Movatterモバイル変換


[0]ホーム

URL:


CN103729944B - A kind of method and system of secure download terminal master key - Google Patents

A kind of method and system of secure download terminal master key
Download PDF

Info

Publication number
CN103729944B
CN103729944BCN201310740567.8ACN201310740567ACN103729944BCN 103729944 BCN103729944 BCN 103729944BCN 201310740567 ACN201310740567 ACN 201310740567ACN 103729944 BCN103729944 BCN 103729944B
Authority
CN
China
Prior art keywords
random number
key
acquirewcrt
ciphertext
master key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310740567.8A
Other languages
Chinese (zh)
Other versions
CN103729944A (en
Inventor
孟陆强
苏文龙
彭波涛
洪逸轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN2013100843972Aexternal-prioritypatent/CN103237004A/en
Priority claimed from CN2013100846538Aexternal-prioritypatent/CN103237005A/en
Priority claimed from CN2013100846716Aexternal-prioritypatent/CN103220270A/en
Priority claimed from CN2013100846735Aexternal-prioritypatent/CN103220271A/en
Application filed by Fujian Landi Commercial Equipment Co LtdfiledCriticalFujian Landi Commercial Equipment Co Ltd
Priority to CN201310740567.8ApriorityCriticalpatent/CN103729944B/en
Publication of CN103729944ApublicationCriticalpatent/CN103729944A/en
Application grantedgrantedCritical
Publication of CN103729944BpublicationCriticalpatent/CN103729944B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The present invention discloses a kind of method of secure download terminal master key, comprises step; Key downloader and POS terminal carry out authentication by CA center; Key downloader and POS terminal are by the mutual certification of random number, and certification is by rear download master key TMK.Beneficial effect of the present invention is: the present invention downloads master key TMK by the form of ciphertext and realizes master key secure download, effectively prevents in master key transmitting procedure by the risk intercepted and captured.Further, the present invention produces work certificate and root certificate by CA center, realizes the authentication of key downloader and POS terminal, thus prevents key downloader from master key is downloaded to POS terminal beyond this acquirer, realizes the privatization of POS terminal.Further, the present invention further increases random number authentication, effectively prevents from stealing master key by resetting attack pattern.

Description

A kind of method and system of secure download terminal master key
Technical field
The present invention relates to E-Payment field, particularly relate to a kind of method and system of secure download terminal master key.
Background technology
Bank card (Bank Card) is more and more universal as the means of payment, common bank card paying system, comprise point of sales terminal (Point Of Sale:POS), terminal management system (Terminal ManageSystem:TMS), code keypad (PIN PAD) and hardware encipher machine (Hardware and SecurityModule:HSM).Wherein POS terminal can accept bank card information, has communication function, and accepts the instruction of teller and the equipment completing financial transaction information and exchange for information about; The POS terminal of TMS system to subordinate is managed concentratedly, comprises parameter downloads, and key is downloaded, and accepts, process or forward the transaction request of POS terminal, and to the centralized management of POS terminal loopback transaction results information and transaction processing system; Code keypad (PINPAD) carries out safe storage protection to TMK, PIK and MAK, and be encrypted the safety equipment of protection to PIN; Hardware encipher machine (Hardware and SecurityModule:HSM) is the peripheral hardware devices be encrypted the data of transmission, for the encryption and decryption of PIN, the correctness verifying message and document source and storage key.Personal identification code (Personal Identification Number; PIN), i.e. personal identification number is the data message identifying holder's identity legitimacy in on-line transaction, and in cyber-net system, any link does not allow PIN to occur in mode expressly; Terminal master key (Terminal Master Key; TMK): during POS terminal work, to the master key that working key is encrypted, be kept in system hardware, can only use, can not read; Working key (workingkey; WK), also referred to as data key, generally include the key (being called for short MAK) of PIN encryption key (being called for short PIK) and Package authentication MAC calculating, working key constantly upgrades, with terminal master key (TMK), working key is encrypted in the message of online renewal, transmits again after forming ciphertext.
POS terminal is widely used in bank card and pays occasion, and such as market shopping, hotel's mandate etc., be a kind of indispensable modernization means of payment, incorporated the normal life of people.Bank card (particularly debit card) is generally all provided with PIN by holder; carrying out in payment process; POS terminal is except above sending the data such as the magnetic track information of bank card; also require that holder inputs PIN for issuing bank checking holder identity legitimacy; to guarantee bank card safety of payment, the property safety of protection holder.In order to prevent PIN from revealing or being cracked, require from terminal to issuing bank in whole information interactive process, whole process carries out safety encipher protection to PIN, does not allow any link in cyber-net system, and PIN occurs in mode expressly.For this reason, the POS terminal that can accept to input PIN at present all requires to be equipped with key management system.
The key code system of POS terminal is divided into secondary: terminal master key (TMK) and working key (WK).Wherein TMK is encrypted protection to WK, and every platform POS terminal has unique TMK, must have safety precautions, and guarantee can only write hardware device and participate in computing, can not be read; WK comprises the PIK for encrypting PIN and carries out MAK two parts of Package authentication (MAC), call encryption equipment by TMS to produce, download when POS terminal is registered to TMS, and utilize TMK encrypted transmission and storage, its cryptographic algorithm is all the 3DES algorithm that use safety rank is very high.Specific works key downloads flow process:
POS terminal initiates to TMS the request of registering;
TMS calls PIK and MAK that encryption equipment stochastic generation TMK encrypts;
POS terminal receives PIK and the MAK ciphertext returned from TMS, and stored in code keypad.
In bank card payment process; during by input through keyboard; by code keypad utilize PIK the PIN that holder inputs is encrypted after on give TMS; then TMS is transmitted to issuing bank after encryption equipment is changed to the PIN after encryption carries out authorisation process by calling again; guarantee in whole transmitting procedure that PIN utilizes hardware to be encrypted protection; the 3DES cryptographic algorithm that its encryption uses also is be widely used one of very high cryptographic algorithm of level of security so far, is usually applied in financial industry.
As can be seen from working key downloading process above, TMK is a very crucial root key.If TMK is intercepted, PIK, MAK even PIN can utilize 3DES algorithm to crack, by serious threat bank card safety of payment.So, TMK can secure download to POS terminal, also just become the committed step of a cipher safe protecting.We are summarized as follows current existing TMK method for down loading below:
In every way plaintext TMK or ciphertext TMK is imported in the female POS terminal of a key, finally all need to download in female POS terminal and store expressly master key, the female POS terminal of key is connected with needing the POS terminal of the master key TMK downloaded by serial ports, is downloaded in POS terminal by plaintext master key TMK.
Because master key TMK is transferred in POS terminal by female POS download, by plaintext transmission, there is potential safety hazard, if by intercept, will the leakage of master key TMK be caused.
And, a lot of acquirer will by POS terminal privatization at present, namely the master key of other acquirers is not allowed to download in all POS terminal of this acquirer, as long as but the female POS of any key is according to the communication interface consulted, just master key TMK can be downloaded in the POS terminal of all this communication interfaces of support, therefore easily occur master key TMK to download in the POS terminal of other acquirers, POS terminal privatization cannot be realized.
Summary of the invention
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is:
A kind of method of secure download terminal master key is provided, comprises step: S1, key downloader produce or import public private key pair private key AcquireWCRT_Prk and PKI AcquireWCRT_Pu, and PKI AcquireWCRT_Pu is issued CA center; S2, CA center generates acquirer root certificate AcquireRCRT and corresponding private key AcquireRCRT_Prk, is used by the PKI AcquireWCRT_Pu received AcquireRCRT_Prk signature to generate acquirer work certificate AcquireWCRT; Key downloader stores described acquirer work certificate AcquireWCRT and private key AcquireWCRT_Prk; POS terminal stores described acquirer root certificate AcquireRCRT; Work certificate AcquireWCRT is sent to POS terminal by S3, key downloader; S4, POS terminal use the legitimacy of acquirer root certificate AcquireRCRT certification acquirer work certificate AcquireWCRT, if certification is legal, then extract PKI AcquireWCRT_Pu from acquirer work certificate AcquireWCRT, and produce the first random number R nd1, the second random number R nd2; S5, the POS terminal AcquireWCRT_Pu that uses public-key encrypts the first random number R nd and the second random number R nd2 and generates random number ciphertext C_rnd1_rnd2, and random number ciphertext C_rnd1_mrnd2 is sent to key downloader; S6, key downloader use private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2 to obtain the 3rd random number R nd1 ', the 4th random number R nd2 '; S7, key downloader produce or import terminal master key TMK, the 3rd random number R nd1 ' ciphering terminal master key TMK is used to generate master key ciphertext Ctmk, then use private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ' to generate the second master key ciphertext C_ctmk_rnd2, and the second master key ciphertext C_ctmk_rnd2 is sent to POS terminal; S8, POS terminal use public-key AcquireWCRT_Pu decipher second master key ciphertext C_ctmk_rnd2 obtain master key ciphertext Ctmk and the 4th random number R nd2 ', then judge that whether the 4th random number R nd2 ' consistent with the second random number R nd2; If S9 the 4th random number R nd2 ' is consistent with the second random number R nd2, POS terminal uses the first random number R nd1 to decipher master key ciphertext Ctmk and obtains terminal master key TMK, and terminal master key TMK is stored to code keypad.
Another technical scheme that the present invention adopts is:
A kind of key management method is provided, comprises: key downloader produces or imports public private key pair private key AcquireWCRT_Prk and PKI AcquireWCRT_Pu, and PKI AcquireWCRT_Pu is issued CA center; Key downloader stores the acquirer work certificate AcquireWCRT and corresponding private key AcquireRCRT_Prk that CA center generates, and described acquirer work certificate AcquireWCRT uses private key AcquireRCRT_Prk public signature key AcquireWCRT_Pu to generate; Acquirer work certificate AcquireWCRT is sent to POS terminal by key downloader; Key downloader receives the random number ciphertext C_rnd1_mrnd2 that POS terminal sends, and described random number ciphertext C_rnd1_mrnd2 is that the POS terminal AcquireWCRT_Pu that uses public-key encrypts the first random number R nd and the second random number R nd2 and generates; Key downloader uses private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2 to obtain the 3rd random number R nd1 ', the 4th random number R nd2 '; Key downloader produces or imports terminal master key TMK, the 3rd random number R nd1 ' ciphering terminal master key TMK is used to generate master key ciphertext Ctmk, then use private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ' to generate the second master key ciphertext C_ctmk_rnd2, and the second master key ciphertext C_ctmk_rnd2 is sent to POS terminal.
Another technical scheme that the present invention adopts is:
There is provided a kind of key downloading management method, comprising: POS terminal stores described acquirer root certificate AcquireRCRT, described acquirer root certificate AcquireRCRT is produced by CA center; POS terminal receives the acquirer work certificate AcquireWCRT that key downloader sends, and described acquirer work certificate AcquireWCRT uses private key AcquireRCRT_Prk public signature key AcquireWCRT_Pu to generate; POS terminal uses the legitimacy of acquirer root certificate AcquireRCRT certification acquirer work certificate AcquireWCRT, if certification is legal, then extract AcquireWCRT_Pu from acquirer work certificate AcquireWCRT, and produce the first random number R nd1, the second random number R nd2; The POS terminal AcquireWCRT_Pu that uses public-key encrypts the first random number R nd and the second random number R nd2 and generates random number ciphertext C_rnd1_rnd2, and random number ciphertext C_rnd1_mrnd2 is sent to key downloader; POS terminal receives the second master key ciphertext C_ctmk_rnd2 that key downloader sends, described second master key ciphertext C_ctmk_rnd2 generates for using private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ', described master key ciphertext Ctmk is that use the 3rd random number R nd1 ' ciphering terminal master key TMK generates, and described 3rd random number R nd1 ', the 4th random number R nd2 ' obtain for using private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2; POS terminal use public-key AcquireWCRT_Pu decipher second master key ciphertext C_ctmk_rnd2 obtain master key ciphertext Ctmk and the 4th random number R nd2 ', then judge that whether the 4th random number R nd2 ' consistent with the second random number R nd2; If the 4th random number R nd2 ' is consistent with the second random number R nd2, POS terminal uses the first random number R nd1 to decipher master key ciphertext Ctmk and obtains terminal master key TMK, and terminal master key TMK is stored to code keypad.
Another technical scheme of the present invention is:
A kind of system of secure download master key is provided, comprises: key downloader, POS terminal and CA center; Described key downloader comprises key generation module, master key module, the second data transmit-receive module, the second encryption/decryption module, described POS terminal comprises the first authentication module, the first data transmit-receive module, the first encryption/decryption module, the first judge module, the first random-number-generating module, and described CA center comprises certificate preset module; Key generation module for generation of or import public private key pair private key AcquireWCRT_Prk and PKI AcquireWCRT_Pu, and PKI AcquireWCRT_Pu is issued CA center; Certificate preset module is for generating acquirer root certificate AcquireRCRT and corresponding private key AcquireRCRT_Prk, and the PKI AcquireWCRT_Pu for receiving uses private key AcquireRCRT_Prk signature to generate acquirer work certificate AcquireWCRT; And for acquirer work certificate AcquireWCRT and private key AcquireWCRT_Prk is stored in key downloader, acquirer root certificate AcquireRCRT is stored in POS terminal; Second data transmit-receive module is used for work certificate AcquireWCRT to send to POS terminal; First authentication module for using the legitimacy of acquirer root certificate AcquireRCRT certification acquirer work certificate AcquireWCRT, and for when certification is legal, extracts AcquireWCRT_Pu from acquirer work certificate AcquireWCRT; First random-number-generating module is for generation of the first random number R nd1, the second random number R nd2; First encryption/decryption module generates random number ciphertext C_rnd1_rnd2 for using AcquireWCRT_Pu to encrypt the first random number R nd and the second random number R nd2; First data transmit-receive module is used for random number ciphertext C_rnd1_mrnd2 to be sent to key downloader; Second encryption/decryption module obtains the 3rd random number R nd1 ', the 4th random number R nd2 ' for using private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2; Master key module for generation of or import terminal master key TMK; Second encryption/decryption module generates master key ciphertext Ctmk for using the 3rd random number R nd1 ' ciphering terminal master key TMK, and use private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ' to generate the second master key ciphertext C_ctmk_rnd2, and the second master key ciphertext C_ctmk_rnd2 is sent to POS terminal; The first encryption/decryption module AcquireWCRT_Pu that is used for using public-key deciphers the second master key ciphertext C_ctmk_rnd2 and obtains master key ciphertext Ctmk and the 4th random number R nd2 '; Whether the first judge module is consistent with the second random number R nd2 for judging the 4th random number R nd2 '; First encryption/decryption module is used for when the 4th random number R nd2 ' is consistent with the second random number R nd2, uses the first random number R nd1 to decipher master key ciphertext Ctmk and obtains terminal master key TMK, and terminal master key TMK is stored to code keypad.
Another technical scheme of the present invention is:
A kind of key download management device is provided, comprises key generation module, master key module, the second data transmit-receive module, the second encryption/decryption module, the second memory module; Key generation module for generation of or import public private key pair private key AcquireWCRT_Prk and PKI AcquireWCRT_Pu, and PKI AcquireWCRT_Pu is issued CA center; The acquirer work certificate AcquireWCRT and corresponding private key AcquireRCRT_Prk that second memory module generates for storing CA center, described acquirer work certificate AcquireWCRT use private key AcquireRCRT_Prk public signature key AcquireWCRT_Pu to generate; Second data transmit-receive module is used for acquirer work certificate AcquireWCRT to send to POS terminal; The random number ciphertext C_rnd1_mrnd2 that second data transmit-receive module sends for receiving POS terminal, described random number ciphertext C_rnd1_mrnd2 are that the POS terminal AcquireWCRT_Pu that uses public-key encrypts the first random number R nd and the second random number R nd2 and generates; Second encryption/decryption module uses private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2 to obtain the 3rd random number R nd1 ', the 4th random number R nd2 '; Master key module for generation of or import terminal master key TMK; Second encryption/decryption module generates master key ciphertext Ctmk for using the 3rd random number R nd1 ' ciphering terminal master key TMK, and for using private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ' to generate the second master key ciphertext C_ctmk_rnd2; Second data transmit-receive module is used for the second master key ciphertext C_ctmk_rnd2 to be sent to POS terminal.
Another technical scheme of the present invention is:
A kind of POS terminal, comprises the first memory module, the first authentication module, the first data transmit-receive module, the first encryption/decryption module, the first judge module, the first random-number-generating module, first memory module is for storing described acquirer root certificate AcquireRCRT, and described acquirer root certificate AcquireRCRT is produced by CA center, the acquirer work certificate AcquireWCRT that first data transmit-receive module sends for receiving key downloader, described acquirer work certificate AcquireWCRT use private key AcquireRCRT_Prk public signature key AcquireWCRT_Pu to generate, first authentication module for using the legitimacy of acquirer root certificate AcquireRCRT certification acquirer work certificate AcquireWCRT, and for when certification is legal, extracts AcquireWCRT_Pu from acquirer work certificate AcquireWCRT, first random-number-generating module is for generation of the first random number R nd1, the second random number R nd2, first encryption/decryption module generates random number ciphertext C_rnd1_rnd2 for using AcquireWCRT_Pu to encrypt the first random number R nd and the second random number R nd2, first data transmit-receive module is used for random number ciphertext C_rnd1_mrnd2 to be sent to key downloader, the second master key ciphertext C_ctmk_rnd2 that first data transmit-receive module sends for receiving key downloader, the first encryption/decryption module AcquireWCRT_Pu that is used for using public-key deciphers the second master key ciphertext C_ctmk_rnd2 and obtains master key ciphertext Ctmk and the 4th random number R nd2 ', described second master key ciphertext C_ctmk_rnd2 generates for using private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ', described master key ciphertext Ctmk is that use the 3rd random number R nd1 ' ciphering terminal master key TMK generates, described 3rd random number R nd1 ', 4th random number R nd2 ' obtains for using private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2, whether the first judge module is consistent with the second random number R nd2 for judging the 4th random number R nd2 ', first encryption/decryption module is used for when the 4th random number R nd2 ' is consistent with the second random number R nd2, uses the first random number R nd1 to decipher master key ciphertext Ctmk and obtains terminal master key TMK, and terminal master key TMK is stored to code keypad.
Beneficial effect of the present invention is: the present invention, by the form transmission master key TMK of the ciphertext after asymmetric encryption, only has POS terminal just can untie ciphertext, realizes master key secure download, effectively prevent in master key transmitting procedure by the risk intercepted and captured.Further, the present invention produces work certificate and root certificate by CA center, work certificate is stored in key downloader, by root certificate storage in POS terminal, the authentication of key downloader and POS terminal is realized by root certificate and work certificate, thus prevent key downloader from master key is downloaded to POS terminal beyond this acquirer, realize the privatization of POS terminal.Further, the present invention downloads both sides by random number to master key and carries out authentication, effectively prevents resetting attack pattern and steals master key.
Accompanying drawing explanation
Fig. 1 is the structured flowchart of the system of a kind of secure download terminal master key of an embodiment of the present invention;
Fig. 2 is the method flow diagram of the method for a kind of secure download terminal master key of an embodiment of the present invention.
Main element symbol description
10:POS terminal; 20: key downloader; 30:CA center; 101: the first authentication modules; 102: the first data transmit-receive modules; 103: the first encryption/decryption module; 104: the first judge modules; 105: the first random number modules; 201: key generation module; 202: master key module; 203: the second data transmit-receive modules; 204: the second encryption/decryption module; 301: certificate preset module.
Embodiment
By describing technology contents of the present invention, structural attitude in detail, realized object and effect, accompanying drawing is coordinated to be explained in detail below in conjunction with embodiment.
First, the abbreviation that the present invention relates to and Key Term are defined and are illustrated:
HSM_VENDOR: supplier's hardware encipher machine;
The abbreviation of AUK:Authentication Key, authentication authorization and accounting key, for the two-way authentication between PINPAD and key management system KMS;
CA center: so-called CA(Certificate Authority) center, it adopts PKI(Public KeyInfrastructure) public key infrastructure technology, network ID authentication service is provided specially, be responsible for signing and issuing and managing digital certificate, and there is third party's trust authority that is authoritative and fairness, its effect just as the company of issue certificates in our actual life, as mechanism handled by passport;
The abbreviation of HSM:High Security Machine, high safety equipment are hardware encipher machine within the system;
KMS system: Key Management System, key management system, for office terminal master key TMK;
The abbreviation of MAK:Mac Key, i.e. MAC computation key, consult to determine 24 byte symmetric keys with client, calculates for the MAC value of TK between MTMS system and KMS system;
MTMS: full name Material Tracking Management System, Tracing Material management system, mainly uses when plant produced;
The abbreviation of PIK:Pin Key, i.e. Pin encryption key are the one of working key;
PINPAD: code keypad;
The abbreviation of PK:Protect Key, i.e. Protective Key, consult to determine with client, 24 byte symmetric keys.For the encrypted transmission of TK between MTMS/TCS and KMS;
The abbreviation of POS:Point Of Sale, i.e. point-of-sale terminal
SNpinpad: the sequence number of code keypad, when PINPAD is built-in, consistent with POS terminal sequence number SNpos;
The sequence number of SN:POS terminal;
The abbreviation of TEK:Transmission Encrypt Key, i.e. traffic encryption key, 24 byte symmetric keys, for the encrypted transmission of TMK between PINPAD and key management system KMS;
The abbreviation of TK:Transmission Key, i.e. transmission security key.Transmission security key is made up of traffic encryption key TEK and two-way authentication key A UK;
The abbreviation of TMS:Terminal Management System, i.e. terminal management system, the functions such as POS terminal information management, software and parameter configuration, remote download, terminal running state information manage for completing, remote diagnosis;
The abbreviation of TMK:Terminal Master Key, i.e. terminal master key, for POS terminal and the encrypted transmission paying working key between receipts single system;
Safe house: there is higher security level other, for the room of service device, just can enter after this room needs authentication.
Intellective IC card: be CPU card, integrated circuit in card comprises central processor CPU, programmable read only memory EEPROM, random access memory ram and is solidificated in the card internal operating system COS (Chip Operating System) in read only memory ROM, and in card, data are divided into outside reading and inter-process part.
Symmetric key: the both sides transmitted and receive data must use identical double secret key expressly to encrypt and decrypt computing.Symmetric key encryption algorithm mainly comprises: DES, 3DES, IDEA, FEAL, BLOWFISH etc.
Unsymmetrical key: rivest, shamir, adelman needs two keys: public-key cryptography (private key Public key) and private cipher key (PKI Private key).Public-key cryptography and private cipher key are a pair, if be encrypted data with public-key cryptography, only had and could decipher with corresponding private cipher key; If be encrypted data with private cipher key, so only had and could decipher with corresponding public-key cryptography.Because encryption and decryption use two different keys, this algorithm is called rivest, shamir, adelman.The basic process that rivest, shamir, adelman realizes confidential information exchange is: Party A generates pair of secret keys and disclosed as Public key to other side by a handle wherein; Party A is sent to again after the Party B obtaining this Public key uses this double secret key confidential information to be encrypted; Party A is decrypted the information after encryption with another private key oneself preserved again.Party A sends to Party B after the PKI of Party B can be used to be encrypted confidential information again; Party B is decrypted the information after encryption with the private spoon of oneself again.Main algorithm has RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC(elliptic curve encryption algorithm).
RSA: a kind of asymmetric key algorithm.RSA public key encryption algorithm is developed in (Massachusetts Institute Technology) by Ron Rivest, Adi Shamirh and Len Adleman for 1977.RSA is named the name from they three of exploitation.RSA is the most influential current public key encryption algorithm, and it can resist up to the present known all cryptographic attacks, is recommended as public key data encryption standard by ISO.RSA Algorithm is true based on a foolproof number theory: be multiplied by two Big prime very easy.RSA Algorithm be first can simultaneously for encrypting the algorithm with digital signature, also easy to understand and operation.RSA is studied public key algorithm the most widely, from three ten years proposed till now, experienced by the test of various attack, gradually for people accept, generally believes it is one of current classic public key scheme.
TDES Triple-DES:DES is a kind of symmetric encipherment algorithm, and key is 8 bytes.TDES is the cryptographic algorithm based on DES, and its key is 16 bytes or 24 bytes.TDES/3DES is the abbreviated expression (i.e. triple DES) of English TripleDES, and DES is then English Data EncryptionStandard(number encryption standard) abbreviated expression.DES is a kind of symmetric key encryption algorithm, the cryptographic algorithm that namely data encryption key is identical with decruption key.DES to be developed at 20 century 70s by IBM Corporation and discloses, and is that U.S. government adopts subsequently, and is admitted by NBS and ANSI (ANSI).TDES/3DES is a kind of pattern of des encryption algorithm, and it uses the double secret key data of 3 64 to carry out Tertiary infilling.It is the safer distortion of of DES.
Refer to Fig. 1, be the structured flowchart of the system of a kind of secure download terminal master key of an embodiment of the present invention, this system comprises: key downloader 20, POS terminal 10 and CA center 30;
Described key downloader 20 comprises key generation module 201, master key module 202, second data transmit-receive module 203, second encryption/decryption module 204, described POS terminal 10 comprises the first authentication module 101, first data transmit-receive module 102, first encryption/decryption module 103, first judge module 104, first random-number-generating module 105, and described CA center comprises certificate preset module.
Key generation module 201 for generation of or import public private key pair private key AcquireWCRT_Prk and PKI AcquireWCRT_Pu, and PKI AcquireWCRT_Pu is issued CA center 30;
Certificate preset module 301 is for generating acquirer root certificate AcquireRCRT and corresponding private key AcquireRCRT_Prk, and the PKI AcquireWCRT_Pu for receiving uses private key AcquireRCRT_Prk signature to generate acquirer work certificate AcquireWCRT; And for acquirer work certificate AcquireWCRT and private key AcquireWCRT_Prk is stored in key downloader 20, acquirer root certificate AcquireRCRT is stored in POS terminal 10;
Second data transmit-receive module 203 is for sending to POS terminal 10 by work certificate AcquireWCRT;
First authentication module 101 for using the legitimacy of acquirer root certificate AcquireRCRT certification acquirer work certificate AcquireWCRT, and for when certification is legal, extracts AcquireWCRT_Pu from acquirer work certificate AcquireWCRT;
First random-number-generating module 105 is for generation of the first random number R nd1, the second random number R nd2;
First encryption/decryption module 103 generates random number ciphertext C_rnd1_rnd2 for using AcquireWCRT_Pu to encrypt the first random number R nd and the second random number R nd2;
First data transmit-receive module 102 is for being sent to key downloader by random number ciphertext C_rnd1_mrnd2;
Second encryption/decryption module 204 obtains the 3rd random number R nd1 ', the 4th random number R nd2 ' for using private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2;
Master key module 201 for generation of or import terminal master key TMK;
Second encryption/decryption module 204 generates master key ciphertext Ctmk for using the 3rd random number R nd1 ' ciphering terminal master key TMK, and use private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ' to generate the second master key ciphertext C_ctmk_rnd2, and the second master key ciphertext C_ctmk_rnd2 is sent to POS terminal 10;
First encryption/decryption module 103 is deciphered the second master key ciphertext C_ctmk_rnd2 for the AcquireWCRT_Pu that uses public-key and is obtained master key ciphertext Ctmk and the 4th random number R nd2 ';
Whether the first judge module 104 is consistent with the second random number R nd2 for judging the 4th random number R nd2 ';
First encryption/decryption module 103, for when the 4th random number R nd2 ' is consistent with the second random number R nd2, uses the first random number R nd1 to decipher master key ciphertext Ctmk and obtains terminal master key TMK, and terminal master key TMK is stored to code keypad.
A kind of key download management of another embodiment of the present invention device, comprises key generation module 201, master key module 202, second data transmit-receive module 203, second encryption/decryption module 204, second memory module.
Key generation module 201 for generation of or import public private key pair private key AcquireWCRT_Prk and PKI AcquireWCRT_Pu, and PKI AcquireWCRT_Pu is issued CA center 30;
The acquirer work certificate AcquireWCRT and corresponding private key AcquireRCRT_Prk that second memory module generates for storing CA center 30, described acquirer work certificate AcquireWCRT use private key AcquireRCRT_Prk public signature key AcquireWCRT_Pu to generate;
Second data transmit-receive module 203 is for sending to POS terminal 10 by acquirer work certificate AcquireWCRT;
The random number ciphertext C_rnd1_mrnd2 that second data transmit-receive module 230 sends for receiving POS terminal 10, described random number ciphertext C_rnd1_mrnd2 are that POS terminal 10 AcquireWCRT_Pu that uses public-key encrypts the first random number R nd and the second random number R nd2 and generates;
Second encryption/decryption module 204 uses private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2 to obtain the 3rd random number R nd1 ', the 4th random number R nd2 ';
Master key module 202 for generation of or import terminal master key TMK;
Second encryption/decryption module 204 generates master key ciphertext Ctmk for using the 3rd random number R nd1 ' ciphering terminal master key TMK, and for using private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ' to generate the second master key ciphertext C_ctmk_rnd2;
Second data transmit-receive module 203 is for being sent to POS terminal by the second master key ciphertext C_ctmk_rnd2.
A kind of POS terminal 10 of another embodiment of the present invention, comprises the first memory module, the first authentication module 101, first data transmit-receive module 102, first encryption/decryption module 103, first judge module 104, first random-number-generating module 105.
First memory module is for storing described acquirer root certificate AcquireRCRT, and described acquirer root certificate AcquireRCRT is produced by CA center 30;
The acquirer work certificate AcquireWCRT that first data transmit-receive module 102 sends for receiving key downloader, described acquirer work certificate AcquireWCRT use private key AcquireRCRT_Prk public signature key AcquireWCRT_Pu to generate;
First authentication module 101 for using the legitimacy of acquirer root certificate AcquireRCRT certification acquirer work certificate AcquireWCRT, and for when certification is legal, extracts AcquireWCRT_Pu from acquirer work certificate AcquireWCRT;
First random-number-generating module 105 is for generation of the first random number R nd1, the second random number R nd2;
First encryption/decryption module 103 generates random number ciphertext C_rnd1_rnd2 for using AcquireWCRT_Pu to encrypt the first random number R nd and the second random number R nd2;
First data transmit-receive module 102 is for being sent to key downloader by random number ciphertext C_rnd1_mrnd2;
The second master key ciphertext C_ctmk_rnd2 that first data transmit-receive module 102 sends for receiving key downloader;
First encryption/decryption module 103 is deciphered the second master key ciphertext C_ctmk_rnd2 for the AcquireWCRT_Pu that uses public-key and is obtained master key ciphertext Ctmk and the 4th random number R nd2 ', described second master key ciphertext C_ctmk_rnd2 generates for using private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ', described master key ciphertext Ctmk is that use the 3rd random number R nd1 ' ciphering terminal master key TMK generates, described 3rd random number R nd1 ', 4th random number R nd2 ' obtains for using private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2,
Whether the first judge module 104 is consistent with the second random number R nd2 for judging the 4th random number R nd2 '; First encryption/decryption module is used for when the 4th random number R nd2 ' is consistent with the second random number R nd2, uses the first random number R nd1 to decipher master key ciphertext Ctmk and obtains terminal master key TMK, and terminal master key TMK is stored to code keypad.
Refer to Fig. 2, be the method flow diagram of the method for a kind of secure download terminal master key of an embodiment of the present invention, the method comprising the steps of:
S1, key downloader produce or import public private key pair private key AcquireWCRT_Prk and PKI AcquireWCRT_Pu, and PKI AcquireWCRT_Pu is issued CA center;
S2, CA center generates acquirer root certificate AcquireRCRT and corresponding private key AcquireRCRT_Prk, is used by the PKI AcquireWCRT_Pu received AcquireRCRT_Prk signature to generate acquirer work certificate AcquireWCRT;
Key downloader stores described acquirer work certificate AcquireWCRT and private key AcquireWCRT_Prk;
POS terminal stores described acquirer root certificate AcquireRCRT;
Work certificate AcquireWCRT is sent to POS terminal by S3, key downloader;
S4, POS terminal use the legitimacy of acquirer root certificate AcquireRCRT certification acquirer work certificate AcquireWCRT, if certification is legal, then extract PKI AcquireWCRT_Pu from acquirer work certificate AcquireWCRT, and produce the first random number R nd1, the second random number R nd2;
S5, the POS terminal AcquireWCRT_Pu that uses public-key encrypts the first random number R nd and the second random number R nd2 and generates random number ciphertext C_rnd1_rnd2, and random number ciphertext C_rnd1_mrnd2 is sent to key downloader;
S6, key downloader use private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2 to obtain the 3rd random number R nd1 ', the 4th random number R nd2 ';
S7, key downloader produce or import terminal master key TMK, the 3rd random number R nd1 ' ciphering terminal master key TMK is used to generate master key ciphertext Ctmk, then use private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ' to generate the second master key ciphertext C_ctmk_rnd2, and the second master key ciphertext C_ctmk_rnd2 is sent to POS terminal;
S8, POS terminal use public-key AcquireWCRT_Pu decipher second master key ciphertext C_ctmk_rnd2 obtain master key ciphertext Ctmk and the 4th random number R nd2 ', then judge that whether the 4th random number R nd2 ' consistent with the second random number R nd2;
If S9 the 4th random number R nd2 ' is consistent with the second random number R nd2, POS terminal uses the first random number R nd1 to decipher master key ciphertext Ctmk and obtains terminal master key TMK, and terminal master key TMK is stored to code keypad.
A kind of key management method of another embodiment of the present invention, comprising:
Key downloader produces or imports public private key pair private key AcquireWCRT_Prk and PKI AcquireWCRT_Pu, and PKI AcquireWCRT_Pu is issued CA center;
Key downloader stores the acquirer work certificate AcquireWCRT and corresponding private key AcquireRCRT_Prk that CA center generates, and described acquirer work certificate AcquireWCRT uses private key AcquireRCRT_Prk public signature key AcquireWCRT_Pu to generate;
Acquirer work certificate AcquireWCRT is sent to POS terminal by key downloader;
Key downloader receives the random number ciphertext C_rnd1_mrnd2 that POS terminal sends, and described random number ciphertext C_rnd1_mrnd2 is that the POS terminal AcquireWCRT_Pu that uses public-key encrypts the first random number R nd and the second random number R nd2 and generates;
Key downloader uses private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2 to obtain the 3rd random number R nd1 ', the 4th random number R nd2 ';
Key downloader produces or imports terminal master key TMK, the 3rd random number R nd1 ' ciphering terminal master key TMK is used to generate master key ciphertext Ctmk, then use private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ' to generate the second master key ciphertext C_ctmk_rnd2, and the second master key ciphertext C_ctmk_rnd2 is sent to POS terminal.
A kind of key downloading management method of another embodiment of the present invention, comprising:
POS terminal stores described acquirer root certificate AcquireRCRT, and described acquirer root certificate AcquireRCRT is produced by CA center;
POS terminal receives the acquirer work certificate AcquireWCRT that key downloader sends, and described acquirer work certificate AcquireWCRT uses private key AcquireRCRT_Prk public signature key AcquireWCRT_Pu to generate;
POS terminal uses the legitimacy of acquirer root certificate AcquireRCRT certification acquirer work certificate AcquireWCRT, if certification is legal, then extract AcquireWCRT_Pu from acquirer work certificate AcquireWCRT, and produce the first random number R nd1, the second random number R nd2;
The POS terminal AcquireWCRT_Pu that uses public-key encrypts the first random number R nd and the second random number R nd2 and generates random number ciphertext C_rnd1_rnd2, and random number ciphertext C_rnd1_mrnd2 is sent to key downloader;
POS terminal receives the second master key ciphertext C_ctmk_rnd2 that key downloader sends, described second master key ciphertext C_ctmk_rnd2 generates for using private key AcquireWCRT_Prk encryption main key ciphertext Ctmk and the 4th random number R nd2 ', described master key ciphertext Ctmk is that use the 3rd random number R nd1 ' ciphering terminal master key TMK generates, and described 3rd random number R nd1 ', the 4th random number R nd2 ' obtain for using private key AcquireWCRT_Prk decrypted random number ciphertext C_rnd1_rnd2;
POS terminal use public-key AcquireWCRT_Pu decipher second master key ciphertext C_ctmk_rnd2 obtain master key ciphertext Ctmk and the 4th random number R nd2 ', then judge that whether the 4th random number R nd2 ' consistent with the second random number R nd2; If the 4th random number R nd2 ' is consistent with the second random number R nd2, POS terminal uses the first random number R nd1 to decipher master key ciphertext Ctmk and obtains terminal master key TMK, and terminal master key TMK is stored to code keypad.
Beneficial effect of the present invention is: the present invention, by the form transmission master key TMK of the ciphertext after asymmetric encryption, only has POS terminal just can untie ciphertext, realizes master key secure download, effectively prevent in master key transmitting procedure by the risk intercepted and captured.Further, the present invention produces work certificate and root certificate by CA center, work certificate is stored in key downloader, by root certificate storage in POS terminal, the authentication of key downloader and POS terminal is realized by root certificate and work certificate, thus prevent key downloader from master key is downloaded to POS terminal beyond this acquirer, realize the privatization of POS terminal.Further, the present invention downloads both sides by random number to master key and carries out authentication, effectively prevents resetting attack pattern and steals master key.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (6)

CN201310740567.8A2013-03-152013-12-27A kind of method and system of secure download terminal master keyActiveCN103729944B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201310740567.8ACN103729944B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key

Applications Claiming Priority (13)

Application NumberPriority DateFiling DateTitle
CN20131008467162013-03-15
CN201310084673.52013-03-15
CN201310084397.22013-03-15
CN20131008467352013-03-15
CN20131008439722013-03-15
CN2013100843972ACN103237004A (en)2013-03-152013-03-15Key download method, key management method, method, device and system for download management
CN201310084671.62013-03-15
CN2013100846538ACN103237005A (en)2013-03-152013-03-15Method and system for key management
CN20131008465382013-03-15
CN2013100846716ACN103220270A (en)2013-03-152013-03-15Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310084653.82013-03-15
CN2013100846735ACN103220271A (en)2013-03-152013-03-15Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310740567.8ACN103729944B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key

Publications (2)

Publication NumberPublication Date
CN103729944A CN103729944A (en)2014-04-16
CN103729944Btrue CN103729944B (en)2015-09-30

Family

ID=50363015

Family Applications (28)

Application NumberTitlePriority DateFiling Date
CN201310740644.XAActiveCN103714638B (en)2013-03-152013-12-27A kind of method and system of quick position terminal master key failed download
CN201310740158.8AActiveCN103716320B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740540.9AActiveCN103716154B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740285.8AActiveCN103729940B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740574.8AActiveCN103729945B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310740430.2AActiveCN103729943B (en)2013-03-152013-12-27A kind of method and system transmission security key being imported KMS system
CN201310740231.1AActiveCN103714635B (en)2013-03-152013-12-27A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN201310742713.0AActiveCN103701610B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740360.0AActiveCN103714636B (en)2013-03-152013-12-27A kind of method of batch capture and upload transfers cipher key T K data and operating terminal
CN201310742648.1AActiveCN103716155B (en)2013-03-152013-12-27A kind of method of automated maintenance POS terminal and operation terminal
CN201310742681.4AActiveCN103714640B (en)2013-03-152013-12-27A kind of sending method of transmission security key and system
CN201310740567.8AActiveCN103729944B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310742661.7AActiveCN103716167B (en)2013-03-152013-12-27Method and device for safely collecting and distributing transmission keys
CN201310740188.9AActiveCN103716153B (en)2013-03-152013-12-27Terminal master key TMK safety downloading method and systems
CN201310740537.7AActiveCN103746800B (en)2013-03-152013-12-27TMK (terminal master key) safe downloading method and system
CN201310740410.5AActiveCN103729942B (en)2013-03-152013-12-27Transmission security key is transferred to the method and system of key server from terminal server
CN201310742686.7AActiveCN103745351B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740642.0AActiveCN103731259B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310741948.8AActiveCN103714639B (en)2013-03-152013-12-27A kind of method and system that realize the operation of POS terminal security
CN201310741949.2AActiveCN103731260B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and system
CN201310742991.6AActiveCN103714641B (en)2013-03-152013-12-27A kind of terminal master key TMK method for safely downloading and system
CN201310740380.8AActiveCN103714637B (en)2013-03-152013-12-27A kind of transmission security key sending method and system, operating terminal
CN201310742886.2AActiveCN103716321B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740264.6AActiveCN103701812B (en)2013-03-152013-12-27TMK (Terminal Master Key) secure downloading method and system
CN201310740226.0AActiveCN103714634B (en)2013-03-152013-12-27A kind of method of main key of secure download terminal and system
CN201310740244.9AActiveCN103701609B (en)2013-03-152013-12-27A kind of server and the method and system operating terminal two-way authentication
CN201310740308.5AActiveCN103729941B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740100.3AActiveCN103714633B (en)2013-03-152013-12-27A kind of method of safe generating transmission key and POS terminal

Family Applications Before (11)

Application NumberTitlePriority DateFiling Date
CN201310740644.XAActiveCN103714638B (en)2013-03-152013-12-27A kind of method and system of quick position terminal master key failed download
CN201310740158.8AActiveCN103716320B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740540.9AActiveCN103716154B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740285.8AActiveCN103729940B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740574.8AActiveCN103729945B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310740430.2AActiveCN103729943B (en)2013-03-152013-12-27A kind of method and system transmission security key being imported KMS system
CN201310740231.1AActiveCN103714635B (en)2013-03-152013-12-27A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN201310742713.0AActiveCN103701610B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740360.0AActiveCN103714636B (en)2013-03-152013-12-27A kind of method of batch capture and upload transfers cipher key T K data and operating terminal
CN201310742648.1AActiveCN103716155B (en)2013-03-152013-12-27A kind of method of automated maintenance POS terminal and operation terminal
CN201310742681.4AActiveCN103714640B (en)2013-03-152013-12-27A kind of sending method of transmission security key and system

Family Applications After (16)

Application NumberTitlePriority DateFiling Date
CN201310742661.7AActiveCN103716167B (en)2013-03-152013-12-27Method and device for safely collecting and distributing transmission keys
CN201310740188.9AActiveCN103716153B (en)2013-03-152013-12-27Terminal master key TMK safety downloading method and systems
CN201310740537.7AActiveCN103746800B (en)2013-03-152013-12-27TMK (terminal master key) safe downloading method and system
CN201310740410.5AActiveCN103729942B (en)2013-03-152013-12-27Transmission security key is transferred to the method and system of key server from terminal server
CN201310742686.7AActiveCN103745351B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740642.0AActiveCN103731259B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310741948.8AActiveCN103714639B (en)2013-03-152013-12-27A kind of method and system that realize the operation of POS terminal security
CN201310741949.2AActiveCN103731260B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and system
CN201310742991.6AActiveCN103714641B (en)2013-03-152013-12-27A kind of terminal master key TMK method for safely downloading and system
CN201310740380.8AActiveCN103714637B (en)2013-03-152013-12-27A kind of transmission security key sending method and system, operating terminal
CN201310742886.2AActiveCN103716321B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740264.6AActiveCN103701812B (en)2013-03-152013-12-27TMK (Terminal Master Key) secure downloading method and system
CN201310740226.0AActiveCN103714634B (en)2013-03-152013-12-27A kind of method of main key of secure download terminal and system
CN201310740244.9AActiveCN103701609B (en)2013-03-152013-12-27A kind of server and the method and system operating terminal two-way authentication
CN201310740308.5AActiveCN103729941B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740100.3AActiveCN103714633B (en)2013-03-152013-12-27A kind of method of safe generating transmission key and POS terminal

Country Status (2)

CountryLink
CN (28)CN103714638B (en)
WO (5)WO2014139403A1 (en)

Families Citing this family (123)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103714638B (en)*2013-03-152015-09-30福建联迪商用设备有限公司A kind of method and system of quick position terminal master key failed download
CN105281896B (en)*2014-07-172018-11-27深圳华智融科技股份有限公司A kind of key POS machine Activiation method and system based on elliptic curve
CN104270346B (en)*2014-09-122017-10-13北京天行网安信息技术有限责任公司The methods, devices and systems of two-way authentication
CN105991536A (en)*2014-11-072016-10-05天地融科技股份有限公司Data interaction system
CN104363090A (en)*2014-11-192015-02-18成都卫士通信息产业股份有限公司Secret key distribution device and method for enhancing safety of banking terminal equipment
CN105681263B (en)*2014-11-202019-02-12广东华大互联网股份有限公司A kind of secrete key of smart card remote application method and application system
CN104486323B (en)*2014-12-102017-10-31福建联迪商用设备有限公司A kind of POS terminal controlled networking activation method and device safely
CN104410641B (en)*2014-12-102017-12-08福建联迪商用设备有限公司A kind of POS terminal controlled networking activation method and device safely
US9485250B2 (en)*2015-01-302016-11-01Ncr CorporationAuthority trusted secure system component
CN105989472A (en)*2015-03-062016-10-05华立科技股份有限公司Wireless mobile configuration, wireless payment configuration and wireless payment configuration method of electric energy measurement system, and public commodity wireless payment configuration
CN106204034B (en)*2015-04-292019-07-23中国电信股份有限公司Using the mutual authentication method and system of interior payment
CN105117665B (en)*2015-07-162017-10-31福建联迪商用设备有限公司A kind of end product pattern and the method and system of development mode handoff-security
CN105184121A (en)*2015-09-022015-12-23上海繁易电子科技有限公司Hardware authorization system and method using remote server
CN106559218A (en)*2015-09-292017-04-05中国电力科学研究院A kind of safe acquisition method of intelligent substation continuous data
CN105243542B (en)*2015-11-132021-07-02咪付(广西)网络技术有限公司Dynamic electronic certificate authentication method
CN105260884A (en)*2015-11-182016-01-20北京微智全景信息技术有限公司POS machine key distributing method and device
CN105530241B (en)*2015-12-072018-12-28咪付(广西)网络技术有限公司The authentication method of mobile intelligent terminal and POS terminal
CN105574722A (en)*2015-12-112016-05-11福建新大陆支付技术有限公司Authorization IC card based remote online authorization method for payment terminal
CN105930718A (en)*2015-12-292016-09-07中国银联股份有限公司Method and apparatus for switching point-of-sale (POS) terminal modes
CN105656669B (en)*2015-12-312019-01-01福建联迪商用设备有限公司The remote repairing method of electronic equipment, is repaired equipment and system at equipment
CN105681032B (en)2016-01-082017-09-12腾讯科技(深圳)有限公司Method for storing cipher key, key management method and device
CN114240421A (en)*2016-01-252022-03-25创新先进技术有限公司 Credit payment method and device based on mobile terminal eSE
CN105743654A (en)*2016-02-022016-07-06上海动联信息技术股份有限公司POS machine secret key remote downloading service system and secret key downloading method
CN105790934B (en)*2016-03-042019-03-15中国银联股份有限公司 An adaptive POS terminal configuration method and its configuration right transfer method
CN107294722A (en)*2016-03-312017-10-24阿里巴巴集团控股有限公司A kind of terminal identity authentication method, apparatus and system
CN105978856B (en)*2016-04-182019-01-25随行付支付有限公司A kind of POS machine key downloading method, apparatus and system
CN106059771A (en)*2016-05-062016-10-26上海动联信息技术股份有限公司Intelligent POS machine secret key management system and method
CN106097608B (en)*2016-06-062018-07-27福建联迪商用设备有限公司Remote cipher key method for down loading and system, acquirer and target POS terminal
CN106127461A (en)*2016-06-162016-11-16中国银联股份有限公司Bi-directional verification method of mobile payment and system
CN107563712A (en)*2016-06-302018-01-09中兴通讯股份有限公司A kind of mobile terminal punch card method, device, equipment and system
CN106027247A (en)*2016-07-292016-10-12宁夏丝路通网络支付有限公司北京分公司Method for remotely issuing POS key
CN106100854A (en)*2016-08-162016-11-09黄朝The reverse authentication method of terminal unit based on authority's main body and system
CN107800538B (en)*2016-09-012021-01-29中电长城(长沙)信息技术有限公司Remote key distribution method for self-service equipment
US11018860B2 (en)2016-10-282021-05-25Microsoft Technology Licensing, LlcHighly available and reliable secret distribution infrastructure
CN106571915A (en)*2016-11-152017-04-19中国银联股份有限公司Terminal master key setting method and apparatus
CN106603496B (en)*2016-11-182019-05-21新智数字科技有限公司A kind of guard method, smart card, server and the communication system of data transmission
CN106656488B (en)*2016-12-072020-04-03百富计算机技术(深圳)有限公司 Key download method and device for POS terminal
CN106712939A (en)*2016-12-272017-05-24百富计算机技术(深圳)有限公司Offline key transmission method and device
US10432730B1 (en)2017-01-252019-10-01United States Of America As Represented By The Secretary Of The Air ForceApparatus and method for bus protection
CN106953731B (en)*2017-02-172020-05-12福建魔方电子科技有限公司Authentication method and system for terminal administrator
CN107466455B (en)*2017-03-152021-05-04深圳大趋智能科技有限公司POS machine security verification method and device
US10296477B2 (en)2017-03-302019-05-21United States of America as represented by the Secretary of the AirForceData bus logger
CN106997533B (en)*2017-04-012020-10-13福建实达电脑设备有限公司POS terminal product safety production authorization management system and method
CN107094138B (en)*2017-04-112019-09-13郑州信大捷安信息技术股份有限公司A kind of smart home safe communication system and communication means
CN107070925A (en)*2017-04-182017-08-18上海赛付网络科技有限公司A kind of terminal applies and the anti-tamper method of background service communication packet
CN107104795B (en)*2017-04-252020-09-04上海汇尔通信息技术有限公司Method, framework and system for injecting RSA key pair and certificate
CN107360652A (en)*2017-05-312017-11-17江苏普世祥光电技术有限公司A kind of control method of square landscape lamp
CN107301437A (en)*2017-05-312017-10-27江苏普世祥光电技术有限公司A kind of control system of square landscape lamp
CN107358441B (en)*2017-06-262020-12-18北京明华联盟科技有限公司 Payment verification method, system, mobile device and security authentication device
WO2019023979A1 (en)*2017-08-022019-02-07福建联迪商用设备有限公司Method for generating configurable pos machine secret key pair, and storage medium
CN107666420B (en)*2017-08-302020-12-15宁波梦居智能科技有限公司Method for production control and identity authentication of intelligent home gateway
CN107392591B (en)*2017-08-312020-02-07恒宝股份有限公司Online recharging method and system for industry card and Bluetooth read-write device
CN107888379A (en)*2017-10-252018-04-06百富计算机技术(深圳)有限公司A kind of method of secure connection, POS terminal and code keypad
WO2019080095A1 (en)*2017-10-272019-05-02福建联迪商用设备有限公司Financial payment terminal activation method and system
CN107835170B (en)*2017-11-042021-04-20上海动联信息技术股份有限公司Intelligent Pos equipment safety authorization dismantling system and method
CN107993062A (en)*2017-11-272018-05-04百富计算机技术(深圳)有限公司POS terminal method of commerce, device, computer equipment and readable storage medium storing program for executing
CN107944250B (en)*2017-11-282021-04-13艾体威尔电子技术(北京)有限公司Key acquisition method applied to POS machine
CN107919962B (en)*2017-12-222021-01-15国民认证科技(北京)有限公司Internet of things equipment registration and authentication method
CN108365950A (en)*2018-01-032018-08-03深圳怡化电脑股份有限公司The generation method and device of financial self-service equipment key
CN108390851B (en)*2018-01-052020-07-03郑州信大捷安信息技术股份有限公司Safe remote control system and method for industrial equipment
WO2019136736A1 (en)*2018-01-152019-07-18福建联迪商用设备有限公司Software encryption terminal, payment terminal, and software package encryption and decryption method and system
WO2019153119A1 (en)*2018-02-062019-08-15福建联迪商用设备有限公司Method for transmitting key, receiving terminal and distribution terminal
CN108446539B (en)*2018-03-162023-01-13福建深空信息技术有限公司Software authorization method and software authorization file generation system
WO2019178763A1 (en)*2018-03-212019-09-26福建联迪商用设备有限公司Certificate importing method and terminal
CN108496194A (en)*2018-03-212018-09-04福建联迪商用设备有限公司 A method, server and system for verifying terminal legitimacy
WO2019200530A1 (en)*2018-04-172019-10-24福建联迪商用设备有限公司Remote distribution method and system for terminal master key
CN108737106B (en)*2018-05-092021-06-01深圳壹账通智能科技有限公司User authentication method and device on block chain system, terminal equipment and storage medium
CN108833088A (en)*2018-05-222018-11-16珠海爱付科技有限公司A kind of POS terminal Activiation method
CN110581829A (en)*2018-06-082019-12-17中国移动通信集团有限公司 Communication method and device
CN109218293B (en)*2018-08-212021-09-21西安得安信息技术有限公司Use method of distributed password service platform key management
CN109347625B (en)*2018-08-312020-04-24阿里巴巴集团控股有限公司Password operation method, work key creation method, password service platform and equipment
CN109326061B (en)*2018-09-102021-10-26惠尔丰(中国)信息系统有限公司Anti-cutting method of intelligent POS
CN109274500B (en)*2018-10-152020-06-02百富计算机技术(深圳)有限公司 A key downloading method, client, cryptographic device and terminal device
CN109274684B (en)*2018-10-312020-12-29中国—东盟信息港股份有限公司Internet of things terminal system based on integration of eSIM communication and navigation service and implementation method thereof
CN109547208B (en)*2018-11-162021-11-09交通银行股份有限公司Online distribution method and system for master key of financial electronic equipment
CN109670289B (en)*2018-11-202020-12-15福建联迪商用设备有限公司Method and system for identifying legality of background server
CN109508995A (en)*2018-12-122019-03-22福建新大陆支付技术有限公司A kind of off line authorization method and payment terminal based on payment terminal
CN109510711B (en)*2019-01-082022-04-01深圳市网心科技有限公司Network communication method, server, client and system
CN111627174B (en)*2019-02-282024-12-06南京摩铂汇信息技术有限公司 Bluetooth POS equipment and payment system
CN110011794B (en)*2019-04-112021-08-13北京智芯微电子科技有限公司 Test Methods for Cipher Key Properties
CN109995532A (en)*2019-04-112019-07-09晏福平A kind of online management method and system of terminal master key
CN110061848B (en)*2019-04-172021-09-14飞天诚信科技股份有限公司Method for safely importing secret key of payment terminal, payment terminal and system
CN110545542B (en)*2019-06-132023-03-14银联商务股份有限公司Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN112532567A (en)*2019-09-192021-03-19中国移动通信集团湖南有限公司Transaction encryption method and POSP system
CN110855442A (en)*2019-10-102020-02-28北京握奇智能科技有限公司PKI (public key infrastructure) technology-based inter-device certificate verification method
CN111132154B (en)*2019-12-262022-10-21飞天诚信科技股份有限公司Method and system for negotiating session key
CN111193748B (en)*2020-01-062021-12-03惠州市德赛西威汽车电子股份有限公司Interactive key security authentication method and system
CN111275440B (en)*2020-01-192023-11-10中钞科堡现金处理技术(北京)有限公司Remote key downloading method and system
TWI775061B (en)*2020-03-302022-08-21尚承科技股份有限公司Protection system and method for soft/firmware or data
CN111597512B (en)*2020-03-312023-10-31尚承科技股份有限公司Soft firmware or data protection system and protection method
CN111526013B (en)*2020-04-172023-05-05中国人民银行清算总中心Key distribution method and system
CN111884804A (en)*2020-06-152020-11-03上海祥承通讯技术有限公司Remote key management method
CN111815811B (en)*2020-06-222022-09-06合肥智辉空间科技有限责任公司Electronic lock safety coefficient
CN114024949A (en)*2020-07-172022-02-08华为技术有限公司Data transmission method and device
CN111950999B (en)*2020-07-282024-06-04银盛支付服务股份有限公司Method and system for realizing key filling safety based on IC card on POS machine
CN111931206A (en)*2020-07-312020-11-13银盛支付服务股份有限公司Data encryption method based on APP
CN112134849B (en)*2020-08-282024-02-20国电南瑞科技股份有限公司 A dynamic trusted encrypted communication method and system for smart substations
CN112182599B (en)*2020-09-152024-06-11中信银行股份有限公司Automatic loading method and device for master key, electronic equipment and readable storage medium
CN112311528B (en)*2020-10-172023-06-23深圳市德卡科技股份有限公司Data security transmission method based on cryptographic algorithm
CN112291232B (en)*2020-10-272021-06-04中国联合网络通信有限公司深圳市分公司Safety capability and safety service chain management platform based on tenants
CN112332978B (en)*2020-11-102022-09-20上海商米科技集团股份有限公司Remote key injection method based on key agreement
CN112396416A (en)*2020-11-182021-02-23上海商米科技集团股份有限公司Method for loading certificate of intelligent POS equipment
CN112560058B (en)*2020-12-172022-12-30山东华芯半导体有限公司SSD partition encryption storage system based on intelligent password key and implementation method thereof
CN112968776B (en)*2021-02-022022-09-02中钞科堡现金处理技术(北京)有限公司Method, storage medium and electronic device for remote key exchange
CN113037494B (en)*2021-03-022023-05-23福州汇思博信息技术有限公司Burning piece mirror image file signature method and terminal
CN113450511A (en)*2021-03-252021-09-28深圳怡化电脑科技有限公司Transaction method of acceptance terminal equipment and bank system and acceptance terminal equipment
CN113132980B (en)*2021-04-022023-10-13四川省计算机研究院Key management system method and device applied to Beidou navigation system
CN113328851B (en)*2021-04-212022-01-14北京连山科技股份有限公司Method and system for randomly transmitting secret key under multilink condition
CN115620411A (en)*2021-07-162023-01-17交通运输部路网监测与应急处置中心ETC parking transaction safety certification system facing public network
CN113708923A (en)*2021-07-292021-11-26银盛支付服务股份有限公司Method and system for remotely downloading master key
CN113645221A (en)*2021-08-062021-11-12中国工商银行股份有限公司Encryption method, device, equipment, storage medium and computer program
CN113810391A (en)*2021-09-012021-12-17杭州视洞科技有限公司Cross-machine-room communication bidirectional authentication and encryption method
CN113612612A (en)*2021-09-302021-11-05阿里云计算有限公司Data encryption transmission method, system, equipment and storage medium
CN114423003B (en)*2021-12-292024-01-30中国航空工业集团公司西安飞机设计研究所Airplane key comprehensive management method and system
CN114499891B (en)*2022-03-212024-05-31宁夏凯信特信息科技有限公司Signature server system and signature verification method
CN114726521A (en)*2022-04-142022-07-08广东好太太智能家居有限公司 Smart lock temporary password generation method and electronic device
CN115085981A (en)*2022-05-312022-09-20深圳市旭子科技有限公司Self-service terminal with data communication encryption function
CN115604133A (en)*2022-09-292023-01-13成都卫士通信息产业股份有限公司(Cn) An access control method, device, system and medium for an operation and maintenance terminal
CN115632769B (en)*2022-10-122025-02-11北京捷文科技股份有限公司 Payment terminal comprehensive key management method, system and computer readable storage medium
CN116233094A (en)*2022-12-312023-06-06北京结慧科技有限公司Method for downloading POS terminal key by key IC card
CN117176339B (en)*2023-08-312024-06-18深圳手付通科技有限公司 A method and system for online updating of master key TMK of POS terminal equipment
CN116865966B (en)*2023-09-042023-12-05中量科(南京)科技有限公司Encryption method, device and storage medium for generating working key based on quantum key
CN119172743B (en)*2024-08-152025-09-09北京智芯微电子科技有限公司Terminal identity identification method, device and system

Family Cites Families (66)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPS57157371A (en)*1981-03-241982-09-28Sharp CorpElectronic cash register
JP2993833B2 (en)*1993-11-291999-12-27富士通株式会社 POS system
JPH10112883A (en)*1996-10-071998-04-28Hitachi Ltd Wireless communication switching system, exchange, public key management device, mobile terminal, and mobile terminal authentication method
CN1285559C (en)*1999-03-222006-11-22普拉克生化公司Method of industrial-scale purification of lactic acid
CN1127033C (en)*2000-07-202003-11-05天津南开戈德集团有限公司Radio mobile network point of sale (POS) terminal system and operation method thereof
US7110986B1 (en)*2001-04-232006-09-19Diebold, IncorporatedAutomated banking machine system and method
KR100641824B1 (en)*2001-04-252006-11-06주식회사 하렉스인포텍 Financial Information Input Method Using Symmetric Key Security Algorithm and Its Commerce Communication System
JP2002366285A (en)*2001-06-052002-12-20Matsushita Electric Ind Co Ltd POS terminal
GB2384402B (en)*2002-01-172004-12-22Toshiba Res Europ LtdData transmission links
JP2003217028A (en)*2002-01-242003-07-31Tonfuu:KkOperation situation monitoring system for pos terminal device
US7395427B2 (en)*2003-01-102008-07-01Walker Jesse RAuthenticated key exchange based on pairwise master key
JP2005117511A (en)*2003-10-102005-04-28Nec CorpQuantum cipher communication system and quantum cipher key distributing method used therefor
KR101282972B1 (en)*2004-03-222013-07-08삼성전자주식회사Authentication between a device and a portable storage
US20060093149A1 (en)*2004-10-302006-05-04Shera International Ltd.Certified deployment of applications on terminals
DE102005022019A1 (en)*2005-05-122007-02-01Giesecke & Devrient Gmbh Secure processing of data
KR100652125B1 (en)*2005-06-032006-12-01삼성전자주식회사 Mutual authentication method for overall authentication and management between service provider, terminal, and user identification module, system and terminal device using same
CN100583743C (en)*2005-07-222010-01-20华为技术有限公司Distributing method for transmission key
MX2008010705A (en)*2006-02-222009-03-02Hypercom CorpSecure electronic transaction system.
JP2007241351A (en)*2006-03-062007-09-20Cela System:Kk Customer / product / stock management system (including POS) and mobile / customer integrated management system
EP1833009B1 (en)*2006-03-092019-05-08First Data CorporationSecure transaction computer network
US7818264B2 (en)*2006-06-192010-10-19Visa U.S.A. Inc.Track data encryption
CN101064695A (en)*2007-05-162007-10-31杭州看吧科技有限公司P2P(Peer to Peer) safe connection method
CN101145913B (en)*2007-10-252010-06-16东软集团股份有限公司A method and system for network security communication
WO2009070041A2 (en)*2007-11-302009-06-04Electronic Transaction Services LimitedPayment system and method of operation
CN101541002A (en)*2008-03-212009-09-23展讯通信(上海)有限公司Web server-based method for downloading software license of mobile terminal
CN101615322B (en)*2008-06-252012-09-05上海富友金融网络技术有限公司Mobile terminal payment method and mobile terminal payment system for realizing magnetic payment function
JP4666240B2 (en)*2008-07-142011-04-06ソニー株式会社 Information processing apparatus, information processing method, program, and information processing system
CN101686225A (en)*2008-09-282010-03-31中国银联股份有限公司Methods of data encryption and key generation for on-line payment
KR20100052668A (en)*2008-11-112010-05-20노틸러스효성 주식회사Method for on-line sharing of tmk(terminal master key) between atm and host
JP5329184B2 (en)*2008-11-122013-10-30株式会社日立製作所 Public key certificate verification method and verification server
CN101425208B (en)*2008-12-052010-11-10浪潮齐鲁软件产业有限公司Method for safely downloading cipher key of finance tax-controlling cashing machine
CN101527714B (en)*2008-12-312012-09-05飞天诚信科技股份有限公司Method, device and system for accreditation
CN101930644B (en)*2009-06-252014-04-16中国银联股份有限公司Method for safely downloading master key automatically in bank card payment system and system thereof
CN101719895A (en)*2009-06-262010-06-02中兴通讯股份有限公司Data processing method and system for realizing secure communication of network
CN101593389B (en)*2009-07-012012-04-18中国建设银行股份有限公司Key management method and system for POS terminal
CN101631305B (en)*2009-07-282011-12-07交通银行股份有限公司Encryption method and system
CN101656007B (en)*2009-08-142011-02-16通联支付网络服务股份有限公司Safe system realizing one machine with multiple ciphers on POS machine and method thereof
CN102064939B (en)*2009-11-132013-06-12福建联迪商用设备有限公司Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
CN101710436B (en)*2009-12-012011-12-14中国建设银行股份有限公司Method and system for controlling POS terminal and POS terminal management equipment
CN101807994B (en)*2009-12-182012-07-25北京握奇数据系统有限公司Method and system for application data transmission of IC card
CN102148799B (en)*2010-02-052014-10-22中国银联股份有限公司Key downloading method and system
CN201656997U (en)*2010-04-282010-11-24中国工商银行股份有限公司Device for generating transmission key
CN101807997B (en)*2010-04-282012-08-22中国工商银行股份有限公司Device and method for generating transmission key
CN102262760A (en)*2010-05-282011-11-30杨筑平 Transaction security method, acceptance device and submission software
EP2604017B1 (en)*2010-08-102017-10-04Google Technology Holdings LLCSystem and method for cognizant transport layer security
CN101938520B (en)*2010-09-072015-01-28中兴通讯股份有限公司Mobile terminal signature-based remote payment system and method
CN101976403A (en)*2010-10-292011-02-16北京拉卡拉网络技术有限公司Phone number payment platform, payment trading system and method thereof
CN102013982B (en)*2010-12-012012-07-25银联商务有限公司Long-distance encryption method, management method, as well as encryption management method, device and system
CN102903189A (en)*2011-07-252013-01-30上海昂贝电子科技有限公司Terminal transaction method and device
CN102394749B (en)*2011-09-262014-03-05深圳市文鼎创数据科技有限公司Line protection method, system, information safety equipment and application equipment for data transmission
CN102521935B (en)*2011-12-152013-12-11福建联迪商用设备有限公司Method and apparatus for state detection of POS machine
CN102592369A (en)*2012-01-142012-07-18福建联迪商用设备有限公司Method for self-service terminal access to financial transaction center
CN102624710B (en)*2012-02-272015-03-11福建联迪商用设备有限公司Sensitive information transmission method and sensitive information transmission system
CN102624711B (en)*2012-02-272015-06-03福建联迪商用设备有限公司Sensitive information transmission method and sensitive information transmission system
CN102647274B (en)*2012-04-122014-10-08福建联迪商用设备有限公司POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof
CN102707972B (en)*2012-05-022016-03-09银联商务有限公司A kind of POS terminal method for updating program and system
CN102768744B (en)*2012-05-112016-03-16福建联迪商用设备有限公司A kind of remote safe payment method and system
CN102868521B (en)*2012-09-122015-03-04成都卫士通信息产业股份有限公司Method for enhancing secret key transmission of symmetrical secret key system
CN103116505B (en)*2012-11-162016-05-25福建联迪商用设备有限公司A kind of method that Auto-matching is downloaded
CN103117855B (en)*2012-12-192016-07-06福建联迪商用设备有限公司A kind of method of the method generating digital certificate and backup and recovery private key
CN103237005A (en)*2013-03-152013-08-07福建联迪商用设备有限公司Method and system for key management
CN103220271A (en)*2013-03-152013-07-24福建联迪商用设备有限公司Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103714638B (en)*2013-03-152015-09-30福建联迪商用设备有限公司A kind of method and system of quick position terminal master key failed download
CN103237004A (en)*2013-03-152013-08-07福建联迪商用设备有限公司Key download method, key management method, method, device and system for download management
CN103220270A (en)*2013-03-152013-07-24福建联迪商用设备有限公司Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103269266B (en)*2013-04-272016-07-06北京宏基恒信科技有限责任公司The safety certifying method of dynamic password and system

Also Published As

Publication numberPublication date
CN103716153A (en)2014-04-09
CN103714639A (en)2014-04-09
WO2014139406A1 (en)2014-09-18
CN103701812B (en)2017-01-25
CN103714640B (en)2016-02-03
CN103716320B (en)2017-08-01
CN103729940A (en)2014-04-16
CN103714634A (en)2014-04-09
WO2014139412A1 (en)2014-09-18
CN103716155A (en)2014-04-09
CN103729945B (en)2015-11-18
CN103714633A (en)2014-04-09
CN103714635A (en)2014-04-09
CN103716155B (en)2016-08-17
CN103714635B (en)2015-11-11
CN103714637B (en)2016-03-16
CN103701812A (en)2014-04-02
CN103714633B (en)2016-05-04
CN103731259B (en)2017-08-01
CN103729944A (en)2014-04-16
CN103714641B (en)2016-03-30
CN103746800A (en)2014-04-23
CN103714636B (en)2015-12-02
CN103716153B (en)2017-08-01
CN103714636A (en)2014-04-09
CN103729941A (en)2014-04-16
CN103716167B (en)2017-01-11
CN103714637A (en)2014-04-09
CN103729942A (en)2014-04-16
CN103716154B (en)2017-08-01
WO2014139408A1 (en)2014-09-18
CN103714641A (en)2014-04-09
CN103729943B (en)2015-12-30
CN103714638A (en)2014-04-09
CN103731260B (en)2016-09-28
CN103731260A (en)2014-04-16
CN103746800B (en)2017-05-03
CN103716167A (en)2014-04-09
CN103714639B (en)2016-05-04
CN103745351B (en)2017-09-29
CN103716154A (en)2014-04-09
CN103729940B (en)2016-06-15
CN103729943A (en)2014-04-16
CN103731259A (en)2014-04-16
CN103716321B (en)2017-08-29
CN103729945A (en)2014-04-16
CN103729941B (en)2016-06-15
CN103714634B (en)2016-06-15
CN103701610B (en)2018-04-17
CN103729942B (en)2016-01-13
CN103716320A (en)2014-04-09
CN103716321A (en)2014-04-09
WO2014139411A1 (en)2014-09-18
CN103714638B (en)2015-09-30
CN103701609A (en)2014-04-02
CN103714640A (en)2014-04-09
WO2014139403A1 (en)2014-09-18
CN103745351A (en)2014-04-23
CN103701609B (en)2016-09-28
CN103701610A (en)2014-04-02

Similar Documents

PublicationPublication DateTitle
CN103729944B (en)A kind of method and system of secure download terminal master key
CN103716168B (en)Secret key management method and system
US9647845B2 (en)Key downloading method, management method, downloading management method, device and system
CN103714642B (en)Key downloading method, management method, downloading management method and device and system
EP3022700B1 (en)Secure remote payment transaction processing
CN101930644B (en)Method for safely downloading master key automatically in bank card payment system and system thereof
US20160036793A1 (en)Key downloading method, management method, downloading management method, device and system

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C53Correction of patent for invention or patent application
CB03Change of inventor or designer information

Inventor after:Meng Luqiang

Inventor after:Su Wenlong

Inventor after:Peng Botao

Inventor after:Hong Yixuan

Inventor before:Meng Luqiang

Inventor before:Su Wenlong

Inventor before:Peng Botao

CORChange of bibliographic data

Free format text:CORRECT: INVENTOR; FROM: MENG LUQIANG SU WENLONG PENG BOTAO TO: MENG LUQIANG SU WENLONG PENG BOTAO HONG YIXUAN

C14Grant of patent or utility model
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp