Movatterモバイル変換


[0]ホーム

URL:


CN103731259B - A kind of terminal master key TMK safety downloading method and systems - Google Patents

A kind of terminal master key TMK safety downloading method and systems
Download PDF

Info

Publication number
CN103731259B
CN103731259BCN201310740642.0ACN201310740642ACN103731259BCN 103731259 BCN103731259 BCN 103731259BCN 201310740642 ACN201310740642 ACN 201310740642ACN 103731259 BCN103731259 BCN 103731259B
Authority
CN
China
Prior art keywords
key
random number
terminal
kms
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310740642.0A
Other languages
Chinese (zh)
Other versions
CN103731259A (en
Inventor
洪逸轩
苏文龙
孟陆强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN2013100843972Aexternal-prioritypatent/CN103237004A/en
Priority claimed from CN2013100846538Aexternal-prioritypatent/CN103237005A/en
Priority claimed from CN2013100846716Aexternal-prioritypatent/CN103220270A/en
Priority claimed from CN2013100846735Aexternal-prioritypatent/CN103220271A/en
Application filed by Fujian Landi Commercial Equipment Co LtdfiledCriticalFujian Landi Commercial Equipment Co Ltd
Priority to CN201310740642.0ApriorityCriticalpatent/CN103731259B/en
Priority to PCT/CN2014/073215prioritypatent/WO2014139406A1/en
Publication of CN103731259ApublicationCriticalpatent/CN103731259A/en
Application grantedgrantedCritical
Publication of CN103731259BpublicationCriticalpatent/CN103731259B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The present invention discloses a kind of terminal master key TMK method for safely downloading, including step:Payment terminal produces transmission cipher key T K;Vendor key management system carries out being sent to payment terminal after turning encryption to TK;Operate terminal collection to turn the TK after encryption, and be transferred to KMS systems;KMS systems carry out authentication with payment system;Certification is sent to payment terminal by rear KMS systems by operating terminal by terminal master key TMK.Beneficial effects of the present invention are:TK of the present invention is uploaded and TMK is downloaded by operating terminal to carry out, and TMK, which is downloaded, directly to be continued after TK uploading steps, substantially increases TMK download time efficiency.

Description

A kind of terminal master key TMK safety downloading method and systems
Technical field
The present invention relates to e-payment field, more particularly to a kind of terminal master key TMK safety downloading method and systems.
Background technology
Bank card(BANK Card)Increasingly popularized as the means of payment, common bank card paying system includes salePoint terminal(Point Of Sale, POS), POS receive single system(POSP), code keypad(PIN PAD)With hardware encryption equipment(Hardware and Security Module, HSM).Wherein POS terminal can receive bank card information, with communication work(Can, and receive the instruction completion financial transaction information and the equipment exchanged for information about of teller;POS receives single system to POS terminalManaged concentratedly, including parameter is downloaded, key is downloaded, the transaction request of receiving, processing or forwarding POS terminal, and whole to POSLoopback transaction results information is held, is the system of centralized management and trading processing;Code keypad(PIN PAD)It is that various finance are handed overEasily related key carries out safe storage protection, and PIN is encrypted the safety means of protection;Hardware encryption equipment(HSM)It is the peripheral hardware devices that transmission data are encrypted, the encryption and decryption, checking message and document source for PIN are justTrue property and storage key.Personal identification code(Personal Identification Number, PIN), i.e. personal identification number isThe data message of holder's identity legitimacy is recognized in on-line transaction, any link does not permit in cyber-net systemPerhaps occur in clear text manner;Terminal master key(Terminal Master Key, TMK), it is close to working when POS terminal worksThe master key that key is encrypted, encrypting storing is in system database;POS terminal is widely used in bank card and pays occasion, thanSuch as manufacturer's shopping, hotel accommodations, are a kind of indispensable modernization means of payment, have incorporated the various fields of people's lifeClose.Bank card, particularly debit card, are typically all provided with PIN by holder, and in payment process is carried out, POS terminal is except upperSend outside the data such as the magnetic track information of bank card, also want holder to input the identity legitimacy that PIN verifies holder for issuing bank,Ensure bank card safety of payment, protect the property safety of holder.In order to prevent PIN reveal or be cracked, it is desirable to from terminal toIt is whole that safe encipherment protection is carried out to PIN in the whole information interactive process of issuing bank, not in computer network systemAny link, PIN occurs in clear text manner, therefore the PIN of receiving input at present POS terminal requires outfit key management bodySystem.
The key code system of POS terminal is divided into two grades:Terminal master key(TMK)And working key(WK).Wherein TMK enters to WKRow encipherment protection.Every POS terminal possesses unique TMK, it is necessary to have safeguard protection, it is ensured that can only write device and participate in meterCalculate, it is impossible to read;TMK is a very crucial root key, if TMK is intercepted, working key is just easier to be cracked, willIt is serious to threaten bank card safety of payment.So TMK can be downloaded safely to POS terminal, the pass as whole POS terminal securityKey.
Downloaded to ensure that terminal master key TMK is safe in POS terminal, terminal master key TMK download must be controlledThe safe computer room made in the administrative center of acquirer is carried out, therefore necessarily by manually concentrating POS terminal, and download terminalMaster key TMK.So as to bring maintenance centre's computer room workload big;Equipment needs to transport under the safe computer room of administrative center after dispatching from the factoryTrade company can be just deployed to by carrying key, and cost of transportation rises;In order to concentrate lower dress key, it is necessary to substantial amounts of human hand and working time,The problems such as maintenance cost is big, maintenance period is long.
The content of the invention
In order to solve the above technical problems, one aspect of the present invention is:Under a kind of terminal master key TMK safetySupport method, including step:S1, payment terminal produce transmission cipher key T K and generation transmission key ciphertext;S2, payment terminal are uploadedTransmit key ciphertext and download master key TMK;Wherein step S1 includes:S11, vendor key management system are called first hardPart encryption equipment, KMS systems call the second hardware encryption equipment, respectively will be in the first hardware encryption equipment and the second hardware encryption equipmentAnswer business's authority component and KMS System Privileges component to synthesize protection key PK and MAC key MAK, and key PK is protected by describedIt is respectively stored in the lump in the first hardware encryption equipment and the second hardware encryption equipment with MAC keys MAK;S12, vendor key managementSystem calls the first hardware encryption equipment to produce public private key pair Pu_hsm, Pr_hsm, and public key Pu_hsm is sent into payment terminal;S13, payment terminal call code keypad generation transmission cipher key T K, and the TK includes transmission encryption key TEK and certified transmission is closeKey AUK;S14, payment terminal call code keypad to encrypt TK using public key Pu_hsm, and key ciphertext Ctk_ is transmitted in generation firstPu, and the first transmission key ciphertext Ctk_Pu is sent to vendor key management system;S15, vendor key management systemCall the first hardware encryption equipment to transmit key ciphertext Ctk_Pu using private key Pr_hsm decryption first and obtain transmission cipher key T K;S16、Vendor key management system calls the first hardware encryption equipment using protection key PK encrypted transmission cipher key T K and uses MAC keysMAK calculates MAC value, and key ciphertext Ctk_pk is transmitted in generation second, and the second transmission key ciphertext Ctk_pk is sent into paymentTerminal;Wherein step S2 includes:S21, operation terminal collection payment terminal the second transmission key ciphertext Ctk_pk;S22, operationAuthentication is carried out by CA centers between terminal and KMS systems, certification is sent out the second transmission key ciphertext Ctk_pk by rearGive KMS systems;S23, KMS system call the second hardware encryption equipment to transmit key to inquire second using MAC keys MAKCiphertext Ctk_pk verifies MAC legitimacies, if verification passes through, and key ciphertext Ctk_pk is transmitted using protection key PK decryption secondObtain transmission cipher key T K and store it in the second hardware encryption equipment;S24, KMS system are adjusted after obtaining transmission cipher key T KWith the second hardware encryption equipment two-way authentication is carried out using certification key A UK with payment terminal;If S25, certification pass through, KMS systemsSystem calls the second hardware encryption equipment to generate master key ciphertext Ctmk simultaneously using transmission encryption key TEK ciphering terminal master keys TMKMaster key ciphertext Ctmk is sent to payment terminal;S26, payment terminal call code keypad to use transmission encryption key TEK solutionsClose master key ciphertext Ctmk obtains terminal master key TMK and terminal master key TMK is stored in code keypad.
Another technical scheme that the present invention is provided is:
A kind of safe download systems of terminal master key TMK, including the first hardware encryption equipment, the second hardware encryption equipment, supplyBusiness's key management system, payment terminal, CA centers, operation terminal and KMS systems;The vendor key management system includesArranging key A modules, public key generation module, turn encrypting module, payment terminal include TK generation modules, two-way authentication A modules,TMK receiving modules, operation terminal includes TK acquisition modules, TK uploading modules, ca authentication A modules, and KMS systems include arranging keyB modules, TK receiving modules, ca authentication B modules, two-way authentication B modules, TMK sending modules;Arranging key A modules are with consulting closeKey B modules are used to call the first hardware encryption equipment and the second hardware encryption equipment, respectively in the first hardware encryption equipment and the second hardwareBy supplier's authority component and KMS System Privileges component synthesis protection key PK and MAC key MAK in encryption equipment, and by instituteProtection key PK and MAC key MAK is stated to be respectively stored in the lump in the first hardware encryption equipment and the second hardware encryption equipment;Public key is producedRaw module is used to call the first hardware encryption equipment to produce public private key pair Pu_hsm, Pr_hsm, and public key Pu_hsm is sent into branchPay terminal;TK generation modules are used to call code keypad generation transmission cipher key T K, the TK to include transmission encryption key TEK and biographyDefeated certification key A UK;TK generation modules are additionally operable to call code keypad to encrypt TK using public key Pu_hsm, and the transmission of generation first is closeKey ciphertext Ctk_Pu, and the first transmission key ciphertext Ctk_Pu is sent to vendor key management system;Turn encrypting module useTransmission cipher key T K is obtained in calling the first hardware encryption equipment to transmit key ciphertext Ctk_Pu using private key Pr_hsm decryption first;TurnEncrypting module is additionally operable to call the first hardware encryption equipment using protection key PK encrypted transmission cipher key T K and using MAC keys MAKMAC value is calculated, key ciphertext Ctk_pk is transmitted in generation second, and the second transmission key ciphertext Ctk_pk is sent into payment eventuallyEnd;TK acquisition modules are used for the second transmission key ciphertext Ctk_pk for gathering payment terminal;Ca authentication A modules and ca authentication B mouldsBlock is used to operate between terminal and KMS systems carries out authentication by CA centers;TK uploading modules be used for when certification by after,Second transmission key ciphertext Ctk_pk is sent to KMS systems;TK receiving modules are used to call the second hardware encryption equipment to use MACKey MAK verifies MAC legitimacies to the second transmission key ciphertext Ctk_pk inquired, is additionally operable to, when verification passes through, useProtection key PK decryption second, which transmits key ciphertext Ctk_pk and obtains transmission cipher key T K and store it in second hardware, to be addedIn close machine;Two-way authentication A modules are used to after KMS systems obtain transmission cipher key T K, call the second hardware with two-way authentication B modulesEncryption equipment carries out two-way authentication using certification key A UK with payment terminal;TMK sending modules are used for when KMS systems are with paying eventuallyHold certification by rear, call the second hardware encryption equipment to use transmission encryption key TEK ciphering terminal master keys TMK generation master keysCiphertext Ctmk simultaneously sends master key ciphertext Ctmk to payment terminal;TMK receiving modules are used to call code keypad to use transmissionEncryption key TEK decryption master key ciphertexts Ctmk obtains terminal master key TMK and terminal master key TMK is stored in into code keypadIn.
Beneficial effects of the present invention are:The present invention is entered by payment terminal upload transfers cipher key T K by transmission key to TMKRow encrypted transmission, realizes payment terminal remote download terminal master key TMK, wherein, TK includes transmission encryption key TEK and transmissionCertification key A UK, payment terminal first passes through certification key A UK with KMS systems and carries out bidirectional identity authentication, and certification is by rear with non-Symmetrical transmission encryption key TEK ciphering terminal master keys TMK is transmitted, and safety is downloaded in the transmission for improving TMK.FurtherGround, the master key TMK is downloaded and transmission cipher key T K is uploaded and carried out in the lump, and be all by operating terminal to carry out, becauseThis substantially increases the time efficiency of TMK downloads.Just can uniformly it pass through before payment terminal is dispatched from the factory and is delivered to trade company simultaneouslyTerminal is operated to carry out master key TMK downloads, due to carrying out authentication by CA centers between operation terminal and KMS systems,And TMK is concentrated and is downloaded, therefore master key TMK download risks are substantially reduced, and trade company takes payment terminal justIt can be used directly, greatly facilitate the use of trade company.Further, the vendor key management system and KMS systems pointBe not stored with protection key PK and MAC key MAK, and the transmission cipher key T K that payment terminal is produced is by vendor key management systemUploaded after the MAK encryptions of protection key PK and MAC key, therefore operation terminal is without further being turned encryption to TK,The encryption in TK upload procedures is enormously simplify, the time effect of TK uploads is improved on the premise of TK safe transmissions are ensuredRate.
Brief description of the drawings
Fig. 1 is a kind of structured flowchart of the safe download systems of terminal master key TMK in an embodiment of the present invention;
Fig. 2 is the structured flowchart of two-way authentication A modules in Fig. 1;
Fig. 3 is the structured flowchart of two-way authentication B modules in Fig. 1;
Fig. 4 is a kind of method flow diagram of terminal master key TMK method for safely downloading of an embodiment of the present invention;
Fig. 5 be Fig. 4 in step S1 specific steps flow chart;
Fig. 6 be Fig. 4 in step S2 specific steps flow chart.
Main element symbol description:
10:Payment terminal;20:Operate terminal;30:KMS systems;40:Vendor key management system;50:CA centers;60:First hardware encryption equipment;70:Second hardware encryption equipment;101:TK generation modules;102:TMK receiving modules;103:It is two-way to recognizeDemonstrate,prove A modules;201:TK uploading modules;202:TK acquisition modules;203:Ca authentication A modules;301:Arranging key B modules;302:TK receiving modules;303:Ca authentication B modules;304:Two-way authentication B modules;305:TMK sending modules;401:Arranging key A mouldsBlock;402:Turn encrypting module;403:Public key generation module;501:Certificate preset module;
Embodiment
To describe the technology contents of the present invention in detail, feature, the objects and the effects being constructed, below in conjunction with embodimentAnd coordinate accompanying drawing to be explained in detail.
First, abbreviation of the present invention and Key Term are defined and illustrated:
HSM_VENDOR:Supplier's hardware encryption equipment;
AUK:Authentication Key abbreviation, authentication authorization and accounting key, for PINPAD and key management system KMS itBetween two-way authentication;
CA centers:So-called CA(Certificate Authority)Center, it is to use PKI(Public KeyInfrastructure)Public key infrastructure technology, it is special that network ID authentication service is provided, it is responsible for signing and issuing and managing numberWord certificate, and with third party's trust authority of authoritative and fairness, card is issued in acting like for it in our actual livesThe company of part, such as passport handle mechanism;
HSM:High Security Machine abbreviation, high safety equipment is within the system hardware encryption equipment;
KMS systems:Key Management System, key management system, for management terminal master key TMK;
MAK:Mac Key abbreviation, i.e. MAC computation keys, consult to determine 24 byte symmetric keys, for MTMS with clientTK MAC value is calculated between system and KMS systems;
MTMS:Full name Material Tracking Management System, Tracing Material management system mainly existsUsed during plant produced;
PIK:Pin Key abbreviation, i.e. Pin encryption keys, are one kind of working key;
PINPAD:Code keypad;
PK:Protect Key abbreviation, that is, protect key, consults to determine with client, 24 byte symmetric keys.ForTK encrypted transmission between MTMS/TCS and KMS;
POS:Point Of Sale abbreviation, i.e. point-of-sale terminal
SNpinpad:The sequence number of code keypad, it is consistent with POS terminal sequence number SNpos when PINPAD is built-in;
SN:The sequence number of POS terminal;
TEK:Transmission Encrypt Key abbreviation, that is, transmit encryption key, and 24 byte symmetric keys are used forTMK encrypted transmission between PINPAD and key management system KMS;
TK:Transmission Key abbreviation, that is, transmit key.Transmission key is by transmission encryption key TEK and doubleConstituted to certification key A UK;
TMS:Terminal Management System abbreviation, i.e. terminal management system, for completing POS terminal letterThe function such as breath management, software and parameter configuration, remote download, the management of terminal running state information, remote diagnosis;
TMK:Terminal Master Key abbreviation, i.e. terminal master key, single system is received for POS terminal and paymentBetween working key encrypted transmission;
Safe house:With higher security level not, for the room of service device, the room needs ability after authenticationEnter.
Intellective IC card:For CPU card, the integrated circuit in card includes central processor CPU, programmable read only memoryEEPROM, random access memory ram and card internal operating system COS (the Chip Operating being solidificated in read only memory ROMSystem), data are divided into outside read and inter-process part in card.
Symmetric key:Sending and receiving the both sides of data must use identical key that fortune is encrypted and decrypted to plaintextCalculate.Symmetric key encryption algorithm mainly includes:DES, 3DES, IDEA, FEAL, BLOWFISH etc..
Unsymmetrical key:Rivest, shamir, adelman needs two keys:Public-key cryptography(Private key Public key)With it is privately ownedKey(Public key Private key).Public-key cryptography and private cipher key are a pair, if data are encrypted with public-key cryptography,It could only be decrypted with corresponding private cipher key;If be encrypted with private cipher key pair data, then only use corresponding public affairsOpening key could decrypt.Because encrypt with the decryption key that to use two different, this algorithm be called it is asymmetric plusClose algorithm.Rivest, shamir, adelman realizes that the basic process that confidential information is exchanged is:Party A generates a pair of secret keys and will be thereinOne discloses as Public key to other sides;Confidential information is encrypted using the key by the Party B for obtaining the Public keyAfter be then forwarded to Party A;Party A is decrypted private key to the information after encryption with oneself the another of preservation again.Party A canParty B is then forwarded to after confidential information is encrypted with the public key using Party B;Party B again with the private spoon of oneself to encryption afterInformation is decrypted.Main algorithm has RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC(Elliptic curve encryption algorithm).
RSA:A kind of asymmetric key algorithm.RSA public key encryption algorithms are 1977 by Ron Rivest, AdiShamirh and Len Adleman exist(Massachusetts Institute Technology)Exploitation.RSA is named from the name for developing their threes.RSA is current most influential public key encryption algorithm, and it can resist up to the present known all cryptographic attacks, byISO is recommended as public key data encryption standard.It is true that RSA Algorithm is based on a foolproof number theory:Two Big primes are multipliedIt is very easy.RSA Algorithm is first and can be also easy to understand and operate while be used for the algorithm of encrypted and digitally signed.RSA isBe studied widest public key algorithm, from three ten years till now are proposed, experienced the test of various attacks, gradually forPeople receive, and are widely considered to be one of current classic public key scheme.
TDES Triple-DES:DES is a kind of symmetric encipherment algorithm, and key is 8 bytes.TDES is the encryption based on DESAlgorithm, its key is 16 bytes or 24 bytes.TDES/3DES is English TripleDES abbreviated expression(I.e. triple data encryption marksIt is accurate), DES is then English Data Encryption Standard(Number encryption standard)Abbreviated expression.DES is that a kind of symmetric key addsClose algorithm, i.e. data encryption key and decruption key identical AES.DES is developed by IBM Corporation in 1970sAnd openly, then used for U.S. government, and recognized by NBS and ANSI (ANSI).TDES/3DES is a kind of pattern of des encryption algorithm, and it carries out Tertiary infilling using the data key of 3 64.It is DESA safer deformation.
To solve technical problem present in background technology, the present invention uses a kind of new master key download scenarios, passed throughPOS terminal randomly generates TK(Transmission Key, transmit key), the TK after generation is stored in the password of POS terminalIn keyboard, and TK is sent to KMS by transmission means required under various application scenarios(Key Management System,Key management system, for management terminal master key TMK)In.
As POS terminal application download terminal master key TMK, KMS systems use TK ciphering terminal master key TMK, and willTerminal master key ciphertext after encryption is sent to POS terminal, and POS terminal is decrypted to master key ciphertext with TK after receiving, obtainedIt is stored in terminal master key TMK, and by terminal master key TMK in code keypad.
In this way, by TK ciphering terminal master key TMK, enabling TMK to carry out remote transmission, facilitate TMK safety download.
TMK is encrypted above by being sent after POS terminal collection transmission cipher key T K to bank end, then it is whole by POSTMK method after end remote download is encrypted through TK can realize TMK remote download.But, above-mentioned TMK method for down loading TMKDownload to upload with TK and be carried out separately, be generally that POS terminal produces in manufacturer and uploads TK, wait POS wholeEnd is issued to after each trade company and carries out TMK downloads again, therefore TMK download is scattered progress, and time efficiency is low, KMS systemsWorkload is big, and POS terminal is delivered to arrive and carries out that TMK downloads uncertain factor is more after each trade company again, and TMK download risk is moreIt is high.Therefore the terminal master key TMK method for safely downloading that a kind of time efficiency is higher, download is safer is needed.
Just the technical scheme of above mentioned problem is overcome to be described in detail the present invention below.
Referring to Fig. 1, be a kind of structured flowchart of the safe download systems of terminal master key TMK of an embodiment of the present invention,The system include the first hardware encryption equipment 60, the second hardware encryption equipment 70, vendor key management system 40, payment terminal 10,CA centers 50, operation terminal 20 and KMS systems 30;The vendor key management system 40 includes arranging key A modules401st, public key generation module 403, turn encrypting module 402, payment terminal 10 includes TK generation modules 101, two-way authentication A modules103rd, TMK receiving modules 102, operation terminal 20 includes TK acquisition modules 202, TK uploading modules 201, ca authentication A modules 203,KMS systems 30 include arranging key B modules 301, TK receiving modules 302, ca authentication B modules 303, two-way authentication B modules 304,TMK sending modules 305.
Arranging key A modules 401 are used to call the first hardware encryption equipment 60 and the second hardware with arranging key B modules 301Encryption equipment 70, respectively by supplier's authority component and KMS systems in the first hardware encryption equipment 60 and the second hardware encryption equipment 70Authority component synthesis protection key PK and MAC key MAK, and the protection key PK and MAC key MAK is deposited respectively in the lumpStorage is in the first hardware encryption equipment 60 and the second hardware encryption equipment 70;
Public key generation module 403 is used to call the first hardware encryption equipment 60 to produce public private key pair Pu_hsm, Pr_hsm, and willPublic key Pu_hsm is sent to payment terminal 10;
TK generation modules 101 are used to call code keypad generation transmission cipher key T K, the TK to include transmission encryption key TEKWith certified transmission key A UK;
TK generation modules 101 are additionally operable to call code keypad to encrypt TK using public key Pu_hsm, and key is transmitted in generation firstCiphertext Ctk_Pu, and the first transmission key ciphertext Ctk_Pu is sent to vendor key management system 40;
Turning encrypting module 402 is used to call the first hardware encryption equipment 60 close using private key Pr_hsm decryption the first transmission keyLiterary Ctk_Pu obtains transmission cipher key T K;
Turn encrypting module 402 to be additionally operable to call the first hardware encryption equipment 60 to use protection key PK encrypted transmission cipher key Ts K simultaneouslyMAC value is calculated using MAC keys MAK, key ciphertext Ctk_pk is transmitted in generation second, and transmits key ciphertext Ctk_pk by secondIt is sent to payment terminal 10;
TK acquisition modules 202 are used for the second transmission key ciphertext Ctk_pk for gathering payment terminal;
Ca authentication A modules 203 and ca authentication B modules 304 are used to operate between terminal 20 and KMS systems 30 by CA centers50 carry out authentication;TK uploading modules 201 be used for when certification by after, by second transmit key ciphertext Ctk_pk be sent toKMS systems 30;
TK receiving modules 302 are used for the second transmission for calling the second hardware encryption equipment 70 using MAC keys MAK to inquiringKey ciphertext Ctk_pk verifies MAC legitimacies, is additionally operable to when verification passes through, and key is transmitted using protection key PK decryption secondCiphertext Ctk_pk obtains transmission cipher key T K and stored it in the second hardware encryption equipment 70;
Two-way authentication A modules 103 are used to after KMS systems 30 obtain transmission cipher key T K, adjust with two-way authentication B modules 304With the second hardware encryption equipment 70 two-way authentication is carried out using certification key A UK with payment terminal;
TMK sending modules 305 be used for when KMS systems 30 and the certification of payment terminal 10 by after, call the encryption of the second hardwareMachine 70 is using transmission encryption key TEK ciphering terminal master keys TMK generation master key ciphertext Ctmk and by master key ciphertext CtmkSend to payment terminal 10;
TMK receiving modules 102 are used to call code keypad to obtain using transmission encryption key TEK decryption master key ciphertext CtmkObtain terminal master key TMK and terminal master key TMK is stored in code keypad.
Wherein, the ca authentication A modules include the first random number generation unit, the first data transceiving unit, first plus solutionClose unit, the first judging unit, ca authentication B modules add including the second random number generation unit, the second data transceiving unit, secondDecryption unit, the second judging unit, CA centers include certificate preset module.
Certificate preset module is used for call operation terminal and generates public private key pair Pu_optm and Pr_optm, and by public key Pu_Optm and operation terminal identification information are centrally generated root certificate AuthRCRT_optm and corresponding private key to CA centers, CA is issuedOptmWCRT_Prk, and use private key OptmWCRT_ for the public key Pu_optm that will receive and operation terminal identification informationPrk signature generation digital certificate OptmWCRT, and stored for digital certificate OptmWCRT and private key OptmWCRT_PrkIn operation terminal, root certificate AuthRCRT_optm is stored in KMS systems;
Certificate preset module is used to call the second hardware encryption equipment to produce public private key pair Pr_kms and Pu_kms, and by public keyPu_kms and KMS identification informations issue CA centers, and CA is centrally generated root certificate AuthRCRT_kms and corresponding private keyServerWCRT_Prk, and for the public key received Pu_kms and KMS system identification informations to be used into private keyServerWCRT_Prk signature generation digital certificate ServerWCRT, and for by digital certificate ServerWCRT and correspondinglyPrivate key ServerWCRT_Prk is stored in KMS systems, and root certificate AuthRCRT_kms is stored in into operation terminal;
Second data transceiving unit is used to digital certificate ServerWCRT being sent to operation terminal;
First judging unit is used for the legitimacy using root certificate AuthRCRT_kms checking digital certificates ServerWCRT;First random number generation unit is used for after the digital certificate ServerWCRT is verified, and generates the first random number AT1, andFor the first random number AT1 to be sent into KMS systems;
Second encryption/decryption element is used for random using private key ServerWCRT_Prk signature the first random number AT1 generations firstNumber ciphertext Sign1, and the first random number ciphertext Sign1 is sent to operation terminal;
First judging unit is used to verify that the first random number ciphertext Sign1's is legal using digital certificate ServerWCRTProperty, the first data transceiving unit is used for after the first random number ciphertext Sign1 is verified, digital certificate OptmWCRT is sentGive KMS systems;
Second judging unit is used for the legitimacy using root certificate AuthRCRT_optm checking digital certificates OptmWCRT,Second random number generation unit is used for when digital certificate OptmWCRT is verified after, the second random number AT2 of generation, and by secondRandom number is sent to operation terminal;
First encryption/decryption element is used to encrypt the second random number AT2 generations second with secret using private key OptmWCRT_PrkLiterary Sign2, and the second random ciphertext Sign2 is sent to KMS systems;
Second judging unit is used for the legitimacy that the second random ciphertext Sign2 is verified using digital certificate OptmWCRT, testsAfter card passes through, KMS systems pass through with operation terminal authentication.
Fig. 2 and Fig. 3 are referred to, wherein, Fig. 2 is the structured flowchart of the two-way authentication A modules 103, and Fig. 3 is described two-wayThe structured flowchart of certification B modules 304, the two-way authentication A modules 103 include the 3rd random number generation unit, the 3rd data and receivedBill member, the 3rd encryption/decryption element and the 3rd judging unit, the two-way authentication B modules include the 4th random number and produce listMember, the 4th data transceiving unit, the 4th encryption/decryption element and the 4th judging unit;
3rd random number generation unit is used to produce the 3rd random number AT3;3rd data transceiving unit is used for generation3rd random number AT3 is sent to KMS systems;4th data transceiving unit is used to receive the 3rd random number AT3;4th random number is producedRaw unit is used for when receiving the 3rd random number AT3, produces the 4th random number AT4;4th encryption/decryption element is used to receiveDuring to the 3rd random number AT3, call the 4th hardware encryption equipment to encrypt the 3rd random number AT3 using certified transmission key A UK and obtain3rd random number ciphertext Sign3;4th data transceiving unit is used for the 3rd random number ciphertext Sign3 and the 4th random number AT4It is sent to payment terminal;
3rd encryption/decryption element is used for when receiving the 3rd random number ciphertext Sign3 and the 4th random number AT4, uses biographyThe 3rd random number ciphertext Sign3 that defeated certification key A UK decryption is received obtains the 5th random number AT3 ';3rd judging unit is usedIn judging whether the 5th random number AT3 ' is consistent with the 3rd random number AT3;
3rd encryption/decryption element is used for when the 5th random number AT3 ' is consistent with the 3rd random number AT3, uses certified transmissionKey A UK encrypts the 4th random number AT4 and generates the 4th random number ciphertext Sign4;3rd data transceiving unit be used for by the 4th withMachine number ciphertext Sign4 is sent to KMS systems;
4th encryption/decryption element is used for when receiving the 4th random number ciphertext Sign4, calls the second hardware encryption equipment to makeThe 4th random number ciphertext Sign4 received is decrypted with certified transmission key A UK and obtains the 6th random number AT4 ', the 4th judges singleMember is used to judge whether the 6th random number AT4 ' is consistent with the 4th random number AT4, and as the 6th random number AT4 ' of judgement and the 4thWhen random number AT4 is consistent, confirm that the two-way authentication between KMS systems and payment terminal passes through.
Wherein, the operation terminal also includes operator's card and keeper's card;
The certificate preset module at the CA centers is additionally operable to produce operator's card certificate and keeper's card certificate, and for inciting somebody to actionOperator's card certificate is stored in operator's card and keeper's card certificate is stored in management card;
Operator's card and keeper block for when operation terminal reads the operator's card being inserted in operation terminal and managesReason person blocks, by CA centers operator's certificate and administrator certificate are carried out legitimacy certification by when, authorize to operation terminalOperated.
Wherein, the payment terminal is POS terminal, mobile phone terminal, intellective IC card or ATM terminal.
Referring to Fig. 4, being a kind of terminal master key TMK method for safely downloading, this method bag in an embodiment of the present inventionInclude step:
S1, payment terminal produce transmission cipher key T K and generation transmission key ciphertext;
S2, payment terminal upload transfers key ciphertext and download master key TMK;
Referring to Fig. 5, be the specific steps flow chart of step S1 in Fig. 4, wherein, step S1 includes:
S11, vendor key management system call the first hardware encryption equipment, KMS systems to call the second hardware encryption equipment, pointSupplier's authority component and the synthesis of KMS System Privileges component are protected not in the first hardware encryption equipment and the second hardware encryption equipmentKey PK and MAC key MAK, and the protection key PK and MAC key MAK is respectively stored in the encryption of the first hardware in the lumpIn machine and the second hardware encryption equipment;
S12, vendor key management system call the first hardware encryption equipment to produce public private key pair Pu_hsm, Pr_hsm, andPublic key Pu_hsm is sent to payment terminal;
S13, payment terminal call code keypad generation transmission cipher key T K, the TK to include transmission encryption key TEK and biographyDefeated certification key A UK;
S14, payment terminal call code keypad to encrypt TK using public key Pu_hsm, and key ciphertext Ctk_ is transmitted in generation firstPu, and the first transmission key ciphertext Ctk_Pu is sent to vendor key management system;
S15, vendor key management system call the first hardware encryption equipment close using the transmission of private key Pr_hsm decryption firstKey ciphertext Ctk_Pu obtains transmission cipher key T K;
S16, vendor key management system call the first hardware encryption equipment to use protection key PK encrypted transmission cipher key Ts KAnd MAC value is calculated using MAC keys MAK, key ciphertext Ctk_pk is transmitted in generation second, and transmits key ciphertext Ctk_ by secondPk is sent to payment terminal;
Referring to Fig. 6, be the specific steps flow chart of step S2 in Fig. 4, wherein, step S2 includes:
S21, operation terminal collection payment terminal the second transmission key ciphertext Ctk_pk;
Authentication is carried out by CA centers between S22, operation terminal and KMS systems, certification is by rear, by the second transmissionKey ciphertext Ctk_pk is sent to KMS systems;
S23, KMS system call the second hardware encryption equipment to transmit key ciphertext to inquire second using MAC keys MAKCtk_pk verifies MAC legitimacies, if verification passes through, and transmitting key ciphertext Ctk_pk using protection key PK decryption second obtainsTransmission cipher key T K is simultaneously stored it in the second hardware encryption equipment;
S24, KMS system are obtained calls the second hardware encryption equipment using certification key A UK with paying eventually after transmission cipher key T KEnd carries out two-way authentication;
If S25, certification pass through, KMS systems call the second hardware encryption equipment to use transmission encryption key TEK ciphering terminalsMaster key TMK generates master key ciphertext Ctmk and sends master key ciphertext Ctmk to payment terminal;
S26, payment terminal call code keypad to obtain terminal using transmission encryption key TEK decryption master key ciphertexts CtmkTerminal master key TMK is simultaneously stored in code keypad by master key TMK.
Wherein, the step S22 is specially:
Terminal generation public private key pair Pu_optm and Pr_optm are operated, by public key Pu_optm and operation terminal identification informationIssue CA centers, CA is centrally generated root certificate AuthRCRT_optm and corresponding private key OptmWCRT_Prk, and by the public affairs receivedKey Pu_optm and operation terminal identification information are using private key OptmWCRT_Prk signature generation digital certificate OptmWCRT, by numberWord certificate OptmWCRT and private key OptmWCRT_Prk are stored in operation terminal, and root certificate AuthRCRT_optm is storedIn KMS systems;
KMS systems call the second hardware encryption equipment to produce public private key pair Pr_kms and Pu_kms, by public key Pu_kms and KMSSystem identification information issues CA centers, and CA is centrally generated root certificate AuthRCRT_kms and corresponding private key ServerWCRT_Prk,And public key Pu_kms and the KMS system identification information received is used into private key ServerWCRT_Prk signature generation digital certificatesServerWCRT, is stored in KMS systems by digital certificate ServerWCRT and corresponding private key ServerWCRT_Prk, root is demonstrate,provedBook AuthRCRT_kms is stored in operation terminal;
Digital certificate ServerWCRT is sent to operation terminal by KMS systems;
Terminal is operated to verify digital certificate ServerWCRT legitimacy using root certificate AuthRCRT_kms, if checkingPass through, operation terminal generates the first random number AT1, and the first random number AT1 is sent into KMS systems;
KMS systems generate the first random number ciphertext using the first random number AT1 of private key ServerWCRT_Prk signaturesSign1, and the first random number ciphertext Sign1 is sent to operation terminal;
Terminal is operated to verify the first random number ciphertext Sign1 legitimacy using digital certificate ServerWCRT, checking is logicalLater, digital certificate OptmWCRT is sent to KMS systems;
KMS systems verify digital certificate OptmWCRT legitimacy using root certificate AuthRCRT_optm, are verifiedAfterwards, the second random number AT2 is generated, and the second random number AT2 is sent to operation terminal;
Operate terminal to encrypt the second random number AT2 using private key OptmWCRT_Prk and generate the second random ciphertext Sign2, andSecond random ciphertext Sign2 is sent to KMS systems;
KMS systems verify the second random ciphertext Sign2 legitimacy using digital certificate OptmWCRT, after being verified,KMS systems pass through with operation terminal authentication.
Wherein, the step S24 is specifically included:
Payment terminal produces the 3rd random number AT3 and sends the 3rd random number AT3 to KMS systems;
KMS systems, which are received, produces the 4th random number AT4 after the 3rd random number AT3, call the second hardware encryption equipment using recognizingDemonstrate,prove key A UK and encrypt the 3rd random number AT3 the 3rd random number ciphertext Sign3 of acquisition, by the 3rd random number ciphertext Sign3 and the 4thRandom number AT4 is sent to payment terminal;
Payment terminal is decrypted the 3rd random number ciphertext Sign3 received using certification key A UK and obtains the 5th random numberAT3 ', judges whether the 5th random number AT3 ' is consistent with the 3rd random number AT3:
If the 5th random number AT3 ' is consistent with the 3rd random number AT3, payment terminal uses certification key A UK encryptions the 4thRandom number AT4 generates the 4th random number ciphertext Sign4, and the 4th random number ciphertext Sign4 is sent into KMS systems;
KMS systems call the second hardware encryption equipment to decrypt the 4th random number ciphertext received using certification key A UKSign4 obtains the 6th random number AT4 ', judges whether the 6th random number AT4 ' is consistent with the 4th random number AT4;
If the 6th random number AT4 ' is consistent with the 4th random number AT4, KMS systems pass through with payment terminal certification.
Wherein, the operation to the operation terminal must pass through operator's card and keeper's card is authorized, and specifically include:
Operator blocks and keeper's card produces public private key pair respectively, and public key is issued into CA centers respectively, generates operatorCard certificate and keeper's card certificate, and respectively by operator's card certificate be stored in operator card in keeper's card certificate is stored inIn management card;
Operator's card and keeper's card are inserted in operation terminal, after ca authentication, it is allowed to the operation to operating terminal.
Wherein, the payment terminal is POS terminal, mobile phone terminal, intellective IC card or ATM terminal.
In the present invention, TK original uncommon Kazakhstan value is calculated when transmission cipher key T K is produced, when storing, transmit or use every time TKWhen first verify TK uncommon Kazakhstan value, TK can be just used after upchecking.It can prevent storage from setting by the uncommon Kazakhstan value for verifying TKThe standby abnormal error in data for causing to store, determines whether key is correct.
Beneficial effects of the present invention are:The present invention is entered by payment terminal upload transfers cipher key T K by transmission key to TMKRow encrypted transmission, realizes payment terminal remote download terminal master key TMK, wherein, TK includes transmission encryption key TEK and transmissionCertification key A UK, payment terminal first passes through certification key A UK with KMS systems and carries out bidirectional identity authentication, and certification is by rear with non-Symmetrical transmission encryption key TEK ciphering terminal master keys TMK is transmitted, and safety is downloaded in the transmission for improving TMK.FurtherGround, master key TMK of the present invention is generated by KMS systems, therefore facilitates KMS systems to master key TMK follow-up maintenance and pipeReason.Further, the master key TMK is downloaded and transmission cipher key T K is uploaded and carried out in the lump, and is all by operating terminalCarry out, therefore substantially increase the time efficiency of TMK downloads.Simultaneously just can be with before payment terminal is dispatched from the factory and is delivered to trade companyUnification is by operating terminal to carry out master key TMK downloads, due to carrying out body by CA centers between operation terminal and KMS systemsPart certification, and TMK concentrates and be downloaded, therefore substantially reduce master key TMK and download risk, and trade company takes paymentTerminal just can be used directly, and greatly facilitate the use of trade company.Further, the vendor key management system and KMSSystem is stored with respectively protects key PK and MAC key MAK, and the transmission cipher key T K that payment terminal is produced is managed by vendor keyUploaded after the protection key PK and MAC key MAK encryptions of system, therefore operation terminal to TK without further being turnedEncryption, enormously simplify the encryption in TK upload procedures, and TK uploads are improved on the premise of TK safe transmissions are ensuredTime efficiency.
In the present invention, operation terminal uploads the body certification for carrying out both sides before TK by CA centers with KMS systems, so thatEnsure that TK sends correct receipts list KMS systems to, prevent pseudo- KMS systems from stealing TK information.
In the present invention, KMS systems are recognized before master key TMK is issued by the certification key A UK identity for carrying out both sidesCard, effectively prevents pseudo- payment terminal from stealing TMK, and ensure that payment terminal is to download TMK from correct KMS systems.
In the present invention, the operation terminal is additionally provided with operator's card and keeper's card, only blocks and manages in operatorReason person card authorize in the case of could to operation terminal operate, be effectively ensured upload each TK authenticity withValidity.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hairEquivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skillsArt field, is included within the scope of the present invention.

Claims (10)

CN201310740642.0A2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systemsActiveCN103731259B (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
CN201310740642.0ACN103731259B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
PCT/CN2014/073215WO2014139406A1 (en)2013-03-152014-03-11Method and system for safely downloading terminal master key (tmr)

Applications Claiming Priority (13)

Application NumberPriority DateFiling DateTitle
CN20131008467162013-03-15
CN201310084673.52013-03-15
CN201310084397.22013-03-15
CN20131008467352013-03-15
CN20131008439722013-03-15
CN2013100843972ACN103237004A (en)2013-03-152013-03-15Key download method, key management method, method, device and system for download management
CN201310084671.62013-03-15
CN2013100846538ACN103237005A (en)2013-03-152013-03-15Method and system for key management
CN20131008465382013-03-15
CN2013100846716ACN103220270A (en)2013-03-152013-03-15Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310084653.82013-03-15
CN2013100846735ACN103220271A (en)2013-03-152013-03-15Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310740642.0ACN103731259B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems

Publications (2)

Publication NumberPublication Date
CN103731259A CN103731259A (en)2014-04-16
CN103731259Btrue CN103731259B (en)2017-08-01

Family

ID=50363015

Family Applications (28)

Application NumberTitlePriority DateFiling Date
CN201310740644.XAActiveCN103714638B (en)2013-03-152013-12-27A kind of method and system of quick position terminal master key failed download
CN201310740158.8AActiveCN103716320B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740540.9AActiveCN103716154B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740285.8AActiveCN103729940B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740574.8AActiveCN103729945B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310740430.2AActiveCN103729943B (en)2013-03-152013-12-27A kind of method and system transmission security key being imported KMS system
CN201310740231.1AActiveCN103714635B (en)2013-03-152013-12-27A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN201310742713.0AActiveCN103701610B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740360.0AActiveCN103714636B (en)2013-03-152013-12-27A kind of method of batch capture and upload transfers cipher key T K data and operating terminal
CN201310742648.1AActiveCN103716155B (en)2013-03-152013-12-27A kind of method of automated maintenance POS terminal and operation terminal
CN201310742681.4AActiveCN103714640B (en)2013-03-152013-12-27A kind of sending method of transmission security key and system
CN201310740567.8AActiveCN103729944B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310742661.7AActiveCN103716167B (en)2013-03-152013-12-27Method and device for safely collecting and distributing transmission keys
CN201310740188.9AActiveCN103716153B (en)2013-03-152013-12-27Terminal master key TMK safety downloading method and systems
CN201310740537.7AActiveCN103746800B (en)2013-03-152013-12-27TMK (terminal master key) safe downloading method and system
CN201310740410.5AActiveCN103729942B (en)2013-03-152013-12-27Transmission security key is transferred to the method and system of key server from terminal server
CN201310742686.7AActiveCN103745351B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740642.0AActiveCN103731259B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310741948.8AActiveCN103714639B (en)2013-03-152013-12-27A kind of method and system that realize the operation of POS terminal security
CN201310741949.2AActiveCN103731260B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and system
CN201310742991.6AActiveCN103714641B (en)2013-03-152013-12-27A kind of terminal master key TMK method for safely downloading and system
CN201310740380.8AActiveCN103714637B (en)2013-03-152013-12-27A kind of transmission security key sending method and system, operating terminal
CN201310742886.2AActiveCN103716321B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740264.6AActiveCN103701812B (en)2013-03-152013-12-27TMK (Terminal Master Key) secure downloading method and system
CN201310740226.0AActiveCN103714634B (en)2013-03-152013-12-27A kind of method of main key of secure download terminal and system
CN201310740244.9AActiveCN103701609B (en)2013-03-152013-12-27A kind of server and the method and system operating terminal two-way authentication
CN201310740308.5AActiveCN103729941B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740100.3AActiveCN103714633B (en)2013-03-152013-12-27A kind of method of safe generating transmission key and POS terminal

Family Applications Before (17)

Application NumberTitlePriority DateFiling Date
CN201310740644.XAActiveCN103714638B (en)2013-03-152013-12-27A kind of method and system of quick position terminal master key failed download
CN201310740158.8AActiveCN103716320B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740540.9AActiveCN103716154B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740285.8AActiveCN103729940B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740574.8AActiveCN103729945B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310740430.2AActiveCN103729943B (en)2013-03-152013-12-27A kind of method and system transmission security key being imported KMS system
CN201310740231.1AActiveCN103714635B (en)2013-03-152013-12-27A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN201310742713.0AActiveCN103701610B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K
CN201310740360.0AActiveCN103714636B (en)2013-03-152013-12-27A kind of method of batch capture and upload transfers cipher key T K data and operating terminal
CN201310742648.1AActiveCN103716155B (en)2013-03-152013-12-27A kind of method of automated maintenance POS terminal and operation terminal
CN201310742681.4AActiveCN103714640B (en)2013-03-152013-12-27A kind of sending method of transmission security key and system
CN201310740567.8AActiveCN103729944B (en)2013-03-152013-12-27A kind of method and system of secure download terminal master key
CN201310742661.7AActiveCN103716167B (en)2013-03-152013-12-27Method and device for safely collecting and distributing transmission keys
CN201310740188.9AActiveCN103716153B (en)2013-03-152013-12-27Terminal master key TMK safety downloading method and systems
CN201310740537.7AActiveCN103746800B (en)2013-03-152013-12-27TMK (terminal master key) safe downloading method and system
CN201310740410.5AActiveCN103729942B (en)2013-03-152013-12-27Transmission security key is transferred to the method and system of key server from terminal server
CN201310742686.7AActiveCN103745351B (en)2013-03-152013-12-27A kind of acquisition method and system for transmitting cipher key T K

Family Applications After (10)

Application NumberTitlePriority DateFiling Date
CN201310741948.8AActiveCN103714639B (en)2013-03-152013-12-27A kind of method and system that realize the operation of POS terminal security
CN201310741949.2AActiveCN103731260B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and system
CN201310742991.6AActiveCN103714641B (en)2013-03-152013-12-27A kind of terminal master key TMK method for safely downloading and system
CN201310740380.8AActiveCN103714637B (en)2013-03-152013-12-27A kind of transmission security key sending method and system, operating terminal
CN201310742886.2AActiveCN103716321B (en)2013-03-152013-12-27A kind of terminal master key TMK safety downloading method and systems
CN201310740264.6AActiveCN103701812B (en)2013-03-152013-12-27TMK (Terminal Master Key) secure downloading method and system
CN201310740226.0AActiveCN103714634B (en)2013-03-152013-12-27A kind of method of main key of secure download terminal and system
CN201310740244.9AActiveCN103701609B (en)2013-03-152013-12-27A kind of server and the method and system operating terminal two-way authentication
CN201310740308.5AActiveCN103729941B (en)2013-03-152013-12-27A kind of main cipher key T MK method for safely downloading of terminal and system
CN201310740100.3AActiveCN103714633B (en)2013-03-152013-12-27A kind of method of safe generating transmission key and POS terminal

Country Status (2)

CountryLink
CN (28)CN103714638B (en)
WO (5)WO2014139403A1 (en)

Families Citing this family (123)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103714638B (en)*2013-03-152015-09-30福建联迪商用设备有限公司A kind of method and system of quick position terminal master key failed download
CN105281896B (en)*2014-07-172018-11-27深圳华智融科技股份有限公司A kind of key POS machine Activiation method and system based on elliptic curve
CN104270346B (en)*2014-09-122017-10-13北京天行网安信息技术有限责任公司The methods, devices and systems of two-way authentication
CN105991536A (en)*2014-11-072016-10-05天地融科技股份有限公司Data interaction system
CN104363090A (en)*2014-11-192015-02-18成都卫士通信息产业股份有限公司Secret key distribution device and method for enhancing safety of banking terminal equipment
CN105681263B (en)*2014-11-202019-02-12广东华大互联网股份有限公司A kind of secrete key of smart card remote application method and application system
CN104486323B (en)*2014-12-102017-10-31福建联迪商用设备有限公司A kind of POS terminal controlled networking activation method and device safely
CN104410641B (en)*2014-12-102017-12-08福建联迪商用设备有限公司A kind of POS terminal controlled networking activation method and device safely
US9485250B2 (en)*2015-01-302016-11-01Ncr CorporationAuthority trusted secure system component
CN105989472A (en)*2015-03-062016-10-05华立科技股份有限公司Wireless mobile configuration, wireless payment configuration and wireless payment configuration method of electric energy measurement system, and public commodity wireless payment configuration
CN106204034B (en)*2015-04-292019-07-23中国电信股份有限公司Using the mutual authentication method and system of interior payment
CN105117665B (en)*2015-07-162017-10-31福建联迪商用设备有限公司A kind of end product pattern and the method and system of development mode handoff-security
CN105184121A (en)*2015-09-022015-12-23上海繁易电子科技有限公司Hardware authorization system and method using remote server
CN106559218A (en)*2015-09-292017-04-05中国电力科学研究院A kind of safe acquisition method of intelligent substation continuous data
CN105243542B (en)*2015-11-132021-07-02咪付(广西)网络技术有限公司Dynamic electronic certificate authentication method
CN105260884A (en)*2015-11-182016-01-20北京微智全景信息技术有限公司POS machine key distributing method and device
CN105530241B (en)*2015-12-072018-12-28咪付(广西)网络技术有限公司The authentication method of mobile intelligent terminal and POS terminal
CN105574722A (en)*2015-12-112016-05-11福建新大陆支付技术有限公司Authorization IC card based remote online authorization method for payment terminal
CN105930718A (en)*2015-12-292016-09-07中国银联股份有限公司Method and apparatus for switching point-of-sale (POS) terminal modes
CN105656669B (en)*2015-12-312019-01-01福建联迪商用设备有限公司The remote repairing method of electronic equipment, is repaired equipment and system at equipment
CN105681032B (en)2016-01-082017-09-12腾讯科技(深圳)有限公司Method for storing cipher key, key management method and device
CN114240421A (en)*2016-01-252022-03-25创新先进技术有限公司 Credit payment method and device based on mobile terminal eSE
CN105743654A (en)*2016-02-022016-07-06上海动联信息技术股份有限公司POS machine secret key remote downloading service system and secret key downloading method
CN105790934B (en)*2016-03-042019-03-15中国银联股份有限公司 An adaptive POS terminal configuration method and its configuration right transfer method
CN107294722A (en)*2016-03-312017-10-24阿里巴巴集团控股有限公司A kind of terminal identity authentication method, apparatus and system
CN105978856B (en)*2016-04-182019-01-25随行付支付有限公司A kind of POS machine key downloading method, apparatus and system
CN106059771A (en)*2016-05-062016-10-26上海动联信息技术股份有限公司Intelligent POS machine secret key management system and method
CN106097608B (en)*2016-06-062018-07-27福建联迪商用设备有限公司Remote cipher key method for down loading and system, acquirer and target POS terminal
CN106127461A (en)*2016-06-162016-11-16中国银联股份有限公司Bi-directional verification method of mobile payment and system
CN107563712A (en)*2016-06-302018-01-09中兴通讯股份有限公司A kind of mobile terminal punch card method, device, equipment and system
CN106027247A (en)*2016-07-292016-10-12宁夏丝路通网络支付有限公司北京分公司Method for remotely issuing POS key
CN106100854A (en)*2016-08-162016-11-09黄朝The reverse authentication method of terminal unit based on authority's main body and system
CN107800538B (en)*2016-09-012021-01-29中电长城(长沙)信息技术有限公司Remote key distribution method for self-service equipment
US11018860B2 (en)2016-10-282021-05-25Microsoft Technology Licensing, LlcHighly available and reliable secret distribution infrastructure
CN106571915A (en)*2016-11-152017-04-19中国银联股份有限公司Terminal master key setting method and apparatus
CN106603496B (en)*2016-11-182019-05-21新智数字科技有限公司A kind of guard method, smart card, server and the communication system of data transmission
CN106656488B (en)*2016-12-072020-04-03百富计算机技术(深圳)有限公司 Key download method and device for POS terminal
CN106712939A (en)*2016-12-272017-05-24百富计算机技术(深圳)有限公司Offline key transmission method and device
US10432730B1 (en)2017-01-252019-10-01United States Of America As Represented By The Secretary Of The Air ForceApparatus and method for bus protection
CN106953731B (en)*2017-02-172020-05-12福建魔方电子科技有限公司Authentication method and system for terminal administrator
CN107466455B (en)*2017-03-152021-05-04深圳大趋智能科技有限公司POS machine security verification method and device
US10296477B2 (en)2017-03-302019-05-21United States of America as represented by the Secretary of the AirForceData bus logger
CN106997533B (en)*2017-04-012020-10-13福建实达电脑设备有限公司POS terminal product safety production authorization management system and method
CN107094138B (en)*2017-04-112019-09-13郑州信大捷安信息技术股份有限公司A kind of smart home safe communication system and communication means
CN107070925A (en)*2017-04-182017-08-18上海赛付网络科技有限公司A kind of terminal applies and the anti-tamper method of background service communication packet
CN107104795B (en)*2017-04-252020-09-04上海汇尔通信息技术有限公司Method, framework and system for injecting RSA key pair and certificate
CN107360652A (en)*2017-05-312017-11-17江苏普世祥光电技术有限公司A kind of control method of square landscape lamp
CN107301437A (en)*2017-05-312017-10-27江苏普世祥光电技术有限公司A kind of control system of square landscape lamp
CN107358441B (en)*2017-06-262020-12-18北京明华联盟科技有限公司 Payment verification method, system, mobile device and security authentication device
WO2019023979A1 (en)*2017-08-022019-02-07福建联迪商用设备有限公司Method for generating configurable pos machine secret key pair, and storage medium
CN107666420B (en)*2017-08-302020-12-15宁波梦居智能科技有限公司Method for production control and identity authentication of intelligent home gateway
CN107392591B (en)*2017-08-312020-02-07恒宝股份有限公司Online recharging method and system for industry card and Bluetooth read-write device
CN107888379A (en)*2017-10-252018-04-06百富计算机技术(深圳)有限公司A kind of method of secure connection, POS terminal and code keypad
WO2019080095A1 (en)*2017-10-272019-05-02福建联迪商用设备有限公司Financial payment terminal activation method and system
CN107835170B (en)*2017-11-042021-04-20上海动联信息技术股份有限公司Intelligent Pos equipment safety authorization dismantling system and method
CN107993062A (en)*2017-11-272018-05-04百富计算机技术(深圳)有限公司POS terminal method of commerce, device, computer equipment and readable storage medium storing program for executing
CN107944250B (en)*2017-11-282021-04-13艾体威尔电子技术(北京)有限公司Key acquisition method applied to POS machine
CN107919962B (en)*2017-12-222021-01-15国民认证科技(北京)有限公司Internet of things equipment registration and authentication method
CN108365950A (en)*2018-01-032018-08-03深圳怡化电脑股份有限公司The generation method and device of financial self-service equipment key
CN108390851B (en)*2018-01-052020-07-03郑州信大捷安信息技术股份有限公司Safe remote control system and method for industrial equipment
WO2019136736A1 (en)*2018-01-152019-07-18福建联迪商用设备有限公司Software encryption terminal, payment terminal, and software package encryption and decryption method and system
WO2019153119A1 (en)*2018-02-062019-08-15福建联迪商用设备有限公司Method for transmitting key, receiving terminal and distribution terminal
CN108446539B (en)*2018-03-162023-01-13福建深空信息技术有限公司Software authorization method and software authorization file generation system
WO2019178763A1 (en)*2018-03-212019-09-26福建联迪商用设备有限公司Certificate importing method and terminal
CN108496194A (en)*2018-03-212018-09-04福建联迪商用设备有限公司 A method, server and system for verifying terminal legitimacy
WO2019200530A1 (en)*2018-04-172019-10-24福建联迪商用设备有限公司Remote distribution method and system for terminal master key
CN108737106B (en)*2018-05-092021-06-01深圳壹账通智能科技有限公司User authentication method and device on block chain system, terminal equipment and storage medium
CN108833088A (en)*2018-05-222018-11-16珠海爱付科技有限公司A kind of POS terminal Activiation method
CN110581829A (en)*2018-06-082019-12-17中国移动通信集团有限公司 Communication method and device
CN109218293B (en)*2018-08-212021-09-21西安得安信息技术有限公司Use method of distributed password service platform key management
CN109347625B (en)*2018-08-312020-04-24阿里巴巴集团控股有限公司Password operation method, work key creation method, password service platform and equipment
CN109326061B (en)*2018-09-102021-10-26惠尔丰(中国)信息系统有限公司Anti-cutting method of intelligent POS
CN109274500B (en)*2018-10-152020-06-02百富计算机技术(深圳)有限公司 A key downloading method, client, cryptographic device and terminal device
CN109274684B (en)*2018-10-312020-12-29中国—东盟信息港股份有限公司Internet of things terminal system based on integration of eSIM communication and navigation service and implementation method thereof
CN109547208B (en)*2018-11-162021-11-09交通银行股份有限公司Online distribution method and system for master key of financial electronic equipment
CN109670289B (en)*2018-11-202020-12-15福建联迪商用设备有限公司Method and system for identifying legality of background server
CN109508995A (en)*2018-12-122019-03-22福建新大陆支付技术有限公司A kind of off line authorization method and payment terminal based on payment terminal
CN109510711B (en)*2019-01-082022-04-01深圳市网心科技有限公司Network communication method, server, client and system
CN111627174B (en)*2019-02-282024-12-06南京摩铂汇信息技术有限公司 Bluetooth POS equipment and payment system
CN110011794B (en)*2019-04-112021-08-13北京智芯微电子科技有限公司 Test Methods for Cipher Key Properties
CN109995532A (en)*2019-04-112019-07-09晏福平A kind of online management method and system of terminal master key
CN110061848B (en)*2019-04-172021-09-14飞天诚信科技股份有限公司Method for safely importing secret key of payment terminal, payment terminal and system
CN110545542B (en)*2019-06-132023-03-14银联商务股份有限公司Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN112532567A (en)*2019-09-192021-03-19中国移动通信集团湖南有限公司Transaction encryption method and POSP system
CN110855442A (en)*2019-10-102020-02-28北京握奇智能科技有限公司PKI (public key infrastructure) technology-based inter-device certificate verification method
CN111132154B (en)*2019-12-262022-10-21飞天诚信科技股份有限公司Method and system for negotiating session key
CN111193748B (en)*2020-01-062021-12-03惠州市德赛西威汽车电子股份有限公司Interactive key security authentication method and system
CN111275440B (en)*2020-01-192023-11-10中钞科堡现金处理技术(北京)有限公司Remote key downloading method and system
TWI775061B (en)*2020-03-302022-08-21尚承科技股份有限公司Protection system and method for soft/firmware or data
CN111597512B (en)*2020-03-312023-10-31尚承科技股份有限公司Soft firmware or data protection system and protection method
CN111526013B (en)*2020-04-172023-05-05中国人民银行清算总中心Key distribution method and system
CN111884804A (en)*2020-06-152020-11-03上海祥承通讯技术有限公司Remote key management method
CN111815811B (en)*2020-06-222022-09-06合肥智辉空间科技有限责任公司Electronic lock safety coefficient
CN114024949A (en)*2020-07-172022-02-08华为技术有限公司Data transmission method and device
CN111950999B (en)*2020-07-282024-06-04银盛支付服务股份有限公司Method and system for realizing key filling safety based on IC card on POS machine
CN111931206A (en)*2020-07-312020-11-13银盛支付服务股份有限公司Data encryption method based on APP
CN112134849B (en)*2020-08-282024-02-20国电南瑞科技股份有限公司 A dynamic trusted encrypted communication method and system for smart substations
CN112182599B (en)*2020-09-152024-06-11中信银行股份有限公司Automatic loading method and device for master key, electronic equipment and readable storage medium
CN112311528B (en)*2020-10-172023-06-23深圳市德卡科技股份有限公司Data security transmission method based on cryptographic algorithm
CN112291232B (en)*2020-10-272021-06-04中国联合网络通信有限公司深圳市分公司Safety capability and safety service chain management platform based on tenants
CN112332978B (en)*2020-11-102022-09-20上海商米科技集团股份有限公司Remote key injection method based on key agreement
CN112396416A (en)*2020-11-182021-02-23上海商米科技集团股份有限公司Method for loading certificate of intelligent POS equipment
CN112560058B (en)*2020-12-172022-12-30山东华芯半导体有限公司SSD partition encryption storage system based on intelligent password key and implementation method thereof
CN112968776B (en)*2021-02-022022-09-02中钞科堡现金处理技术(北京)有限公司Method, storage medium and electronic device for remote key exchange
CN113037494B (en)*2021-03-022023-05-23福州汇思博信息技术有限公司Burning piece mirror image file signature method and terminal
CN113450511A (en)*2021-03-252021-09-28深圳怡化电脑科技有限公司Transaction method of acceptance terminal equipment and bank system and acceptance terminal equipment
CN113132980B (en)*2021-04-022023-10-13四川省计算机研究院Key management system method and device applied to Beidou navigation system
CN113328851B (en)*2021-04-212022-01-14北京连山科技股份有限公司Method and system for randomly transmitting secret key under multilink condition
CN115620411A (en)*2021-07-162023-01-17交通运输部路网监测与应急处置中心ETC parking transaction safety certification system facing public network
CN113708923A (en)*2021-07-292021-11-26银盛支付服务股份有限公司Method and system for remotely downloading master key
CN113645221A (en)*2021-08-062021-11-12中国工商银行股份有限公司Encryption method, device, equipment, storage medium and computer program
CN113810391A (en)*2021-09-012021-12-17杭州视洞科技有限公司Cross-machine-room communication bidirectional authentication and encryption method
CN113612612A (en)*2021-09-302021-11-05阿里云计算有限公司Data encryption transmission method, system, equipment and storage medium
CN114423003B (en)*2021-12-292024-01-30中国航空工业集团公司西安飞机设计研究所Airplane key comprehensive management method and system
CN114499891B (en)*2022-03-212024-05-31宁夏凯信特信息科技有限公司Signature server system and signature verification method
CN114726521A (en)*2022-04-142022-07-08广东好太太智能家居有限公司 Smart lock temporary password generation method and electronic device
CN115085981A (en)*2022-05-312022-09-20深圳市旭子科技有限公司Self-service terminal with data communication encryption function
CN115604133A (en)*2022-09-292023-01-13成都卫士通信息产业股份有限公司(Cn) An access control method, device, system and medium for an operation and maintenance terminal
CN115632769B (en)*2022-10-122025-02-11北京捷文科技股份有限公司 Payment terminal comprehensive key management method, system and computer readable storage medium
CN116233094A (en)*2022-12-312023-06-06北京结慧科技有限公司Method for downloading POS terminal key by key IC card
CN117176339B (en)*2023-08-312024-06-18深圳手付通科技有限公司 A method and system for online updating of master key TMK of POS terminal equipment
CN116865966B (en)*2023-09-042023-12-05中量科(南京)科技有限公司Encryption method, device and storage medium for generating working key based on quantum key
CN119172743B (en)*2024-08-152025-09-09北京智芯微电子科技有限公司Terminal identity identification method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101593389A (en)*2009-07-012009-12-02中国建设银行股份有限公司A kind of key management method and system that is used for the POS terminal
CN101656007A (en)*2009-08-142010-02-24通联支付网络服务股份有限公司Safe system realizing one machine with multiple ciphers on POS machine and method thereof
CN102148799A (en)*2010-02-052011-08-10中国银联股份有限公司Key downloading method and system
CN103237005A (en)*2013-03-152013-08-07福建联迪商用设备有限公司Method and system for key management

Family Cites Families (62)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPS57157371A (en)*1981-03-241982-09-28Sharp CorpElectronic cash register
JP2993833B2 (en)*1993-11-291999-12-27富士通株式会社 POS system
JPH10112883A (en)*1996-10-071998-04-28Hitachi Ltd Wireless communication switching system, exchange, public key management device, mobile terminal, and mobile terminal authentication method
CN1285559C (en)*1999-03-222006-11-22普拉克生化公司Method of industrial-scale purification of lactic acid
CN1127033C (en)*2000-07-202003-11-05天津南开戈德集团有限公司Radio mobile network point of sale (POS) terminal system and operation method thereof
US7110986B1 (en)*2001-04-232006-09-19Diebold, IncorporatedAutomated banking machine system and method
KR100641824B1 (en)*2001-04-252006-11-06주식회사 하렉스인포텍 Financial Information Input Method Using Symmetric Key Security Algorithm and Its Commerce Communication System
JP2002366285A (en)*2001-06-052002-12-20Matsushita Electric Ind Co Ltd POS terminal
GB2384402B (en)*2002-01-172004-12-22Toshiba Res Europ LtdData transmission links
JP2003217028A (en)*2002-01-242003-07-31Tonfuu:KkOperation situation monitoring system for pos terminal device
US7395427B2 (en)*2003-01-102008-07-01Walker Jesse RAuthenticated key exchange based on pairwise master key
JP2005117511A (en)*2003-10-102005-04-28Nec CorpQuantum cipher communication system and quantum cipher key distributing method used therefor
KR101282972B1 (en)*2004-03-222013-07-08삼성전자주식회사Authentication between a device and a portable storage
US20060093149A1 (en)*2004-10-302006-05-04Shera International Ltd.Certified deployment of applications on terminals
DE102005022019A1 (en)*2005-05-122007-02-01Giesecke & Devrient Gmbh Secure processing of data
KR100652125B1 (en)*2005-06-032006-12-01삼성전자주식회사 Mutual authentication method for overall authentication and management between service provider, terminal, and user identification module, system and terminal device using same
CN100583743C (en)*2005-07-222010-01-20华为技术有限公司Distributing method for transmission key
MX2008010705A (en)*2006-02-222009-03-02Hypercom CorpSecure electronic transaction system.
JP2007241351A (en)*2006-03-062007-09-20Cela System:Kk Customer / product / stock management system (including POS) and mobile / customer integrated management system
EP1833009B1 (en)*2006-03-092019-05-08First Data CorporationSecure transaction computer network
US7818264B2 (en)*2006-06-192010-10-19Visa U.S.A. Inc.Track data encryption
CN101064695A (en)*2007-05-162007-10-31杭州看吧科技有限公司P2P(Peer to Peer) safe connection method
CN101145913B (en)*2007-10-252010-06-16东软集团股份有限公司A method and system for network security communication
WO2009070041A2 (en)*2007-11-302009-06-04Electronic Transaction Services LimitedPayment system and method of operation
CN101541002A (en)*2008-03-212009-09-23展讯通信(上海)有限公司Web server-based method for downloading software license of mobile terminal
CN101615322B (en)*2008-06-252012-09-05上海富友金融网络技术有限公司Mobile terminal payment method and mobile terminal payment system for realizing magnetic payment function
JP4666240B2 (en)*2008-07-142011-04-06ソニー株式会社 Information processing apparatus, information processing method, program, and information processing system
CN101686225A (en)*2008-09-282010-03-31中国银联股份有限公司Methods of data encryption and key generation for on-line payment
KR20100052668A (en)*2008-11-112010-05-20노틸러스효성 주식회사Method for on-line sharing of tmk(terminal master key) between atm and host
JP5329184B2 (en)*2008-11-122013-10-30株式会社日立製作所 Public key certificate verification method and verification server
CN101425208B (en)*2008-12-052010-11-10浪潮齐鲁软件产业有限公司Method for safely downloading cipher key of finance tax-controlling cashing machine
CN101527714B (en)*2008-12-312012-09-05飞天诚信科技股份有限公司Method, device and system for accreditation
CN101930644B (en)*2009-06-252014-04-16中国银联股份有限公司Method for safely downloading master key automatically in bank card payment system and system thereof
CN101719895A (en)*2009-06-262010-06-02中兴通讯股份有限公司Data processing method and system for realizing secure communication of network
CN101631305B (en)*2009-07-282011-12-07交通银行股份有限公司Encryption method and system
CN102064939B (en)*2009-11-132013-06-12福建联迪商用设备有限公司Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
CN101710436B (en)*2009-12-012011-12-14中国建设银行股份有限公司Method and system for controlling POS terminal and POS terminal management equipment
CN101807994B (en)*2009-12-182012-07-25北京握奇数据系统有限公司Method and system for application data transmission of IC card
CN201656997U (en)*2010-04-282010-11-24中国工商银行股份有限公司Device for generating transmission key
CN101807997B (en)*2010-04-282012-08-22中国工商银行股份有限公司Device and method for generating transmission key
CN102262760A (en)*2010-05-282011-11-30杨筑平 Transaction security method, acceptance device and submission software
EP2604017B1 (en)*2010-08-102017-10-04Google Technology Holdings LLCSystem and method for cognizant transport layer security
CN101938520B (en)*2010-09-072015-01-28中兴通讯股份有限公司Mobile terminal signature-based remote payment system and method
CN101976403A (en)*2010-10-292011-02-16北京拉卡拉网络技术有限公司Phone number payment platform, payment trading system and method thereof
CN102013982B (en)*2010-12-012012-07-25银联商务有限公司Long-distance encryption method, management method, as well as encryption management method, device and system
CN102903189A (en)*2011-07-252013-01-30上海昂贝电子科技有限公司Terminal transaction method and device
CN102394749B (en)*2011-09-262014-03-05深圳市文鼎创数据科技有限公司Line protection method, system, information safety equipment and application equipment for data transmission
CN102521935B (en)*2011-12-152013-12-11福建联迪商用设备有限公司Method and apparatus for state detection of POS machine
CN102592369A (en)*2012-01-142012-07-18福建联迪商用设备有限公司Method for self-service terminal access to financial transaction center
CN102624710B (en)*2012-02-272015-03-11福建联迪商用设备有限公司Sensitive information transmission method and sensitive information transmission system
CN102624711B (en)*2012-02-272015-06-03福建联迪商用设备有限公司Sensitive information transmission method and sensitive information transmission system
CN102647274B (en)*2012-04-122014-10-08福建联迪商用设备有限公司POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof
CN102707972B (en)*2012-05-022016-03-09银联商务有限公司A kind of POS terminal method for updating program and system
CN102768744B (en)*2012-05-112016-03-16福建联迪商用设备有限公司A kind of remote safe payment method and system
CN102868521B (en)*2012-09-122015-03-04成都卫士通信息产业股份有限公司Method for enhancing secret key transmission of symmetrical secret key system
CN103116505B (en)*2012-11-162016-05-25福建联迪商用设备有限公司A kind of method that Auto-matching is downloaded
CN103117855B (en)*2012-12-192016-07-06福建联迪商用设备有限公司A kind of method of the method generating digital certificate and backup and recovery private key
CN103220271A (en)*2013-03-152013-07-24福建联迪商用设备有限公司Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103714638B (en)*2013-03-152015-09-30福建联迪商用设备有限公司A kind of method and system of quick position terminal master key failed download
CN103237004A (en)*2013-03-152013-08-07福建联迪商用设备有限公司Key download method, key management method, method, device and system for download management
CN103220270A (en)*2013-03-152013-07-24福建联迪商用设备有限公司Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN103269266B (en)*2013-04-272016-07-06北京宏基恒信科技有限责任公司The safety certifying method of dynamic password and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101593389A (en)*2009-07-012009-12-02中国建设银行股份有限公司A kind of key management method and system that is used for the POS terminal
CN101656007A (en)*2009-08-142010-02-24通联支付网络服务股份有限公司Safe system realizing one machine with multiple ciphers on POS machine and method thereof
CN102148799A (en)*2010-02-052011-08-10中国银联股份有限公司Key downloading method and system
CN103237005A (en)*2013-03-152013-08-07福建联迪商用设备有限公司Method and system for key management

Also Published As

Publication numberPublication date
CN103716153A (en)2014-04-09
CN103714639A (en)2014-04-09
WO2014139406A1 (en)2014-09-18
CN103701812B (en)2017-01-25
CN103714640B (en)2016-02-03
CN103716320B (en)2017-08-01
CN103729940A (en)2014-04-16
CN103714634A (en)2014-04-09
WO2014139412A1 (en)2014-09-18
CN103716155A (en)2014-04-09
CN103729945B (en)2015-11-18
CN103714633A (en)2014-04-09
CN103714635A (en)2014-04-09
CN103716155B (en)2016-08-17
CN103714635B (en)2015-11-11
CN103714637B (en)2016-03-16
CN103701812A (en)2014-04-02
CN103714633B (en)2016-05-04
CN103729944A (en)2014-04-16
CN103714641B (en)2016-03-30
CN103746800A (en)2014-04-23
CN103714636B (en)2015-12-02
CN103716153B (en)2017-08-01
CN103714636A (en)2014-04-09
CN103729941A (en)2014-04-16
CN103716167B (en)2017-01-11
CN103714637A (en)2014-04-09
CN103729942A (en)2014-04-16
CN103716154B (en)2017-08-01
WO2014139408A1 (en)2014-09-18
CN103714641A (en)2014-04-09
CN103729944B (en)2015-09-30
CN103729943B (en)2015-12-30
CN103714638A (en)2014-04-09
CN103731260B (en)2016-09-28
CN103731260A (en)2014-04-16
CN103746800B (en)2017-05-03
CN103716167A (en)2014-04-09
CN103714639B (en)2016-05-04
CN103745351B (en)2017-09-29
CN103716154A (en)2014-04-09
CN103729940B (en)2016-06-15
CN103729943A (en)2014-04-16
CN103731259A (en)2014-04-16
CN103716321B (en)2017-08-29
CN103729945A (en)2014-04-16
CN103729941B (en)2016-06-15
CN103714634B (en)2016-06-15
CN103701610B (en)2018-04-17
CN103729942B (en)2016-01-13
CN103716320A (en)2014-04-09
CN103716321A (en)2014-04-09
WO2014139411A1 (en)2014-09-18
CN103714638B (en)2015-09-30
CN103701609A (en)2014-04-02
CN103714640A (en)2014-04-09
WO2014139403A1 (en)2014-09-18
CN103745351A (en)2014-04-23
CN103701609B (en)2016-09-28
CN103701610A (en)2014-04-02

Similar Documents

PublicationPublication DateTitle
CN103731259B (en)A kind of terminal master key TMK safety downloading method and systems
CN103716168B (en)Secret key management method and system
KR102119895B1 (en)Secure remote payment transaction processing
CN103716322A (en)Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system
CN103729946A (en)Key downloading method, key managing method and downloading managing method, device and system
KR20180089951A (en)Method and system for processing transaction of electronic cash
KR20180089952A (en)Method and system for processing transaction of electronic cash

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C53Correction of patent for invention or patent application
CB03Change of inventor or designer information

Inventor after:Hong Yixuan

Inventor after:Su Wenlong

Inventor after:Meng Luqiang

Inventor before:Su Wenlong

Inventor before:Meng Luqiang

CORChange of bibliographic data

Free format text:CORRECT: INVENTOR; FROM: SU WENLONG MENG LUQIANG TO: HONG YIXUAN SU WENLONG MENG LUQIANG

GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp