Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method for transmitting keys, a receiving terminal and a distributing terminal

A technology for receiving terminals and transmitting keys, which is applied in the field of data processing, and can solve problems such as a large amount of manpower, MK key security threats, and high operation and maintenance costs, so as to ensure security and reliability, simplify the transmission process, and avoid malicious The effect of the code

Active Publication Date: 2021-03-05
FUJIAN LANDI COMML EQUIP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Disadvantage 1: In the safe room, the key is downloaded to the POS through serial communication, and the POS is required to be sent to the safe room uniformly. It requires a lot of manpower to complete the injection of MK, which greatly increases the operation and maintenance cost of the POS equipment.
[0007] Disadvantage 2: The terminal equipment leaving the factory should be sent to the terminal key management agency first, and then resent to the actual user of the terminal after completing the terminal key injection work, which has caused huge expenses for business development, including time costs and manpower costs, etc., while slowing down the speed of business expansion
[0008] Disadvantage 3: Due to the traditional method, POS is required to download MK directly to the device through physical means in the safe room, and the operation and maintenance cost of fixed MK regular replacement is huge. In order to save business costs, some customers will omit this transaction, and In the long run, this will pose a threat to the security of MK keys in POS devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for transmitting keys, a receiving terminal and a distributing terminal
  • A method for transmitting keys, a receiving terminal and a distributing terminal
  • A method for transmitting keys, a receiving terminal and a distributing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] This embodiment provides a method for transmitting a key, including:

[0118] S1. The receiving terminal generates a transmission authentication key and a transmission encryption key; the transmission authentication key is unique; the transmission encryption key is unique;

[0119] The receiving terminal sends the transmission authentication key and the transmission encryption key to the transmission key management terminal, so that the transmission key management terminal synchronizes the transmission authentication key and the transmission encryption key to the distribution terminal;

[0120] The distribution terminal obtains the transmission authentication key corresponding to more than one receiving terminal from the transmission key management terminal, and obtains a transmission authentication key set; each transmission authentication key in the transmission authentication key set is unique; the distribution terminal obtains the transmission authentication key set ...

Embodiment 2

[0171] This embodiment provides a receiving terminal, including one or more first processors 1 and a first memory 2, the first memory 2 stores a program, and is configured to be controlled by the one or more first processors 1Perform the following steps:

[0172] S1. Generate a transmission authentication key and a transmission encryption key; the transmission authentication key is unique; the transmission encryption key is unique;

[0173] Sending the transmission authentication key and the transmission encryption key to the transmission key management terminal, so that the transmission key management terminal synchronizes the transmission authentication key and the transmission encryption key to the distribution terminal.

[0174] S2. Obtain the first authentication message according to the unique identifier of the receiving terminal and the first random character string; specifically:

[0175] Randomly generate a string of more than 16 bytes to obtain the first random stri...

Embodiment 3

[0187] Embodiment three provided by the present invention is:

[0188] This embodiment provides a method for transmitting a key, including:

[0189] S1. Obtain transmission authentication keys corresponding to more than one receiving terminal from the transmission key management terminal, and obtain a transmission authentication key set; each transmission authentication key in the transmission authentication key set is unique;

[0190] The transmission encryption key corresponding to more than one distribution terminal is obtained from the transmission key management terminal to obtain a transmission encryption key set; each transmission encryption key in the transmission encryption key set is unique.

[0191] S2. Verify the first authentication message from the receiving terminal to obtain a second verification result; the second verification result includes verification passed and verification failed; the first authentication message includes the unique identifier of the rec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of data processing, in particular to a method for remote key transmission, a receiving terminal and a distribution terminal. The present invention obtains the first authentication message according to the unique identifier of the receiving terminal and the first random character string; sends the first authentication message to the distribution terminal, so that the distribution terminal verifies the identity of the receiving terminal according to the first authentication message legitimacy; verifying the second authentication message from the distribution terminal to obtain a first verification result; the first verification result includes passing the verification and failing the verification; the second authentication message includes the unique identifier of the distribution terminal, A second random character string, a second MAC value, and a specific key ciphertext; when the first verification result is that the verification is passed, decrypt the specific key ciphertext to obtain a specific key plaintext. To achieve improved efficiency of remote key transmission.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a key transmission method, a receiving terminal and a distribution terminal. Background technique [0002] With the rapid development of the electronic payment industry, such as bank card payment, consumer card payment, industry card payment and other electronic payment technologies through the network, they are more and more popular due to their fast and convenient features. [0003] The electronic payment system includes components such as terminal equipment, acquiring platform and bank core system. In order to ensure the security of consumers' personal sensitive information during the payment process, it is required to encrypt the personal sensitive information during the transaction process, mainly through the key of Master Key / Session Key (MK / SK) system to complete. Taking POS (Point of Sale, POS) consumption transactions as an example, the principle of terminal equipment pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0819H04L9/3242H04L9/3273H04L2209/56H04L9/12
Inventor 唐胤曦徐永标
Owner FUJIAN LANDI COMML EQUIP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More