Safe system realizing one machine with multiple ciphers on POS machine and method thereof

A security system and POS machine technology, applied in the field of security systems, can solve problems such as security risks and terminal leakage, and achieve the effects of improving security, saving storage space, and reducing the possibility of exhaustive attack.

Active Publication Date: 2010-02-24
通联支付网络服务股份有限公司
View PDF0 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] At present, the POS machines deployed in the market, for the convenience of key infusion, mostly adopt the method of multi-machine one secret, that is, multiple terminals share the same terminal master key or one region one secret, and issue the terminal master key To the POS terminal, the advantage of doing this is that the master key is issued conveniently and quickly, but the biggest problem is that once the terminal master key is leaked, other terminals in a region that share the same master key will also be leaked, which will pose a serious safety hazard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe system realizing one machine with multiple ciphers on POS machine and method thereof
  • Safe system realizing one machine with multiple ciphers on POS machine and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Below in conjunction with specific embodiment, further illustrate the present invention. It should be understood that these examples are only used to illustrate the present invention and are not intended to limit the scope of the present invention. In addition, it should be understood that after reading the teachings of the present invention, those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms also fall within the scope defined by the appended claims of the present application.

[0052] The utility model proposes a method for safely generating, distributing and using the POS terminal master key TMK based on the 3DES symmetric key system, and realizes the security function of one machine and multiple secrets on the POS terminal.

[0053] The key generation, distribution, and use relationships involved in realizing the above solutions are as follows: figure 2 shown.

[0054] In this scenario:

[0055]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe system realizing one machine with multiple ciphers on POS machine and a method thereof. The system comprises a hardware encrypting machine, a TEK distribution module, aPOS terminal device, a TMK distribution module and a POS background system, wherein, the hardware encrypting machine is connected with a secret key POS terminal by the TEK distribution module, the hardware encrypting machine is connected with the secret key POS terminal by the TMK distribution module, the secret key POS terminal is connected with a POS terminal cipher keyboard, and the hardware encrypting machine is connected with the POS terminal cipher keyboard by the POS background system. The method is based on a 3DES symmetric secret key system, safely produces, distributes and uses themethod of the main secret key TMK of the POS terminal to realize the function of one machine with multiple ciphers on the POS terminal.

Description

technical field [0001] The invention belongs to the technical field of electronic communication, and in particular relates to a security system and method for realizing multiple secrets in one machine on a POS machine. Background technique [0002] At present, the key management function of the POS terminal used for the cardholder's card consumption function is relatively weak. Multiple POS machines share the same key (multiple machines, one secret), and a city shares the same key (one city, one secret) or One region shares the same key (one secret for one region), which has many security risks in key management, and the leakage of one POS machine will affect the key information management security of other POS. This proposal is based on a symmetric key system, and a set of encryption methods is designed, so that one POS machine can support multiple keys at the same time, and each POS key is different, and the leakage of one POS will not affect other POS security, and the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07G1/14H04L29/06
Inventor 黎宝华黄如燕周轶嘉石玮田铁龙
Owner 通联支付网络服务股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products