrypted described terminal master key described in step, also comprising:
The decruption key be arranged in deciphering module is used to be decrypted the described terminal master key got.
6. POS cryptographic key distribution method according to claim 2, is characterized in that, described sending to described terminal POS machine obtains the request of encrypted public key and comprise:
By accessing described destination network addresses, obtain the address corresponding with described terminal master key;
The request obtaining encrypted public key is sent to described address.
7. POS cryptographic key distribution method according to claim 6, is characterized in that, described being sent to terminal POS machine by terminal master key after described encryption comprises:
Terminal master key after described encryption is sent to described address; The decrypted private key corresponding with described encrypted public key is used to be decrypted described terminal master key, to obtain described terminal master key to make terminal POS machine.
8. POS cryptographic key distribution method according to claim 1, is characterized in that, also comprise:
Obtain login account and login password;
Described login account and login password is verified in the cipher table preset;
If described in be verified, then perform described in step and obtain destination network addresses.
9.POS machine key distribution device, is characterized in that, comprising:
First acquisition module, for obtaining destination network addresses;
Access modules, for accessing described destination network addresses, and obtains terminal master key;
Encrypting module, is encrypted described terminal master key for using the encryption key obtained in advance;
Sending module, for sending the terminal master key after described encryption to terminal POS machine.
10. POS key distribution device according to claim 9, is characterized in that, described encryption key is by such as lower module acquisition:
Request module, for sending the request obtaining encrypted public key to described terminal POS machine;
Second acquisition module, for obtaining the encrypted public key that described terminal POS machine sends, and using described encrypted public key as described encryption key.
CN201510800013.1A 2015-11-18 2015-11-18 POS machine key distributing method and device Pending CN105260884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510800013.1A CN105260884A (en) 2015-11-18 2015-11-18 POS machine key distributing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510800013.1A CN105260884A (en) 2015-11-18 2015-11-18 POS machine key distributing method and device

Publications (1)

Publication Number Publication Date
CN105260884A true CN105260884A (en) 2016-01-20

Family

ID=55100561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510800013.1A Pending CN105260884A (en) 2015-11-18 2015-11-18 POS machine key distributing method and device

Country Status (1)

Country Link
CN (1) CN105260884A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106097608A (en) * 2016-06-06 2016-11-09 福建联迪商用设备有限公司 Remote cipher key method for down loading and system, acquirer and target POS terminal
CN108496336A (en) * 2018-03-21 2018-09-04 福建联迪商用设备有限公司 A kind of method and POS terminal of transmission key
CN108513704A (en) * 2018-04-17 2018-09-07 福建联迪商用设备有限公司 The remote distribution method and its system of terminal master key
CN109617672A (en) * 2018-12-27 2019-04-12 八维通科技有限公司 A kind of novel filling code key method
CN109756333A (en) * 2018-11-26 2019-05-14 西安得安信息技术有限公司 key management system
CN109792380A (en) * 2018-12-27 2019-05-21 福建联迪商用设备有限公司 A kind of method, terminal and system for transmitting key

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647274A (en) * 2012-04-12 2012-08-22 福建联迪商用设备有限公司 POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof
CN103237005A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Method and system for key management
CN103595718A (en) * 2013-11-15 2014-02-19 拉卡拉支付有限公司 POS terminal and method, system and service platform for activating same
CN103701586A (en) * 2013-11-07 2014-04-02 金硕澳门离岸商业服务有限公司 Method and device for acquiring secret key
CN103716321A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Security downloading method and system of TMK

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647274A (en) * 2012-04-12 2012-08-22 福建联迪商用设备有限公司 POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof
CN103237005A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Method and system for key management
CN103716321A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Security downloading method and system of TMK
CN103701586A (en) * 2013-11-07 2014-04-02 金硕澳门离岸商业服务有限公司 Method and device for acquiring secret key
CN103595718A (en) * 2013-11-15 2014-02-19 拉卡拉支付有限公司 POS terminal and method, system and service platform for activating same

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106097608A (en) * 2016-06-06 2016-11-09 福建联迪商用设备有限公司 Remote cipher key method for down loading and system, acquirer and target POS terminal
CN106097608B (en) * 2016-06-06 2018-07-27 福建联迪商用设备有限公司 Remote cipher key method for down loading and system, acquirer and target POS terminal
CN108496336A (en) * 2018-03-21 2018-09-04 福建联迪商用设备有限公司 A kind of method and POS terminal of transmission key
WO2019178760A1 (en) * 2018-03-21 2019-09-26 福建联迪商用设备有限公司 Method for transmitting key and pos terminal
CN108513704A (en) * 2018-04-17 2018-09-07 福建联迪商用设备有限公司 The remote distribution method and its system of terminal master key
CN108513704B (en) * 2018-04-17 2021-01-19 福建联迪商用设备有限公司 Remote distribution method and system of terminal master key
CN109756333A (en) * 2018-11-26 2019-05-14 西安得安信息技术有限公司 key management system
CN109617672A (en) * 2018-12-27 2019-04-12 八维通科技有限公司 A kind of novel filling code key method
CN109792380A (en) * 2018-12-27 2019-05-21 福建联迪商用设备有限公司 A kind of method, terminal and system for transmitting key
CN109792380B (en) * 2018-12-27 2022-08-16 福建联迪商用设备有限公司 Method, terminal and system for transmitting secret key

Similar Documents

Publication Publication Date Title
JP6889967B2 (en) Methods and systems for generating advanced storage keys on mobile devices without secure elements
RU2648944C2 (en) Methods, devices, and systems for secure provisioning, transmission and authentication of payment data
CN102034323B (en) Public traffic one-card service system and implementation method, service platform and point of sale (POS) machine thereof
EP3485448B1 (en) Digital asset distribution by transaction device
CN105260884A (en) POS machine key distributing method and device
US20140101042A1 (en) Systems, methods, and computer program products for managing remote transactions
CA3019849A1 (en) Digital asset account management
CN106462849A (en) System and method for token domain control
WO2015084797A1 (en) Method and system for secure tranmission of remote notification service messages to mobile devices without secure elements
CN104603809A (en) Systems and methods for facilitating a transaction using a virtual card on a mobile device
CN106464492A (en) Network token system
CN104504565A (en) Mobile payment system and method based on bank virtual card number
WO2015084755A1 (en) Method and system for secure authentication of user and mobile device without secure elements
CN104424565A (en) Digital card-based payment system and method
WO2002029739A2 (en) Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service
CN103942897B (en) A kind of method realizing withdrawing the money without card on ATM
CN106022172A (en) Password input method and system protecting password keyboard button input operation
CN109716373A (en) Cipher authentication and tokenized transaction
US20020095580A1 (en) Secure transactions using cryptographic processes
JPH0344703B2 (en)
KR20190120533A (en) Mobile payment service method and system for preventing personal information leakage, duplicate payment, overpayment or settlement error by inputting a payment amount by a user directly and paying a one-time payment security code generated by a financial institution in on/offline transaction
CN102236855A (en) Method and system for electronic transaction by using QR (Quick Response) codes
KR102154896B1 (en) System and method for generating security code or virtual account
JP5981507B2 (en) How to process payments
KR102134144B1 (en) Mobile direct approval payment system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160120

RJ01 Rejection of invention patent application after publication