Unlock instant, AI-driven research and patent intelligence for your innovation.

Key acquisition method, device, server and medium

A server and key technology, applied in the field of network security, can solve problems such as key leakage, reduce the probability of leakage and improve security

Active Publication Date: 2022-04-12
CHINA CONSTRUCTION BANK
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a key generation method, device, server, and medium to solve the problem of key leakage that may be caused by filling the key required for the transaction into the POS machine in advance in the existing method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key acquisition method, device, server and medium
  • Key acquisition method, device, server and medium
  • Key acquisition method, device, server and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 It is a flow chart of a method for generating a key provided in Embodiment 1 of the present invention. This embodiment is applicable to the situation where a user uses a terminal to conduct financial transactions. This method is applied to a terminal, such as a POS machine or a mobile communication device, and can be executed by the key generation device configured in the terminal provided by the embodiment of the present invention. The key generating device can be realized by software and / or hardware. see figure 1 , the method specifically includes:

[0042] Step 101: Generate a certificate message request according to the serial number ciphertext and the hardware serial number, and send the certificate message request to the server, wherein the serial number ciphertext is obtained by encrypting the hardware serial number with an initial key .

[0043] Among them, when the terminal leaves the factory, the manufacturer will assign a unique hardware serial n...

Embodiment 2

[0061] figure 2 It is a flow chart of a method for generating a key provided in Embodiment 2 of the present invention. This embodiment is applicable to the situation where the user uses the terminal to conduct financial transactions. This method is applied to the server and can be executed by the key generation device configured in the server provided by the embodiment of the present invention. The key generation device can be implemented by software and / or or by means of hardware. see figure 2 , the method specifically includes:

[0062] Step 201: Receive a certificate message request from the terminal, and generate a certificate message according to the terminal certificate and the server public key, wherein the terminal certificate is generated according to the hardware serial number in the certificate message request.

[0063] Specifically, the server receives the certificate message request, obtains the hardware serial number from the certificate message request, and...

Embodiment 3

[0078] image 3 It is a flow chart of a key acquisition method provided by Embodiment 3 of the present invention. This embodiment provides a specific implementation manner for the second embodiment above. Specifically, it can include the following:

[0079] Step 301: Receive a certificate message request from a terminal, and determine whether the certificate message request is legal according to the hardware serial number and serial number ciphertext in the certificate message request.

[0080] Specifically, in order to prevent the terminal certificate from being obtained maliciously, after receiving the terminal certificate message request, the server will check the validity of the certificate message request according to the hardware serial number and serial number ciphertext in the certificate message request.

[0081] Optionally, step 301 includes:

[0082] A. From the candidate initial keys stored in the server in advance, the candidate initial key associated with the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a key acquisition method, device, server and medium. The method includes: generating a certificate message request according to the serial number ciphertext and the hardware serial number, and sending the certificate message request to the server; receiving the encrypted certificate message from the server, and encrypting the encrypted certificate according to the serial number ciphertext Decrypt the message to obtain the terminal certificate and server public key; send the target key message encrypted by the terminal certificate to the server; receive the target key message encrypted by the server, and encrypt the encrypted target key message according to the server public key The target key message is decrypted to obtain the target key. In the embodiment of the present invention, the terminal certificate is obtained by decrypting the obtained certificate message according to the serial number ciphertext, and the target key message request encrypted by the terminal certificate is sent to the server to obtain the target key, which reduces the target key. The probability of key leakage improves the security of terminal transactions using the target key.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular to a key acquisition method, device, server and medium. Background technique [0002] POS (point of sale, sales terminal) is a multi-functional terminal that reads the magnetic stripe information of the cardholder on the bank card through the card reader, the POS operator enters the transaction amount, and the cardholder enters personal identification information. Send the information to the card-issuing bank system through the UnionPay center, complete the online transaction, give the information of success or failure, and print the corresponding bill. The application of POS realizes the online consumption of credit cards, debit cards and other bank cards, ensures the safety, speed and accuracy of transactions, avoids complicated labor such as manual query of blacklists and pressing orders, and improves work efficiency. [0003] In POS transa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0861H04L9/0819H04L9/3263H04L63/0823
Inventor 侯戬赖韬罗旋
Owner CHINA CONSTRUCTION BANK
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More