Signature method of payment terminal application program based on signature machine
An application and payment terminal technology, applied in data processing applications, payment architecture, user identity/authority verification, etc., can solve problems such as loss of private keys, potential security risks, property loss of third-party payment institutions, etc., to avoid security issues Hidden danger, the effect of solving insecurity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] The technical solution of the present invention will be specifically described below in conjunction with the accompanying drawings.
[0054] Such as Figure 1-5 As shown, a signing machine-based payment terminal application signing method of the present invention includes the following steps,
[0055] S1: Interactively generate a public-private key pair through the signing machine and PC tools, and upload the public key to the PC. The private key is encrypted and stored in the signing machine and encrypted and backed up to the IC card;
[0056] S2: Use the signature machine to select the corresponding private key to decrypt, and use the decrypted private key to sign the application data to be signed issued by the PC tool;
[0057] S3: Upload the signature result to the PC tool.
[0058] The specific implementation process of the present invention is described in detail below.
[0059] The method of the present invention uses a signing machine to carry out the signing...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


