Method for authenticating point of sail (POS) file and method for maintaining authentication certificate

A certificate and document technology, applied in the field of POS application software certification, can solve the problems that are not conducive to certificate renewal and maintenance, and cannot better ensure the authenticity of application software, and achieve the effect of ensuring authenticity.

Active Publication Date: 2011-05-18
FUJIAN LANDI COMML EQUIP CO LTD
View PDF1 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this first-level certificate method is not conducive to the update and maintenance of the certificate itself, and thus cannot better ensure the authenticity of the application software.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
  • Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
  • Method for authenticating point of sail (POS) file and method for maintaining authentication certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The invention proposes a set of POS digital signature scheme and management process based on secondary certificate management.

[0044] 1. POS secondary certificate management mechanism

[0045]Use two-level certificate management, the first level is the root certificate, and the second level is the work certificate. The root certificate is used to verify the legitimacy of the work certificate, but cannot be used to verify the legitimacy of the application. The work certificate is used to verify the legitimacy of the downloaded software. Each certificate consists of a public key and a private key.

[0046] 1. As long as there are two certificates managed by the POS acquirer:

[0047] (1) root certificate (public, private key);

[0048] (2) Work certificate (public, private key).

[0049] Note: The private key used to sign the terminal application is parsed from the private key file. There are currently two ways to protect the private key, one is to encrypt and sav...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for authenticating a point of sail (POS) file and a method for maintaining an authentication certificate. During the POS file authentication, a two-level certificate management-based POS digital signature scheme is adopted, wherein the first-level certificate is a root certificate and the second-level certificate is a working certificate; the root certificate can authenticate the legality of the working certificate, but cannot authenticate the legality of an application program; and the working certificate can authenticate the legality of downloaded POS software. A POS acquirer head office applies the root certificate and the working certificate from certificate authority (CA), provides a POS acquirer root certificate public key to a terminal manufacturer, performs digital signature to generate a root certificate public key file, returns the root certificate public key file to the head office and then issues the root certificate public key file to each branch office; each POS acquirer branch office receives the root certificate public key file transmitted by the head office; and the POS acquirer head office performs digital signature on a working certificate public key by a root certificate private key to generate a working certificate public key file and issue the working certificate public key file to each branch office. The method for authenticating the POS file and the method for maintaining the authentication certificate have the advantages of contributing to the update and the maintenance of the certificate per se and guaranteeing the authenticity of application software.

Description

【Technical field】 [0001] The invention relates to a POS application software authentication method, in particular to a POS file authentication method and an authentication certificate maintenance method. 【Background technique】 [0002] The POS application software allows updating by downloading. Therefore, it is necessary to prevent illegal users from downloading dangerous software to the POS to commit illegal crimes, or to steal keys and sensitive information stored in the POS. In other words, only application software approved by the owner of the POS can be downloaded into the POS. [0003] In order to realize that the owner of the POS, for example, the acquiring bank confirms that the application software approved by it can be downloaded to the POS, it is necessary to complete the application software certification through some authentication means. This authentication method corresponds to a key algorithm. In general, there are two broad categories of key algorithms. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 孟陆强黄水香刘世英
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products