WO2014139403A1 - 一种终端主密钥tmk安全下载方法及系统 - Google Patents

一种终端主密钥tmk安全下载方法及系统 Download PDF

Info

Publication number
WO2014139403A1
WO2014139403A1 PCT/CN2014/073205 CN2014073205W WO2014139403A1 WO 2014139403 A1 WO2014139403 A1 WO 2014139403A1 CN 2014073205 W CN2014073205 W CN 2014073205W WO 2014139403 A1 WO2014139403 A1 WO 2014139403A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
terminal
mtms
kms
random number
Prior art date
Application number
PCT/CN2014/073205
Other languages
English (en)
French (fr)
Inventor
苏文龙
孟陆强
Original Assignee
福建联迪商用设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN2013100843972A external-priority patent/CN103237004A/zh
Priority claimed from CN2013100846735A external-priority patent/CN103220271A/zh
Priority claimed from CN2013100846716A external-priority patent/CN103220270A/zh
Priority claimed from CN2013100846538A external-priority patent/CN103237005A/zh
Application filed by 福建联迪商用设备有限公司 filed Critical 福建联迪商用设备有限公司
Publication of WO2014139403A1 publication Critical patent/WO2014139403A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Definitions

  • the present invention relates to the field of electronic payment, and in particular, to a method and system for securely downloading a terminal master key TMK.
  • Bank card (BANK Card) is becoming more and more popular as a payment instrument.
  • the usual bank card payment system includes a point of sale terminal (Point Of Sale, POS), POS Acquiring System (POSP), PIN PAD and Hardware Encryption (Hardware and Security) Module, HSM).
  • the POS terminal can accept the bank card information, has the communication function, and accepts the instructions of the teller to complete the financial transaction information and the related information exchange device; the POS acquiring system performs centralized management on the POS terminal, including parameter downloading, key downloading, accepting, Processing or forwarding the transaction request of the POS terminal, and sending back the transaction result information to the POS terminal, which is a centralized management and transaction processing system; the password keyboard (PIN) PAD) is a security device that securely stores keys related to various financial transactions and encrypts PINs.
  • the hardware encryption machine (HSM) is a peripheral hardware device that encrypts transmitted data and is used for encryption of PINs. Decrypt, verify the correctness of the message and file source, and store the key.
  • Personal identification number (Personal Identification Number, PIN), which is the personal information, is the data information identifying the legality of the cardholder's identity in online transactions. It is not allowed to appear in plain text in any part of the computer and network system; terminal master key (Terminal) Master Key, TMK), when the POS terminal works, the master key for encrypting the work key is encrypted and stored in the system database; the POS terminal is widely used in bank card payment occasions, such as vendor shopping, hotel accommodation, etc. The lack of modern means of payment has been integrated into the various situations of people's lives. Bank cards, especially debit cards, generally have a PIN set by the cardholder.
  • the POS terminal In the process of payment, the POS terminal not only sends the track information of the bank card, but also the cardholder to input the PIN for the card issuing bank to verify.
  • the legality of the cardholder’s identity ensures the security of the payment of the bank card and protects the property of the cardholder.
  • it In order to prevent the PIN from being leaked or cracked, it is required to securely encrypt the PIN from the terminal to the issuing bank during the entire information exchange process. It is not allowed to appear in the clear text in any part of the computer network system, so the input PIN is currently accepted.
  • the POS terminal requires a key management system.
  • TMK terminal master key
  • WK work key
  • TMK encrypts and protects WK during the WK update process.
  • the unique TMK shared between each POS terminal and the POS must be secure. It can only be written to the device and participate in the calculation. It cannot be read.
  • TMK is a key root key. If the TMK is intercepted, the work is confidential. The key is easier to crack and will seriously threaten the bank card payment security. Therefore, whether the TMK can be safely downloaded to the POS terminal becomes the key to the security of the entire POS terminal.
  • the download of the terminal master key TMK must be controlled in the security room of the management center of the acquirer. Therefore, it is necessary to manually centralize the POS terminal and download the terminal master key. Therefore, the workload of the maintenance center computer room is large; after the equipment leaves the factory, it needs to be transported to the security center of the management center to download the key to be deployed to the merchant, and the transportation cost increases; in order to centrally download the terminal master key, a large amount of manpower and working time are required, and maintenance is required. Problems such as high cost and long maintenance period.
  • the payment terminal such as the ATM machine terminal, the smart IC card for payment use, and the mobile phone terminal with payment function need to manually collect and download the terminal master key, and the transportation cost is high, and the centralized terminal is installed.
  • the key requires a lot of manpower and working time, and the maintenance cost is large and the maintenance period is long.
  • a method for secure downloading a terminal master key TMK includes the steps of: S1, a process in which the MTMS system transmits the public key Pu_mtms to the payment terminal; S2, a process in which the payment terminal encrypts the transmission key TK using the public key Pu_mtms and uploads it to the KMS system.
  • the payment terminal downloads the process of the master key TMK encrypted by the transmission key TK from the KMS system;
  • the specific step of the step S1 includes: S11, the operation terminal presets the operation terminal digital certificate Crt_optm generated by the CA center, and the MTMS system pre- Set the MTMS system digital certificate Crt_mtms generated by the CA center, the KMS system presets the KMS system digital certificate Crt_kms generated by the CA center; S12, the MTMS system calls the first hardware encryption machine, KMS The system calls the second hardware encryption machine to respectively perform the MTMS system permission component and the KMS in the first hardware encryption machine and the second hardware encryption machine.
  • the system authority component synthesizes the protection key PK and the MAC key MAK, and stores the protection key PK and the MAC key MAK together in the first hardware encryption machine and the second hardware encryption machine; S13, the operation terminal and the MTMS
  • the system performs bidirectional authentication through the CA center; S14, after the authentication is passed, the MTMS system sends the public key Pu_mtms to the payment terminal through the operation terminal and stores it in the password keyboard; the specific steps of step S2 include: S21, the payment terminal invokes the password keyboard to generate the transmission key.
  • the transmission key TK includes a transmission encryption key TEK and a transmission authentication key AUK; S22, the payment terminal invokes a cryptographic keyboard using a public key Pu_mtms The encrypted transmission key TK generates a first transmission key ciphertext Ctk_Pu; S23, the operation terminal transmits the first transmission key ciphertext Ctk_Pu And the terminal serial number SN is sent to the MTMS system; S24, when receiving the TK acquisition request sent by the KMS, the MTMS system calls the first hardware encryption machine to use the private key Pr_mtms Decrypting the first transmission key ciphertext Ctk_Pu to obtain the transmission key TK, then using the protection key PK to encrypt the transmission key TK to obtain the ciphertext TK, and using the MAC key MAK to calculate the MAC of the ciphertext TK The value combines the ciphertext TK and the ciphertext TK to generate a second transport key ciphertext Ct
  • the KMS system calls the second hardware encryption machine to generate the master key ciphertext Ctmk by using the transport encryption key TEK to encrypt the terminal master key TMK and send the master key ciphertext Ctmk to a payment terminal; S36.
  • the payment terminal invokes the cryptographic keyboard to decrypt the master key ciphertext Ctmk using the transport encryption key TEK to obtain the terminal master key TMK and store the terminal master key TMK in the PIN pad.
  • a terminal master key TMK security download system includes a first hardware encryption machine, a second hardware encryption machine, a payment terminal, an operation terminal, an MTMS system, a CA center, and a KMS system; the payment terminal includes a first TK uploading module, The TMK request module, the two-way authentication A module, and the TMK receiving module, the operation terminal includes a second TK uploading module, and the MTMS system includes a negotiation key A module, a public key sending module, a TK request response module, and a third TK uploading module.
  • the KMS system includes a negotiation key B module, a TMK request response module, a two-way authentication B module, and a TMK sending module.
  • the CA center includes a certificate presetting module and a CA authentication module; the certificate presetting module is configured to generate the CA center.
  • the operation terminal digital certificate Crt_optm is preset to the operation terminal, and the MTMS system digital certificate Crt_mtms generated by the CA center is preset in the MTMS system, and the KMS system digital certificate Crt_kms generated by the CA center is preset in the KMS system;
  • the negotiation key A module and The negotiation key B module is configured to invoke the first hardware encryption machine and the second hardware encryption machine, and respectively, the MTMS in the first hardware encryption machine and the second hardware encryption machine KMS component and system permissions
  • the system authority component synthesizes the protection key PK and the MAC key MAK, and stores the protection key PK and the MAC key MAK together in the first hardware encryption machine and the second hardware encryption machine;
  • the CA authentication module is used to The operation terminal and the MTMS system perform mutual authentication through the CA center;
  • the public key transmission module is configured to send the public key Pu_
  • Decrypting the first transmission key ciphertext Ctk_Pu to obtain a transmission key TK for obtaining the ciphertext TK by using the protection key PK to encrypt the transmission key TK, and for calculating the MAC of the ciphertext TK using the MAC key MAK The value is used to combine the MAC values of the ciphertext TK and the ciphertext TK to generate the second transport key ciphertext Ctk_pk; the CA authentication module is also used for mutual authentication between the MTMS system and the KMS system through the CA center; the third TK upload module Used to terminate the terminal serial number SN after the MTMS system and the KMS system pass the authentication.
  • the TMK requesting module is configured to send the terminal serial number SN and the download master key request to the KMS System;
  • TMK request response module is used when the KMS system receives the terminal serial number SN sent by the payment terminal And after downloading the master key request, querying the second transport key ciphertext Ctk_pk corresponding to the terminal serial number SN;
  • the TMK request response module is further configured to invoke the second hardware encryptor to use the MAC key MAK to query the second transmission.
  • the utility model has the beneficial effects that the transmission terminal TK is uploaded by the payment terminal, and the terminal master key TMK is encrypted by the TK, and then transmitted to the payment terminal, so that the payment terminal remotely downloads the terminal master key, thereby avoiding the payment terminal downloading the master key through centralized downloading.
  • the logistics cost and the maintenance cost of the centralized download of the KMS system are reduced.
  • the remote download master key TMK is transmitted in ciphertext, and the master key is transferred between the payment terminal and the KMS. Two-way authentication between the two parties has been carried out, and the transmission security of the master key has been improved.
  • the collection and uploading of the transmission key TK is implemented by the operation terminal, and the terminal uploads the TK.
  • the time efficiency and also greatly facilitates the collection and upload of different types and models of payment terminal transmission key TK.
  • the collection and uploading of the payment terminal transmission key TK by the operation terminal enables the hardware resources of the payment terminal to generate and transmit the key TK portion to be released, so that the hardware resources of the payment terminal can be more rationally optimized for use.
  • the transmission key TK of various payment terminals produced by different regional factories can be uniformly stored and sent to the corresponding KMS system through the MTMS system, thereby avoiding the error that the payment terminal may randomly transmit the transmission key TK. And the burden of working on the KMS system.
  • the CA center performs identity authentication on both the transmitting and receiving sides of the transmission data to ensure that the operation terminal, the MTMS system and the KMS system are legally identifiable, and the ciphertext is not stolen by the pseudo terminal.
  • FIG. 1 is a structural block diagram of a terminal master key TMK secure download system according to an embodiment of the present invention
  • FIG. 2 is a structural block diagram of the two-way authentication A module of FIG. 1;
  • FIG. 3 is a structural block diagram of the bidirectional authentication B module of FIG. 1;
  • FIG. 4 is a flowchart of a method for securely downloading a terminal master key TMK according to an embodiment of the present invention
  • FIG. 3 is a specific flow chart of step S1 in Figure 4;
  • FIG. 4 is a specific flow chart of step S2 in Figure 4;
  • FIG. 5 is a specific flowchart of step S3 in FIG.
  • 10 payment terminal; 20: operation terminal; 30: KMS system; 40: MTMS system; 50: CA center; 60: first hardware encryption machine; 70: second hardware encryption machine; 101: first TK upload module; 102: TMK request module; 103: two-way authentication A module; 104: TMK receiving module; 201: second TK upload module; 301: negotiated key B module; 302: TMK sending module; 303: TMK request response module; 304: two-way authentication B module; 401: negotiated key A module; 402: TK request response module; 403: public key sending module; 404: third TK uploading module; 501: certificate preset module; 502: CA authentication module; 1031: first random number generating unit; 1032: a first data transceiver unit; 1033: a first encryption and decryption unit; 1034: a first determination unit; 3041: a second random number generation unit; 3042: a second data transceiver unit; 3043: second encryption and decrypti
  • AUK Authentication Key Abbreviation, the authentication key, used for mutual authentication between PINPAD and the key management system KMS;
  • CA Center The so-called CA (Certificate Authority) Center, which uses PKI (Public Key) Infrastructure) Public Key Infrastructure Technology, which provides network identity authentication services, is responsible for issuing and managing digital certificates, and is an authoritative and impartial third-party trust organization that acts like a company that issues documents in real life.
  • PKI Public Key
  • HSM High Security Machine, high security device, which is a hardware encryption machine in this system
  • KMS system Key Management System, key management system for managing terminal master key TMK;
  • MAK short for Mac Key, which is the MAC calculation key.
  • MTMS full name Material Tracking Management System, material traceability management system, mainly used in factory production;
  • PIK short name of Pin Key, that is, Pin encryption key, which is a kind of work key
  • PINPAD password keyboard
  • PK Short for Protect Key, the protection key, negotiated with the customer to determine the 24-byte symmetric key.
  • MTMS/TCS Encrypted transmission of TK with KMS;
  • POS Short for Point Of Sale, which is the sales terminal
  • SNpinpad the serial number of the PIN pad. When PINPAD is built-in, it is the same as the serial number SNpos of the POS terminal.
  • SN the serial number of the payment terminal
  • TEK Transmission Encrypt The abbreviation of Key, that is, transmission encryption key, 24-byte symmetric key, used for encrypted transmission of TMK between PINPAD and key management system KMS;
  • TK Transmission The abbreviation of Key, that is, the transmission key.
  • the transport key is composed of a transport encryption key TEK and a mutual authentication key AUK;
  • TMS Terminal Management System Abbreviation, that is, terminal management system, used to complete payment terminal information management, software and parameter configuration, remote download, terminal operation status information collection management, remote diagnosis and other functions;
  • TMK Terminal Master
  • the abbreviation of Key that is, the terminal master key, is used for encrypted transmission of the work key between the payment terminal and the payment acquiring system;
  • Security room A room with a high security level for storing servers. This room requires authentication before it can enter.
  • Smart IC card It is a CPU card.
  • the integrated circuit in the card includes a central processing unit CPU, a programmable read-only memory EEPROM, a random access memory RAM, and an in-card operating system COS (Chip) which is solidified in a read-only memory ROM. Operating System), the data in the card is divided into external reading and internal processing.
  • Symmetric key Both parties that send and receive data must use the same key to encrypt and decrypt the plaintext.
  • Symmetric key encryption algorithms mainly include: DES, 3DES, IDEA, FEAL, BLOWFISH, and so on.
  • Asymmetric Key An asymmetric encryption algorithm requires two keys: a public key (Private key) and a private key (Public key) Key). The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used for decryption; if the data is encrypted with the private key, only the corresponding public key can be used. Decrypt. Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm.
  • the basic process of asymmetric information exchange for asymmetric encryption is: Party A generates a pair of keys and exposes one of them as a public key to other parties; Party B, which obtains the public key, uses the key to perform confidential information.
  • Party A After encryption, it will be sent to Party A; Party A will decrypt the encrypted information with another private key saved by Party A.
  • Party A may use Party B's public key to encrypt the confidential information and then send it to Party B; Party B then uses its own private key to decrypt the encrypted information.
  • the main algorithms are RSA, Elgamal, backpack algorithm, Rabin, D-H, ECC (elliptic curve encryption algorithm).
  • RSA An asymmetric key algorithm.
  • the RSA public key encryption algorithm was in 1977 by Ron Rivest, Adi Shamirh Developed by Len Adleman (Massachusetts Institute of Technology, USA).
  • the RSA is named after the name of the three of them.
  • RSA It is currently the most influential public key encryption algorithm, it can resist all the password attacks known so far, and has been recommended by ISO as the public key data encryption standard.
  • RSA The algorithm is based on a very simple theory of numbers: it is easy to multiply two large prime numbers.
  • the RSA algorithm is the first algorithm that can be used for both encryption and digital signatures, and is easy to understand and operate.
  • RSA It is the most widely studied public key algorithm. It has been tested by various attacks for more than 30 years from the present to the present, and it is gradually accepted as one of the best public key solutions.
  • TDES Triple-DES DES is a symmetric encryption algorithm with a key of 8 bytes. TDES is based on DES The encryption algorithm whose key is 16 bytes or 24 bytes. TDES/3DES is the abbreviation of English TripleDES (ie triple data encryption standard), DES is English Data Acronym for Encryption Standard. DES is a symmetric key encryption algorithm, that is, the encryption algorithm with the same data encryption key and decryption key. DES by IBM The company was developed and made public in the 1970s and subsequently adopted by the US government and recognized by the US National Bureau of Standards and the American National Standards Institute (ANSI). TDES/3DES is DES A pattern of encryption algorithms that uses three 64-bit keys to encrypt data three times. Is a safer variant of DES.
  • the present invention adopts a new master key downloading scheme, and randomly generates a TK (Transmission) through a payment terminal. Key, transport key), save the generated TK in the PIN pad of the payment terminal, and transfer the TK to the KMS (Key Management) through various transmission modes required in various application scenarios.
  • the KMS system uses the TK to encrypt the terminal master key TMK, and sends the encrypted terminal master key ciphertext to the payment terminal, and the payment terminal receives the TK to the master key.
  • the text is decrypted to obtain the terminal master key TMK, and the terminal master key TMK is saved in the password keyboard.
  • the terminal master key TMK is encrypted by TK, so that the TMK can be remotely transmitted, and the secure download of the TMK is facilitated.
  • the operation terminal collects the TK generated by the payment terminal, and the operation terminal is responsible for transmitting the TK to the MTMS system (Material Tracking).
  • Management System material traceability system, mainly used in factory production
  • TK is managed by the MTMS system
  • TK is sent to the corresponding KMS system.
  • Using the operation terminal to collect TK can facilitate TK collection operation (can achieve one-key acquisition, etc.) and TK collection authority management;
  • MTMS system can facilitate unified management of TK, and facilitate data retrieval and download of payment terminals after after-sales maintenance.
  • the MTMS system can realize TK transmission in batches in production order, which facilitates the transmission management of TK and prevents TK from being mis-delivered to the wrong object.
  • the above-mentioned remote transmission of the TMK can be realized by collecting the transmission key TK through the payment terminal, sending it to the bank to encrypt the TMK, and then remotely downloading the TK encrypted TK through the payment terminal.
  • more terminals and systems are involved in the TK upload and TMK download process, so it is prone to pseudo terminal stealing TMK.
  • a method for securely downloading the terminal master key TMK of each terminal and system identity is needed.
  • the technical solution of the present invention to overcome the above problems will be described in detail below.
  • the idea of the invention is that the TK and TMK transport processes are carried out by the CA Center (Certificate) Authority, certificate authority, using Public Key Infrastructure public key infrastructure technology, specifically providing network identity authentication services, responsible for issuing and managing digital certificates, and authoritative and impartial third-party trust institutions) to identify the identity of operating terminals, MTMS systems and KMS systems, through the introduction of CA The center prevents the pseudo terminal and the pseudo KMS system from stealing the TK.
  • the terminal master key TMK secure download system includes a first hardware encryption machine 50 and a second hardware encryption machine 60.
  • the operation terminal 20 includes a second TK uploading module 201.
  • the MTMS system 40 includes a negotiation key A module 401, a public key sending module 403, a TK request response module 402, and a third TK uploading module 404.
  • the KMS system 30 includes The negotiation key B module 301, the TMK request response module 303, the two-way authentication B module 304, and the TMK sending module 302, the CA center 50 includes a certificate presetting module 501 and a CA authentication module 502.
  • the certificate presetting module 501 is configured to preset the operation terminal digital certificate Crt_optm generated by the CA center 50 to the operation terminal 20, preset the MTMS system digital certificate Crt_mtms generated by the CA center 50 to the MTMS system 40, and generate the KMS generated by the CA center 50.
  • the system digital certificate Crt_kms is preset to the KMS system 30;
  • the negotiation key A module 401 and the negotiation key B module 301 are used to invoke the first hardware encryption machine 60 and the second hardware encryption machine 70 to respectively connect the MTMS system 40 in the first hardware encryption machine 60 and the second hardware encryption machine 70.
  • Permission component and KMS The system 30 privilege component synthesizes the protection key PK and the MAC key MAK, and stores the protection key PK and the MAC key MAK together in the first hardware encryption machine 60 and the second hardware encryption machine 70;
  • the CA authentication module 50 is configured to perform bidirectional authentication on the operation terminal 20 and the MTMS system 40 through the CA center 50;
  • the public key sending module 403 is configured to send the public key Pu_mtms to the payment terminal 10 through the operation terminal 20 and store it in the password keyboard after the CA authentication authentication is passed;
  • the first TK uploading module 101 is configured to invoke a cryptographic keyboard to generate a transport key TK, where the transport key TK includes a transport encryption key TEK and a transport authentication key AUK;
  • the first TK uploading module 101 is configured to invoke a cryptographic keyboard to encrypt the transport key TK using the public key Pu_mtms. Generating a first transmission key ciphertext Ctk_Pu;
  • the second TK uploading module 201 is configured to send the first transport key ciphertext Ctk_Pu and the terminal serial number SN to the MTMS system 40;
  • the TK request response module 402 is configured to invoke the first hardware encryption machine 60 to use the private key Pr_mtms when receiving the TK acquisition request sent by the KMS system 30. Decrypting the first transmission key ciphertext Ctk_Pu to obtain a transmission key TK for obtaining the ciphertext TK by using the protection key PK to encrypt the transmission key TK, and for calculating the MAC of the ciphertext TK using the MAC key MAK a value, and used to combine the ciphertext TK and ciphertext TK MAC values to generate a second transport key ciphertext Ctk_pk;
  • the CA authentication module 502 is also used for mutual authentication of the MTMS system 40 and the KMS system through the CA center 50;
  • the third TK uploading module 404 is configured to: after the MTMS system 40 and the KMS system 30 pass the authentication, the terminal serial number SN And the second transmission key ciphertext Ctk_pk is sent to the KMS system 30;
  • the TMK request module 102 is configured to send the terminal serial number SN and the download master key request to the KMS system 30;
  • the TMK request response module 303 is configured to receive the terminal serial number SN sent by the payment terminal 10 when the KMS system 30 receives And after downloading the master key request, querying the second transmission key ciphertext Ctk_pk corresponding to the terminal serial number SN;
  • the TMK request response module 303 is further configured to invoke the second hardware encryptor 70 to check the MAC address of the queried second transport key ciphertext Ctk_pk using the MAC key MAK. Legitimacy, and for decrypting the second transmission key ciphertext Ctk_pk using the protection key PK to obtain the transmission key TK and storing it in the second hardware encryption machine 70 after the verification is passed;
  • Two-way authentication A module 103 and two-way authentication B module 304 are used when KMS After obtaining the transmission key TK, the system 30 calls the second hardware encryption machine 60 to perform mutual authentication with the payment terminal using the authentication key AUK;
  • the TMK sending module 302 is configured to, after the KMS system 30 and the payment terminal 10 pass the mutual authentication, call the second hardware encrypting machine 70 to generate the master key ciphertext Ctmk and encrypt the master key by using the transport encryption key TEK to encrypt the terminal master key TMK.
  • the ciphertext Ctmk is sent to the payment terminal 10;
  • the TMK receiving module 104 is configured to invoke the cryptographic keyboard to decrypt the master key ciphertext Ctmk using the transport encryption key TEK to obtain the terminal master key TMK and store the terminal master key TMK in the PIN pad.
  • the certificate presetting module of the CA center 50 includes an operation terminal digital certificate Crt_optm generation module, an MTMS system digital certificate Crt_mtms generation module, and a KMS system digital certificate Crt_kms generation module.
  • the digital certificate Crt_optm generating module of the operation terminal 10 is configured to invoke the operation terminal to generate a public-private key pair Pu and Pr, and use the root certificate corresponding private key to sign the public key Pu and the operation terminal identification information, generate a digital certificate Crt_optm and use it to generate The digital certificate Crt_optm is sent and stored in the operation terminal 20;
  • the digital certificate Crt_mtms generating module of the MTMS system 40 is configured to invoke the first hardware encryption machine 60 to generate public-private key pairs Pr_mtms and Pu_mtms, and use the root certificate corresponding private key to sign the public key Pu_mtms and the MTMS system identification information to generate a digital certificate Crt_mtms. And used to send and store the generated Crt_mtms in the MTMS system 40;
  • the KMS system 30 digital certificate Crt_kms generating module is configured to invoke the second hardware encrypting machine 70 to generate public-private key pairs Pr_kms and Pu_kms, use the root certificate corresponding private key to sign the public key Pu_kms and the KMS system identification information, and generate a digital certificate Crt_kms and use The Crt_kms are transmitted and stored in the KMS system 30.
  • the operation terminal 20 further includes an operator card and an administrator card;
  • the certificate presetting module 501 of the CA center 50 is further configured to generate an operator card certificate and an administrator card certificate, and is used for the operator card certificate. Stored in the operator card and stored in the management card;
  • the operator card and the administrator card are used to authorize the operator card and the administrator card inserted in the operation terminal when the operation terminal passes the legality certification of the operator certificate and the administrator certificate through the CA center 50, and authorizes The operation terminal 20 is operated.
  • the second TK uploading module 201 further includes a packaging unit, where the packaging unit is configured to package the received first transmission key ciphertext Ctk_Pu and the terminal serial number SN and use an operator card to sign;
  • the third TK uploading module 404 of the MTMS system 40 further includes a check unit, when the check unit is configured to receive the first transport key ciphertext Ctk_Pu and the terminal serial number SN transmitted by the TK collecting unit, The validity of the signature of the packing unit is checked, and when the check is legal, the terminal serial number SN and the first transport key ciphertext Ctk_Pu are stored in association with the database of the MTMS system.
  • the two-way authentication A module 103 includes a first random number generating unit 1031, a first data transceiving unit 1032, a first encryption and decryption unit 1033, and a first judging unit 1034.
  • the bidirectional authentication B module includes a second random number generating unit 3041.
  • the first random number generating unit 1031 is configured to generate a first random number Rnd1; the first data transceiving unit 1032 is configured to send the generated first random number Rnd1 to the KMS system 30; and the second data transceiving unit 3042 is configured to receive the first random number The number Rnd1; the second random number generating unit 3041 is configured to generate a random number second Rnd2 when receiving the first random number Rnd1; and the second encrypting and decrypting unit 3043 is configured to call the second when receiving the first random number Rnd1
  • the hardware encryption machine 70 obtains the first random number ciphertext Crnd1 by encrypting the first random number Rnd1 using the transmission authentication key AUK; and the second data transceiving unit 3042 is configured to send the first random number ciphertext Crnd1 and the second random number Rnd2 to the payment. Terminal 10;
  • the first encryption and decryption unit 1033 is configured to decrypt the received first random number ciphertext Crnd1 using the transmission authentication key AUK to obtain the third random number Rnd1' when receiving the first random number ciphertext Crnd1 and the second random number Rnd2.
  • the first determining unit is configured to determine whether the third random number Rnd1' is consistent with the first random number Rnd1;
  • the first encryption and decryption unit 1033 is configured to generate a second random number ciphertext by using the transmission authentication key AUK to encrypt the second random number Rnd2 when the first determining unit determines that the third random number Rnd1' is consistent with the first random number Rnd1. Crnd2; the first data transceiver unit is configured to send the second random number ciphertext Crnd2 to the KMS system 30;
  • the second encryption/decryption unit 3043 is configured to, when receiving the second random number ciphertext Crnd2, invoke the second hardware encryption machine 70 to decrypt the received second random number ciphertext Crnd2 using the transmission authentication key AUK to obtain the fourth random number Rnd2.
  • the second determining unit 3044 is configured to determine whether the fourth random number Rnd2' is consistent with the second random number Rnd2, and when determining that the fourth random number Rnd2' coincides with the second random number Rnd2, confirming the KMS system 30 and the payment terminal Two-way authentication between 10 passes.
  • the payment terminal is a POS terminal, a mobile phone terminal, a smart IC card, or an ATM machine terminal.
  • the terminal master key TMK secure download system implements the payment terminal 10 to remotely download the terminal master key TMK from the KMS system 40.
  • the terminal master key TMK must be transmitted in the form of cipher text, each payment terminal 10 randomly generates a transmission key TK, saves the transmission key TK in the cryptographic keyboard, and transmits the transmission key TK to the KMS system. 40.
  • the KMS system 40 encrypts the terminal master key TMK with the transmission key TK and transmits it to the payment terminal 10 in the form of cipher text.
  • the payment terminal 10 decrypts the terminal master key with the transmission key TK, thereby implementing the terminal master key.
  • Remote download of TMK Remote download of TMK.
  • the payment terminal 10 can be a POS terminal or an intelligent device.
  • An IC card, a mobile phone terminal or an ATM machine terminal, wherein the POS terminal, the smart IC card, the mobile phone terminal, and the ATM machine terminal can have a plurality of different models.
  • the operation terminal 20 is provided to control the payment terminal 10 to generate, collect and upload the transmission key TK.
  • the operation terminal 20 can be an improved POS machine.
  • the operation terminal 20 is connected to the payment terminal 10 through a serial line or a USB line.
  • the operation terminal 20 is provided with a plurality of control terminals 10 for generating a transmission key TK and collecting.
  • the payment terminal 10 is a smart IC card
  • the smart IC card is connected to the operation terminal 20 through the card slot.
  • the payment terminals 10 may be of different types and models, and different payment terminals 10 may also be produced by different branches. Therefore, in this embodiment, an MTMS system 30 is also provided, the MTMS.
  • the system 30 is configured to uniformly manage the transmission key TK generated by each payment terminal 10 of each manufacturer, and collectively transmit the transmission key TK to the corresponding KMS system 40. Since the uploading of the transport key TK and the download of the terminal master key TMK are performed remotely, in order to prevent the pseudo terminal from stealing the transport key TK or the terminal master key TMK during the transmission, the present embodiment sets The CA center 50 authenticates the identity of both the data transmission and reception sides through the CA center 50.
  • FIG. 4 is a main flowchart of a method for securely downloading a terminal master key TMK according to an embodiment of the present invention.
  • the terminal master key TMK secure download method is applied to the terminal master key TMK secure download system, and the method includes the following steps:
  • the payment terminal uses the public key Pu_mtms to encrypt the transmission key TK and uploads it to the KMS system;
  • step S1 includes:
  • the operation terminal presets the operation terminal digital certificate Crt_optm generated by the CA center
  • the MTMS system presets the MTMS system digital certificate Crt_mtms generated by the CA center
  • the KMS system presets the KMS system digital certificate Crt_kms generated by the CA center
  • MTMS system calls the first hardware encryption machine, KMS
  • the system calls the second hardware encryption machine to respectively perform the MTMS system permission component and the KMS in the first hardware encryption machine and the second hardware encryption machine.
  • the system authority component synthesizes the protection key PK and the MAC key MAK, and stores the protection key PK and the MAC key MAK together in the first hardware encryption machine and the second hardware encryption machine;
  • the operation terminal and the MTMS system perform mutual authentication through the CA center;
  • the MTMS system After the authentication is passed, the MTMS system sends the public key Pu_mtms to the payment terminal through the operation terminal and stores it in the password keyboard;
  • step S2 includes:
  • the payment terminal invokes the cryptographic keyboard to generate a transmission key TK
  • the transmission key TK includes a transmission encryption key TEK and a transmission authentication key AUK;
  • the payment terminal invokes the PIN pad and uses the public key Pu_mtms to encrypt the transmission key TK. Generating a first transmission key ciphertext Ctk_Pu;
  • the operation terminal sends the first transmission key ciphertext Ctk_Pu and the terminal serial number SN to the MTMS system.
  • the MTMS system calls the first hardware encryption machine to use the private key Pr_mtms. Decrypting the first transmission key ciphertext Ctk_Pu to obtain the transmission key TK, then using the protection key PK to encrypt the transmission key TK to obtain the ciphertext TK, and using the MAC key MAK to calculate the MAC of the ciphertext TK a value, combining the ciphertext TK and the ciphertext TK MAC value to generate a second transport key ciphertext Ctk_pk;
  • the MTMS system After the authentication is passed, the MTMS system sends the terminal serial number SN and the second transmission key ciphertext Ctk_pk to the KMS.
  • step S3 includes:
  • the payment terminal sends the terminal serial number SN and the download master key request to the KMS system.
  • the KMS system receives the terminal serial number SN sent by the payment terminal. And after downloading the master key request, querying the second transmission key ciphertext Ctk_pk corresponding to the terminal serial number SN;
  • the KMS system invokes the second hardware encryption machine to use the MAC key MAK to query the second transmission key ciphertext Ctk_pk. Verifying MAC legitimacy, if the check passes, decrypting the second transport key ciphertext Ctk_pk using the protection key PK to obtain the transport key TK and storing it in the second hardware encryptor;
  • the KMS system obtains the transmission key TK and then calls the second hardware encryption machine to use the authentication key AUK. Two-way authentication with the payment terminal;
  • the KMS system invokes the second hardware encryption machine to generate the master key ciphertext Ctmk by using the transport encryption key TEK to encrypt the terminal master key TMK and send the master key ciphertext Ctmk to the payment terminal;
  • the payment terminal invokes the PIN pad to decrypt the master key ciphertext Ctmk by using the transport encryption key TEK to obtain the terminal master key TMK and store the terminal master key TMK in the PIN pad.
  • the operation terminal presets the operation terminal digital certificate Crt_optm generated by the CA center, the MTMS system presets the MTMS system digital certificate Crt_mtms generated by the CA center, and the KMS system presets the KMS system digital certificate Crt_kms generated by the CA center to specifically include:
  • the operation terminal generates the public key pair Pu and Pr, and sends the public key Pu and the operation terminal identification information to the CA center.
  • the CA center uses the root certificate corresponding private key to sign the public key Pu and the operation terminal identification information, and generates a digital certificate Crt_optm and The generated digital certificate Crt_optm is sent to the operation terminal, and the operation terminal stores the digital certificate Crt_optm;
  • the MTMS system calls the first hardware encryption machine to generate public-private key pairs Pr_mtms and Pu_mtms, and sends the public key Pu_mtms and MTMS identification information to the CA center.
  • the CA center uses the root certificate corresponding private key to sign the public key Pu_mtms and the MTMS system identification information, and generates Digital certificate Crt_mtms and send the generated Crt_mtms to the MTMS system, the MTMS system stores the digital certificate Crt_mtms;
  • the KMS system calls the second hardware encryption machine to generate the public-private key pair Pr_kms and Pu_kms, and sends the public key Pu_kms and KMS identification information to the CA center.
  • the CA center uses the root certificate corresponding private key to sign the public key Pu_kms and the KMS system identification information to generate The digital certificate Crt_kms and sends Crt_kms to the KMS system, which stores the digital certificate Crt_kms.
  • the method further includes the steps of authorizing an operator card and an administrator card to operate the operation terminal, including:
  • the operation terminal reads the operator card and the administrator card inserted in the operation terminal, and authenticates the operator certificate and the administrator certificate through the CA center, and allows the operation terminal to operate after the authentication is passed.
  • the operation terminal and the MTMS system perform mutual authentication through the CA center; after the authentication is passed, the MTMS system sends the public key Pu_mtms to the payment terminal through the operation terminal and stores it in the password keyboard.
  • the MTMS system sends the digital certificate Crt_mtms to the operation terminal;
  • the operation terminal verifies the legality of the work certificate Crt_mtms by using the root certificate HsmRCRT pre-installed in the burn-in, and sends the public key Pu_mtms from the work certificate Crt_mtms to the payment terminal and stores it in the password keyboard after the verification is passed.
  • the operation terminal sends the first transmission key ciphertext Ctk_Pu and the terminal serial number SN to the MTMS system.
  • the specific steps include:
  • the payment terminal sends the first transmission key ciphertext Ctk_Pu and the terminal serial number SN to the operation terminal;
  • the operation terminal packages the received first transmission key ciphertext Ctk_Pu and the terminal serial number SN and signs it with the operator card, and sends the signed first transmission key ciphertext Ctk_Pu and the terminal serial number SN to the MTMS. system;
  • the MTMS system first checks the validity of the signature when receiving the first transmission key ciphertext Ctk_Pu and the terminal sequence number SN. If it is legal, the terminal sequence number SN and the first transmission key ciphertext Ctk_Pu are stored in association with the MTMS system. database.
  • the “KMS system obtains the transmission key TK and then invokes the second hardware encryption machine to use the authentication key AUK to perform mutual authentication with the payment terminal”, and specifically includes:
  • the payment terminal generates a first random number Rnd1 and sends the first random number Rnd1 to the KMS system;
  • the KMS system After receiving the first random number Rnd1, the KMS system generates a second random number Rnd2, and invokes the second hardware encryptor to encrypt the first random number Rnd1 by using the authentication key AUK to obtain the first random number ciphertext Crnd1, and the first random number ciphertext Crnd1 And transmitting the second random number Rnd2 to the payment terminal;
  • the payment terminal decrypts the received first random number ciphertext Crnd1 using the authentication key AUK to obtain a third random number Rnd1', and determines whether the third random number Rnd1' is consistent with the first random number Rnd1:
  • the payment terminal encrypts the second random number Rnd2 using the authentication key AUK to generate the second random number ciphertext Crnd2, and transmits the second random number ciphertext Crnd2 to the KMS system. ;
  • the KMS system calls the second hardware encryptor to decrypt the received second random number ciphertext Crnd2 using the authentication key AUK to obtain the fourth random number Rnd2', and determines whether the fourth random number Rnd2' is consistent with the second random number Rnd2;
  • the payment terminal is a POS terminal, a mobile phone terminal, a smart IC card or an ATM machine terminal.
  • the original Chiha value of TK is calculated when the transmission key TK is generated, and the Chia value of TK is first checked each time the TK is stored, transmitted, or used, and TK can be used when the check is passed.
  • TK By verifying the Chia value of TK, it is possible to prevent the storage device from being abnormal and causing the stored data to be incorrect, and to determine whether the key is correct.
  • the utility model has the beneficial effects that the transmission terminal TK is uploaded by the payment terminal, and the terminal master key TMK is encrypted by the TK, and then transmitted to the payment terminal, so that the payment terminal remotely downloads the terminal master key, thereby avoiding the payment terminal downloading the master key through centralized downloading.
  • the logistics cost and the maintenance cost of the centralized download of the KMS system are reduced.
  • the remote download master key TMK is transmitted in ciphertext, and the master key is transferred between the payment terminal and the KMS. Two-way authentication between the two parties has been carried out, and the transmission security of the master key has been improved.
  • the master key TMK of the present invention is generated by the KMS system, thus facilitating subsequent maintenance and management of the master key TMK by the KMS system.
  • the collection and uploading of the transmission key TK is implemented by the operation terminal, and the terminal uploads the TK.
  • the time efficiency and also greatly facilitates the collection and upload of different types and models of payment terminal transmission key TK.
  • the collection and uploading of the payment terminal transmission key TK by the operation terminal enables the hardware resources of the payment terminal to generate and transmit the key TK portion to be released, so that the hardware resources of the payment terminal can be more rationally optimized for use.
  • the transmission key TK of various payment terminals produced by different regional factories can be uniformly stored and sent to the corresponding KMS system through the MTMS system, thereby avoiding the error that the payment terminal may randomly transmit the transmission key TK. And the burden of working on the KMS system. Further, in the process of transmitting the transmission key TK, the CA center performs identity authentication on both the transmitting and receiving sides of the transmission data to ensure that the operation terminal, the MTMS system and the KMS system are legally identifiable, and the ciphertext is not stolen by the pseudo terminal.
  • the TK collection operation can be performed, and therefore only the designated operator
  • the transmission key TK of the payment terminal can be collected under the authorization of the administrator, the operation authority management of the operation terminal is improved, and the authenticity and validity of the operation terminal uploading the transmission key TK are effectively ensured.
  • the invention packs and signs the collected first transmission key ciphertext Ctk_Pu and the terminal serial number SN through the operation terminal, so that the signature information can be traced back to which operator operation the first transmission key ciphertext is generated, and It is determined whether the uploaded first transmission key ciphertext Ctk_Pu and the terminal serial number SN are legal according to the validity of the signature, and the collection and transmission management of the transmission key TK is strengthened, and the pseudo terminal is prevented from uploading the pseudo transmission key. TK.
  • the payment terminal and the KMS system of the present invention use the two-way authentication A unit two-way authentication B unit to use the transmission authentication key AUK to perform identity authentication of both parties, and the KMS system finally finalizes the encrypted terminal only when both identity authentications are passed.
  • the master key is sent to the payment terminal.
  • the serial number SN and the transmission authentication key AUK of each payment terminal are different.
  • the transmission authentication key AUK of each payment terminal is stored in the KMS system, so the transmission authentication key is used by the two-way authentication A unit two-way authentication B unit.
  • the key AUK performs the identity authentication of both parties to ensure that both the payment terminal and the KMS system are legal identities, ensuring that the terminal master key TMK is coming to the corresponding KMS system, and also ensuring that the TMK is downloaded to the corresponding payment terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开一种终端主密钥TMK安全下载方法及系统,通过远程下载主密钥的方法避免了支付终端集中下载主密钥后再布设到商户,减少了物流成本和集中下载维护成本。远程下载主密钥TMK通过上传传输密钥TK对TMK进行加密保护,并全过程都采用密文传输,通过操作终端和MTMS系统大大的方便了传输密钥TK的采集、管理和上传,为了保证操作终端、MTMS系统和KMS系统为合法身份,通过CA中心能传输双方的身份进行认证,确保密文的准确收发。在支付终端与KMS之间传输主密钥之间还进行了双方的双向认证,进一步提高了主密钥的下载安全。

Description

一种终端主密钥TMK安全下载方法及系统
技术领域
本发明涉及电子支付领域,尤其涉及一种终端主密钥TMK安全下载方法及系统。
背景技术
银行卡(BANK Card)作为支付工具越来越普及,通常的银行卡支付系统包括销售点终端(Point Of Sale,POS)、POS收单系统(POSP)、密码键盘(PIN PAD)和硬件加密机(Hardware and Security Module,HSM)。其中POS终端能够接受银行卡信息,具有通讯功能,并接受柜员的指令完成金融交易信息和有关信息交换的设备;POS收单系统对POS终端进行集中管理,包括参数下载,密钥下载,接受、处理或转发POS终端的交易请求,并向POS终端回送交易结果信息,是集中管理和交易处理的系统;密码键盘(PIN PAD)是对各种金融交易相关的密钥进行安全存储保护,以及对PIN进行加密保护的安全设备;硬件加密机(HSM)是对传输数据进行加密的外围硬件设备,用于PIN的加密和解密、验证报文和文件来源的正确性以及存储密钥。个人标识码(Personal Identification Number,PIN),即个人密码,是在联机交易中识别持卡人身份合法性的数据信息,在计算机和网络系统中任何环节都不允许以明文的方式出现;终端主密钥(Terminal Master Key,TMK),POS终端工作时,对工作密钥进行加密的主密钥,加密保存在系统数据库中;POS终端广泛应用于银行卡支付场合,比如厂商购物、酒店住宿等,是一种不可或缺的现代化支付手段,已经融入人们生活的各种场合。银行卡,特别是借记卡,一般都由持卡人设置了PIN,在进行支付过程中,POS终端除了上送银行卡的磁道信息等资料外,还要持卡人输入PIN供发卡银行验证持卡人的身份合法性,确保银行卡支付安全,保护持卡人的财产安全。为了防止PIN泄露或被破解,要求从终端到发卡银行整个信息交互过程中,全程对PIN进行安全加密保护,不允许在计算机网络系统的任何环节,PIN以明文的方式出现,因此目前接受输入PIN的POS终端都要求配备密钥管理体系。
POS终端的密钥体系分成二级:终端主密钥(TMK)和工作密钥(WK)。其中TMK在WK更新过程中,对WK进行加密保护。每台POS终端与POS之间共享唯一的TMK,必须要有安全保护,保证只能写入设备并参与计算,不能读取;TMK是一个很关键的根密钥,如果TMK被截取,工作密钥就比较容易被破解,将严重威胁银行卡支付安全。所以能否安全下载TMK到POS终端,成为整个POS终端安全性的关键。
为防范终端主密钥TMK泄露风险,终端主密钥TMK的下载必须控制在收单机构的管理中心的安全机房进行,因此必需通过人工集中POS终端,并下载终端主密钥。从而带来维护中心机房工作量大;设备出厂后需要运输到管理中心安全机房下载密钥才能部署到商户,运输成本上升;为了集中下装终端主密钥,需要大量的人手和工作时间,维护成本大、维护周期长等问题。
与POS终端相似,ATM机终端、用于支付使用的智能IC卡、具有支付功能的手机终端等支付终端都需要通过人工集中并下载终端主密钥,同样存在运输成本高,集中下装终端主密钥需要大量的人手和工作时间,维护成本大、维护周期长等问题。
发明内容
为解决上述技术问题,本发明采用的一个技术方案是:
一种终端主密钥TMK安全下载方法,包括步骤:S1、MTMS系统将公钥Pu_mtms下传至支付终端的流程;S2、支付终端使用公钥Pu_mtms加密传输密钥TK并上传至KMS系统的流程;S3、支付终端从KMS系统下载经过传输密钥TK加密的主密钥TMK的流程;其中,步骤S1具体步骤包括:S11、操作终端预置CA中心生成的操作终端数字证书Crt_optm,MTMS系统预置CA中心生成的MTMS系统数字证书Crt_mtms,KMS系统预置CA中心生成的KMS系统数字证书Crt_kms;S12、MTMS系统调用第一硬件加密机、KMS 系统调用第二硬件加密机,分别在第一硬件加密机和第二硬件加密机中将MTMS系统权限分量及KMS 系统权限分量合成保护密钥PK和MAC密钥MAK,并且将所述保护密钥PK和MAC密钥MAK一并存储在第一硬件加密机和第二硬件加密机中;S13、操作终端与MTMS系统通过CA中心进行双向认证;S14、认证通过后,MTMS系统将公钥Pu_mtms通过操作终端发送至支付终端并存储在密码键盘中;步骤S2具体步骤包括:S21、支付终端调用密码键盘产生传输密钥TK,所述传输密钥TK包括传输加密密钥TEK和传输认证密钥AUK;S22、支付终端调用密码键盘使用公钥Pu_mtms 加密传输密钥TK 生成第一传输密钥密文Ctk_Pu;S23、操作终端将第一传输密钥密文Ctk_Pu 和终端序列号SN发送至MTMS系统;S24、当接收到KMS发送的TK获取请求时,MTMS系统调用第一硬件加密机使用私钥Pr_mtms 解密第一传输密钥密文Ctk_Pu获得传输密钥TK,然后使用保护密钥PK 加密传输密钥TK获得密文TK,使用MAC 密钥MAK 计算密文TK的MAC 值,将密文TK和密文TK的MAC值合并生成第二传输密钥密文Ctk_pk;S25、MTMS系统与KMS系统通过CA中心进行双向认证;S26、认证通过后,MTMS系统将终端序列号SN 和第二传输密钥密文Ctk_pk 发送给KMS 系统;S3具体步骤包括:S31、支付终端将终端序列号SN 和下载主密钥申请发送至KMS 系统;S32、KMS系统接收到支付终端发送的终端序列号SN 和下载主密钥申请后,查询与终端序列号SN对应的第二传输密钥密文Ctk_pk;S33、KMS系统调用第二硬件加密机使用MAC密钥MAK对查询到的第二传输密钥密文Ctk_pk 校验MAC 合法性,如果校验通过,使用保护密钥PK 解密第二传输密钥密文Ctk_pk 获得传输密钥TK并将其存储在所述第二硬件加密机中;S34、KMS 系统获得传输密钥TK后调用第二硬件加密机使用认证密钥AUK 与支付终端进行双向认证;S35、如果认证通过,KMS系统调用第二硬件加密机使用传输加密密钥TEK加密终端主密钥TMK生成主密钥密文Ctmk并将主密钥密文Ctmk发送至支付终端;S36、支付终端调用密码键盘使用传输加密密钥TEK解密主密钥密文Ctmk获得终端主密钥TMK并将终端主密钥TMK存储在密码键盘中。
本发明采用的另一个技术方案是:
一种终端主密钥TMK安全下载系统,包括第一硬件加密机、第二硬件加密机、支付终端、操作终端、MTMS系统、CA中心和KMS系统;所述支付终端包括第一TK上传模块、TMK请求模块、双向认证A模块、TMK接收模块,所述操作终端包括第二TK上传模块,所述MTMS系统包括协商密钥A模块、公钥发送模块、TK请求响应模块、第三TK上传模块,所述KMS系统包括协商密钥B模块、TMK请求响应模块、双向认证B模块、TMK发送模块,所述CA中心包括证书预置模块、CA认证模块;证书预置模块用于将CA中心生成的操作终端数字证书Crt_optm预置于操作终端,将CA中心生成的MTMS系统数字证书Crt_mtms预置于MTMS系统,将CA中心生成的KMS系统数字证书Crt_kms预置于KMS系统;协商密钥A模块和协商密钥B模块用于调用第一硬件加密机和第二硬件加密机,分别在第一硬件加密机和第二硬件加密机中将MTMS系统权限分量及KMS 系统权限分量合成保护密钥PK和MAC密钥MAK,并且将所述保护密钥PK和MAC密钥MAK一并存储在第一硬件加密机和第二硬件加密机中;CA认证模块用于对操作终端与MTMS系统通过CA中心进行双向认证;公钥发送模块用于当CA认证认证通过后,将公钥Pu_mtms通过操作终端发送至支付终端并存储在密码键盘中;第一TK上传模块用于调用密码键盘产生传输密钥TK,所述传输密钥TK包括传输加密密钥TEK和传输认证密钥AUK;第一TK上传模块用于调用密码键盘使用公钥Pu_mtms 加密传输密钥TK 生成第一传输密钥密文Ctk_Pu;第二TK上传模块用于将第一传输密钥密文Ctk_Pu 和终端序列号SN发送至MTMS系统;TK请求响应模块用于当接收到KMS系统发送的TK获取请求时,调用第一硬件加密机使用私钥Pr_mtms 解密第一传输密钥密文Ctk_Pu获得传输密钥TK,用于使用保护密钥PK 加密传输密钥TK获得密文TK,并用于使用MAC 密钥MAK 计算密文TK的MAC 值,以及用于将密文TK和密文TK的MAC值合并生成第二传输密钥密文Ctk_pk;CA认证模块还用于MTMS系统与KMS系统通过CA中心进行双向认证;第三TK上传模块用于当MTMS系统与KMS系统认证通过后,将终端序列号SN 和第二传输密钥密文Ctk_pk 发送给KMS系统;TMK请求模块用于将终端序列号SN 和下载主密钥申请发送至KMS 系统;TMK请求响应模块用于当KMS系统接收到支付终端发送的终端序列号SN 和下载主密钥申请后,查询与终端序列号SN对应的第二传输密钥密文Ctk_pk;TMK请求响应模块还用于调用第二硬件加密机使用MAC密钥MAK对查询到的第二传输密钥密文Ctk_pk 校验MAC 合法性,以及用于当所述校验通过后,使用保护密钥PK 解密第二传输密钥密文Ctk_pk 获得传输密钥TK并将其存储在所述第二硬件加密机中;双向认证A模块和双向认证B模块用于当KMS 系统获得传输密钥TK后,调用第二硬件加密机使用认证密钥AUK 与支付终端进行双向认证;TMK发送模块用于当KMS系统与支付终端双向认证通过后,调用第二硬件加密机使用传输加密密钥TEK加密终端主密钥TMK生成主密钥密文Ctmk并将主密钥密文Ctmk发送至支付终端;TMK接收模块用于调用密码键盘使用传输加密密钥TEK解密主密钥密文Ctmk获得终端主密钥TMK并将终端主密钥TMK存储在密码键盘中。
本发明的有益效果为:通过支付终端上传传输密钥TK,由TK加密终端主密钥TMK后传送至支付终端,实现支付终端远程下载终端主密钥,避免了支付终端通过集中下载主密钥后再布放到商户,减少了物流成本和KMS系统集中下载的维护成本,其中,远程下载主密钥TMK全过程都采用密文传输,在支付终端与KMS之间传输主密钥之间还进行了双方的双向认证,提高了主密钥的传输安全。进一步地,在本实施方式中通过操作终端实现传输密钥TK的采集和上传,提高了终端上传TK 的时间效率,同时也大大方便了不同类型和型号支付终端传输密钥TK的采集和上传。由操作终端控制支付终端传输密钥TK的采集和上传使支付终端负责产生和传输密钥TK部分的硬件资源被释放出来,使支付终端的硬件资源能够被更合理的优化使用。进一步地,通过MTMS系统可以实现对不同地域分工厂生产的各种支付终端的传输密钥TK进行统一存储并集中发送给相应的KMS系统,避免了支付终端零散上传传输密钥TK可能造成的错误以及对KMS系统的工作负担。进一步地,在传输密钥TK传输的过程中通过CA中心对传输数据的收发双方进行身份认证,保证操作终端、MTMS系统和KMS系统为合法身份,确保密文的不会被伪终端窃取。
附图说明
图1是本发明一实施方式中一种终端主密钥TMK安全下载系统的结构框图;
图2是图1中双向认证A模块的结构框图;
图3是图1中双向认证B模块的结构框图;
图4是本发明一实施方式中一种终端主密钥TMK安全下载方法的方法流程图;
图3是图4中步骤S1的具体流程图;
图4是图4中步骤S2的具体流程图;
图5是图4中步骤S3的具体流程图。
主要元件符号说明:
10:支付终端; 20:操作终端; 30:KMS系统; 40:MTMS系统; 50:CA中心; 60:第一硬件加密机;70:第二硬件加密机; 101:第一TK上传模块; 102:TMK请求模块; 103:双向认证A模块; 104:TMK接收模块; 201:第二TK上传模块;301:协商密钥B模块; 302:TMK发送模块; 303:TMK请求响应模块; 304:双向认证B模块; 401:协商密钥A模块; 402:TK请求响应模块; 403:公钥发送模块; 404:第三TK上传模块;501:证书预置模块; 502:CA认证模块; 1031:第一随机数产生单元; 1032:第一数据收发单元; 1033:第一加解密单元; 1034:第一判断单元; 3041:第二随机数产生单元; 3042:第二数据收发单元; 3043:第二加解密单元; 3044:第二判断单元。
具体实施方式
为详细说明本发明的技术内容、构造特征、所实现目的及效果,以下结合实施方式并配合附图详予说明。
一、对本发明涉及的缩略语和关键术语进行定义和说明:
AUK:Authentication Key 的简称,即认证密钥,用于PINPAD与密钥管理系统KMS之间的双向认证;
CA中心:所谓CA(Certificate Authority)中心,它是采用PKI(Public Key Infrastructure)公开密钥基础架构技术,专门提供网络身份认证服务,负责签发和管理数字证书,且具有权威性和公正性的第三方信任机构,它的作用就像我们现实生活中颁发证件的公司,如护照办理机构;
HSM:High Security Machine的简称,高安全设备,在该系统中为硬件加密机;
KMS系统:Key Management System,密钥管理系统,用于管理终端主密钥TMK;
MAK:Mac Key的简称,即MAC计算密钥, 与客户协商确定24字节对称密钥,用于MTMS系统与KMS系统之间TK的MAC值计算;
MTMS:全称Material Tracking Management System,物料追溯管理系统,主要在工厂生产时使用;
PIK:Pin Key的简称,即Pin加密密钥,是工作密钥的一种;
PINPAD:密码键盘;
PK:Protect Key 的简称,即保护密钥,与客户协商确定,24字节对称密钥。用于MTMS/TCS 与KMS之间TK的加密传输;
POS:Point Of Sale 的简称,即销售终端
SNpinpad:密码键盘的序列号,PINPAD是内置时,和POS终端序列号SNpos一致;
SN:支付终端的序列号;
TEK:Transmission Encrypt Key的简称,即传输加密密钥,24字节对称密钥,用于PINPAD与密钥管理系统KMS之间TMK的加密传输;
TK:Transmission Key的简称,即传输密钥。传输密钥是由传输加密密钥TEK和双向认证密钥AUK组成的;
TMS:Terminal Management System 的简称,即终端管理系统,用于完成支付终端信息管理、软件与参数配置、远程下载、终端运行状态信息收集管理、远程诊断等功能;
TMK:Terminal Master Key的简称,即终端主密钥,用于支付终端和支付收单系统之间工作密钥的加密传输;
安全房:具有较高安全级别,用于存放服务器的房间,该房间需要身份认证后才能进去。
智能IC卡:为CPU卡,卡内的集成电路包括中央处理器CPU、可编程只读存储器EEPROM、随机存储器RAM和固化在只读存储器ROM中的卡内操作系统COS(Chip Operating System),卡中数据分为外部读取和内部处理部分。
对称密钥:发送和接收数据的双方必须使用相同的密钥对明文进行加密和解密运算。对称密钥加密算法主要包括:DES、3DES、IDEA、FEAL、BLOWFISH等。
非对称密钥:非对称加密算法需要两个密钥:公开密钥(私钥Public key)和私有密钥(公钥Private key)。公开密钥与私有密钥是一对,如果用公开密钥对数据进行加密,只有用对应的私有密钥才能解密;如果用私有密钥对数据进行加密,那么只有用对应的公开密钥才能解密。因为加密和解密使用的是两个不同的密钥,所以这种算法叫作非对称加密算法。非对称加密算法实现机密信息交换的基本过程是:甲方生成一对密钥并将其中的一把作为公用密钥向其它方公开;得到该公用密钥的乙方使用该密钥对机密信息进行加密后再发送给甲方;甲方再用自己保存的另一把专用密钥对加密后的信息进行解密。甲方可以使用乙方的公钥对机密信息进行加密后再发送给乙方;乙方再用自己的私匙对加密后的信息进行解密。主要算法有RSA、Elgamal、背包算法、Rabin、D-H、ECC(椭圆曲线加密算法)。
RSA:一种非对称密钥算法。RSA公钥加密算法是1977年由Ron Rivest、Adi Shamirh 和Len Adleman 在(美国麻省理工学院)开发的。RSA 取名来自开发他们三者的名字。RSA 是目前最有影响力的公钥加密算法,它能够抵抗到目前为止已知的所有密码攻击,已被 ISO 推荐为公钥数据加密标准。RSA 算法基于一个十分简单的数论事实:将两个大素数相乘十分容易。RSA 算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。RSA 是被研究得最广泛的公钥算法,从提出到现在的三十多年里,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一。
TDES Triple-DES:DES是一种对称加密算法,密钥是8字节。TDES是基于DES 的加密算法,其密钥是16 字节或者24 字节。TDES/3DES 是英文TripleDES的缩语(即三重数据加密标准),DES 则是英文Data Encryption Standard(数加密标准)的缩语。DES 是一种对称密钥加密算法,即数据加密密钥与解密密钥相同的加密算法。DES 由IBM 公司在20 世纪70 年代开发并公开,随后为美国政府采用,并被美国国家标准局和美国国家标准协会 (ANSI)承认。TDES/3DES 是DES 加密算法的一种模式,它使用3条64 位的密钥对数据进行三次加密。是DES 的一个更安全的变形。
二、对本发明的技术方案进行详细阐述如下:
为解决背景技术中存在的技术问题,本发明采用一种新的主密钥下载方案,通过支付终端随机产生TK(Transmission Key,传输密钥),将产生后的TK保存于支付终端的密码键盘中,并将TK通过各种应用场景下所需的传输方式传送至KMS(Key Management System,密钥管理系统,用于管理终端主密钥TMK)中。
当支付终端申请下载终端主密钥TMK时,KMS系统使用TK加密终端主密钥TMK,并将加密后的终端主密钥密文发送给支付终端,支付终端接收后用TK对主密钥密文进行解密,得到终端主密钥TMK,并将终端主密钥TMK保存在密码键盘里。
如此,通过TK加密终端主密钥TMK,使TMK能够进行远程传输,方便TMK的安全下载。
在某些场景下,采用操作终端采集支付终端产生的TK,并由操作终端负责将TK传输给MTMS系统(Material Tracking Management System,物料追溯系统,主要在工厂生产中使用),由MTMS系统统一管理TK,并将TK发送给相应的KMS系统。采用操作终端采集TK可以方便TK的采集操作(可以实现一键采集等)和TK采集的权限管理;采用MTMS系统可以方便对TK统一管理,方便以后售后维修时支付终端的数据查找与下载,通过MTMS系统可以实现按生产单批量传输TK,方便TK的传输管理,防止TK误传给错误的对象。
上述通过支付终端采集传输密钥TK后发送至银行端对TMK进行加密,再通过支付终端远程下载经TK加密后的TMK的方法可以实现TMK的远程下载。但是,在TK上传和TMK下载过程中涉及到较多的终端和系统,因此容易出现伪终端窃取TMK。为了提高TMK下载安全,需要一种能够方便验证各终端和系统身份的终端主密钥TMK安全下载的方法。
下面就对本发明克服上述问题的技术方案进行详细说明。本发明的理念是在所述TK和TMK输送过程由CA中心(Certificate Authority,证书授权中心,采用Public Key Infrastructure公开密钥基础架构技术,专门提供网络身份认证服务,负责签发和管理数字证书,且具有权威性和公正性的第三方信任机构)鉴别操作终端、MTMS系统和KMS系统的身份,通过引入CA中心防止伪终端和伪KMS系统窃取TK。
请参阅图1,为本发明一实施方式中一种终端主密钥TMK安全下载系统的结构框图,该终端主密钥TMK安全下载系统包括第一硬件加密机50、第二硬件加密机60、支付终端10、操作终端20、MTMS系统40、CA中心50和KMS系统30;所述支付终端10包括第一TK上传模块101、TMK请求模块102、双向认证A模块103、TMK接收模块104,所述操作终端20包括第二TK上传模块201,所述MTMS系统40包括协商密钥A模块401、公钥发送模块403、TK请求响应模块402、第三TK上传模块404,所述KMS系统30包括协商密钥B模块301、TMK请求响应模块303、双向认证B模块304、TMK发送模块302,所述CA中心50包括证书预置模块501、CA认证模块502。
证书预置模块501用于将CA中心50生成的操作终端数字证书Crt_optm预置于操作终端20,将CA中心50生成的MTMS系统数字证书Crt_mtms预置于MTMS系统40,将CA中心50生成的KMS系统数字证书Crt_kms预置于KMS系统30;
协商密钥A模块401和协商密钥B模块301用于调用第一硬件加密机60和第二硬件加密机70,分别在第一硬件加密机60和第二硬件加密机70中将MTMS系统40权限分量及KMS 系统30权限分量合成保护密钥PK和MAC密钥MAK,并且将所述保护密钥PK和MAC密钥MAK一并存储在第一硬件加密机60和第二硬件加密机70中;
CA认证模块50用于对操作终端20与MTMS系统40通过CA中心50进行双向认证;
公钥发送模块403用于当CA认证认证通过后,将公钥Pu_mtms通过操作终端20发送至支付终端10并存储在密码键盘中;
第一TK上传模块101用于调用密码键盘产生传输密钥TK,所述传输密钥TK包括传输加密密钥TEK和传输认证密钥AUK;
第一TK上传模块101用于调用密码键盘使用公钥Pu_mtms 加密传输密钥TK 生成第一传输密钥密文Ctk_Pu;
第二TK上传模块201用于将第一传输密钥密文Ctk_Pu 和终端序列号SN发送至MTMS系统40;
TK请求响应模块402用于当接收到KMS系统30发送的TK获取请求时,调用第一硬件加密机60使用私钥Pr_mtms 解密第一传输密钥密文Ctk_Pu获得传输密钥TK,用于使用保护密钥PK 加密传输密钥TK获得密文TK,并用于使用MAC 密钥MAK 计算密文TK的MAC 值,以及用于将密文TK和密文TK的MAC值合并生成第二传输密钥密文Ctk_pk;
CA认证模块502还用于MTMS系统40与KMS系统通过CA中心50进行双向认证;
第三TK上传模块404用于当MTMS系统40与KMS系统30认证通过后,将终端序列号SN 和第二传输密钥密文Ctk_pk 发送给KMS 系统30;
TMK请求模块102用于将终端序列号SN 和下载主密钥申请发送至KMS 系统30;
TMK请求响应模块303用于当KMS系统30接收到支付终端10发送的终端序列号SN 和下载主密钥申请后,查询与终端序列号SN对应的第二传输密钥密文Ctk_pk;
TMK请求响应模块303还用于调用第二硬件加密机70使用MAC密钥MAK对查询到的第二传输密钥密文Ctk_pk 校验MAC 合法性,以及用于当所述校验通过后,使用保护密钥PK 解密第二传输密钥密文Ctk_pk 获得传输密钥TK并将其存储在所述第二硬件加密机70中;
双向认证A模块103和双向认证B模块304用于当KMS 系统30获得传输密钥TK后,调用第二硬件加密机60使用认证密钥AUK 与支付终端进行双向认证;
TMK发送模块302用于当KMS系统30与支付终端10双向认证通过后,调用第二硬件加密机70使用传输加密密钥TEK加密终端主密钥TMK生成主密钥密文Ctmk并将主密钥密文Ctmk发送至支付终端10;
TMK接收模块104用于调用密码键盘使用传输加密密钥TEK解密主密钥密文Ctmk获得终端主密钥TMK并将终端主密钥TMK存储在密码键盘中。
其中,所述CA中心50的证书预置模块包括操作终端数字证书Crt_optm产生模块、MTMS系统数字证书Crt_mtms产生模块和KMS系统数字证书Crt_kms产生模块。
所述操作终端10的数字证书Crt_optm产生模块用于调用操作终端生成公私钥对Pu和Pr,使用根证书对应私钥对公钥Pu和操作终端标识信息进行签名,生成数字证书Crt_optm并用于将生成的数字证书Crt_optm发送以及存储在操作终端20中;
所述MTMS系统40的数字证书Crt_mtms产生模块用于调用第一硬件加密机60产生公私钥对Pr_mtms和Pu_mtms,使用根证书对应私钥对公钥Pu_mtms和MTMS系统标识信息进行签名,生成数字证书Crt_mtms并用于将生成的Crt_mtms发送以及存储在MTMS系统40中;
所述KMS系统30数字证书Crt_kms产生模块用于调用第二硬件加密机70产生公私钥对Pr_kms和Pu_kms,使用根证书对应私钥对公钥Pu_kms和KMS系统标识信息进行签名,生成数字证书Crt_kms并用于将Crt_kms发送以及存储在KMS系统30中。
其中,所述操作终端20还包括有操作员卡和管理员卡;所述CA中心50的证书预置模块501还用于产生操作员卡证书和管理员卡证书,并用于将操作员卡证书存储在操作员卡里以及将管理员卡证书存储在管理卡里;
所述操作员卡和管理员卡用于当操作终端读取插在操作终端上的操作员卡和管理员卡,通过CA中心50对操作员证书和管理员证书进行合法性认证通过时,授权对操作终端20进行操作。
其中,所述第二TK上传模块201还包括打包单元,所述打包单元用于对接收到的第一传输密钥密文Ctk_Pu和终端序列号SN进行打包并使用操作员卡进行签名;
所述MTMS系统40的第三TK上传模块404还包括校验单元,所述校验单元用于当接收到所述TK采集单元传输的第一传输密钥密文Ctk_Pu和终端序列号SN时,校验所述打包单元的签名的合法性,以及用于当所述检验合法时,将终端序列号SN和第一传输密钥密文Ctk_Pu关联地存储在MTMS系统的数据库。
其中, 所述双向认证A模块103包括第一随机数产生单元1031、第一数据收发单元1032、第一加解密单元1033、第一判断单元1034,所述双向认证B模块包括第二随机数产生单元3041、第二数据收发单元3042、第二加解密单元3043、第二判断单元3044。
第一随机数产生单元1031用于产生第一随机数Rnd1;第一数据收发单元1032用于将产生的第一随机数Rnd1发送至KMS系统30;第二数据收发单元3042用于接收第一随机数Rnd1;第二随机数产生单元3041用于在接收到第一随机数Rnd1时,产生随机数第二Rnd2;第二加解密单元3043用于在接收到第一随机数Rnd1时,调用第二硬件加密机70使用传输认证密钥AUK加密第一随机数Rnd1获得第一随机数密文Crnd1;第二数据收发单元3042用于将第一随机数密文Crnd1和第二随机数Rnd2发送给支付终端10;
第一加解密单元1033用于在接收到第一随机数密文Crnd1和第二随机数Rnd2时,使用传输认证密钥AUK解密接收到的第一随机数密文Crnd1获得第三随机数Rnd1’;第一判断单元用于判断第三随机数Rnd1’与第一随机数Rnd1是否一致;
第一加解密单元1033用于当所述第一判断单元判定第三随机数Rnd1’与第一随机数Rnd1一致时,使用传输认证密钥AUK加密第二随机数Rnd2生成第二随机数密文Crnd2;第一数据收发单元用于将第二随机数密文Crnd2发送给KMS系统30;
第二加解密单元3043用于在接收到第二随机数密文Crnd2时,调用第二硬件加密机70使用传输认证密钥AUK解密接收到的第二随机数密文Crnd2获得第四随机数Rnd2’,第二判断单元3044用于判断第四随机数Rnd2’与第二随机数Rnd2是否一致,并当判定第四随机数Rnd2’与第二随机数Rnd2一致时,确认KMS系统30与支付终端10之间的双向认证通过。
其中,所述支付终端为POS终端、手机终端、智能IC卡、或ATM机终端。
在本实施方式中,所述终端主密钥TMK安全下载系统实现支付终端10从KMS系统40远程下载终端主密钥TMK。在远程下载过程中终端主密钥TMK必需以密文的形式传输,每个支付终端10随机生成传输密钥TK,将传输密钥TK保存在密码键盘中,并将传输密钥TK发送KMS系统40,KMS系统40用传输密钥TK加密终端主密钥TMK后以密文的形式传输给支付终端10,支付终端10用传输密钥TK解密得到终端主密钥明文,从而实现终端主密钥TMK的远程下载。
由于POS机、智能IC卡、手机终端和ATM机终端都可以用支付工作使用,并且都需要终端主密钥TMK对工作密钥进行加密保护,因此,所述支付终端10可以是POS终端、智能IC卡、手机终端或ATM机终端,其中,POS终端、智能IC卡、手机终端、ATM机终端可以具有多种不同的型号。
为了方便不同类型、不同型号的支付终端10的传输密钥TK生成和上传,设置了操作终端20用于控制支付终端10生成、采集并上传传输密钥TK。所述操作终端20可以是一改进的POS机,所述操作终端20通过串口线或USB线与支付终端10连接,操作终端20设置有多个用于控制支付终端10产生传输密钥TK、采集传输密钥TK和上传传输密钥TK的功能键。当所述支付终端10为智能IC卡时,智能IC卡通过插卡座与操作终端20连接。
在本实施方式中,所述支付终端10可以是不同的类型和型号,不同的支付终端10也可能是由不同的分厂生产,因此在本实施方式中还设置了MTMS系统30,所述MTMS系统30用于统一管理各厂家各支付终端10生成的传输密钥TK,并将传输密钥TK集中发送给相应的KMS系统40。由于传输密钥TK的上传和终端主密钥TMK的下载都是通过远程方式进行的,为了防止在传输过程中出现伪终端窃取传输密钥TK或终端主密钥TMK,本实施方式中设置了CA中心50,通过CA中心50对数据传输收发双方的身份进行认证。
请参阅图4,为本发明一实施例中一种终端主密钥TMK安全下载方法的主流程图。该终端主密钥TMK安全下载方法应用于所述终端主密钥TMK安全下载系统中,该方法包括步骤:
S1、MTMS系统将公钥Pu_mtms下传至支付终端的流程;
S2、支付终端使用公钥Pu_mtms加密传输密钥TK并上传至KMS系统的流程;
S3、支付终端从KMS系统下载经过传输密钥TK加密的主密钥TMK的流程;
请参阅图5,为步骤S1具体步骤流程图,步骤S1包括:
S11、操作终端预置CA中心生成的操作终端数字证书Crt_optm,MTMS系统预置CA中心生成的MTMS系统数字证书Crt_mtms,KMS系统预置CA中心生成的KMS系统数字证书Crt_kms;
S12、MTMS系统调用第一硬件加密机、KMS 系统调用第二硬件加密机,分别在第一硬件加密机和第二硬件加密机中将MTMS系统权限分量及KMS 系统权限分量合成保护密钥PK和MAC密钥MAK,并且将所述保护密钥PK和MAC密钥MAK一并存储在第一硬件加密机和第二硬件加密机中;
S13、操作终端与MTMS系统通过CA中心进行双向认证;
S14、认证通过后,MTMS系统将公钥Pu_mtms通过操作终端发送至支付终端并存储在密码键盘中;
请参阅图6,为步骤S2具体步骤流程图,步骤S2包括:
S21、支付终端调用密码键盘产生传输密钥TK,所述传输密钥TK包括传输加密密钥TEK和传输认证密钥AUK;
S22、支付终端调用密码键盘使用公钥Pu_mtms 加密传输密钥TK 生成第一传输密钥密文Ctk_Pu;
S23、操作终端将第一传输密钥密文Ctk_Pu 和终端序列号SN发送至MTMS系统;
S24、当接收到KMS发送的TK获取请求时,MTMS系统调用第一硬件加密机使用私钥Pr_mtms 解密第一传输密钥密文Ctk_Pu获得传输密钥TK,然后使用保护密钥PK 加密传输密钥TK获得密文TK,使用MAC 密钥MAK 计算密文TK的MAC 值,将密文TK和密文TK的MAC值合并生成第二传输密钥密文Ctk_pk;
S25、MTMS系统与KMS系统通过CA中心进行双向认证;
S26、认证通过后,MTMS系统将终端序列号SN 和第二传输密钥密文Ctk_pk 发送给KMS 系统;
请参阅图7,为步骤S3具体流程图,步骤S3包括:
S31、支付终端将终端序列号SN 和下载主密钥申请发送至KMS 系统;
S32、KMS系统接收到支付终端发送的终端序列号SN 和下载主密钥申请后,查询与终端序列号SN对应的第二传输密钥密文Ctk_pk;
S33、KMS系统调用第二硬件加密机使用MAC密钥MAK对查询到的第二传输密钥密文Ctk_pk 校验MAC 合法性,如果校验通过,使用保护密钥PK 解密第二传输密钥密文Ctk_pk 获得传输密钥TK并将其存储在所述第二硬件加密机中;
S34、KMS 系统获得传输密钥TK后调用第二硬件加密机使用认证密钥AUK 与支付终端进行双向认证;
S35、如果认证通过,KMS系统调用第二硬件加密机使用传输加密密钥TEK加密终端主密钥TMK生成主密钥密文Ctmk并将主密钥密文Ctmk发送至支付终端;
S36、支付终端调用密码键盘使用传输加密密钥TEK解密主密钥密文Ctmk获得终端主密钥TMK并将终端主密钥TMK存储在密码键盘中。
其中,所述“操作终端预置CA中心生成的操作终端数字证书Crt_optm,MTMS系统预置CA中心生成的MTMS系统数字证书Crt_mtms,KMS系统预置CA中心生成的KMS系统数字证书Crt_kms”具体包括:
操作终端生成公私钥对Pu和Pr,将公钥Pu和操作终端标识信息发给CA中心,CA中心使用根证书对应私钥对公钥Pu和操作终端标识信息进行签名,生成数字证书Crt_optm并将生成的数字证书Crt_optm发送给操作终端,操作终端存储数字证书Crt_optm;
MTMS系统调用第一硬件加密机产生公私钥对Pr_mtms和Pu_mtms,将公钥Pu_mtms和MTMS标识信息发给CA中心,CA中心使用根证书对应私钥对公钥Pu_mtms和MTMS系统标识信息进行签名,生成数字证书Crt_mtms并将生成的Crt_mtms发送给MTMS系统,MTMS系统存储数字证书Crt_mtms;
KMS系统调用第二硬件加密机产生公私钥对Pr_kms和Pu_kms,将公钥Pu_kms和KMS标识信息发给CA中心,CA中心使用根证书对应私钥对公钥Pu_kms和KMS系统标识信息进行签名,生成数字证书Crt_kms并将Crt_kms发送给KMS系统,KMS系统存储数字证书Crt_kms。
其中,还包括授权操作员卡和管理员卡对操作终端进行操作的步骤,具体包括:
针对操作员卡和管理员卡分别产生公私钥对;
将产生的公钥发给CA中心,分别生成操作员卡证书和管理员卡证书;
将操作员卡证书存储在操作员卡里以及将管理员卡证书存储在管理卡里;
操作终端读取插在操作终端上的操作员卡和管理员卡,通过CA中心对操作员证书和管理员证书进行合法性认证,并当认证通过后允许对操作终端进行操作。
其中,所述“操作终端与MTMS系统通过CA中心进行双向认证;认证通过后,MTMS系统将公钥Pu_mtms通过操作终端发送至支付终端并存储在密码键盘中”具体包括:
MTMS系统将数字证书Crt_mtms发送至操作终端;
操作终端使用烧片预装的根证书HsmRCRT验证工作证书Crt_mtms的合法性,并当验证通过后从工作证书Crt_mtms提取公钥Pu_mtms发送至支付终端并存储在密码键盘中。
其中,所述“操作终端将第一传输密钥密文Ctk_Pu 和终端序列号SN发送至MTMS系统”具体包括步骤:
支付终端将第一传输密钥密文Ctk_Pu和终端序列号SN发给操作终端;
操作终端对接收到的第一传输密钥密文Ctk_Pu和终端序列号SN进行打包并使用操作员卡进行签名,以及将经过签名的第一传输密钥密文Ctk_Pu和终端序列号SN发送至MTMS系统;
MTMS系统接收到第一传输密钥密文Ctk_Pu和终端序列号SN时先校验签名的合法性,如果合法,将终端序列号SN和第一传输密钥密文Ctk_Pu关联地存储在MTMS系统的数据库。
其中,所述“KMS系统获得传输密钥TK后调用第二硬件加密机使用认证密钥AUK与支付终端进行双向认证”具体包括:
支付终端产生第一随机数Rnd1并将第一随机数Rnd1发送至KMS系统;
KMS系统接收第一随机数Rnd1后产生第二随机数Rnd2,调用第二硬件加密机使用认证密钥AUK加密第一随机数Rnd1获得第一随机数密文Crnd1,将第一随机数密文Crnd1和第二随机数Rnd2发送给支付终端;
支付终端使用认证密钥AUK解密接收到的第一随机数密文Crnd1获得第三随机数Rnd1’,判断第三随机数Rnd1’与第一随机数Rnd1是否一致:
如果第三随机数Rnd1’与第一随机数Rnd1一致,支付终端使用认证密钥AUK加密第二随机数Rnd2生成第二随机数密文Crnd2,并将第二随机数密文Crnd2发送给KMS系统;
KMS系统调用第二硬件加密机使用认证密钥AUK解密接收到的第二随机数密文Crnd2获得第四随机数Rnd2’,判断第四随机数Rnd2’与第二随机数Rnd2是否一致;
如果第四随机数Rnd2’与第二随机数Rnd2一致,KMS系统与支付终端认证通过。
其中,所述支付终端为POS终端、手机终端、智能IC卡或ATM机终端。
在本发明中,传输密钥TK产生时计算TK的原始希哈值,当每次存储、传输或使用TK时先校验TK的希哈值,当检验通过后才可以使用TK。通过校验TK的希哈值可以防止存储设备异常导致存储的数据错误,确定密钥是否正确。
本发明的有益效果为:通过支付终端上传传输密钥TK,由TK加密终端主密钥TMK后传送至支付终端,实现支付终端远程下载终端主密钥,避免了支付终端通过集中下载主密钥后再布放到商户,减少了物流成本和KMS系统集中下载的维护成本,其中,远程下载主密钥TMK全过程都采用密文传输,在支付终端与KMS之间传输主密钥之间还进行了双方的双向认证,提高了主密钥的传输安全。进一步地,本发明主密钥TMK是由KMS系统生成的,因此方便KMS系统对主密钥TMK的后续维护和管理。进一步地,在本实施方式中通过操作终端实现传输密钥TK的采集和上传,提高了终端上传TK 的时间效率,同时也大大方便了不同类型和型号支付终端传输密钥TK的采集和上传。由操作终端控制支付终端传输密钥TK的采集和上传使支付终端负责产生和传输密钥TK部分的硬件资源被释放出来,使支付终端的硬件资源能够被更合理的优化使用。进一步地,通过MTMS系统可以实现对不同地域分工厂生产的各种支付终端的传输密钥TK进行统一存储并集中发送给相应的KMS系统,避免了支付终端零散上传传输密钥TK可能造成的错误以及对KMS系统的工作负担。进一步地,在传输密钥TK传输的过程中通过CA中心对传输数据的收发双方进行身份认证,保证操作终端、MTMS系统和KMS系统为合法身份,确保密文的不会被伪终端窃取。
本发明中所述操作终端只有在操作员卡和管理员卡同时插在操作终端上,并且操作员卡和管理员卡都通过CA中心认证后,才能进行TK采集操作,因此只有指定的操作人员在管理员授权的情况下才能采集支付终端的传输密钥TK,提高了操作终端的操作权限管理,有效确保了操作终端上传传输密钥TK的真实性和有效性。
本发明通过操作终端对采集的第一传输密钥密文Ctk_Pu和终端序列号SN进行打包和签名,因此可以签名信息追溯该第一传输密钥密文是由哪位操作员操作产生的,可以根据验证所述签名的合法性来判断上传的第一传输密钥密文Ctk_Pu和终端序列号SN是否是合法的,加强了对传输密钥TK的采集传输管理,防止伪终端上传伪传输密钥TK。
本发明所述支付终端和KMS系统通过双向认证A单元双向认证B单元使用传输认证密钥AUK进行双方的身份认证,只有在双方的身份认证都通过的情况下KMS系统才最终将加密后的终端主密钥发送给支付终端。每台支付终端的序列号SN和传输认证密钥AUK都是不同的,在KMS系统中存储有每台支付终端的传输认证密钥AUK,因此通过双向认证A单元双向认证B单元使用传输认证密钥AUK进行双方的身份认证能够确保支付终端和KMS系统双方都是合法的身份,确保终端主密钥TMK是来至相应的KMS系统,同是也确保TMK下载到相应的支付终端里。
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (1)

  1. 1、一种终端主密钥TMK安全下载方法,其特征在于,包括步骤:
    S1、MTMS系统将公钥Pu_mtms下传至支付终端的流程;
    S2、支付终端使用公钥Pu_mtms加密传输密钥TK并上传至KMS系统的流程;
    S3、支付终端从KMS系统下载经过传输密钥TK加密的主密钥TMK的流程;
    其中,步骤S1具体步骤包括:
    S11、操作终端预置CA中心生成的操作终端数字证书Crt_optm,MTMS系统预置CA中心生成的MTMS系统数字证书Crt_mtms,KMS系统预置CA中心生成的KMS系统数字证书Crt_kms;
    S12、MTMS系统调用第一硬件加密机、KMS 系统调用第二硬件加密机,分别在第一硬件加密机和第二硬件加密机中将MTMS系统权限分量及KMS 系统权限分量合成保护密钥PK和MAC密钥MAK,并且将所述保护密钥PK和MAC密钥MAK一并存储在第一硬件加密机和第二硬件加密机中;
    S13、操作终端与MTMS系统通过CA中心进行双向认证;
    S14、认证通过后,MTMS系统将公钥Pu_mtms通过操作终端发送至支付终端并存储在密码键盘中;
    步骤S2具体步骤包括:
    S21、支付终端调用密码键盘产生传输密钥TK,所述传输密钥TK包括传输加密密钥TEK和传输认证密钥AUK;
    S22、支付终端调用密码键盘使用公钥Pu_mtms 加密传输密钥TK 生成第一传输密钥密文Ctk_Pu;
    S23、操作终端将第一传输密钥密文Ctk_Pu 和终端序列号SN发送至MTMS系统;
    S24、当接收到KMS发送的TK获取请求时,MTMS系统调用第一硬件加密机使用私钥Pr_mtms 解密第一传输密钥密文Ctk_Pu获得传输密钥TK,然后使用保护密钥PK 加密传输密钥TK获得密文TK,使用MAC 密钥MAK 计算密文TK的MAC 值,将密文TK和密文TK的MAC值合并生成第二传输密钥密文Ctk_pk;
    S25、MTMS系统与KMS系统通过CA中心进行双向认证;
    S26、认证通过后,MTMS系统将终端序列号SN 和第二传输密钥密文Ctk_pk 发送给KMS 系统;
    S3具体步骤包括:
    S31、支付终端将终端序列号SN 和下载主密钥申请发送至KMS 系统;
    S32、KMS系统接收到支付终端发送的终端序列号SN 和下载主密钥申请后,查询与终端序列号SN对应的第二传输密钥密文Ctk_pk;
    S33、KMS系统调用第二硬件加密机使用MAC密钥MAK对查询到的第二传输密钥密文Ctk_pk 校验MAC 合法性,如果校验通过,使用保护密钥PK 解密第二传输密钥密文Ctk_pk 获得传输密钥TK并将其存储在所述第二硬件加密机中;
    S34、KMS 系统获得传输密钥TK后调用第二硬件加密机使用认证密钥AUK 与支付终端进行双向认证;
    S35、如果认证通过,KMS系统调用第二硬件加密机使用传输加密密钥TEK加密终端主密钥TMK生成主密钥密文Ctmk并将主密钥密文Ctmk发送至支付终端;
    S36、支付终端调用密码键盘使用传输加密密钥TEK解密主密钥密文Ctmk获得终端主密钥TMK并将终端主密钥TMK存储在密码键盘中。
    2、根据权利要求1所述的终端主密钥TMK安全下载方法,其特征在于,所述“操作终端预置CA中心生成的操作终端数字证书Crt_optm,MTMS系统预置CA中心生成的MTMS系统数字证书Crt_mtms,KMS系统预置CA中心生成的KMS系统数字证书Crt_kms”具体包括:
    操作终端生成公私钥对Pu和Pr,将公钥Pu和操作终端标识信息发给CA中心,CA中心使用根证书对应私钥对公钥Pu和操作终端标识信息进行签名,生成数字证书Crt_optm并将生成的数字证书Crt_optm发送给操作终端,操作终端存储数字证书Crt_optm;
    MTMS系统调用第一硬件加密机产生公私钥对Pr_mtms和Pu_mtms,将公钥Pu_mtms和MTMS标识信息发给CA中心,CA中心使用根证书对应私钥对公钥Pu_mtms和MTMS系统标识信息进行签名,生成数字证书Crt_mtms并将生成的Crt_mtms发送给MTMS系统,MTMS系统存储数字证书Crt_mtms;
    KMS系统调用第二硬件加密机产生公私钥对Pr_kms和Pu_kms,将公钥Pu_kms和KMS标识信息发给CA中心,CA中心使用根证书对应私钥对公钥Pu_kms和KMS系统标识信息进行签名,生成数字证书Crt_kms并将Crt_kms发送给KMS系统,KMS系统存储数字证书Crt_kms。
    3、根据权利要求1 所述的终端主密钥TMK安全下载方法,其特征在于,还包括授权操作员卡和管理员卡对操作终端进行操作的步骤,具体包括:
    针对操作员卡和管理员卡分别产生公私钥对;
    将产生的公钥发给CA中心,分别生成操作员卡证书和管理员卡证书;
    将操作员卡证书存储在操作员卡里以及将管理员卡证书存储在管理卡里;
    操作终端读取插在操作终端上的操作员卡和管理员卡,通过CA中心对操作员证书和管理员证书进行合法性认证,并当认证通过后允许对操作终端进行操作。
    4、根据权利要求2所述的终端主密钥TMK安全下载方法,其特征在于,所述“操作终端与MTMS系统通过CA中心进行双向认证;认证通过后,MTMS系统将公钥Pu_mtms通过操作终端发送至支付终端并存储在密码键盘中”具体包括:
    MTMS系统将数字证书Crt_mtms发送至操作终端;
    操作终端使用烧片预装的根证书HsmRCRT验证工作证书Crt_mtms的合法性,并当验证通过后从工作证书Crt_mtms提取公钥Pu_mtms发送至支付终端并存储在密码键盘中。
    5、根据权利要求3所述的终端主密钥TMK安全下载方法,其特征在于,所述“操作终端将第一传输密钥密文Ctk_Pu 和终端序列号SN发送至MTMS系统”具体包括步骤:
    支付终端将第一传输密钥密文Ctk_Pu和终端序列号SN发给操作终端;
    操作终端对接收到的第一传输密钥密文Ctk_Pu和终端序列号SN进行打包并使用操作员卡进行签名,以及将经过签名的第一传输密钥密文Ctk_Pu和终端序列号SN发送至MTMS系统;
    MTMS系统接收到第一传输密钥密文Ctk_Pu和终端序列号SN时先校验签名的合法性,如果合法,将终端序列号SN和第一传输密钥密文Ctk_Pu关联地存储在MTMS系统的数据库。
    6、根据权利要求1所述的终端主密钥TMK安全下载方法,其特征在于,所述“KMS系统获得传输密钥TK后调用第二硬件加密机使用认证密钥AUK与支付终端进行双向认证”具体包括:
    支付终端产生第一随机数Rnd1并将第一随机数Rnd1发送至KMS系统;
    KMS系统接收第一随机数Rnd1后产生第二随机数Rnd2,调用第二硬件加密机使用认证密钥AUK加密第一随机数Rnd1获得第一随机数密文Crnd1,将第一随机数密文Crnd1和第二随机数Rnd2发送给支付终端;
    支付终端使用认证密钥AUK解密接收到的第一随机数密文Crnd1获得第三随机数Rnd1’,判断第三随机数Rnd1’与第一随机数Rnd1是否一致:
    如果第三随机数Rnd1’与第一随机数Rnd1一致,支付终端使用认证密钥AUK加密第二随机数Rnd2生成第二随机数密文Crnd2,并将第二随机数密文Crnd2发送给KMS系统;
    KMS系统调用第二硬件加密机使用认证密钥AUK解密接收到的第二随机数密文Crnd2获得第四随机数Rnd2’,判断第四随机数Rnd2’与第二随机数Rnd2是否一致;
    如果第四随机数Rnd2’与第二随机数Rnd2一致,KMS系统与支付终端认证通过。
    7、根据权利要求1至6所述的终端主密钥TMK安全下载方法,其特征在于,所述支付终端为POS终端、手机终端、智能IC卡或ATM机终端。
    8、一种终端主密钥TMK安全下载系统,其特征在于,包括第一硬件加密机、第二硬件加密机、支付终端、操作终端、MTMS系统、CA中心和KMS系统;所述支付终端包括第一TK上传模块、TMK请求模块、双向认证A模块、TMK接收模块,
    所述操作终端包括第二TK上传模块,
    所述MTMS系统包括协商密钥A模块、公钥发送模块、TK请求响应模块、第三TK上传模块,
    所述KMS系统包括协商密钥B模块、TMK请求响应模块、双向认证B模块、TMK发送模块,
    所述CA中心包括证书预置模块、CA认证模块;
    证书预置模块用于将CA中心生成的操作终端数字证书Crt_optm预置于操作终端,将CA中心生成的MTMS系统数字证书Crt_mtms预置于MTMS系统,将CA中心生成的KMS系统数字证书Crt_kms预置于KMS系统;
    协商密钥A模块和协商密钥B模块用于调用第一硬件加密机和第二硬件加密机,分别在第一硬件加密机和第二硬件加密机中将MTMS系统权限分量及KMS 系统权限分量合成保护密钥PK和MAC密钥MAK,并且将所述保护密钥PK和MAC密钥MAK一并存储在第一硬件加密机和第二硬件加密机中;
    CA认证模块用于对操作终端与MTMS系统通过CA中心进行双向认证;
    公钥发送模块用于当CA认证认证通过后,将公钥Pu_mtms通过操作终端发送至支付终端并存储在密码键盘中;
    第一TK上传模块用于调用密码键盘产生传输密钥TK,所述传输密钥TK包括传输加密密钥TEK和传输认证密钥AUK;
    第一TK上传模块用于调用密码键盘使用公钥Pu_mtms 加密传输密钥TK 生成第一传输密钥密文Ctk_Pu;
    第二TK上传模块用于将第一传输密钥密文Ctk_Pu 和终端序列号SN发送至MTMS系统;
    TK请求响应模块用于当接收到KMS系统发送的TK获取请求时,调用第一硬件加密机使用私钥Pr_mtms 解密第一传输密钥密文Ctk_Pu获得传输密钥TK,用于使用保护密钥PK 加密传输密钥TK获得密文TK,并用于使用MAC 密钥MAK 计算密文TK的MAC 值,以及用于将密文TK和密文TK的MAC值合并生成第二传输密钥密文Ctk_pk;
    CA认证模块还用于MTMS系统与KMS系统通过CA中心进行双向认证;
    第三TK上传模块用于当MTMS系统与KMS系统认证通过后,将终端序列号SN 和第二传输密钥密文Ctk_pk 发送给KMS 系统;
    TMK请求模块用于将终端序列号SN 和下载主密钥申请发送至KMS 系统;
    TMK请求响应模块用于当KMS系统接收到支付终端发送的终端序列号SN 和下载主密钥申请后,查询与终端序列号SN对应的第二传输密钥密文Ctk_pk;
    TMK请求响应模块还用于调用第二硬件加密机使用MAC密钥MAK对查询到的第二传输密钥密文Ctk_pk 校验MAC 合法性,以及用于当所述校验通过后,使用保护密钥PK 解密第二传输密钥密文Ctk_pk 获得传输密钥TK并将其存储在所述第二硬件加密机中;
    双向认证A模块和双向认证B模块用于当KMS 系统获得传输密钥TK后,调用第二硬件加密机使用认证密钥AUK 与支付终端进行双向认证;
    TMK发送模块用于当KMS系统与支付终端双向认证通过后,调用第二硬件加密机使用传输加密密钥TEK加密终端主密钥TMK生成主密钥密文Ctmk并将主密钥密文Ctmk发送至支付终端;
    TMK接收模块用于调用密码键盘使用传输加密密钥TEK解密主密钥密文Ctmk获得终端主密钥TMK并将终端主密钥TMK存储在密码键盘中。
    9、根据权利要求8所述的终端主密钥TMK安全下载系统,其特征在于,所述CA中心的证书预置模块包括操作终端数字证书Crt_optm产生模块、MTMS系统数字证书Crt_mtms产生模块和KMS系统数字证书Crt_kms产生模块;
    所述操作终端的数字证书Crt_optm产生模块用于调用操作终端生成公私钥对Pu和Pr,使用根证书对应私钥对公钥Pu和操作终端标识信息进行签名,生成数字证书Crt_optm并用于将生成的数字证书Crt_optm发送以及存储在操作终端中;
    所述MTMS系统的数字证书Crt_mtms产生模块用于调用第一硬件加密机产生公私钥对Pr_mtms和Pu_mtms,使用根证书对应私钥对公钥Pu_mtms和MTMS系统标识信息进行签名,生成数字证书Crt_mtms并用于将生成的Crt_mtms发送以及存储在MTMS系统中;
    所述KMS系统数字证书Crt_kms产生模块用于调用第二硬件加密机产生公私钥对Pr_kms和Pu_kms,使用根证书对应私钥对公钥Pu_kms和KMS系统标识信息进行签名,生成数字证书Crt_kms并用于将Crt_kms发送以及存储在KMS系统中。
    10、根据权利要求8所述的终端主密钥TMK安全下载系统,其特征在于,所述操作终端还包括有操作员卡和管理员卡;
    所述CA中心的证书预置模块还用于产生操作员卡证书和管理员卡证书,并用于将操作员卡证书存储在操作员卡里以及将管理员卡证书存储在管理卡里;
    所述操作员卡和管理员卡用于当操作终端读取插在操作终端上的操作员卡和管理员卡,通过CA中心对操作员证书和管理员证书进行合法性认证通过时,授权对操作终端进行操作。
    11、根据权利要求10所述的终端主密钥TMK安全下载系统,其特征在于, 所述第二TK上传模块还包括打包单元,所述打包单元用于对接收到的第一传输密钥密文Ctk_Pu和终端序列号SN进行打包并使用操作员卡进行签名;
    所述MTMS系统的第三TK上传模块还包括校验单元,所述校验单元用于当接收到所述TK采集单元传输的第一传输密钥密文Ctk_Pu和终端序列号SN时,校验所述打包单元的签名的合法性,以及用于当所述检验合法时,将终端序列号SN和第一传输密钥密文Ctk_Pu关联地存储在MTMS系统的数据库。
    12、根据权利要求9所述的终端主密钥TMK安全下载系统,其特征在于, 所述双向认证A模块包括第一随机数产生单元、第一数据收发单元、第一加解密单元以及第一判断单元,所述双向认证B模块包括第二随机数产生单元、第二数据收发单元、第二加解密单元以及第二判断单元;
    第一随机数产生单元用于产生第一随机数Rnd1;第一数据收发单元用于将产生的第一随机数Rnd1发送至KMS系统;第二数据收发单元用于接收第一随机数Rnd1;第二随机数产生单元用于在接收到第一随机数Rnd1时,产生随机数第二Rnd2;第二加解密单元用于在接收到第一随机数Rnd1时,调用第二硬件加密机使用传输认证密钥AUK加密第一随机数Rnd1获得第一随机数密文Crnd1;第二数据收发单元用于将第一随机数密文Crnd1和第二随机数Rnd2发送给支付终端;
    第一加解密单元用于在接收到第一随机数密文Crnd1和第二随机数Rnd2时,使用传输认证密钥AUK解密接收到的第一随机数密文Crnd1获得第三随机数Rnd1’;第一判断单元用于判断第三随机数Rnd1’与第一随机数Rnd1是否一致;
    第一加解密单元用于当所述第一判断单元判定第三随机数Rnd1’与第一随机数Rnd1一致时,使用传输认证密钥AUK加密第二随机数Rnd2生成第二随机数密文Crnd2;第一数据收发单元用于将第二随机数密文Crnd2发送给KMS系统;
    第二加解密单元用于在接收到第二随机数密文Crnd2时,调用第二硬件加密机使用传输认证密钥AUK解密接收到的第二随机数密文Crnd2获得第四随机数Rnd2’,第二判断单元用于判断第四随机数Rnd2’与第二随机数Rnd2是否一致,并当判定第四随机数Rnd2’与第二随机数Rnd2一致时,确认KMS系统与支付终端之间的双向认证通过。
    13、根据权利要求8至12所述的终端主密钥TMK安全下载系统,其特征在于,所述支付终端为POS终端、手机终端、智能IC卡、或ATM机终端。
PCT/CN2014/073205 2013-03-15 2014-03-11 一种终端主密钥tmk安全下载方法及系统 WO2014139403A1 (zh)

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
CN201310084671.6 2013-03-15
CN2013100843972A CN103237004A (zh) 2013-03-15 2013-03-15 密钥下载方法、管理方法、下载管理方法及装置和系统
CN2013100846735A CN103220271A (zh) 2013-03-15 2013-03-15 密钥下载方法、管理方法、下载管理方法及装置和系统
CN2013100846716A CN103220270A (zh) 2013-03-15 2013-03-15 密钥下载方法、管理方法、下载管理方法及装置和系统
CN201310084397.2 2013-03-15
CN201310084673.5 2013-03-15
CN201310084653.8 2013-03-15
CN2013100846538A CN103237005A (zh) 2013-03-15 2013-03-15 密钥管理方法及系统
CN201310740537.7A CN103746800B (zh) 2013-03-15 2013-12-27 一种终端主密钥tmk安全下载方法及系统
CN201310740537.7 2013-12-27

Publications (1)

Publication Number Publication Date
WO2014139403A1 true WO2014139403A1 (zh) 2014-09-18

Family

ID=50363015

Family Applications (5)

Application Number Title Priority Date Filing Date
PCT/CN2014/073224 WO2014139411A1 (zh) 2013-03-15 2014-03-11 终端主密钥tmk安全下载方法及系统
PCT/CN2014/073225 WO2014139412A1 (zh) 2013-03-15 2014-03-11 一种终端主密钥tmk安全下载方法系统
PCT/CN2014/073205 WO2014139403A1 (zh) 2013-03-15 2014-03-11 一种终端主密钥tmk安全下载方法及系统
PCT/CN2014/073220 WO2014139408A1 (zh) 2013-03-15 2014-03-11 一种终端主密钥tmk安全下载方法及系统
PCT/CN2014/073215 WO2014139406A1 (zh) 2013-03-15 2014-03-11 一种终端主密钥tmk安全下载方法及系统

Family Applications Before (2)

Application Number Title Priority Date Filing Date
PCT/CN2014/073224 WO2014139411A1 (zh) 2013-03-15 2014-03-11 终端主密钥tmk安全下载方法及系统
PCT/CN2014/073225 WO2014139412A1 (zh) 2013-03-15 2014-03-11 一种终端主密钥tmk安全下载方法系统

Family Applications After (2)

Application Number Title Priority Date Filing Date
PCT/CN2014/073220 WO2014139408A1 (zh) 2013-03-15 2014-03-11 一种终端主密钥tmk安全下载方法及系统
PCT/CN2014/073215 WO2014139406A1 (zh) 2013-03-15 2014-03-11 一种终端主密钥tmk安全下载方法及系统

Country Status (2)

Country Link
CN (28) CN103714636B (zh)
WO (5) WO2014139411A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061848A (zh) * 2019-04-17 2019-07-26 飞天诚信科技股份有限公司 一种安全导入支付终端密钥的方法、支付终端及系统
CN111627174A (zh) * 2019-02-28 2020-09-04 南京摩铂汇信息技术有限公司 蓝牙pos设备及支付系统
US11018860B2 (en) 2016-10-28 2021-05-25 Microsoft Technology Licensing, Llc Highly available and reliable secret distribution infrastructure

Families Citing this family (112)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714636B (zh) * 2013-03-15 2015-12-02 福建联迪商用设备有限公司 一种批量采集和上传传输密钥tk数据的方法及操作终端
CN105281896B (zh) * 2014-07-17 2018-11-27 深圳华智融科技股份有限公司 一种基于椭圆曲线算法的密钥pos机激活方法及系统
CN104270346B (zh) * 2014-09-12 2017-10-13 北京天行网安信息技术有限责任公司 双向认证的方法、装置和系统
CN105991536A (zh) * 2014-11-07 2016-10-05 天地融科技股份有限公司 数据交互系统
CN104363090A (zh) * 2014-11-19 2015-02-18 成都卫士通信息产业股份有限公司 一种增强银行终端设备安全性的密钥分发装置和方法
CN105681263B (zh) * 2014-11-20 2019-02-12 广东华大互联网股份有限公司 一种智能卡密钥远程应用方法及应用系统
CN104410641B (zh) * 2014-12-10 2017-12-08 福建联迪商用设备有限公司 一种pos终端安全受控的联网激活方法及装置
CN104486323B (zh) * 2014-12-10 2017-10-31 福建联迪商用设备有限公司 一种pos终端安全受控的联网激活方法及装置
US9485250B2 (en) * 2015-01-30 2016-11-01 Ncr Corporation Authority trusted secure system component
CN105989472A (zh) * 2015-03-06 2016-10-05 华立科技股份有限公司 电能计量系统的无线移动配置,无线支付配置及其方法,以及公用商品无线支付配置
CN106204034B (zh) * 2015-04-29 2019-07-23 中国电信股份有限公司 应用内支付的双向认证方法和系统
CN105117665B (zh) * 2015-07-16 2017-10-31 福建联迪商用设备有限公司 一种终端产品模式与开发模式安全切换的方法及系统
CN105184121A (zh) * 2015-09-02 2015-12-23 上海繁易电子科技有限公司 一种通过远程服务器的硬件授权系统和方法
CN106559218A (zh) * 2015-09-29 2017-04-05 中国电力科学研究院 一种智能变电站计量数据的安全采集方法
CN105243542B (zh) * 2015-11-13 2021-07-02 咪付(广西)网络技术有限公司 一种动态电子凭证认证的方法
CN105260884A (zh) * 2015-11-18 2016-01-20 北京微智全景信息技术有限公司 Pos机密钥分发方法及装置
CN105530241B (zh) * 2015-12-07 2018-12-28 咪付(广西)网络技术有限公司 移动智能终端与pos终端的认证方法
CN105574722A (zh) * 2015-12-11 2016-05-11 福建新大陆支付技术有限公司 基于授权ic卡的支付终端远程联机授权方法
CN105930718A (zh) * 2015-12-29 2016-09-07 中国银联股份有限公司 一种销售点终端模式切换方法及装置
CN105656669B (zh) * 2015-12-31 2019-01-01 福建联迪商用设备有限公司 电子设备的远程修复方法、设备、被修复设备和系统
CN105681032B (zh) 2016-01-08 2017-09-12 腾讯科技(深圳)有限公司 密钥存储方法、密钥管理方法及装置
CN105743654A (zh) * 2016-02-02 2016-07-06 上海动联信息技术股份有限公司 一种pos机密钥远程下载的服务系统以及密钥下载方法
CN105790934B (zh) * 2016-03-04 2019-03-15 中国银联股份有限公司 一种自适应的pos终端配置方法以其配置权转让方法
CN107294722A (zh) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 一种终端身份认证方法、装置及系统
CN105978856B (zh) * 2016-04-18 2019-01-25 随行付支付有限公司 一种pos机密钥下载方法、装置及系统
CN106059771A (zh) * 2016-05-06 2016-10-26 上海动联信息技术股份有限公司 一种智能pos机密钥管理系统及方法
CN106097608B (zh) * 2016-06-06 2018-07-27 福建联迪商用设备有限公司 远程密钥下载方法及系统、收单机构和目标pos终端
CN106127461A (zh) * 2016-06-16 2016-11-16 中国银联股份有限公司 双向验证移动支付方法及系统
CN107563712A (zh) * 2016-06-30 2018-01-09 中兴通讯股份有限公司 一种移动终端打卡方法、装置、设备及系统
CN106027247A (zh) * 2016-07-29 2016-10-12 宁夏丝路通网络支付有限公司北京分公司 Pos密钥远程下发方法
CN106100854A (zh) * 2016-08-16 2016-11-09 黄朝 基于权威主体的终端设备的逆向认证方法及系统
CN107800538B (zh) * 2016-09-01 2021-01-29 中电长城(长沙)信息技术有限公司 一种自助设备远程密钥分发方法
CN106571915A (zh) * 2016-11-15 2017-04-19 中国银联股份有限公司 一种终端主密钥的设置方法和装置
CN106603496B (zh) * 2016-11-18 2019-05-21 新智数字科技有限公司 一种数据传输的保护方法、智能卡、服务器及通信系统
CN106656488B (zh) * 2016-12-07 2020-04-03 百富计算机技术(深圳)有限公司 一种pos终端的密钥下载方法和装置
CN106712939A (zh) * 2016-12-27 2017-05-24 百富计算机技术(深圳)有限公司 密钥离线传输方法和装置
US10432730B1 (en) 2017-01-25 2019-10-01 United States Of America As Represented By The Secretary Of The Air Force Apparatus and method for bus protection
CN106953731B (zh) * 2017-02-17 2020-05-12 福建魔方电子科技有限公司 一种终端管理员的认证方法及系统
CN107466455B (zh) * 2017-03-15 2021-05-04 深圳大趋智能科技有限公司 Pos机安全验证方法及装置
US10296477B2 (en) 2017-03-30 2019-05-21 United States of America as represented by the Secretary of the AirForce Data bus logger
CN106997533B (zh) * 2017-04-01 2020-10-13 福建实达电脑设备有限公司 一种pos终端产品安全生产授权管理系统及方法
CN107094138B (zh) * 2017-04-11 2019-09-13 郑州信大捷安信息技术股份有限公司 一种智能家居安全通信系统及通信方法
CN107070925A (zh) * 2017-04-18 2017-08-18 上海赛付网络科技有限公司 一种终端应用与后台服务通讯报文防篡改的方法
CN107104795B (zh) * 2017-04-25 2020-09-04 上海汇尔通信息技术有限公司 Rsa密钥对和证书的注入方法、架构及系统
CN107360652A (zh) * 2017-05-31 2017-11-17 江苏普世祥光电技术有限公司 一种广场景观灯的控制方法
CN107301437A (zh) * 2017-05-31 2017-10-27 江苏普世祥光电技术有限公司 一种广场景观灯的控制系统
CN107358441B (zh) * 2017-06-26 2020-12-18 北京明华联盟科技有限公司 支付验证的方法、系统及移动设备和安全认证设备
WO2019023979A1 (zh) * 2017-08-02 2019-02-07 福建联迪商用设备有限公司 可配置的pos机密钥对生成方法、存储介质
CN107666420B (zh) * 2017-08-30 2020-12-15 宁波梦居智能科技有限公司 一种智能家居网关生产控制和身份鉴别的方法
CN107392591B (zh) * 2017-08-31 2020-02-07 恒宝股份有限公司 行业卡的在线充值方法、系统及蓝牙读写装置
CN107888379A (zh) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 一种安全连接的方法、pos终端及密码键盘
CN107995985B (zh) * 2017-10-27 2020-05-05 福建联迪商用设备有限公司 金融支付终端激活方法及其系统
CN107835170B (zh) * 2017-11-04 2021-04-20 上海动联信息技术股份有限公司 一种智能Pos设备安全授权拆机系统及方法
CN107993062A (zh) * 2017-11-27 2018-05-04 百富计算机技术(深圳)有限公司 Pos终端交易方法、装置、计算机设备及可读存储介质
CN107944250B (zh) * 2017-11-28 2021-04-13 艾体威尔电子技术(北京)有限公司 一种应用于pos机的密钥采集方法
CN107919962B (zh) * 2017-12-22 2021-01-15 国民认证科技(北京)有限公司 一种物联网设备注册和认证方法
CN108365950A (zh) * 2018-01-03 2018-08-03 深圳怡化电脑股份有限公司 金融自助设备密钥的生成方法及装置
CN108390851B (zh) * 2018-01-05 2020-07-03 郑州信大捷安信息技术股份有限公司 一种用于工业设备的安全远程控制系统及方法
WO2019136736A1 (zh) * 2018-01-15 2019-07-18 福建联迪商用设备有限公司 软件加密终端、支付终端、软件包加密及解密方法及系统
WO2019153119A1 (zh) * 2018-02-06 2019-08-15 福建联迪商用设备有限公司 一种传输密钥的方法、接收终端及分发终端
CN108446539B (zh) * 2018-03-16 2023-01-13 福建深空信息技术有限公司 一种软件授权方法和软件授权文件生成系统
WO2019178763A1 (zh) * 2018-03-21 2019-09-26 福建联迪商用设备有限公司 一种证书导入方法及终端
WO2019178762A1 (zh) * 2018-03-21 2019-09-26 福建联迪商用设备有限公司 一种验证终端合法性的方法、服务端及系统
WO2019200530A1 (zh) * 2018-04-17 2019-10-24 福建联迪商用设备有限公司 终端主密钥的远程分发方法及其系统
CN108737106B (zh) * 2018-05-09 2021-06-01 深圳壹账通智能科技有限公司 区块链系统上用户验证方法、装置、终端设备及存储介质
CN108833088A (zh) * 2018-05-22 2018-11-16 珠海爱付科技有限公司 一种pos终端激活方法
CN110581829A (zh) * 2018-06-08 2019-12-17 中国移动通信集团有限公司 通信方法及装置
CN109218293B (zh) * 2018-08-21 2021-09-21 西安得安信息技术有限公司 一种分布式密码服务平台密钥管理的使用方法
CN109347625B (zh) * 2018-08-31 2020-04-24 阿里巴巴集团控股有限公司 密码运算、创建工作密钥的方法、密码服务平台及设备
CN109326061B (zh) * 2018-09-10 2021-10-26 惠尔丰(中国)信息系统有限公司 智能pos的防切机方法
CN109274500B (zh) * 2018-10-15 2020-06-02 百富计算机技术(深圳)有限公司 一种密钥下载方法、客户端、密码设备及终端设备
CN109274684B (zh) * 2018-10-31 2020-12-29 中国—东盟信息港股份有限公司 基于eSIM通讯与导航服务为一体的物联网终端系统及其实现方法
CN109547208B (zh) * 2018-11-16 2021-11-09 交通银行股份有限公司 金融电子设备主密钥在线分发方法及系统
CN109670289B (zh) * 2018-11-20 2020-12-15 福建联迪商用设备有限公司 一种识别后台服务器合法性的方法及系统
CN109508995A (zh) * 2018-12-12 2019-03-22 福建新大陆支付技术有限公司 一种基于支付终端的脱机授权方法及支付终端
CN109510711B (zh) * 2019-01-08 2022-04-01 深圳市网心科技有限公司 一种网络通信方法、服务器、客户端及系统
CN109995532A (zh) * 2019-04-11 2019-07-09 晏福平 一种终端主密钥的在线管理方法及系统
CN110011794B (zh) * 2019-04-11 2021-08-13 北京智芯微电子科技有限公司 密码机密钥属性的测试方法
CN110545542B (zh) * 2019-06-13 2023-03-14 银联商务股份有限公司 基于非对称加密算法的主控密钥下载方法、装置和计算机设备
CN112532567A (zh) * 2019-09-19 2021-03-19 中国移动通信集团湖南有限公司 一种交易加密方法和posp系统
CN110855442A (zh) * 2019-10-10 2020-02-28 北京握奇智能科技有限公司 一种基于pki技术的设备间证书验证方法
CN111132154B (zh) * 2019-12-26 2022-10-21 飞天诚信科技股份有限公司 一种协商会话密钥的方法及系统
CN111193748B (zh) * 2020-01-06 2021-12-03 惠州市德赛西威汽车电子股份有限公司 一种交互式密钥安全认证方法及系统
CN111275440B (zh) * 2020-01-19 2023-11-10 中钞科堡现金处理技术(北京)有限公司 远程密钥下载方法及系统
TWI775061B (zh) * 2020-03-30 2022-08-21 尚承科技股份有限公司 軟韌體或資料保護系統及保護方法
CN111597512B (zh) * 2020-03-31 2023-10-31 尚承科技股份有限公司 软韧体或资料保护系统及保护方法
CN111526013B (zh) * 2020-04-17 2023-05-05 中国人民银行清算总中心 密钥分发方法及系统
CN111884804A (zh) * 2020-06-15 2020-11-03 上海祥承通讯技术有限公司 一种远程密钥管理方法
CN111815811B (zh) * 2020-06-22 2022-09-06 合肥智辉空间科技有限责任公司 一种电子锁安全系统
CN111950999B (zh) * 2020-07-28 2024-06-04 银盛支付服务股份有限公司 一种在pos机上实现基于ic卡灌密钥安全方法及系统
CN111931206A (zh) * 2020-07-31 2020-11-13 银盛支付服务股份有限公司 一种基于app数据加密方法
CN112134849B (zh) * 2020-08-28 2024-02-20 国电南瑞科技股份有限公司 一种智能变电站的动态可信加密通信方法及系统
CN112182599B (zh) * 2020-09-15 2024-06-11 中信银行股份有限公司 一种主密钥自动加载方法、装置、电子设备及可读存储介质
CN112311528B (zh) * 2020-10-17 2023-06-23 深圳市德卡科技股份有限公司 一种基于国密算法的数据安全传输方法
CN112291232B (zh) * 2020-10-27 2021-06-04 中国联合网络通信有限公司深圳市分公司 一种基于租户的安全能力和安全服务链管理平台
CN112332978B (zh) * 2020-11-10 2022-09-20 上海商米科技集团股份有限公司 一种基于密钥协商的远程密钥注入方法
CN112396416A (zh) * 2020-11-18 2021-02-23 上海商米科技集团股份有限公司 一种智能pos设备证书装载的方法
CN112560058B (zh) * 2020-12-17 2022-12-30 山东华芯半导体有限公司 基于智能密码钥匙的ssd分区加密存储系统及其实现方法
CN112968776B (zh) * 2021-02-02 2022-09-02 中钞科堡现金处理技术(北京)有限公司 远程密钥交换的方法、存储介质及电子设备
CN113037494B (zh) * 2021-03-02 2023-05-23 福州汇思博信息技术有限公司 一种烧片镜像文件签名方法及终端
CN113450511A (zh) * 2021-03-25 2021-09-28 深圳怡化电脑科技有限公司 受理终端设备与银行系统的交易方法及受理终端设备
CN113132980B (zh) * 2021-04-02 2023-10-13 四川省计算机研究院 应用于北斗导航系统的密钥管理系统方法和装置
CN113328851B (zh) * 2021-04-21 2022-01-14 北京连山科技股份有限公司 一种在多链路条件下随机传输密钥的方法及系统
CN113708923A (zh) * 2021-07-29 2021-11-26 银盛支付服务股份有限公司 一种远程下载主密钥的方法及系统
CN113645221A (zh) * 2021-08-06 2021-11-12 中国工商银行股份有限公司 灌密方法、装置、设备、存储介质和计算机程序
CN113810391A (zh) * 2021-09-01 2021-12-17 杭州视洞科技有限公司 一种跨机房通信双向认证和加密方法
CN113612612A (zh) * 2021-09-30 2021-11-05 阿里云计算有限公司 一种数据加密传输方法、系统、设备及存储介质
CN114423003B (zh) * 2021-12-29 2024-01-30 中国航空工业集团公司西安飞机设计研究所 一种飞机密钥综合管理方法及系统
CN114499891B (zh) * 2022-03-21 2024-05-31 宁夏凯信特信息科技有限公司 一种签名服务器系统以及签名验证方法
CN114726521A (zh) * 2022-04-14 2022-07-08 广东好太太智能家居有限公司 智能锁临时密码生成方法及电子设备
CN117176339B (zh) * 2023-08-31 2024-06-18 深圳手付通科技有限公司 一种在线更新pos终端设备主密钥TMK的方法和系统
CN116865966B (zh) * 2023-09-04 2023-12-05 中量科(南京)科技有限公司 基于量子密钥生成工作密钥的加密方法、装置及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631305A (zh) * 2009-07-28 2010-01-20 交通银行股份有限公司 一种加密方法及系统
CN101930644A (zh) * 2009-06-25 2010-12-29 中国银联股份有限公司 一种银行卡支付系统中主密钥安全自动下载的方法及其系统
CN103220270A (zh) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和系统
CN103220271A (zh) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和系统
CN103237004A (zh) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和系统
CN103237005A (zh) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 密钥管理方法及系统

Family Cites Families (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS57157371A (en) * 1981-03-24 1982-09-28 Sharp Corp Electronic cash register
JP2993833B2 (ja) * 1993-11-29 1999-12-27 富士通株式会社 Posシステム
JPH10112883A (ja) * 1996-10-07 1998-04-28 Hitachi Ltd 無線通信交換システム、交換機、公開鍵管理装置、移動端末および移動端末認証方法
ATE276994T1 (de) * 1999-03-22 2004-10-15 Purac Biochem Bv Verfahren zur reinigung von milchsäure auf industrieller basis
CN1127033C (zh) * 2000-07-20 2003-11-05 天津南开戈德集团有限公司 无线移动网络销售点终端系统
US7110986B1 (en) * 2001-04-23 2006-09-19 Diebold, Incorporated Automated banking machine system and method
KR100641824B1 (ko) * 2001-04-25 2006-11-06 주식회사 하렉스인포텍 대칭키 보안 알고리즘을 이용한 금융정보 입력방법 및 그이동통신용 상거래 시스템
JP2002366285A (ja) * 2001-06-05 2002-12-20 Matsushita Electric Ind Co Ltd Pos端末
GB2401293B (en) * 2002-01-17 2004-12-22 Toshiba Res Europ Ltd Data transmission links
JP2003217028A (ja) * 2002-01-24 2003-07-31 Tonfuu:Kk Pos端末装置の運用状況監視システム
US7395427B2 (en) * 2003-01-10 2008-07-01 Walker Jesse R Authenticated key exchange based on pairwise master key
JP2005117511A (ja) * 2003-10-10 2005-04-28 Nec Corp 量子暗号通信システム及びそれに用いる量子暗号鍵配布方法
KR101282972B1 (ko) * 2004-03-22 2013-07-08 삼성전자주식회사 디바이스와 휴대형 저장장치와의 상호인증
US20060093149A1 (en) * 2004-10-30 2006-05-04 Shera International Ltd. Certified deployment of applications on terminals
DE102005022019A1 (de) * 2005-05-12 2007-02-01 Giesecke & Devrient Gmbh Sichere Verarbeitung von Daten
KR100652125B1 (ko) * 2005-06-03 2006-12-01 삼성전자주식회사 서비스 제공자, 단말기 및 사용자 식별 모듈 간을총괄적으로 인증하여 관리할 수 있도록 하는 상호 인증방법 및 이를 이용한 시스템과 단말 장치
CN100583743C (zh) * 2005-07-22 2010-01-20 华为技术有限公司 传输密钥的分发方法
EP2013831A4 (en) * 2006-02-22 2010-12-22 Hypercom Corp SAFE ELECTRONIC TRANSACTION SYSTEM
JP2007241351A (ja) * 2006-03-06 2007-09-20 Cela System:Kk 顧客・商品・仕入れ管理システム(posを含む)と携帯端末とによる顧客・商品総合管理システム
EP1833009B1 (en) * 2006-03-09 2019-05-08 First Data Corporation Secure transaction computer network
US7818264B2 (en) * 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
CN101064695A (zh) * 2007-05-16 2007-10-31 杭州看吧科技有限公司 一种P2P(Peer to Peer)安全连接的方法
CN101145913B (zh) * 2007-10-25 2010-06-16 东软集团股份有限公司 一种实现网络安全通信的方法及系统
WO2009070041A2 (en) * 2007-11-30 2009-06-04 Electronic Transaction Services Limited Payment system and method of operation
CN101541002A (zh) * 2008-03-21 2009-09-23 展讯通信(上海)有限公司 一种基于Web服务器的移动终端的软件许可证下载方法
CN101615322B (zh) * 2008-06-25 2012-09-05 上海富友金融网络技术有限公司 实现有磁支付功能的移动终端支付方法及系统
JP4666240B2 (ja) * 2008-07-14 2011-04-06 ソニー株式会社 情報処理装置、情報処理方法、プログラム、および情報処理システム
CN101686225A (zh) * 2008-09-28 2010-03-31 中国银联股份有限公司 一种用于网上支付的数据加密和密钥生成方法
KR20100052668A (ko) * 2008-11-11 2010-05-20 노틸러스효성 주식회사 온라인으로 에이티엠과 호스트 사이의 티엠케이를 공유하는방법
JP5329184B2 (ja) * 2008-11-12 2013-10-30 株式会社日立製作所 公開鍵証明書の検証方法及び検証サーバ
CN101425208B (zh) * 2008-12-05 2010-11-10 浪潮齐鲁软件产业有限公司 一种金融税控收款机密钥安全下载方法
CN101527714B (zh) * 2008-12-31 2012-09-05 飞天诚信科技股份有限公司 制证的方法、装置及系统
CN101719895A (zh) * 2009-06-26 2010-06-02 中兴通讯股份有限公司 一种实现网络安全通信的数据处理方法和系统
CN101593389B (zh) * 2009-07-01 2012-04-18 中国建设银行股份有限公司 一种用于pos终端的密钥管理方法和系统
CN101656007B (zh) * 2009-08-14 2011-02-16 通联支付网络服务股份有限公司 一种在pos机上实现一机多密的安全系统及方法
CN102064939B (zh) * 2009-11-13 2013-06-12 福建联迪商用设备有限公司 Pos文件认证的方法及认证证书的维护方法
CN101710436B (zh) * 2009-12-01 2011-12-14 中国建设银行股份有限公司 一种控制pos终端的方法、系统以及pos终端管理设备
CN101807994B (zh) * 2009-12-18 2012-07-25 北京握奇数据系统有限公司 一种ic卡应用数据传输的方法及系统
CN102148799B (zh) * 2010-02-05 2014-10-22 中国银联股份有限公司 密钥下载方法及系统
CN101807997B (zh) * 2010-04-28 2012-08-22 中国工商银行股份有限公司 一种生成传输密钥的装置及方法
CN201656997U (zh) * 2010-04-28 2010-11-24 中国工商银行股份有限公司 一种生成传输密钥的装置
CN102262760A (zh) * 2010-05-28 2011-11-30 杨筑平 交易保密方法、受理装置和提交软件
US8856509B2 (en) * 2010-08-10 2014-10-07 Motorola Mobility Llc System and method for cognizant transport layer security (CTLS)
CN101938520B (zh) * 2010-09-07 2015-01-28 中兴通讯股份有限公司 一种基于移动终端签名的远程支付系统及方法
CN101976403A (zh) * 2010-10-29 2011-02-16 北京拉卡拉网络技术有限公司 手机号支付平台、支付交易系统及方法
CN102013982B (zh) * 2010-12-01 2012-07-25 银联商务有限公司 远程加密方法、管理方法、加密管理方法及装置和系统
CN102903189A (zh) * 2011-07-25 2013-01-30 上海昂贝电子科技有限公司 一种终端交易方法及装置
CN102394749B (zh) * 2011-09-26 2014-03-05 深圳市文鼎创数据科技有限公司 数据传输的线路保护方法、系统、信息安全设备及应用设备
CN102521935B (zh) * 2011-12-15 2013-12-11 福建联迪商用设备有限公司 Pos机状态检测的方法及装置
CN102592369A (zh) * 2012-01-14 2012-07-18 福建联迪商用设备有限公司 自助终端接入金融交易中心的方法
CN102624711B (zh) * 2012-02-27 2015-06-03 福建联迪商用设备有限公司 一种敏感信息传输方法及系统
CN102624710B (zh) * 2012-02-27 2015-03-11 福建联迪商用设备有限公司 一种敏感信息传输方法及系统
CN102647274B (zh) * 2012-04-12 2014-10-08 福建联迪商用设备有限公司 Pos终端、终端接入前置、主密钥管理系统及其方法
CN102707972B (zh) * 2012-05-02 2016-03-09 银联商务有限公司 一种pos终端程序更新方法与系统
CN102768744B (zh) * 2012-05-11 2016-03-16 福建联迪商用设备有限公司 一种远程安全支付方法和系统
CN102868521B (zh) * 2012-09-12 2015-03-04 成都卫士通信息产业股份有限公司 一种增强对称密钥体系的密钥传输方法
CN103116505B (zh) * 2012-11-16 2016-05-25 福建联迪商用设备有限公司 一种自动匹配下载的方法
CN103117855B (zh) * 2012-12-19 2016-07-06 福建联迪商用设备有限公司 一种生成数字证书的方法及备份和恢复私钥的方法
CN103714636B (zh) * 2013-03-15 2015-12-02 福建联迪商用设备有限公司 一种批量采集和上传传输密钥tk数据的方法及操作终端
CN103269266B (zh) * 2013-04-27 2016-07-06 北京宏基恒信科技有限责任公司 动态口令的安全认证方法和系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101930644A (zh) * 2009-06-25 2010-12-29 中国银联股份有限公司 一种银行卡支付系统中主密钥安全自动下载的方法及其系统
CN101631305A (zh) * 2009-07-28 2010-01-20 交通银行股份有限公司 一种加密方法及系统
CN103220270A (zh) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和系统
CN103220271A (zh) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和系统
CN103237004A (zh) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和系统
CN103237005A (zh) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 密钥管理方法及系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11018860B2 (en) 2016-10-28 2021-05-25 Microsoft Technology Licensing, Llc Highly available and reliable secret distribution infrastructure
CN111627174A (zh) * 2019-02-28 2020-09-04 南京摩铂汇信息技术有限公司 蓝牙pos设备及支付系统
CN110061848A (zh) * 2019-04-17 2019-07-26 飞天诚信科技股份有限公司 一种安全导入支付终端密钥的方法、支付终端及系统
CN110061848B (zh) * 2019-04-17 2021-09-14 飞天诚信科技股份有限公司 一种安全导入支付终端密钥的方法、支付终端及系统

Also Published As

Publication number Publication date
CN103714640A (zh) 2014-04-09
CN103714637B (zh) 2016-03-16
CN103714641A (zh) 2014-04-09
CN103716155A (zh) 2014-04-09
CN103729944B (zh) 2015-09-30
CN103716155B (zh) 2016-08-17
CN103746800A (zh) 2014-04-23
WO2014139408A1 (zh) 2014-09-18
CN103731260A (zh) 2014-04-16
CN103714638A (zh) 2014-04-09
CN103714639B (zh) 2016-05-04
CN103716320A (zh) 2014-04-09
CN103716321A (zh) 2014-04-09
CN103716321B (zh) 2017-08-29
CN103729942A (zh) 2014-04-16
CN103729945B (zh) 2015-11-18
CN103714638B (zh) 2015-09-30
CN103701610A (zh) 2014-04-02
CN103729941A (zh) 2014-04-16
CN103714641B (zh) 2016-03-30
CN103716167B (zh) 2017-01-11
CN103731260B (zh) 2016-09-28
CN103714637A (zh) 2014-04-09
CN103746800B (zh) 2017-05-03
CN103716167A (zh) 2014-04-09
CN103701609A (zh) 2014-04-02
CN103745351A (zh) 2014-04-23
CN103729941B (zh) 2016-06-15
CN103729945A (zh) 2014-04-16
CN103701609B (zh) 2016-09-28
CN103714634B (zh) 2016-06-15
CN103714633A (zh) 2014-04-09
CN103714636B (zh) 2015-12-02
WO2014139411A1 (zh) 2014-09-18
CN103716153A (zh) 2014-04-09
CN103701812A (zh) 2014-04-02
CN103731259A (zh) 2014-04-16
CN103729943A (zh) 2014-04-16
CN103729940A (zh) 2014-04-16
CN103714634A (zh) 2014-04-09
CN103716154A (zh) 2014-04-09
CN103745351B (zh) 2017-09-29
CN103714640B (zh) 2016-02-03
CN103729943B (zh) 2015-12-30
CN103729940B (zh) 2016-06-15
CN103714633B (zh) 2016-05-04
CN103731259B (zh) 2017-08-01
CN103714636A (zh) 2014-04-09
CN103729944A (zh) 2014-04-16
CN103701610B (zh) 2018-04-17
CN103729942B (zh) 2016-01-13
WO2014139412A1 (zh) 2014-09-18
WO2014139406A1 (zh) 2014-09-18
CN103714635B (zh) 2015-11-11
CN103701812B (zh) 2017-01-25
CN103714635A (zh) 2014-04-09
CN103714639A (zh) 2014-04-09
CN103716154B (zh) 2017-08-01
CN103716153B (zh) 2017-08-01
CN103716320B (zh) 2017-08-01

Similar Documents

Publication Publication Date Title
WO2014139403A1 (zh) 一种终端主密钥tmk安全下载方法及系统
WO2014139342A1 (zh) 密钥下载方法、管理方法、下载管理方法及装置和系统
US11055694B2 (en) Secure remote payment transaction processing
WO2014139344A1 (zh) 密钥下载方法、管理方法、下载管理方法及装置和系统
RU2663476C2 (ru) Защищенная обработка удаленных платежных транзакций, включающая в себя аутентификацию потребителей
WO2014139341A1 (zh) 密钥管理方法及系统
WO2014139343A1 (zh) 密钥下载方法、管理方法、下载管理方法及装置和系统
WO2020235782A1 (ko) 분산 환경에서의 신원 인증 방법
Liu et al. State of the art: Secure mobile payment
US20090222383A1 (en) Secure Financial Reader Architecture
EP2098985A2 (en) Secure financial reader architecture
WO2013182058A1 (zh) 电子认证客户端系统及处理方法、电子认证系统及方法
KR101385429B1 (ko) Nfc를 이용하는 전자 계약의 개인 인증 방법, 이를 수행하기 위한 인증 서버 및 단말기
US20240214186A1 (en) Efficient authentic communication system and method
WO2015081763A1 (zh) 一种虚拟设备的授权使用方法及装置
EP3387599A1 (en) A communication system comprising a local payment kernel
TW201610880A (zh) 線上交易安全元件、電子裝置及其方法
WO2015108307A1 (ko) 사용자 장치를 이용한 본인인증방법, 이를 위한 디지털 시스템, 및 인증 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14764178

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14764178

Country of ref document: EP

Kind code of ref document: A1