Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Remote distribution method and system of terminal master key

A terminal master key and distribution system technology, which is applied to the remote distribution method and system field of the terminal master key, can solve the problems of high operation and maintenance costs, cumbersome processes, etc.

Active Publication Date: 2021-01-19
FUJIAN LANDI COMML EQUIP CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a method and system for remote distribution of terminal master keys, which can solve the problems of traditional local key injection methods such as cumbersome process and high operation and maintenance costs, and meet the requirements of security and convenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote distribution method and system of terminal master key
  • Remote distribution method and system of terminal master key
  • Remote distribution method and system of terminal master key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0109] Please refer to figure 1 , Embodiment 1 of the present invention is: a method for remotely distributing terminal master keys, which can complete the remote distribution of terminal master keys during the generation phase, and is applicable to any type of financial terminal equipment, such as POS machines, ATMs Wait. Before carrying out this method, it is necessary to build a key management system ZKMS, which is equivalent to the role of the key master POS, and completes the key distribution to the sub-POS that leaves the factory. The method comprises the steps of:

[0110] S1: The manufacturer's device generates the terminal master key and customer protection key, and injects the customer protection key into the hardware encryption machine; specifically, before the payment terminal is produced, the payment manufacturer's device randomly generates the terminal master key TMK and the customer protection key. key CPK, and inject the customer protection key CPK into the h...

Embodiment 2

[0121] This embodiment is a further extension of Embodiment 1, and the similarities will not be repeated. The difference is that before step S4, that is, before the payment terminal sends the transmission key to the key management system ZKMS, the hardware encryption machine generates an asymmetric key Yes, including the public key of the production line and the private key of the production line, and then send the public key of the production line to the payment terminal through a digital certificate, that is, the digital certificate including the public key of the production line can be sent to the payment terminal, and the payment terminal will check the digital certificate After verification, obtain the public key of the production line.

[0122] When the payment terminal sends the transmission key to the key management system ZKMS, that is, in step S4, the payment terminal uses the production line public key to encrypt the transmission key and the unique identification cod...

Embodiment 3

[0125] Please refer to Figure 2-3 , this embodiment is a further extension of steps S6 and S7 in the first embodiment.

[0126] In this embodiment, the transmission key TK includes a transmission encryption key TK-TEK and an authentication key TK-AUK.

[0127] Such as figure 2 As shown, step S6 includes the following steps:

[0128] S61: Use the customer protection key CPK in the hardware encryption machine to decrypt the ciphertext of the first terminal master key to obtain the terminal master key TMK;

[0129] S62: Use the transmission encryption key TK-TEK to encrypt the terminal master key TMK to obtain a second terminal master key ciphertext;

[0130] S63: Use the authentication key TK-AUK to perform a MAC operation on the ciphertext of the second terminal master key to obtain a first MAC value;

[0131] S64: Send the second terminal master key ciphertext and the first MAC value to the payment terminal.

[0132] Such as image 3 As shown, step S7 includes the foll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed in the present invention are a remote distribution method and system for a terminal master key. The method comprises: generate a terminal master key and a customer protection key, and inject the customer protection key into a hardware encryption machine; encrypt the terminal master key using the customer protection key to obtain a first terminal master key ciphertext; associate the first terminal master key ciphertext with a unique identification code and saves an association to a key management system; a payment terminal generates a transport key, and sends the transport key and the unique identification code to the key management system; the key management system obtains the corresponding terminal master key ciphertext according to the unique identification code; transcodes the terminal master key ciphertext to obtain a second terminal master key ciphertext, and sends the second terminal master key ciphertext to the payment terminal; the payment terminal decrypts the second terminal master key ciphertext using the transport key, and stores the terminal master key obtained by decryption into a secure area. The present invention can securely and reliably distribute a terminal master key to a payment terminal in a production stage.

Description

technical field [0001] The invention relates to the field of electronic payment, in particular to a method and system for remotely distributing terminal master keys. Background technique [0002] With the rapid development of the electronic payment industry, such as bank card payment, consumer card payment, industry card payment and other electronic payment technologies through the network, they are more and more popular because of their fast and convenient features. [0003] The electronic payment system includes components such as terminal equipment, acquiring platform and bank core system. In order to ensure the security of consumers' personal sensitive information during the payment process, it is required to encrypt the personal sensitive information during the transaction process, mainly through the key of master key / session key (MK / SK) system to complete. Taking POS (Point of Sale, point of sale terminal) consumer transactions as an example, the principle of termina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0822H04L9/0863H04L63/0428
Inventor 王明伟徐永标
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products