SG177349A1 - Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof - Google Patents
Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof Download PDFInfo
- Publication number
- SG177349A1 SG177349A1 SG2011095908A SG2011095908A SG177349A1 SG 177349 A1 SG177349 A1 SG 177349A1 SG 2011095908 A SG2011095908 A SG 2011095908A SG 2011095908 A SG2011095908 A SG 2011095908A SG 177349 A1 SG177349 A1 SG 177349A1
- Authority
- SG
- Singapore
- Prior art keywords
- tmk
- tms
- key
- hsm
- pos terminal
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 230000004044 response Effects 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 abstract description 18
- 230000008569 process Effects 0.000 abstract description 15
- 230000007547 defect Effects 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0873—Details of the card reader
- G07F7/088—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/12—Cash registers electronically operated
- G07G1/14—Systems including one or more distant stations co-operating with a central processing unit
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Cash Registers Or Receiving Machines (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
A METHOD AND SYSTEM FOR SECURELY AND AUTOMATICALLY DOWNLOADING A MASTER KEY IN A BANK CARD PAYMENT SYSTEMAbstractA method and system for securely and automatically downloading a master key TMK in a bank card payment system is disclosed, wherein the hank card payment system includes a Point Of Sale POS, a Terminal Management system TMS, a PIN PAD and a HSM. A pair of public and private keys arc generated by the TMS invoking the HSM. The master key 'MIK is randomly generated by the POS terminal invoking the PIN PAD. The TMK is encrypted with the public key of the TMS, and the encrypted TMK is uploaded to the TMS, The 'TMK is decrypted with the private key by the TMS invoking the HSM, and the decrypted TMKK is stored. According to the present invention, the 'TMK is randomly generated, and the process of transmission is not exposed, and thus the 'TMK plaintext will not be exposed outside the secure storage devices. The TMK remains encrypted with the public key during the entire process of transmission. The TMK cipher text will not be decrypted until it reaches the HSM of the TMS. Thus, the present invention is of high security level. (Fig. 3)
Description
A METHOD AND SYSTEM FOR SECURELY AND AUTOMATICALLY
DOWNLOADING A MASTER KEY IN A BANK CARD PAYMENT SYSTEM
The present invention relates to a bank card payment system, and more particularly, to a secure method for protecting a master key in the bank card payment system.
The bank card, as a payment tool, is becoming more and more popular. A typical bank card payment system includes a Point Of Sale (POS), a Terminal Management System (TMS), a PIN PAD, and a Hardware and Security Module (HSM).
The POS terminal is a device that is able to receive bank card information, has communication capability, and is able to receive a clerk's instructions to complete the exchange of financial transaction information and other related information. The TMS system is a centralized management and transaction processing system that makes centralized management of its POS terminals, including downloading parameters, downloading keys, receiving, processing, or forwarding transaction requests from the POS
Terminals, and sending the results information of the transaction back to the POS terminals.
The PIN PAD is a secure device for securely storing and protecting TMK, PIK and MAK, and encrypting PINs. The HSM is a peripheral device for encrypting the transmitted data, and is used for encrypting/decrypting, verifying the reliability of messages and documents, and storing keys. The Personal Identification Number (PIN), i. e., the personal password, is data information for identifying the validity of a card holder’s identity in the online transaction, and is never allowed to be exposed in plaintext at any stage of the computer and network system. The TMK (Terminal Master Key) is a mater key that encrypts a working key (WK) when the POS terminal is working, and it is stored in the system hardware. The TMK is readable but not writable. The working key (WK), also referred to as a data key, typically includes a PIN encrypting key (PIK) and a message authentication code (MAC) key (MAK). The working key is required to be updated frequently. The working key is required to be encrypted in the message updated online by the TMK to generate a cipher text prior to transmission.
The POS terminals are widely used in bank card payment scenarios, such as mall shopping, and hotel authentication, etc., and they are indispensable modern payment means which has come into our daily life. Bank cards, especially debit cards, are usually set up with a PIN by the card’s holder. During the payment, in addition to uploading information such as the magnetic track information of the bank card, the POS terminals also require the card’s holder to enter the PIN so as to enable the bank which issued the card to authenticate the validity of the card holder’s identity to ensure the security of the bank card payment and to protect the financial security of the card’s holder. In order to prevent the PINs from being exposed or cracked, it is required that the PINs need to stay encrypted during the entire information exchange process from the terminals to the bank. The PINs are not allowed to expose in plaintext at any stage of the computer and network system. To that end, all POS terminals that can accept PINs are required to be provided with a key management system.
The key systems for POS terminals are divided into two levels: the Terminal Master
Key (TMK) and the working key (WK). Wherein the TMKs protect the WKs during the updating of the WKs by encrypting them. Each POS terminal and TMS share a unique
TMK. There needs to be a security mechanism to ensure that the TMK can only be written into the hardware device and involved in computing process, but can not be read. The
WK includes a PIK, which is used for encrypting the PIN, and a message authentication code (MAC) key (MAK), both of which are generated by a TMS invoking an HSM, and they are downloaded when the POS terminal check in at the TMS, and are encrypted by utilizing the TMK during transmission and storage, wherein the encryption algorithm is the 3DES algorithm which has a high security level. The detailed procedure of downloading a working key is shown in Fig. 1:
The POS terminal sends a check-in request to the TMS;
The TMS invokes the HSM to randomly generate the PIK and the MAK encrypted with the TMK;
The POS terminal receives the PIK and MAK cipher texts from the TMS and stores them into the PIN PAD.
During the bank card payment procedure, the PIN, after being entered through the PIN
PAD by the card holder, is encrypted with the PIK by the PIN PAD and then uploaded to the
TMS. Next, the encrypted PIN is translated by the TMS invoking the HSM, and then it is sent to the bank which issued the card for authentication. During the entire transmission process, it is ensured that the PIN is encrypted and protected by hardware, and the 3DES encryption algorithm used is one of the encryption algorithms that are widely used and have high security level, which is typically used in the financial industry.
As can be seen from above procedure of downloading the working key, the TMK is a crucial root key. If the TMK was intercepted, the PIK, MAK, or even PIN could be cracked by using the 3DES algorithm, which is a great threat to the security of bank card payment.
Therefore, it is a crucial for key security whether or not the TMK can be securely downloaded to the POS terminals. Several existing methods for downloading the TMK are listed as bellow:
The TMK plaintext is generated by the TMS, and is directly entered into the PIN PAD of a POS terminal manually. There are severe security flaws in this method in that the TMK plaintext can be readily accessed by a specific operator, and there also exists the possibility that it is incorrectly entered manually, and thus this significantly affect the subsequent downloading of the working key and the encryption of the PIN.
Plaintext is imported from the IC card, the TMK plaintext is generated by the TMS, then is written into the IC card, and eventually the POS terminal read the TMK plaintext from the IC card and store it in the PIN PAD. There also exist several severe security flaws in this method in that the TMK plaintext is stored in the IC card. The TMK plaintext can be easily accessed as long as an IC card reader is available, and thus this significantly affect the subsequent downloading of the working key and the encryption of the PIN.
The TMK cipher text is imported from the IC card, the TMK generated by the TMS is encrypted with a specified key (known as transmission key for short) before being stored into the IC card. The POS terminal read the TMK cipher text from the IC card and then decrypt it with an IC card storing the transmission key, and eventually import it into the
PIN PAD. This method is an improvement, since an encrypted transmission is incorporated while the IC card is still entered in plaintext manner. Only the person who has the IC card with the transmission key stored therein is able to obtain the TMK plaintext, and thus the insecurity during the transmission of the key is reduced.
The TMK cipher text is imported from a special POS terminal, called parent POS terminal, the TMK cipher text generated by the TMS is decrypted by the parent POS terminal and then is imported directly into a POS terminal connected to the parent POS terminal via a serial connection, thereby the insecurity during the importing of the key is reduced. This method has a security level that is the same as that of the method in which the TMK cipher text is imported from the IC card, but there exists the following disadvantages: it is inconvenient to carry the terminals, and it is difficult to import the
TMK at the site of the merchants.
In summary, the main defects of the existing methods for downloading the TMK are as follows:
There exists possibility of manmade mistakes in the method in which data is entered manually.
Inputting the TMK in plaintext manner may cause severe security flaws and the plaintext is easy to be intercepted, especially by the person who manually enters the data.
IC cipher text importing and parent POS importing partly overcome the potential insecurity during the transmission, but there still exists insecurities in the maintenance and carrying of the transmission key IC card and the parent POS.
All the aforementioned methods for downloading the TMK need human intervention to directly operate the POS terminal, that is, they require technical support personnel to arrive at the site where the POS is located to complete the downloading task, and therefore the cost of labor is high, especially when there are a great number of POS terminals and the terminals are severely malfunctioning.
The object of the present invention is to provide a method for securely and automatically downloading a master key so as to eliminate the security flaws in the downloading process of the master key.
A method for securely and automatically downloading a master key TMK in a bank card payment system is disclosed, wherein the bank card payment system includes a Point
Of Sale POS, a Terminal Management system TMS, a PIN PAD, and a HSM. A pair of public and private keys are generated by the TMS invoking the HSM. The master key TMK is generated randomly by the POS terminal invoking the PIN PAD. The TMK is encrypted with the public key of the TMS, and then is uploaded to the TMS. The TMK is decrypted with the private key by the TMS invoking the HSM. The decrypted TMK is stored by the
TMS.
Additionally, a pair of public and private keys are generated by the TMS invoking the
HSM, wherein the private key is stored in the HSM and the public key is stored in a database of the TMS. The POS terminals initiate a request for downloading the public key, and receive the public key returned by the TMS, and then store the public key into the PIN
PAD.
Additionally, the TMS decrypts the encrypted TMK with the private key by invoking the HSM after the encrypted TMK is received from the POS terminal; and directly stores the TMK plaintext into the HSM. If the HSM does not have the storage capability, the
TMK plaintext is encrypted with a 3DES key preset by the TMS and the encrypted TMK is stored in a database of the TMS.
Additionally, a mark is defined at a message interface between the TMS and the POS terminal that indicates whether or not the TMK is required to be updated. In normal situations, the mark is set to be “no update is required”. When the POS terminal is required to update the TMK, an mark of “update is required” will be set in the message through the message interface by the TMS as long as any request, including check-in and transaction etc., is issued by the POS terminal to the TMS, and after the POS terminal has dealt with the normal responses sent by the TMS, if it is detected that the mark of “update is required” has become effective, then the update of the TMK is made so as to complete the automatic update of the TMK key. After completing the decrypt and storage of the TMK, the TMS replies to the POS terminal whether the TMK is successfully updated.
A bank card payment system for implementing the secure and automatic downloading of a master key is disclosed in the present invention, which includes a Point of Sale, a
Terminal Management System (TMS), a PIN PAD and a HSM, wherein the TMS invokes the HSM to generate a pair of public and private keys, wherein the private key is stored in the HSM and the public key is stored in a database of the TMS. The PIN PAD stores the public key downloaded from the TMS. The PIN PAD randomly generates the TMK master key and encrypts the TMK master key with the public key downloaded from the
TMS. The HSM decrypts the TMK ( the TMK is encrypted with the public key) with the private key, and stores the decrypted TMK, or encrypts the decrypted TMK using the 3DES encryption algorithm and stores it.
Additionally, a mark is defined in a message interface between the TMS and the POS terminal that indicates whether or not the TMK is required to be updated. When the POS terminal is required to update the TMK , an mark of “update is required” will be set in the message through the message interface by the TMS as long as any request, including check-in and transaction etc., is issued by the POS terminal to the TMS, and after the POS terminal has dealt with the normal responses sent by the TMS, if it is detected that the mark of “update is required” has become effective, then the update of the TMK is made so as to complete the automatic update of the TMK key; and in other normal situations, the mark is defined as “no update is required”.
According to the present invention, the TMK is randomly generated, and the process of transmission is not exposed, and thus the TMK plaintext will not be exposed outside the secure storage devices, i.e., the PIN PAD and the HSM. The TMK remains encrypted with the public key during the entire process of transmission. The TMK cipher text can not be decrypted until it reaches the HSM of the TMS. Since the security level of such asymmetric encryption algorithm is high, the cipher text, even if being intercepted, will be difficult to be cracked, thus completely eliminating the security flaws that exist in the existing downloading processes of TMK.
Fig. 1 is a prior art procedure of downloading a working key;
Fig. 2 is a procedure of downloading a working key according to the present invention;
and
Fig. 3 is a procedure of updating the TMK according to the present invention.
In order to overcome the defects of the existing TMK downloading methods stated above, a method for securely and automatically downloading the TMK is proposed in the present invention. The downloading of the TMK is centrally controlled and managed by the
TMS. The data exchange with the POS terminals is done automatically. No human intervention is needed during the entire exchange process, thereby not only the cost of labor is dramatically decreased, but also the security and reliability of the TMK transmission is ensured .
To ensure the secure transmission of the TMK, an asymmetric encryption algorithm including public and private keys are introduced in the method. The concept of such encryption algorithm is: a pair of public and private keys are initially generated by the TMS invoking an HSM, wherein the private key is stored in an HSM and a public key is stored in the database of the TMS, the public key can be downloaded by the POS terminals. The flowchart of the downloading process is shown in Fig. 2, with the following steps:
A pair of public and private keys are generated by the TMS invoking an HSM, wherein the private key is stored in the HSM, and the public key is stored in the database of the
TMS;
A request for downloading the public key is issued by the POS terminal;
The public key returned from the TMS is received by the POS terminal and stored in the PIN PAD.
In each of the TMK importing methods described above, the TMK is generated by the
TMS, then is encrypted by certain encrypting means and transmitted to the POS terminals, and is decrypted by a corresponding decrypting means to obtain the TMK plaintext to be stored in the PIN PAD. However, advanced the encrypting means is, it cannot prevent a hacker or a internal personnel from intercepting the TMK plaintext with the same decrypting means. ;
In the design method proposed herein, a method of reversely generating the TMK is employed, with the detailed procedure as follows: a TMK is randomly generated in the PIN
PAD by the POS terminal, and directly encrypted in the PIN PAD with a previously downloaded TMS public key, and then uploaded to the TMS, subsequently, is decrypted with the private key by the TMS invoking an HSM, and then the TMK plaintext is directly stored in the HSM, wherein during the entire process, the TMK plaintext will not be exposed outside the HSM. For those HSMs which do not store the TMK directly, the TMK will be encrypted by a 3DES key preset by the TMS before being stored into the database of the TMS. After aforementioned process, it can work closely with the existing key management system of the POS terminals, and is transparent to the subsequent processes of updating the PIK and MAK and encrypting the PIN, and thus no human intervention is needed. Steps of the procedure of updating the TMK in accordance with the present method are shown in Fig.3 and as follows:
A TMK is randomly generated by the POS terminal invoking the instructions provided by the PIN PAD, and is encrypted with the TMS’s public key, and subsequently, is uploaded to the TMS;
The encrypted TMK is decrypted with the private key by the TMS invoking the HSM and then stored into the HSM. For those HSMs which do not store the TMK directly, the
TMK will be encrypted by a 3DES key preset by the TMS before being stored into the database of the TMS for later use in the exchange of the PIK and MAK.
The TMS replys to the POS terminal whether or not the TMK is successfully updated.
As can be seen from the entire updating procedure described above, the TMK is randomly generated, and the transmission is not exposed, and thus the TMK plaintext will not be exposed outside the secure storage devices, i.e., the PIN PAD and the HSM. The
TMK remains encrypted with the public key during the entire process of transmission. The
TMK cipher text will not be decrypted until it reaches the HSM of the TMS. Since the security level of such asymmetric encryption algorithm is high, the cipher text, even if being intercepted, will be difficult to be cracked, thus completely eliminating the security flaws that exist in the existing processes of downloading TMK described above.
In order to implement such updating procedure that generates the TMK randomly, two instructions need to be added to the existing PIN PAD, and the instructions are for: 1) storing the public key downloaded from the TMS; and 2) randomly generating the TMK key and encrypting it with the public key downloaded from the TMS.
One instruction is needed to be added to the HSM, and the instruction is for: decrypting the TMK ( the TMK is encrypted with the public key) with the private key and storing it, or decrypting the TMK and then re-encrypting it using 3DES encryption algorithm, and subsequently, storing it in the database of the TMS.
As can be seen from the TMK updating procedure described herein, the TMK updating procedure is initiated by the POS terminal, and an mark that indicates whether or not the
TMK is required to be updated is defined in the message interface between the TMS and the POS terminal in order to meet the requirement of automatic management, and the mark is defined as follows: 1) no update is required; 2) update is required.
In a normal situation, wherein a TMK has been generated and in normal use and no update of the TMK is required, the mark is set to be “no update is required”. When the POS terminals (such as the newly installed POS terminal) is required to update the TMK, or the original TMK has expired, an mark of “update is required” will be set into the message through the message interface by the TMS as long as the POS terminal issues any request (including check-in and transaction etc.) to the TMS. After the normal response of the TMS has been handled by the POS terminal, if it is detected that the mark of “update is required” has become effective, then the updating procedure of the TMK will be automatically triggered to complete the automatic update of the TMK key. As can be seen, during the entire updating procedure of the TMK, all the control and management are completed in the
TMS, and thus no human intervention is needed and no technical support personnel will be required to be sent to the site of the POS terminal to update the TMK. If in the “no update is required” state, the TMS receives a request for updating the TMK key issued by the POS terminal, it will directly reject the request, to prevent the information of the POS terminal from being copied or hijacked and being used in another POS terminal. In a case that the
POS terminal fails and does require to update the TMK key, the mark of the POS terminal will be set to be “update is required” by the TMS to allow the POS terminal to automatically complete the TMK updating procedure.
According to the method for securely and automatically downloading the TMK key described in the present invention, it is just required to add three simple instructions to the existing PIN PAD and HSM to meet the requirement of automatically downloading and secure management of the TMK. In this way, the security flaws of the existing TMK downloading procedure are avoided, and human intervention is reduced. Therefore, it is a secure, reliable, and effective method.
The advantages of the method are as follows: the asymmetric encryption algorithm, which is widely used and of high security level, is employed; it can be generally applied to the existing POS terminals and also to other automatic terminals with the similar key system, such as ATM terminals and payment terminals, etc; it is also of great commercial value and is worthy to be widely distributed.
Claims (13)
- I. A method for securely and automatically downloading a master key TMK in a bank card payment system, wherein the bank card payment system includes a Point Of Sale POS, a Terminal Management system TMS, a PIN PAD, and a HSM, characterized in that the method comprises: generating a pair of public and private keys by the TMS invoking the HSM; randomly generating the master key TMK by the POS terminal invoking the PIN PAD; encrypting the TMK with the public key of the TMS and uploading the encrypted TMK to the TMS; and decrypting the TMK with the private key by the TMS invoking the HSM and storing the decrypted TMK.
- 2. A method of claim 1, characterized in that: a pair of public and private keys are generated by the TMS invoking the HSM, wherein the private key is stored in the HSM and the public key is stored in a database of the TMS.
- 3. A method of claim 1, characterized in that: a request for downloading the public key is initiated by the POS terminal; and the public key returned from the TMS is received by the POS terminal and stored in the PIN PAD.
- 4. A method of claim 1, characterized in that: the encrypted TMK is decrypted with the private key by the TMS invoking the HSM after the encrypted TMK is received from the POS terminal; and then the TMK plaintext is directly stored in the HSM.
- 5. A method of claim 1, characterized in that: the encrypted TMK is decrypted with the private key by the TMS invoking the HSM after the encrypted TMK is received from the POS terminal; the TMK plaintext is encrypted with a 3DES key preset by the TMS; and then the encrypted TMK is stored in the database of the TMS.
- 6. A method of claim 1, characterized in that: a mark is defined in a message interface between the TMS and the POS terminal that indicates whether or not the TMK is required to be updated.
- 7. A method of claim 6, characterized in that: when the POS terminal is required to update the TMK, the mark of “update is required” will be set in the message through the message interface by the TMS as long as any request, including check-in and transaction etc., is sent by the POS terminal to the TMS; after the POS terminal has dealt with the normal responses of the TMS, if it is detected that the mark of “update is required” has become effective, then the TMK is updated according to claim 1, to complete the automatic update of the TMK key; and in other normal situations, the mark is defined as “no update is required”.
- 8. A method of claim 1, characterized in that: after completing the decrypting and storing of the TMK, the TMS reply to the POS terminal whether the TMK is successfully updated.
- 9. A bank card payment system for implementing the secure downloading of a master key, including a Point of Sale POS, a Terminal Management System TMS, a PIN PAD and a HSM, characterized in that: the TMS invokes the HSM to generate a pair of public and private keys, the PIN PAD stores the public key downloaded from the TMS, the PIN PAD randomly generates the TMK master key and encrypts the TMK master key with the public key downloaded from theTMS.
- 10. A system of claim 9, characterized in that: the HSM decrypts the TMK with the private key, which TMK is encrypted with the public key, and then stores the decrypted TMK, or encrypts the decrypted TMK using the 3DES encryption algorithm and then stores it.
- 11. A system of claim 9, characterized in that: the pair of public and private keys are generated by the TMS, wherein the private key is stored in the HSM and the public key is stored in a database of the TMS.
- 12. A system of claim 9, characterized in that: a mark is defined in a message interface between the TMS and the POS terminal that indicates whether or not the TMK is required to be updated.
- 13. A system of claim 12, characterized in that: when the POS terminal is required to update the TMK, the mark of “update is required”will be set in the message through the message interface by the TMS as long as any request, including check-in and transaction etc., is sent by the POS terminal to the TMS; and after the POS terminal has dealt with the normal responses of the TMS, if it is detected that the mark of “update is required” has become effective, then the automatic update of the TMK key is completed; and in other normal situations, the mark is defined as “no update is required”.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910053763.1A CN101930644B (en) | 2009-06-25 | 2009-06-25 | Method for safely downloading master key automatically in bank card payment system and system thereof |
PCT/CN2010/000926 WO2010148646A1 (en) | 2009-06-25 | 2010-06-24 | Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
SG177349A1 true SG177349A1 (en) | 2012-02-28 |
Family
ID=43369800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG2011095908A SG177349A1 (en) | 2009-06-25 | 2010-06-24 | Method for safely and automatically downloading terminal master key in bank card payment system and the system thereof |
Country Status (4)
Country | Link |
---|---|
CN (1) | CN101930644B (en) |
CA (1) | CA2766491C (en) |
SG (1) | SG177349A1 (en) |
WO (1) | WO2010148646A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017078626A1 (en) * | 2015-11-04 | 2017-05-11 | Jing King Tech Holdings Pte. Ltd. | Method and system for generating ciphertext by pin entry device |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103237005A (en) * | 2013-03-15 | 2013-08-07 | 福建联迪商用设备有限公司 | Method and system for key management |
CN103237004A (en) | 2013-03-15 | 2013-08-07 | 福建联迪商用设备有限公司 | Key download method, key management method, method, device and system for download management |
CN103220270A (en) | 2013-03-15 | 2013-07-24 | 福建联迪商用设备有限公司 | Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key |
CN103729942B (en) * | 2013-03-15 | 2016-01-13 | 福建联迪商用设备有限公司 | Transmission security key is transferred to the method and system of key server from terminal server |
CN103595718B (en) * | 2013-11-15 | 2016-08-10 | 拉卡拉支付有限公司 | A kind of POS terminal Activiation method, system, service platform and POS terminal |
US9571279B2 (en) * | 2014-06-05 | 2017-02-14 | Cavium, Inc. | Systems and methods for secured backup of hardware security modules for cloud-based web services |
CN105978856B (en) * | 2016-04-18 | 2019-01-25 | 随行付支付有限公司 | A kind of POS machine key downloading method, apparatus and system |
CN106097608B (en) * | 2016-06-06 | 2018-07-27 | 福建联迪商用设备有限公司 | Remote cipher key method for down loading and system, acquirer and target POS terminal |
CN106209888B (en) * | 2016-07-25 | 2019-06-04 | 银联商务有限公司 | A kind of information transferring method and device |
CN106712939A (en) * | 2016-12-27 | 2017-05-24 | 百富计算机技术(深圳)有限公司 | Offline key transmission method and device |
CN108365950A (en) * | 2018-01-03 | 2018-08-03 | 深圳怡化电脑股份有限公司 | The generation method and device of financial self-service equipment key |
CN109309567A (en) * | 2018-09-04 | 2019-02-05 | 福建联迪商用设备有限公司 | A kind of method and system for transmitting key |
CN112532567A (en) * | 2019-09-19 | 2021-03-19 | 中国移动通信集团湖南有限公司 | Transaction encryption method and POSP system |
CN111275440B (en) * | 2020-01-19 | 2023-11-10 | 中钞科堡现金处理技术(北京)有限公司 | Remote key downloading method and system |
CN112464188B (en) * | 2020-12-14 | 2023-10-31 | 艾体威尔电子技术(北京)有限公司 | Binding method of payment terminal and peripheral password keyboard |
CN112462980B (en) * | 2020-12-15 | 2021-07-20 | 深圳市捷诚技术服务有限公司 | Password interception preventing method and device and POS machine |
CN113708923A (en) * | 2021-07-29 | 2021-11-26 | 银盛支付服务股份有限公司 | Method and system for remotely downloading master key |
CN114039728A (en) * | 2021-12-24 | 2022-02-11 | 中电长城(长沙)信息技术有限公司 | Message encryption and decryption method and system |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1127033C (en) * | 2000-07-20 | 2003-11-05 | 天津南开戈德集团有限公司 | Radio mobile network point of sale (POS) terminal system and operation method thereof |
US20030221110A1 (en) * | 2002-05-23 | 2003-11-27 | Anton Kryvoruchko | Method of disposable command encoding (DCE) for security and anonymity protection in information system operations |
CA2457263A1 (en) * | 2003-02-11 | 2004-08-11 | Bahram Seyed Zahir Azami | System facilitating a purchase transaction over a wireless network |
KR100930457B1 (en) * | 2004-08-25 | 2009-12-08 | 에스케이 텔레콤주식회사 | Authentication and payment system and method using mobile communication terminal |
MX2008010705A (en) * | 2006-02-22 | 2009-03-02 | Hypercom Corp | Secure electronic transaction system. |
CN1835007A (en) * | 2006-04-07 | 2006-09-20 | 浙江通普通信技术有限公司 | Mobile payment method based on mobile communication network |
CN101047493A (en) * | 2006-06-02 | 2007-10-03 | 华为技术有限公司 | Method and system for acquiring simple network management protocol management key |
CN101458794A (en) * | 2007-12-10 | 2009-06-17 | 国际商业机器公司 | System for enhancing payment safety, method thereof and payment center |
CN101359383A (en) * | 2008-09-23 | 2009-02-04 | 中国移动通信集团广东有限公司 | Non-contact card application management system and management method based on mobile communication |
CN101436280B (en) * | 2008-12-15 | 2012-09-05 | 北京华大智宝电子系统有限公司 | Method and system for implementing electronic payment of mobile terminal |
-
2009
- 2009-06-25 CN CN200910053763.1A patent/CN101930644B/en active Active
-
2010
- 2010-06-24 WO PCT/CN2010/000926 patent/WO2010148646A1/en active Application Filing
- 2010-06-24 CA CA2766491A patent/CA2766491C/en active Active
- 2010-06-24 SG SG2011095908A patent/SG177349A1/en unknown
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017078626A1 (en) * | 2015-11-04 | 2017-05-11 | Jing King Tech Holdings Pte. Ltd. | Method and system for generating ciphertext by pin entry device |
Also Published As
Publication number | Publication date |
---|---|
CN101930644B (en) | 2014-04-16 |
WO2010148646A1 (en) | 2010-12-29 |
CN101930644A (en) | 2010-12-29 |
CA2766491C (en) | 2016-06-07 |
CA2766491A1 (en) | 2010-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2766491C (en) | A method and system for securely and automatically downloading a master key in a bank card payment system | |
US11102007B2 (en) | Contactless card emulation system and method | |
US20220231857A1 (en) | Hash-based data verification system | |
CN103714639B (en) | A kind of method and system that realize the operation of POS terminal security | |
US9705672B2 (en) | Key management method and system | |
US9948624B2 (en) | Key downloading method, management method, downloading management method, device and system | |
US9647845B2 (en) | Key downloading method, management method, downloading management method, device and system | |
US9806889B2 (en) | Key downloading method, management method, downloading management method, device and system | |
US20190005470A1 (en) | Accredited certificate issuance system based on block chain and accredited certificate issuance method based on block chain using same, and accredited certificate authentication system based on block chain and accredited certificate authentication method based on block chain using same | |
US20180349894A1 (en) | System of hardware and software to prevent disclosure of personally identifiable information, preserve anonymity and perform settlement of transactions between parties using created and stored secure credentials | |
EP3780484B1 (en) | Cryptographic operation and working key creation method and cryptographic service platform and device | |
CN104040933A (en) | Differential client-side encryption of information originating from client | |
CN103942896A (en) | System for money withdrawing without card on ATM | |
EP2504803A1 (en) | A method and system for providing an internet based transaction | |
CN113015991A (en) | Secure digital wallet processing system | |
CN112074835A (en) | Techniques to perform secure operations | |
CN113595714A (en) | Contactless card with multiple rotating security keys | |
US20200175512A1 (en) | Key Generation in Secure Electronic Payment Systems | |
US20220138760A1 (en) | Dynamic Ledger Address Masking | |
US20230090972A1 (en) | Online secret encryption | |
AU2018282255A1 (en) | System and method for secure transmission of data and data authentication | |
US11522722B2 (en) | Communication apparatus and communication method | |
KR20170136044A (en) | System and method for opening concurrently account of multiple financial institute through integrating process of non-faced account opening | |
KR101611214B1 (en) | Banking system, card payment request and approval method for banking system | |
CN115659397A (en) | Data processing method, device, terminal and storage medium |