Unlock instant, AI-driven research and patent intelligence for your innovation.

Signature method of payment terminal application program based on signature machine

An application and payment terminal technology, applied in data processing applications, payment architecture, user identity/authority verification, etc., can solve problems such as loss of private keys, potential security risks, property loss of third-party payment institutions, etc., to avoid security issues Hidden danger, the effect of solving insecurity

Active Publication Date: 2020-01-03
FUJIAN NEWLAND PAYMENT TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the private keys of third-party payment institutions are generated by the payment terminal manufacturers on their behalf, which has potential security risks, and the signature method is to use the PC tool to use the private key stored on the PC to sign the application program, although this method can be convenient. Sign the application, but because the private key is stored on the PC, it is easy to be obtained by others to sign your own application and download it to the payment terminal, resulting in property loss to the third-party payment institution
In addition, due to accidental factors such as misoperation or damage to the PC disk, the private key stored on the PC may be lost, and a new public-private key pair must be replaced, resulting in unnecessary losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature method of payment terminal application program based on signature machine
  • Signature method of payment terminal application program based on signature machine
  • Signature method of payment terminal application program based on signature machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solution of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0054] Such as Figure 1-5 As shown, a signing machine-based payment terminal application signing method of the present invention includes the following steps,

[0055] S1: Interactively generate a public-private key pair through the signing machine and PC tools, and upload the public key to the PC. The private key is encrypted and stored in the signing machine and encrypted and backed up to the IC card;

[0056] S2: Use the signature machine to select the corresponding private key to decrypt, and use the decrypted private key to sign the application data to be signed issued by the PC tool;

[0057] S3: Upload the signature result to the PC tool.

[0058] The specific implementation process of the present invention is described in detail below.

[0059] The method of the present invention uses a signing machine to carry out the signing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a payment terminal application program signature method based on a signature machine. According to the method, a pair of public and private keys are generated through interaction of the signature machine and a PC tool, the public key is uploaded to a PC, and the private key is encrypted and saved in the signature machine and saved as an encrypted backup in an IC card; then the corresponding private key is selected to perform decryption through the signature machine, and the decrypted private key is applied to sign application program data to be signed which is issued by the PC tool; and finally the signature result is uploaded to the PC tool. Besides, the signature machine also supports downloading of the private key and importing and exporting of the private key, and the private key can be downloaded through a private key download function or the backup private key can be imported from the IC card if the private key is lost due to security attack of the signature machine or other reasons. New public and private key pairs can be conveniently generated by a third-party payment mechanism itself and safety hidden trouble caused by the fact that current payment terminal manufacturers generate the public and private key pairs instead of the third-party payment mechanism can be avoided, and all the private keys are encrypted and saved in the signature machine so that loss caused by disclosure of the private keys is not liable to occur.

Description

technical field [0001] The invention relates to a method for signing payment terminal application programs based on a signing machine. Background technique [0002] Payment terminals of different third-party payment institutions can only download and install applications signed with the private key of the third-party payment institution to ensure that the interests of the third-party payment institution are not damaged. [0003] At present, the private keys of third-party payment institutions are generated by the payment terminal manufacturers on their behalf, which has potential security risks, and the signature method is to use the PC tool to use the private key stored on the PC to sign the application program, although this method can be convenient. Sign the application, but because the private key is stored on the PC, it is easy to be obtained by others to sign their own application and downloaded to the payment terminal, resulting in the loss of property of the third-pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCG06Q20/0855G06Q20/105G06Q20/3825G06Q20/3829H04L9/3252
Inventor 张兆鑫郑凯严明
Owner FUJIAN NEWLAND PAYMENT TECH