CN110867018A - System and method for realizing safe PIN input on cash register with Android intelligent platform - Google Patents

System and method for realizing safe PIN input on cash register with Android intelligent platform Download PDF

Info

Publication number
CN110867018A
CN110867018A CN201911190663.3A CN201911190663A CN110867018A CN 110867018 A CN110867018 A CN 110867018A CN 201911190663 A CN201911190663 A CN 201911190663A CN 110867018 A CN110867018 A CN 110867018A
Authority
CN
China
Prior art keywords
card reading
reading module
password keyboard
ciphertext
smk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911190663.3A
Other languages
Chinese (zh)
Other versions
CN110867018B (en
Inventor
王震懿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN NEWLAND PAYMENT TECHNOLOGY Co Ltd
Original Assignee
FUJIAN NEWLAND PAYMENT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN NEWLAND PAYMENT TECHNOLOGY Co Ltd filed Critical FUJIAN NEWLAND PAYMENT TECHNOLOGY Co Ltd
Priority to CN201911190663.3A priority Critical patent/CN110867018B/en
Publication of CN110867018A publication Critical patent/CN110867018A/en
Application granted granted Critical
Publication of CN110867018B publication Critical patent/CN110867018B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1033Details of the PIN pad
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of POS machine safety systems, in particular to a system and a method for realizing safe PIN input on an Android intelligent platform cash register; the system comprises a password keyboard, a card reading module and an android application, wherein the password keyboard is used for acquiring PIN data of a user; the card reading module is used for acquiring account data; the transaction key is downloaded at the card reading module end; and the android application end is used for packaging and analyzing the 8583 transaction message.

Description

System and method for realizing safe PIN input on cash register with Android intelligent platform
Technical Field
The invention relates to the technical field of POS machine security systems, in particular to a system and a method for realizing security PIN input on an Android intelligent platform cash register.
Background
Compared with a cash register with a traditional closed system, the intelligent desktop cash register based on the Android system is a new product form in the market at present, the Android platform is more developed, the corresponding transaction risk is higher, the cash register cannot store and process sensitive data such as transaction keys, bank card information, user PIN and the like, in a bank card transaction scene, the bank card data of a user needs to be processed through an external or internal safety card reading module, and the PIN data input by the user needs to be processed through an external password keyboard.
The card reading module and the password keyboard in the intelligent desktop cash register system in the current market are two mutually independent functional modules, are not directly connected on hardware, but are respectively connected or embedded on a cash register host, and the card reading module and the password keyboard are communicated by forwarding data through a host end. Because the password keyboard is not necessarily integrated with a card processing function, information such as a card primary account number and the like needs to be transmitted to the password keyboard through a host terminal by a card reading module, the sensitive information needs to be protected according to the safety design requirements of the industry, and a plaintext cannot be directly exposed to the host terminal based on an Android system.
On the other hand, when the bank card is transacted, the transaction keys issued by the bank background mainly comprise a data encryption key (TDK) for encrypting card data, a PIN encryption key (TPK) for encrypting a user PIN and an MAC encryption key (TAK) for calculating 8583 transaction message MAC, because a PIN input function is input at a password keyboard end, three types of transaction passwords are mostly installed in a card reading module and a password keyboard respectively in the existing design, the design needs to ensure that the transaction keys of the bank background, the card reading module and the password keyboard are consistent, the password keyboard is used as an external device and is not in standard configuration, and most of the time, the user can pull and insert the transaction keys, which causes the complexity of transaction key data synchronization.
The method for carrying out mutual authentication between the card reader module and the password keyboard of the desktop cash register and constructing the safe encryption channel between the card reader module and the password keyboard meets the protection requirement of sensitive data of a user, and a new user PIN encryption scheme is designed, so that a transaction key only needs to be stored at the safe card reading module end and does not need to be issued to the password keyboard, the transaction can be completed only by ensuring that the transaction keys of the bank background and the card reading module are consistent, and the complexity of transaction key management in the whole system is simplified.
Disclosure of Invention
The invention provides a system and a method for realizing safe PIN input on an Android intelligent platform cash register, which can effectively solve the problems.
In order to achieve the purpose, the invention is realized by the following technical scheme:
a system for realizing safe PIN input on an Android intelligent platform cash register comprises a password keyboard, a card reading module and an Android application, wherein the password keyboard is used for acquiring PIN data of a user; the card reading module is used for acquiring account data; the transaction key is downloaded at the card reading module end; and the android application end is used for packaging and analyzing the 8583 transaction message.
Further, the password keyboard end only stores a temporary session key for protecting sensitive data.
The invention further provides a method for realizing safe PIN input on the cash register with the Android intelligent platform, which comprises the following steps:
s1: when the system is initialized, the android application at the host end triggers the mutual authentication between the card reading module and the password keyboard, and after the mutual authentication is successful, the same terminal Session Master Key (SMK) is negotiated between the password keyboard and the card reading module and is used for the subsequent trans-encryption of the user PIN;
s2: the card reading module and the password keyboard carry out encryption conversion on the PIN input by the user by utilizing a PAN randomly generated by the card reading module each time and a random PIN protection key (TSK) of one-time pad according to the card reading information and the PIN information input by the user, generate an actual transaction ciphertext, and package and send the actual transaction ciphertext to a bank transaction background through android application.
Further, the steps of the bidirectional authentication between the card reading module and the password keyboard in S1 are as follows:
s1.1, when equipment leaves a factory, the same authentication key (AUK) for terminal identity authentication is injected into a card reading module and a password keyboard, and the AUK corresponds to terminal information and has one secret;
s1.2, injecting the same terminal key encryption key (TEK) for decrypting and installing the session key master key SMK into the card reading module and the password keyboard when the equipment leaves a factory, wherein the TEK corresponds to the terminal information and is one secret for one machine;
s1.3, calling an authentication initialization interface of a card reading module by android application at a host terminal, generating an authentication random number RN1 by the card reading module and forwarding the authentication random number RN1 to a password keyboard through the android application;
s1.4 the password keyboard uses AUK to encrypt RN1 to obtain RN1 ciphertext;
s1.5, the password keyboard generates a random number RN2, and the RN1 ciphertext and the RN2 are forwarded to the card reading module through android application;
s1.6 the card reading module decrypts RN1 by using AUK and compares the plain texts of RN1 to determine whether the plain texts are consistent;
s1.7, the card reading module encrypts RN2 by using AUK to obtain an RN2 ciphertext;
the S1.8 card reading module generates a random number RN3, and forwards an RN2 ciphertext and RN3 to a password keyboard through android application;
s1.9 the password keyboard uses AUK to decrypt RN2, and whether the plain texts of RN2 are consistent or not is compared;
s1.10 the keypad uses AUK to encrypt RN 3;
s1.11, generating a random SMK by the password keyboard, and encrypting an SMK plaintext by using a TEK to obtain an SMK ciphertext;
s1.12, the RN3 ciphertext and the SMK ciphertext are forwarded to the card reading module through android application by the password keyboard;
s1.13 card reading module uses AUK to decrypt RN3, and compares the plaintext of RN3 to determine whether the plaintext is consistent;
s1.14, the card reading module decrypts the SMK ciphertext by using the TEK to obtain an SMK plaintext;
the TEK is used for installing the SMK after passing the authentication; the SMK as a session key master key is invalid after the terminal exits the online transaction mode, the session key is required to be handshake negotiated again when the transaction mode is restarted, and if any step fails in the process, the SMK is returned to the initial state.
Further, the user PIN encryption conversion process in S2 includes the following steps:
s2.1, calling a card reading module random primary account number generation interface by the android application at the host end, and generating a random primary account number PAN by the card reading module;
s2.2, the android application forwards the random PAN to the password keyboard;
s2.3, generating a random PIN protection key (TSK) by the password keyboard;
s2.4, the user inputs PIN at the end of the password keyboard, and the password keyboard encrypts the PIN by using the TSK and the random PAN to obtain a ciphertext PinBlock _ Enc 1;
s2.5, the SMK is used by the password keyboard to encrypt the TSK to obtain a TSK ciphertext;
s2.6, the PinBock _ Enc1 and the TSK ciphertext are forwarded to the card reading module through android application by the password keyboard;
s2.7, the card reading module decrypts the TSK ciphertext by using the SMK to obtain a TSK plaintext;
s2.8, the card reading module decrypts PinBlock _ Enc1 by using TSK plaintext and random PAN to restore a plaintext PIN input by a user;
s2.9, the card reading module encrypts a plaintext PIN by using a terminal transaction key (TPK) and an actual PAN of a user to obtain a ciphertext PinBlock _ Enc2 for actual transaction;
and the S2.10 card reading module returns PinBlock _ Enc2 to the android application, and the android application packages the PinBlock _ Enc2 into 8583 transaction messages and sends the transaction messages to the bank transaction background.
Further, the temporary session key TSK is regenerated every time it is transcrypted, once for one time.
Compared with the prior art, the invention has the beneficial effects that:
compared with the common asymmetric key authentication mode, the authentication speed based on the symmetric key is higher, the requirement on the operational capability of a CPU is lower, and the method better conforms to the characteristics of a password keyboard and a low-cost security module.
In addition, the PIN-to-encryption scheme of one-time pad design meets the safety requirement of PCI authentication, and the transaction key only needs to be stored at the safe card reading module end and does not need to be issued to a password keyboard, thereby simplifying the complexity of transaction key management in the whole system.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a logical functional block diagram of a system of the present invention;
FIG. 2 is a flow chart of mutual authentication;
fig. 3 is a flow chart of encryption conversion of a user PIN.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 to 3, an embodiment of the present invention provides a system for implementing secure PIN input on an Android intelligent platform cash register, including a password keyboard, a card reading module, and an Android application, where the password keyboard is used to obtain PIN data of a user; the card reading module is used for acquiring account data such as IC \ magnetic card \ non-connected card and the like; the transaction key is downloaded at the card reading module end; the password keyboard end only stores a temporary session key for protecting sensitive data, and the android application end is used for packaging and analyzing 8583 transaction messages.
The invention further provides a method for realizing safe PIN input on the cash register with the Android intelligent platform, which comprises the following steps:
s1: when the system is initialized, the android application at the host end triggers the mutual authentication between the card reading module and the password keyboard, and after the mutual authentication is successful, the same terminal Session Master Key (SMK) is negotiated between the password keyboard and the card reading module and is used for the subsequent trans-encryption of the user PIN;
s2: the card reading module and the password keyboard carry out encryption conversion on the PIN input by the user by utilizing a PAN randomly generated by the card reading module each time and a random PIN protection key (TSK) of one-time pad according to the card reading information and the PIN information input by the user, generate an actual transaction ciphertext, and package and send the actual transaction ciphertext to a bank transaction background through android application.
Further, the steps of the bidirectional authentication between the card reading module and the password keyboard in S1 are as follows:
s1.1, when equipment leaves a factory, the same authentication key (AUK) for terminal identity authentication is injected into a card reading module and a password keyboard, and the AUK corresponds to terminal information and has one secret;
s1.2, injecting the same terminal key encryption key (TEK) for decrypting and installing the session key master key SMK into the card reading module and the password keyboard when the equipment leaves a factory, wherein the TEK corresponds to the terminal information and is one secret for one machine;
s1.3, calling an authentication initialization interface of a card reading module by android application at a host terminal, generating an authentication random number RN1 by the card reading module and forwarding the authentication random number RN1 to a password keyboard through the android application;
s1.4 the password keyboard uses AUK to encrypt RN1 to obtain RN1 ciphertext;
s1.5, the password keyboard generates a random number RN2, and the RN1 ciphertext and the RN2 are forwarded to the card reading module through android application;
s1.6 the card reading module decrypts RN1 by using AUK and compares the plain texts of RN1 to determine whether the plain texts are consistent;
s1.7, the card reading module encrypts RN2 by using AUK to obtain an RN2 ciphertext;
the S1.8 card reading module generates a random number RN3, and forwards an RN2 ciphertext and RN3 to a password keyboard through android application;
s1.9 the password keyboard uses AUK to decrypt RN2, and whether the plain texts of RN2 are consistent or not is compared;
s1.10 the keypad uses AUK to encrypt RN 3;
s1.11, generating a random SMK by the password keyboard, and encrypting an SMK plaintext by using a TEK to obtain an SMK ciphertext;
s1.12, the RN3 ciphertext and the SMK ciphertext are forwarded to the card reading module through android application by the password keyboard;
s1.13 card reading module uses AUK to decrypt RN3, and compares the plaintext of RN3 to determine whether the plaintext is consistent;
s1.14, the card reading module decrypts the SMK ciphertext by using the TEK to obtain an SMK plaintext;
the TEK is used for installing the SMK after passing the authentication; the SMK as a session key master key is invalid after the terminal exits the online transaction mode, the session key is required to be handshake negotiated again when the transaction mode is restarted, and if any step fails in the process, the SMK is returned to the initial state.
The authentication random number used in the process is encrypted by AUK, and each step of data interaction is provided with the authentication random number, so that the aim of preventing replay attack is fulfilled.
Further, the user PIN encryption conversion process in S2 includes the following steps:
s2.1, calling a card reading module random primary account number generation interface by the android application at the host end, and generating a random primary account number PAN by the card reading module;
s2.2, the android application forwards the random PAN to the password keyboard;
s2.3, generating a random PIN protection key (TSK) by the password keyboard;
s2.4, the user inputs PIN at the end of the password keyboard, and the password keyboard encrypts the PIN by using the TSK and the random PAN to obtain a ciphertext PinBlock _ Enc 1;
s2.5, the SMK is used by the password keyboard to encrypt the TSK to obtain a TSK ciphertext;
s2.6, the PinBock _ Enc1 and the TSK ciphertext are forwarded to the card reading module through android application by the password keyboard;
s2.7, the card reading module decrypts the TSK ciphertext by using the SMK to obtain a TSK plaintext;
s2.8, the card reading module decrypts PinBlock _ Enc1 by using TSK plaintext and random PAN to restore a plaintext PIN input by a user;
s2.9, the card reading module encrypts a plaintext PIN by using a terminal transaction key (TPK) and an actual PAN of a user to obtain a ciphertext PinBlock _ Enc2 for actual transaction;
and the S2.10 card reading module returns PinBlock _ Enc2 to the android application, and the android application packages the PinBlock _ Enc2 into 8583 transaction messages and sends the transaction messages to the bank transaction background.
In the above steps, the temporary session key TSK is regenerated every time encryption is performed, once for one time.
The random PAN used to generate PinBlock _ Enc1 is generated by the card reading module to avoid replay attacks.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (6)

1. A system for realizing safe PIN input on an Android intelligent platform cash register is characterized by comprising a password keyboard, a card reading module and an Android application, wherein the password keyboard is used for acquiring PIN data of a user; the card reading module is used for acquiring account data; the transaction key is downloaded at the card reading module end; and the android application end is used for packaging and analyzing the 8583 transaction message.
2. The system for realizing safe PIN input on the Android intelligent platform cash register is characterized in that the password keyboard end only stores a temporary session key for protecting sensitive data.
3. A method for realizing safe PIN input on an Android intelligent platform cash register is characterized by comprising the following steps:
s1: when the system is initialized, the android application at the host end triggers the mutual authentication between the card reading module and the password keyboard, and after the mutual authentication is successful, the same terminal Session Master Key (SMK) is negotiated between the password keyboard and the card reading module and is used for the subsequent trans-encryption of the user PIN;
s2: the card reading module and the password keyboard carry out encryption conversion on the PIN input by the user by utilizing a PAN randomly generated by the card reading module each time and a random PIN protection key (TSK) of one-time pad according to the card reading information and the PIN information input by the user, generate an actual transaction ciphertext, and package and send the actual transaction ciphertext to a bank transaction background through android application.
4. The method for realizing safe PIN input on the Android intelligent platform cash register according to claim 3, wherein the bidirectional authentication between the card reading module and the password keyboard in S1 comprises the following steps:
s1.1, when equipment leaves a factory, the same authentication key (AUK) for terminal identity authentication is injected into a card reading module and a password keyboard, and the AUK corresponds to terminal information and has one secret;
s1.2, injecting the same terminal key encryption key (TEK) for decrypting and installing the session key master key SMK into the card reading module and the password keyboard when the equipment leaves a factory, wherein the TEK corresponds to the terminal information and is one secret for one machine;
s1.3, calling an authentication initialization interface of a card reading module by android application at a host terminal, generating an authentication random number RN1 by the card reading module and forwarding the authentication random number RN1 to a password keyboard through the android application;
s1.4 the password keyboard uses AUK to encrypt RN1 to obtain RN1 ciphertext;
s1.5, the password keyboard generates a random number RN2, and the RN1 ciphertext and the RN2 are forwarded to the card reading module through android application;
s1.6 the card reading module decrypts RN1 by using AUK and compares the plain texts of RN1 to determine whether the plain texts are consistent;
s1.7, the card reading module encrypts RN2 by using AUK to obtain an RN2 ciphertext;
the S1.8 card reading module generates a random number RN3, and forwards an RN2 ciphertext and RN3 to a password keyboard through android application;
s1.9 the password keyboard uses AUK to decrypt RN2, and whether the plain texts of RN2 are consistent or not is compared;
s1.10 the keypad uses AUK to encrypt RN 3;
s1.11, generating a random SMK by the password keyboard, and encrypting an SMK plaintext by using a TEK to obtain an SMK ciphertext;
s1.12, the RN3 ciphertext and the SMK ciphertext are forwarded to the card reading module through android application by the password keyboard;
s1.13 card reading module uses AUK to decrypt RN3, and compares the plaintext of RN3 to determine whether the plaintext is consistent;
s1.14, the card reading module decrypts the SMK ciphertext by using the TEK to obtain an SMK plaintext;
the TEK is used for installing the SMK after passing the authentication; the SMK as a session key master key is invalid after the terminal exits the online transaction mode, the session key is required to be handshake negotiated again when the transaction mode is restarted, and if any step fails in the process, the SMK is returned to the initial state.
5. The method for realizing safe PIN input on the Android intelligent platform cash register according to claim 3, wherein the user PIN encryption conversion process in S2 comprises the following steps:
s2.1, calling a card reading module random primary account number generation interface by the android application at the host end, and generating a random primary account number PAN by the card reading module;
s2.2, the android application forwards the random PAN to the password keyboard;
s2.3, generating a random PIN protection key (TSK) by the password keyboard;
s2.4, the user inputs PIN at the end of the password keyboard, and the password keyboard encrypts the PIN by using the TSK and the random PAN to obtain a ciphertext PinBlock _ Enc 1;
s2.5, the SMK is used by the password keyboard to encrypt the TSK to obtain a TSK ciphertext;
s2.6, the PinBock _ Enc1 and the TSK ciphertext are forwarded to the card reading module through android application by the password keyboard;
s2.7, the card reading module decrypts the TSK ciphertext by using the SMK to obtain a TSK plaintext;
s2.8, the card reading module decrypts PinBlock _ Enc1 by using TSK plaintext and random PAN to restore a plaintext PIN input by a user;
s2.9, the card reading module encrypts a plaintext PIN by using a terminal transaction key (TPK) and an actual PAN of a user to obtain a ciphertext PinBlock _ Enc2 for actual transaction;
and the S2.10 card reading module returns PinBlock _ Enc2 to the android application, and the android application packages the PinBlock _ Enc2 into 8583 transaction messages and sends the transaction messages to the bank transaction background.
6. The method for realizing the safe PIN input on the Android intelligent platform cash register is characterized in that the temporary session key TSK is regenerated once every encryption.
CN201911190663.3A 2019-11-28 2019-11-28 System and method for realizing safe PIN input on cash register with Android intelligent platform Active CN110867018B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911190663.3A CN110867018B (en) 2019-11-28 2019-11-28 System and method for realizing safe PIN input on cash register with Android intelligent platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911190663.3A CN110867018B (en) 2019-11-28 2019-11-28 System and method for realizing safe PIN input on cash register with Android intelligent platform

Publications (2)

Publication Number Publication Date
CN110867018A true CN110867018A (en) 2020-03-06
CN110867018B CN110867018B (en) 2020-11-27

Family

ID=69656714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911190663.3A Active CN110867018B (en) 2019-11-28 2019-11-28 System and method for realizing safe PIN input on cash register with Android intelligent platform

Country Status (1)

Country Link
CN (1) CN110867018B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914312A (en) * 2020-08-07 2020-11-10 上海方付通商务服务有限公司 Terminal password keyboard system based on film card hardware and PIN code protection method
CN114331415A (en) * 2021-12-28 2022-04-12 福建新大陆支付技术有限公司 Intelligent cash register system, encrypted communication method and storage medium
CN114330396A (en) * 2021-12-31 2022-04-12 福建新大陆支付技术有限公司 External password keyboard and identity card information interaction method based on Android platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1152378A2 (en) * 2000-04-28 2001-11-07 Ncr International Inc. Encrypting keypad module
CN103237005A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Method and system for key management
US20130297432A1 (en) * 2004-09-20 2013-11-07 Verifone, Inc. Secure pin entry device for mobile phones
CN204965627U (en) * 2015-08-12 2016-01-13 浙江联亿家科技有限公司 Intelligence cash registering machine device
CN205656721U (en) * 2016-05-17 2016-10-19 福建新大陆支付技术有限公司 Based on intelligence POS safety circuit of android system
CN108809925A (en) * 2017-10-26 2018-11-13 深圳市移卡科技有限公司 POS terminal data encryption and transmission method, terminal device and storage medium
CN109033771A (en) * 2012-12-12 2018-12-18 环汇系统有限公司 System and method for carrying out PIN input on the mobile apparatus

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1152378A2 (en) * 2000-04-28 2001-11-07 Ncr International Inc. Encrypting keypad module
US20130297432A1 (en) * 2004-09-20 2013-11-07 Verifone, Inc. Secure pin entry device for mobile phones
CN109033771A (en) * 2012-12-12 2018-12-18 环汇系统有限公司 System and method for carrying out PIN input on the mobile apparatus
CN103237005A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Method and system for key management
CN204965627U (en) * 2015-08-12 2016-01-13 浙江联亿家科技有限公司 Intelligence cash registering machine device
CN205656721U (en) * 2016-05-17 2016-10-19 福建新大陆支付技术有限公司 Based on intelligence POS safety circuit of android system
CN108809925A (en) * 2017-10-26 2018-11-13 深圳市移卡科技有限公司 POS terminal data encryption and transmission method, terminal device and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914312A (en) * 2020-08-07 2020-11-10 上海方付通商务服务有限公司 Terminal password keyboard system based on film card hardware and PIN code protection method
CN111914312B (en) * 2020-08-07 2024-02-13 上海方付通科技服务股份有限公司 Terminal password keyboard system based on film card hardware and PIN code protection method
CN114331415A (en) * 2021-12-28 2022-04-12 福建新大陆支付技术有限公司 Intelligent cash register system, encrypted communication method and storage medium
CN114330396A (en) * 2021-12-31 2022-04-12 福建新大陆支付技术有限公司 External password keyboard and identity card information interaction method based on Android platform
CN114330396B (en) * 2021-12-31 2023-10-13 福建新大陆支付技术有限公司 External password keyboard and identity card information interaction method based on Android platform

Also Published As

Publication number Publication date
CN110867018B (en) 2020-11-27

Similar Documents

Publication Publication Date Title
EP2991267B1 (en) Apparatus for providing puf-based hardware otp and method for authenticating 2-factor using same
US20210344495A1 (en) Contactless card emulation system and method
CN108234132B (en) Secure communication system and method for main control chip and encryption chip
US10909531B2 (en) Security for mobile applications
US6073237A (en) Tamper resistant method and apparatus
CN110867018B (en) System and method for realizing safe PIN input on cash register with Android intelligent platform
ES2456815T3 (en) User authentication procedures in data processing systems
CN1913427B (en) System and method for encrypted smart card PIN entry
BR102014023229A2 (en) method for multi-factor transaction authentication using wearable devices
CN104579679B (en) Wireless public network data forwarding method for agriculture distribution communication equipment
TW201428529A (en) A fingerprint authentication system and fingerprint authentication method based on the near field communication (NFC)
CA2838763A1 (en) Credential authentication methods and systems
CN101483654A (en) Method and system for implementing authentication and data safe transmission
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN114567470B (en) SDK-based multi-system key splitting verification system and method
CN105608775B (en) A kind of method of authentication, terminal, access card and SAM card
KR100968494B1 (en) Tag security processing method using One Time Password
CN108768941A (en) A kind of method and device of remote de-locking safety equipment
CN110100411B (en) Cryptographic system management
EP3556046B1 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
CN110098925A (en) Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system
CN111901312A (en) Method, system, equipment and readable storage medium for network access control
KR101947408B1 (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof
CN114692120A (en) State password authentication method, virtual machine, terminal equipment, system and storage medium
KR20190002388A (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant