Authentication method of mobile intelligent terminal and POS terminal

A mobile smart terminal and authentication method technology, which is applied in the field of authentication between mobile smart terminals and POS terminals, can solve problems such as insecure communication between mobile smart terminals and POS terminals, and achieve the effect of improving the level of communication security and information security

Active Publication Date: 2016-04-27
咪付(深圳)网络技术有限公司
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the defects of the above-mentioned existing authentication methods, the technical problem to be solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of mobile intelligent terminal and POS terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. The aspects described below in conjunction with the drawings and specific embodiments are only exemplary, and should not be construed as limiting the protection scope of the present invention. Such as figure 1 Shown, the specific implementation steps of the embodiment of the present invention:

[0021] 1) The smart terminal (mobile phone) requests the service from the service support platform, the service support platform generates a random number R, and uses the random number R to generate the first key K1 through the root key of the encryption machine;

[0022] 2) Use the first key K1 to generate the first message authentication code MAC1 from the random number R. If the HMAC algorithm is used, that is, MAC1=HMAC (K1+R), send K1+R+MAC1 to the mobile smart terminal (mobile phone);

[0023] 3) The smart mobile terminal sends the random number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communication authentication, and particularly relates to an authentication method of a mobile intelligent terminal and a POS terminal. The mobile intelligent terminal generates a first time authentication code via a shared key and a random number to carry out first time authentication with the POS terminal, and the POS terminal generates a new key, encrypts the new key, generates a second time authentication code via the encrypted new key and the random number, and returns the second time authentication code to the mobile intelligent terminal to carry out second time authentication, and the new key generated by the POS terminal is completely transmitted to the mobile intelligent terminal during the second time authentication. After decryption, the both parties splice the two keys into the new key and use the spliced key for encryption or decryption in subsequent communication. By means of the twice mutual authentication of the mobile intelligent terminal and the POS terminal, the shared encryption and decryption key is smartly obtained in the authentication process, the communication security grade of the mobile intelligent terminal and the POS terminal is improved, and the information in the transaction of mobile payment is safer.

Description

Technical field [0001] The invention involves the field of communication certification, which is specifically for authentication methods for mobile smart terminals and POS terminals. Background technique [0002] With the development of information technology, the mobile smart terminal represented by smartphones has been popularized, and mobile payment solutions with mobile phones as the main devices are becoming increasingly mature.Communication security is very important in mobile payment.In the existing mobile payment scheme, it mainly includes the service support platform of the network back end as the command control center, the mobile smart terminal used by consumers, and the POS terminal used by merchants.Among them, information exchange between smart terminals and POS terminals mostly uses close -range wireless communication technology such as NFC, infrared, and Bluetooth.To ensure information security, identity authentication must be performed before communication betwee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06Q20/32
CPCG06Q20/322G06Q20/327H04L63/083H04L63/0869
Inventor 曾满祥梁安宁陆生齐
Owner 咪付(深圳)网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products