Software encryption terminal, payment terminal, software package encryption and decryption method and system

A payment terminal and encryption method technology, which is applied in transmission systems, digital transmission systems, encryption devices with shift registers/memory, etc., can solve problems such as keys not complying with key security management regulations, key leakage, etc., to achieve Less vulnerable to attacks and improved security

Active Publication Date: 2020-08-04
FUJIAN LANDI COMML EQUIP CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The key used by the encryption software package does not comply with key security management regulations, there is a risk of key leakage, and any unauthorized terminal developer can obtain the software encryption key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software encryption terminal, payment terminal, software package encryption and decryption method and system
  • Software encryption terminal, payment terminal, software package encryption and decryption method and system
  • Software encryption terminal, payment terminal, software package encryption and decryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0185] Please refer to figure 1 , Embodiment 1 of the present invention is:

[0186] A method for encrypting a software package provided by the invention comprises the following steps:

[0187] S1: Obtain a symmetric key;

[0188] Wherein, the S1 can be realized by any of the following methods:

[0189] 1. Complete the import of the symmetric key into the software encryption terminal by manually inputting the components of the symmetric key. If you use this method, you need to build a safe room and complete this operation in the safe room;

[0190] 2. Through the key generation algorithm, the symmetric key is randomly generated;

[0191] 3. Obtain the symmetric key through the key download method (need to use the key download device).

[0192] S2: Encrypt a preset software package according to the symmetric key to obtain an encrypted software package;

[0193] The S2 is specifically:

[0194] S21: Obtain the software package transmitted by the external storage device; ...

Embodiment 2

[0211] Please refer to figure 2 , the second embodiment of the present invention is:

[0212] A software package decryption method provided by the present invention comprises the following steps:

[0213] S4: obtain the encrypted software package;

[0214] The S4 is specifically:

[0215] Download the encrypted software package uploaded by the software encryption terminal from the server, and obtain the encrypted software package.

[0216] S5: According to the symmetric key imported to the payment terminal, decrypt the encrypted software package to obtain the software package;

[0217] The S5 is specifically:

[0218] Obtaining the second computer file and the second software ciphertext data according to the encryption software package;

[0219] calculating a hash value of the second software ciphertext data through a hash algorithm to obtain a second hash value;

[0220] extracting the information of the first field and the second field in the second computer file, to ob...

Embodiment 3

[0226] Please refer to image 3 , Embodiment three of the present invention is:

[0227] A software package encryption and decryption method provided by the present invention comprises the following steps:

[0228] S1: The software encryption terminal obtains the symmetric key;

[0229] S2: According to the symmetric key, the software encryption terminal encrypts a preset software package to obtain an encrypted software package;

[0230] The S2 is specifically:

[0231] The software encryption terminal obtains the software package transmitted by the external storage device;

[0232] preset description information, where the description information includes a first domain and a second domain;

[0233] Generate key serial number;

[0234] Write the key serial number into the first field of the description information;

[0235] Generate a first encryption key through the DUKPT algorithm according to the symmetric key and the key serial number; the first encryption key inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided are a software encryption terminal, a payment terminal, and a software package encryption and decryption method and system. The method comprises: acquiring a symmetric key; encrypting a pre-set software package according to the symmetric key so as to obtain an encrypted software package; uploading the encrypted software package to a server; and the fourth processor implementing the following steps when executing the program: downloading the encrypted software package from the server, and according to the symmetric key imported to a payment terminal, the payment terminal decrypting the encrypted software package so as to obtain a software package. In the present invention, by means of the method, a software package is not vulnerable during the transmission process, a key used for encrypting a software package complies with a key security management regulation, and there is no risk of key leakage. The present invention improves the security of transmitting a software package to a payment terminal, and avoids the problem of huge loss due to a user installing a software package that has been maliciously attacked.

Description

technical field [0001] The invention relates to the technical field of software, in particular to a software encryption terminal, a payment terminal, a method and a system for encrypting and decrypting a software package. Background technique [0002] With the rapid development of the electronic payment industry, especially the rise of smart POS, payment terminal software updates are becoming more and more frequent and important. Whether it is bug fixes or new functions, more and more new software versions are released. How to integrate these new software There are generally two methods for safely downloading to the payment terminal: one is local downloading, that is, the payment terminal is connected to a local PC, and the new software is downloaded through a local PC tool; the other is remote updating, that is, the new software is pushed online to the The payment terminal, after the payment terminal receives the software, completes the installation. For local downloading,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06G06F21/62
CPCG06F21/6209H04L9/0643H04L63/0435H04L63/067
Inventor 万文超洪逸轩
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products