SG177349A1 - Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof - Google Patents

Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof Download PDF

Info

Publication number
SG177349A1
SG177349A1 SG2011095908A SG2011095908A SG177349A1 SG 177349 A1 SG177349 A1 SG 177349A1 SG 2011095908 A SG2011095908 A SG 2011095908A SG 2011095908 A SG2011095908 A SG 2011095908A SG 177349 A1 SG177349 A1 SG 177349A1
Authority
SG
Singapore
Prior art keywords
tmk
tms
key
hsm
pos terminal
Prior art date
Application number
SG2011095908A
Inventor
Xianqiang Chen
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Publication of SG177349A1 publication Critical patent/SG177349A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • G07F7/088Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated
    • G07G1/14Systems including one or more distant stations co-operating with a central processing unit

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

A METHOD AND SYSTEM FOR SECURELY AND AUTOMATICALLY DOWNLOADING A MASTER KEY IN A BANK CARD PAYMENT SYSTEMAbstractA method and system for securely and automatically downloading a master key TMK in a bank card payment system is disclosed, wherein the hank card payment system includes a Point Of Sale POS, a Terminal Management system TMS, a PIN PAD and a HSM. A pair of public and private keys arc generated by the TMS invoking the HSM. The master key 'MIK is randomly generated by the POS terminal invoking the PIN PAD. The TMK is encrypted with the public key of the TMS, and the encrypted TMK is uploaded to the TMS, The 'TMK is decrypted with the private key by the TMS invoking the HSM, and the decrypted TMKK is stored. According to the present invention, the 'TMK is randomly generated, and the process of transmission is not exposed, and thus the 'TMK plaintext will not be exposed outside the secure storage devices. The TMK remains encrypted with the public key during the entire process of transmission. The TMK cipher text will not be decrypted until it reaches the HSM of the TMS. Thus, the present invention is of high security level. (Fig. 3)

Description

A METHOD AND SYSTEM FOR SECURELY AND AUTOMATICALLY
DOWNLOADING A MASTER KEY IN A BANK CARD PAYMENT SYSTEM
Technical Field
The present invention relates to a bank card payment system, and more particularly, to a secure method for protecting a master key in the bank card payment system.
Background
The bank card, as a payment tool, is becoming more and more popular. A typical bank card payment system includes a Point Of Sale (POS), a Terminal Management System (TMS), a PIN PAD, and a Hardware and Security Module (HSM).
The POS terminal is a device that is able to receive bank card information, has communication capability, and is able to receive a clerk's instructions to complete the exchange of financial transaction information and other related information. The TMS system is a centralized management and transaction processing system that makes centralized management of its POS terminals, including downloading parameters, downloading keys, receiving, processing, or forwarding transaction requests from the POS
Terminals, and sending the results information of the transaction back to the POS terminals.
The PIN PAD is a secure device for securely storing and protecting TMK, PIK and MAK, and encrypting PINs. The HSM is a peripheral device for encrypting the transmitted data, and is used for encrypting/decrypting, verifying the reliability of messages and documents, and storing keys. The Personal Identification Number (PIN), i. e., the personal password, is data information for identifying the validity of a card holder’s identity in the online transaction, and is never allowed to be exposed in plaintext at any stage of the computer and network system. The TMK (Terminal Master Key) is a mater key that encrypts a working key (WK) when the POS terminal is working, and it is stored in the system hardware. The TMK is readable but not writable. The working key (WK), also referred to as a data key, typically includes a PIN encrypting key (PIK) and a message authentication code (MAC) key (MAK). The working key is required to be updated frequently. The working key is required to be encrypted in the message updated online by the TMK to generate a cipher text prior to transmission.
The POS terminals are widely used in bank card payment scenarios, such as mall shopping, and hotel authentication, etc., and they are indispensable modern payment means which has come into our daily life. Bank cards, especially debit cards, are usually set up with a PIN by the card’s holder. During the payment, in addition to uploading information such as the magnetic track information of the bank card, the POS terminals also require the card’s holder to enter the PIN so as to enable the bank which issued the card to authenticate the validity of the card holder’s identity to ensure the security of the bank card payment and to protect the financial security of the card’s holder. In order to prevent the PINs from being exposed or cracked, it is required that the PINs need to stay encrypted during the entire information exchange process from the terminals to the bank. The PINs are not allowed to expose in plaintext at any stage of the computer and network system. To that end, all POS terminals that can accept PINs are required to be provided with a key management system.
The key systems for POS terminals are divided into two levels: the Terminal Master
Key (TMK) and the working key (WK). Wherein the TMKs protect the WKs during the updating of the WKs by encrypting them. Each POS terminal and TMS share a unique
TMK. There needs to be a security mechanism to ensure that the TMK can only be written into the hardware device and involved in computing process, but can not be read. The
WK includes a PIK, which is used for encrypting the PIN, and a message authentication code (MAC) key (MAK), both of which are generated by a TMS invoking an HSM, and they are downloaded when the POS terminal check in at the TMS, and are encrypted by utilizing the TMK during transmission and storage, wherein the encryption algorithm is the 3DES algorithm which has a high security level. The detailed procedure of downloading a working key is shown in Fig. 1:
The POS terminal sends a check-in request to the TMS;
The TMS invokes the HSM to randomly generate the PIK and the MAK encrypted with the TMK;
The POS terminal receives the PIK and MAK cipher texts from the TMS and stores them into the PIN PAD.
During the bank card payment procedure, the PIN, after being entered through the PIN
PAD by the card holder, is encrypted with the PIK by the PIN PAD and then uploaded to the
TMS. Next, the encrypted PIN is translated by the TMS invoking the HSM, and then it is sent to the bank which issued the card for authentication. During the entire transmission process, it is ensured that the PIN is encrypted and protected by hardware, and the 3DES encryption algorithm used is one of the encryption algorithms that are widely used and have high security level, which is typically used in the financial industry.
As can be seen from above procedure of downloading the working key, the TMK is a crucial root key. If the TMK was intercepted, the PIK, MAK, or even PIN could be cracked by using the 3DES algorithm, which is a great threat to the security of bank card payment.
Therefore, it is a crucial for key security whether or not the TMK can be securely downloaded to the POS terminals. Several existing methods for downloading the TMK are listed as bellow:
The TMK plaintext is generated by the TMS, and is directly entered into the PIN PAD of a POS terminal manually. There are severe security flaws in this method in that the TMK plaintext can be readily accessed by a specific operator, and there also exists the possibility that it is incorrectly entered manually, and thus this significantly affect the subsequent downloading of the working key and the encryption of the PIN.
Plaintext is imported from the IC card, the TMK plaintext is generated by the TMS, then is written into the IC card, and eventually the POS terminal read the TMK plaintext from the IC card and store it in the PIN PAD. There also exist several severe security flaws in this method in that the TMK plaintext is stored in the IC card. The TMK plaintext can be easily accessed as long as an IC card reader is available, and thus this significantly affect the subsequent downloading of the working key and the encryption of the PIN.
The TMK cipher text is imported from the IC card, the TMK generated by the TMS is encrypted with a specified key (known as transmission key for short) before being stored into the IC card. The POS terminal read the TMK cipher text from the IC card and then decrypt it with an IC card storing the transmission key, and eventually import it into the
PIN PAD. This method is an improvement, since an encrypted transmission is incorporated while the IC card is still entered in plaintext manner. Only the person who has the IC card with the transmission key stored therein is able to obtain the TMK plaintext, and thus the insecurity during the transmission of the key is reduced.
The TMK cipher text is imported from a special POS terminal, called parent POS terminal, the TMK cipher text generated by the TMS is decrypted by the parent POS terminal and then is imported directly into a POS terminal connected to the parent POS terminal via a serial connection, thereby the insecurity during the importing of the key is reduced. This method has a security level that is the same as that of the method in which the TMK cipher text is imported from the IC card, but there exists the following disadvantages: it is inconvenient to carry the terminals, and it is difficult to import the
TMK at the site of the merchants.
In summary, the main defects of the existing methods for downloading the TMK are as follows:
There exists possibility of manmade mistakes in the method in which data is entered manually.
Inputting the TMK in plaintext manner may cause severe security flaws and the plaintext is easy to be intercepted, especially by the person who manually enters the data.
IC cipher text importing and parent POS importing partly overcome the potential insecurity during the transmission, but there still exists insecurities in the maintenance and carrying of the transmission key IC card and the parent POS.
All the aforementioned methods for downloading the TMK need human intervention to directly operate the POS terminal, that is, they require technical support personnel to arrive at the site where the POS is located to complete the downloading task, and therefore the cost of labor is high, especially when there are a great number of POS terminals and the terminals are severely malfunctioning.
Summary
The object of the present invention is to provide a method for securely and automatically downloading a master key so as to eliminate the security flaws in the downloading process of the master key.
A method for securely and automatically downloading a master key TMK in a bank card payment system is disclosed, wherein the bank card payment system includes a Point
Of Sale POS, a Terminal Management system TMS, a PIN PAD, and a HSM. A pair of public and private keys are generated by the TMS invoking the HSM. The master key TMK is generated randomly by the POS terminal invoking the PIN PAD. The TMK is encrypted with the public key of the TMS, and then is uploaded to the TMS. The TMK is decrypted with the private key by the TMS invoking the HSM. The decrypted TMK is stored by the
TMS.
Additionally, a pair of public and private keys are generated by the TMS invoking the
HSM, wherein the private key is stored in the HSM and the public key is stored in a database of the TMS. The POS terminals initiate a request for downloading the public key, and receive the public key returned by the TMS, and then store the public key into the PIN
PAD.
Additionally, the TMS decrypts the encrypted TMK with the private key by invoking the HSM after the encrypted TMK is received from the POS terminal; and directly stores the TMK plaintext into the HSM. If the HSM does not have the storage capability, the
TMK plaintext is encrypted with a 3DES key preset by the TMS and the encrypted TMK is stored in a database of the TMS.
Additionally, a mark is defined at a message interface between the TMS and the POS terminal that indicates whether or not the TMK is required to be updated. In normal situations, the mark is set to be “no update is required”. When the POS terminal is required to update the TMK, an mark of “update is required” will be set in the message through the message interface by the TMS as long as any request, including check-in and transaction etc., is issued by the POS terminal to the TMS, and after the POS terminal has dealt with the normal responses sent by the TMS, if it is detected that the mark of “update is required” has become effective, then the update of the TMK is made so as to complete the automatic update of the TMK key. After completing the decrypt and storage of the TMK, the TMS replies to the POS terminal whether the TMK is successfully updated.
A bank card payment system for implementing the secure and automatic downloading of a master key is disclosed in the present invention, which includes a Point of Sale, a
Terminal Management System (TMS), a PIN PAD and a HSM, wherein the TMS invokes the HSM to generate a pair of public and private keys, wherein the private key is stored in the HSM and the public key is stored in a database of the TMS. The PIN PAD stores the public key downloaded from the TMS. The PIN PAD randomly generates the TMK master key and encrypts the TMK master key with the public key downloaded from the
TMS. The HSM decrypts the TMK ( the TMK is encrypted with the public key) with the private key, and stores the decrypted TMK, or encrypts the decrypted TMK using the 3DES encryption algorithm and stores it.
Additionally, a mark is defined in a message interface between the TMS and the POS terminal that indicates whether or not the TMK is required to be updated. When the POS terminal is required to update the TMK , an mark of “update is required” will be set in the message through the message interface by the TMS as long as any request, including check-in and transaction etc., is issued by the POS terminal to the TMS, and after the POS terminal has dealt with the normal responses sent by the TMS, if it is detected that the mark of “update is required” has become effective, then the update of the TMK is made so as to complete the automatic update of the TMK key; and in other normal situations, the mark is defined as “no update is required”.
According to the present invention, the TMK is randomly generated, and the process of transmission is not exposed, and thus the TMK plaintext will not be exposed outside the secure storage devices, i.e., the PIN PAD and the HSM. The TMK remains encrypted with the public key during the entire process of transmission. The TMK cipher text can not be decrypted until it reaches the HSM of the TMS. Since the security level of such asymmetric encryption algorithm is high, the cipher text, even if being intercepted, will be difficult to be cracked, thus completely eliminating the security flaws that exist in the existing downloading processes of TMK.
Brief Description of the Drawings
Fig. 1 is a prior art procedure of downloading a working key;
Fig. 2 is a procedure of downloading a working key according to the present invention;
and
Fig. 3 is a procedure of updating the TMK according to the present invention.
Detailed Description
In order to overcome the defects of the existing TMK downloading methods stated above, a method for securely and automatically downloading the TMK is proposed in the present invention. The downloading of the TMK is centrally controlled and managed by the
TMS. The data exchange with the POS terminals is done automatically. No human intervention is needed during the entire exchange process, thereby not only the cost of labor is dramatically decreased, but also the security and reliability of the TMK transmission is ensured .
To ensure the secure transmission of the TMK, an asymmetric encryption algorithm including public and private keys are introduced in the method. The concept of such encryption algorithm is: a pair of public and private keys are initially generated by the TMS invoking an HSM, wherein the private key is stored in an HSM and a public key is stored in the database of the TMS, the public key can be downloaded by the POS terminals. The flowchart of the downloading process is shown in Fig. 2, with the following steps:
A pair of public and private keys are generated by the TMS invoking an HSM, wherein the private key is stored in the HSM, and the public key is stored in the database of the
TMS;
A request for downloading the public key is issued by the POS terminal;
The public key returned from the TMS is received by the POS terminal and stored in the PIN PAD.
In each of the TMK importing methods described above, the TMK is generated by the
TMS, then is encrypted by certain encrypting means and transmitted to the POS terminals, and is decrypted by a corresponding decrypting means to obtain the TMK plaintext to be stored in the PIN PAD. However, advanced the encrypting means is, it cannot prevent a hacker or a internal personnel from intercepting the TMK plaintext with the same decrypting means. ;
In the design method proposed herein, a method of reversely generating the TMK is employed, with the detailed procedure as follows: a TMK is randomly generated in the PIN
PAD by the POS terminal, and directly encrypted in the PIN PAD with a previously downloaded TMS public key, and then uploaded to the TMS, subsequently, is decrypted with the private key by the TMS invoking an HSM, and then the TMK plaintext is directly stored in the HSM, wherein during the entire process, the TMK plaintext will not be exposed outside the HSM. For those HSMs which do not store the TMK directly, the TMK will be encrypted by a 3DES key preset by the TMS before being stored into the database of the TMS. After aforementioned process, it can work closely with the existing key management system of the POS terminals, and is transparent to the subsequent processes of updating the PIK and MAK and encrypting the PIN, and thus no human intervention is needed. Steps of the procedure of updating the TMK in accordance with the present method are shown in Fig.3 and as follows:
A TMK is randomly generated by the POS terminal invoking the instructions provided by the PIN PAD, and is encrypted with the TMS’s public key, and subsequently, is uploaded to the TMS;
The encrypted TMK is decrypted with the private key by the TMS invoking the HSM and then stored into the HSM. For those HSMs which do not store the TMK directly, the
TMK will be encrypted by a 3DES key preset by the TMS before being stored into the database of the TMS for later use in the exchange of the PIK and MAK.
The TMS replys to the POS terminal whether or not the TMK is successfully updated.
As can be seen from the entire updating procedure described above, the TMK is randomly generated, and the transmission is not exposed, and thus the TMK plaintext will not be exposed outside the secure storage devices, i.e., the PIN PAD and the HSM. The
TMK remains encrypted with the public key during the entire process of transmission. The
TMK cipher text will not be decrypted until it reaches the HSM of the TMS. Since the security level of such asymmetric encryption algorithm is high, the cipher text, even if being intercepted, will be difficult to be cracked, thus completely eliminating the security flaws that exist in the existing processes of downloading TMK described above.
In order to implement such updating procedure that generates the TMK randomly, two instructions need to be added to the existing PIN PAD, and the instructions are for: 1) storing the public key downloaded from the TMS; and 2) randomly generating the TMK key and encrypting it with the public key downloaded from the TMS.
One instruction is needed to be added to the HSM, and the instruction is for: decrypting the TMK ( the TMK is encrypted with the public key) with the private key and storing it, or decrypting the TMK and then re-encrypting it using 3DES encryption algorithm, and subsequently, storing it in the database of the TMS.
As can be seen from the TMK updating procedure described herein, the TMK updating procedure is initiated by the POS terminal, and an mark that indicates whether or not the
TMK is required to be updated is defined in the message interface between the TMS and the POS terminal in order to meet the requirement of automatic management, and the mark is defined as follows: 1) no update is required; 2) update is required.
In a normal situation, wherein a TMK has been generated and in normal use and no update of the TMK is required, the mark is set to be “no update is required”. When the POS terminals (such as the newly installed POS terminal) is required to update the TMK, or the original TMK has expired, an mark of “update is required” will be set into the message through the message interface by the TMS as long as the POS terminal issues any request (including check-in and transaction etc.) to the TMS. After the normal response of the TMS has been handled by the POS terminal, if it is detected that the mark of “update is required” has become effective, then the updating procedure of the TMK will be automatically triggered to complete the automatic update of the TMK key. As can be seen, during the entire updating procedure of the TMK, all the control and management are completed in the
TMS, and thus no human intervention is needed and no technical support personnel will be required to be sent to the site of the POS terminal to update the TMK. If in the “no update is required” state, the TMS receives a request for updating the TMK key issued by the POS terminal, it will directly reject the request, to prevent the information of the POS terminal from being copied or hijacked and being used in another POS terminal. In a case that the
POS terminal fails and does require to update the TMK key, the mark of the POS terminal will be set to be “update is required” by the TMS to allow the POS terminal to automatically complete the TMK updating procedure.
According to the method for securely and automatically downloading the TMK key described in the present invention, it is just required to add three simple instructions to the existing PIN PAD and HSM to meet the requirement of automatically downloading and secure management of the TMK. In this way, the security flaws of the existing TMK downloading procedure are avoided, and human intervention is reduced. Therefore, it is a secure, reliable, and effective method.
The advantages of the method are as follows: the asymmetric encryption algorithm, which is widely used and of high security level, is employed; it can be generally applied to the existing POS terminals and also to other automatic terminals with the similar key system, such as ATM terminals and payment terminals, etc; it is also of great commercial value and is worthy to be widely distributed.

Claims (13)

  1. I. A method for securely and automatically downloading a master key TMK in a bank card payment system, wherein the bank card payment system includes a Point Of Sale POS, a Terminal Management system TMS, a PIN PAD, and a HSM, characterized in that the method comprises: generating a pair of public and private keys by the TMS invoking the HSM; randomly generating the master key TMK by the POS terminal invoking the PIN PAD; encrypting the TMK with the public key of the TMS and uploading the encrypted TMK to the TMS; and decrypting the TMK with the private key by the TMS invoking the HSM and storing the decrypted TMK.
  2. 2. A method of claim 1, characterized in that: a pair of public and private keys are generated by the TMS invoking the HSM, wherein the private key is stored in the HSM and the public key is stored in a database of the TMS.
  3. 3. A method of claim 1, characterized in that: a request for downloading the public key is initiated by the POS terminal; and the public key returned from the TMS is received by the POS terminal and stored in the PIN PAD.
  4. 4. A method of claim 1, characterized in that: the encrypted TMK is decrypted with the private key by the TMS invoking the HSM after the encrypted TMK is received from the POS terminal; and then the TMK plaintext is directly stored in the HSM.
  5. 5. A method of claim 1, characterized in that: the encrypted TMK is decrypted with the private key by the TMS invoking the HSM after the encrypted TMK is received from the POS terminal; the TMK plaintext is encrypted with a 3DES key preset by the TMS; and then the encrypted TMK is stored in the database of the TMS.
  6. 6. A method of claim 1, characterized in that: a mark is defined in a message interface between the TMS and the POS terminal that indicates whether or not the TMK is required to be updated.
  7. 7. A method of claim 6, characterized in that: when the POS terminal is required to update the TMK, the mark of “update is required” will be set in the message through the message interface by the TMS as long as any request, including check-in and transaction etc., is sent by the POS terminal to the TMS; after the POS terminal has dealt with the normal responses of the TMS, if it is detected that the mark of “update is required” has become effective, then the TMK is updated according to claim 1, to complete the automatic update of the TMK key; and in other normal situations, the mark is defined as “no update is required”.
  8. 8. A method of claim 1, characterized in that: after completing the decrypting and storing of the TMK, the TMS reply to the POS terminal whether the TMK is successfully updated.
  9. 9. A bank card payment system for implementing the secure downloading of a master key, including a Point of Sale POS, a Terminal Management System TMS, a PIN PAD and a HSM, characterized in that: the TMS invokes the HSM to generate a pair of public and private keys, the PIN PAD stores the public key downloaded from the TMS, the PIN PAD randomly generates the TMK master key and encrypts the TMK master key with the public key downloaded from the
    TMS.
  10. 10. A system of claim 9, characterized in that: the HSM decrypts the TMK with the private key, which TMK is encrypted with the public key, and then stores the decrypted TMK, or encrypts the decrypted TMK using the 3DES encryption algorithm and then stores it.
  11. 11. A system of claim 9, characterized in that: the pair of public and private keys are generated by the TMS, wherein the private key is stored in the HSM and the public key is stored in a database of the TMS.
  12. 12. A system of claim 9, characterized in that: a mark is defined in a message interface between the TMS and the POS terminal that indicates whether or not the TMK is required to be updated.
  13. 13. A system of claim 12, characterized in that: when the POS terminal is required to update the TMK, the mark of “update is required”
    will be set in the message through the message interface by the TMS as long as any request, including check-in and transaction etc., is sent by the POS terminal to the TMS; and after the POS terminal has dealt with the normal responses of the TMS, if it is detected that the mark of “update is required” has become effective, then the automatic update of the TMK key is completed; and in other normal situations, the mark is defined as “no update is required”.
SG2011095908A 2009-06-25 2010-06-24 Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof SG177349A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910053763.1A CN101930644B (en) 2009-06-25 2009-06-25 Method for safely downloading master key automatically in bank card payment system and system thereof
PCT/CN2010/000926 WO2010148646A1 (en) 2009-06-25 2010-06-24 Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof

Publications (1)

Publication Number Publication Date
SG177349A1 true SG177349A1 (en) 2012-02-28

Family

ID=43369800

Family Applications (1)

Application Number Title Priority Date Filing Date
SG2011095908A SG177349A1 (en) 2009-06-25 2010-06-24 Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof

Country Status (4)

Country Link
CN (1) CN101930644B (en)
CA (1) CA2766491C (en)
SG (1) SG177349A1 (en)
WO (1) WO2010148646A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017078626A1 (en) * 2015-11-04 2017-05-11 Jing King Tech Holdings Pte. Ltd. Method and system for generating ciphertext by pin entry device

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237005A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Method and system for key management
CN103237004A (en) 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Key download method, key management method, method, device and system for download management
CN103220270A (en) 2013-03-15 2013-07-24 福建联迪商用设备有限公司 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103729942B (en) * 2013-03-15 2016-01-13 福建联迪商用设备有限公司 Transmission security key is transferred to the method and system of key server from terminal server
CN103595718B (en) * 2013-11-15 2016-08-10 拉卡拉支付有限公司 A kind of POS terminal Activiation method, system, service platform and POS terminal
US9571279B2 (en) * 2014-06-05 2017-02-14 Cavium, Inc. Systems and methods for secured backup of hardware security modules for cloud-based web services
CN105978856B (en) * 2016-04-18 2019-01-25 随行付支付有限公司 A kind of POS machine key downloading method, apparatus and system
CN106097608B (en) * 2016-06-06 2018-07-27 福建联迪商用设备有限公司 Remote cipher key method for down loading and system, acquirer and target POS terminal
CN106209888B (en) * 2016-07-25 2019-06-04 银联商务有限公司 A kind of information transferring method and device
CN106712939A (en) * 2016-12-27 2017-05-24 百富计算机技术(深圳)有限公司 Offline key transmission method and device
CN108365950A (en) * 2018-01-03 2018-08-03 深圳怡化电脑股份有限公司 The generation method and device of financial self-service equipment key
CN109309567A (en) * 2018-09-04 2019-02-05 福建联迪商用设备有限公司 A kind of method and system for transmitting key
CN112532567A (en) * 2019-09-19 2021-03-19 中国移动通信集团湖南有限公司 Transaction encryption method and POSP system
CN111275440B (en) * 2020-01-19 2023-11-10 中钞科堡现金处理技术(北京)有限公司 Remote key downloading method and system
CN112464188B (en) * 2020-12-14 2023-10-31 艾体威尔电子技术(北京)有限公司 Binding method of payment terminal and peripheral password keyboard
CN112462980B (en) * 2020-12-15 2021-07-20 深圳市捷诚技术服务有限公司 Password interception preventing method and device and POS machine
CN113708923A (en) * 2021-07-29 2021-11-26 银盛支付服务股份有限公司 Method and system for remotely downloading master key
CN114039728A (en) * 2021-12-24 2022-02-11 中电长城(长沙)信息技术有限公司 Message encryption and decryption method and system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1127033C (en) * 2000-07-20 2003-11-05 天津南开戈德集团有限公司 Radio mobile network point of sale (POS) terminal system and operation method thereof
US20030221110A1 (en) * 2002-05-23 2003-11-27 Anton Kryvoruchko Method of disposable command encoding (DCE) for security and anonymity protection in information system operations
CA2457263A1 (en) * 2003-02-11 2004-08-11 Bahram Seyed Zahir Azami System facilitating a purchase transaction over a wireless network
KR100930457B1 (en) * 2004-08-25 2009-12-08 에스케이 텔레콤주식회사 Authentication and payment system and method using mobile communication terminal
MX2008010705A (en) * 2006-02-22 2009-03-02 Hypercom Corp Secure electronic transaction system.
CN1835007A (en) * 2006-04-07 2006-09-20 浙江通普通信技术有限公司 Mobile payment method based on mobile communication network
CN101047493A (en) * 2006-06-02 2007-10-03 华为技术有限公司 Method and system for acquiring simple network management protocol management key
CN101458794A (en) * 2007-12-10 2009-06-17 国际商业机器公司 System for enhancing payment safety, method thereof and payment center
CN101359383A (en) * 2008-09-23 2009-02-04 中国移动通信集团广东有限公司 Non-contact card application management system and management method based on mobile communication
CN101436280B (en) * 2008-12-15 2012-09-05 北京华大智宝电子系统有限公司 Method and system for implementing electronic payment of mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017078626A1 (en) * 2015-11-04 2017-05-11 Jing King Tech Holdings Pte. Ltd. Method and system for generating ciphertext by pin entry device

Also Published As

Publication number Publication date
CN101930644B (en) 2014-04-16
WO2010148646A1 (en) 2010-12-29
CN101930644A (en) 2010-12-29
CA2766491C (en) 2016-06-07
CA2766491A1 (en) 2010-12-29

Similar Documents

Publication Publication Date Title
CA2766491C (en) A method and system for securely and automatically downloading a master key in a bank card payment system
US11102007B2 (en) Contactless card emulation system and method
US20220231857A1 (en) Hash-based data verification system
CN103714639B (en) A kind of method and system that realize the operation of POS terminal security
US9705672B2 (en) Key management method and system
US9948624B2 (en) Key downloading method, management method, downloading management method, device and system
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
US9806889B2 (en) Key downloading method, management method, downloading management method, device and system
US20190005470A1 (en) Accredited certificate issuance system based on block chain and accredited certificate issuance method based on block chain using same, and accredited certificate authentication system based on block chain and accredited certificate authentication method based on block chain using same
US20180349894A1 (en) System of hardware and software to prevent disclosure of personally identifiable information, preserve anonymity and perform settlement of transactions between parties using created and stored secure credentials
EP3780484B1 (en) Cryptographic operation and working key creation method and cryptographic service platform and device
CN104040933A (en) Differential client-side encryption of information originating from client
CN103942896A (en) System for money withdrawing without card on ATM
EP2504803A1 (en) A method and system for providing an internet based transaction
CN113015991A (en) Secure digital wallet processing system
CN112074835A (en) Techniques to perform secure operations
CN113595714A (en) Contactless card with multiple rotating security keys
US20200175512A1 (en) Key Generation in Secure Electronic Payment Systems
US20220138760A1 (en) Dynamic Ledger Address Masking
US20230090972A1 (en) Online secret encryption
AU2018282255A1 (en) System and method for secure transmission of data and data authentication
US11522722B2 (en) Communication apparatus and communication method
KR20170136044A (en) System and method for opening concurrently account of multiple financial institute through integrating process of non-faced account opening
KR101611214B1 (en) Banking system, card payment request and approval method for banking system
CN115659397A (en) Data processing method, device, terminal and storage medium