Movatterモバイル変換


[0]ホーム

URL:


CN103716321B - A kind of terminal master key TMK safety downloading method and systems - Google Patents

A kind of terminal master key TMK safety downloading method and systems
Download PDF

Info

Publication number
CN103716321B
CN103716321BCN201310742886.2ACN201310742886ACN103716321BCN 103716321 BCN103716321 BCN 103716321BCN 201310742886 ACN201310742886 ACN 201310742886ACN 103716321 BCN103716321 BCN 103716321B
Authority
CN
China
Prior art keywords
key
terminal
tmk
master key
pos terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310742886.2A
Other languages
Chinese (zh)
Other versions
CN103716321A (en
Inventor
孟陆强
苏文龙
彭波涛
洪逸轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN2013100843972Aexternal-prioritypatent/CN103237004A/en
Priority claimed from CN2013100846538Aexternal-prioritypatent/CN103237005A/en
Priority claimed from CN2013100846716Aexternal-prioritypatent/CN103220270A/en
Priority claimed from CN2013100846735Aexternal-prioritypatent/CN103220271A/en
Application filed by Fujian Landi Commercial Equipment Co LtdfiledCriticalFujian Landi Commercial Equipment Co Ltd
Priority to CN201310742886.2ApriorityCriticalpatent/CN103716321B/en
Publication of CN103716321ApublicationCriticalpatent/CN103716321A/en
Application grantedgrantedCritical
Publication of CN103716321BpublicationCriticalpatent/CN103716321B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The present invention discloses a kind of terminal master key TMK method for safely downloading, including step:POS terminal, which calls code keypad to produce, includes public key Pu and private key Pr asymmetric transmission cipher key T K, public key Pu is sent to KMS systems, and private key Pr is stored in code keypad;KMS systems call hardware encryption equipment to generate master key ciphertext Ctmk_tk using public key Pu ciphering terminal master keys TMK, and master key ciphertext is sent to POS terminal;POS terminal decrypts master key ciphertext Ctmk_tk acquisition terminal master key TMK using private key Pr and terminal master key TMK is stored in code keypad.The present invention also provides a kind of safe download systems of terminal master key TMK.Its advantage is:Terminal master key is encrypted using transmission cipher key T K by the present invention, and realize POS terminal remote download terminal master key TMK, the download of terminal master key is greatly facilitated, and cipher key T K is transmitted to randomly generate, transmitting procedure is also closing, therefore is effectively guaranteed terminal master key TMK transmission safety.

Description

A kind of terminal master key TMK safety downloading method and systems
Technical field
The present invention relates to e-payment field, more particularly to a kind of terminal master key TMK safety downloading method and systems.
Background technology
Bank card(BANK Card)Increasingly popularized as the means of payment, common bank card paying system includes salePoint terminal(Point Of Sale, POS), POS receive single system(POSP), code keypad(PIN PAD)With hardware encryption equipment(Hardware and Security Module, HSM).Wherein POS terminal can receive bank card information, with communication work(Can, and receive the instruction completion financial transaction information and the equipment exchanged for information about of teller;POS receives single system to POS terminalManaged concentratedly, including parameter is downloaded, key is downloaded, the transaction request of receiving, processing or forwarding POS terminal, and whole to POSLoopback transaction results information is held, is the system of centralized management and trading processing;Code keypad(PIN PAD)It is that various finance are handed overEasily related key carries out safe storage protection, and PIN is encrypted the safety means of protection;Hardware encryption equipment(HSM)It is the peripheral hardware devices that transmission data are encrypted, the encryption and decryption, checking message and document source for PIN are justTrue property and storage key.Personal identification code(Personal Identification Number, PIN), i.e. personal identification number isThe data message of holder's identity legitimacy is recognized in on-line transaction, any link does not permit in cyber-net systemPerhaps occur in clear text manner;Terminal master key(Terminal Master Key, TMK), it is close to working when POS terminal worksThe master key that key is encrypted, encrypting storing is in system database;POS terminal is widely used in bank card and pays occasion, thanSuch as manufacturer's shopping, hotel accommodations, are a kind of indispensable modernization means of payment, have incorporated the various fields of people's lifeClose.Bank card, particularly debit card, are typically all provided with PIN by holder, and in payment process is carried out, POS terminal is except upperSend outside the data such as the magnetic track information of bank card, also want holder to input the identity legitimacy that PIN verifies holder for issuing bank,Ensure bank card safety of payment, protect the property safety of holder.In order to prevent PIN reveal or be cracked, it is desirable to from terminal toIt is whole that safe encipherment protection is carried out to PIN in the whole information interactive process of issuing bank, not in computer network systemAny link, PIN occurs in clear text manner, therefore the PIN of receiving input at present POS terminal requires outfit key management bodySystem.
The key code system of POS terminal is divided into two grades:Terminal master key(TMK)And working key(WK).Wherein TMK enters to WKRow encipherment protection.Every POS terminal possesses unique TMK, it is necessary to have safeguard protection, it is ensured that can only write device and participate in meterCalculate, it is impossible to read;TMK is a very crucial root key, if TMK is intercepted, working key is just easier to be cracked, willIt is serious to threaten bank card safety of payment.So TMK can be downloaded safely to POS terminal, the pass as whole POS terminal securityKey.
To take precautions against Key Exposure risk, the download of POS terminal master key must control the safe computer room in administrative center to enterOK, by manually concentrating download terminal master key.So as to bring maintenance centre's computer room workload big;Equipment needs transport after dispatching from the factoryTrade company can be just deployed to by downloading key to the safe computer room of administrative center, and cost of transportation rises;In order to concentrate lower dress key, it is necessary to bigThe human hand of amount and working time, the problems such as maintenance cost is big, maintenance period is long.
The content of the invention
In order to solve the above technical problems, one aspect of the present invention is:
A kind of terminal master key TMK method for safely downloading, terminal master key TMK method for safely downloading includes:S1、POSTerminal, which calls code keypad to produce, includes public key Pu and private key Pr asymmetric transmission cipher key T K, and public key Pu is sent to KMS systemsSystem, and private key Pr is stored in code keypad;S2, KMS system call hardware encryption equipment close using public key Pu ciphering terminal mastersKey TMK generates master key ciphertext Ctmk_tk, and master key ciphertext is sent to POS terminal;S3, POS terminal are solved using private key PrClose master key ciphertext Ctmk_tk obtains terminal master key TMK and terminal master key TMK is stored in code keypad.
The present invention, which also provides another technical scheme, is:
A kind of safe download systems of terminal master key TMK, it is characterised in that including KMS systems and KMS system communication linksThe POS terminal and hardware encryption equipment connect;The POS terminal includes TK generation modules, deciphering module, and the KMS systems includeTMK modules;TK generation modules are used to call code keypad generation to include public key Pu and private key Pr asymmetric transmission cipher key T K, andFor public key Pu to be sent to KMS systems, and private key Pr is stored in code keypad;The TMK modules are used to call hardwareEncryption equipment using public key Pu ciphering terminal master keys TMK generate master key ciphertext Ctmk_tk, and by master key ciphertext send toPOS terminal;The deciphering module is used to obtaining terminal master key TMK using private key Pr decryption master key ciphertext Ctmk_tk and willTerminal master key TMK is stored in code keypad.
Terminal master key is encrypted using transmission cipher key T K by the present invention, and realizes POS terminal remote download terminal masterCipher key T MK, has greatly facilitated the download of terminal master key, and transmits cipher key T K and randomly generate, and transmission whole process is allTransmitted in the way of ciphertext, and the TK is unsymmetrical key, therefore it is effectively guaranteed terminal master key TMK transmission peaceEntirely.Further, the identity of POS terminal is verified by digital signature, effectively prevents pseudo-terminal from stealing TMK;Pass through reportThe flag of literary interface judges whether data frame sends and received, and improves master key and successfully downloads.
Brief description of the drawings
Fig. 1 is a kind of structured flowchart of the safe download systems of terminal master key TMK of the invention;
Fig. 2 is a kind of method flow diagram of terminal master key TMK method for safely downloading of the invention.
Main element symbol description:
10:POS terminal;20:KMS systems;30:Hardware encryption equipment;101:TK generation modules;102 deciphering modules;103:TheTwo message interface modules;201:TMK modules;202:First message interface module.
Embodiment
To describe the technology contents of the present invention in detail, feature, the objects and the effects being constructed, below in conjunction with embodimentAnd coordinate accompanying drawing to be explained in detail.
First, abbreviation of the present invention and Key Term are defined and illustrated:
AUK:Authentication Key abbreviation, authentication authorization and accounting key, for PINPAD and key management system KMS itBetween two-way authentication;
CA centers:So-called CA(Certificate Authority)Center, it is to use PKI(Public KeyInfrastructure)Public key infrastructure technology, it is special that network ID authentication service is provided, it is responsible for signing and issuing and managing numberWord certificate, and with third party's trust authority of authoritative and fairness, card is issued in acting like for it in our actual livesThe company of part, such as passport handle mechanism;
HSM:High Security Machine abbreviation, high safety equipment is within the system hardware encryption equipment;
MAK:Mac Key abbreviation, i.e. MAC computation keys, consult to determine 24 byte symmetric keys, for MTMS with clientTK MAC value is calculated between system and KMS systems;
MTMS:Full name Material Tracking Management System, Tracing Material management system mainly existsUsed during plant produced;
KMS systems:Key Management System, key management system, for management terminal master key TMK;
PIK:Pin Key abbreviation, i.e. Pin encryption keys, are one kind of working key;
PINPAD:Code keypad;
PK:Protect Key abbreviation, that is, protect key, consults to determine with client, 24 byte symmetric keys.ForTK encrypted transmission between MTMS/TCS and KMS;
POS:Point Of Sale abbreviation, i.e. point-of-sale terminal
SNpinpad:The sequence number of code keypad, it is consistent with POS terminal sequence number SNpos when PINPAD is built-in;
SN:The sequence number of payment terminal;
TEK:Transmission Encrypt Key abbreviation, that is, transmit encryption key, and 24 byte symmetric keys are used forTMK encrypted transmission between PINPAD and key management system KMS;
TK:Transmission Key abbreviation, that is, transmit key.Transmission key is by transmission encryption key TEK and doubleConstituted to certification key A UK;
TMS:Terminal Management System abbreviation, i.e. terminal management system, for completing payment terminalThe function such as information management, software and parameter configuration, remote download, the management of terminal running state information, remote diagnosis;
TMK:Terminal Master Key abbreviation, i.e. terminal master key, single system is received for payment terminal and paymentBetween working key encrypted transmission;
Safe house:With higher security level not, for the room of service device, the room needs ability after authenticationEnter.
Intellective IC card:For CPU card, the integrated circuit in card includes central processor CPU, programmable read only memoryEEPROM, random access memory ram and card internal operating system COS (the Chip Operating being solidificated in read only memory ROMSystem), data are divided into outside read and inter-process part in card.
Symmetric key:Sending and receiving the both sides of data must use identical key that fortune is encrypted and decrypted to plaintextCalculate.Symmetric key encryption algorithm mainly includes:DES, 3DES, IDEA, FEAL, BLOWFISH etc..
Unsymmetrical key:Rivest, shamir, adelman needs two keys:Public-key cryptography(Private key Public key)With it is privately ownedKey(Public key Private key).Public-key cryptography and private cipher key are a pair, if data are encrypted with public-key cryptography,It could only be decrypted with corresponding private cipher key;If be encrypted with private cipher key pair data, then only use corresponding public affairsOpening key could decrypt.Because encrypt with the decryption key that to use two different, this algorithm be called it is asymmetric plusClose algorithm.Rivest, shamir, adelman realizes that the basic process that confidential information is exchanged is:Party A generates a pair of secret keys and will be thereinOne discloses as Public key to other sides;Confidential information is encrypted using the key by the Party B for obtaining the Public keyAfter be then forwarded to Party A;Party A is decrypted private key to the information after encryption with oneself the another of preservation again.Party A canParty B is then forwarded to after confidential information is encrypted with the public key using Party B;Party B again with the private spoon of oneself to encryption afterInformation is decrypted.Main algorithm has RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC(Elliptic curve encryption algorithm).
RSA:A kind of asymmetric key algorithm.RSA public key encryption algorithms are 1977 by Ron Rivest, AdiShamirh and Len Adleman exist(Massachusetts Institute Technology)Exploitation.RSA is named from the name for developing their threes.RSA is current most influential public key encryption algorithm, and it can resist up to the present known all cryptographic attacks, byISO is recommended as public key data encryption standard.It is true that RSA Algorithm is based on a foolproof number theory:Two Big primes are multipliedIt is very easy.RSA Algorithm is first and can be also easy to understand and operate while be used for the algorithm of encrypted and digitally signed.RSA isBe studied widest public key algorithm, from three ten years till now are proposed, experienced the test of various attacks, gradually forPeople receive, and are widely considered to be one of current classic public key scheme.
TDES Triple-DES:DES is a kind of symmetric encipherment algorithm, and key is 8 bytes.TDES is the encryption based on DESAlgorithm, its key is 16 bytes or 24 bytes.TDES/3DES is English TripleDES abbreviated expression(I.e. triple data encryption marksIt is accurate), DES is then English Data Encryption Standard(Number encryption standard)Abbreviated expression.DES is that a kind of symmetric key addsClose algorithm, i.e. data encryption key and decruption key identical AES.DES is developed by IBM Corporation in 1970sAnd openly, then used for U.S. government, and recognized by NBS and ANSI (ANSI).TDES/3DES is a kind of pattern of des encryption algorithm, and it carries out Tertiary infilling using the data key of 3 64.It is DESA safer deformation.
Referring to Fig. 1, be a kind of structured flowchart of the safe download systems of terminal master key TMK of an embodiment of the present invention,The system includes KMS systems 20, the POS terminal 10 communicated to connect with KMS systems 20 and hardware encryption equipment 30;The POS is wholeEnd 10 includes TK generation modules 101, deciphering module 102, and the KMS systems 20 include TMK modules 201.
TK generation modules 101 are used to call the generation of code keypad 30 to include public key Pu and private key Pr asymmetric transmission keyTK, and for public key Pu to be sent to KMS systems 20, and private key Pr is stored in code keypad;
The TMK modules 101 are used to call hardware encryption equipment 30 close using public key Pu ciphering terminal master keys TMK generation mastersKey ciphertext Ctmk_tk, and master key ciphertext is sent to POS terminal 10;
The deciphering module is used to obtaining terminal master key TMK using private key Pr decryption master key ciphertext Ctmk_tk and willTerminal master key TMK is stored in code keypad.
Wherein, the POS terminal 10 also includes Digital Signature module;
The Digital Signature module is used to by terminal serial number SN and terminal master key download request pack using privateKey Pr is digitally signed, and the terminal serial number SN and terminal master key download request and public key Pu mono- after signature is concurrentGive KMS systems 20.
Wherein, the KMS systems 20 also include authentication module;
The authentication module is used for the legitimacy that the digital signature is verified using the public key Pu,
And for when being verified, calling hardware encryption equipment 30 to use public key Pu ciphering terminal master keys TMK generation mastersKey ciphertext Ctmk_tk, and master key ciphertext is sent to POS terminal 10.
Before POS terminal 10 is sent to public key Pu to KMS systems 20 and terminal master key downloads application, pre-installed by burning pieceThe digital signature information of each POS terminal 10 is imported KMS systems 20 by mode, therefore is sent out when KMS systems 20 receive POS terminal 10When the public key Pu and master key download request that send, it becomes possible to obtain digital signature information with public key Pu decryption digital signature, so thatWhether the POS terminal 10 that terminal master key download can be sent is legal POS terminal 10, so as to effectively prevent pseudo-terminal from passing throughUpload public key Pu and steal terminal master key TMK.
Wherein, the POS terminal 10 also includes TR-31 packetization modules;
The TR-31 packetization modules are used to be packed TMK by TR-31 forms, are stored in after packing with ciphertext formIn code keypad.
Cutting memory cell or 3DES encryption unit by the TMK makes TMK be stored in POS terminal in the form of ciphertextIn key keyboard, so as to further strengthen securities of the TMK in POS terminal.
Wherein, the KMS systems 10 include the first message interface module 202, and the POS terminal also connects including the second messageMouth mold block 103, the POS terminal 10 carries out master key ciphertext with KMS systems 20 by first, second message interface moduleCtmk_tk is sent and received, and the first, second message interface module is provided with for detecting whether terminal master key TMK hasThe flag of subsequent frame.
KMS systems 20 by the first message interface module 202 to POS terminal 10 send terminal master key TMK when, by firstMessage interface module 202 judges whether the master key ciphertext Ctmk_tk has subsequent frame, when there is subsequent frame by home position 1And the end of current data frame is inserted in, by home position 0 and insert the end of current data frame when without subsequent frame;POS is wholeWhen end 10 receives the master key ciphertext Ctmk_tk by the second message interface module, the current data frame that judgement is receivedThe value of flag, so as to learn whether the master key ciphertext Ctmk_tk receives completely.Therefore first message interface is passed throughThe message interface module 103 of module 202 and second can conveniently learn whether terminal master key TMK successfully sends and receives.
As shown in Fig. 2 being a kind of method flow diagram of terminal master key TMK method for safely downloading of the invention, terminal masterCipher key T MK method for safely downloading includes:
S1, POS terminal, which call code keypad to produce, includes public key Pu and private key Pr asymmetric transmission cipher key T K, by public keyPu is sent to KMS systems, and private key Pr is stored in code keypad;
S2, KMS system call hardware encryption equipment to generate master key ciphertext using public key Pu ciphering terminal master keys TMKCtmk_tk, and master key ciphertext is sent to POS terminal;
S3, POS terminal obtain terminal master key TMK and by terminal master using private key Pr decryption master key ciphertext Ctmk_tkCipher key T MK is stored in code keypad.
Wherein, the step S1 is specifically included:
POS terminal, which calls code keypad to produce, includes public key Pu and private key Pr asymmetric transmission cipher key T K, and by terminalSequence number SN and terminal master key download request are packed to be digitally signed using private key Pr, and by the terminal after signatureSequence number SN and terminal master key download request are sent to KMS systems in the lump with public key Pu.
Wherein, the step S2 is specifically included:
KMS systems verify the legitimacy of the signature using the public key Pu, if the verification passes, call hardware encryption equipmentMaster key ciphertext Ctmk_tk is generated using public key Pu ciphering terminal master keys TMK, and master key ciphertext is sent to POS terminal.
Before POS terminal is sent to public key Pu to KMS systems and terminal master key downloads application, by way of burning piece prepackageThe digital signature information of each POS terminal is imported into KMS systems, thus when KMS systems receive POS terminal transmission public key Pu andDuring master key download request, it becomes possible to digital signature information is obtained with public key Pu decryption digital signature, so as to send terminalWhether the POS terminal that master key is downloaded is legal POS terminal, so as to effectively prevent pseudo-terminal from stealing end by uploading public key PuHold master key TMK.
Wherein, the step S3 is specifically included:
POS terminal obtains terminal master key TMK using private key Pr decryption master key ciphertexts Ctmk_tk, and terminal master is closeKey TMK is packed by TR-31 forms, is stored in after packing with ciphertext form in code keypad.
Cutting memory cell or 3DES encryption unit by the TMK makes TMK be stored in POS terminal in the form of ciphertextIn key keyboard, so as to further strengthen securities of the TMK in POS terminal.
Wherein, the POS terminal carries out master key ciphertext Ctmk_tk in the way of message with KMS systems and sent and received,It is provided with whether terminal master key TMK has the flag of subsequent frame in the message interface of POS terminal and KMS systems.
When KMS system messages interface module is to POS terminal transmission terminal master key TMK, institute is judged by message interface moduleState whether master key ciphertext Ctmk_tk has subsequent frame, by home position 1 and the end of current data frame is inserted in when there is subsequent frameTail, by home position 0 and the end of current data frame is inserted when without subsequent frame;POS terminal is received by message interface moduleDuring the master key ciphertext Ctmk_tk, the value of the flag of the current data frame received is judged, so as to learn the master keyWhether ciphertext Ctmk_tk receives completely.Therefore whether terminal master key TMK can conveniently be learnt by the message interface moduleSuccessfully send and receive.
In the present invention, TK original uncommon Kazakhstan value is calculated when transmission cipher key T K is produced, when storing, transmit or use every time TKWhen first verify TK uncommon Kazakhstan value, TK can be just used after upchecking.It can prevent storage from setting by the uncommon Kazakhstan value for verifying TKThe standby abnormal error in data for causing to store, determines whether key is correct.
Terminal master key is encrypted using transmission cipher key T K by the present invention, and realizes POS terminal remote download terminal masterCipher key T MK, has greatly facilitated the download of terminal master key, and transmits cipher key T K and randomly generate, and transmission whole process is allTransmitted in the way of ciphertext, and the TK is unsymmetrical key, therefore it is effectively guaranteed terminal master key TMK transmission peaceEntirely.Further, master key TMK of the present invention is generated by KMS systems, therefore facilitates KMS systems to the follow-up of master key TMKMaintenance and management.Further, the identity of POS terminal is verified by digital signature, effectively prevents pseudo-terminal from stealingTMK;Judge whether data frame sends by the flag of message interface to receive, improve master key and successfully download.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hairEquivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skillsArt field, is included within the scope of the present invention.

Claims (6)

CN201310742886.2A2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systemsActiveCN103716321B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201310742886.2ACN103716321B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems

Applications Claiming Priority (13)

Application NumberPriority DateFiling DateTitle
CN2013100843972ACN103237004A (en)2013-03-152013-03-15Key download method, key management method, method, device and system for download management
CN201310084673.52013-03-15
CN201310084397.22013-03-15
CN20131008467352013-03-15
CN20131008439722013-03-15
CN20131008467162013-03-15
CN201310084671.62013-03-15
CN2013100846538ACN103237005A (en)2013-03-152013-03-15Method and system for key management
CN20131008465382013-03-15
CN2013100846716ACN103220270A (en)2013-03-152013-03-15Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310084653.82013-03-15
CN2013100846735ACN103220271A (en)2013-03-152013-03-15Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310742886.2ACN103716321B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems

Publications (2)

Publication NumberPublication Date
CN103716321A CN103716321A (en)2014-04-09
CN103716321Btrue CN103716321B (en)2017-08-29

Family

ID=50363015

Family Applications (28)

Application NumberTitlePriority DateFiling Date
CN201310740644.XAActiveCN103714638B (en)2013-03-152013-12-27A kind of method and system of quick position terminal master key failed download
CN201310740158.8AActiveCN103716320B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740540.9AActiveCN103716154B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740285.8AActiveCN103729940B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740574.8AActiveCN103729945B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310740430.2AActiveCN103729943B (en)2013-03-152013-12-27A kind of method and system transmission security key being imported KMS system
CN201310740231.1AActiveCN103714635B (en)2013-03-152013-12-27A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN201310742713.0AActiveCN103701610B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740360.0AActiveCN103714636B (en)2013-03-152013-12-27A kind of method of batch capture and upload transfers cipher key T K data and operating terminal
CN201310742648.1AActiveCN103716155B (en)2013-03-152013-12-27A kind of method of automated maintenance POS terminal and operation terminal
CN201310742681.4AActiveCN103714640B (en)2013-03-152013-12-27A kind of sending method of transmission security key and system
CN201310740567.8AActiveCN103729944B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310742661.7AActiveCN103716167B (en)2013-03-152013-12-27Method and device for safely collecting and distributing transmission keys
CN201310740188.9AActiveCN103716153B (en)2013-03-152013-12-27Terminal master key TMK safety downloading method and systems
CN201310740537.7AActiveCN103746800B (en)2013-03-152013-12-27TMK (terminal master key) safe downloading method and system
CN201310740410.5AActiveCN103729942B (en)2013-03-152013-12-27Transmission security key is transferred to the method and system of key server from terminal server
CN201310742686.7AActiveCN103745351B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740642.0AActiveCN103731259B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310741948.8AActiveCN103714639B (en)2013-03-152013-12-27A kind of method and system that realize the operation of POS terminal security
CN201310741949.2AActiveCN103731260B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and system
CN201310742991.6AActiveCN103714641B (en)2013-03-152013-12-27A kind of terminal master key TMK method for safely downloading and system
CN201310740380.8AActiveCN103714637B (en)2013-03-152013-12-27A kind of transmission security key sending method and system, operating terminal
CN201310742886.2AActiveCN103716321B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740264.6AActiveCN103701812B (en)2013-03-152013-12-27TMK (Terminal Master Key) secure downloading method and system
CN201310740226.0AActiveCN103714634B (en)2013-03-152013-12-27A kind of method of main key of secure download terminal and system
CN201310740244.9AActiveCN103701609B (en)2013-03-152013-12-27A kind of server and the method and system operating terminal two-way authentication
CN201310740308.5AActiveCN103729941B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740100.3AActiveCN103714633B (en)2013-03-152013-12-27A kind of method of safe generating transmission key and POS terminal

Family Applications Before (22)

Application NumberTitlePriority DateFiling Date
CN201310740644.XAActiveCN103714638B (en)2013-03-152013-12-27A kind of method and system of quick position terminal master key failed download
CN201310740158.8AActiveCN103716320B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740540.9AActiveCN103716154B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740285.8AActiveCN103729940B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740574.8AActiveCN103729945B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310740430.2AActiveCN103729943B (en)2013-03-152013-12-27A kind of method and system transmission security key being imported KMS system
CN201310740231.1AActiveCN103714635B (en)2013-03-152013-12-27A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN201310742713.0AActiveCN103701610B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740360.0AActiveCN103714636B (en)2013-03-152013-12-27A kind of method of batch capture and upload transfers cipher key T K data and operating terminal
CN201310742648.1AActiveCN103716155B (en)2013-03-152013-12-27A kind of method of automated maintenance POS terminal and operation terminal
CN201310742681.4AActiveCN103714640B (en)2013-03-152013-12-27A kind of sending method of transmission security key and system
CN201310740567.8AActiveCN103729944B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310742661.7AActiveCN103716167B (en)2013-03-152013-12-27Method and device for safely collecting and distributing transmission keys
CN201310740188.9AActiveCN103716153B (en)2013-03-152013-12-27Terminal master key TMK safety downloading method and systems
CN201310740537.7AActiveCN103746800B (en)2013-03-152013-12-27TMK (terminal master key) safe downloading method and system
CN201310740410.5AActiveCN103729942B (en)2013-03-152013-12-27Transmission security key is transferred to the method and system of key server from terminal server
CN201310742686.7AActiveCN103745351B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740642.0AActiveCN103731259B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310741948.8AActiveCN103714639B (en)2013-03-152013-12-27A kind of method and system that realize the operation of POS terminal security
CN201310741949.2AActiveCN103731260B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and system
CN201310742991.6AActiveCN103714641B (en)2013-03-152013-12-27A kind of terminal master key TMK method for safely downloading and system
CN201310740380.8AActiveCN103714637B (en)2013-03-152013-12-27A kind of transmission security key sending method and system, operating terminal

Family Applications After (5)

Application NumberTitlePriority DateFiling Date
CN201310740264.6AActiveCN103701812B (en)2013-03-152013-12-27TMK (Terminal Master Key) secure downloading method and system
CN201310740226.0AActiveCN103714634B (en)2013-03-152013-12-27A kind of method of main key of secure download terminal and system
CN201310740244.9AActiveCN103701609B (en)2013-03-152013-12-27A kind of server and the method and system operating terminal two-way authentication
CN201310740308.5AActiveCN103729941B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740100.3AActiveCN103714633B (en)2013-03-152013-12-27A kind of method of safe generating transmission key and POS terminal

Country Status (2)

CountryLink
CN (28)CN103714638B (en)
WO (5)WO2014139403A1 (en)

Families Citing this family (123)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103714638B (en)*2013-03-152015-09-30福建联迪商用设备有限公司A kind of method and system of quick position terminal master key failed download
CN105281896B (en)*2014-07-172018-11-27深圳华智融科技股份有限公司A kind of key POS machine Activiation method and system based on elliptic curve
CN104270346B (en)*2014-09-122017-10-13北京天行网安信息技术有限责任公司The methods, devices and systems of two-way authentication
CN105991536A (en)*2014-11-072016-10-05天地融科技股份有限公司Data interaction system
CN104363090A (en)*2014-11-192015-02-18成都卫士通信息产业股份有限公司Secret key distribution device and method for enhancing safety of banking terminal equipment
CN105681263B (en)*2014-11-202019-02-12广东华大互联网股份有限公司A kind of secrete key of smart card remote application method and application system
CN104486323B (en)*2014-12-102017-10-31福建联迪商用设备有限公司A kind of POS terminal controlled networking activation method and device safely
CN104410641B (en)*2014-12-102017-12-08福建联迪商用设备有限公司A kind of POS terminal controlled networking activation method and device safely
US9485250B2 (en)*2015-01-302016-11-01Ncr CorporationAuthority trusted secure system component
CN105989472A (en)*2015-03-062016-10-05华立科技股份有限公司Wireless mobile configuration, wireless payment configuration and wireless payment configuration method of electric energy measurement system, and public commodity wireless payment configuration
CN106204034B (en)*2015-04-292019-07-23中国电信股份有限公司Using the mutual authentication method and system of interior payment
CN105117665B (en)*2015-07-162017-10-31福建联迪商用设备有限公司A kind of end product pattern and the method and system of development mode handoff-security
CN105184121A (en)*2015-09-022015-12-23上海繁易电子科技有限公司Hardware authorization system and method using remote server
CN106559218A (en)*2015-09-292017-04-05中国电力科学研究院A kind of safe acquisition method of intelligent substation continuous data
CN105243542B (en)*2015-11-132021-07-02咪付(广西)网络技术有限公司Dynamic electronic certificate authentication method
CN105260884A (en)*2015-11-182016-01-20北京微智全景信息技术有限公司POS machine key distributing method and device
CN105530241B (en)*2015-12-072018-12-28咪付(广西)网络技术有限公司The authentication method of mobile intelligent terminal and POS terminal
CN105574722A (en)*2015-12-112016-05-11福建新大陆支付技术有限公司Authorization IC card based remote online authorization method for payment terminal
CN105930718A (en)*2015-12-292016-09-07中国银联股份有限公司Method and apparatus for switching point-of-sale (POS) terminal modes
CN105656669B (en)*2015-12-312019-01-01福建联迪商用设备有限公司The remote repairing method of electronic equipment, is repaired equipment and system at equipment
CN105681032B (en)2016-01-082017-09-12腾讯科技(深圳)有限公司Method for storing cipher key, key management method and device
CN114240421A (en)*2016-01-252022-03-25创新先进技术有限公司 Credit payment method and device based on mobile terminal eSE
CN105743654A (en)*2016-02-022016-07-06上海动联信息技术股份有限公司POS machine secret key remote downloading service system and secret key downloading method
CN105790934B (en)*2016-03-042019-03-15中国银联股份有限公司 An adaptive POS terminal configuration method and its configuration right transfer method
CN107294722A (en)*2016-03-312017-10-24阿里巴巴集团控股有限公司A kind of terminal identity authentication method, apparatus and system
CN105978856B (en)*2016-04-182019-01-25随行付支付有限公司A kind of POS machine key downloading method, apparatus and system
CN106059771A (en)*2016-05-062016-10-26上海动联信息技术股份有限公司Intelligent POS machine secret key management system and method
CN106097608B (en)*2016-06-062018-07-27福建联迪商用设备有限公司Remote cipher key method for down loading and system, acquirer and target POS terminal
CN106127461A (en)*2016-06-162016-11-16中国银联股份有限公司Bi-directional verification method of mobile payment and system
CN107563712A (en)*2016-06-302018-01-09中兴通讯股份有限公司A kind of mobile terminal punch card method, device, equipment and system
CN106027247A (en)*2016-07-292016-10-12宁夏丝路通网络支付有限公司北京分公司Method for remotely issuing POS key
CN106100854A (en)*2016-08-162016-11-09黄朝The reverse authentication method of terminal unit based on authority's main body and system
CN107800538B (en)*2016-09-012021-01-29中电长城(长沙)信息技术有限公司Remote key distribution method for self-service equipment
US11018860B2 (en)2016-10-282021-05-25Microsoft Technology Licensing, LlcHighly available and reliable secret distribution infrastructure
CN106571915A (en)*2016-11-152017-04-19中国银联股份有限公司Terminal master key setting method and apparatus
CN106603496B (en)*2016-11-182019-05-21新智数字科技有限公司A kind of guard method, smart card, server and the communication system of data transmission
CN106656488B (en)*2016-12-072020-04-03百富计算机技术(深圳)有限公司 Key download method and device for POS terminal
CN106712939A (en)*2016-12-272017-05-24百富计算机技术(深圳)有限公司Offline key transmission method and device
US10432730B1 (en)2017-01-252019-10-01United States Of America As Represented By The Secretary Of The Air ForceApparatus and method for bus protection
CN106953731B (en)*2017-02-172020-05-12福建魔方电子科技有限公司Authentication method and system for terminal administrator
CN107466455B (en)*2017-03-152021-05-04深圳大趋智能科技有限公司POS machine security verification method and device
US10296477B2 (en)2017-03-302019-05-21United States of America as represented by the Secretary of the AirForceData bus logger
CN106997533B (en)*2017-04-012020-10-13福建实达电脑设备有限公司POS terminal product safety production authorization management system and method
CN107094138B (en)*2017-04-112019-09-13郑州信大捷安信息技术股份有限公司A kind of smart home safe communication system and communication means
CN107070925A (en)*2017-04-182017-08-18上海赛付网络科技有限公司A kind of terminal applies and the anti-tamper method of background service communication packet
CN107104795B (en)*2017-04-252020-09-04上海汇尔通信息技术有限公司Method, framework and system for injecting RSA key pair and certificate
CN107360652A (en)*2017-05-312017-11-17江苏普世祥光电技术有限公司A kind of control method of square landscape lamp
CN107301437A (en)*2017-05-312017-10-27江苏普世祥光电技术有限公司A kind of control system of square landscape lamp
CN107358441B (en)*2017-06-262020-12-18北京明华联盟科技有限公司 Payment verification method, system, mobile device and security authentication device
WO2019023979A1 (en)*2017-08-022019-02-07福建联迪商用设备有限公司Method for generating configurable pos machine secret key pair, and storage medium
CN107666420B (en)*2017-08-302020-12-15宁波梦居智能科技有限公司Method for production control and identity authentication of intelligent home gateway
CN107392591B (en)*2017-08-312020-02-07恒宝股份有限公司Online recharging method and system for industry card and Bluetooth read-write device
CN107888379A (en)*2017-10-252018-04-06百富计算机技术(深圳)有限公司A kind of method of secure connection, POS terminal and code keypad
WO2019080095A1 (en)*2017-10-272019-05-02福建联迪商用设备有限公司Financial payment terminal activation method and system
CN107835170B (en)*2017-11-042021-04-20上海动联信息技术股份有限公司Intelligent Pos equipment safety authorization dismantling system and method
CN107993062A (en)*2017-11-272018-05-04百富计算机技术(深圳)有限公司POS terminal method of commerce, device, computer equipment and readable storage medium storing program for executing
CN107944250B (en)*2017-11-282021-04-13艾体威尔电子技术(北京)有限公司Key acquisition method applied to POS machine
CN107919962B (en)*2017-12-222021-01-15国民认证科技(北京)有限公司Internet of things equipment registration and authentication method
CN108365950A (en)*2018-01-032018-08-03深圳怡化电脑股份有限公司The generation method and device of financial self-service equipment key
CN108390851B (en)*2018-01-052020-07-03郑州信大捷安信息技术股份有限公司Safe remote control system and method for industrial equipment
WO2019136736A1 (en)*2018-01-152019-07-18福建联迪商用设备有限公司Software encryption terminal, payment terminal, and software package encryption and decryption method and system
WO2019153119A1 (en)*2018-02-062019-08-15福建联迪商用设备有限公司Method for transmitting key, receiving terminal and distribution terminal
CN108446539B (en)*2018-03-162023-01-13福建深空信息技术有限公司Software authorization method and software authorization file generation system
WO2019178763A1 (en)*2018-03-212019-09-26福建联迪商用设备有限公司Certificate importing method and terminal
CN108496194A (en)*2018-03-212018-09-04福建联迪商用设备有限公司 A method, server and system for verifying terminal legitimacy
WO2019200530A1 (en)*2018-04-172019-10-24福建联迪商用设备有限公司Remote distribution method and system for terminal master key
CN108737106B (en)*2018-05-092021-06-01深圳壹账通智能科技有限公司User authentication method and device on block chain system, terminal equipment and storage medium
CN108833088A (en)*2018-05-222018-11-16珠海爱付科技有限公司A kind of POS terminal Activiation method
CN110581829A (en)*2018-06-082019-12-17中国移动通信集团有限公司 Communication method and device
CN109218293B (en)*2018-08-212021-09-21西安得安信息技术有限公司Use method of distributed password service platform key management
CN109347625B (en)*2018-08-312020-04-24阿里巴巴集团控股有限公司Password operation method, work key creation method, password service platform and equipment
CN109326061B (en)*2018-09-102021-10-26惠尔丰(中国)信息系统有限公司Anti-cutting method of intelligent POS
CN109274500B (en)*2018-10-152020-06-02百富计算机技术(深圳)有限公司 A key downloading method, client, cryptographic device and terminal device
CN109274684B (en)*2018-10-312020-12-29中国—东盟信息港股份有限公司Internet of things terminal system based on integration of eSIM communication and navigation service and implementation method thereof
CN109547208B (en)*2018-11-162021-11-09交通银行股份有限公司Online distribution method and system for master key of financial electronic equipment
CN109670289B (en)*2018-11-202020-12-15福建联迪商用设备有限公司Method and system for identifying legality of background server
CN109508995A (en)*2018-12-122019-03-22福建新大陆支付技术有限公司A kind of off line authorization method and payment terminal based on payment terminal
CN109510711B (en)*2019-01-082022-04-01深圳市网心科技有限公司Network communication method, server, client and system
CN111627174B (en)*2019-02-282024-12-06南京摩铂汇信息技术有限公司 Bluetooth POS equipment and payment system
CN110011794B (en)*2019-04-112021-08-13北京智芯微电子科技有限公司 Test Methods for Cipher Key Properties
CN109995532A (en)*2019-04-112019-07-09晏福平A kind of online management method and system of terminal master key
CN110061848B (en)*2019-04-172021-09-14飞天诚信科技股份有限公司Method for safely importing secret key of payment terminal, payment terminal and system
CN110545542B (en)*2019-06-132023-03-14银联商务股份有限公司Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN112532567A (en)*2019-09-192021-03-19中国移动通信集团湖南有限公司Transaction encryption method and POSP system
CN110855442A (en)*2019-10-102020-02-28北京握奇智能科技有限公司PKI (public key infrastructure) technology-based inter-device certificate verification method
CN111132154B (en)*2019-12-262022-10-21飞天诚信科技股份有限公司Method and system for negotiating session key
CN111193748B (en)*2020-01-062021-12-03惠州市德赛西威汽车电子股份有限公司Interactive key security authentication method and system
CN111275440B (en)*2020-01-192023-11-10中钞科堡现金处理技术(北京)有限公司Remote key downloading method and system
TWI775061B (en)*2020-03-302022-08-21尚承科技股份有限公司Protection system and method for soft/firmware or data
CN111597512B (en)*2020-03-312023-10-31尚承科技股份有限公司Soft firmware or data protection system and protection method
CN111526013B (en)*2020-04-172023-05-05中国人民银行清算总中心Key distribution method and system
CN111884804A (en)*2020-06-152020-11-03上海祥承通讯技术有限公司Remote key management method
CN111815811B (en)*2020-06-222022-09-06合肥智辉空间科技有限责任公司Electronic lock safety coefficient
CN114024949A (en)*2020-07-172022-02-08华为技术有限公司Data transmission method and device
CN111950999B (en)*2020-07-282024-06-04银盛支付服务股份有限公司Method and system for realizing key filling safety based on IC card on POS machine
CN111931206A (en)*2020-07-312020-11-13银盛支付服务股份有限公司Data encryption method based on APP
CN112134849B (en)*2020-08-282024-02-20国电南瑞科技股份有限公司 A dynamic trusted encrypted communication method and system for smart substations
CN112182599B (en)*2020-09-152024-06-11中信银行股份有限公司Automatic loading method and device for master key, electronic equipment and readable storage medium
CN112311528B (en)*2020-10-172023-06-23深圳市德卡科技股份有限公司Data security transmission method based on cryptographic algorithm
CN112291232B (en)*2020-10-272021-06-04中国联合网络通信有限公司深圳市分公司Safety capability and safety service chain management platform based on tenants
CN112332978B (en)*2020-11-102022-09-20上海商米科技集团股份有限公司Remote key injection method based on key agreement
CN112396416A (en)*2020-11-182021-02-23上海商米科技集团股份有限公司Method for loading certificate of intelligent POS equipment
CN112560058B (en)*2020-12-172022-12-30山东华芯半导体有限公司SSD partition encryption storage system based on intelligent password key and implementation method thereof
CN112968776B (en)*2021-02-022022-09-02中钞科堡现金处理技术(北京)有限公司Method, storage medium and electronic device for remote key exchange
CN113037494B (en)*2021-03-022023-05-23福州汇思博信息技术有限公司Burning piece mirror image file signature method and terminal
CN113450511A (en)*2021-03-252021-09-28深圳怡化电脑科技有限公司Transaction method of acceptance terminal equipment and bank system and acceptance terminal equipment
CN113132980B (en)*2021-04-022023-10-13四川省计算机研究院Key management system method and device applied to Beidou navigation system
CN113328851B (en)*2021-04-212022-01-14北京连山科技股份有限公司Method and system for randomly transmitting secret key under multilink condition
CN115620411A (en)*2021-07-162023-01-17交通运输部路网监测与应急处置中心ETC parking transaction safety certification system facing public network
CN113708923A (en)*2021-07-292021-11-26银盛支付服务股份有限公司Method and system for remotely downloading master key
CN113645221A (en)*2021-08-062021-11-12中国工商银行股份有限公司Encryption method, device, equipment, storage medium and computer program
CN113810391A (en)*2021-09-012021-12-17杭州视洞科技有限公司Cross-machine-room communication bidirectional authentication and encryption method
CN113612612A (en)*2021-09-302021-11-05阿里云计算有限公司Data encryption transmission method, system, equipment and storage medium
CN114423003B (en)*2021-12-292024-01-30中国航空工业集团公司西安飞机设计研究所Airplane key comprehensive management method and system
CN114499891B (en)*2022-03-212024-05-31宁夏凯信特信息科技有限公司Signature server system and signature verification method
CN114726521A (en)*2022-04-142022-07-08广东好太太智能家居有限公司 Smart lock temporary password generation method and electronic device
CN115085981A (en)*2022-05-312022-09-20深圳市旭子科技有限公司Self-service terminal with data communication encryption function
CN115604133A (en)*2022-09-292023-01-13成都卫士通信息产业股份有限公司(Cn) An access control method, device, system and medium for an operation and maintenance terminal
CN115632769B (en)*2022-10-122025-02-11北京捷文科技股份有限公司 Payment terminal comprehensive key management method, system and computer readable storage medium
CN116233094A (en)*2022-12-312023-06-06北京结慧科技有限公司Method for downloading POS terminal key by key IC card
CN117176339B (en)*2023-08-312024-06-18深圳手付通科技有限公司 A method and system for online updating of master key TMK of POS terminal equipment
CN116865966B (en)*2023-09-042023-12-05中量科(南京)科技有限公司Encryption method, device and storage medium for generating working key based on quantum key
CN119172743B (en)*2024-08-152025-09-09北京智芯微电子科技有限公司Terminal identity identification method, device and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1285559A (en)*2000-07-202001-02-28天津南开戈德集团有限公司Radio mobile network point of sale (POS) terminal system and operation method thereof
CN101425208A (en)*2008-12-052009-05-06浪潮齐鲁软件产业有限公司Method for safely downloading cipher key of finance tax-controlling cashing machine

Family Cites Families (64)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPS57157371A (en)*1981-03-241982-09-28Sharp CorpElectronic cash register
JP2993833B2 (en)*1993-11-291999-12-27富士通株式会社 POS system
JPH10112883A (en)*1996-10-071998-04-28Hitachi Ltd Wireless communication switching system, exchange, public key management device, mobile terminal, and mobile terminal authentication method
CN1285559C (en)*1999-03-222006-11-22普拉克生化公司Method of industrial-scale purification of lactic acid
US7110986B1 (en)*2001-04-232006-09-19Diebold, IncorporatedAutomated banking machine system and method
KR100641824B1 (en)*2001-04-252006-11-06주식회사 하렉스인포텍 Financial Information Input Method Using Symmetric Key Security Algorithm and Its Commerce Communication System
JP2002366285A (en)*2001-06-052002-12-20Matsushita Electric Ind Co Ltd POS terminal
GB2384402B (en)*2002-01-172004-12-22Toshiba Res Europ LtdData transmission links
JP2003217028A (en)*2002-01-242003-07-31Tonfuu:KkOperation situation monitoring system for pos terminal device
US7395427B2 (en)*2003-01-102008-07-01Walker Jesse RAuthenticated key exchange based on pairwise master key
JP2005117511A (en)*2003-10-102005-04-28Nec CorpQuantum cipher communication system and quantum cipher key distributing method used therefor
KR101282972B1 (en)*2004-03-222013-07-08삼성전자주식회사Authentication between a device and a portable storage
US20060093149A1 (en)*2004-10-302006-05-04Shera International Ltd.Certified deployment of applications on terminals
DE102005022019A1 (en)*2005-05-122007-02-01Giesecke & Devrient Gmbh Secure processing of data
KR100652125B1 (en)*2005-06-032006-12-01삼성전자주식회사 Mutual authentication method for overall authentication and management between service provider, terminal, and user identification module, system and terminal device using same
CN100583743C (en)*2005-07-222010-01-20华为技术有限公司Distributing method for transmission key
MX2008010705A (en)*2006-02-222009-03-02Hypercom CorpSecure electronic transaction system.
JP2007241351A (en)*2006-03-062007-09-20Cela System:Kk Customer / product / stock management system (including POS) and mobile / customer integrated management system
EP1833009B1 (en)*2006-03-092019-05-08First Data CorporationSecure transaction computer network
US7818264B2 (en)*2006-06-192010-10-19Visa U.S.A. Inc.Track data encryption
CN101064695A (en)*2007-05-162007-10-31杭州看吧科技有限公司P2P(Peer to Peer) safe connection method
CN101145913B (en)*2007-10-252010-06-16东软集团股份有限公司A method and system for network security communication
WO2009070041A2 (en)*2007-11-302009-06-04Electronic Transaction Services LimitedPayment system and method of operation
CN101541002A (en)*2008-03-212009-09-23展讯通信(上海)有限公司Web server-based method for downloading software license of mobile terminal
CN101615322B (en)*2008-06-252012-09-05上海富友金融网络技术有限公司Mobile terminal payment method and mobile terminal payment system for realizing magnetic payment function
JP4666240B2 (en)*2008-07-142011-04-06ソニー株式会社 Information processing apparatus, information processing method, program, and information processing system
CN101686225A (en)*2008-09-282010-03-31中国银联股份有限公司Methods of data encryption and key generation for on-line payment
KR20100052668A (en)*2008-11-112010-05-20노틸러스효성 주식회사Method for on-line sharing of tmk(terminal master key) between atm and host
JP5329184B2 (en)*2008-11-122013-10-30株式会社日立製作所 Public key certificate verification method and verification server
CN101527714B (en)*2008-12-312012-09-05飞天诚信科技股份有限公司Method, device and system for accreditation
CN101930644B (en)*2009-06-252014-04-16中国银联股份有限公司Method for safely downloading master key automatically in bank card payment system and system thereof
CN101719895A (en)*2009-06-262010-06-02中兴通讯股份有限公司Data processing method and system for realizing secure communication of network
CN101593389B (en)*2009-07-012012-04-18中国建设银行股份有限公司Key management method and system for POS terminal
CN101631305B (en)*2009-07-282011-12-07交通银行股份有限公司Encryption method and system
CN101656007B (en)*2009-08-142011-02-16通联支付网络服务股份有限公司Safe system realizing one machine with multiple ciphers on POS machine and method thereof
CN102064939B (en)*2009-11-132013-06-12福建联迪商用设备有限公司Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
CN101710436B (en)*2009-12-012011-12-14中国建设银行股份有限公司Method and system for controlling POS terminal and POS terminal management equipment
CN101807994B (en)*2009-12-182012-07-25北京握奇数据系统有限公司Method and system for application data transmission of IC card
CN102148799B (en)*2010-02-052014-10-22中国银联股份有限公司Key downloading method and system
CN201656997U (en)*2010-04-282010-11-24中国工商银行股份有限公司Device for generating transmission key
CN101807997B (en)*2010-04-282012-08-22中国工商银行股份有限公司Device and method for generating transmission key
CN102262760A (en)*2010-05-282011-11-30杨筑平 Transaction security method, acceptance device and submission software
EP2604017B1 (en)*2010-08-102017-10-04Google Technology Holdings LLCSystem and method for cognizant transport layer security
CN101938520B (en)*2010-09-072015-01-28中兴通讯股份有限公司Mobile terminal signature-based remote payment system and method
CN101976403A (en)*2010-10-292011-02-16北京拉卡拉网络技术有限公司Phone number payment platform, payment trading system and method thereof
CN102013982B (en)*2010-12-012012-07-25银联商务有限公司Long-distance encryption method, management method, as well as encryption management method, device and system
CN102903189A (en)*2011-07-252013-01-30上海昂贝电子科技有限公司Terminal transaction method and device
CN102394749B (en)*2011-09-262014-03-05深圳市文鼎创数据科技有限公司Line protection method, system, information safety equipment and application equipment for data transmission
CN102521935B (en)*2011-12-152013-12-11福建联迪商用设备有限公司Method and apparatus for state detection of POS machine
CN102592369A (en)*2012-01-142012-07-18福建联迪商用设备有限公司Method for self-service terminal access to financial transaction center
CN102624710B (en)*2012-02-272015-03-11福建联迪商用设备有限公司Sensitive information transmission method and sensitive information transmission system
CN102624711B (en)*2012-02-272015-06-03福建联迪商用设备有限公司Sensitive information transmission method and sensitive information transmission system
CN102647274B (en)*2012-04-122014-10-08福建联迪商用设备有限公司POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof
CN102707972B (en)*2012-05-022016-03-09银联商务有限公司A kind of POS terminal method for updating program and system
CN102768744B (en)*2012-05-112016-03-16福建联迪商用设备有限公司A kind of remote safe payment method and system
CN102868521B (en)*2012-09-122015-03-04成都卫士通信息产业股份有限公司Method for enhancing secret key transmission of symmetrical secret key system
CN103116505B (en)*2012-11-162016-05-25福建联迪商用设备有限公司A kind of method that Auto-matching is downloaded
CN103117855B (en)*2012-12-192016-07-06福建联迪商用设备有限公司A kind of method of the method generating digital certificate and backup and recovery private key
CN103237005A (en)*2013-03-152013-08-07福建联迪商用设备有限公司Method and system for key management
CN103220271A (en)*2013-03-152013-07-24福建联迪商用设备有限公司Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103714638B (en)*2013-03-152015-09-30福建联迪商用设备有限公司A kind of method and system of quick position terminal master key failed download
CN103237004A (en)*2013-03-152013-08-07福建联迪商用设备有限公司Key download method, key management method, method, device and system for download management
CN103220270A (en)*2013-03-152013-07-24福建联迪商用设备有限公司Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103269266B (en)*2013-04-272016-07-06北京宏基恒信科技有限责任公司The safety certifying method of dynamic password and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1285559A (en)*2000-07-202001-02-28天津南开戈德集团有限公司Radio mobile network point of sale (POS) terminal system and operation method thereof
CN101425208A (en)*2008-12-052009-05-06浪潮齐鲁软件产业有限公司Method for safely downloading cipher key of finance tax-controlling cashing machine

Also Published As

Publication numberPublication date
CN103716153A (en)2014-04-09
CN103714639A (en)2014-04-09
WO2014139406A1 (en)2014-09-18
CN103701812B (en)2017-01-25
CN103714640B (en)2016-02-03
CN103716320B (en)2017-08-01
CN103729940A (en)2014-04-16
CN103714634A (en)2014-04-09
WO2014139412A1 (en)2014-09-18
CN103716155A (en)2014-04-09
CN103729945B (en)2015-11-18
CN103714633A (en)2014-04-09
CN103714635A (en)2014-04-09
CN103716155B (en)2016-08-17
CN103714635B (en)2015-11-11
CN103714637B (en)2016-03-16
CN103701812A (en)2014-04-02
CN103714633B (en)2016-05-04
CN103731259B (en)2017-08-01
CN103729944A (en)2014-04-16
CN103714641B (en)2016-03-30
CN103746800A (en)2014-04-23
CN103714636B (en)2015-12-02
CN103716153B (en)2017-08-01
CN103714636A (en)2014-04-09
CN103729941A (en)2014-04-16
CN103716167B (en)2017-01-11
CN103714637A (en)2014-04-09
CN103729942A (en)2014-04-16
CN103716154B (en)2017-08-01
WO2014139408A1 (en)2014-09-18
CN103714641A (en)2014-04-09
CN103729944B (en)2015-09-30
CN103729943B (en)2015-12-30
CN103714638A (en)2014-04-09
CN103731260B (en)2016-09-28
CN103731260A (en)2014-04-16
CN103746800B (en)2017-05-03
CN103716167A (en)2014-04-09
CN103714639B (en)2016-05-04
CN103745351B (en)2017-09-29
CN103716154A (en)2014-04-09
CN103729940B (en)2016-06-15
CN103729943A (en)2014-04-16
CN103731259A (en)2014-04-16
CN103729945A (en)2014-04-16
CN103729941B (en)2016-06-15
CN103714634B (en)2016-06-15
CN103701610B (en)2018-04-17
CN103729942B (en)2016-01-13
CN103716320A (en)2014-04-09
CN103716321A (en)2014-04-09
WO2014139411A1 (en)2014-09-18
CN103714638B (en)2015-09-30
CN103701609A (en)2014-04-02
CN103714640A (en)2014-04-09
WO2014139403A1 (en)2014-09-18
CN103745351A (en)2014-04-23
CN103701609B (en)2016-09-28
CN103701610A (en)2014-04-02

Similar Documents

PublicationPublication DateTitle
CN103716321B (en)A kind of terminal master key TMK safety downloading method and systems
CN103716168B (en)Secret key management method and system
CN103716322B (en)Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system
CN103714642B (en)Key downloading method, management method, downloading management method and device and system
CN103729946A (en)Key downloading method, key managing method and downloading managing method, device and system
CN107104795A (en)Method for implanting, framework and the system of RSA key pair and certificate
KR20180089951A (en)Method and system for processing transaction of electronic cash

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C53Correction of patent for invention or patent application
CB03Change of inventor or designer information

Inventor after:Meng Luqiang

Inventor after:Su Wenlong

Inventor after:Peng Botao

Inventor after:Hong Yixuan

Inventor before:Meng Luqiang

Inventor before:Su Wenlong

Inventor before:Peng Botao

CORChange of bibliographic data

Free format text:CORRECT: INVENTOR; FROM: MENG LUQIANG SU WENLONG PENG BOTAO TO: MENG LUQIANG SU WENLONG PENG BOTAO HONG YIXUAN

GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp