CN102647274B - POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof - Google Patents
POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof Download PDFInfo
- Publication number
- CN102647274B CN102647274B CN201210106378.0A CN201210106378A CN102647274B CN 102647274 B CN102647274 B CN 102647274B CN 201210106378 A CN201210106378 A CN 201210106378A CN 102647274 B CN102647274 B CN 102647274B
- Authority
- CN
- China
- Prior art keywords
- key
- security module
- terminal
- pos
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Cash Registers Or Receiving Machines (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a main key managing method, which comprises the following steps of: generating a main key and a main key cipher text, and writing the main key cipher text into a key library table; converting the key library table into a key file, and loading into a key master POS (Point of Sale); receiving a key dispatching request transmitted by a POS terminal by the key master POS, retrieving an available main key in the key file, dispatching the main key and a corresponding key index number to the POS terminal, and marking the main key as used; generating a security module number according to the key index number received by the POS terminal and a hardware serial number of the POS terminal, and transmitting the safety module number to a terminal accessing device by using the POS terminal; and receiving the safety module number, and writing the received safety module number into a terminal table to register the safety module number by using the terminal accessing device. The invention further discloses a POS terminal, a terminal accessing device and a main key managing system.
Description
Technical field
The present invention relates to information security field, particularly preposition, the master key management system of a kind of POS terminal, terminal access and method.
Background technology
Use bank card to carry out bankcard consumption by POS terminal and become the consumption clearing form of current main flow; POS terminal is in the time of transaction at present; relate to master key and working key, this master key is stored in POS terminal, for encrypting this working key so that this working key is protected.Wherein, this working key comprises PIN key and verification MAC key, and this PIN key is for encrypting holder's customer bank password, and this MAC key is for carrying out MAC verification to message.
In the time of POS terminal initialization, need to download master key, traditional POS terminal master key download scenarios is, downloading before master key, first POS terminal is associated with the trade company's account that uses this POS terminal, bring to bank by POS terminal, the device number of POS terminal is associated with trade company account, then download master key to this POS terminal, this kind of way is more loaded down with trivial details, has increased the workload of downloading master key.
Summary of the invention
The technical problem that the present invention mainly solves is to provide a kind of easy master key management method for POS terminal and uses the master key management system of the method, POS terminal and terminal access preposition.Without POS terminal being associated with trade company account downloading before master key, female POS can be to the disposable distribution master key of the POS terminal that needs master key and cipher key index number, POS terminal combines this cipher key index number and generates security module number with the hardware sequence number of this POS terminal, then this security module number is accessed to the registration of preposition place in terminal.In the time sending transaction request message, POS terminal sends this security module number simultaneously and authenticates with the legitimacy to this POS terminal and cipher key index thereof number to terminal access is preposition.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is:
A kind of master key management method is provided, comprises: (1) generates master key and the master key ciphertext corresponding with described master key and described master key ciphertext is write to cipher key store table; (2) described cipher key store table is converted to the key file of the female POS agreement of key form and described key file is loaded into the female POS of described key; (3) the female POS of described key receives the key distribution request that a POS terminal sends, retrieve master key available in described key file and described master key and corresponding cipher key index number are distributed to described POS terminal according to described key distribution request, described master key is labeled as and is used simultaneously; (4) described POS terminal receives described master key and cipher key index number, generates security module number and described security module number is sent to terminal access preposition according to the hardware sequence number of the cipher key index receiving number and described POS terminal; And (5) described terminal accesses the described security module of preposition reception number and the described security module receiving number is write to a terminal list to register described security module number.
Wherein, described master key management method also comprises: (6) one POS terminals send transaction request and a security module number extremely described terminal access is preposition; (7) described terminal accesses the described security module of preposition reception number and retrieves described terminal list, judge whether to retrieve the registered security module number of mating with the described security module receiving number, and in the time retrieving the security module of coupling, process described transaction request, in the time not retrieving the security module of coupling, refuse described transaction request.
Wherein, in the time retrieving the security module of coupling, described terminal accesses preposition transmission authentication success prompting to described POS terminal.In the time not retrieving the security module of coupling, described terminal accesses preposition transmission authentification failure prompting to described POS terminal.
Another technical solution used in the present invention is:
A kind of master key management system is provided, comprise that the access of encryption equipment, terminal is preposition, the female POS of key and POS terminal, described encryption equipment is used for generating master key and adopts specifies key to be encrypted to generate master key ciphertext to described master key, the preposition transaction unit that comprises of described terminal access.Described terminal access preposition comprising: key writing unit, for obtaining described master key ciphertext and described master key ciphertext being write to cipher key store table, wherein, described cipher key store table comprises cipher key index number, master key ciphertext and working key; Database Unit, for storing described cipher key store table; WEB administrative unit, for converting described cipher key store table to the key file of arranging form with the female POS of described key; Key loading unit, for being loaded into described key file the female POS of described key; The female POS of described key, for retrieving the available master key of described key file and described master key and corresponding cipher key index number being distributed to described POS terminal, is labeled as described master key and uses simultaneously.
Described POS terminal comprises: memory cell; Key acquiring unit, for sending key distribution request to the female POS of described key, and receives and stores associatedly described master key and cipher key index number to described memory cell; Security module generation unit, preposition for generating security module number according to the hardware sequence number of described cipher key index number and described POS terminal and described security module number being sent to described terminal access; And the access of described terminal is preposition also comprises: registration unit, for receiving described security module number and the described security module receiving number being write to the security module number of a terminal list to receive described in registering, described Database Unit is also for storing described terminal list.
Wherein, described POS terminal is also preposition for send in the lump number extremely described terminal access of described security module in the time sending transaction request; Described terminal access is preposition also to be comprised: authentication ' unit, for when receiving described security module number and retrieving described terminal list, judge whether to retrieve the security module number of mating with the described security module receiving number, and in the time retrieving the security module of coupling, send a trading instruction to described transaction unit to process described transaction request; Described authentication ' unit also in the time not retrieving the security module of coupling, send a refusal trading instruction to described transaction unit to refuse described transaction request.
Wherein, the form of described key file is TXT form.
Another technical solution used in the present invention is:
Provide a kind of terminal access preposition, comprise transaction unit, described terminal access is preposition also to be comprised: key writing unit, for obtaining master key ciphertext and described master key ciphertext write to cipher key store table from encryption equipment, wherein, described cipher key store table comprises cipher key index number, master key ciphertext and working key; Database Unit, for storing described cipher key store table; WEB administrative unit, for converting described cipher key store table to the key file of arranging form with the female POS of described key; Key loading unit, for being loaded into described key file the female POS of described key; And registration unit, for receiving security module number that POS terminal sends and the described security module receiving number being write to the security module number of a terminal list to receive described in registering, described Database Unit is also for storing described terminal list.
Wherein, described terminal access is preposition also to be comprised: authentication ' unit, for when receiving described security module number and retrieving described terminal list, judge whether to retrieve the security module number of mating with the described security module receiving number, and in the time retrieving the security module of coupling, send a trading instruction to described transaction unit to process described transaction request; Described authentication ' unit also in the time not retrieving the security module of coupling, send a refusal trading instruction to described transaction unit to refuse described transaction request.
Another technical solution used in the present invention is:
A kind of POS terminal is provided, comprises: memory cell; Key acquiring unit, for sending key distribution request to the female POS of key, and receives and associatedly master key and the cipher key index number of female described key POS distribution is stored to described memory cell; And security module generation unit, preposition for generating security module number according to the hardware sequence number of described cipher key index number and described POS terminal and described security module number being sent to terminal access.
Brief description of the drawings
Fig. 1 is the system architecture diagram of master key management system in an embodiment of the present invention;
Fig. 2 is that in an embodiment of the present invention, terminal accesses preposition functional block diagram;
Fig. 3 is the functional block diagram of POS terminal in an embodiment of the present invention;
Fig. 4 generates and when distribution at master key in an embodiment of the present invention, the flow chart that master key management method is carried out in the system of Fig. 1;
Fig. 5 be in an embodiment of the present invention in the time of POS terminal transaction, the flow chart of carrying out in the system of master key management method in Fig. 1.
Main element symbol description
10, terminal access is preposition; 20, encryption equipment; 30, the female POS of key; 40, POS terminal;
11, Database Unit; 12, WEB administrative unit; 13, key loading unit; 14, registration unit;
15, authentication ' unit; 16, transaction unit; 17, key writing unit; 41, key acquiring unit;
42, memory cell; 43, security module generation unit.
Embodiment
By describing technology contents of the present invention, structural feature in detail, being realized object and effect, below in conjunction with execution mode and coordinate accompanying drawing to be explained in detail.
Referring to Fig. 1, is the system architecture diagram of master key management system in an embodiment of the present invention.This master key management system comprises that terminal accesses preposition 10 and access respectively the female POS 30 of encryption equipments 20, key and the POS terminal 40 of preposition 10 communication connections with this terminal, and the female POS 30 of this key communicates to connect with POS terminal 40.
Encryption equipment 20, for the random terminal master key that generates, adopts and specifies key to be encrypted to generate master key ciphertext to this master key, and this master key ciphertext is sent to described terminal accesses preposition 10.
Refer to Fig. 2, for terminal in an embodiment of the present invention accesses preposition 10 functional block diagram.This terminal accesses preposition 10 and comprises Database Unit 11, WEB administrative unit 12, key loading unit 13, registration unit 14, authentication ' unit 15, transaction unit 16 and key writing unit 17.
This key writing unit 17 receives these master key ciphertexts and by the cipher key store table of storage in this master key ciphertext data writing library unit 11 receiving.This cipher key store table comprises cipher key index number, master key ciphertext and working key ciphertext, and this working key ciphertext comprises check value, PIN key and MAC key etc.
This WEB administrative unit 12 is for obtaining cipher key store table and the cipher key store table that this obtains being converted to the key file of arranging form with the female POS 30 of key from Database Unit 11, wherein, this key file comprises cipher key index number, master key ciphertext and check value etc.In the present embodiment, the form of this key file is TXT form.This key loading unit 13 is for being loaded into the female POS30 of key by key file by communication interface.
The female POS 30 of this key is for being distributed to POS terminal 40 by the key file of loading, particularly, the female POS 30 of this key is in the time receiving the key distribution request that POS terminal 40 sends, current available master key in retrieval key file, this master key of mark has been used and this master key and the cipher key index number corresponding with this master key has been sent to the POS terminal 40 of carrying out key distribution request.
Referring to Fig. 3, is the functional block diagram of POS terminal in an embodiment of the present invention.This POS terminal 40 comprises key acquiring unit 41, memory cell 42 and security module generation unit 43.
This key acquiring unit 41 is for sending key distribution request to the female POS 30 of key, and the master key that female key POS 30 is distributed and cipher key index number are stored to this memory cell 42 associatedly, this security module generation unit 43 is for generating security module number according to the hardware sequence number of this cipher key index number and POS terminal, and this security module number is stored to memory cell 42.This security module number comprises hardware sequence number and cipher key index number, and for example, if hardware sequence number is " 123L013K ", cipher key index number is " 278 ", and security module number is " 123L013K00000278 ".This security module generation unit is also inputted preposition registration unit 14 and is registered for the security module of generation number being sent to terminal.
This registration unit 14 is for writing the security module receiving number a terminal list so that this security module number is registered, and this terminal list is stored in this Database Unit 11, and this terminal list is for recording the security module number that completes registration.
In the time that POS terminal 40 sends transaction request to terminal and inputs preposition transaction unit 16 and conclude the business, POS terminal sends security module in the lump number to authentication ' unit 15, and this authentication ' unit 15 is for searching terminal table and be confirmed whether to retrieve the security module number that completes registration of mating with received security module number.
This authentication ' unit 15 is during also for security module when the coupling retrieving, sends authentication success and points out to POS terminal 40 is concurrent and send trading instruction to the unit 16 of concluding the business, and the transaction request that POS terminal 40 sends is processed according to this trading instruction in transaction unit 16.This authentication ' unit 15 also, for when not in the time that terminal list retrieves the security module of coupling, sends authentification failure and points out to POS terminal 40 and send refusal trading instruction to the unit 16 of concluding the business, and transaction unit 16 refusals are processed transaction request.
Refer to Fig. 4, for generating and when distribution at master key in one embodiment of the present invention, the flow chart that master key management method is carried out in the system of Fig. 1.
Step S40, the random master key that generates of encryption equipment 20, adopt and specify key to be encrypted to generate master key ciphertext to this master key, this key writing unit 17 receives these master key ciphertexts and by the cipher key store table of storage in this master key ciphertext data writing library unit 11 receiving.
Wherein, this this cipher key store table comprises cipher key index number, master key ciphertext and working key ciphertext, and this working key ciphertext comprises check value, PIN key and MAC key etc.
Step S41, this WEB administrative unit 12 converts this cipher key store table to the key file of arranging form with the female POS 30 of key, and this key file is loaded into the female POS 30 of this key by this key loading unit 13.
In the present embodiment, the form of this key file is TXT form.This key loading unit 13 is for being loaded into the female POS 30 of key by key file by communication interface.
Step S42, the key distribution request that the key acquiring unit 41 that the female POS 30 of this key receives POS terminal 40 sends, retrieve master key available in this key file and described master key and corresponding cipher key index number are distributed to this POS terminal 40 according to this key distribution request, described master key is labeled as and is used simultaneously;
Step S43, the key acquiring unit 41 of this POS terminal 40 receives master key and the cipher key index number of the female POS30 distribution of this key, and this security module generation unit 43 generates security module number and this security module number is sent to terminal according to the hardware sequence number of this cipher key index receiving number and described POS terminal and accesses preposition 10.
Step S44, described terminal accesses preposition 10 registration unit 14 and receives this security modules number and this security module receiving number is write to a terminal list to register this security module number.
Wherein, this terminal list is stored in this Database Unit 11, and this terminal list is for recording the security module number that completes registration.
Refer to Fig. 5, in an embodiment of the present invention when the POS terminal transaction, the flow chart of carrying out in the system of master key management method in Fig. 1.
Step S50, POS terminal 40 sends transaction request to the unit 16 of concluding the business, and sends security module number to authentication ' unit 15.
Step S51, these authentication ' unit 15 searching terminal tables also judge whether to retrieve the security module number that completes registration of mating with received security module number.In the time retrieving the security module of coupling, execution step S52, otherwise, execution step S53.
Step S52, described transaction request is processed in transaction unit 16.
Step S53, described transaction request is refused in transaction unit 16.
In the present embodiment, this step S51 also comprises that authentication ' unit 15 sends authentication success in the time retrieving the security module of coupling and points out to this POS terminal 40; In the time not retrieving the security module of coupling, authentication ' unit 15 sends authentification failure and points out to this POS terminal 40.
The access of POS terminal of the present invention, terminal is preposition, master key management system and method, without POS terminal being associated with trade company account downloading before master key, female POS of the present invention can be to the disposable distribution master key of the POS terminal that needs master key and cipher key index number, POS terminal combines this cipher key index number and generates security module number with the hardware sequence number of this POS terminal, then this security module number is accessed to the registration of preposition place in terminal.In the time sending transaction request message, POS terminal sends this security module number simultaneously and authenticates with the legitimacy to this POS terminal and cipher key index thereof number to terminal access is preposition.
This is only embodiments of the invention above; not thereby limit the scope of the claims of the present invention; every equivalent structure or conversion of equivalent flow process that utilizes specification of the present invention and accompanying drawing content to do; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.
Claims (10)
1. a master key management method, is characterized in that, comprising:
(1) generate master key and the master key ciphertext corresponding with described master key and described master key ciphertext is write to cipher key store table;
(2) described cipher key store table is converted to the key file of the female POS agreement of key form and described key file is loaded into the female POS of described key;
(3) the female POS of described key receives the key distribution request that a POS terminal sends, retrieve master key available in described key file and described master key and corresponding cipher key index number are distributed to described POS terminal according to described key distribution request, described master key is labeled as and is used simultaneously;
(4) described POS terminal receives described master key and cipher key index number, generates security module number and described security module number is sent to terminal access preposition according to the hardware sequence number of the cipher key index receiving number and described POS terminal; And
(5) described terminal accesses the described security module of preposition reception number and the described security module receiving number is write to a terminal list to register described security module number.
2. master key management method according to claim 1, is characterized in that, also comprises:
(6) one POS terminals send transaction request and a security module number extremely described terminal access is preposition;
(7) described terminal accesses the described security module of preposition reception number and retrieves described terminal list, judge whether to retrieve the registered security module number of mating with the described security module receiving number, and in the time retrieving the security module of coupling, process described transaction request, in the time not retrieving the security module of coupling, refuse described transaction request.
3. master key management method according to claim 2, is characterized in that:
In the time retrieving the security module of coupling, described terminal accesses preposition transmission authentication success prompting to described POS terminal.
4. master key management method according to claim 2, is characterized in that:
In the time not retrieving the security module of coupling, described terminal accesses preposition transmission authentification failure prompting to described POS terminal.
5. a master key management system, comprise that the access of encryption equipment, terminal is preposition, the female POS of key and POS terminal, described encryption equipment is used for generating master key and adopts specifies key to be encrypted to generate master key ciphertext to described master key, the preposition transaction unit that comprises of described terminal access, it is characterized in that
Described terminal accesses preposition comprising:
Key writing unit, for obtaining described master key ciphertext and described master key ciphertext being write to cipher key store table, wherein, described cipher key store table comprises cipher key index number, master key ciphertext and working key ciphertext;
Database Unit, for storing described cipher key store table;
WEB administrative unit, for converting described cipher key store table to the key file of arranging form with the female POS of described key;
Key loading unit, for being loaded into described key file the female POS of described key;
The female POS of described key, for retrieving the available master key of described key file and described master key and corresponding cipher key index number being distributed to described POS terminal, is labeled as described master key and uses simultaneously;
Described POS terminal comprises:
Memory cell;
Key acquiring unit, for sending key distribution request to the female POS of described key, and receives and stores associatedly described master key and cipher key index number to described memory cell;
Security module generation unit, preposition for generating security module number according to the hardware sequence number of described cipher key index number and described POS terminal and described security module number being sent to described terminal access; And
Described terminal access is preposition also to be comprised:
Registration unit, for receiving described security module number and the described security module receiving number being write to the security module number of a terminal list to receive described in registering, described Database Unit is also for storing described terminal list.
6. master key management system according to claim 5, is characterized in that:
Described POS terminal is also preposition for send in the lump number extremely described terminal access of described security module in the time sending transaction request;
Described terminal access is preposition also to be comprised:
Authentication ' unit, for when receiving described security module number and retrieving described terminal list, judge whether to retrieve the security module number of mating with the described security module receiving number, and in the time retrieving the security module of coupling, send a trading instruction to described transaction unit to process described transaction request; Described authentication ' unit also in the time not retrieving the security module of coupling, send a refusal trading instruction to described transaction unit to refuse described transaction request.
7. master key management system according to claim 5, is characterized in that:
The form of described key file is TXT form.
8. a terminal access is preposition, comprises transaction unit, it is characterized in that, described terminal access is preposition also to be comprised:
Key writing unit, for obtaining master key ciphertext from encryption equipment and described master key ciphertext being write to cipher key store table, wherein, described cipher key store table comprises cipher key index number, master key ciphertext and working key ciphertext;
Database Unit, for storing described cipher key store table;
WEB administrative unit, for converting described cipher key store table to the key file of arranging form with the female POS of described key;
Key loading unit, for being loaded into described key file the female POS of described key; And
Registration unit, for receiving security module number that POS terminal sends and the described security module receiving number being write to the security module number of a terminal list to receive described in registering, described Database Unit is also for storing described terminal list.
9. terminal access according to claim 8 is preposition, it is characterized in that:
Described terminal access is preposition also to be comprised:
Authentication ' unit, for when receiving described security module number and retrieving described terminal list, judge whether to retrieve the security module number of mating with the described security module receiving number, and in the time retrieving the security module of coupling, send a trading instruction to described transaction unit to process described transaction request; Described authentication ' unit also in the time not retrieving the security module of coupling, send a refusal trading instruction to described transaction unit to refuse described transaction request.
10. a POS terminal, is characterized in that, described POS terminal comprises:
Memory cell;
Key acquiring unit, for sending key distribution request to the female POS of key, and receives and associatedly master key and the cipher key index number of female described key POS distribution is stored to described memory cell; And
Security module generation unit, preposition for generating security module number according to the hardware sequence number of described cipher key index number and described POS terminal and described security module number being sent to terminal access.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210106378.0A CN102647274B (en) | 2012-04-12 | 2012-04-12 | POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210106378.0A CN102647274B (en) | 2012-04-12 | 2012-04-12 | POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102647274A CN102647274A (en) | 2012-08-22 |
CN102647274B true CN102647274B (en) | 2014-10-08 |
Family
ID=46659862
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210106378.0A Active CN102647274B (en) | 2012-04-12 | 2012-04-12 | POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102647274B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220270A (en) * | 2013-03-15 | 2013-07-24 | 福建联迪商用设备有限公司 | Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key |
CN103220271A (en) * | 2013-03-15 | 2013-07-24 | 福建联迪商用设备有限公司 | Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key |
CN103701610B (en) * | 2013-03-15 | 2018-04-17 | 福建联迪商用设备有限公司 | A kind of acquisition method and system for transmitting cipher key T K |
CN103237004A (en) * | 2013-03-15 | 2013-08-07 | 福建联迪商用设备有限公司 | Key download method, key management method, method, device and system for download management |
CN104348610A (en) * | 2013-07-31 | 2015-02-11 | 中国银联股份有限公司 | Method and system for securely transmitting transaction sensitive data based on cloud POS |
CN103714453B (en) * | 2013-12-27 | 2016-08-24 | 福建联迪商用设备有限公司 | Payment platform system based on smart machine and method of payment |
CN104363090A (en) * | 2014-11-19 | 2015-02-18 | 成都卫士通信息产业股份有限公司 | Secret key distribution device and method for enhancing safety of banking terminal equipment |
CN105260884A (en) * | 2015-11-18 | 2016-01-20 | 北京微智全景信息技术有限公司 | POS machine key distributing method and device |
CN106022776B (en) * | 2016-05-19 | 2019-09-27 | 成都支付通新信息技术服务有限公司 | A kind of the key bulking system and its packaging process of MPOS equipment |
CN106097608B (en) * | 2016-06-06 | 2018-07-27 | 福建联迪商用设备有限公司 | Remote cipher key method for down loading and system, acquirer and target POS terminal |
CN107493167B (en) * | 2016-06-13 | 2021-01-29 | 广州江南科友科技股份有限公司 | Terminal key distribution system and terminal key distribution method thereof |
CN106603496B (en) * | 2016-11-18 | 2019-05-21 | 新智数字科技有限公司 | A kind of guard method, smart card, server and the communication system of data transmission |
CN109818734B (en) * | 2017-11-21 | 2021-07-27 | 中国移动通信有限公司研究院 | Basic key distribution method, device and medium |
CN110048831A (en) * | 2018-12-29 | 2019-07-23 | 中国银联股份有限公司 | The distribution method and diostribution device of POS terminal master key |
CN110995421B (en) * | 2019-11-29 | 2022-12-06 | 福建新大陆支付技术有限公司 | POS terminal one-machine one-secret automatic secret key installation method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101593389A (en) * | 2009-07-01 | 2009-12-02 | 中国建设银行股份有限公司 | A kind of key management method and system that is used for the POS terminal |
CN101656007A (en) * | 2009-08-14 | 2010-02-24 | 通联支付网络服务股份有限公司 | Safe system realizing one machine with multiple ciphers on POS machine and method thereof |
CN102013982A (en) * | 2010-12-01 | 2011-04-13 | 银联商务有限公司 | Long-distance encryption method and device, management method and device, as well as encryption management method and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NZ571321A (en) * | 2006-02-22 | 2011-09-30 | Hypercom Corp | Secure electronic transaction system |
WO2009070041A2 (en) * | 2007-11-30 | 2009-06-04 | Electronic Transaction Services Limited | Payment system and method of operation |
-
2012
- 2012-04-12 CN CN201210106378.0A patent/CN102647274B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101593389A (en) * | 2009-07-01 | 2009-12-02 | 中国建设银行股份有限公司 | A kind of key management method and system that is used for the POS terminal |
CN101656007A (en) * | 2009-08-14 | 2010-02-24 | 通联支付网络服务股份有限公司 | Safe system realizing one machine with multiple ciphers on POS machine and method thereof |
CN102013982A (en) * | 2010-12-01 | 2011-04-13 | 银联商务有限公司 | Long-distance encryption method and device, management method and device, as well as encryption management method and device |
Also Published As
Publication number | Publication date |
---|---|
CN102647274A (en) | 2012-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102647274B (en) | POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof | |
CN101699892B (en) | Method and device for generating dynamic passwords and network system | |
RU2011130191A (en) | METHOD AND SYSTEM OF SAFE PROCESSING OF TRANSACTION | |
CN102737308A (en) | Mobile terminal and method and system for inquiring information of intelligent card | |
CN101226616A (en) | Payment server of webs, payment platform as well as payment method and system of webs | |
CN102546601A (en) | Auxiliary device of cloud computing terminal for accessing virtual machine | |
CN101739758B (en) | Method for encrypting and decrypting smart card, system and reader-writer | |
CN105391696A (en) | Terminal registration method, terminal verification method, terminal registration system and terminal verification system | |
CN103577983A (en) | Load method of electronic currency for off-line consumption | |
CN102123027A (en) | Information security processing method and mobile terminal | |
CN102075327A (en) | Method, device and system for unlocking electronic key | |
EP2409454A1 (en) | Methods for producing products which contain certificates and keys | |
CN104732431A (en) | Electronic bill platform and electronic bill processing method executing on electronic bill platform | |
CN112383914B (en) | Password management method based on secure hardware | |
CN102694782A (en) | Internet-based device and method for security information interaction | |
CN103530768A (en) | Mobile communication payment system and cost payment method thereof | |
CN101661563B (en) | Safe multi-interface certificate mobile inquiry system and method thereof | |
CN101931530B (en) | Generation method, authentication method and device for dynamic password and network system | |
CN101902740B (en) | OTA authentication method based on authentic SD/MMC card | |
CN101059858B (en) | Method and device for inquiring conveniently electronic transaction history record | |
CN102938116A (en) | Full-link protection and management method for ensuring safety of transaction | |
CN103685145A (en) | Security information interaction system, security information interaction device and security information interaction method | |
CN104361304A (en) | Method and device for downloading application program of smart card | |
CN102546545A (en) | Device and method for guaranteeing transmission safety of important network data of user | |
CN101236674A (en) | Intelligent cipher key equipment and method for information exchange with external apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |