Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method, payment terminal and system for securely importing payment terminal keys

A payment terminal and key technology, applied in the field of information security, can solve problems such as potential security risks

Active Publication Date: 2021-09-14
FEITIAN TECHNOLOGIES
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The payment terminal has extremely high security requirements for key storage, especially the key import link. In the prior art, the payment terminal usually uses the protection key to encrypt the transmission key during the key download process and then transmits it. Due to the protection The key is generally imported from the outside of the payment terminal in the form of plain text, which poses a security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, payment terminal and system for securely importing payment terminal keys
  • A method, payment terminal and system for securely importing payment terminal keys
  • A method, payment terminal and system for securely importing payment terminal keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0113] Embodiment 1 of the present invention provides a method for securely importing payment terminal keys, such as figure 1 shown, including:

[0114] Step 101: the payment terminal sends an operation instruction request to the key injection device;

[0115] Step 102: the payment terminal receives the operation instruction sent by the key injection device;

[0116] Specifically, the operation instructions include an instruction for setting a real-time clock, an instruction for two-way authentication, an instruction for obtaining payment terminal information, an instruction for setting a serial number of a payment terminal, an instruction for downloading and transmitting a key, and an instruction for verifying a transmission key;

[0117] Step 103: The payment terminal judges whether the authentication status is legal according to the operation instruction, if yes, execute step 104, otherwise report an error;

[0118] In this embodiment, the implementation process of step 1...

Embodiment 2

[0272] Embodiment 2 of the present invention provides a method for securely importing payment terminal keys, such as Figure 9 shown, including:

[0273] Step 901: the payment terminal sends an operation instruction request to the key injection device;

[0274] Step 902: The key injection device receives the operation instruction request sent by the payment terminal, and sends the operation instruction to the payment terminal;

[0275] Specifically, the operation instructions include an instruction for setting a real-time clock, an instruction for two-way authentication, an instruction for obtaining payment terminal information, an instruction for setting a serial number of a payment terminal, an instruction for downloading and transmitting a key, and an instruction for verifying a transmission key;

[0276] Step 903: The payment terminal receives the operation instruction sent by the key injection device, and judges whether the authentication status is legal according to the...

Embodiment 3

[0447] Embodiment 3 of the present invention provides a payment terminal for securely importing payment terminal keys, such as Figure 18 shown, including:

[0448] The first sending module 11 is configured to send an operation instruction request to the key injection device;

[0449] The first receiving module 12 is configured to receive the operation instruction sent by the key injection device;

[0450] The first judging module 13 is used to judge whether the authentication state is legal according to the operation instruction received by the first receiving module 12, if it is legal, then trigger the second judging module 14, otherwise trigger the first error reporting module 15;

[0451] The second judging module 14 is used to judge the type of the operation instruction received by the first receiving module 12, such as triggering the first generation sending module 16 for a two-way authentication instruction, triggering the second sending module 20 for downloading and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a payment terminal and a system for safely importing a payment terminal key; the payment terminal successfully imports the transmission key after passing through the two-way authentication stage, the downloading transmission key stage and the verification transmission key stage; the downloading transmission key The stage key injection device uses the second protection key to encrypt the first transmission key to obtain the data field of the first key block for transmission, and the payment terminal uses the first protection key to decrypt the data field of the first key block to obtain the second Transmission key: The first protection key of the present invention is bidirectionally authenticated and transmitted in the form of ciphertext, which can effectively guarantee the authenticity and reliability of both communication parties, achieve the purpose of secure communication, and have higher security.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for safely importing a payment terminal key, a payment terminal and a system. Background technique [0002] The main task of the payment terminal is to provide transaction data services and management functions for goods and services, and to handle non-cash settlements. Due to its non-cash settlement function, the security of the payment terminal must be well ensured, such as ensuring the security of the key storage of the payment terminal, in order to ensure the security of the transaction process. [0003] The payment terminal has extremely high security requirements for key storage, especially the key import link. In the prior art, the payment terminal usually uses the protection key to encrypt the transmission key during the key download process and then transmits it. Due to the protection The key is generally imported from the outside of the payment terminal in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08G06Q20/38
CPCG06Q20/3823H04L9/0825H04L9/0869H04L9/0891H04L9/3239H04L9/3247H04L9/3268
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products