WO2018120938A1 - Procédé de transmission de clé hors ligne, terminal et support de stockage - Google Patents

Procédé de transmission de clé hors ligne, terminal et support de stockage Download PDF

Info

Publication number
WO2018120938A1
WO2018120938A1 PCT/CN2017/102972 CN2017102972W WO2018120938A1 WO 2018120938 A1 WO2018120938 A1 WO 2018120938A1 CN 2017102972 W CN2017102972 W CN 2017102972W WO 2018120938 A1 WO2018120938 A1 WO 2018120938A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
downloading
sales terminal
terminal
receiving
Prior art date
Application number
PCT/CN2017/102972
Other languages
English (en)
Chinese (zh)
Inventor
张欢
周琦杰
Original Assignee
百富计算机技术(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 百富计算机技术(深圳)有限公司 filed Critical 百富计算机技术(深圳)有限公司
Publication of WO2018120938A1 publication Critical patent/WO2018120938A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Definitions

  • the present application relates to the field of computer technologies, and in particular, to a key offline transmission method, a terminal, and a storage medium.
  • POS terminal point of sales point As the front-end hardware device of the financial payment system has also developed rapidly.
  • POS terminals using various new technologies have emerged rapidly, such as Bluetooth POS terminals.
  • POS terminals need to encrypt transaction sensitive information because they involve personal account and property security.
  • the sales terminal for downloading the key is limited by the network environment, and when it is only accessible to the transaction network and cannot access other networks, the key transmission cannot be performed with the sales terminal for providing the key.
  • a key offline transmission method a terminal, and a storage medium are provided.
  • a key offline transmission method includes:
  • a terminal comprising a memory and a processor, the memory storing computer readable instructions, the computer readable instructions being executed by the processor such that the processor performs the following steps:
  • One or more computer readable non-volatile storage media storing computer readable instructions, when executed by one or more processors, cause the one or more processors to perform the steps of:
  • 1 is an application environment diagram of a key offline transmission method in an embodiment
  • FIG. 2 is a schematic structural diagram of a terminal in an embodiment
  • FIG. 3 is a schematic flowchart of a method for offline transmission of a key in an embodiment
  • FIG. 4 is a schematic flowchart of a step of generating a to-be-downloaded key in an embodiment
  • FIG. 5 is a schematic flowchart of a step of obtaining a second key according to a basic key and a key sequence number in an embodiment
  • FIG. 6 is a timing diagram of a method for offline transmission of a key in an embodiment
  • FIG. 7 is a structural block diagram of a terminal in an embodiment
  • FIG. 8 is a structural block diagram of a terminal in another embodiment.
  • FIG. 1 is an application environment diagram of a key offline transmission method in an embodiment.
  • the key offline transmission method is applied to a key offline download system.
  • the key offline download system includes a sales terminal 110 for providing a key and a sales terminal 120 for downloading a key, and the sales terminal 110 for providing a key is established through the data transmission interface with the sales terminal 120 for downloading the key.
  • Serial communication connection The sales terminal 110 for providing a key is used to generate and manage a key, and may be a POS terminal or the like for providing a key.
  • the sales terminal 120 for downloading a key is used to acquire a key generated by the sales terminal 110 for providing a key, and may be a POS terminal or the like for receiving a key.
  • FIG. 2 is a schematic diagram showing the internal structure of a terminal in an embodiment.
  • the terminal can be as shown in FIG.
  • the terminal for providing a key includes a processor connected through a system bus, a nonvolatile storage medium, an internal memory, a serial interface, a display screen, and an input device.
  • the non-volatile storage medium of the terminal stores an operating system and a database.
  • the processor is used to provide computing and control capabilities to support the operation of the entire terminal.
  • Computer readable instructions may be stored in the internal memory in the terminal, and when the computer readable instructions are executed by the processor, the processor may be caused to perform a key offline transmission method.
  • the serial interface is used for serial communication with the sales terminal for downloading the key, such as sending the to-be-downloaded key to the sales terminal for downloading the key, receiving the confirmation message returned by the sales terminal for downloading the key, and the like.
  • the display screen can be a liquid crystal display or an electronic ink display screen
  • the input device can be a touch layer covered on the display screen, or a button, a trackball or a touchpad provided on the terminal housing, or an external keyboard. Touchpad or mouse. It will be understood by those skilled in the art that the structure shown in FIG. 2 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the terminal to which the solution of the present application is applied.
  • the specific terminal may include a ratio. More or fewer components are shown in the figures, or some components are combined, or have different component arrangements.
  • a key offline transmission method is provided. This embodiment is applied to the sales terminal 110 for providing a key in FIG. 1 as an example.
  • the method specifically includes the following steps:
  • the data transmission port refers to a physical interface for transmitting data.
  • the serial port is a serial interface, also known as a serial communication interface or a serial communication interface (usually referred to as a COM interface (Cluster Communication Port)), and is an expansion interface using serial communication.
  • a serial communication connection is a communication connection established between two hardware devices through a physical dedicated line to connect to a physical interface.
  • the data transmission port of the sales terminal for providing the key may be connected to the data transmission port of the sales terminal for downloading the key through the physical line, at the sales terminal for providing the key, and for downloading the key.
  • a serial port-based communication connection is established between the sales terminals so that data exchange is performed between the sales terminal for providing the key and the sales terminal for downloading the key through the serial communication connection.
  • S304 Receive a transmission key sent by a sales terminal for downloading a key through a serial communication connection.
  • the transport key refers to a key used to encrypt the transmitted data.
  • the transport key can be either a symmetric key or an asymmetric key.
  • a symmetric key is the same key used by both parties to the data transmission.
  • the asymmetric key includes two keys: a public key (public key) and a private key (private key). In the data transmission, two keys are needed to perform encryption and decryption respectively.
  • step S304 includes receiving a public key sent by the sales terminal for downloading the key; the public key is generated by the sales terminal for downloading the key according to a built-in key generation algorithm. Specifically, the sales terminal for downloading the key may generate a key pair of the public key and the private key according to an RSA algorithm. After the key pair is generated, the generated key pair is verified. The sales terminal for downloading the key can verify the correctness of the key pair by encrypting and decrypting a random number.
  • the generation of the random number is randomly generated by a random function (random) in the C language standard library, and the random number is encrypted by using the public key, and then the random number is decrypted by the private key, if the decrypted result and the generated result are generated If the random numbers are the same, it is determined that the generated key pair is correct.
  • the sales terminal for downloading the key After determining that the generated key pair is correct, the sales terminal for downloading the key encapsulates the public key as a transmission key into the key request data packet, and then adds a header, a trailer, and a check code to the key request packet.
  • the added key request packet is sent to the sales terminal for providing the key through the established serial port-based communication connection.
  • the check code is a check code that is set in advance for performing packet verification.
  • the sales terminal for downloading the key and/or the sales terminal for providing the key identifies the type of the transmitted data packet by the check code.
  • the sales terminal for downloading the key may generate a transport key according to a DES algorithm (Data Encryption Standard), encapsulate the transport key into a key request packet, and request data for the key.
  • the packet adds a header, a trailer, and a checksum, and the added key request packet is sent to the sales terminal for providing the key through the established serial-based communication connection.
  • the sales terminal for providing the key parses the received key request data packet, and extracts the key. Find the checksum included in the packet. If the check code indicates that the data packet is a key request data packet encapsulating a transport key, extracting the encapsulated transport key from the key request data packet; if the check code indicates the key request data packet If the data packet is not requested for the key encapsulating the transport key, the key request packet is discarded.
  • the sales terminal for providing the key encrypts the to-be-downloaded key by using the obtained transport key, and loads the encrypted key to be downloaded into the key response data packet, and then
  • the key response packet adds a header, a trailer, and a check code, and sends the added key response packet to the sales terminal for downloading the key through the established serial-based communication connection.
  • the sales terminal for downloading the key parses the received key response data packet, and extracts the key response data packet.
  • Check code included If the check code indicates that the data packet is a key response data packet encapsulating the to-be-downloaded key, decrypt the key response data packet by using the transport key, and extract the encapsulated key to be downloaded; The code indicates that the key request packet is not a key reply packet encapsulating the transport key, and the key response packet is discarded.
  • the transport key used for decryption is identical to the key sent by the sales terminal for downloading the key to the sales terminal for providing the key.
  • the transport key used for decryption is the private key corresponding to the transmitted public key.
  • step S310 includes: receiving a confirmation message fed back by the sales terminal for downloading the key; the confirmation message is generated by the sales terminal for downloading the key according to the built-in key generation algorithm, and the public key The corresponding private key is decrypted with the download key and generated.
  • the encrypted key to be downloaded can be decrypted only by using the private key corresponding to the public key for encrypting the to-be-downloaded key, thereby further ensuring the security of the key transmission.
  • the sales terminal for downloading the key decrypts the key response data packet by the transmission key, extracts the encapsulated to-be-downloaded key, and stores the extracted key to the secure storage area of the sales terminal for downloading the key.
  • the safe storage area refers to the PCIDSS (Payment Card Industry) Data Security Standard Payment Card Industry Data Security Standard) PINPAD (Personal Identification Number Personal Digital Assistant Personal Key Assistant) key storage area. Security of key storage is guaranteed by the PCI authentication key storage area.
  • the sales terminal for downloading the key After storing the extracted key, the sales terminal for downloading the key transmits confirmation information to the sales terminal for providing the key through the established serial communication connection to notify the completion of the download of the sales terminal key for providing the key.
  • the confirmation message is a data string configured in advance by the sales terminal for providing the key and the sales terminal for downloading the key based on the serial communication protocol.
  • the data string is configured at the time of configuration to characterize the completion of the sales terminal download key for downloading the key.
  • the sales terminal for providing the key and the sales terminal for downloading the key may agree in advance as the data string " ⁇ x02 ⁇ x30 ⁇ x30 ⁇ x34 ⁇ x32 ⁇ x31 ⁇ x30 ⁇ x30 ⁇ x03" as the confirmation information.
  • the sales terminal for providing the key determines that the sales terminal download key for downloading the key is completed, disconnected and used for downloading the key. Serial communication connection between sales terminals.
  • the above key offline transmission method establishes a serial communication connection with a sales terminal for downloading a key through a data transmission port, and provides a transmission channel for performing key transmission under offline conditions. Then, the key to be downloaded is encrypted by the transmission key sent by the sales terminal for downloading the key, which ensures the security of the key to be downloaded during transmission.
  • the key to be downloaded in the key offline transmission method includes a first key and a second key that are independent of each other.
  • the key offline transmission method further includes the step of generating a key to be downloaded, which specifically includes the following steps:
  • the administrator refers to the person who performs key management.
  • the administrator can log in to the sales terminal for providing the key by using the administrator account, input the first key component for generating the first key, the second key component for generating the second key, and the administrator account.
  • Key serial number is the Key Set Identifier KSI and the device identification number. (Device Identifier DID) and Transaction Counter TC are combined.
  • the key identification number is used to uniquely identify a key
  • the device identification number is used to uniquely identify a sales terminal for downloading a key
  • the transaction count identifier is used to uniquely identify a transaction.
  • the key identification number, the device identification number, and the transaction count identifier may each be a character string including at least one of a number, a letter, and a symbol.
  • the DID is pre-agreed as five bytes and is specifically 00002.
  • the KSI is specifically pre-agreed as eight bytes FFFFF03001. Since the transaction is not performed during the key generation phase, the transaction count flag is 0, then the KSN is FFFFF03001000020.
  • the sales terminal for providing the key may provide an interface for inputting characters only through an administrator account, and after detecting an operation acting on the character input interface, acquiring an input for generating the first key.
  • the first key is a key for encrypting data.
  • the preset logical operation mode refers to a preset calculation method for calculating the first key component to obtain the first key, such as an exclusive OR operation.
  • the first key is a TMK (Terminal Master Key).
  • the first key component is two 16-byte character strings
  • the administrator can input the verification for the first key component after logging in to the sales terminal for providing the key by the administrator account.
  • the KCV (Key Check Value) check code of the first key component After the first key component is verified by the KCV (Key Check Value) check code, the obtained first key component is calculated according to a preset logical operation manner to obtain the first key.
  • the KCV check code is a partial ciphertext data obtained by encrypting specified data using a key component.
  • the administrator uses the first 4 bytes of data encrypted by 8 key components of 0x00 as KCV.
  • the sales terminal for downloading the key receives the key component, it encrypts 8 0x00 encryption keys using the key component.
  • the first 4 bytes of the encryption result are compared with the KCV. If they match, the key component is correct. If it is inconsistent, it indicates that the key component is wrong.
  • first key component M1 AB AB AB CD CD CD CD EF EF EF 12 34 56 78
  • first key component M1 KCV check code M1_KCV: 88 6D 67 5A
  • first key component M2 12 34 56 78
  • KCV check code of the first key component M2 M2_KCV : 19 85 BB 83
  • the KCV verifies that each key component is successful, the first key is generated, and the first key is an exclusive OR operation M1 Xor M2 on the two first key components, and the first key is B9.
  • the second key component includes an LMK key component for generating an LMK (Local Master Key), a ZMK key component for generating a ZMK (Zone Master Key), and a BDK for generating a BDK.
  • the LMK key component, the ZMK key component, and the BDK key component are mutually independent and distinct key components.
  • the sales terminal for providing the key can be LMK.
  • the sales terminal for providing the key may first use the KCV check code to check the key component. After the verification is successful, any two of the key components are XORed, and the obtained result is XORed with the third key component to obtain the LMK and stored in the sales terminal for providing the key. Secure storage area.
  • the safe house environment refers to a security zone that is authenticated by PCI or a security zone that is in real-time monitoring state. Since the LMK key component is separately input into the plaintext component by the administrator account, it is necessary to input in the safe room environment to ensure that the key component displayed in the plaintext is not leaked.
  • the LMK can be used to encrypt and decrypt the key components used to generate the subsequent keys.
  • the sales terminal for providing the key can continue to generate the ZMK in the same key generation manner and deposit it into the secure storage area of the sales terminal for providing the key. Specifically, the sales terminal for providing the key obtains three administrators to input the LMK encrypted by the administrator account respectively.
  • the ZMK key component is used, the previously acquired ZMK key component is stored in the secure storage area, and then after the acquisition of the three ZMK key components is completed by the sales terminal for providing the key, the three encrypted ZMKs are used by the LMK.
  • the key component is 3DES decrypted to generate ZMK.
  • the ZMK key component has been previously subjected to 3DES (Triple Data Encryption Standard triple data encryption algorithm) using LMK. ZMK can be used to encrypt and decrypt key components used to generate subsequent keys.
  • the sales terminal for providing the key can continue to generate the BDK in the same key generation manner and deposit it into the secure storage area of the sales terminal for providing the key.
  • the sales terminal for providing the key stores the BDK key component acquired in advance to the secure storage area when the three administrators respectively input the BDK key component encrypted by the LMK or the ZMK through the administrator account. Then, after obtaining the three BDK key components after the sales terminal for providing the key completes, the three encrypted BDK key components are decrypted by 3DES using LMK or ZMK to generate the BDK.
  • the BDK key component has been previously subjected to 3DES (Triple Data Encryption Standard triple data encryption algorithm) using LMK or ZMK.
  • the BDK generated by the sales terminal for providing the key is the base key.
  • the second key is also a key for encrypting data, and is a key different from and independent of the first key.
  • the first key and the second key encrypt the data in different ways.
  • the second key is IPEK (Initial PIN Encrypting Key).
  • the to-be-downloaded key includes a first key and a second key that are independent of each other, the first key is generated by the first key component, and the second key is composed of the second key component and the key sequence.
  • the number is the same, and multiple keys are used to ensure the security of data transmission.
  • the generated second key is related to the key sequence number, and the different key sequence numbers generate different second keys, thereby avoiding the problem that the keys are completely identical and the risk of key leakage is high.
  • step S408 specifically includes the following steps:
  • S502 Encrypt the base key and the key sequence number according to the built-in key encryption method to obtain the first part of the second key.
  • the sales terminal for providing the key may use the 3DES encryption algorithm to the base key
  • the BDK encrypts with the key sequence number KSN to obtain the first part of the second key.
  • the first part of the second key may be the left half of the IPEK.
  • the sales terminal for providing the key may configure a character string for converting the base key in advance.
  • the sales terminal for providing the key may perform a XOR operation on the pre-configured string for converting the base key with the base key to obtain the converted base key.
  • S506 Encrypt the converted base key and the key sequence number according to the built-in key encryption method to obtain the second part of the second key.
  • the sales terminal for providing the key may encrypt the converted base key BDK and the key sequence number KSN by using a 3DES encryption algorithm to obtain a second part of the second key.
  • the second part of the second key can be the right half of the IPEK.
  • the second key for performing the first key encryption is generated by the multi-step key generation step, which further ensures the security of the key.
  • the process of generating an IPEK by a sales terminal for providing a key is as follows:
  • the LMK key component L1 acquired by the sales terminal for providing the key is 11 11 11 11 11 11 11 11 11 11 11 11 11 11, and the KCV check code L1_KCV of the LMK key component L1 is 82 E1 36 65,
  • the LMK key component L2 is 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22,
  • the KCV check code L2_KCV of the LMK key component L2 is 00 96 2B 60
  • the LMK key component L3 is 21 07 65 4B A3 98FE DC CD EF 89 3A B4 56 70
  • KCV check code L3_KCV of LMK key component L3 is 3F 5F 93 61.
  • the medium ZMK key component Z1 acquired by the sales terminal for providing the key is 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44
  • the KCV check code Z1_KCV of the ZMK key component Z1 is E2 F2 43 40
  • ZMK key component Z2 is 55 55 55 55 55 55 55 55 55 55 55 55 55 55 55 55
  • KCV check code Z2_KCV of ZMK key component Z2 is 0C D7 DC 49
  • ZMK key component Z3 is 66 66 66 66 66 66 66 66 66 66 66 66 66 66 66 66 66 66 66 66
  • the check code Z3_KCV is B0 B5 63 C2.
  • the medium BDK key component B1 acquired by the sales terminal for providing the key is 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77 77
  • BK key component B2 KCV check code B2_KCV is F9 F4 FB D3
  • BDK key component B3 is 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99
  • the KCV check code B3_KCV of the BDK key component B3 is 0F 2F CF 4A.
  • the sales terminal for providing the key can also generate the BDK based on the acquired ciphertext.
  • step S302 in the key transmission method specifically includes the step of downloading the key.
  • the sales terminal sends an authentication instruction based on serial communication; receives an authentication message fed back by the sales terminal for downloading the key according to the authentication command; after the authentication message is verified, passes through the data transmission port and the key for downloading the key
  • the sales terminal establishes a serial communication connection.
  • the sales terminal for providing the key and the sales terminal for downloading the key may configure the authentication command and the authentication message based on the serial communication protocol in advance.
  • a string of characters that can be transmitted based on the serial port is used as an authentication command, and another string of characters is configured as an authentication message corresponding to the authentication command.
  • the sales terminal for providing the key may send an authentication instruction based on the serial port communication to the sales terminal for downloading the key, and the sales terminal receiving the key for downloading analyzes the identity verification instruction, and after the analysis is completed, the The authentication message corresponding to the authentication instruction is fed back, and the sales terminal for providing the key performs the parsing and verification after receiving the identity verification message fed back by the sales terminal for downloading the key, and passes the data transmission port after the verification is passed. Establish a serial communication connection with the sales terminal for downloading the key.
  • the sales terminal for providing the key sends 8 bytes " ⁇ x02 ⁇ x30 ⁇ x30 ⁇ x32 ⁇ x31 ⁇ x30 ⁇ x03 ⁇ x30" to the sales terminal for downloading the key for downloading the key.
  • the sales terminal After receiving the data sent by the sales terminal for providing the key and verifying the success, the sales terminal sends 10 bytes of data " ⁇ x02 ⁇ x30 ⁇ x30 ⁇ x34 ⁇ x31 ⁇ x30 ⁇ x30 ⁇ x30 ⁇ x03 ⁇ x36"
  • the sales terminal for providing the key and the sales terminal for downloading the key are based on the serial port communication connection. Successfully started communication.
  • the serial port-based communication connection is established after the identity authentication based on the serial communication protocol is successful with the sales terminal for downloading the key, thereby further ensuring the security of the key download.
  • FIG. 6 is a timing diagram of key offline transmission in an embodiment.
  • the administrator logs in the sales terminal for providing the key through the administrator account, inputs the LMK key component, and the sales terminal for providing the key becomes the LMK according to the LMK key component; the sales terminal for providing the key is further based on the input.
  • the ZMK key component is ZMK; then the BDK is generated according to the input BDK key component or the BDK according to the input BDK ciphertext; the IPEK is generated according to the input KSN and BDK, and the TMK is generated according to the TMK key component.
  • the sales terminal for providing the key After generating the IPEK and the TMK, the sales terminal for providing the key sends an authentication instruction based on the serial communication to the sales terminal for downloading the key; and receiving the authentication of the sales terminal for downloading the key according to the authentication instruction feedback The message; after the authentication message is verified, a serial communication connection is established through the data transmission port with the sales terminal for downloading the key.
  • the sales terminal for downloading the key transmits the generated public key in the public-private key pair to the sales terminal for providing the key, and the sales terminal for providing the key encrypts the generated IPEK and/or according to the received public key.
  • TMK sending the encrypted IPEK and/or TMK to the sales terminal for downloading the key, and the sales terminal for downloading the key decrypts the encrypted IPEK and/or TMK according to the private key corresponding to the public key.
  • the decrypted IPEK and/or TMK are stored to the secure storage area, and a confirmation message is fed back to the sales terminal for providing the key, notifying that the sales terminal key download for providing the key is completed.
  • a structural block diagram of a terminal 700 is provided.
  • the internal structure of the terminal can be referred to the terminal shown in FIG. 2.
  • Each of the modules described below can be implemented in whole or in part by software, hardware, or a combination thereof.
  • the terminal 700 includes a serial communication establishing module 701, a receiving module 702, an encryption module 703, a sending module 704, and a confirming module 705.
  • the serial communication establishing module 701 is configured to establish a serial communication connection with the sales terminal for downloading the key through the data transmission port.
  • the receiving module 702 is configured to receive, by using a serial communication connection, a transmission key sent by a sales terminal for downloading a key.
  • the encryption module 703 is configured to encrypt the to-be-downloaded key by using a transport key.
  • the sending module 704 is configured to send the encrypted to-be-downloaded key to the sales terminal for downloading the key.
  • the confirmation module 705 is configured to receive a confirmation message fed back by the sales terminal for downloading the key; and disconnect the serial communication connection with the sales terminal for downloading the key according to the confirmation message.
  • the terminal 700 establishes a serial communication connection with a sales terminal for downloading a key through a data transmission port, and provides a transmission channel for performing key transmission under offline conditions.
  • the transmission key sent by the sales terminal of the key encrypts the key to be downloaded, which ensures the security of the key to be downloaded during transmission.
  • the serial communication establishing module 701 is further configured to send an authentication instruction based on serial communication to the sales terminal for downloading the key; and receive an authentication message fed back by the sales terminal for downloading the key according to the identity verification instruction. After the authentication message is verified, a serial communication connection is established through the data transmission port with the sales terminal for downloading the key.
  • the serial port-based communication connection is established after the identity authentication based on the serial communication protocol is successful with the sales terminal for downloading the key, thereby further ensuring the security of the key download.
  • the receiving module 702 is further configured to receive a public key sent by the sales terminal for downloading the key; the public key is generated by the sales terminal for downloading the key according to a built-in key generation algorithm.
  • the confirmation module 705 is further configured to receive a confirmation message fed back by the sales terminal for downloading the key; the confirmation message is generated by the sales terminal for downloading the key according to the built-in key generation algorithm and the private key corresponding to the public key Generated after decryption with the download key.
  • the encrypted key to be downloaded can be decrypted only by using the private key corresponding to the public key for encrypting the to-be-downloaded key, thereby further ensuring the security of the key transmission.
  • a structural block diagram of a terminal 800 is provided.
  • the internal structure of the terminal can be referred to the terminal shown in FIG. 2.
  • Each of the modules described below can be implemented in whole or in part by software, hardware, or a combination thereof.
  • the terminal 800 includes a key generation module 801, a serial communication establishment module 802, a receiving module 803, an encryption module 804, a sending module 805, and a confirmation module 806.
  • a key generation module 801 configured to acquire, by using an administrator account, a first key component for generating a first key, a second key component for generating a second key, and a key sequence number;
  • the first key component is calculated according to a preset logical operation manner to obtain a first key;
  • the obtained second key component is calculated according to a preset logical operation manner to obtain a basic key; according to the basic key and the key serial number Obtain the second key.
  • the serial communication establishing module 801 is configured to establish a serial communication connection with the sales terminal for downloading the key through the data transmission port.
  • the receiving module 802 is configured to receive, by using a serial communication connection, a transport key sent by a sales terminal for downloading a key.
  • the encryption module 803 is configured to encrypt the to-be-downloaded key by using a transport key.
  • the sending module 804 is configured to send the encrypted to-be-downloaded key to the sales terminal for downloading the key.
  • the confirmation module 805 is configured to receive a confirmation message fed back by the sales terminal for downloading the key; and disconnect the serial communication connection with the sales terminal for downloading the key according to the confirmation message.
  • the to-be-downloaded key includes a first key and a second key that are independent of each other, the first key is generated by the first key component, and the second key is composed of the second key component and the key serial number.
  • the generated second key is related to the key sequence number, and the different key sequence numbers generate different second keys, thereby avoiding the problem that the keys are completely identical and the risk of key leakage is high.
  • the key generation module 801 is further configured to encrypt the base key and the key sequence number according to the built-in key encryption manner to obtain the first part of the second key; and convert the basis according to a preset logical operation manner. Key; encrypt the converted base key and key sequence number according to the built-in key encryption method to obtain the second part of the second key; combine the second part of the second key and the second part of the second key Get the second key.
  • the second key for performing the first key encryption is generated by the multi-step key generation step, thereby further ensuring the security of the key.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or the like.

Abstract

L'invention concerne un procédé de transmission de clé hors ligne, comportant les étapes consistant à: établir une connexion de communication par port série vers un terminal de vente utilisé pour télécharger une clé au moyen d'un port de transmission de données; recevoir une clé de transmission envoyée par le terminal de vente utilisé pour télécharger une clé au moyen de la connexion de communication par port série; chiffrer une clé à télécharger au moyen de la clé de transmission; envoyer la clé à télécharger chiffrée au terminal de vente utilisé pour télécharger une clé; recevoir un message d'accusé de réception renvoyé par le terminal de vente utilisé pour télécharger une clé; et couper la connexion de communication par port série vers le terminal de vente utilisé pour télécharger une clé d'après le message d'accusé de réception.
PCT/CN2017/102972 2016-12-27 2017-09-22 Procédé de transmission de clé hors ligne, terminal et support de stockage WO2018120938A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611226904.1 2016-12-27
CN201611226904.1A CN106712939A (zh) 2016-12-27 2016-12-27 密钥离线传输方法和装置

Publications (1)

Publication Number Publication Date
WO2018120938A1 true WO2018120938A1 (fr) 2018-07-05

Family

ID=58896516

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/102972 WO2018120938A1 (fr) 2016-12-27 2017-09-22 Procédé de transmission de clé hors ligne, terminal et support de stockage

Country Status (2)

Country Link
CN (1) CN106712939A (fr)
WO (1) WO2018120938A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112464188A (zh) * 2020-12-14 2021-03-09 艾体威尔电子技术(北京)有限公司 一种支付终端与外设密码键盘的绑定方法
CN112910878A (zh) * 2021-01-28 2021-06-04 武汉市博畅软件开发有限公司 一种基于串口通信的数据传输方法及系统

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106712939A (zh) * 2016-12-27 2017-05-24 百富计算机技术(深圳)有限公司 密钥离线传输方法和装置
CN109274500B (zh) * 2018-10-15 2020-06-02 百富计算机技术(深圳)有限公司 一种密钥下载方法、客户端、密码设备及终端设备
CN111815815B (zh) * 2020-06-22 2022-06-24 合肥智辉空间科技有限责任公司 一种电子锁安全系统
CN111881463A (zh) * 2020-07-17 2020-11-03 盛视科技股份有限公司 一种串口通信加密方法、系统及串口设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101673443A (zh) * 2009-09-28 2010-03-17 广州市国安信息工程有限公司 网络收银机系统及其实现方法
CN103714634A (zh) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 一种安全下载终端主密钥的方法及系统
EP3104548A1 (fr) * 2015-06-08 2016-12-14 Nxp B.V. Procédé et système destinés à faciliter les communications sécurisées
CN106712939A (zh) * 2016-12-27 2017-05-24 百富计算机技术(深圳)有限公司 密钥离线传输方法和装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101930644B (zh) * 2009-06-25 2014-04-16 中国银联股份有限公司 一种银行卡支付系统中主密钥安全自动下载的方法及其系统
CN105978856B (zh) * 2016-04-18 2019-01-25 随行付支付有限公司 一种pos机密钥下载方法、装置及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101673443A (zh) * 2009-09-28 2010-03-17 广州市国安信息工程有限公司 网络收银机系统及其实现方法
CN103714634A (zh) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 一种安全下载终端主密钥的方法及系统
CN103716320A (zh) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 一种终端主密钥tmk安全下载方法及系统
EP3104548A1 (fr) * 2015-06-08 2016-12-14 Nxp B.V. Procédé et système destinés à faciliter les communications sécurisées
CN106712939A (zh) * 2016-12-27 2017-05-24 百富计算机技术(深圳)有限公司 密钥离线传输方法和装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112464188A (zh) * 2020-12-14 2021-03-09 艾体威尔电子技术(北京)有限公司 一种支付终端与外设密码键盘的绑定方法
CN112464188B (zh) * 2020-12-14 2023-10-31 艾体威尔电子技术(北京)有限公司 一种支付终端与外设密码键盘的绑定方法
CN112910878A (zh) * 2021-01-28 2021-06-04 武汉市博畅软件开发有限公司 一种基于串口通信的数据传输方法及系统

Also Published As

Publication number Publication date
CN106712939A (zh) 2017-05-24

Similar Documents

Publication Publication Date Title
WO2018120938A1 (fr) Procédé de transmission de clé hors ligne, terminal et support de stockage
CN103118027B (zh) 基于国密算法建立tls通道的方法
CN109088889B (zh) 一种ssl加解密方法、系统及计算机可读存储介质
CN108377190B (zh) 一种认证设备及其工作方法
US9887838B2 (en) Method and device for secure communications over a network using a hardware security engine
WO2021196915A1 (fr) Procédés et systèmes de transmission de données à base d'opérations de chiffrement et de déchiffrement, et dispositif informatique
CN112737779B (zh) 一种密码机服务方法、装置、密码机及存储介质
CN111435913B (zh) 一种物联网终端的身份认证方法、装置和存储介质
US20230353390A1 (en) Method for upgrading certificate of pos terminal, server, and pos terminal
WO2018090763A1 (fr) Procédé et dispositif de configuration de clé maîtresse de terminal
WO2015161689A1 (fr) Procédé de traitement de données basé sur une clé de négociation
CN108199847B (zh) 数字安全处理方法、计算机设备及存储介质
CN111181723B (zh) 物联网设备间离线安全认证的方法和装置
CN111131416A (zh) 业务服务的提供方法和装置、存储介质、电子装置
TW202121868A (zh) 資料的加解密方法、裝置、存儲介質及加密文件
US20220209944A1 (en) Secure Server Digital Signature Generation For Post-Quantum Cryptography Key Encapsulations
US20210328799A1 (en) Automated authentication of a new network element
WO2015135398A1 (fr) Procédé de traitement de données basé sur des clés de négociation
CN104836784A (zh) 一种信息处理方法、客户端和服务器
CN109905384B (zh) 数据迁移方法及系统
CN111614621A (zh) 物联网通信方法和系统
CN111654503A (zh) 一种远程管控方法、装置、设备及存储介质
CN111241492A (zh) 一种产品多租户安全授信方法、系统及电子设备
US20240106633A1 (en) Account opening methods, systems, and apparatuses
CN112600667B (zh) 一种密钥协商方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17887951

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17887951

Country of ref document: EP

Kind code of ref document: A1