WO2018040652A1 - 一种充值系统及其充值方法 - Google Patents

一种充值系统及其充值方法 Download PDF

Info

Publication number
WO2018040652A1
WO2018040652A1 PCT/CN2017/087191 CN2017087191W WO2018040652A1 WO 2018040652 A1 WO2018040652 A1 WO 2018040652A1 CN 2017087191 W CN2017087191 W CN 2017087191W WO 2018040652 A1 WO2018040652 A1 WO 2018040652A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
security control
control module
server
cpu card
Prior art date
Application number
PCT/CN2017/087191
Other languages
English (en)
French (fr)
Inventor
聂明
Original Assignee
中城智慧科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中城智慧科技有限公司 filed Critical 中城智慧科技有限公司
Publication of WO2018040652A1 publication Critical patent/WO2018040652A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/14Handling requests for interconnection or transfer
    • G06F13/20Handling requests for interconnection or transfer for access to input/output bus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • G06Q20/3415Cards acting autonomously as pay-media
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/349Rechargeable cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a charging system and a charging method thereof.
  • bus cards and credit cards are widely used.
  • the existing bus cards have two kinds of carriers, namely M1 cards and CPU cards;
  • the M1 card is readable and writable, and stores the ID number.
  • the M1 card first sends a data to the receiving device, and the device feeds back a confirmation data to the M1 card, and then performs transaction or identity authentication after interaction;
  • the CPU card has an internal operating system, which can store data and has its own ID number.
  • the CPU card first sends a data to the receiving device.
  • the device first performs operations with the encryption chip, and then returns a confirmation data to the CPU card. After the interaction, Then conduct a transaction or identity verification.
  • the first type of card uses only a simple logic algorithm and key in the data interworking process. Others can obtain the algorithm by repeatedly intercepting the data and performing repeated calculations. The key, and the M1 card of the intercepted data is copied by the obtained algorithm and key, so that it can be seen that the M1 card has a large security risk;
  • the key and algorithm do not exist in the card, but in the device, although the setting is better than the M1 card, since the encryption chip exists in the device, the CPU card needs to be dedicated to the dedicated device when recharging. The user needs to recharge at the specified outlet, and the process is quite unchanged.
  • the invention encrypts the data interaction between the original card and the card key system by installing the security control on the terminal and combining the key management device, thereby increasing the security of the data interaction; and providing the user with the use of the security convenient.
  • the present invention provides a recharge system for the above-mentioned problem that the M1 card key is easy to obtain and the CPU card is inconvenient to be recharged.
  • a recharge system includes: a CPU card, a CPU card recharge server, a terminal, and a server,
  • the server includes: a security control module, a security control module storage module, a security control module issuing module, a first data transceiver module, and a key management module;
  • the security control module storage module is configured to store a security control module
  • the security control module is stored in the security control module storage module, configured to encrypt the refill transaction information sent by the CPU card, and send the encrypted CPU card refill transaction information to the server, a security control module, configured to decrypt the encrypted CPU card refill server refill transaction feedback information sent by the server, and send the decrypted CPU card recharge server refill transaction feedback information to the CPU card;
  • the security control module issuing module is respectively connected to the security control module storage module and the terminal, The security control module issuing module is based on the security control module issuing request initiated by the terminal; the security control module issuing module obtains the security control module from the security control module storage module and issues the security control module to the terminal;
  • the first data transceiver module is respectively connected to the security control module and the CPU card recharge server acquired by the terminal, and the security control module acquired by the terminal and the CPU card recharge server are passed through The first data transceiver module performs data interaction;
  • the key management module is connected to the first data transceiver module, the key management module is configured to manage a key, and the key management module sends the security control module acquired by the terminal based on the key.
  • the CPU card refills the transaction information for decryption, and the key management module encrypts the refill transaction feedback information sent by the CPU card refill server based on the key.
  • the security control module includes: a key storage unit, a second data transceiver unit, a first data encryption unit, and a first data decryption unit;
  • the key storage unit is configured to store a key used for data encryption and decryption
  • the second data transceiving unit is respectively connected to the CPU card and the first data transceiving module, and the data exchange between the CPU card and the server is performed by the second data transceiving unit;
  • the first data encryption unit is respectively connected to the second data transceiving unit and the key storage unit, and the first data encryption unit is based on the key pair stored by the key storage unit.
  • the refill transaction information sent by the CPU card is encrypted;
  • the first data decryption unit is respectively connected to the second data transceiving unit and the key storage unit, and the first data decryption unit is based on the key pair server stored by the key storage unit. After the encrypted CPU card is sent, the server recharges the transaction feedback information for decryption.
  • the key management module includes: a key storage unit, a second data encryption unit, and a second data decryption unit;
  • the key storage unit is configured to store a key in all the security control modules issued by the server;
  • the second data encryption unit is respectively connected to the first data transceiver module and the key storage unit, and the second data encryption unit is based on the key stored by the key storage unit to the CPU card.
  • the refill transaction feedback information sent by the recharge server is encrypted;
  • the second data decryption unit is respectively connected to the second data transceiving unit and the key storage unit, and the second data decryption unit sends the key based on the key stored by the key storage unit to the terminal.
  • the CPU card recharges the transaction information for decryption.
  • the key is a key pair, and the key pair includes: a public key and a private key;
  • the public key is used to encrypt data for decrypting encrypted data
  • the private key is used to sign the encrypted data, and is used for checking the signed encrypted data.
  • the present invention also provides a refilling method.
  • a method of recharging including:
  • Step S1 The terminal acquires the security control module.
  • Step S2 Waiting for the CPU card to initiate refill transaction information
  • Step S3 When the CPU card initiates the refill transaction information, the security control module encrypts the refill transaction information initiated by the CPU card, and sends the encrypted recharge transaction information to the server;
  • Step S4 the server decrypts the encrypted CPU card refill transaction information, and sends the decrypted refill transaction information to the CPU card refill server;
  • Step S5 The server receives the refill transaction feedback information of the CPU card refill server
  • Step S6 The server encrypts the refill transaction feedback information, and sends the encrypted refill transaction feedback information to the terminal;
  • Step S7 The terminal decrypts the encrypted refill transaction feedback information, and sends the decrypted refill transaction feedback information to the CPU card;
  • Step S8 Steps S2 to S7 are repeated until the refill transaction is completed.
  • the acquiring, by the terminal, the security control module in the step S1 includes:
  • the terminal sends a module to the security control module to initiate acquisition of the security control module request information
  • the security control module extracts the security control module from the security control module storage module
  • the security control module issues the security control module to the terminal.
  • the encrypting the transaction information by the security control module in the step S3 to the CPU card comprises:
  • the first data encryption unit acquires a key from the key storage unit
  • the first data encryption unit uses the key to encrypt the CPU card to initiate refill transaction information.
  • the decrypting, by the server in step S4, the encrypted CPU card refill transaction information comprises:
  • the second data decryption unit acquires a key corresponding to a key in the security control module in the terminal from a key storage unit;
  • the second data decryption unit decrypts the encrypted CPU card refill transaction information with the key.
  • the encrypting the refill transaction feedback information by the server in the step S6 includes:
  • the second data encryption unit acquires, from the key storage unit, a key corresponding to a key stored in the security control module in the terminal;
  • the second data encryption unit encrypts the CPU card refill transaction information with the key.
  • the decrypting, by the terminal, the encrypted refill transaction feedback information in the step S7 includes:
  • the first data decryption unit acquires a key from the key storage unit
  • the first data decryption unit decrypts the encrypted refill transaction feedback information with the key.
  • the security control module encrypts the CPU card to initiate the refill transaction information in the step S3, and the server encrypts the refill transaction feedback information in the step S6, including:
  • the signed information is used as encrypted information.
  • the server decrypts the encrypted CPU card refill transaction information in the step S4, and the terminal decrypts the encrypted refill transaction feedback information in the step S7, including:
  • the post-test information is decrypted using the public key in the key.
  • the technical effect of improving the security of data encryption in the charging process is obtained by the technical solution of storing the key in the server.
  • the technical solution of installing the security control module on the terminal can improve the simplicity of the recharge method.
  • the technical solution of encrypting and decrypting data between the CPU card and the CPU card refill server by the server in cooperation with the security control module in the terminal obtains the security of increasing data interaction between the CPU card and the CPU card refill server. Sex.
  • the information is encrypted by the public key; the information after the verification is decrypted, and the encrypted information is signed by the private key;
  • the technical solution for checking the information can further improve the security of data interaction between the CPU card and the CPU card refill server.
  • FIG. 1 is a detailed block diagram of a recharge system in the present invention
  • FIG. 2 is a view showing a specific embodiment of a recharge system in the present invention
  • FIG. 3 is a flow chart of a method of recharging in the present invention.
  • the CPU system 100 includes a CPU card 100, a CPU card refill server 200, a terminal 300, and a server 400;
  • the terminal 300 and the server 400 between the CPU card 100 and the CPU card refill server 200 to achieve the object of the invention.
  • the security control module 401 is installed on the terminal 300, and the data encryption information between the CPU card 100 and the CPU card refill server 200 is performed by the security control module 401 in cooperation with the server 400 to ensure data security.
  • the terminal since the security control module 401 is installed in the terminal, the terminal may be a mobile terminal; for example, a mobile phone, a POS machine, or a fixed terminal; for example, a cash register and a card reader, so the user can be anywhere
  • the CPU card is recharged, and there is no need to recharge the server where the CPU card is recharged, which greatly improves the convenience of recharging.
  • the terminal 300 may initially install the security control module 401, or may not initially install the security control module 401.
  • the terminal 300 may initiate a security control module 401 to obtain a request from the security control module issuing module 403 in the server 400.
  • the security control module issuing module 403 obtains the security control module 401 from the security control module storage module 402, and obtains the obtained
  • the security control module 401 is issued to the terminal 300; for example, the security control module 401 is made into an APP software, and the mobile terminal can download the APP software on the server, that is, the security control module 401 is downloaded.
  • the terminal 300 After the terminal 300 obtains the security control module 401, it can wait for the CPU card 100 to initiate the refill transaction information.
  • the terminal 300 drives the CPU card 100 to initiate the refill transaction information.
  • the refill transaction information is encrypted by the key, and the encrypted recharge transaction information is sent to the server 400.
  • the first data transceiver module 404 in the server 400 After receiving the encrypted refill transaction information, the key management module 405 decrypts the encrypted refill transaction information, and transmits the decrypted refill transaction information to the CPU card refill server 200 through the first data transceiving module 404.
  • the CPU card refilling server may recharge the transaction feedback information.
  • the key management module 405 encrypts the refill transaction feedback information and sends the recharging transaction feedback information to the terminal through the first data transceiving module 404.
  • the security control module 401 in 300 sends the encrypted refill transaction feedback information.
  • the security control module 401 decrypts the encrypted refill transaction feedback information, and transmits the decrypted refill transaction feedback information to the CPU card 100. Repeat the above process to complete the entire CPU card refill process.
  • the keys stored in the security control module 401 acquired by the different terminals 300 from the server 400 are different, and these keys are managed by the key management module 405 in the server 400. Because the key management module 405 manages the key, in the process of encryption and decryption, the server can use the key corresponding to the key in the security control module 401 to ensure the completion of data addition and decryption.
  • FIG. 2 shows a recharge system provided by the present invention.
  • the terminal has acquired the security control module 401.
  • the security control module 401 includes: a key storage unit 40101, a second data transceiving unit 40102, a first data encryption unit 40103, and a first Data decryption unit 40104;
  • a key is stored, which is stored in the key storage unit 40101 for encryption and decryption.
  • the first data encryption unit 40103 acquires the key from the key storage unit 40101, and performs encryption operation on the refill transaction information by using the key.
  • the second data transceiving unit 40102 transmits the encrypted refill transaction information to the server 400.
  • the first data decryption unit 40104 obtains the key from the key storage unit 40101, and uses the key pair to encrypt the recharge transaction. The feedback information is decrypted.
  • the second data transceiving unit 40102 transmits the decrypted refill transaction feedback information to the CPU card 100.
  • the key management module 405 includes a key storage unit 40501, a second data encryption unit 40502, and a second data decryption unit 40503.
  • the key storage unit 40501 stores the keys in all the security control modules 401 that have been distributed, and the storage manner is stored in a corresponding manner; for example, the serial number of the security control module 401 and the key are paired and stored.
  • the security control module 401 sends data to the server 400, it will carry information indicating the identity, for example, the serial number, and the second data encryption unit 40502 and the second data decryption unit 40503 will query the corresponding key storage unit 40501 according to the identity information.
  • the key is used to decrypt the encrypted refill transaction information received by the key; and the received refill transaction feedback information is encrypted.
  • FIG. 3 shows a recharge method provided by the present invention.
  • the security control module 401 can be obtained from the server 400 by the terminal 300.
  • the CPU card 100 to initiate recharge transaction information.
  • the security control module 401 When the security control module 401 receives the refill transaction information sent by the CPU card 100, the security control module 401 encrypts the refill transaction information, and the entire encryption process is completed by the first data encryption unit 40103 in conjunction with the key storage unit 40101. Specifically, the first data encryption unit 40103 obtains a key from the key storage unit 40101. In consideration of more secure encryption, we generally use a public key and a private key as keys, and the public key is used for the encryption process. The encrypted data is encrypted; the private key is used to sign the encrypted data. The first data encryption unit 40103 first obtains the public key from the key storage unit 40101, encrypts the refill transaction information by using the public key, and then acquires the private key by the key storage unit 40101, and signs the encrypted refill transaction information. .
  • the server 400 After receiving the encrypted refill transaction information, the server 400 decrypts the encrypted refill transaction information, and the entire decryption process is completed by the second data decryption unit 40503 in conjunction with the key storage unit 40501. Specifically, when the security control module 401 adopts a key pair format, that is, the public key and the private key are used to encrypt the information, the second data decryption unit 40503 first obtains the private key from the key storage unit 40501, and passes the private key. The received encrypted refill transaction information is checked, and only after the verification is passed, the second data decryption unit 40503 can obtain the public key from the key storage unit 40501 again, and after the verification by the public key pair The information is decrypted.
  • a key pair format that is, the public key and the private key are used to encrypt the information
  • the second data decryption unit 40503 first obtains the private key from the key storage unit 40501, and passes the private key.
  • the received encrypted refill transaction information is checked, and only after
  • the server 400 sends the original refill transaction information to the CPU card refill server 200, and the CPU card recharge server feeds back the refill transaction information.
  • the server 400 receives the feedback information and performs encryption processing on the feedback information.
  • the entire encryption process is completed by the second data encryption unit 40502 in conjunction with the key storage unit 40501.
  • the second data encryption unit 40502 first obtains the public key from the key storage unit 40501, encrypts the refill transaction feedback information through the public key, and then obtains the private key from the key storage unit 40501, and passes the private key. Sign the encrypted refill transaction information.
  • the server 400 sends the encrypted refill transaction information to the security control module 401 in the terminal 300, and the security control module 401 decrypts the encrypted refill transaction information.
  • the entire decryption process is combined with the key by the first data decryption unit 40104.
  • the unit 40101 is completed. Specifically, the first data decryption unit 40104 first obtains the private key from the key storage unit 40101, and performs verification on the encrypted refill transaction information with the signature. Only after the verification is passed, the first data is decrypted. The unit 40104 will then obtain the public key from the key storage unit 40101, and decrypt the encrypted refill transaction information after the verification by the public key.
  • the security control module 401 sends the decrypted original refill transaction information to the CPU card 100.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Hardware Design (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明提供了一种充值系统及其充值方法,涉及通信技术领域,该系统中包括:连接于CPU卡和CPU卡充值服务器之间的终端和服务器,所述服务器包括:安全控件模块、安全控件模块存放模块、安全控件模块发放模块、第一数据收发模块以及密钥管理模块,其中,终端获取的安全控件模块实现对充值交易信息的加密和对加密的充值交易回馈信息的解密,服务器实现对加密的充值信息进行解密和对充值交易回馈信息的加密。通过在CPU卡和CPU卡充值服务器之间接入终端和服务器,同时运用安全控件模块配合服务器,以此实现对CPU卡和CPU卡充值服务器之间数据交互加密的技术方案,获得了可以灵活、安全的实现充值功能的技术效果。

Description

一种充值系统及其充值方法 技术领域
本发明涉及通信技术领域,尤其涉及一种充值系统及其充值方法。
背景技术
现如今公交卡,信用卡等都广泛使用,以公交卡为例,现有的公交卡有两种载体,分别是M1卡和CPU卡;
其中,M1卡可读可写,其存储了ID号,工作时M1卡先发送一个数据到接收设备,该设备回馈一个确认数据给M1卡,交互后再进行交易或者身份认证;
CPU卡其内部具有操作系统,可以存储数据,也有属于自己的ID号,工作时CPU卡先发一个数据给接收设备,该设备先与加密芯片进行运算,再回馈一个确认数据给CPU卡,交互后再进行交易或者身份认证。
然而,上述两种卡都具有各自的缺陷,第一种卡在数据互过程中只使用了一个简单的逻辑算法和密钥,他人可以通过多次截获数据,进行反复演算便可获取其算法及密钥,并通过获取的算法和密钥对被截获数据的M1卡进行复制,由此可以看出M1卡存在较大的安全隐患;
第二种卡,其密钥和算法不存在卡中,而在设备里面,该设置虽然优于M1卡,但由于加密芯片存在于设备中,所以CPU卡进行充值时需要专用在专用设备上完成,用户需要在指定网点进行充值,其过程相当不变。
本发明通过在终端安装安全控件,并结合密钥管理设备,对原有的卡与卡的密钥系统之间数据交互进行加密,从而达到即增加数据交互的安全性;又为用户使用提供了便利。
发明内容
针对上述M1卡密钥易获取以及CPU卡充值不便的问题,本发明提供了一种充值系统。
本发明提供的技术方案如下:
一种充值系统,包括:CPU卡、CPU卡充值服务器、终端以及服务器,
所述服务器包括:安全控件模块、安全控件模块存放模块、安全控件模块发放模块、第一数据收发模块以及密钥管理模块;
所述安全控件模块存放模块,用于存放安全控件模块;
所述安全控件模块,存放于所述安全控件模块存放模块中,用于对所述CPU卡发送的充值交易信息进行加密,并将加密后的CPU卡充值交易信息发送至所述服务器,所述安全控件模块,用于对所述服务器发送的加密后的CPU卡充值服务器充值交易回馈信息进行解密,并将解密后的CPU卡充值服务器充值交易回馈信息发送至CPU卡;
所述安全控件模块发放模块,分别与所述安全控件模块存放模块以及所述终端通讯连接, 所述安全控件模块发放模块基于所述终端发起的安全控件模块发放请求;所述安全控件模块发放模块从所述安全控件模块存放模块中获取所述安全控件模块向所述终端发放;
所述第一数据收发模块,分别与所述终端获取的所述安全控件模块以及所述CPU卡充值服务器通讯连接,所述终端获取的所述安全控件模块与所述CPU卡充值服务器之间通过所述第一数据收发模块进行数据交互;
所述密钥管理模块,与第一数据收发模块连接,所述密钥管理模块用于管理密钥,所述密钥管理模块基于所述密钥对所述终端获取的所述安全控件模块发送的CPU卡充值交易信息进行解密,所述密钥管理模块基于所述密钥对CPU卡充值服务器发送的充值交易回馈信息进行加密。
优选地,所述安全控件模块包括:密钥存放单元、第二数据收发单元、第一数据加密单元以及第一数据解密单元;
所述密钥存放单元,用于存放数据加密、解密时使用的密钥;
所述第二数据收发单元,分别与所述CPU卡以及所述第一数据收发模块通讯连接,所述CPU卡与所述服务器之间通过所述第二数据收发单元进行数据交互;
所述第一数据加密单元,分别与所述第二数据收发单元以及所述密钥存放单元通讯连接,所述第一数据加密单元基于所述密钥存放单元存放的所述密钥对所述CPU卡发送的充值交易信息进行加密;
所述第一数据解密单元,分别与所述第二数据收发单元以及所述密钥存放单元通讯连接,所述第一数据解密单元基于所述密钥存放单元存放的所述密钥对述服务器发送的加密后CPU卡充值服务器充值交易回馈信息进行解密。
优选地,所述密钥管理模块包括:密钥存储单元、第二数据加密单元以及第二数据解密单元;
所述密钥存储单元,用于存储所述服务器发放的所有所述安全控件模块中的密钥;
所述第二数据加密单元,分别与所述第一数据收发模块以及所述密钥存储单元通讯连接,所述第二数据加密单元基于所述密钥存储单元存储的密钥对所述CPU卡充值服务器发送的充值交易回馈信息进行加密;
所述第二数据解密单元,分别与所述第二数据收发单元以及所述密钥存储单元通讯连接,所述第二数据解密单元基于所述密钥存储单元存储的密钥对所述终端发送的加密后CPU卡充值交易信息进行解密。
优选地,所述密钥是密钥对,所述密钥对包括:一个公钥以及一个私钥;
所述公钥,用于对数据进行加密,用于为加密数据进行解密;
所述私钥,用于对加密数据进行签名,用于对签名的加密数据进行验签。
针对上述问题,本发明还提供了一种充值方法。
本发明提供的技术方案如下:
一种充值方法,包括:
步骤S1:所述终端获取所述安全控件模块;
步骤S2:等待所述CPU卡发起充值交易信息;
步骤S3:当所述CPU卡发起充值交易信息时,所述安全控件模块对所述CPU卡发起充值交易信息进行加密,并将加密后的充值交易信息发送至所述服务器;
步骤S4:所述服务器将加密后的CPU卡充值交易信息进行解密,并将解密后的充值交易信息发送至所述CPU卡充值服务器;
步骤S5:所述服务器接收CPU卡充值服务器的充值交易回馈信息;
步骤S6:所述服务器对所述充值交易回馈信息进行加密,并将加密后的充值交易回馈信息发送至所述终端;
步骤S7:所述终端对所述加密后的充值交易回馈信息进行解密,并将解密后的充值交易回馈信息发送至所述CPU卡;
步骤S8:重复步骤S2至步骤S7直至充值交易完成。
优选地,所述步骤S1中所述终端获取所述安全控件模块包括:
所述终端向所述安全控件模块发放模块发起获取所述安全控件模块请求信息;
所述安全控件模块从所述安全控件模块存储模块中提取所述安全控件模块;
所述安全控件模块向所述终端发放所述安全控件模块。
优选地,所述步骤S3中所述安全控件模块对所述CPU卡发起充值交易信息进行加密包括:
所述第一数据加密单元从所述密钥存放单元获取密钥;
所述第一数据加密单元用所述密钥对所述CPU卡发起充值交易信息进行加密。
优选地,所述步骤S4中所述服务器将加密后的CPU卡充值交易信息进行解密包括:
所述第二数据解密单元从密钥存储单元中获取与所述终端中的所述安全控件模块中的密钥相对应的密钥;
所述第二数据解密单元用所述密钥对所述加密后的CPU卡充值交易信息进行解密。
优选地,所述步骤S6中所述服务器对所述充值交易回馈信息进行加密包括:
所述第二数据加密单元从密钥存储单元中获取与存放于所述终端中所述安全控件模块中的密钥对应的密钥;
所述第二数据加密单元用所述密钥对所述CPU卡充值交易信息进行加密。
优选地,所述步骤S7中所述终端对所述加密后的充值交易回馈信息进行解密包括:
所述第一数据解密单元从所述密钥存放单元中获取密钥;
所述第一数据解密单元用所述密钥对所述加密后的充值交易回馈信息进行解密。
优选地,所述步骤S3中所述安全控件模块对所述CPU卡发起充值交易信息进行加密以及所述步骤S6中所述服务器对所述充值交易回馈信息进行加密包括:
用所述密钥中的公钥对信息进行加密;
用所述密钥中的私钥对加密后的信息进行签名;
将签名后的信息作为加密信息。
优选地,所述步骤S4中所述服务器将加密后的CPU卡充值交易信息进行解密以及所述步骤S7中所述终端对所述加密后的充值交易回馈信息进行解密包括:
用所述密钥中的私钥对加密信息进行验签;
用所述密钥中的公钥对验签后的信息进行解密。
本发明提供的充值系统及方法,能够带来以下有益效果:
在本发明中,通过将密钥存放在服务器中的技术方案,获得了提高充值过程中数据加密的安全性的技术效果。
在本发明中,将安全控件模块安装于终端的技术方案,可以提高充值方式的简便性。
在本发明中,通过服务器配合终端中安全控件模块对CPU卡与CPU卡充值服务器之间的数据进行加密、解密的技术方案,获得了增加CPU卡与CPU卡充值服务器之间的数据交互的安全性。
在本发明中,通过采用公钥和私钥作为密钥的,通过公钥对信息进行加密;对验签后的信息进行解密,通过私钥对加密后的信息进行签名;对带签名的加密信息进行验签的技术方案,可以进一步提高CPU卡与CPU卡充值服务器之间的数据交互的安全性。
附图说明
下面将以明确易懂的方式,结合附图说明优选实施方式,对上述特性、技术特征、优点及其实现方式予以进一步说明。
图1为本发明中充值系统的具体框图;
图2为本发明中充值系统的一个具体实施例图;
图3为本发明中充值方法的流程图。
附图标号说明:
100——CPU卡;200——CPU卡充值服务器;300——终端;
400——服务器;
401——安全控件模块;40101——密钥存放单元;40102——第二数据收发单元;
40103——第一数据加密单元;40104——第一数据解密单元;
402——安全控件模块存放模块;
403——安全控件模块发放模块;
404——第一数据收发模块;
405——密钥管理模块;40501——密钥存储单元;40502——第二数据加密单元;
40503——第二数据解密单元。
具体实施方式
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对照附图说明本发明的具体实施方式。显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图,并获得其他的实施方式。
如果1所示为本发明提供的一种充值系统,从图中可以看出,在该充值系统中包括CPU卡100、CPU卡充值服务器200、终端300以及服务器400;
在具体实施例中,从整体上来说,我们是在CPU卡100和CPU卡充值服务器200之间增加了终端300和服务器400来实现发明目的。终端300上加装安全控件模块401,通过安全控件模块401配合服务器400对往来CPU卡100和CPU卡充值服务器200之间的数据信息进行数据加密处理,以此保证数据交互的安全性。同时,由于是将安全控件模块401安装于终端,此处终端可以为移动终端;例如:手机、pos机,也可以是固定终端;例如:收银机、读卡器,所以用户可以在任何地方对CPU卡进行充值,不需要去CPU卡充值服务器所在网点进行充值,大大提高了充值的便利性。
终端300可以初装安全控件模块401,也可以不初装安全控件模块401。服务器400中有安全控件模块401,安全控件模块401存储在安全控件模块存储模块402中。终端300可以向服务器400中的安全控件模块发放模块403发起安全控件模块401获取请求,安全控件模块发放模块403收到请求后从安全控件模块存储模块402中获取安全控件模块401,并将获取的安全控件模块401发放至终端300;例如:将安全控件模块401制作成APP软件,手机终端可以在服务器上下载该APP软件,即下载了安全控件模块401。终端300获取安全控件模块401后,就可以等待CPU卡100发起充值交易信息。我们一般采用NFC近场通信技术获取CPU卡100的充值交易信息,当CPU卡100靠近终端300时,由终端300来驱动CPU卡100发起充值交易信息。
当终端300中的安全控件模块401接收到充值交易信息后,会通过密钥对充值交易信息进行加密,并将加密后的充值交易信息发到服务器400。服务器400中第一数据收发模块404 收到加密后的充值交易信息后,密钥管理模块405会对加密后的充值交易信息进行解密,并通过第一数据收发模块404向CPU卡充值服务器200发送解密后的充值交易信息。CPU卡充值服务器会有充值交易回馈信息,第一数据收发模块404收到充值交易回馈信息后,密钥管理模块405会对充值交易回馈信息进行加密处理,并通过第一数据收发模块404向终端300中的安全控件模块401发送加密后的充值交易回馈信息。安全控件模块401对加密后的充值交易回馈信息进行解密,并将解密后的充值交易回馈信息发送至CPU卡100。重复上述过程,以此完成整个CPU卡充值过程。
不同终端300从服务器400获取的安全控件模块401中存放的密钥都不同,这些密钥由服务器400中密钥管理模块405进行管理。由于密钥管理模块405对密钥的管理,在加密、解密过程中,服务器可以使用与安全控件模块401中密钥向对应的密钥,保证数据加、解密的完成。
如图2所示为本发明提供的一种充值系统。从图中可以看出,终端已经获取安全控件模块401,在图1的基础上,安全控件模块401包括:密钥存放单元40101、第二数据收发单元40102、第一数据加密单元40103以及第一数据解密单元40104;
安全控件模块401从服务器400获取后会存有一个密钥,该密钥存放在密钥存放单元40101供加密、解密时使用。当第二数据收发单元40102收到CPU卡100发送的充值交易信息时,第一数据加密单元40103会从密钥存放单元40101中获取密钥,并运用密钥对充值交易信息进行加密运算。第二数据收发单元40102会将加密后的充值交易信息发送至服务器400。当第二数据收发单元40102收到服务器400发送来的加密后充值交易回馈信息时,第一数据解密单元40104会从密钥存放单元40101中获取密钥,并运用密钥对加密后的充值交易回馈信息进行解密运算。第二数据收发单元40102会将解密后的充值交易回馈信息发送至CPU卡100。
同时在图1的基础上,密钥管理模块405包括:密钥存储单元40501、第二数据加密单元40502以及第二数据解密单元40503。
密钥存储单元40501存放着已经发放出去的所有安全控件模块401中的密钥,存储方式采用对应方式进行存储;例如:以安全控件模块401的序号与密钥进行配对存储。安全控件模块401向服务器400发送数据时会带有表示身份的信息,例如:序号,第二数据加密单元40502以及第二数据解密单元40503会根据这个身份信息在密钥存储单元40501中查询对应的密钥,并通过密钥对接收到的加密充值交易信息进行解密;对接收到的充值交易回馈信息进行加密。
如图3所示为本发明提供的一种充值方法。
用户预使用本发明时,可以用终端300从服务器400上获取安全控件模块401。CPU卡100发起充值交易信息的方法有很多,我们一般采用NFC近场通信的方式,当CPU卡100 靠近终端300时,终端300会驱动CPU卡100发起充值交易请求。
当安全控件模块401收到CPU卡100发送的充值交易信息时,安全控件模块401会对充值交易信息进行加密,整个加密过程由第一数据加密单元40103结合密钥存放单元40101完成。具体的,第一数据加密单元40103从密钥存放单元40101中获取密钥,考虑到更安全的加密,我们一般采用公钥和私钥作为密钥,在加密过程中公钥是用来给需要加密的数据进行加密的;私钥是用来对加密后的数据进行签名的。第一数据加密单元40103先从密钥存放单元40101中获取公钥,运用公钥对充值交易信息进行加密,然后再冲密钥存放单元40101中获取私钥,对加密后的充值交易信息进行签名。
服务器400在收到加密后的充值交易信息后,会对加密后的充值交易信息进行解密,整个解密过程由第二数据解密单元40503结合密钥存储单元40501完成。具体的,当安全控件模块401采用密钥对形式,即采用公钥和私钥对信息进行加密时,第二数据解密单元40503会先从密钥存储单元40501中获取私钥,并通过私钥对接收到的加密后的充值交易信息进行验签,只有当验签通过后,第二数据解密单元40503才会再从密钥存储单元40501中获取公钥,并通过公钥对验签后的信息进行解密。
解密完成之后服务器400会将原始的充值交易信息发送至CPU卡充值服务器200,CPU卡充值服务器会对充值交易信息进行回馈。
服务器400会接收回馈信息,并对回馈信息进行加密处理,整个加密过程由第二数据加密单元40502结合密钥存储单元40501完成。具体来说,第二数据加密单元40502先从密钥存储单元40501中获取公钥,并通过公钥对充值交易回馈信息进行加密,再从密钥存储单元40501中获取私钥,并通过私钥对加密后的充值交易信息进行签名。
服务器400会将加密后的充值交易信息发送给终端300中的安全控件模块401,安全控件模块401会对加密后的充值交易信息进行解密,整个解密过程由第一数据解密单元40104结合密钥存放单元40101完成,具体来说,第一数据解密单元40104会先从密钥存放单元40101中获取私钥,对具有签名的加密充值交易信息进行验签,只有当验签通过后,第一数据解密单元40104才会再从密钥存放单元40101中获取公钥,并通过公钥对验签后的加密充值交易信息进行解密。
安全控件模块401会将解密后的原始充值交易信息发给CPU卡100。
一个完整的充值交易过程中,CPU卡和CPU卡充值服务器之间可能存在多次数据交互,所有数据交互过程都进行如上的加密解密过程,直至整个充值交易完成。
应当说明的是,上述实施例均可根据需要自由组合。以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。

Claims (12)

  1. 一种充值系统,包括:CPU卡、CPU卡充值服务器以及终端,其特征在于,还包括:服务器;
    所述服务器包括:安全控件模块、安全控件模块存放模块、安全控件模块发放模块、第一数据收发模块以及密钥管理模块;
    所述安全控件模块存放模块,用于存放安全控件模块;
    所述安全控件模块,存放于所述安全控件模块存放模块中,用于对所述CPU卡发送的充值交易信息进行加密,并将加密后的CPU卡充值交易信息发送至所述服务器,所述安全控件模块,用于对所述服务器发送的加密后的CPU卡充值服务器充值交易回馈信息进行解密,并将解密后的CPU卡充值服务器充值交易回馈信息发送至CPU卡;
    所述安全控件模块发放模块,分别与所述安全控件模块存放模块以及所述终端通讯连接,所述安全控件模块发放模块基于所述终端发起的安全控件模块发放请求;所述安全控件模块发放模块从所述安全控件模块存放模块中获取所述安全控件模块向所述终端发放;
    所述第一数据收发模块,分别与所述终端获取的所述安全控件模块以及所述CPU卡充值服务器通讯连接,所述终端获取的所述安全控件模块与所述CPU卡充值服务器之间通过所述第一数据收发模块进行数据交互;
    所述密钥管理模块,与第一数据收发模块连接,所述密钥管理模块用于管理密钥,所述密钥管理模块基于所述密钥对所述终端获取的所述安全控件模块发送的CPU卡充值交易信息进行解密,所述密钥管理模块基于所述密钥对CPU卡充值服务器发送的充值交易回馈信息进行加密。
  2. 如权利要求1所述的充值系统,其特征在于,所述安全控件模块包括:密钥存放单元、第二数据收发单元、第一数据加密单元以及第一数据解密单元;
    所述密钥存放单元,用于存放数据加密、解密时使用的密钥;
    所述第二数据收发单元,分别与所述CPU卡以及所述第一数据收发模块通讯连接,所述CPU卡与所述服务器之间通过所述第二数据收发单元进行数据交互;
    所述第一数据加密单元,分别与所述第二数据收发单元以及所述密钥存放单元通讯连接,所述第一数据加密单元基于所述密钥存放单元存放的所述密钥对所述CPU卡发送的充值交易信息进行加密;
    所述第一数据解密单元,分别与所述第二数据收发单元以及所述密钥存放单元通讯连接,所述第一数据解密单元基于所述密钥存放单元存放的所述密钥对所述服务器发送的加密后CPU卡充值服务器充值交易回馈信息进行解密。
  3. 如权利要求2中所述的充值系统,其特征在于,所述密钥管理模块包括:密钥存储单 元、第二数据加密单元以及第二数据解密单元;
    所述密钥存储单元,用于存储所述服务器发放的所有所述安全控件模块中的密钥;
    所述第二数据加密单元,分别与所述第一数据收发模块以及所述密钥存储单元通讯连接,所述第二数据加密单元基于所述密钥存储单元存储的密钥对所述CPU卡充值服务器发送的充值交易回馈信息进行加密;
    所述第二数据解密单元,分别与所述第二数据收发单元以及所述密钥存储单元通讯连接,所述第二数据解密单元基于所述密钥存储单元存储的密钥对所述终端发送的加密后CPU卡充值交易信息进行解密。
  4. 如权利要求3所述的充值系统,其特征在于,所述密钥包括:一个公钥以及一个私钥;
    所述公钥,用于对数据进行加密,用于为加密数据进行解密;
    所述私钥,用于对加密数据进行签名,用于对签名的加密数据进行验签。
  5. 一种充值方法,其特征在于,所述充值方法运用于权利要求3-4任意一项所述的充值系统,包括:
    步骤S1:所述终端获取所述安全控件模块;
    步骤S2:等待所述CPU卡发起充值交易信息;
    步骤S3:当所述CPU卡发起充值交易信息时,所述安全控件模块对所述CPU卡发起充值交易信息进行加密,并将加密后的充值交易信息发送至所述服务器;
    步骤S4:所述服务器将加密后的CPU卡充值交易信息进行解密,并将解密后的充值交易信息发送至所述CPU卡充值服务器;
    步骤S5:所述服务器接收CPU卡充值服务器的充值交易回馈信息;
    步骤S6:所述服务器对所述充值交易回馈信息进行加密,并将加密后的充值交易回馈信息发送至所述终端;
    步骤S7:所述终端对所述加密后的充值交易回馈信息进行解密,并将解密后的充值交易回馈信息发送至所述CPU卡;
    步骤S8:重复步骤S2至步骤S7直至充值交易完成。
  6. 如权利要求5所述的充值方法,其特征在于,所述步骤S1中所述终端获取所述安全控件模块包括:
    所述终端向所述安全控件模块发放模块发起获取所述安全控件模块请求信息;
    所述安全控件模块从所述安全控件模块存储模块中提取所述安全控件模块;
    所述安全控件模块向所述终端发放所述安全控件模块。
  7. 如权利要求5所述的充值方法,其特征在于,所述步骤S3中所述安全控件模块对所 述CPU卡发起充值交易信息进行加密包括:
    所述第一数据加密单元从所述密钥存放单元获取密钥;
    所述第一数据加密单元用所述密钥对所述CPU卡发起充值交易信息进行加密。
  8. 如权利要求5所述的充值方法,其特征在于,所述步骤S4中所述服务器将加密后的CPU卡充值交易信息进行解密包括:
    所述第二数据解密单元从密钥存储单元中获取与所述终端中的所述安全控件模块中的密钥相对应的密钥;
    所述第二数据解密单元用所述密钥对所述加密后的CPU卡充值交易信息进行解密。
  9. 如权利要求5所述的充值方法,其特征在于,所述步骤S6中所述服务器对所述充值交易回馈信息进行加密包括:
    所述第二数据加密单元从密钥存储单元中获取与存放于所述终端中所述安全控件模块中的密钥对应的密钥;
    所述第二数据加密单元用所述密钥对所述CPU卡充值交易信息进行加密。
  10. 如权利要求5所述的充值方法,其特征在于,所述步骤S7中所述终端对所述加密后的充值交易回馈信息进行解密包括:
    所述第一数据解密单元从所述密钥存放单元中获取密钥;
    所述第一数据解密单元用所述密钥对所述加密后的充值交易回馈信息进行解密。
  11. 如权利要求5-10中任一所述的充值方法,其特征在于,所述步骤S3中所述安全控件模块对所述CPU卡发起充值交易信息进行加密以及所述步骤S6中所述服务器对所述充值交易回馈信息进行加密包括:
    用所述密钥中的公钥对信息进行加密;
    用所述密钥中的私钥对加密后的信息进行签名;
    将签名后的信息作为加密信息。
  12. 如权利要求11所述的充值方法,其特征在于,所述步骤S4中所述服务器将加密后的CPU卡充值交易信息进行解密以及所述步骤S7中所述终端对所述加密后的充值交易回馈信息进行解密包括:
    用所述密钥中的私钥对加密信息进行验签;
    用所述密钥中的公钥对验签后的信息进行解密。
PCT/CN2017/087191 2016-08-31 2017-06-05 一种充值系统及其充值方法 WO2018040652A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610782732.X 2016-08-31
CN201610782732.XA CN106375090B (zh) 2016-08-31 2016-08-31 一种充值系统及其充值方法

Publications (1)

Publication Number Publication Date
WO2018040652A1 true WO2018040652A1 (zh) 2018-03-08

Family

ID=57899231

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/087191 WO2018040652A1 (zh) 2016-08-31 2017-06-05 一种充值系统及其充值方法

Country Status (2)

Country Link
CN (1) CN106375090B (zh)
WO (1) WO2018040652A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375090B (zh) * 2016-08-31 2019-08-13 中城智慧科技有限公司 一种充值系统及其充值方法
CN108681466B (zh) * 2018-03-27 2023-11-07 广东岭南通股份有限公司 一种基于格式化分组指令的cpu卡控制方法、电子设备及存储介质
CN110766399B (zh) * 2019-10-23 2023-03-24 广东岭南通股份有限公司 一种一卡通聚合充值方法、装置及系统
CN111127000B (zh) * 2019-12-10 2023-04-25 中国联合网络通信集团有限公司 充值卡信息加密方法、装置、终端设备和充值平台

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100049658A1 (en) * 2008-08-22 2010-02-25 Javier Sanchez Secure electronic transaction system
CN102123027A (zh) * 2011-03-15 2011-07-13 钱袋网(北京)信息技术有限公司 信息安全处理方法和移动终端
CN103152174A (zh) * 2013-01-28 2013-06-12 深圳市捷顺科技实业股份有限公司 应用于停车场的数据处理方法、装置及停车场管理系统
CN104574653A (zh) * 2014-11-13 2015-04-29 深圳市金溢科技股份有限公司 基于车载单元实现电子钱包ic卡在线充值的方法及系统
CN104881781A (zh) * 2015-05-11 2015-09-02 福建联迪商用设备有限公司 一种基于安全交易的方法、系统及客户端
CN106375090A (zh) * 2016-08-31 2017-02-01 中城智慧科技有限公司 一种充值系统及其充值方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100049658A1 (en) * 2008-08-22 2010-02-25 Javier Sanchez Secure electronic transaction system
CN102123027A (zh) * 2011-03-15 2011-07-13 钱袋网(北京)信息技术有限公司 信息安全处理方法和移动终端
CN103152174A (zh) * 2013-01-28 2013-06-12 深圳市捷顺科技实业股份有限公司 应用于停车场的数据处理方法、装置及停车场管理系统
CN104574653A (zh) * 2014-11-13 2015-04-29 深圳市金溢科技股份有限公司 基于车载单元实现电子钱包ic卡在线充值的方法及系统
CN104881781A (zh) * 2015-05-11 2015-09-02 福建联迪商用设备有限公司 一种基于安全交易的方法、系统及客户端
CN106375090A (zh) * 2016-08-31 2017-02-01 中城智慧科技有限公司 一种充值系统及其充值方法

Also Published As

Publication number Publication date
CN106375090A (zh) 2017-02-01
CN106375090B (zh) 2019-08-13

Similar Documents

Publication Publication Date Title
US20210406882A1 (en) Systems and methods for secure communication
US11562354B2 (en) Terminal configuration server for the remote configuration of terminals
CA2931024C (en) Systems and methods for convenient and secure mobile transactions
CN102315942B (zh) 一种带蓝牙的安全终端及其与客户端的通信方法
WO2017054436A1 (zh) 一种动态加密方法、终端、服务器
US11151571B2 (en) Method and system for processing resource exchange information
EP3029880B1 (en) Method and system for safely transmitting transaction sensitive data based on cloud pos
WO2018090763A1 (zh) 一种终端主密钥的设置方法和装置
WO2018040652A1 (zh) 一种充值系统及其充值方法
CN103595718A (zh) 一种pos终端激活方法、系统、服务平台及pos终端
US20180247313A1 (en) Fingerprint security element (se) module and payment verification method
WO2019001061A1 (zh) 支付验证的方法、系统及移动设备和安全认证设备
WO2012072001A1 (zh) 一种安全发卡方法、发卡设备和系统
CN104851206A (zh) 一种基于usbkey的电费在线支付系统
CN108924822B (zh) 一种基于可信环境的有卡安全通信方法及移动终端
US9270649B1 (en) Secure software authenticator data transfer between processing devices
US20210014052A1 (en) Method and terminal for establishing security infrastructure and device
KR20160137082A (ko) 암호키 배포 방법, 그를 이용한 카드리더 모듈 및 암호키 배포 시스템
JP2014135558A (ja) 情報移譲システム、情報移譲方法、情報移譲プログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17844959

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17844959

Country of ref document: EP

Kind code of ref document: A1