CN108833088A - 一种pos终端激活方法 - Google Patents

一种pos终端激活方法 Download PDF

Info

Publication number
CN108833088A
CN108833088A CN201810493798.6A CN201810493798A CN108833088A CN 108833088 A CN108833088 A CN 108833088A CN 201810493798 A CN201810493798 A CN 201810493798A CN 108833088 A CN108833088 A CN 108833088A
Authority
CN
China
Prior art keywords
password
pos terminal
server
certificate
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810493798.6A
Other languages
English (en)
Inventor
陈少琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Ai Fu Technology Co Ltd
Original Assignee
Zhuhai Ai Fu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Ai Fu Technology Co Ltd filed Critical Zhuhai Ai Fu Technology Co Ltd
Priority to CN201810493798.6A priority Critical patent/CN108833088A/zh
Publication of CN108833088A publication Critical patent/CN108833088A/zh
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols

Abstract

本发明属于通讯安全领域,尤其是一种POS终端激活方法,包括以下过程:服务端接收POS终端的激活请求,所述激活请求中包括随机会话口令以及POS终端的装置序列号,所述服务端发送装置序列号至用户管理端,获取用户信息及证书随机口令,针对目前市场上的POS终端在使用前,大多需要由收单银行或其授权机构来安装,这种装机方式需要大量的人手和工作时间,导致装机效率低下的问题的问题,现提出如下方案:通过采用本发明的技术方案,较大地减少了安装人员的时间成本,无需安装人员上门安装,在用户审核通过后直接将装置发给用户,用户拿到机器可以自行完成终端配置操作,效率较高,使用起来更加方便,且适应于大规模批量装机。

Description

一种POS终端激活方法
技术领域
本发明涉及通讯安全技术领域,尤其涉及一种POS终端激活方法。
背景技术
POS的中文意思是“销售点”,全称为销售点情报管理系统,是一种配有条码或OCR码技术终端阅读器,有现金或易货额度出纳功能,其主要任务是对商品与媒体交易提供数据服务和管理功能,并进行非现金结算,POS是一种多功能终端,把它安装在信用卡的特约商户和受理网点中与计算机联成网络,就能实现电子资金自动转账,它具有支持消费、预授权、余额查询和转帐等功能,使用起来安全、快捷、可靠,大宗交易中基本经营情报难以获取,导入POS系统主要是解决零售业信息管理盲点,连锁分店管理信息系统中的重要组成部分。
目前市场上的POS终端在使用前,大多需要由收单银行或其授权机构来安装,这种装机方式需要大量的人手和工作时间,导致装机效率低下,使用起来很不方便。
发明内容
本发明提出的一种POS终端激活方法,解决了目前市场上的POS终端在使用前,大多需要由收单银行或其授权机构来安装,这种装机方式需要大量的人手和工作时间,导致装机效率低下的问题。
为了实现上述目的,本发明采用了如下技术方案:一种POS终端激活方法,包括以下过程:服务端接收POS终端的激活请求,所述激活请求中包括随机会话口令以及POS终端的装置序列号,所述服务端发送装置序列号至用户管理端,获取用户信息及证书随机口令,服务端将获取到的用户信息及随机会话口令发送至口令管理端,获取加密后的主口令,所述服务端对证书随机口令进行摘要,将用户信息及证书随机口令摘要发送至证书管理端获取证书,服务端将用户信息、证书随机口令、主口令和证书通过激活请求响应消息发送至POS终端,以完成POS终端的激活。
优选的,所述激活请求中的随机会话口令和装置序列号是由POS终端预先加密过的,加密步骤为服务端分别生成POS终端和服务端的非对称口令,并交换二者的公用口令,所述POS终端利用服务端的公用口令对随机会话口令和装置序列号进行加密。
优选的,所述用户信息包括商户号、终端号和商户名称。
优选的,所述用户管理端接收服务端发送的装置序列号后,判断装置序列号是否存在和是否已与用户绑定,如果存在且已与用户绑定则将与装置序列号对应的用户信息以及证书随机口令反馈给服务端。
优选的,所述口令管理端接收服务端发送的用户信息和随机会话口令后,判断商户号是否存在且是否与口令管理端中的主口令对应,当商户号存在且与口令管理端中的主口令对应时,利用随机会话口令对主口令进行加密,将加密后的主口令反馈服务端。
优选的,所述服务端利用POS终端的公用口令对加密后的主口令进行二次加密后通过激活响应消息发送至POS终端。
优选的,所述证书管理端接收服务端发送的用户信息和证书随机口令摘要后,判断用户信息是否存在并且证书随机口令摘要是否与证书管理端中预先保存的摘要一致,如果是,则将相应的证书反馈至服务端。
与现有技术相比,本发明的有益效果是:本发明中,通过采用本发明的技术方案,较大地减少了安装人员的时间成本,无需安装人员上门安装,在用户审核通过后直接将装置发给用户,用户拿到机器可以自行完成终端配置操作,效率较高,使用起来更加方便,且适应于大规模批量装机。
附图说明
图1为本发明提出的一种POS终端激活方法的交互示意图;
图2为本发明提出的一种POS终端激活方法的POS终端交互的示意性框图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。
参照图1-2,一种POS终端激活方法,包括以下过程:服务端接收POS终端的激活请求,激活请求中包括随机会话口令以及POS终端的装置序列号,服务端发送装置序列号至用户管理端,获取用户信息及证书随机口令,服务端将获取到的用户信息及随机会话口令发送至口令管理端,获取加密后的主口令,服务端对证书随机口令进行摘要,将用户信息及证书随机口令摘要发送至证书管理端获取证书,服务端将用户信息、证书随机口令、主口令和证书通过激活请求响应消息发送至POS终端,以完成POS终端的激活,激活请求中的随机会话口令和装置序列号是由POS终端预先加密过的,加密步骤为服务端分别生成POS终端和服务端的非对称口令,并交换二者的公用口令,POS终端利用服务端的公用口令对随机会话口令和装置序列号进行加密,用户信息包括商户号、终端号和商户名称,用户管理端接收服务端发送的装置序列号后,判断装置序列号是否存在和是否已与用户绑定,如果存在且已与用户绑定则将与装置序列号对应的用户信息以及证书随机口令反馈给服务端,口令管理端接收服务端发送的用户信息和随机会话口令后,判断商户号是否存在且是否与口令管理端中的主口令对应,当商户号存在且与口令管理端中的主口令对应时,利用随机会话口令对主口令进行加密,将加密后的主口令反馈服务端,其特征在于,服务端利用POS终端的公用口令对加密后的主口令进行二次加密后通过激活响应消息发送至POS终端,证书管理端接收服务端发送的用户信息和证书随机口令摘要后,判断用户信息是否存在并且证书随机口令摘要是否与证书管理端中预先保存的摘要一致,如果是,则将相应的证书反馈至服务端,本发明中,通过采用本发明的技术方案,较大地减少了安装人员的时间成本,无需安装人员上门安装,在用户审核通过后直接将装置发给用户,用户拿到机器可以自行完成终端配置操作,效率较高,使用起来更加方便,且适应于大规模批量装机。
以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,根据本发明的技术方案及其发明构思加以等同替换或改变,都应涵盖在本发明的保护范围之内。

Claims (7)

1.一种POS终端激活方法,其特征在于,包括以下过程:服务端接收POS终端的激活请求,所述激活请求中包括随机会话口令以及POS终端的装置序列号,所述服务端发送装置序列号至用户管理端,获取用户信息及证书随机口令,服务端将获取到的用户信息及随机会话口令发送至口令管理端,获取加密后的主口令,所述服务端对证书随机口令进行摘要,将用户信息及证书随机口令摘要发送至证书管理端获取证书,服务端将用户信息、证书随机口令、主口令和证书通过激活请求响应消息发送至POS终端,以完成POS终端的激活。
2.根据权利要求1所述的一种POS终端激活方法,其特征在于,所述激活请求中的随机会话口令和装置序列号是由POS终端预先加密过的,加密步骤为服务端分别生成POS终端和服务端的非对称口令,并交换二者的公用口令,所述POS终端利用服务端的公用口令对随机会话口令和装置序列号进行加密。
3.根据权利要求1所述的一种POS终端激活方法,其特征在于,所述用户信息包括商户号、终端号和商户名称。
4.根据权利要求1所述的一种POS终端激活方法,其特征在于,所述用户管理端接收服务端发送的装置序列号后,判断装置序列号是否存在和是否已与用户绑定,如果存在且已与用户绑定则将与装置序列号对应的用户信息以及证书随机口令反馈给服务端。
5.根据权利要求1所述的一种POS终端激活方法,其特征在于,所述口令管理端接收服务端发送的用户信息和随机会话口令后,判断商户号是否存在且是否与口令管理端中的主口令对应,当商户号存在且与口令管理端中的主口令对应时,利用随机会话口令对主口令进行加密,将加密后的主口令反馈服务端。
6.根据权利要求1所述的一种POS终端激活方法,其特征在于,所述服务端利用POS终端的公用口令对加密后的主口令进行二次加密后通过激活响应消息发送至POS终端。
7.根据权利要求1所述的一种POS终端激活方法,其特征在于,所述证书管理端接收服务端发送的用户信息和证书随机口令摘要后,判断用户信息是否存在并且证书随机口令摘要是否与证书管理端中预先保存的摘要一致,如果是,则将相应的证书反馈至服务端。
CN201810493798.6A 2018-05-22 2018-05-22 一种pos终端激活方法 Pending CN108833088A (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810493798.6A CN108833088A (zh) 2018-05-22 2018-05-22 一种pos终端激活方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810493798.6A CN108833088A (zh) 2018-05-22 2018-05-22 一种pos终端激活方法

Publications (1)

Publication Number Publication Date
CN108833088A true CN108833088A (zh) 2018-11-16

Family

ID=64149045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810493798.6A Pending CN108833088A (zh) 2018-05-22 2018-05-22 一种pos终端激活方法

Country Status (1)

Country Link
CN (1) CN108833088A (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866855A (zh) * 2020-07-17 2020-10-30 江苏海全科技有限公司 一种智能终端初始化激活方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020026426A1 (en) * 2000-08-24 2002-02-28 Bennett Joseph Michael Method of accessing the internet via the use of automated teller machines
CN103023657A (zh) * 2012-12-26 2013-04-03 武汉天喻信息产业股份有限公司 一种基于分布式的网络交易安全验证系统
CN103595718A (zh) * 2013-11-15 2014-02-19 拉卡拉支付有限公司 一种pos终端激活方法、系统、服务平台及pos终端
CN103716167A (zh) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 一种安全采集和分发传输密钥的方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020026426A1 (en) * 2000-08-24 2002-02-28 Bennett Joseph Michael Method of accessing the internet via the use of automated teller machines
CN103023657A (zh) * 2012-12-26 2013-04-03 武汉天喻信息产业股份有限公司 一种基于分布式的网络交易安全验证系统
CN103716167A (zh) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 一种安全采集和分发传输密钥的方法及装置
CN103595718A (zh) * 2013-11-15 2014-02-19 拉卡拉支付有限公司 一种pos终端激活方法、系统、服务平台及pos终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866855A (zh) * 2020-07-17 2020-10-30 江苏海全科技有限公司 一种智能终端初始化激活方法
CN111866855B (zh) * 2020-07-17 2021-01-08 江苏海全科技有限公司 一种智能终端初始化激活方法

Similar Documents

Publication Publication Date Title
CN102202300B (zh) 一种基于双通道的动态密码认证系统及方法
CN103679440B (zh) 一种以二维码为载体的金融收付方法
CN101018130B (zh) 金融业务系统及金融业务处理方法
CN104464117B (zh) 基于动态二维码银行自动柜员机取款方法及系统
CN104050565B (zh) 基于pboc支付网络的智能支付系统及其移动终端
WO2018040653A1 (zh) 一种基于nfc的离线支付方法
CN101593389A (zh) 一种用于pos终端的密钥管理方法和系统
CN103116844A (zh) 一种交易双方互相认证的近场支付方法
CN103077462A (zh) 一种基于终端的电子小票系统
CN104240073A (zh) 一种基于预付卡的脱机支付方法和系统
CN103577983A (zh) 一种脱机消费电子货币的圈存方法
CN101694710A (zh) 电子交易柜台服务系统及实现方法
CN104851206A (zh) 一种基于usbkey的电费在线支付系统
CN102054316A (zh) 一种通过手机进行密码认证的银行卡交易方法及系统
WO2014106366A1 (zh) 一种基于nfc标签的手机支付终端、支付方法及系统
CN102592221A (zh) 基于手机确认密码的银行卡支付系统及方法
CN104299135A (zh) 一种在线支付系统与方法
CN104657847A (zh) 一种限额码的支付方法
CN108833088A (zh) 一种pos终端激活方法
CN105225369A (zh) 一种母子pos系统
CN101673443B (zh) 网络收银机系统及其实现方法
CN210864812U (zh) 一种基于虹膜和人脸识别的支付系统
CN105160531B (zh) 交易数据信息处理方法及装置
CN103237027B (zh) 一种银行刷卡机数据传输的方法、装置及系统
CN201993844U (zh) 手机号支付平台、支付交易系统

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181116