WO2019080095A1 - 金融支付终端激活方法及其系统 - Google Patents

金融支付终端激活方法及其系统

Info

Publication number
WO2019080095A1
WO2019080095A1 PCT/CN2017/108039 CN2017108039W WO2019080095A1 WO 2019080095 A1 WO2019080095 A1 WO 2019080095A1 CN 2017108039 W CN2017108039 W CN 2017108039W WO 2019080095 A1 WO2019080095 A1 WO 2019080095A1
Authority
WO
WIPO (PCT)
Prior art keywords
payment terminal
card
smart
random data
password
Prior art date
Application number
PCT/CN2017/108039
Other languages
English (en)
French (fr)
Inventor
彭波涛
Original Assignee
福建联迪商用设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 福建联迪商用设备有限公司 filed Critical 福建联迪商用设备有限公司
Priority to CN201780001447.2A priority Critical patent/CN107995985B/zh
Priority to PCT/CN2017/108039 priority patent/WO2019080095A1/zh
Publication of WO2019080095A1 publication Critical patent/WO2019080095A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers

Definitions

  • the present invention relates to the field of electronic payment, and in particular to a method for activating a financial payment terminal and a system thereof.
  • a financial payment terminal such as a POS terminal
  • the behavior is strictly restricted, and only those personnel designated and trusted by the POS terminal manufacturer (such as customer service) are allowed to perform related operations.
  • the POS terminal is disconnected from the state (the hacker is generally required to be removed), and finally switched to the "normal use state".
  • This conversion process is referred to as the "activation" operation by the POS terminal manufacturer.
  • the "activation” process requires strict authentication of the operator.
  • Common POS terminal activation methods are: (1) using a password password to verify the operator's identity; (2) using a dedicated computer/private activation terminal, etc., connecting to the POS terminal for operator authentication on the computer/dedicated device.
  • the technical problem to be solved by the present invention is: Providing a financial payment terminal activation method and system thereof, Easy and low-cost activation is achieved on the premise of ensuring security requirements.
  • a financial payment terminal activation method includes a payment terminal and a smart IC card; the payment terminal stores a root certificate; the smart IC card stores a work certificate and a corresponding private key; and the method includes:
  • the payment terminal acquires the password input by the operator, and sends the password to the smart IC card connected thereto; [0011] if the smart IC card verifies that the password passes, the protection of the stored private key is released;
  • the payment terminal verifies the smart IC card by digital signature according to the root certificate, and if the verification passes, allows the payment terminal to be activated.
  • the financial payment terminal activation system includes a payment terminal and a smart IC card; the payment terminal stores a root certificate; and the smart IC card stores a work certificate and a corresponding private key;
  • a payment terminal configured to: obtain, by the payment terminal, a password input by an operator, and send the password to a smart IC card connected thereto; and further, in a state in which the private key of the smart IC card is usable, according to the root certificate thereof , verifying the smart IC card by digital signature, and if the verification is passed, allowing the payment terminal to be activated;
  • the smart IC card is configured to: if the smart IC card verifies that the password passes, the protection of the stored private key is released.
  • the beneficial effects of the present invention are as follows:
  • the financial payment terminal activation method provided by the present invention utilizes a certain security protection mechanism of the smart IC card, and is not easily easily broken, so the security level is high and the cost is low;
  • the IC card configures the exclusive access password stored by the cardholder, and clarifies the management responsibility to facilitate traceability after the accident; only when the access password verification is passed (the cardholder's identity verification is passed) and the payment terminal passes the verification of the IC card, the IC card is allowed.
  • the method applied to the activation of the financial payment terminal can not only meet the security requirements; but also is convenient to use, and the IC card is convenient to carry; further, it has the advantages of low cost of input, management and maintenance. Brief description of the drawing
  • FIG. 1 is a schematic structural diagram of a financial payment terminal activation system according to the present invention.
  • FIG. 2 is a schematic flowchart of a method for activating a financial payment terminal according to an embodiment of the present invention.
  • the most critical idea of the present invention is: Configuring a dedicated access password for the card holder for each IC card; only when the password verification is passed and the smart IC card is verified, the payment terminal can be activated to ensure the security of the peer.
  • the present invention provides a method for activating a financial payment terminal, including a payment terminal and a smart IC card; the payment terminal stores a root certificate; and the smart IC card stores a work certificate. And a corresponding private key; the method includes:
  • the payment terminal acquires the password input by the operator, and sends the password to the smart IC card connected thereto;
  • the payment terminal verifies the smart IC card by digital signature according to the root certificate, and if the verification passes, allows the payment terminal to be activated.
  • the present invention has the following advantages:
  • the present invention utilizes the advantages of the smart IC card to implement operator identity verification. Since the smart IC card chip generally has a certain hardware security protection mechanism, it will not be easily broken, so its security level is high. At the same time, the cost of a smart IC card is significantly lower than the cost of a computer or a dedicated activation terminal (a few thousand dollars).
  • the use of a smart IC card to implement operator authentication has the additional advantage that each operator can be provided with the IC card specific to the person, each IC card has a unique access password, and the card and password are The operators are kept separately, so the management responsibility is clear, and the IC can be used for security incidents. The ID of the card is traced back, which undoubtedly increases the sense of responsibility of the operator in keeping the IC card and password.
  • the IC card is small and convenient, easy to carry;
  • the payment terminal verifies the smart IC card by digital signature according to the root certificate.
  • the payment terminal is allowed to be activated, specifically:
  • the payment terminal generates the first random data and sends it to the smart IC card;
  • the smart IC card encrypts the first random data by using the private key, and sends the encrypted first random data and its own work certificate to the payment terminal;
  • the payment terminal determines whether the first random data and the second random data are consistent, and if yes, the identity verification is passed, allowing the payment terminal to be activated.
  • the validity of the smart IC card is verified by the above-mentioned specific digital signature, thereby confirming the validity of the identity of the card holder, thereby ensuring the legality of the cardholder activation operation.
  • the method further includes:
  • the smart IC card is connected to the payment terminal through a card reader.
  • connection between the smart IC card and the payment terminal is established by adopting a universal connection method.
  • the method further includes:
  • the smart IC card verifies that the password does not pass, it determines that the verification has failed, and ends the flow.
  • the method further includes:
  • the payment terminal verifies that the work certificate does not pass, it determines that the verification fails, and ends the process.
  • the payment terminal determines that the first random data and the second random data do not match, it is determined that the verification fails, and the process ends. [0050] As can be seen from the above description, in the verification step, once one of the rings fails to pass the verification, the verification fails.
  • the activation payment terminal is specifically:
  • the payment terminal modifies its own state from the disassembled state to the normal use state.
  • the payment terminal can be successfully activated only by successfully passing all the verifications, so that it has the function of completing the financial payment transaction, thereby ensuring the security of the financial payment.
  • the method further includes:
  • a password uniquely associated with a smart IC card is preset.
  • the smart IC card and its password have a unique correspondence relationship, and the card and the password have a designated customer service operator to be separately kept, and the responsibility for the traceability is facilitated by clear management responsibility, and the customer service personnel are kept in the IC. The sense of responsibility of the card and password.
  • the method further includes:
  • the financial payment terminal is a financial POS machine.
  • the application of the solution to the field of POS machines will enable the verification of the identity of the operator during the maintenance process of the POS machine, and ensure the safety of the change of the working state, thereby ensuring the safety of the use of the POS machine.
  • the financial payment terminal activation system includes a payment terminal and a smart IC card; the payment terminal stores a root certificate; and the smart IC card stores a work certificate and a corresponding private key;
  • a payment terminal configured to: obtain, by the payment terminal, a password input by an operator, and send the password to a smart IC card connected thereto; and further, in a state in which the private key of the smart IC card is usable, according to the root certificate thereof , verifying the smart IC card by digital signature, and if the verification is passed, allowing the payment terminal to be activated;
  • the smart IC card is configured to: if the smart IC card verifies that the password passes, the protection of the stored private key is released.
  • the payment terminal specifically includes:
  • a generating module configured to generate, by the payment terminal, the first random data, and send the data to the smart IC card
  • a first verification module configured to: after the payment terminal verifies that the work certificate passes, extract a work public key from the work certificate;
  • a decryption module configured to: the payment terminal decrypts the encrypted first random data by using the working public key, Obtaining second random data;
  • the second verification module is configured to determine, by the payment terminal, whether the first random data and the second random data are consistent, and if yes, the identity verification is passed, and the payment terminal is allowed to be activated;
  • the smart IC card specifically includes:
  • an encryption module configured to encrypt, by the smart IC card, the first random data by using the private key, and send the encrypted first random data and its own work certificate to the payment terminal.
  • a card reader is further included, through which the smart IC card is connected to the payment terminal.
  • the smart IC card further includes:
  • the first-end module is configured to determine that the verification fails if the password is not passed, and end the process.
  • the payment terminal further includes:
  • a second: ending module configured to: if the payment terminal verifies that the work certificate does not pass, determine that the verification fails, and end the process.
  • the second ending module is further configured to: if the payment terminal determines that the first random data and the second random data do not match, determine that the verification fails, and end the flow.
  • the payment terminal further includes:
  • an activation module configured to modify, by the payment terminal, the self state from the disassembled state to the normal use state.
  • the method further includes a preset module, configured to preset a password uniquely corresponding to a smart IC card.
  • the payment terminal is a financial POS machine.
  • this embodiment provides a method for activating a financial payment terminal, which is applicable to the premise that the financial payment terminal is in the maintenance state before the handover is completed. Conveniently authenticate the identity of the customer service operator, while reducing management costs.
  • the financial payment terminal may be a financial POS terminal or other terminal having a financial payment function; the method of this embodiment will be described in detail below by taking a financial POS terminal as an example.
  • the method of this embodiment includes:
  • S1 pre-storing the root certificate in a secure manner in the payment terminal; pre-storing, in the smart IC card, a work certificate corresponding to the root certificate pre-stored in the payment terminal, and a private key corresponding to the work certificate;
  • S2 each smart IC card is configured with a unique corresponding unique password, and one smart IC card uniquely corresponds to one password, and the passwords of all smart IC cards are not repeated; the exclusive password is operated by the corresponding unique cardholder (P0S machine customer service) Personnel) Private custody, so the management responsibility is clear, and the security incident can be traced back by the ID of the IC card. This will undoubtedly increase the sense of responsibility of the customer service staff to keep the IC card and password.
  • S3 The operator establishes a connection between the smart IC card held by the operator and the POS terminal through the IC card reader; preferably, the POS terminal is configured with an IC card reader, and the smart IC card can be directly inserted into the connection;
  • S4 The operator inputs the exclusive password held by the POS terminal, and then the POS terminal sends the read password to the smart IC card through the IC card reader for verification comparison, if the verification fails , the entire authentication fails, and the subsequent process is terminated; otherwise, the smart IC card releases the protection of the private key it holds, sets the private key to the usable state, and proceeds to the next step;
  • S5 The POS terminal randomly generates a first random data to be encrypted, and sends the data to the smart IC card through the IC card reader;
  • S6 The smart IC card encrypts the first random data sent by the POS terminal by using the internally stored private key to generate the encrypted first random data.
  • S7 The smart IC card sends the encrypted first random data together with its own work certificate to the POS terminal.
  • S8 The POS terminal first uses the root certificate saved by itself to verify the work certificate sent by the smart IC card, and ensures the legality of the work certificate; if the work certificate is not legal, the entire identity verification fails, and the subsequent process is terminated; otherwise, the POS terminal enters; Next step;
  • S10 The POS terminal decrypts the encrypted first random data sent by the smart IC card by using the work public key extracted from the work certificate to obtain second random data.
  • Sl l the POS terminal compares the first random data sent before and the second random data obtained after decryption
  • the entire authentication process is passed, allowing the terminal to activate; otherwise, the identity verification fails, and the terminal is prohibited from being activated.
  • this embodiment provides a financial payment terminal activation system, including a payment terminal 1 and a smart IC card 3, and a preset module for presetting a smart IC card. The only corresponding password.
  • the smart IC card internally stores a unique work certificate and a corresponding private key for each card; the legal holder of each smart IC card is configured with a dedicated operation password required for using the private key therein;
  • the payment terminal stores a root certificate; the payment terminal is preferably a financial POS terminal, and has an IC card reader.
  • the smart IC card 3 includes: an encryption module 31, configured to encrypt the first random data by using the private key, and encrypt the first random data and the self The work certificate is sent to the payment terminal.
  • the first end module 32 is configured to determine that the verification fails if the password is not passed, and end the process.
  • the payment terminal 1 includes:
  • an IC card reader 2 configured to connect the smart IC card to the payment terminal
  • the obtaining module 11 is configured to acquire a password input by an operator, and send the password to a smart IC card connected thereto;
  • the generating module 12 is configured to generate, by the payment terminal, the first random data, and send the data to the smart IC card.
  • the first verification module 13 is configured to: after the payment terminal verifies that the work certificate passes, extract a work public key from the work certificate;
  • the second end module 16 is configured to determine that the verification fails if the payment terminal verifies that the work certificate does not pass.
  • the decryption module 14 is configured to: the payment terminal decrypts the encrypted first random data by using the working public key, to obtain second random data;
  • the second verification module 15 is configured to determine, by the payment terminal, whether the first random data and the second random data are consistent, and if yes, the identity verification is passed, and the payment terminal is allowed to be activated;
  • the second ending module 16 is further configured to: if the payment terminal determines that the first random data and the second random data are inconsistent, determine that the verification fails, and end the process;
  • the activation module 17 is configured to modify, by the payment terminal, the self state from the disassembled state to the normal use state.
  • the present invention provides a financial payment terminal activation method and system thereof, which can not only realize the identity verification of the operator under the premise of ensuring the operation security; but also the convenience of the verification process is high; Based on the intelligent IC card for operational authentication, it is also portable, compact and convenient. Further, intelligent IC card technology can effectively verify and trace operator identity after an accident; finally, it can significantly reduce management and Maintenance costs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

一种金融支付终端激活方法及其系统,包括支付终端和智能IC卡;所述支付终端中存储有根证书;所述智能IC卡中存储有工作证书和对应的私钥;所述方法包括:支付终端获取操作员输入的口令,并将所述口令发送至与其连接的智能IC卡;若智能IC卡验证所述口令通过,则解除对其存储的私钥的保护;所述支付终端依据其根证书,以数字签名方式对智能IC卡进行验证,若验证通过,则允许激活支付终端。本方法及系统不仅能在保证操作安全性的前提下,利用智能IC卡技术有效验证和追溯操作员身份;而且验证过程便捷性高;进一步的,还具有便于携带、小巧方便的特点;再进一步的,还能显著降低管理和维护成本。

Description

金融支付终端激活方法及其系统 技术领域
[0001] 本发明涉及电子支付领域, 具体说的是一种金融支付终端激活方法及其系统。
背景技术
[0002] 金融支付终端, 如 POS终端, 对其安全管理要求较为严格, 为了防止终端被非 法人员偷偷的安装窃听器到 POS终端内部, 需要对终端由 "拆机状态"转为"正常 使用状态"的行为进行严格的限制, 一般只允许由 POS终端厂商指定和信任的人 员 (例如客服) 才能进行相关操作。
[0003] POS终端从拆机状态 (安装窃听器一般需要拆幵 POS机) , 到最终转为"正常使 用状态", 这一转换过程被 POS终端厂商称作为"激活"操作。 为了确保安全性, " 激活"的过程需要对操作人员实施严格的身份认证。 常见的 POS终端激活方法有 : ( 1) 使用密码口令来验证操作员身份; (2) 使用专门的电脑 /专用激活终端 等, 连接到 POS终端, 在电脑 /专用设备上进行操作员身份验证。
[0004] 针对上述常用的 POS终端激活方法, 存在一定的弊端, 体现在:
[0005] ( 1) 针对使用密码口令进行身份验证的方式, 最主要的问题是密码难以保管 的问题。 由于 POS终端客服操作人员众多, 如果口令不一样则难以实现, POS终 端无法做到为每个不同给的客服操作人员使用不同的密码口令, 操作起来比较 复杂; 如果口令相同的话, 则每个客服人员都知道口令, 管理责任不明晰, 最 后口令就变成众人皆知的公幵的秘密了。 而且按照相关安全规范的要求, POS终 端如果采用口令来实施身份验证, 有可能每台 POS终端的密码口令都要求不一样 , 这样对 POS终端的生产和管理都带来极大的不便;
[0006] (2) 针对使用电脑或专用激活终端进行身份验证的方式, 由于电脑或者激活 终端通常体积较大, 客服人员上门维修的情况则很不方便; 而且每个客服人员 都要配备电脑或者专用终端, 成本也较高。
技术问题
[0007] 本发明所要解决的技术问题是: 提供一种金融支付终端激活方法及其系统, 在 保证安全性要求的前提下, 便捷、 低成本的实现激活。
问题的解决方案
技术解决方案
[0008] 为了解决上述技术问题, 本发明采用的技术方案为:
[0009] 金融支付终端激活方法, 包括支付终端和智能 IC卡; 所述支付终端中存储有根 证书; 所述智能 IC卡中存储有工作证书和对应的私钥; 所述方法包括:
[0010] 支付终端获取操作员输入的口令, 并将所述口令发送至与其连接的智能 IC卡; [0011] 若智能 IC卡验证所述口令通过, 则解除对其存储的私钥的保护;
[0012] 所述支付终端依据其根证书, 以数字签名方式对智能 IC卡进行验证, 若验证通 过, 则允许激活支付终端。
[0013] 本发明提供的另一个技术方案为:
[0014] 金融支付终端激活系统, 包括支付终端和智能 IC卡; 所述支付终端中存储有根 证书; 所述智能 IC卡中存储有工作证书和对应的私钥;
[0015] 支付终端, 用于支付终端获取操作员输入的口令, 并将所述口令发送至与其连 接的智能 IC卡; 还用于在智能 IC卡的私钥可使用状态下, 依据其根证书, 以数 字签名方式对智能 IC卡进行验证, 若验证通过, 则允许激活支付终端;
[0016] 智能 IC卡, 用于若智能 IC卡验证所述口令通过, 则解除对其存储的私钥的保护 发明的有益效果
有益效果
[0017] 本发明的有益效果在于: 本发明提供的金融支付终端激活方法, 利用智能 IC卡 具有一定安全防护机制, 不容易被轻易攻破, 因此安全等级较高且成本低的特 点; 为每张 IC卡配置持卡人保管的专属访问口令, 通过明确管理责任, 方便事 故后追溯; 只有访问口令验证通过 (持卡人的身份验证通过) 且支付终端对 IC 卡验证通过的情况下, 才允许激活支付终端。 本发明运用于金融支付终端激活 的方法, 不仅能满足安全要求; 而且使用便利, IC卡携带方便; 进一步的, 还 具有投入、 管理以及维护的成本都低的优点。 对附图的简要说明
附图说明
[0018] 图 1为本发明一种金融支付终端激活系统的结构组成示意图;
[0019] 图 2为本发明实施例一一种金融支付终端激活方法的流程示意图。
[0020] 标号说明:
[0021] 1、 支付终端; 2、 IC读卡器; 3、 智能 IC卡;
[0022] 11、 获取模块; 12、 生成模块; 13、 第一验证模块; 14、 解密模块;
[0023] 15、 第二验证模块; 16、 第二结束模块; 17、 激活模块;
[0024] 31、 加密模块; 32、 第一结束模块。
具体实施方式
[0025] 本发明最关键的构思在于: 为每张 IC卡配置持卡人保管的专属访问口令; 只有 口令验证通过且对智能 IC卡验证通过, 才能激活支付终端, 保证安全性的同吋
, 还具有方便操作且管理、 维护的成本均低的优点。
[0026] 请参照图 1和图 2, 本发明提供一种金融支付终端激活方法, 包括支付终端和智 能 IC卡; 所述支付终端中存储有根证书; 所述智能 IC卡中存储有工作证书和对 应的私钥; 所述方法包括:
[0027] 支付终端获取操作员输入的口令, 并将所述口令发送至与其连接的智能 IC卡;
[0028] 若智能 IC卡验证所述口令通过, 则解除对其存储的私钥的保护;
[0029] 所述支付终端依据其根证书, 以数字签名方式对智能 IC卡进行验证, 若验证通 过, 则允许激活支付终端。
[0030] 从上述描述可知, 本发明的有益效果在于: 本发明利用了智能 IC卡的优势来实 施操作人员身份验证。 由于智能 IC卡芯片一般都具备一定的硬件安全防护机制 , 不会被轻易的攻破, 因此其安全等级较高。 同吋, 智能 IC卡的成本相对于电 脑或专用激活终端的成本 (几千元) 来说, 其成本 (通常几十元) 显著降低。 进一步的, 利用智能 IC卡来实现操作员的身份验证, 还有一个好处, 就是可以 为每个操作人员配备该人员专属的 IC卡片, 每张 IC卡有专属的访问口令, 卡片 和口令由该操作人员单独保管, 因此管理责任明晰, 出了安全事故可以利用 IC 卡片的 ID进行追溯, 这样的话无疑加大了操作人员保管 IC卡片和口令的责任感
, 从而显著提高终端维护的安全性。
[0031] 综上, 本发明可以明显带来以下好处:
[0032] 1、 满足安全的要求, 可以有效验证和追溯操作员身份;
[0033] 2、 满足使用便利的要求, IC卡小巧方便, 便于携带;
[0034] 3、 满足投入成本低、 管理成本低的要求, 不需要花费太大的成本。
[0035] 进一步的, 所述支付终端依据其根证书, 以数字签名方式对智能 IC卡进行验证
, 若验证通过, 则允许激活支付终端, 具体为:
[0036] 支付终端生成第一随机数据, 并发送至智能 IC卡;
[0037] 智能 IC卡使用所述私钥对所述第一随机数据进行加密, 并将加密后的第一随机 数据以及自身的工作证书发送至支付终端;
[0038] 若支付终端验证所述工作证书通过, 则从所述工作证书中提取工作公钥; [0039] 支付终端使用所述工作公钥解密所述加密后的第一随机数据, 得到第二随机数 据;
[0040] 支付终端判断所述第一随机数据和所述第二随机数据是否一致, 若是, 则身份 验证通过, 允许激活支付终端。
[0041] 由上述描述可知, 通过上述具体的数字签名的方式来验证智能 IC卡的有效性, 从而确认持卡人员的身份有效性, 进而保证持卡人激活操作的合法性。
[0042] 进一步的, 还包括:
[0043] 智能 IC卡通过读卡器与支付终端连接。
[0044] 由上述描述可知, 通过采用通用的连接方式来建立智能 IC卡与支付终端的连接
, 提高操作便捷性, 且不用给支付终端带来硬件改造成本。
[0045] 进一步的, 还包括:
[0046] 若智能 IC卡验证所述口令不通过, 则判定验证失败, 结束流程。
[0047] 进一步的, 还包括:
[0048] 若支付终端验证所述工作证书不通过, 则判定验证失败, 结束流程。
[0049] 进一步的, 若支付终端判定所述第一随机数据和所述第二随机数据不一致, 则 判定验证失败, 结束流程。 [0050] 由上述描述可知, 在验证环节中, 一旦其中一环验证不通过, 则判定验证失败
, 并终止验证流程, 保证终端的安全性。
[0051] 进一步的, 所述激活支付终端, 具体为:
[0052] 支付终端将自身状态从拆机状态修改为正常使用状态。
[0053] 由上述描述可知, 只有成功通过所有验证, 才能成功激活支付终端, 使其具备 完成金融支付交易的功能, 从而保证金融支付的安全性。
[0054] 进一步的, 还包括:
[0055] 预设与一智能 IC卡唯一对应的一口令。
[0056] 由上述描述可知, 智能 IC卡与其口令为专属对应关系, 卡片和口令都有一指定 的客服操作人员单独保管, 通过明确管理责任, 有利于责任追溯, 同吋加大客 服操作人员保管 IC卡和口令的责任感。
[0057] 进一步的, 还包括:
[0058] 所述金融支付终端为金融 POS机。
[0059] 由上述描述可知, 将本方案运用于 POS机领域中, 将能实现 POS机维修过程中 验证操作员身份, 保证工作状态转变的安全性, 进而保证 POS机使用的安全性。
[0060] 本发明提供的另一个技术方案为:
[0061] 金融支付终端激活系统, 包括支付终端和智能 IC卡; 所述支付终端中存储有根 证书; 所述智能 IC卡中存储有工作证书和对应的私钥;
[0062] 支付终端, 用于支付终端获取操作员输入的口令, 并将所述口令发送至与其连 接的智能 IC卡; 还用于在智能 IC卡的私钥可使用状态下, 依据其根证书, 以数 字签名方式对智能 IC卡进行验证, 若验证通过, 则允许激活支付终端;
[0063] 智能 IC卡, 用于若智能 IC卡验证所述口令通过, 则解除对其存储的私钥的保护
[0064] 进一步的, 所述支付终端具体包括:
[0065] 生成模块, 用于支付终端生成第一随机数据, 并发送至智能 IC卡;
[0066] 第一验证模块, 用于支付终端验证所述工作证书通过, 则从所述工作证书中提 取工作公钥;
[0067] 解密模块, 用于支付终端使用所述工作公钥解密所述加密后的第一随机数据, 得到第二随机数据;
[0068] 第二验证模块, 用于支付终端判断所述第一随机数据和所述第二随机数据是否 一致, 若是, 则身份验证通过, 允许激活支付终端;
[0069] 所述智能 IC卡具体包括:
[0070] 加密模块, 用于智能 IC卡使用所述私钥对所述第一随机数据进行加密, 并将加 密后的第一随机数据以及自身的工作证书发送至支付终端。
[0071] 进- 步的, 还包括读卡器, 智能 IC卡通过其与支付终端连接。
[0072] 进- 步的, 所述智能 IC卡还包括:
[0073] 第- 结束模块, 用于若验证所述口令不通过, 则判定验证失败, 结束流程。
[0074] 进- 步的, 所述支付终端还包括:
[0075] 第:二结束模块, 用于若支付终端验证所述工作证书不通过, 则判定验证失败, 结束流程。
[0076] 进一步的, 所述第二结束模块, 还用于若支付终端判定所述第一随机数据和所 述第二随机数据不一致, 则判定验证失败, 结束流程。
[0077] 进一步的, 所述支付终端还包括:
[0078] 激活模块, 用于支付终端将自身状态从拆机状态修改为正常使用状态。
[0079] 进一步的, 还包括预设模块, 用于预设与一智能 IC卡唯一对应的一口令。
[0080] 进一步的, 所述支付终端为金融 POS机。
[0081]
[0082] 实施例一
[0083] 请参照图 1和图 2, 本实施例提供一种金融支付终端激活方法, 适用于在终端维 护过程中, 在金融支付终端工作状态进行切换前, 实现在满足安全性要求的前 提下, 便捷地对客服操作人员的身份进行认证, 同吋又能降低管理成本。
[0084] 所述金融支付终端可以是金融 POS终端或其他具备金融支付功能的终端; 以下 将以金融 POS终端为例详细说明本实施例的方法。
[0085] 本实施例的方法包括:
[0086] S1 : 在支付终端中以安全方式预存储根证书; 在智能 IC卡中以安全方式预存储 与支付终端中预存储的根证书对应的工作证书, 以及与工作证书对应的私钥; [0087] S2: 为每个智能 IC卡配置唯一对应的专属口令, 一个智能 IC卡唯一对应一个口 令, 所有智能 IC卡的口令不重复; 专属口令由对应的唯一持卡人 (P0S机客服操 作人员) 私人保管, 因此管理责任明晰, 出了安全事故可以利用 IC卡片的 ID进 行追溯, 这样的话无疑加大了客服人员保管 IC卡片和口令的责任感。
[0088] 在 POS终端拆机维修后, 要进行系统重启, 将系统从"拆机状态"转变为"正常使 用状态", 即激活操作。 具体操作包括:
[0089] S3: 操作员将其持有的智能 IC卡通过 IC读卡器与 POS终端建立连接; 优选的, POS终端配置有 IC读卡器, 智能 IC卡可直接插入连接;
[0090] S4: 操作员在 POS终端上输入其持有的专属口令, 然后 POS终端将读取到的口 令通过 IC卡读卡器发送到智能 IC卡片上进行校验比对, 如果校验失败, 则整个 身份验证失败, 后续流程终止; 否则智能 IC卡解除对其持有的私钥的保护, 将 私钥设置为可使用状态, 进入下一步;
[0091] S5: POS终端随机产生一段待加密的第一随机数据, 通过 IC卡读卡器发送给智 能 IC卡;
[0092] S6: 智能 IC卡使用内部保存的私钥, 对 POS终端发送过来的第一随机数据进行 加密动作, 生成加密后的第一随机数据;
[0093] S7: 智能 IC卡将加密后的第一随机数据以及自身的工作证书一起发送给 POS终 山
[0094] S8: POS终端先使用自身保存的根证书来验证智能 IC卡发过来的工作证书, 确 保工作证书的合法性; 如果工作证书不合法, 则整个身份验证失败, 后续流程 终止; 否则进入下一步;
[0095] S9: POS终端验证工作证书合法后, 从中提取出工作公钥出来;
[0096] S10: POS终端使用从工作证书提取出来的工作公钥对智能 IC卡发过来的加密 后的第一随机数据进行解密, 得到第二随机数据;
[0097] Sl l : POS终端比对之前发送的第一随机数据和后面解密得到的第二随机数据
, 如果二者一致, 则说明整个身份验证过程通过, 允许终端激活; 否则身份验 证失败, 禁止终端激活。
[0098] [0099] 实施例二
[0100] 请参照图 2, 本实施例对应实施例一, 提供一种金融支付终端激活系统, 包括 支付终端 1和智能 IC卡 3; 还包括预设模块, 用于预设与一智能 IC卡唯一对应的 一口令。
[0101] 所述智能 IC卡内部存储有每张卡唯一的工作证书和对应的私钥; 每张智能 IC卡 的合法持有者配置有一专属的、 使用其内私钥所需的操作口令;
[0102] 所述支付终端中存储有根证书; 所述支付终端优选为金融 POS终端, 内置 IC读 卡器。
[0103] 具体的, 所述智能 IC卡 3包括: 加密模块 31, 用于智能 IC卡使用所述私钥对所 述第一随机数据进行加密, 并将加密后的第一随机数据以及自身的工作证书发 送至支付终端; 第一结束模块 32, 用于若验证所述口令不通过, 则判定验证失 败, 结束流程。
[0104] 所述支付终端 1, 包括:
[0105] IC读卡器 2, 用于智能 IC卡通过其与支付终端连接;
[0106] 获取模块 11, 用于获取操作员输入的口令, 并将所述口令发送至与其连接的智 能 IC卡;
[0107] 生成模块 12, 用于支付终端生成第一随机数据, 并发送至智能 IC卡;
[0108] 第一验证模块 13, 用于支付终端验证所述工作证书通过, 则从所述工作证书中 提取工作公钥;
[0109] 第二结束模块 16, 用于若支付终端验证所述工作证书不通过, 则判定验证失败
, 结束流程
[0110] 解密模块 14, 用于支付终端使用所述工作公钥解密所述加密后的第一随机数据 , 得到第二随机数据;
[0111] 第二验证模块 15, 用于支付终端判断所述第一随机数据和所述第二随机数据是 否一致, 若是, 则身份验证通过, 允许激活支付终端;
[0112] 所述第二结束模块 16, 还用于若支付终端判定所述第一随机数据和所述第二随 机数据不一致, 则判定验证失败, 结束流程;
[0113] 激活模块 17, 用于支付终端将自身状态从拆机状态修改为正常使用状态。 [0114] 综上所述, 本发明提供的一种金融支付终端激活方法及其系统, 不仅能在保证 操作安全性的前提下, 实现对操作人员的身份验证; 而且验证过程便捷性高; 进一步的, 基于智能 IC卡实现操作身份验证, 还具有便于携带、 小巧方便的特 点; 再进一步的, 利用智能 IC卡技术可以在事故后有效验证和追溯操作员身份 ; 最后, 还能显著降低管理和维护成本。

Claims

权利要求书
[权利要求 1] 金融支付终端激活方法, 其特征在于, 包括支付终端和智能 IC卡; 所 述支付终端中存储有根证书; 所述智能 IC卡中存储有工作证书和对应 的私钥; 所述方法包括:
支付终端获取操作员输入的口令, 并将所述口令发送至与其连接的智 能 IC卡;
若智能 IC卡验证所述口令通过, 则解除对其存储的私钥的保护; 所述支付终端依据其根证书, 以数字签名方式对智能 IC卡进行验证, 若验证通过, 则允许激活支付终端。
[权利要求 2] 如权利要求 1所述的金融支付终端激活方法, 其特征在于, 所述支付 终端依据其根证书, 以数字签名方式对智能 IC卡进行验证, 若验证通 过, 则允许激活支付终端, 具体为:
支付终端生成第一随机数据, 并发送至智能 IC卡; 智能 IC卡使用所述私钥对所述第一随机数据进行加密, 并将加密后的 第一随机数据以及自身的工作证书发送至支付终端;
若支付终端验证所述工作证书通过, 则从所述工作证书中提取工作公 钥;
支付终端使用所述工作公钥解密所述加密后的第一随机数据, 得到第 二随机数据;
支付终端判断所述第一随机数据和所述第二随机数据是否一致, 若是 , 则身份验证通过, 允许激活支付终端。
[权利要求 3] 如权利要求 1所述的金融支付终端激活方法, 其特征在于, 还包括: 智能 IC卡通过读卡器与支付终端连接。
[权利要求 4] 如权利要求 1所述的金融支付终端激活方法, 其特征在于, 还包括: 若智能 IC卡验证所述口令不通过, 则判定验证失败, 结束流程。
[权利要求 5] 如权利要求 1所述的金融支付终端激活方法, 其特征在于, 还包括: 若支付终端验证所述工作证书不通过, 则判定验证失败, 结束流程。
[权利要求 6] 如权利要求 1所述的金融支付终端激活方法, 其特征在于, 还包括: 若支付终端判定所述第一随机数据和所述第二随机数据不一致, 则判 定验证失败, 结束流程。
如权利要求 1所述的金融支付终端激活方法, 其特征在于, 所述激活 支付终端, 具体为:
支付终端将自身状态从拆机状态修改为正常使用状态。
如权利要求 1所述的金融支付终端激活方法, 其特征在于, 还包括: 预设与一智能 IC卡唯一对应的一口令。
如权利要求 1-8任意一项所述的金融支付终端激活方法, 其特征在于 , 所述金融支付终端为金融 POS机。
金融支付终端激活系统, 其特征在于, 包括支付终端和智能 IC卡; 所 述支付终端中存储有根证书; 所述智能 IC卡中存储有工作证书和对应 的私钥;
支付终端, 用于支付终端获取操作员输入的口令, 并将所述口令发送 至与其连接的智能 IC卡; 还用于在智能 IC卡的私钥可使用状态下, 依 据其根证书, 以数字签名方式对智能 IC卡进行验证, 若验证通过, 则 允许激活支付终端;
智能 IC卡, 用于若智能 IC卡验证所述口令通过, 则解除对其存储的私 钥的保护。
如权利要求 10所述的金融支付终端激活系统, 其特征在于, 所述支付 终端具体包括:
获取模块, 用于获取操作员输入的口令, 并将所述口令发送至与其连 接的智能 IC卡;
生成模块, 用于支付终端生成第一随机数据, 并发送至智能 IC卡; 第一验证模块, 用于支付终端验证所述工作证书通过, 则从所述工作 证书中提取工作公钥;
解密模块, 用于支付终端使用所述工作公钥解密所述加密后的第一随 机数据, 得到第二随机数据;
第二验证模块, 用于支付终端判断所述第一随机数据和所述第二随机 数据是否一致, 若是, 则身份验证通过, 允许激活支付终端; 所述智能 IC卡具体包括:
加密模块, 用于智能 IC卡使用所述私钥对所述第一随机数据进行加密
, 并将加密后的第一随机数据以及自身的工作证书发送至支付终端。 如权利要求 10所述的金融支付终端激活系统, 其特征在于, 还包括读 卡器, 智能 IC卡通过其与支付终端连接。
如权利要求 10所述的金融支付终端激活系统, 其特征在于, 所述智能 IC卡还包括:
第一结束模块, 用于若验证所述口令不通过, 则判定验证失败, 结束 流程。
如权利要求 10所述的金融支付终端激活系统, 其特征在于, 所述支付 终端还包括:
第二结束模块, 用于若支付终端验证所述工作证书不通过, 则判定验 证失败, 结束流程。
如权利要求 14所述的金融支付终端激活系统, 其特征在于, 所述第二 结束模块, 还用于若支付终端判定所述第一随机数据和所述第二随机 数据不一致, 则判定验证失败, 结束流程。
如权利要求 10所述的金融支付终端激活系统, 其特征在于, 所述支付 终端还包括:
激活模块, 用于支付终端将自身状态从拆机状态修改为正常使用状态 如权利要求 10所述的金融支付终端激活系统, 其特征在于, 还包括预 设模块, 用于预设与一智能 IC卡唯一对应的一口令。
如权利要求 10-17任意一项所述的金融支付终端激活系统, 其特征在 于, 所述支付终端为金融 POS机。
PCT/CN2017/108039 2017-10-27 2017-10-27 金融支付终端激活方法及其系统 WO2019080095A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780001447.2A CN107995985B (zh) 2017-10-27 2017-10-27 金融支付终端激活方法及其系统
PCT/CN2017/108039 WO2019080095A1 (zh) 2017-10-27 2017-10-27 金融支付终端激活方法及其系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/108039 WO2019080095A1 (zh) 2017-10-27 2017-10-27 金融支付终端激活方法及其系统

Publications (1)

Publication Number Publication Date
WO2019080095A1 true WO2019080095A1 (zh) 2019-05-02

Family

ID=62041339

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/108039 WO2019080095A1 (zh) 2017-10-27 2017-10-27 金融支付终端激活方法及其系统

Country Status (2)

Country Link
CN (1) CN107995985B (zh)
WO (1) WO2019080095A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636381A (zh) * 2018-12-12 2019-04-16 福建新大陆支付技术有限公司 一种基于ic卡的支付终端脱机授权方法及系统
CN109784910A (zh) * 2018-12-12 2019-05-21 福建新大陆支付技术有限公司 一种基于支付终端的脱机支付方法及支付终端
CN109508995A (zh) * 2018-12-12 2019-03-22 福建新大陆支付技术有限公司 一种基于支付终端的脱机授权方法及支付终端
CN111818033A (zh) * 2020-06-30 2020-10-23 中天掌金(北京)科技有限公司 一种移动金融终端的激活方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595718A (zh) * 2013-11-15 2014-02-19 拉卡拉支付有限公司 一种pos终端激活方法、系统、服务平台及pos终端
CN103716167A (zh) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 一种安全采集和分发传输密钥的方法及装置
CN104486323A (zh) * 2014-12-10 2015-04-01 福建联迪商用设备有限公司 一种pos终端安全受控的联网激活方法及装置
US20160321656A1 (en) * 2013-11-01 2016-11-03 Ilya Samuilovich Rabinovich Method and system for protecting information against unauthorized use (variants)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304315B (zh) * 2008-06-30 2010-11-03 北京飞天诚信科技有限公司 基于口令卡提高身份认证安全性的方法
CN101923621A (zh) * 2009-06-11 2010-12-22 科雅科技股份有限公司 数据读取保护方法
CN102254380A (zh) * 2010-05-31 2011-11-23 北京汇冠金财科技有限公司 基于混合加密机制的手机安全支付方法及系统
US9842335B2 (en) * 2012-03-23 2017-12-12 The Toronto-Dominion Bank System and method for authenticating a payment terminal
CN104123645B (zh) * 2014-07-15 2018-08-31 北京金科联信数据科技有限公司 基于金融安全认证的移动互联网智能支付终端及支付系统
CN104320261B (zh) * 2014-11-05 2018-06-15 北京大唐智能卡技术有限公司 金融智能卡上实现身份认证的方法、金融智能卡和终端
CN106709378A (zh) * 2017-02-16 2017-05-24 惠州Tcl移动通信有限公司 一种存储卡的加密方法及存储设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716167A (zh) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 一种安全采集和分发传输密钥的方法及装置
US20160321656A1 (en) * 2013-11-01 2016-11-03 Ilya Samuilovich Rabinovich Method and system for protecting information against unauthorized use (variants)
CN103595718A (zh) * 2013-11-15 2014-02-19 拉卡拉支付有限公司 一种pos终端激活方法、系统、服务平台及pos终端
CN104486323A (zh) * 2014-12-10 2015-04-01 福建联迪商用设备有限公司 一种pos终端安全受控的联网激活方法及装置

Also Published As

Publication number Publication date
CN107995985B (zh) 2020-05-05
CN107995985A (zh) 2018-05-04

Similar Documents

Publication Publication Date Title
CN106789018B (zh) 密钥远程获取方法和装置
CN106656488B (zh) 一种pos终端的密钥下载方法和装置
AU2011205391B2 (en) Anytime validation for verification tokens
EP2648163B1 (en) A personalized biometric identification and non-repudiation system
CN107248075B (zh) 一种实现智能密钥设备双向认证和交易的方法及装置
TW201741922A (zh) 一種基於生物特徵的安全認證方法及裝置
WO2014139343A1 (zh) 密钥下载方法、管理方法、下载管理方法及装置和系统
WO2019080095A1 (zh) 金融支付终端激活方法及其系统
CN101340294A (zh) 一种密码键盘装置及其实现方法
KR101724401B1 (ko) 생체 정보 인식과 키 분할 방식을 이용한 공인인증 시스템 및 그 방법, 그 방법을 수행하는 프로그램이 기록된 기록매체
US20150339665A1 (en) Post-manufacture configuration of pin-pad terminals
CN108540457B (zh) 一种安全设备及其生物认证控制方法和装置
KR20170005400A (ko) 암호화 시스템 및 방법
WO2018169470A1 (en) Updating biometric data templates
KR100939725B1 (ko) 모바일 단말기 인증 방법
CN112769574B (zh) 密钥注入方法和系统、密钥管理系统、设备及机器可读介质
JP2015138545A (ja) 電子支払システム及び電子支払方法
CN102622642A (zh) 空白智能卡发行系统
CN104134141A (zh) 一种基于时间同步的电子钱包系统的支付方法
CN104835038A (zh) 一种联网支付装置及方法
CN101933315B (zh) 可对抗木马程式采用用完即弃一次性密钥的加密认证键盘
WO2014187209A1 (zh) 一种备份电子签名令牌中信息的方法和系统
CN107690789A (zh) 使用本地因子对认证设备与至少一个认证服务器的通信进行认证的方法
CN101933287B (zh) 对抗木马程式用完即弃一次性密钥的加密认证装置和方法
WO2019232766A1 (zh) 交易方法、硬件钱包和交易设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17929489

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17929489

Country of ref document: EP

Kind code of ref document: A1