WO2019178762A1 - 一种验证终端合法性的方法、服务端及系统 - Google Patents

一种验证终端合法性的方法、服务端及系统 Download PDF

Info

Publication number
WO2019178762A1
WO2019178762A1 PCT/CN2018/079745 CN2018079745W WO2019178762A1 WO 2019178762 A1 WO2019178762 A1 WO 2019178762A1 CN 2018079745 W CN2018079745 W CN 2018079745W WO 2019178762 A1 WO2019178762 A1 WO 2019178762A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
legal
certificate
work
certificate corresponding
Prior art date
Application number
PCT/CN2018/079745
Other languages
English (en)
French (fr)
Inventor
王明伟
徐永标
Original Assignee
福建联迪商用设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 福建联迪商用设备有限公司 filed Critical 福建联迪商用设备有限公司
Priority to CN201880000190.3A priority Critical patent/CN108496194A/zh
Priority to PCT/CN2018/079745 priority patent/WO2019178762A1/zh
Publication of WO2019178762A1 publication Critical patent/WO2019178762A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3227Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights

Definitions

  • the present invention relates to the field of electronic payment security, and in particular, to a method, a server and a system for verifying the legitimacy of a terminal.
  • the terminal Pre-import the hardware serial number white list of the legal terminal.
  • the terminal reports its own hardware serial number.
  • the transaction background confirms whether the terminal is legal by querying the white list of the system.
  • the terminal and the shared secret information owned by the system are used. Authentication, for example, presetting a set of keys before the terminal leaves the factory.
  • the terminal and the background respond to the challenge through a set of random numbers, thereby confirming whether the terminal has the secret information, and possessing the secret information is considered a legitimate terminal.
  • the identity of the device is characterized by the serial number of the terminal device, but the serial number can be maliciously falsified during the transaction process, and other additional integrity verification mechanisms are required.
  • the terminal's legality is ensured by the shared secret information (key) of the terminal device and the system.
  • a symmetric key encryption mechanism is adopted, and the secret information needs to be preset to the terminal before the terminal leaves the factory, and the secret information is To be stored in the security zone of the terminal, the attack can be self-destructive; in addition, the secret information is preferably unique to each terminal, otherwise the secret information of one terminal is leaked, and all other terminals have security risks; To verify the legitimacy of the terminal, the secret information needs to be imported into the background of the verification system through some security channel, which requires the introduction of additional protection mechanisms, and also brings more points that require security control.
  • the technical problem to be solved by the present invention is to provide a safe, low-cost method, server and system for verifying the legitimacy of a terminal.
  • the technical solution adopted by the present invention is:
  • a method for verifying the legitimacy of a terminal includes the steps of:
  • S1 receiving transaction request information sent by the terminal, the transaction request information includes a work certificate corresponding to the terminal; S2, verifying whether the work certificate corresponding to the terminal is legal, and if yes, sending a set of random character strings to the terminal So that the terminal signs the random character string; S3, receiving the signed character string sent by the terminal, and verifying whether the signed string is legal by using the work certificate public key corresponding to the terminal. If yes, it is determined that the terminal is legal.
  • the second technical solution adopted by the present invention is:
  • a method for verifying the legitimacy of a terminal comprising the steps of:
  • the terminal sends the transaction request information to the server, where the transaction request information includes a work certificate corresponding to the terminal; S2, the server verifies whether the work certificate corresponding to the terminal is legal, and if yes, the server sends a set of random strings to the terminal; S3, the terminal receives the random string, and uses the work certificate private key corresponding to the terminal to sign the random string, and sends the signed string to the The server receives the signed character string sent by the terminal, and uses the working certificate public key corresponding to the terminal to verify whether the signed string is legal. If yes, the terminal is determined to be legal. .
  • the third technical solution adopted by the present invention is:
  • a server for verifying the legitimacy of a terminal comprising a first memory, a first processor, and a first computer program stored on the first memory and operable on the first processor, the first process The following steps are implemented when the first computer program is executed by the device:
  • S1 Receive transaction request information sent by the terminal, where the transaction request information includes a work certificate corresponding to the terminal;
  • the fourth technical solution adopted by the present invention is:
  • a system for verifying the legitimacy of a terminal comprising a server and a terminal, the server comprising a first memory, a first processor, and a first computer program stored on the first memory and operable on the first processor,
  • the terminal includes a second memory, a second processor, and a second computer program stored on the second memory and operable on the second processor,
  • the first processor implements the following steps when executing the first computer program:
  • the second processor implements the following steps when executing the second computer program:
  • the working certificate corresponding to the terminal is a set of random strings sent after being legal;
  • the invention has the beneficial effects that the server verifies the legality of the terminal by verifying the working certificate and the digital signature of the terminal, confirms whether the transaction is performed, and the working certificate of the terminal cannot be tampered with, and the public key digital signature mechanism is more secure, without Introducing an additional verification system back-end for even more cost savings.
  • FIG. 1 is a flowchart of a method for verifying the legality of a terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for verifying the legality of a terminal according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a server that verifies the legitimacy of a terminal according to an embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of a system for verifying the legitimacy of a terminal according to an embodiment of the present invention.
  • the server verifies the legality of the terminal by verifying the working certificate and digital signature of the terminal, confirms whether the transaction is performed, and the working certificate of the terminal cannot be tampered with, and the public key digital signature mechanism is more secure. No need to introduce additional verification system backends, which is more cost effective.
  • a method for verifying the legitimacy of a terminal includes the following steps:
  • S1 Receive transaction request information sent by the terminal, where the transaction request information includes a work certificate corresponding to the terminal;
  • the server has the following advantages: the server verifies the validity of the terminal by verifying the working certificate and the digital signature of the terminal, confirms whether the transaction is performed, and the working certificate of the terminal cannot be tampered with, and the digital signature is combined with the public key.
  • the mechanism is more secure and there is no need to introduce additional verification system backends, which is more cost effective.
  • the method further includes the following steps:
  • the CA certificate chain is issued by the CA certification center trusted by the manufacturer. If the terminal serial number or other related information is to be changed later, the legal CA certification center needs to re-issue the certificate, which enhances the security of the CA certificate chain.
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal specifically includes:
  • the work certificate corresponding to the terminal is verified by using the CA certificate chain with the legal authority, and the work certificate corresponding to the terminal is legal.
  • the CA certificate chain cannot be forged, and the work certificate corresponding to the terminal is verified by the CA certificate chain, thereby ensuring the security of the work certificate corresponding to the terminal.
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal further includes:
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal further includes:
  • the working certificate corresponding to the terminal further includes customized information of the terminal.
  • the customized information of the terminal is also verified. If the verification succeeds, the terminal corresponds to the customized information.
  • the work certificate is legal.
  • a method for verifying the legitimacy of a terminal includes the following steps:
  • the terminal sends the transaction request information to the server, where the transaction request information includes a work certificate corresponding to the terminal.
  • the server verifies whether the work certificate corresponding to the terminal is legal, and if yes, the server sends a set of random characters to the terminal;
  • the terminal receives the random string, and uses the working certificate private key corresponding to the terminal to sign the random string, and sends the signed string to the server.
  • S4 The server receives the signed character string sent by the terminal, and uses the working certificate public key corresponding to the terminal to verify whether the signed string is legal. If yes, the terminal is determined to be legal.
  • the server has the following advantages: the server verifies the validity of the terminal by verifying the working certificate and the digital signature of the terminal, confirms whether the transaction is performed, and the working certificate of the terminal cannot be tampered with, and the digital signature is combined with the public key.
  • the mechanism is more secure and there is no need to introduce additional verification system backends, which is more cost effective.
  • the method further includes the following steps:
  • the CA certification center issues a work certificate corresponding to the terminal for the terminal;
  • the CA certificate chain and the corresponding work certificate are issued by the CA certification center trusted by the manufacturer. If the terminal serial number or other related information is to be changed later, the legal CA certification center needs to re-issue the certificate and strengthen the CA certificate chain. The security of the work certificate corresponding to the terminal.
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal specifically includes:
  • the server verifies the work certificate corresponding to the terminal by using the CA certificate chain with the legal authority. If the verification is successful, the work certificate corresponding to the terminal is legal.
  • the CA certificate chain cannot be forged, and the work certificate corresponding to the terminal is verified by the CA certificate chain, thereby ensuring the security of the work certificate corresponding to the terminal.
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal further includes:
  • Importing terminal information with legal authority to the server to form a legal terminal whitelist the server parsing the work certificate corresponding to the terminal, and obtaining the certificate body content of the work certificate corresponding to the terminal;
  • the server compares the content of the certificate body of the work certificate corresponding to the terminal with the whitelist of the legal terminal, and if the legal terminal white list has the certificate body content of the work certificate corresponding to the terminal, the terminal The corresponding work certificate is legal.
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal further includes:
  • the working certificate corresponding to the terminal further includes customized information of the terminal, and when the server verifies whether the working certificate corresponding to the terminal is legal, the server further needs to verify the customized information of the terminal, and if the verification passes, the The work certificate corresponding to the terminal is legal.
  • step S3 specifically includes:
  • the terminal generates a random value, performs an exclusive-OR operation with the random string, and obtains a random string after the XOR, and the terminal uses the work certificate private key corresponding to the terminal to the random character after the XOR
  • the string is signed to obtain the signed string.
  • the random value generated by the terminal is XORed with the random string to further ensure the security and anti-forgery of the random string, and the terminal can sign the random string without additional services. End, reduce costs.
  • step S3 and step S4 the work certificate public key corresponding to the terminal and the work certificate private key corresponding to the terminal are generated by the certificate management system of the CA certification center, and are authenticated by the CA.
  • the center is issued and stored in the security zone of the terminal.
  • a server for verifying the legitimacy of a terminal includes a first memory, a first processor, and a first computer program stored on the first memory and operable on the first processor.
  • the first processor implements the following steps when executing the first computer program:
  • S1 Receive transaction request information sent by the terminal, where the transaction request information includes a work certificate corresponding to the terminal;
  • the server has the following advantages: the server verifies the validity of the terminal by verifying the working certificate and the digital signature of the terminal, confirms whether the transaction is performed, and the working certificate of the terminal cannot be tampered with, and the digital signature is combined with the public key.
  • the mechanism is more secure and there is no need to introduce additional verification system backends, which is more cost effective.
  • the method further includes the following steps:
  • the CA certificate chain is issued by the CA certification center trusted by the manufacturer. If the terminal serial number or other related information is to be changed later, the legal CA certification center needs to re-issue the certificate, which enhances the security of the CA certificate chain.
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal specifically includes:
  • the work certificate corresponding to the terminal is verified by using the CA certificate chain with the legal authority, and the work certificate corresponding to the terminal is legal.
  • the CA certificate chain cannot be forged, and the work certificate corresponding to the terminal is verified by the CA certificate chain, thereby ensuring the security of the work certificate corresponding to the terminal.
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal further includes:
  • the verifying, in the step S2, whether the work certificate corresponding to the terminal is legal further includes:
  • the working certificate corresponding to the terminal further includes customized information of the terminal.
  • the customized information of the terminal is also verified. If the verification succeeds, the terminal corresponds to the customized information.
  • the work certificate is legal.
  • a system for verifying the legitimacy of a terminal includes a server and a terminal, the server includes a first memory, a first processor, and is stored on the first memory and operable on the first processor. a first computer program, the terminal comprising a second memory, a second processor, and a second computer program stored on the second memory and operable on the second processor,
  • the first processor implements the following steps when executing the first computer program:
  • the second processor implements the following steps when executing the second computer program:
  • the working certificate corresponding to the terminal is a set of random strings sent after being legal;
  • the server has the following advantages: the server verifies the validity of the terminal by verifying the working certificate and the digital signature of the terminal, confirms whether the transaction is performed, and the working certificate of the terminal cannot be tampered with, and the digital signature is combined with the public key.
  • the mechanism is more secure and there is no need to introduce additional verification system backends, which is more cost effective.
  • CA certification center includes a third memory, a third processor, and a third computer program stored on the third memory and operable on the third processor, where the third processor executes
  • the third computer program implements the following steps:
  • the step S1 further includes the steps before:
  • the CA certificate chain and the corresponding work certificate are issued by the CA certification center trusted by the manufacturer. If the terminal serial number or other related information is to be changed later, the legal CA certification center needs to re-issue the certificate and strengthen the CA certificate chain. The security of the work certificate corresponding to the terminal.
  • the server verifies the work certificate corresponding to the terminal by using the CA certificate chain with the legal authority. If the verification is successful, the work certificate corresponding to the terminal is legal.
  • the CA certificate chain cannot be forged, and the work certificate corresponding to the terminal is verified by the CA certificate chain, thereby ensuring the security of the work certificate corresponding to the terminal.
  • verifying that the working certificate corresponding to the terminal is legal is further included:
  • Importing terminal information with legal authority to the server to form a legal terminal whitelist the server parsing the work certificate corresponding to the terminal, and obtaining the certificate body content of the work certificate corresponding to the terminal;
  • the server compares the content of the certificate body of the work certificate corresponding to the terminal with the whitelist of the legal terminal, and if the legal terminal white list has the certificate body content of the work certificate corresponding to the terminal, the terminal The corresponding work certificate is legal.
  • verifying that the working certificate corresponding to the terminal is legal is further included:
  • the working certificate corresponding to the terminal further includes customized information of the terminal, and when the server verifies whether the working certificate corresponding to the terminal is legal, the server further needs to verify the customized information of the terminal, and if the verification passes, the The work certificate corresponding to the terminal is legal.
  • step S3 specifically includes:
  • the terminal generates a random value, performs an exclusive-OR operation with the random string, and obtains a random string after the XOR, and the terminal uses the work certificate private key corresponding to the terminal to the random character after the XOR
  • the string is signed to obtain the signed string.
  • the random value generated by the terminal is XORed with the random string to further ensure the security and anti-forgery of the random string, and the terminal can sign the random string without additional services. End, reduce costs.
  • step S3 and step S4 the work certificate public key corresponding to the terminal and the work certificate private key corresponding to the terminal are generated by the certificate management system of the CA certification center, and are authenticated by the CA.
  • the center is issued and stored in the security zone of the terminal.
  • a first embodiment of the present invention is:
  • a method for verifying the legitimacy of a terminal comprising the steps of:
  • S1 Receive transaction request information sent by the terminal, where the transaction request information includes a work certificate corresponding to the terminal;
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, specifically:
  • the work certificate corresponding to the terminal is verified by using the CA certificate chain with the legal authority, and the work certificate corresponding to the terminal may be an X.509 certificate. If the verification is passed, the work certificate corresponding to the terminal is legal.
  • the X.509 certificate mechanism further ensures that the CA certificate cannot be forged.
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, and the method further includes:
  • the certificate body content includes the terminal model number, serial number, version information, and the like.
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, and the method further includes:
  • the working certificate corresponding to the terminal further includes customized information of the terminal.
  • the customized information of the terminal is also verified. If the verification succeeds, the terminal corresponds to the customized information.
  • the work certificate is legal.
  • the second embodiment of the present invention is:
  • the CA certification center issues a work certificate corresponding to the terminal for the terminal;
  • the terminal sends the transaction request information to the server, where the transaction request information includes a work certificate corresponding to the terminal.
  • the server verifies whether the work certificate corresponding to the terminal is legal, and if yes, the server sends a set of random characters to the terminal;
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, specifically:
  • the server verifies the work certificate corresponding to the terminal by using the CA certificate chain with the legal authority, and the work certificate corresponding to the terminal may be an X.509 certificate, and if the verification passes, the work corresponding to the terminal
  • the certificate is legal, and the X.509 certificate mechanism further ensures that the CA certificate cannot be forged.
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, and the method further includes:
  • the server parsing the work certificate corresponding to the terminal, and obtaining the certificate body content of the work certificate corresponding to the terminal, the certificate body content Including the terminal model number, serial number, version information, and the like;
  • the server compares the content of the certificate body of the work certificate corresponding to the terminal with the whitelist of the legal terminal, and if the legal terminal white list has the certificate body content of the work certificate corresponding to the terminal, the terminal The corresponding work certificate is legal.
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, and the method further includes:
  • the working certificate corresponding to the terminal further includes customized information of the terminal, and when the server verifies whether the working certificate corresponding to the terminal is legal, the server further needs to verify the customized information of the terminal, and if the verification passes, the The work certificate corresponding to the terminal is legal.
  • the terminal receives the random string, and uses the working certificate private key corresponding to the terminal to sign the random string, and sends the signed string to the server.
  • step S3 specifically includes:
  • the terminal generates a random value, performs an exclusive-OR operation with the random string, and obtains a random string after the XOR, and the terminal uses the work certificate private key corresponding to the terminal to the random character after the XOR
  • the signature of the string is obtained, and the signed string is obtained.
  • the private key of the work certificate is issued by the CA certification center and cannot be tampered with.
  • S4 The server receives the signed character string sent by the terminal, and uses the working certificate public key corresponding to the terminal to verify whether the signed string is legal. If yes, the terminal is determined to be legal.
  • the work certificate public key corresponding to the terminal in the step S3 and the step S4 and the work certificate private key corresponding to the terminal are generated by the certificate management system of the CA certificate center, and are issued by the CA certificate center. It is stored in the security zone of the terminal, and it is more secure to use the RSA public-private key pair to perform the public key verification digital signature under the asymmetric key mechanism.
  • Embodiment 3 of the present invention is:
  • the main task is to distribute the terminal certificate for the POS.
  • You can also use the certificate service provided by the third-party CA certification center to issue certificates for the POS terminal.
  • the root CA certificate trusted by the CA certificate center is preset in the burnt film of the POS terminal.
  • the POS terminal generation phase the POS terminal initiates a certificate request to the CA certificate center, and the CA certificate center is the POS.
  • the terminal issues a work certificate corresponding to the POS terminal, where the work certificate includes valid information of the POS terminal, such as transaction background information, hardware serial number, model number, etc. to be connected;
  • the CA certificate chain with the legal authority and the terminal information with the legal authority are imported into the KMS, and the terminal information with the legal authority includes the terminal hardware serial number, the model number, and the like, and the imported terminal information with the legal authority is legally formed.
  • Terminal whitelist
  • the POS terminal sends the transaction request information to the KMS, the request information includes a work certificate corresponding to the POS terminal and customization information of the POS terminal, and the customization information of the POS terminal may be a KMS number.
  • the KMS verifies the work certificate corresponding to the POS terminal through the CA certificate chain. If it is legal, extracts the certificate body content in the work certificate corresponding to the POS terminal, and the content of the certificate body and the legal terminal The whitelist is verified. If it is legal, the customization information of the POS terminal is extracted, and the KMS number recorded in the customization information of the POS terminal is verified. If the same, the work certificate corresponding to the POS terminal is legal, the KMS.
  • the POS terminal Sending a set of random strings to the POS terminal, the POS terminal generates a random value, performing an exclusive-OR operation with the random string, and using the private key pair of the RSA public-private key pair generated by the CA authentication center Or a random string signature, to obtain a signed random string, and send the signed random string to the KMS, where the KMS receives the random word
  • the character string is extracted, and the RSA public key corresponding to the working certificate corresponding to the POS terminal is used to verify the signed character string. If it is legal, the terminal is determined to be legal. If the verification fails in any of the above steps, the transaction is terminated.
  • Embodiment 4 of the present invention is:
  • a server 1 for verifying the legitimacy of a terminal comprising a first memory 2, a first processor 3, and a first computer program stored on the first memory 2 and operable on the first processor 3,
  • the first processor implements the following steps when executing the first computer program:
  • S1 Receive transaction request information sent by the terminal, where the transaction request information includes a work certificate corresponding to the terminal;
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, specifically:
  • the work certificate corresponding to the terminal is verified by using the CA certificate chain with the legal authority, and the work certificate corresponding to the terminal may be an X.509 certificate. If the verification is passed, the work certificate corresponding to the terminal is legal.
  • the X.509 certificate mechanism further ensures that the CA certificate cannot be forged.
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, and the method further includes:
  • the certificate body content includes the terminal model number, serial number, version information, and the like.
  • step S2 it is verified whether the work certificate corresponding to the terminal is legal, and the method further includes:
  • the working certificate corresponding to the terminal further includes customized information of the terminal.
  • the customized information of the terminal is also verified. If the verification succeeds, the terminal corresponds to the customized information.
  • the work certificate is legal.
  • Embodiment 5 of the present invention is:
  • a system 10 for verifying the legitimacy of a terminal comprising a server 1, a terminal 4 and a CA authentication center 7, the server 1 comprising a first memory 2, a first processor 3, and being stored on the first memory 2 and a first computer program running on the first processor 3, the terminal 4 comprising a second memory 5, a second processor 6, and a second computer stored on the second memory 5 and operable on the second processor 6.
  • the CA certificate center 7 includes a third memory 8, a third processor 9, and a third computer program stored on the third memory 8 and operable on the third processor 9,
  • the first processor implements the following steps when executing the first computer program:
  • the verification of the work certificate corresponding to the terminal 4 is legal, and specifically includes:
  • the work certificate corresponding to the terminal 4 is verified by using the CA certificate chain with the legal authority.
  • the work certificate corresponding to the terminal may be an X.509 certificate. If the verification is passed, the work certificate corresponding to the terminal 4 is Legally, the X.509 certificate mechanism further ensures that the CA certificate cannot be forged.
  • the verification of the work certificate corresponding to the terminal 4 is legal, and further includes:
  • the content of the certificate body of the work certificate corresponding to the terminal 4 is compared with the whitelist of the legal terminal. If the content of the certificate body of the work certificate corresponding to the terminal 4 exists in the whitelist of the legal terminal, the terminal 4 corresponds to The work certificate is legal.
  • the verification of the work certificate corresponding to the terminal 4 is legal, and further includes:
  • the work certificate corresponding to the terminal 4 further includes the customization information of the terminal 4, and when verifying whether the work certificate corresponding to the terminal 4 is legal, the customized information of the terminal 4 is also verified, and if the verification is passed, the The work certificate corresponding to the terminal 4 is legal.
  • the work certificate public key corresponding to the terminal and the work certificate private key corresponding to the terminal are generated by the certificate management system of the CA certification center 7 and are issued by the CA certificate center, and are stored in the terminal security. In the area, it is safer to use the RSA public-private key pair to perform the public key verification digital signature under the asymmetric key mechanism.
  • the second processor implements the following steps when executing the second computer program:
  • the transaction request information including a work certificate corresponding to the terminal 4;
  • the signing the random string by using a private key specifically includes:
  • the third processor implements the following steps when executing the third computer program:
  • the terminal 4 Before the terminal 4 sends the transaction request information, the terminal 4 issues a work certificate corresponding to the terminal 4; and imports the CA certificate chain with legal authority into the server 1.
  • the present invention provides a method, a server, and a system for verifying the legitimacy of a terminal, through a service certificate corresponding to the terminal, a valid information of the terminal, customized information of the terminal, and a work permit corresponding to the terminal.
  • the RSA public-private key pair is verified to determine the legitimacy of the terminal, and whether the transaction is performed.
  • the work certificate corresponding to the terminal cannot be tampered with.
  • the public key digital signature mechanism is more secure, and no additional verification system background is needed, which is more cost-effective.

Abstract

本发明公开了一种验证终端合法性的方法、服务端及系统,终端发送交易请求信息给服务端,所述交易请求信息包含所述终端对应的工作证书;所述服务端验证所述终端对应的工作证书是否合法,若是,则所述服务端发送一组随机字符串至所述终端;所述终端收到所述随机字符串,使用所述终端对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端;所述服务端接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法,终端对应的工作证书无法篡改,结合公钥数字签名机制更加安全,无需引入额外的验证系统后台,更加节约成本。

Description

一种验证终端合法性的方法、服务端及系统 技术领域
本发明涉及电子支付安全领域,尤其涉及一种验证终端合法性的方法、服务端及系统。
背景技术
电子支付行业中,使用非对称密钥方案给交易终端远程注入密钥方案已逐渐为收单机构接受。远程下载密钥,人们首要关心的是远程的终端身份是否合法,如果非法终端连接到密钥下载后台并通过认证,会造成金融密钥泄露的风险。传统的识别终端合法性的技术主要有:
1、预先导入合法终端的硬件序列号白名单,交易时终端上报自己的硬件序列号,交易后台通过查询系统的白名单来确认终端是否合法;2、通过终端和系统拥有的共享秘密信息来进行认证,比如在终端出厂前预置一组密钥,在交易时终端和后台通过一组随机数字进行挑战应答,依此确认终端是否拥有该秘密信息,拥有秘密信息则认为是合法终端。
上述方法存在的缺点是:
1、通过终端设备的序列号表征设备的身份,但序列号可以在交易过程中被恶意篡改,需要其他额外的完整性验证机制。2、通过终端设备和系统的共享秘密信息(密钥)来保证终端合法性,本质上是采用对称密钥加密的机制,需要在终端出厂前将该秘密信息预置到终端,且该秘密信息要存放在终端的安全区中,能够做到攻击自毁;此外,该秘密信息最好做到每台终端唯一,否则一台终端的秘密信息泄露,其他所有终端都存在安全隐患;最后,如果要验证终端的合法性,需要将该秘密信息通过某种安全渠道导入到验证系统的后台,由此需要引入额外的保护机制,同时也带来了更多需要安全管控的点。
技术问题
本发明所要解决的技术问题是:提供一种安全、低成本的验证终端合法性的方法、服务端及系统。
技术解决方案
为了解决上述技术问题,本发明采用的技术方案为:
提供一种验证终端合法性的方法,包括步骤:
S1、接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;S2、验证所述终端对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;S3、接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
为了解决上述技术问题,本发明采用的第二种技术方案为:
一种验证终端合法性的方法,包括步骤:
S1、终端发送交易请求信息给服务端,所述交易请求信息包含所述终端对应的工作证书;S2、所述服务端验证所述终端对应的工作证书是否合法,若是,则所述服务端发送一组随机字符串至所述终端;S3、所述终端接收所述随机字符串,使用所述终端对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端;S4、所述服务端接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
为了解决上述技术问题,本发明采用的第三种技术方案为:
一种验证终端合法性的服务端,包括第一存储器、第一处理器以及存储在所述第一存储器上并可在所述第一处理器上运行的第一计算机程序,所述第一处理器执行所述第一计算机程序时实现以下步骤:
S1、接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
S2、验证所述终端对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
S3、接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
为了解决上述技术问题,本发明采用的第四种技术方案为:
一种验证终端合法性的系统,包括服务端和终端,所述服务端包括第一存储器、第一处理器及存储在第一存储器上并可在第一处理器上运行的第一计算机程序,所述终端包括第二存储器、第二处理器及存储在第二存储器上并可在第二处理器上运行的第二计算机程序,
所述第一处理器执行所述第一计算机程序时实现以下步骤:
接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
验证所述终端对应的工作证书是否合法,若是,则送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
所述第二处理器执行所述第二计算机程序时实现以下步骤:
发送交易请求信息给服务端,所述交易请求信息包含所述终端对应的工作证书;
接收所述随机字符串,使用所述终端对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端,所述随机字符串为所述服务端通过验证所述终端对应的工作证书为合法后发送的一组随机字符串;
有益效果
本发明的有益效果在于:服务端通过验证终端的工作证书和数字签名,对终端的合法性进行判定,确认是否进行交易,终端的工作证书无法被篡改,结合公钥数字签名机制更加安全,无需引入额外的验证系统后台,更加节约成本。
附图说明
图1为本发明实施例的验证终端合法性的方法的流程图;
图2为本发明实施例的验证终端合法性的方法的流程图;
图3为本发明实施例的验证终端合法性的服务端的结构示意图;
图4为本发明实施例的验证终端合法性的系统的结构示意图;
标号说明:
1、服务端;2、第一存储器;3、第一处理器;4、终端;5、第二存储器;6、第二处理器;7、CA认证中心;8、第三存储器;9、第三处理器;10、验证终端合法性的系统。
具体实施方式
本发明最关键的构思在于: 服务端通过验证终端的工作证书和数字签名,对终端的合法性进行判定,确认是否进行交易,终端的工作证书无法被篡改,结合公钥数字签名机制更加安全,无需引入额外的验证系统后台,更加节约成本。
请参照图1,一种验证终端合法性的方法,包括步骤:
S1、接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
S2、验证所述终端对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
S3、接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
从上述描述可知,本发明的有益效果在于:服务端通过验证终端的工作证书和数字签名,对终端的合法性进行判定,确认是否进行交易,终端的工作证书无法被篡改,结合公钥数字签名机制更加安全,无需引入额外的验证系统后台,更加节约成本。
进一步的,所述步骤S1之前还包括步骤:
S0、导入具有合法权限的CA证书链。
由上述描述可知,CA证书链是由厂家信任的CA认证中心颁发,后续如果要更改终端序列号或其他相关信息,需要合法CA认证中心重新签发证书,加强了CA证书链的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,验证通过,则所述终端对应的工作证书是合法的。
由上述描述可知,CA证书链无法被伪造,通过所述CA证书链对所述终端对应的工作证书进行验证,保证了所述终端对应的工作证书的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
导入具有合法权限的终端信息,形成合法终端白名单;
解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
由上述描述可知,通过所述工作证书的证书主体内容对工作证书的合法性进行验证,进一步保证了所述终端对应的工作证书的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
所述终端对应的工作证书中还包括终端的定制信息,在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
由上述描述可知,通过所述工作证书中终端的定制信息对工作证书的合法性进行验证,进一步保证了所述终端对应的工作证书的安全性。
请参照图2,一种验证终端合法性的方法,包括步骤:
S1、终端发送交易请求信息给服务端,所述交易请求信息包含所述终端对应的工作证书;
S2、所述服务端验证所述终端对应的工作证书是否合法,若是,则所述服务端发送一组随机字符串至所述终端;
S3、所述终端收到所述随机字符串,使用所述终端对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端;
S4、所述服务端接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
从上述描述可知,本发明的有益效果在于:服务端通过验证终端的工作证书和数字签名,对终端的合法性进行判定,确认是否进行交易,终端的工作证书无法被篡改,结合公钥数字签名机制更加安全,无需引入额外的验证系统后台,更加节约成本。
进一步的,所述步骤S1之前还包括步骤:
S01、CA认证中心为终端签发与终端对应的工作证书;
S02、CA认证中心将具有合法权限的CA证书链导入服务端。
由上述描述可知,CA证书链和终端对应的工作证书是由厂家信任的CA认证中心颁发,后续如果要更改终端序列号或其他相关信息,需要合法CA认证中心重新签发证书,加强了CA证书链和终端对应的工作证书的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
所述服务端使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,验证通过,则所述终端对应的工作证书是合法的。
由上述描述可知,CA证书链无法被伪造,通过所述CA证书链对所述终端对应的工作证书进行验证,保证了所述终端对应的工作证书的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
导入具有合法权限的终端信息到所述服务端,形成合法终端白名单,所述服务端解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
所述服务端将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
由上述描述可知,通过所述工作证书的证书主体内容对工作证书的合法性进行验证,进一步保证了所述终端对应的工作证书的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
所述终端对应的工作证书中还包括终端的定制信息,所述服务端在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
由上述描述可知,通过所述工作证书中终端的定制信息对工作证书的合法性进行验证,进一步保证了所述终端对应的工作证书的安全性。
进一步的,步骤S3所述使用私钥对所述随机字符串进行签名具体包括:
所述终端生成一个随机值,与所述随机字符串进行异或操作,获得异或后的随机字符串,所述终端使用所述终端对应的工作证书私钥对所述异或后的随机字符串签名,得到所述签名后的字符串。
由上述描述可知,将所述终端生成的随机值与所述随机字符串进行异或操作,进一步确保随机字符串的安全性和防伪造性,所述终端可以对随机字符串签名,无需额外服务端,降低成本。
进一步的,步骤S3和步骤S4中所述终端对应的工作证书公钥和所述终端对应的工作证书私钥均为由CA认证中心的证书管理系统生成RSA公私钥对,并由所述CA认证中心签发,存储在终端的安全区中。
由上述描述可知,所述由CA认证中心生成的终端对应的工作证书公钥和私钥更加安全,无法被篡改。
请参照图3,一种验证终端合法性的服务端,包括第一存储器、第一处理器以及存储在所述第一存储器上并可在所述第一处理器上运行的第一计算机程序,所述第一处理器执行所述第一计算机程序时实现以下步骤:
S1、接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
S2、验证所述终端对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
S3、接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
从上述描述可知,本发明的有益效果在于:服务端通过验证终端的工作证书和数字签名,对终端的合法性进行判定,确认是否进行交易,终端的工作证书无法被篡改,结合公钥数字签名机制更加安全,无需引入额外的验证系统后台,更加节约成本。
进一步的,所述步骤S1之前还包括步骤:
S0、导入具有合法权限的CA证书链。
由上述描述可知,CA证书链是由厂家信任的CA认证中心颁发,后续如果要更改终端序列号或其他相关信息,需要合法CA认证中心重新签发证书,加强了CA证书链的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,验证通过,则所述终端对应的工作证书是合法的。
由上述描述可知,CA证书链无法被伪造,通过所述CA证书链对所述终端对应的工作证书进行验证,保证了所述终端对应的工作证书的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
导入具有合法权限的终端信息,形成合法终端白名单;
解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
由上述描述可知,通过所述工作证书的证书主体内容对工作证书的合法性进行验证,进一步保证了所述终端对应的工作证书的安全性。
进一步的,步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
所述终端对应的工作证书中还包括终端的定制信息,在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
由上述描述可知,通过所述工作证书中终端的定制信息对工作证书的合法性进行验证,进一步保证了所述终端对应的工作证书的安全性。
请参照图4,一种验证终端合法性的系统,包括服务端和终端,所述服务端包括第一存储器、第一处理器及存储在第一存储器上并可在第一处理器上运行的第一计算机程序,所述终端包括第二存储器、第二处理器及存储在第二存储器上并可在第二处理器上运行的第二计算机程序,
所述第一处理器执行所述第一计算机程序时实现以下步骤:
接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
验证所述终端对应的工作证书是否合法,若是,则所述服务端发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
所述第二处理器执行所述第二计算机程序时实现以下步骤:
发送交易请求信息给服务端,所述交易请求信息包含所述终端对应的工作证书;
接收所述随机字符串,使用所述终端对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端,所述随机字符串为所述服务端通过验证所述终端对应的工作证书为合法后发送的一组随机字符串;
从上述描述可知,本发明的有益效果在于:服务端通过验证终端的工作证书和数字签名,对终端的合法性进行判定,确认是否进行交易,终端的工作证书无法被篡改,结合公钥数字签名机制更加安全,无需引入额外的验证系统后台,更加节约成本。
进一步的,还包括CA认证中心,CA认证中心包括第三存储器、第三处理器及存储在第三存储器上并可在第三处理器上运行的第三计算机程序,所述第三处理器执行所述第三计算机程序时实现以下步骤:
所述步骤S1之前还包括步骤:
为终端签发与终端对应的工作证书;将具有合法权限的CA证书链导入服务端。
由上述描述可知,CA证书链和终端对应的工作证书是由厂家信任的CA认证中心颁发,后续如果要更改终端序列号或其他相关信息,需要合法CA认证中心重新签发证书,加强了CA证书链和终端对应的工作证书的安全性。
进一步的,所述验证所述终端对应的工作证书是否合法,具体包括:
所述服务端使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,验证通过,则所述终端对应的工作证书是合法的。
由上述描述可知,CA证书链无法被伪造,通过所述CA证书链对所述终端对应的工作证书进行验证,保证了所述终端对应的工作证书的安全性。
进一步的,所述验证所述终端对应的工作证书是否合法,还包括:
导入具有合法权限的终端信息到所述服务端,形成合法终端白名单,所述服务端解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
所述服务端将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
由上述描述可知,通过所述工作证书的证书主体内容对工作证书的合法性进行验证,进一步保证了所述终端对应的工作证书的安全性。
进一步的,所述验证所述终端对应的工作证书是否合法,还包括:
所述终端对应的工作证书中还包括终端的定制信息,所述服务端在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
由上述描述可知,通过所述工作证书中终端的定制信息对工作证书的合法性进行验证,进一步保证了所述终端对应的工作证书的安全性。
进一步的,步骤S3所述使用私钥对所述随机字符串进行签名具体包括:
所述终端生成一个随机值,与所述随机字符串进行异或操作,获得异或后的随机字符串,所述终端使用所述终端对应的工作证书私钥对所述异或后的随机字符串签名,得到所述签名后的字符串。
由上述描述可知,将所述终端生成的随机值与所述随机字符串进行异或操作,进一步确保随机字符串的安全性和防伪造性,所述终端可以对随机字符串签名,无需额外服务端,降低成本。
进一步的,步骤S3和步骤S4中所述终端对应的工作证书公钥和所述终端对应的工作证书私钥均为由CA认证中心的证书管理系统生成RSA公私钥对,并由所述CA认证中心签发,存储在终端的安全区中。
由上述描述可知,所述由CA认证中心生成的终端对应的工作证书公钥和私钥更加安全,无法被篡改。
请参照图1,本发明的实施例一为:
一种验证终端合法性的方法,包括步骤:
S0、导入具有合法权限的CA证书链。
S1、接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
S2、验证所述终端对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,所述终端对应的工作证书可以是X.509证书,若验证通过,则所述终端对应的工作证书是合法的,X.509证书机制进一步保证了所述CA证书无法伪造。
步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
导入具有合法权限的终端信息,形成合法终端白名单;
解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法,所述证书主体内容包括所述终端型号、序列号和版本信息等。
步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
所述终端对应的工作证书中还包括终端的定制信息,在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
S3、接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
请参照图2,本发明的实施例二为:
S01、CA认证中心为终端签发与终端对应的工作证书;
S02、CA认证中心将具有合法权限的CA证书链导入服务端。
S1、终端发送交易请求信息给服务端,所述交易请求信息包含所述终端对应的工作证书;
S2、所述服务端验证所述终端对应的工作证书是否合法,若是,则所述服务端发送一组随机字符串至所述终端;
步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
所述服务端使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,所述终端对应的工作证书可以是X.509证书,若验证通过,则所述终端对应的工作证书是合法的,X.509证书机制进一步保证了所述CA证书无法伪造。
步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
导入具有合法权限的终端信息到所述服务端,形成合法终端白名单,所述服务端解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容,所述证书主体内容包括所述终端型号、序列号和版本信息等;
所述服务端将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
所述终端对应的工作证书中还包括终端的定制信息,所述服务端在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
S3、所述终端收到所述随机字符串,使用所述终端对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端;
步骤S3所述使用私钥对所述随机字符串进行签名具体包括:
所述终端生成一个随机值,与所述随机字符串进行异或操作,获得异或后的随机字符串,所述终端使用所述终端对应的工作证书私钥对所述异或后的随机字符串签名,得到所述签名后的字符串,所述工作证书私钥是由CA认证中心颁发,无法被篡改。
S4、所述服务端接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
步骤S3和步骤S4中所述终端对应的工作证书公钥和所述终端对应的工作证书私钥均为由CA认证中心的证书管理系统生成RSA公私钥对,并由所述CA认证中心签发,存储在终端的安全区中,使用RSA公私钥对进行非对称密钥机制下公钥验证数字签名的方法,更加安全。
本发明的实施例三为:
将实施例二所述的方法应用于具体的场景,比如KMS(Key Management System)密钥管理系统验证POS(Point Of Sale)销售点终端合法性的过程如下:
首先部署CA(Certification Authority)认证中心,搭建有效的PKI(Public Key Infrastructure)公开密钥基础架构技术体系。
可以采取厂商建立自己的CA认证中心的方式,其主要任务是为POS分发终端证书等,也可以使用第三方CA认证中心提供的证书服务为POS终端颁证。
然后在POS终端的烧片中预置CA认证中心信任的根CA证书,在所述POS终端生成阶段,由所述POS终端向所述CA认证中心发起证书请求,由CA认证中心为所述POS终端签发与所述POS终端对应的工作证书,该工作证书包含了所述POS终端的有效信息,比如要连接的交易后台信息、硬件序列号、型号等;
接着将具有合法权限的CA证书链和具有合法权限的终端信息导入到KMS中,所述具有合法权限的终端信息包括终端硬件序列号、型号等,导入的所述具有合法权限的终端信息形成合法终端白名单;
在交易过程中,所述POS终端发送交易请求信息至所述KMS,所述请求信息包括所述POS终端对应的工作证书和POS终端的定制信息,所述POS终端的定制信息可以是KMS的编号,所述KMS通过CA证书链对所述POS终端对应的工作证书进行验证,若合法,则提取所述POS终端对应的工作证书中的证书主体内容,将所述证书主体内容与所述合法终端白名单进行验证,若合法,则提取所述POS终端的定制信息,对所述POS终端定制信息中记录的KMS编号进行验证,若相同,则所述POS终端对应的工作证书合法,所述KMS发送一组随机字符串给所述POS终端,所述POS终端生成一个随机值,与所述随机字符串进行异或操作,使用由CA认证中心生成的RSA公私钥对的私钥对所述异或后的随机字符串签名,得到签名后的随机字符串,将所述签名后的随机字符串发送给所述KMS,所述KMS收到所述随机字符串,提取所述POS终端对应的工作证书RSA公钥对所述签名后的字符串进行验证,若合法,则确定所述终端合法,若以上任意一步验证失败,则终止交易。
请参照图3,本发明的实施例四为:
一种验证终端合法性的服务端1,包括第一存储器2、第一处理器3以及存储在所述第一存储器2上并可在所述第一处理器3上运行的第一计算机程序,所述第一处理器执行所述第一计算机程序时实现以下步骤:
S0、导入具有合法权限的CA证书链。
S1、接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
S2、验证所述终端对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,所述终端对应的工作证书可以是X.509证书,若验证通过,则所述终端对应的工作证书是合法的,X.509证书机制进一步保证了所述CA证书无法伪造。
步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
导入具有合法权限的终端信息,形成合法终端白名单;
解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法,所述证书主体内容包括所述终端型号、序列号和版本信息等。
步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
所述终端对应的工作证书中还包括终端的定制信息,在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
S3、接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
请参照图4,本发明的实施例五为:
一种验证终端合法性的系统10,包括服务端1、终端4和CA认证中心7,所述服务端1包括第一存储器2、第一处理器3及存储在第一存储器2上并可在第一处理器3上运行的第一计算机程序,所述终端4包括第二存储器5、第二处理器6及存储在第二存储器5上并可在第二处理器6上运行的第二计算机程序,所述CA认证中心7包括第三存储器8、第三处理器9及存储在第三存储器8上并可在第三处理器9上运行的第三计算机程序,
所述第一处理器执行所述第一计算机程序时实现以下步骤:
接收终端4发送的交易请求信息,所述交易请求信息包含所述终端4对应的工作证书;
验证所述终端4对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端4;
所述验证所述终端4对应的工作证书是否合法,具体包括:
使用所述具有合法权限的CA证书链对所述终端4对应的工作证书进行验证,所述终端对应的工作证书可以是X.509证书,若验证通过,则所述终端4对应的工作证书是合法的,X.509证书机制进一步保证了所述CA证书无法伪造。
所述验证所述终端4对应的工作证书是否合法,还包括:
导入具有合法权限的终端信息,形成合法终端白名单,解析所述终端4对应的工作证书,获得所述终端4对应的工作证书的证书主体内容,所述证书主体内容包括所述终端型号、序列号和版本信息等;
所述终端4对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端4对应的工作证书的证书主体内容,则所述终端4对应的工作证书合法。
所述验证所述终端4对应的工作证书是否合法,还包括:
所述终端4对应的工作证书中还包括终端4的定制信息,在验证所述终端4对应的工作证书是否合法时,还需对所述终端4的定制信息进行验证,若验证通过,则所述终端4对应的工作证书是合法的。
接收所述终端4发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
所述终端对应的工作证书公钥和所述终端对应的工作证书私钥均为由CA认证中心7的证书管理系统生成RSA公私钥对,并由所述CA认证中心签发,存储在终端的安全区中,使用RSA公私钥对进行非对称密钥机制下公钥验证数字签名的方法,更加安全。
所述第二处理器执行所述第二计算机程序时实现以下步骤:
发送交易请求信息给服务端1,所述交易请求信息包含所述终端4对应的工作证书;
接收所述随机字符串,使用所述终端4对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端1,所述随机字符串为所述服务端1通过验证所述终端4对应的工作证书为合法后发送的一组随机字符串;
所述使用私钥对所述随机字符串进行签名具体包括:
生成一个随机值,与所述随机字符串进行异或操作,获得异或后的随机字符串,使用所述终端4对应的工作证书私钥对所述异或后的随机字符串签名,得到所述签名后的字符串,所述工作证书私钥是由CA认证中心颁发,无法被篡改。所述第三处理器执行所述第三计算机程序时实现以下步骤:
在所述终端4发送交易请求信息之前,为所述终端4签发与所述终端4对应的工作证书;将具有合法权限的CA证书链导入所述服务端1。
综上所述,本发明提供的一种验证终端合法性的方法、服务端及系统,通过服务端对终端对应的工作证书,终端的有效信息,终端的定制信息和存在终端对应的工作证中的RSA公私钥对进行验证,判断终端合法性,确认是否进行交易,终端对应的工作证书无法篡改,结合公钥数字签名机制更加安全,无需引入额外的验证系统后台,更加节约成本。

Claims (24)

  1. 一种验证终端合法性的方法,其特征在于,包括步骤:
    S1、接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
    S2、验证所述终端对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
    S3、接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
  2. 根据权利要求1所述的一种验证终端合法性的方法,其特征在于,
    所述步骤S1之前还包括步骤:
    S0、导入具有合法权限的CA证书链。
  3. 根据权利要求2所述的一种验证终端合法性的方法,其特征在于,
    步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
    使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,验证通过,则所述终端对应的工作证书是合法的。
  4. 根据权利要求3所述的一种验证终端合法性的方法,其特征在于,
    步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
    导入具有合法权限的终端信息,形成合法终端白名单;
    解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
    将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
  5. 根据权利要求3或4所述的一种验证终端合法性的方法,其特征在于,
    步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
    所述终端对应的工作证书中还包括终端的定制信息,在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
  6. 一种验证终端合法性的方法,其特征在于,包括步骤:
    S1、终端发送交易请求信息给服务端,所述交易请求信息包含所述终端对应的工作证书;
    S2、所述服务端验证所述终端对应的工作证书是否合法,若是,则所述服务端发送一组随机字符串至所述终端;
    S3、所述终端收到所述随机字符串,使用所述终端对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端;
    S4、所述服务端接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
  7. 根据权利要求6所述的一种验证终端合法性的方法,其特征在于,
    所述步骤S1之前还包括步骤:
    S01、CA认证中心为终端签发与终端对应的工作证书;
    S02、CA认证中心将具有合法权限的CA证书链导入服务端。
  8. 根据权利要求7所述的一种验证终端合法性的方法,其特征在于,
    步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
    所述服务端使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,验证通过,则所述终端对应的工作证书是合法的。
  9. 根据权利要求7所述的一种验证终端合法性的方法,其特征在于,
    步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
    导入具有合法权限的终端信息到所述服务端,形成合法终端白名单,所述服务端解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
    所述服务端将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
  10. 根据权利要求8或9所述的一种验证终端合法性的方法,其特征在于,
    步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
    所述终端对应的工作证书中还包括终端的定制信息,所述服务端在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
  11. 根据权利要求6所述的一种验证终端合法性的方法,其特征在于,
    步骤S3所述使用私钥对所述随机字符串进行签名具体包括:
    所述终端生成一个随机值,与所述随机字符串进行异或操作,获得异或后的随机字符串,所述终端使用所述终端对应的工作证书私钥对所述异或后的随机字符串签名,得到所述签名后的字符串。
  12. 根据权利要求6所述的一种验证终端合法性的方法,其特征在于,
    步骤S3和步骤S4中所述终端对应的工作证书公钥和所述终端对应的工作证书私钥均为由CA认证中心的证书管理系统生成RSA公私钥对,并由所述CA认证中心签发,存储在终端的安全区中。
  13. 一种验证终端合法性的服务端,包括第一存储器、第一处理器以及存储在所述第一存储器上并可在所述第一处理器上运行的第一计算机程序,其特征在于,所述第一处理器执行所述第一计算机程序时实现以下步骤:
    S1、接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
    S2、验证所述终端对应的工作证书是否合法,若是,则发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
    S3、接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
  14. 根据权利要求13所述的一种验证终端合法性的服务端,其特征在于,
    所述步骤S1之前还包括步骤:
    S0、导入具有合法权限的CA证书链。
  15. 根据权利要求14所述的一种验证终端合法性的服务端,其特征在于,
    步骤S2中所述验证所述终端对应的工作证书是否合法,具体包括:
    使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,验证通过,则所述终端对应的工作证书是合法的。
  16. 根据权利要求15所述的一种验证终端合法性的服务端,其特征在于,
    步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
    导入具有合法权限的终端信息,形成合法终端白名单,解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
    将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
  17. 根据权利要求15或16所述的一种验证终端合法性的服务端,其特征在于,步骤S2中所述验证所述终端对应的工作证书是否合法,还包括:
    所述终端对应的工作证书中还包括终端的定制信息,在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若合法,则所述终端对应的工作证书是合法的。
  18. 一种验证终端合法性的系统,包括服务端和终端,所述服务端包括第一存储器、第一处理器及存储在第一存储器上并可在第一处理器上运行的第一计算机程序,所述终端包括第二存储器、第二处理器及存储在第二存储器上并可在第二处理器上运行的第二计算机程序,其特征在于,
    所述第一处理器执行所述第一计算机程序时实现以下步骤:
    接收终端发送的交易请求信息,所述交易请求信息包含所述终端对应的工作证书;
    验证所述终端对应的工作证书是否合法,若是,则所述服务端发送一组随机字符串至所述终端,以使得所述终端对所述随机字符串进行签名;
    接收所述终端发送的签名后的字符串,采用所述终端对应的工作证书公钥验证所述签名后的字符串是否合法,若是,则确定所述终端合法。
    所述第二处理器执行所述第二计算机程序时实现以下步骤:
    发送交易请求信息给服务端,所述交易请求信息包含所述终端对应的工作证书;
    接收所述随机字符串,使用所述终端对应的工作证书私钥对所述随机字符串进行签名,发送签名后的字符串至所述服务端,所述随机字符串为所述服务端通过验证所述终端对应的工作证书为合法后发送的一组随机字符串;
  19. 根据权利要求18所述的一种验证终端合法性的系统,还包括CA认证中心,CA认证中心包括第三存储器、第三处理器及存储在第三存储器上并可在第三处理器上运行的第三计算机程序,其特征在于,所述第三处理器执行所述第三计算机程序时实现以下步骤:
    所述步骤S1之前还包括步骤:
    为终端签发与终端对应的工作证书;将具有合法权限的CA证书链导入服务端。
  20. 根据权利要求19所述的一种验证终端合法性的系统,其特征在于,
    所述验证所述终端对应的工作证书是否合法,具体包括:
    使用所述具有合法权限的CA证书链对所述终端对应的工作证书进行验证,验证通过,则所述终端对应的工作证书是合法的。
  21. 根据权利要求19所述的一种验证终端合法性的系统,其特征在于,
    所述验证所述终端对应的工作证书是否合法,还包括:
    导入具有合法权限的终端信息到所述服务端,形成合法终端白名单,所述服务端解析所述终端对应的工作证书,获得所述终端对应的工作证书的证书主体内容;
    将所述终端对应的工作证书的证书主体内容与所述合法终端白名单进行对比,若所述合法终端白名单存在所述终端对应的工作证书的证书主体内容,则所述终端对应的工作证书合法。
  22. 根据权利要求20或21所述的一种验证终端合法性的系统,其特征在于,
    所述验证所述终端对应的工作证书是否合法,还包括:
    所述终端对应的工作证书中还包括终端的定制信息,在验证所述终端对应的工作证书是否合法时,还需对所述终端的定制信息进行验证,若验证通过,则所述终端对应的工作证书是合法的。
  23. 根据权利要求18所述的一种验证终端合法性的系统,其特征在于,
    步骤S3所述使用私钥对所述随机字符串进行签名具体包括:
    生成一个随机值,与所述随机字符串进行异或操作,获得异或后的随机字符串,所述终端使用所述终端对应的工作证书私钥对所述异或后的随机字符串签名,得到所述签名后的字符串。
  24. 根据权利要求18所述的一种验证终端合法性的系统,其特征在于,
    步骤S3和步骤S4中所述终端对应的工作证书公钥和所述终端对应的工作证书私钥均为由CA认证中心的证书管理系统生成RSA公私钥对,并由所述CA认证中心认证签发,存储在终端的安全区中。
PCT/CN2018/079745 2018-03-21 2018-03-21 一种验证终端合法性的方法、服务端及系统 WO2019178762A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201880000190.3A CN108496194A (zh) 2018-03-21 2018-03-21 一种验证终端合法性的方法、服务端及系统
PCT/CN2018/079745 WO2019178762A1 (zh) 2018-03-21 2018-03-21 一种验证终端合法性的方法、服务端及系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/079745 WO2019178762A1 (zh) 2018-03-21 2018-03-21 一种验证终端合法性的方法、服务端及系统

Publications (1)

Publication Number Publication Date
WO2019178762A1 true WO2019178762A1 (zh) 2019-09-26

Family

ID=63343411

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/079745 WO2019178762A1 (zh) 2018-03-21 2018-03-21 一种验证终端合法性的方法、服务端及系统

Country Status (2)

Country Link
CN (1) CN108496194A (zh)
WO (1) WO2019178762A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109447646B (zh) * 2018-11-13 2020-06-30 华瓴(南京)信息技术有限公司 一种电力交易系统中身份隐私保护方法及系统
CN109672526B (zh) * 2018-12-17 2021-11-09 福建联迪商用设备有限公司 一种管控可执行程序的方法及系统
CN109525401B (zh) * 2018-12-24 2021-12-14 福建联迪商用设备有限公司 一种传递敏感数据的方法及终端
CN111510426A (zh) * 2020-03-06 2020-08-07 珠海格力电器股份有限公司 物联网配网加密方法、装置、系统、电子设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701609A (zh) * 2013-03-15 2014-04-02 福建联迪商用设备有限公司 一种服务器与操作终端双向认证的方法及系统
US20170068953A1 (en) * 2015-09-09 2017-03-09 Samsung Electronics Co., Ltd. Method and apparatus for performing payment
CN107637014A (zh) * 2017-08-02 2018-01-26 福建联迪商用设备有限公司 可配置的pos机密钥对生成方法、存储介质

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10339525B2 (en) * 2011-10-27 2019-07-02 Boom! Payments, Inc. Confirming local marketplace transaction consummation for online payment consummation
CN104156855A (zh) * 2014-08-18 2014-11-19 齐亚斌 一种支付方法和系统
CN106921496A (zh) * 2015-12-25 2017-07-04 卓望数码技术(深圳)有限公司 一种数字签名方法和系统
CN107294722A (zh) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 一种终端身份认证方法、装置及系统
CN107491954A (zh) * 2016-06-13 2017-12-19 邓斌涛 信息交互方法、身份认证和电子支付系统和方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701609A (zh) * 2013-03-15 2014-04-02 福建联迪商用设备有限公司 一种服务器与操作终端双向认证的方法及系统
US20170068953A1 (en) * 2015-09-09 2017-03-09 Samsung Electronics Co., Ltd. Method and apparatus for performing payment
CN107637014A (zh) * 2017-08-02 2018-01-26 福建联迪商用设备有限公司 可配置的pos机密钥对生成方法、存储介质

Also Published As

Publication number Publication date
CN108496194A (zh) 2018-09-04

Similar Documents

Publication Publication Date Title
CN110677418B (zh) 可信声纹认证方法、装置、电子设备及存储介质
JP4879176B2 (ja) ワンタイム秘密鍵を用いたデジタル署名を実装するためのシステムおよび方法
JP6263643B2 (ja) 多者間信用照会のapk署名方法及びシステム
US8112787B2 (en) System and method for securing a credential via user and server verification
JP4067985B2 (ja) アプリケーション認証システムと装置
US20180276664A1 (en) Key download method and apparatus for pos terminal
CN106327184A (zh) 一种基于安全硬件隔离的移动智能终端支付系统及方法
WO2009079916A1 (fr) Procédé pour générer une paire de clés et transmettre une clé publique ou un document de demande de certificat en toute sécurité
EP3001598B1 (en) Method and system for backing up private key in electronic signature token
WO2019178762A1 (zh) 一种验证终端合法性的方法、服务端及系统
JP2008532419A (ja) 安全なソフトウェア通信方法及びシステム
CN109831311B (zh) 一种服务器验证方法、系统、用户终端及可读存储介质
CN110943844B (zh) 一种基于网页客户端本地服务的电子文件安全签署方法及其系统
US11811939B2 (en) Advanced crypto token authentication
CN111787116B (zh) 一种基于区块链技术的容器镜像可信认证的系统与方法
TW201426383A (zh) 身份驗證系統及方法
JP2009503967A (ja) 単一の物理デバイスを用いた保護されたトランザクションの制御方法、それに対応する物理デバイス、システム及びコンピュータプログラム
WO2019178763A1 (zh) 一种证书导入方法及终端
CN109670289B (zh) 一种识别后台服务器合法性的方法及系统
KR20050083699A (ko) 내장된 소프트웨어 및 이를 인증하는 방법
CN116896463A (zh) 一种基于区块链的可信环境认证方法及装置
CN114091055A (zh) 一种量子加密信息传输系统
CN109672526B (zh) 一种管控可执行程序的方法及系统
TWI633444B (zh) Encryption and decryption communication method and system based on voucher signature verification
CN115186286B (zh) 模型处理方法、装置、设备、可读存储介质及程序产品

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18911097

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18911097

Country of ref document: EP

Kind code of ref document: A1