WO2014139343A1 - 密钥下载方法、管理方法、下载管理方法及装置和*** - Google Patents

密钥下载方法、管理方法、下载管理方法及装置和*** Download PDF

Info

Publication number
WO2014139343A1
WO2014139343A1 PCT/CN2014/071259 CN2014071259W WO2014139343A1 WO 2014139343 A1 WO2014139343 A1 WO 2014139343A1 CN 2014071259 W CN2014071259 W CN 2014071259W WO 2014139343 A1 WO2014139343 A1 WO 2014139343A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
ciphertext
random number
terminal
key server
Prior art date
Application number
PCT/CN2014/071259
Other languages
English (en)
French (fr)
Inventor
苏文龙
孟陆强
洪逸轩
Original Assignee
福建联迪商用设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 福建联迪商用设备有限公司 filed Critical 福建联迪商用设备有限公司
Priority to US14/777,474 priority Critical patent/US9948624B2/en
Publication of WO2014139343A1 publication Critical patent/WO2014139343A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the present invention relates to the field of electronic payment, and in particular to a POS Terminal key downloading method, management method, download management method, device and system.
  • Bank cards are becoming more and more popular as payment instruments.
  • the usual bank card payment system includes point-of-sale terminals ( Point Of Sale (POS), Terminal Management System (TMS), Password Keyboard (PIN PAD) And Hardware and Security Module (HSM).
  • POS Point Of Sale
  • TMS Terminal Management System
  • PIN PAD Password Keyboard
  • HSM Hardware and Security Module
  • POS POS
  • the terminal can accept bank card information, has communication function, and accepts the instructions of the teller to complete the financial transaction information and related information exchange equipment; TMS system to POS
  • the terminal performs centralized management, including parameter downloading, key downloading, accepting, processing or forwarding the transaction request of the POS terminal, and sending back the transaction result information to the POS terminal, which is a centralized management and transaction processing system;
  • the password keyboard PIN PAD
  • HSM hardware encryption machine
  • HSM hardware encryption machine
  • the cardholder in the process of payment, in addition to the information such as the track information of the bank card sent by the POS terminal, the cardholder also needs to input the PIN.
  • the card issuing bank verifies the legality of the cardholder's identity, ensures the bank card payment security, and protects the cardholder's property security. In order to prevent the PIN from being leaked or cracked, it is required to complete the entire information interaction process from the terminal to the issuing bank.
  • the PIN is protected by security encryption. It is not allowed to appear in the cipher text at any point in the computer network system. Therefore, the POS that currently accepts the PIN is accepted. Terminals are required to have a key management system.
  • the key system of the POS terminal is divided into two levels: a terminal master key (TMK) and a work key (WK). Where TMK is at WK WK is encrypted and protected during the update process.
  • TMK terminal master key
  • WK work key
  • Each POS terminal and the TMS share a unique TMK, which must be secured to ensure that it can only be written to the device and participate in the calculation, and cannot be read;
  • TMK plaintext is generated by TMS, which is directly input to POS by manual mode.
  • the password keyboard of the terminal This method has a large security hole, the operator can easily intercept the TMK plaintext, and there is a possibility of manual input error, and a large number of devices need to input the corresponding TMK one by one.
  • the TMK of each POS is different, and the management cost and workload are quite complicated and huge.
  • IC card ciphertext import scheme IC card ciphertext import.
  • TMK TMK ciphertext import.
  • POS terminal input the IC card password through the POS terminal password keyboard, and then from the IC.
  • the card is imported into the password keyboard.
  • This solution requires the administrator to insert the IC card and set the IC card password one by one when the TMS generates the POS terminal. And when you import the POS terminal, you still need to manually enter it.
  • IC card passwords, IC card password leaks still cause TMK leaks and risks, and a large number of POS adopt this method, and its management cost and workload are also quite large.
  • local key mother POS program the current payment industry key downloads are mostly downloaded locally, downloaded to the financial POS
  • the master key of the terminal needs to be locally enabled for secure downloading. That is, the financial POS terminal needs to be carried to the security room of the management center and the key POS located in the security room. Make a physical connection, and under the administrator's operation, download the master key from the key POS, then deploy the financial POS to the deployment location, and then remotely download the work key through the master key.
  • the device needs to go to the security room of the management center to manually download the key.
  • the maintenance center room has a large workload; after the device leaves the factory, it needs to be calculated to the management center security room download key to deploy to the merchant.
  • the transportation cost rises; in order to concentrate the download of the key, a large amount of manpower and working time are required, and the maintenance cost is large and the maintenance period is long.
  • TMS calls the encryption machine to generate a pair of public and private keys
  • POS The terminal invokes the cryptographic keyboard to randomly generate the master key TMK, and encrypts it with the public key of the TMS and uploads it to the TMS.
  • the TMS calls the encryption machine and decrypts the TMK with the private key and stores it with TMK.
  • the encrypted work key is downloaded to the POS terminal.
  • TMS lacks authentication for the POS terminal and cannot prevent the pseudo terminal from connecting to the TMS to download the work key; the POS terminal is missing the right
  • the authentication of the TMS does not prevent the pseudo TMS background from downloading the pseudo work key.
  • a key downloading method including: the POS terminal generates a random number Rnd1, and the hardware serial number SN and the first random number Rnd1 is sent to the key server; the POS terminal receives the second random number Rnd2 sent by the key server, the first ciphertext C1, and the key server work certificate KSWCRT, the first ciphertext C1 uses the key server work certificate by the key server KSWCRT contains the public key PuKS corresponding private key PrKS encrypts Rnd1; POS terminal uses key server root certificate KSRCRT check key server work certificate KSWCRT legality, if legal, extract the public key PuKS from KSWCRT, use PuKS to decrypt the first ciphertext C1 Obtaining a third random number Rnd1'; the POS terminal determines whether the first random number Rnd1 is consistent with the third random number Rnd1', and if consistent, uses the terminal to authenticate the public key TKP_Pu Encrypting the second random number Rnd2 to generate a third cipher
  • a key management method including: a key server receiving a hardware serial number SN and a first random number sent by at least one POS terminal Rnd1; the key server generates the second random number Rnd2, using the key server work certificate KSWCRT contains the public key PuKS corresponding private key PrKS to Rnd1
  • the first ciphertext C1 is generated by encryption, and the Rnd2, C1, and KSWCRT are sent to the POS terminal;
  • the key server receives the third ciphertext C2' sent by the POS terminal, and the third ciphertext C2' is generated by the POS terminal using the terminal authentication public key TKP_Pu to encrypt the second random number Rnd2;
  • the key server uses the terminal identification public key TKP_Pu corresponding to the hardware serial number SN Encrypting the second random number Rnd2 generates a second ciphertext C2; the key server determines whether the second ciphertext C2 and the third ciphertext C2' are consistent, and if they are consistent
  • a key download management method including: the POS terminal generates a random number Rnd1, and the hardware serial number SN and the first random number Rnd1 is sent to the key server; the key server receives the hardware serial number SN and the first random number Rnd1 sent by at least one POS terminal; the key server generates the second random number Rnd2 , using the key server work certificate KSWCRT contains the public key PuKS corresponding private key PrKS encrypts Rnd1 to generate the first ciphertext C1, Rnd2, C1 and KSWCRT is sent to the POS terminal; the POS terminal receives the second random number Rnd2 sent by the key server, the first ciphertext C1, and the key server work certificate KSWCRT; POS The terminal uses the key server root certificate KSRCRT to verify the validity of the key server work certificate KSWCRT.
  • the public key PuKS is extracted from KSWCRT, using PuKS Decrypting the first ciphertext C1 to obtain a third random number Rnd1'; the POS terminal determines whether the first random number Rnd1 is consistent with the third random number Rnd1', and if consistent, using the terminal to authenticate the public key TKP_Pu encrypts the second random number Rnd2 to generate a third ciphertext C2', and sends C2' to the key server; the key server receives the third ciphertext C2' sent by the POS terminal.
  • the key server uses the hardware serial number SN corresponding terminal authentication public key TKP_Pu encrypts the second random number Rnd2 generates the second ciphertext C2; the key server determines the second ciphertext C2 and the third ciphertext Whether C2' is consistent. If it is consistent, use the terminal number of the hardware serial number SN to identify the public key TKP_Pu. Encrypt the terminal master key.
  • TMK generates the key ciphertext Ctmk, and the key ciphertext Ctmk Send to the POS terminal; the POS terminal receives the key ciphertext Ctmk sent by the key server; the POS terminal uses the terminal to authenticate the private key TKP_Pr decrypts the key ciphertext Ctmk Obtain the terminal master key TMK and store the TMK in the security control module.
  • a key downloading apparatus comprising: a first sending unit, configured to generate a random number Rnd1 and to have a hardware serial number SN and a first random number Rnd1 is sent to the key server; the first receiving unit is configured to receive the second random number Rnd2 sent by the key server, the first ciphertext C1, and the key server work certificate KSWCRT, the first ciphertext C1 uses the key server work certificate by the key server KSWCRT contains the public key PuKS corresponding private key PrKS to Rnd1 Encryption generation; server verification unit for using the key server root certificate KSRCRT verification key server work certificate KSWCRT The first decryption unit is configured to extract the public key PuKS from the KSWCRT when the verification result of the server verification unit is legal, and decrypt the first ciphertext C1 using PuKS to obtain the third random number.
  • a first determining unit for determining the first random number Rnd1 and the third random number Rnd1' Whether the first encryption unit is configured to: when the first determination unit determines that the result is consistent, use the terminal authentication public key TKP_Pu to encrypt the second random number Rnd2 to generate a third ciphertext C2', and C2' Sending to the key server; the second receiving unit is configured to receive the key ciphertext Ctmk sent by the key server, and the key ciphertext Ctmk is used by the key server to identify the public key by using the terminal corresponding to the hardware serial number SN TKP_Pu encrypted terminal master key TMK generation; second decryption unit for identifying the private key using the terminal TKP_Pr decryption key ciphertext Ctmk to obtain the terminal master key TMK , TMK Stored in the security control module.
  • a key management apparatus including: a third receiving unit, configured to receive a hardware serial number SN sent by at least one POS terminal And a first random number Rnd1; a second encryption unit for generating a second random number Rnd2, using a key server work certificate KSWCRT includes a public key PuKS corresponding private key PrKS pair Rnd1 encrypts the first ciphertext C1, sends Rnd2, C1 and KSWCRT to the POS terminal, and the fourth receiving unit receives the third ciphertext sent by the POS terminal.
  • the third ciphertext C2' is generated by the POS terminal using the terminal authentication public key TKP_Pu to encrypt the second random number Rnd2; and the third encryption unit is used to use the hardware serial number SN
  • the corresponding terminal authentication public key TKP_Pu encrypts the second random number Rnd2 to generate the second ciphertext C2;
  • the second determining unit is used to determine the second ciphertext C2 and the third ciphertext C2' Whether it is consistent;
  • the fourth encryption unit is configured to: when the second determination unit determines that the result is consistent, use the terminal authentication public key TKP_Pu corresponding to the hardware serial number SN to encrypt the terminal master key TMK to generate the key ciphertext Ctmk sends the key ciphertext Ctmk to the POS terminal.
  • the key server includes a key management device, the key management device as described above;
  • the POS terminal includes a key download device, and the key download device is as described above.
  • Key downloading method, management method, download management method, device and system of the present invention realizing POS
  • the terminal downloads the master key remotely from the key server, implements the two-way legal identity authentication by using the asymmetric key management technology, and ensures the legality of the identity of the two parties.
  • the remote key is downloaded to prevent the terminal from downloading the master key. To merchants, reduce logistics costs and maintenance costs.
  • FIG. 1 is a structural block diagram of a key download management system according to an embodiment of the present invention.
  • FIG. 2 is a block diagram showing the structure of a key downloading apparatus according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a method for downloading a key in an embodiment of the present invention.
  • FIG. 5 is a flowchart of a key management method according to an embodiment of the present invention.
  • FIG. 6 is a flowchart of a key download management method according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of signaling transmission of a key download management method according to an embodiment of the present invention.
  • POS terminal 1 key downloading device 10; key server 3; key management device 30;
  • the first transmitting unit 11 The first transmitting unit 11 ; the first receiving unit 12 ; the server checking unit 13 ;
  • a first decryption unit 14 a first determination unit 15; a first encryption unit 16; a second reception unit 17;
  • a second decryption unit 18 a third receiving unit 31; a second encryption unit 32; a fourth receiving unit 33;
  • a third encryption unit 34 a third encryption unit 34; a second determination unit 35; a fourth encryption unit 36.
  • asymmetric key asymmetric encryption algorithm requires two keys: public key (public Key ) and private key ( private key ). The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used for decryption; if the data is encrypted with the private key, only the corresponding public key can be used. Decrypt. Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm.
  • the basic process of asymmetric information exchange for asymmetric encryption is: Party A generates a pair of keys and exposes one of them as a public key to other parties; Party B, which obtains the public key, uses the key to perform confidential information.
  • Party A After encryption, it will be sent to Party A; Party A will decrypt the encrypted information with another private key saved by Party A.
  • Party A may use Party B's public key to encrypt the confidential information and then send it to Party B; Party B then uses its own private key to decrypt the encrypted information.
  • the main algorithm has RSA, Elgamal, Backpack Algorithm, Rabin, D-H, ECC (Elliptic Curve Encryption Algorithm).
  • FIG. 1 is a structural block diagram of a key download management system including a key server 3 according to an embodiment of the present invention.
  • the POS terminal 1 is a POS terminal
  • the key server 3 is a remote key server, which is located in the management center room and is responsible for the POS.
  • the generation and maintenance of a key such as a terminal master key and a work key
  • the key server 3 includes a key database, that is, a master key database or a work key database of the POS terminal, where the TMK that needs to be downloaded remotely is represented here.
  • a key database that is typically generated and stored by a dedicated encryption machine.
  • a key downloading device 10 includes a first sending unit 11.
  • the first transmitting unit 11 is configured to generate a random number Rnd1 and the hardware serial number SN and the first random number Rnd1 Sending to the key server;
  • the first receiving unit 12 is configured to receive the second random number Rnd2, the first ciphertext C1, and the key server work certificate KSWCRT sent by the key server, the first ciphertext C1 uses the key server work certificate by the key server KSWCRT contains the public key PuKS corresponding private key PrKS encrypts Rnd1;
  • server check unit 13 Used to use the key server root certificate KSRCRT to verify the validity of the key server work certificate KSWCRT;
  • the first decryption unit 14 is used when the check result of the server check unit is legal, KSWCRT extracts the public key PuKS, uses PuKS to decrypt the first ciphertext C1 to obtain a third random number Rnd1';
  • the first determining unit 15 is used to determine the first random number Rnd1 Whether it is consistent with the third random number Rnd1';
  • the terminal authentication key pair TPK is a pair of asymmetric key pairs.
  • TPK_Pu and TPK_Pr the key pair can be randomly generated by the POS terminal 1 or generated by the external key generator in a secure environment and then imported into the POS terminal 1 .
  • TPK_Pu is exported from the POS terminal 1 or exported from a special key generator after the POS terminal 1 is shipped, and is stored in the key server in one-to-one correspondence with the SN with the SN as an index.
  • TPK_Pr is stored in the secure medium by the POS terminal 1.
  • the POS terminal 1 has an anti-attack mechanism to ensure that the TPK_Pr is destroyed immediately after the attack. .
  • the TPK_Pu and TPK_Pr are RSA, Elgamal, backpack algorithm, Rabin, D-H, ECC An asymmetric key (elliptic curve encryption algorithm).
  • the second decryption unit 18 is configured to use the terminal to authenticate the private key TKP_Pr to decrypt the key ciphertext Ctmk to obtain the terminal master key TMK , which will be TMK Stored in the security control module.
  • FIG. 3 is a structural block diagram of a key management apparatus according to an embodiment of the present invention.
  • a key management device 30 The third receiving unit 31, the second encrypting unit 32, the fourth receiving unit 33, the third encrypting unit 34, the second determining unit 35, and the fourth encrypting unit 36 are included.
  • the third receiving unit 31 is configured to receive the hardware serial number SN and the first random number Rnd1 sent by the at least one POS terminal.
  • the second encryption unit 32 is configured to generate the second random number Rnd2, using the key server work certificate KSWCRT contains the public key PuKS corresponding private key PrKS to Rnd1
  • the first ciphertext C1 is generated by encryption, and the Rnd2, C1, and KSWCRT are sent to the POS terminal.
  • the fourth receiving unit 33 is configured to receive the third ciphertext C2' sent by the POS terminal.
  • the third ciphertext C2' is generated by the POS terminal using the terminal authentication public key TKP_Pu to encrypt the second random number Rnd2; the third encryption unit 34 is configured to use the hardware serial number SN The corresponding terminal authentication public key TKP_Pu encrypts the second random number Rnd2 to generate the second ciphertext C2; the second determining unit 35 is used to determine the second ciphertext C2 and the third ciphertext C2' Whether it is consistent; the fourth encryption unit 36 is configured to use the terminal authentication public key TKP_Pu corresponding to the hardware serial number SN to encrypt the terminal master key TMK when the second determination unit 35 determines that the result is consistent Generate a key ciphertext Ctmk and send the key ciphertext Ctmk to the POS terminal.
  • Step S101 The POS terminal generates a random number Rnd1, and the hardware serial number SN and the first random number Rnd1 Sent to the key server;
  • Step S102 The POS terminal receives the second random number Rnd2 and the first ciphertext C1 sent by the key server. And the key server work certificate KSWCRT, the first ciphertext C1 is used by the key server to use the key server work certificate KSWCRT contains the public key PuKS corresponding private key PrKS pair Rnd1 encryption generation;
  • Step S103 The POS terminal uses the key server root certificate KSRCRT to verify the key server work certificate KSWCRT Legitimacy, if legal, extract the public key PuKS from KSWCRT, use PuKS to decrypt the first ciphertext C1 to obtain the third random number Rnd1 ';
  • Step S104 The POS terminal determines the first random number Rnd1 and the third random number Rnd1 'Is it consistent? If it is consistent, use the terminal authentication public key TKP_Pu to encrypt the second random number Rnd2 to generate the third ciphertext C2 ', and send C2 ' to the key server;
  • Step S105 The POS terminal receives the key ciphertext Ctmk sent by the key server, and the key ciphertext Ctmk
  • the terminal authentication public key TKP_Pu encrypted terminal master key TMK is generated by the key server using the hardware serial number SN;
  • Step S106 The POS terminal uses the terminal to authenticate the private key TKP_Pr to decrypt the key ciphertext Ctmk to obtain the terminal master key.
  • TMK stores the TMK in the security control module.
  • FIG. 5 is a flowchart of a key management method according to an embodiment of the present invention.
  • the key management method runs on the key server 3
  • the method includes:
  • Step S201 The key server receives the hardware serial number SN and the first random number Rnd1 sent by the at least one POS terminal. ;
  • Step S202 The key server generates a second random number Rnd2, and uses a public key included in the key server work certificate KSWCRT.
  • PrKS corresponding private key PrKS encrypts Rnd1 to generate first ciphertext C1, and sends Rnd2, C1 and KSWCRT to the POS terminal;
  • Step S203 The key server receives the third ciphertext C2 ' sent by the POS terminal, and the third ciphertext C2 'by the POS
  • the terminal uses the terminal authentication public key TKP_Pu to encrypt and generate the second random number Rnd2;
  • Step S204 The key server uses the terminal number of the hardware serial number SN to authenticate the public key TKP_Pu to encrypt the second random number.
  • Rnd2 generates a second ciphertext C2;
  • Step S205 The key server determines whether the second ciphertext C2 and the third ciphertext C2' are consistent. If they are consistent, the hardware serial number is used.
  • the terminal authentication public key corresponding to the SN TKP_Pu encrypts the terminal master key TMK generates a key ciphertext Ctmk , and sends the key ciphertext Ctmk to the POS terminal.
  • FIG. 6 is a flowchart of a key download management method according to an embodiment of the present invention
  • FIG. 7 It is a schematic diagram of signaling transmission of a key download management method in an embodiment of the present invention.
  • the key download management method runs in the key download management system, and the method includes:
  • Step S301 The POS terminal generates a random number Rnd1, and the hardware serial number SN and the first random number Rnd1 Sent to the key server;
  • Step S302 The key server receives the hardware serial number SN and the first random number Rnd1 sent by at least one POS terminal. ;
  • Step S303 The key server generates a second random number Rnd2, and uses a public key included in the key server work certificate KSWCRT.
  • Step S304 The POS terminal receives the second random number Rnd2 and the first ciphertext C1 sent by the key server. And the key server work certificate KSWCRT ;
  • Step S307 The key server receives the third ciphertext C2 ' sent by the POS terminal;
  • Step S308 The key server uses the terminal identification public key TKP_Pu corresponding to the hardware serial number SN to encrypt the second random number.
  • Step S309 The key server determines whether the second ciphertext C2 and the third ciphertext C2' are consistent. If they are consistent, the hardware serial number is used.
  • Step S310 The POS terminal receives the key ciphertext Ctmk sent by the key server;
  • Step S311 The POS terminal uses the terminal to authenticate the private key TKP_Pr to decrypt the key ciphertext Ctmk to obtain the terminal master key.
  • the key downloading method, the management method, the download management method, the device and the system of the invention realize the two-way legal identity authentication by using the asymmetric key management technology, and ensure the legality of the identity of the communication parties; remotely download the master key to avoid the terminal needs to be concentrated After downloading the master key, it can be deployed to the merchant to reduce logistics costs and maintenance costs.
  • the key server uses an asymmetric algorithm to encrypt the key to be transmitted, ensuring only the corresponding
  • the POS terminal can decrypt the encrypted key to ensure the high integrity of the data transmission; the terminal identity authentication private key TKP_Pr is stored in the hardware encryption module and is not exported, and the terminal does not provide any secondary development environment.
  • TKP_Pr encryption and decryption operation function only provides a function to remotely download the key, thus ensuring the security of the private key; the plaintext key downloaded to the terminal remotely is used at the key server KS end to use the public key of the terminal TKP_Pu Encrypted ciphertext data; the terminal's public key TKP_Pu is not transmitted in the public communication network, except for the export of the terminal TKP_Pu In addition to the function, no operation function for exporting TKP_Pu is provided in the secondary development environment of the terminal, only TKP_Pu is provided. The encrypted function ensures the security of the public key. In the case of mutual authentication, the application of the terminal does not have access to the plaintext key that needs to be remotely downloaded to the terminal, and only the ciphertext form of the key can be accessed. , thus ensuring a safe reprint.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开一种密钥下载方法,包括:将硬件序列号SN和第一随机数Rnd1发送给密钥服务器;接收密钥服务器发送的第二随机数Rnd2、第一密文C1以及密钥服务器工作证书KSWCRT;使用密钥服务器根证书KSRCRT校验密钥服务器工作证书KSWCRT的合法性,如果合法,从KSWCRT提取公钥PuKS,使用PuKS解密第一密文C1获得第三随机数Rnd1';判断第一随机数Rnd1与第三随机数Rnd1'是否一致,如果一致,使用终端鉴别公钥TKP_Pu对第二随机数Rnd2加密生成第三密文C2',将C2'发送给密钥服务器;接收密钥服务器发送的密钥密文Ctmk;使用终端鉴别私钥TKP_Pr解密密钥密文Ctmk获得终端主密钥TMK,将TMK存储在安全控制模块中。

Description

密钥下载方法、管理方法、下载管理方法及装置和***
技术领域
本发明涉及电子支付领域,尤其涉及一种 POS 终端的密钥下载方法、管理方法、下载管理方法及装置和***。
背景技术
银行卡 ( BANK Card ) 作为支付工具越来越普及 , 通常的银行卡支付***包括销售点终端 ( Point Of Sale , POS )、 终端管理*** ( Terminal ManageSystem , TMS ) 、密码键盘 ( PIN PAD ) 和硬件加密机 ( Hardware and Security Module , HSM ) 。其中 POS 终端能够接受银行卡信息,具有通讯功能,并接受柜员的指令完成金融交易信息和有关信息交换的设备; TMS ***对 POS 终端进行集中管理,包括参数下载,密钥下载,接受、处理或转发 POS 终端的交易请求,并向 POS 终端回送交易结果信息,是集中管理和交易处理的***;密码键盘( PIN PAD )是对各种金融交易相关的密钥进行安全存储保护,以及对 PIN 进行加密保护的安全设备;硬件加密机( HSM )是对传输数据进行加密的***硬件设备,用于 PIN 的加密和解密、验证报文和文件来源的正确性以及存储密钥。个人标识码( Personal Identification Number , PIN ),即个人密码,是在联机交易中识别持卡人身份合法性的数据信息,在计算机和网络***中任何环节都不允许以明文的方式出现;终端主密钥( Terminal Master Key , TMK ), POS 终端工作时,对工作密钥进行加密的主密钥,保存在***硬件中,只能使用,不能读取; POS 终端广泛应用于银行卡支付场合,比如厂商购物、酒店住宿等,是一种不可或缺的现代化支付手段,已经融入人们生活的各种场合。银行卡,特别是借记卡,一般都由持卡人设置了 PIN ,在进行支付过程中, POS 终端除了上送银行卡的磁道信息等资料外,还要持卡人输入 PIN 供发卡银行验证持卡人的身份合法性,确保银行卡支付安全,保护持卡人的财产安全。为了防止 PIN 泄露或被破解,要求从终端到发卡银行整个信息交互过程中,全称对 PIN 进行安全加密保护,不允许在计算机网络***的任何环节, PIN 以密文的方式出现,因此目前接受输入 PIN 的 POS 终端都要求配备密钥管理体系。
POS 终端的密钥体系分成二级:终端主密钥( TMK )和工作密钥( WK )。其中 TMK 在 WK 更新过程中,对 WK 进行加密保护。每台 POS 终端与 TMS 之间共享唯一的 TMK ,必须要有安全保护,保证只能写入设备并参与计算,不能读取; TMK 是一个很关键的根密钥,如果 TMK 被截取,工作密钥就比较容易都会被破解,将严重威胁银行卡支付安全。所以能否安全下载 TMK 到 POS 终端,成为整个 POS 终端安全性的关键。下面归纳现有的 TMK 下载方案如下:
1 、 明文手工输入方案:由 TMS 生成 TMK 明文,由手工方式直接输入到 POS 终端的密码键盘。这种方式存在很大的安全漏洞,操作人员容易截取 TMK 明文,而且存在手工输入错误的可能性,而且大量的设备需要逐一输入对应的 TMK ,通常为了提高安全性,每台 POS 的 TMK 都不一样,,管理成本和工作量都相当复杂和巨大。
2 、 IC 卡密文导入方案: IC 卡密文导入。 TMK 由 TMS 生成后,存在 IC 卡中,并由 IC 卡持有人设置 IC 卡密码保护 IC 卡中的 TMK ,导入 POS 终端时,通过 POS 终端密码键盘输入 IC 卡密码后,从 IC 卡导入到密码键盘中。该方案需要在 TMS 生成 POS 终端时由管理人员一一*** IC 卡并设置 IC 卡片密码。并在 POS 终端导入时,依然需要手工输入 IC 卡密码, IC 卡片密码泄露依然会导致 TMK 泄露也存在风险,而且大量的 POS 采用此方式,其管理成本及工作量也相当巨大。
3 、 本地密钥母 POS 方案:当前支付行业的密钥下载多采用本地下载的方式,下载到金融 POS 终端的主密钥需要本地才能进行安全的下载,即金融 POS 终端需要携带到管理中心的安全机房,和位于安全机房的密钥母 POS 进行物理连接,并在管理员的操作下,从密钥母 POS 下载主密钥,然后将金融 POS 布放到部署地点,再通过主密钥进行远程下载工作密钥。
上述三种方案都有以下缺点:设备需要到管理中心的安全机房,通过人工集中下载密钥。维护中心机房,工作量大;设备出厂后需要运算到管理中心安全机房下载密钥才能部署到商户。运输成本上升;为了集中下装密钥,需要大量的人手和工作时间,维护成本大、维护周期长。
目前也有一种远程密钥下载方案:该方案 TMS 调用加密机产生一对公私钥, POS 终端调用密码键盘随机生成主密钥 TMK ,并用 TMS 的公钥进行加密后上传给 TMS , TMS 调用加密机并用私钥解密 TMK 后存储,用 TMK 加密工作密钥下载给 POS 终端。该方案有以下缺点: TMS 对 POS 终端缺少身份鉴别,无法防止伪终端连接 TMS 下载工作密钥; POS 终端缺少对 TMS 的身份鉴别,无法防止伪 TMS 后台下载伪工作密钥。
发明内容
为解决上述技术问题,本发明采用的一个技术方案是:
提供一种密钥下载方法,包括: POS 终端产生随机数 Rnd1 ,将硬件序列号 SN 和第一随机数 Rnd1 发送给密钥服务器; POS 终端接收密钥服务器发送的第二随机数 Rnd2 、第一密文 C1 以及密钥服务器工作证书 KSWCRT ,所述第一密文 C1 由密钥服务器使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成; POS 终端使用密钥服务器根证书 KSRCRT 校验密钥服务器工作证书 KSWCRT 的合法性,如果合法,从 KSWCRT 提取公钥 PuKS ,使用 PuKS 解密第一密文 C1 获得第三随机数 Rnd1' ; POS 终端判断第一随机数 Rnd1 与第三随机数 Rnd1' 是否一致,如果一致,使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成第三密文 C2' ,将 C2' 发送给密钥服务器; POS 终端接收密钥服务器发送的密钥密文 Ctmk ,所述密钥密文 Ctmk 由密钥服务器使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成; POS 终端使用终端鉴别私钥 TKP_Pr 解密密钥密文 Ctmk 获得终端主密钥 TMK ,将 TMK 存储在安全控制模块中。
本发明采用的另一个技术方案是:
提供一种密钥管理方法,包括:密钥服务器接收至少一个 POS 终端发送的硬件序列号 SN 和第一随机数 Rnd1 ;密钥服务器生成第二随机数 Rnd2 ,使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成第一密文 C1 ,将 Rnd2 、 C1 以及 KSWCRT 发送至 POS 终端;密钥服务器接收 POS 终端发送的第三密文 C2' ,所述第三密文 C2' 由 POS 终端使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成;密钥服务器使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密第二随机数 Rnd2 生成第二密文 C2 ;密钥服务器判断第二密文 C2 和第三密文 C2' 是否一致,如果一致,使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成密钥密文 Ctmk ,将密钥密文 Ctmk 发送至 POS 终端。
本发明采用的另一个技术方案是:
提供一种密钥下载管理方法,包括: POS 终端产生随机数 Rnd1 ,将硬件序列号 SN 和第一随机数 Rnd1 发送给密钥服务器;密钥服务器接收至少一个 POS 终端发送的硬件序列号 SN 和第一随机数 Rnd1 ;密钥服务器生成第二随机数 Rnd2 ,使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成第一密文 C1 ,将 Rnd2 、 C1 以及 KSWCRT 发送至 POS 终端; POS 终端接收密钥服务器发送的第二随机数 Rnd2 、第一密文 C1 以及密钥服务器工作证书 KSWCRT ; POS 终端使用密钥服务器根证书 KSRCRT 校验密钥服务器工作证书 KSWCRT 的合法性,如果合法,从 KSWCRT 提取公钥 PuKS ,使用 PuKS 解密第一密文 C1 获得第三随机数 Rnd1' ; POS 终端判断第一随机数 Rnd1 与第三随机数 Rnd1' 是否一致,如果一致,使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成第三密文 C2' ,将 C2' 发送给密钥服务器;密钥服务器接收 POS 终端发送的第三密文 C2' ;密钥服务器使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密第二随机数 Rnd2 生成第二密文 C2 ;密钥服务器判断第二密文 C2 和第三密文 C2' 是否一致,如果一致,使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成密钥密文 Ctmk ,将密钥密文 Ctmk 发送至 POS 终端; POS 终端接收密钥服务器发送的密钥密文 Ctmk ; POS 终端使用终端鉴别私钥 TKP_Pr 解密密钥密文 Ctmk 获得终端主密钥 TMK ,将 TMK 存储在安全控制模块中。
本发明采用的另一个技术方案是:
提供一种密钥下载装置,包括:第一发送单元,用于产生随机数 Rnd1 并将硬件序列号 SN 和第一随机数 Rnd1 发送给密钥服务器;第一接收单元,用于接收密钥服务器发送的第二随机数 Rnd2 、第一密文 C1 以及密钥服务器工作证书 KSWCRT ,所述第一密文 C1 由密钥服务器使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成;服务器校验单元,用于使用密钥服务器根证书 KSRCRT 校验密钥服务器工作证书 KSWCRT 的合法性;第一解密单元,用于当所述服务器校验单元校验结果合法时,从 KSWCRT 提取公钥 PuKS ,使用 PuKS 解密第一密文 C1 获得第三随机数 Rnd1' ;第一判定单元,用于判断第一随机数 Rnd1 与第三随机数 Rnd1' 是否一致;第一加密单元,用于当所述第一判定单元判定结果一致时,使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成第三密文 C2' ,将 C2' 发送给密钥服务器;第二接收单元,用于接收密钥服务器发送的密钥密文 Ctmk ,所述密钥密文 Ctmk 由密钥服务器使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成;第二解密单元,用于使用终端鉴别私钥 TKP_Pr 解密密钥密文 Ctmk 获得终端主密钥 TMK ,将 TMK 存储在安全控制模块中。
本发明采用的另一个技术方案是:
提供一种密钥管理装置,包括:第三接收单元,用于接收至少一个 POS 终端发送的硬件序列号 SN 和第一随机数 Rnd1 ;第二加密单元,用于生成第二随机数 Rnd2 ,使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成第一密文 C1 ,将 Rnd2 、 C1 以及 KSWCRT 发送至 POS 终端;第四接收单元,用于接收 POS 终端发送的第三密文 C2' ,所述第三密文 C2' 由 POS 终端使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成;第三加密单元,用于使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密第二随机数 Rnd2 生成第二密文 C2 ;第二判定单元,用于判断第二密文 C2 和第三密文 C2' 是否一致;第四加密单元,用于当所述第二判定单元判定结果一致时,使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成密钥密文 Ctmk ,将密钥密文 Ctmk 发送至 POS 终端。
本发明采用的另一个技术方案是:
提供一种密钥下载管理***,包括密钥服务器和与所述密钥服务器通信连接的至少一个 POS 终端,所述密钥服务器包括密钥管理装置,所述密钥管理装置如上所述;所述 POS 终端包括密钥下载装置,所述密钥下载装置如上所述。
本发明的密钥下载方法、管理方法、下载管理方法及装置和***,实现 POS 终端从密钥服务器远程下载主密钥,利用非对称密钥管理技术实现双向合法身份认证,确保通讯双方身份的合法性;远程下载主密钥,避免终端需要集中下载主密钥后才能布放到商户,减少物流成本和维护成本。
附图说明
图 1 是本发明一实施方式中一种密钥下载管理***的结构框图;
图 2 是本发明一实施方式中一种密钥下载装置的结构框图;
图 3 是本发明一实施方式中一种密钥管理装置的结构框图;
图 4 是本发明一实施方式中一种密钥下载方法的流程图;
图 5 是本发明一实施方式中一种密钥管理方法的流程图;
图 6 是本发明一实施方式中一种密钥下载管理方法的流程图;
图 7 是本发明一实施方式中一种密钥下载管理方法的信令传输示意图。
主要元件符号说明
POS 终端 1 ;密钥下载装置 10 ;密钥服务器 3 ;密钥管理装置 30 ;
第一发送单元 11 ;第一接收单元 12 ;服务器校验单元 13 ;
第一解密单元 14 ;第一判定单元 15 ;第一加密单元 16 ;第二接收单元 17 ;
第二解密单元 18 ;第三接收单元 31 ;第二加密单元 32 ;第四接收单元 33 ;
第三加密单元 34 ;第二判定单元 35 ;第四加密单元 36 。
具体实施方式
为详细说明本发明的技术内容、构造特征、所实现目的及效果,以下结合实施方式并配合附图详予说明。
首先,对本非对称密钥术语进行定义和说明:非对称密钥:非对称加密算法需要两个密钥:公开密钥( public key )和私有密钥( private key )。公开密钥与私有密钥是一对,如果用公开密钥对数据进行加密,只有用对应的私有密钥才能解密;如果用私有密钥对数据进行加密,那么只有用对应的公开密钥才能解密。因为加密和解密使用的是两个不同的密钥,所以这种算法叫作非对称加密算法。非对称加密算法实现机密信息交换的基本过程是:甲方生成一对密钥并将其中的一把作为公用密钥向其它方公开;得到该公用密钥的乙方使用该密钥对机密信息进行加密后再发送给甲方;甲方再用自己保存的另一把专用密钥对加密后的信息进行解密。甲方可以使用乙方的公钥对机密信息进行加密后再发送给乙方;乙方再用自己的私匙对加密后的信息进行解密。主要算法有 RSA 、 Elgamal 、背包算法、 Rabin 、 D-H 、 ECC (椭圆曲线加密算法)。
请参阅图 1 ,是本发明一实施方式中一种密钥下载管理***的结构框图,该密钥下载管理***包括密钥服务器 3 和与所述密钥服务器 3 通信连接的至少一个 POS 终端 1 ,所述密钥服务器 3 包括密钥管理装置 30 ,所述 POS 终端 1 包括密钥下载装置 10 ,该 POS 终端 1 为 POS 终端,该密钥服务器 3 为远程密钥服务器,位于管理中心机房,负责 POS 终端主密钥、工作密钥等密钥的生成和维护等,该密钥服务器 3 包括密钥数据库,即 POS 终端的主密钥数据库或工作密钥数据库,此处代表需要通过远程下载的 TMK 密钥数据库,该密钥数据库通常由一台专门的加密机进行产生并存储密钥。
请参阅图 2 ,是本发明一实施方式中一种密钥下载装置的结构框图。一种密钥下载装置 10 包括第一发送单元 11 、第一接收单元 12 、服务器校验单元 13 、第一解密单元 14 、第一判定单元 15 、第一加密单元 16 、第二接收单元 17 、第二解密单元 18 。
第一发送单元 11 用于产生随机数 Rnd1 并将硬件序列号 SN 和第一随机数 Rnd1 发送给密钥服务器;第一接收单元 12 用于接收密钥服务器发送的第二随机数 Rnd2 、第一密文 C1 以及密钥服务器工作证书 KSWCRT ,所述第一密文 C1 由密钥服务器使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成;服务器校验单元 13 用于使用密钥服务器根证书 KSRCRT 校验密钥服务器工作证书 KSWCRT 的合法性;第一解密单元 14 用于当所述服务器校验单元校验结果合法时,从 KSWCRT 提取公钥 PuKS ,使用 PuKS 解密第一密文 C1 获得第三随机数 Rnd1' ;第一判定单元 15 用于判断第一随机数 Rnd1 与第三随机数 Rnd1' 是否一致;第一加密单元 16 用于当所述第一判定单元 15 判定结果一致时,使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成第三密文 C2' ,将 C2' 发送给密钥服务器;第二接收单元 17 用于接收密钥服务器发送的密钥密文 Ctmk ,所述密钥密文 Ctmk 由密钥服务器使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成,其中,终端鉴别密钥对 TPK 是一对非对称密钥对,由 TPK_Pu 和 TPK_Pr 组成,该密钥对可以由 POS 终端 1 内部随机生成,或者在安全环境下由外部密钥生成器生成后导入到 POS 终端 1 , TPK_Pu 在 POS 终端 1 出厂后,从 POS 终端 1 内导出或者从专门的密钥生成器中导出,并以 SN 为索引与 SN 一一对应的存储在密钥服务器 3 的终端鉴别公钥数据库中。 TPK_Pr 由 POS 终端 1 保存在安全介质中, POS 终端 1 具有防攻击机制,确保受到攻击后立即销毁 TPK_Pr 。其中,所述 TPK_Pu 和 TPK_Pr 是 RSA 、 Elgamal 、背包算法、 Rabin 、 D-H 、 ECC (椭圆曲线加密算法)等非对称密钥。第二解密单元 18 用于使用终端鉴别私钥 TKP_Pr 解密密钥密文 Ctmk 获得终端主密钥 TMK ,将 TMK 存储在安全控制模块中。
请参阅图 3 ,是是本发明一实施方式中一种密钥管理装置的结构框图。一种密钥管理装置 30 包括第三接收单元 31 、第二加密单元 32 、第四接收单元 33 、第三加密单元 34 、第二判定单元 35 、第四加密单元 36 。
第三接收单元 31 用于接收至少一个 POS 终端发送的硬件序列号 SN 和第一随机数 Rnd1 ;第二加密单元 32 用于生成第二随机数 Rnd2 ,使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成第一密文 C1 ,将 Rnd2 、 C1 以及 KSWCRT 发送至 POS 终端;第四接收单元 33 用于接收 POS 终端发送的第三密文 C2' ,所述第三密文 C2' 由 POS 终端使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成;第三加密单元 34 用于使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密第二随机数 Rnd2 生成第二密文 C2 ;第二判定单元 35 用于判断第二密文 C2 和第三密文 C2' 是否一致;第四加密单元 36 用于当所述第二判定单元 35 判定结果一致时,使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成密钥密文 Ctmk ,将密钥密文 Ctmk 发送至 POS 终端。
请参阅图 4 ,是本发明一实施方式中一种密钥下载方法的流程图。该密钥下载方法运行于所述 POS 终端 1 中,该方法包括:
步骤 S101 、 POS 终端产生随机数 Rnd1 ,将硬件序列号 SN 和第一随机数 Rnd1 发送给密钥服务器;
步骤 S102 、 POS 终端接收密钥服务器发送的第二随机数 Rnd2 、第一密文 C1 以及密钥服务器工作证书 KSWCRT ,所述第一密文 C1 由密钥服务器使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成;
步骤 S103 、 POS 终端使用密钥服务器根证书 KSRCRT 校验密钥服务器工作证书 KSWCRT 的合法性,如果合法,从 KSWCRT 提取公钥 PuKS ,使用 PuKS 解密第一密文 C1 获得第三随机数 Rnd1 ';
步骤 S104 、 POS 终端判断第一随机数 Rnd1 与第三随机数 Rnd1 '是否一致,如果一致,使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成第三密文 C2 ',将 C2 '发送给密钥服务器;
步骤 S105 、 POS 终端接收密钥服务器发送的密钥密文 Ctmk ,所述密钥密文 Ctmk 由密钥服务器使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成;
步骤 S106 、 POS 终端使用终端鉴别私钥 TKP_Pr 解密密钥密文 Ctmk 获得终端主密钥 TMK ,将 TMK 存储在安全控制模块中。
请参阅图 5 ,是本发明一实施方式中一种密钥管理方法的流程图。该密钥管理方法运行于所述密钥服务器 3 中,该方法包括:
步骤 S201 、密钥服务器接收至少一个 POS 终端发送的硬件序列号 SN 和第一随机数 Rnd1 ;
步骤 S202 、密钥服务器生成第二随机数 Rnd2 ,使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成第一密文 C1 ,将 Rnd2 、 C1 以及 KSWCRT 发送至 POS 终端;
步骤 S203 、密钥服务器接收 POS 终端发送的第三密文 C2 ',所述第三密文 C2 '由 POS 终端使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成;
步骤 S204 、密钥服务器使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密第二随机数 Rnd2 生成第二密文 C2 ;
步骤 S205 、密钥服务器判断第二密文 C2 和第三密文 C2 '是否一致,如果一致,使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成密钥密文 Ctmk ,将密钥密文 Ctmk 发送至 POS 终端。
请一并参阅图 6 、图 7 ,图 6 是本发明一实施方式中一种密钥下载管理方法的流程图,图 7 是本发明一实施方式中一种密钥下载管理方法的信令传输示意图。该密钥下载管理方法运行于所述密钥下载管理***中,该方法包括:
步骤 S301 、 POS 终端产生随机数 Rnd1 ,将硬件序列号 SN 和第一随机数 Rnd1 发送给密钥服务器;
步骤 S302 、密钥服务器接收至少一个 POS 终端发送的硬件序列号 SN 和第一随机数 Rnd1 ;
步骤 S303 、密钥服务器生成第二随机数 Rnd2 ,使用密钥服务器工作证书 KSWCRT 包含的公钥 PuKS 对应的私钥 PrKS 对 Rnd1 加密生成第一密文 C1 ,即 C1=E [PrKS, Rnd1 ] ,将 Rnd2 、 C1 以及 KSWCRT 发送至 POS 终端;
步骤 S304 、 POS 终端接收密钥服务器发送的第二随机数 Rnd2 、第一密文 C1 以及密钥服务器工作证书 KSWCRT ;
步骤 S305 、 POS 终端使用密钥服务器根证书 KSRCRT 校验密钥服务器工作证书 KSWCRT 的合法性,如果合法,从 KSWCRT 提取公钥 PuKS ,使用 PuKS 解密第一密文 C1 获得第三随机数 Rnd1 ',即 Rnd1'=D[PuKS, C1] =D[PuKS, E[PrKS, Rnd1]] ;
步骤 S306 、 POS 终端判断第一随机数 Rnd1 与第三随机数 Rnd1 '是否一致,如果一致,使用终端鉴别公钥 TKP_Pu 对第二随机数 Rnd2 加密生成第三密文 C2 ',即 C2'= E[TKP_ Pu , Rnd2] ,将 C2 '发送给密钥服务器;
步骤 S307 、密钥服务器接收 POS 终端发送的第三密文 C2 ';
步骤 S308 、密钥服务器使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密第二随机数 Rnd2 生成第二密文 C2 ,即 C2=E[TKP_Pu ,Rnd2] ;
步骤 S309 、密钥服务器判断第二密文 C2 和第三密文 C2 '是否一致,如果一致,使用硬件序列号 SN 对应的终端鉴别公钥 TKP_Pu 加密终端主密钥 TMK 生成密钥密文 Ctmk ,即 Cmk =E[TKP_Pu, TMK] ,将密钥密文 Ctmk 发送至 POS 终端;
步骤 S310 、 POS 终端接收密钥服务器发送的密钥密文 Ctmk ;
步骤 S311 、 POS 终端使用终端鉴别私钥 TKP_Pr 解密密钥密文 Ctmk 获得终端主密钥 TMK ,即 TMK=D[TKP_Pr,Ctml]= D[TKP_Pr,E[TKP_Pu,TMK]] ,将 TMK 存储在安全控制模块中。
本发明的密钥下载方法、管理方法、下载管理方法及装置和***,利用非对称密钥管理技术实现双向合法身份认证,确保通讯双方身份的合法性;远程下载主密钥,避免终端需要集中下载主密钥后才能布放到商户,减少物流成本和维护成本;远程下载密钥时,密钥服务器使用非对称算法加密需要传输的密钥,保证只有对应 POS 终端才能解密加密后的密钥,保证数据传输的高全性;终端身份鉴别私钥 TKP_Pr 保存在硬件加密模块中,不对外导出,终端的二次开发环境中不提供任何 TKP_Pr 加解密的操作函数,只提供了一个远程下装密钥的函数,从而确保了私钥的安全性;远程下装到终端中的明文密钥在密钥服务器 KS 端用终端的公钥 TKP_Pu 加密后的密文数据;终端的公钥 TKP_Pu 也不在公开通讯网络中传递,除了在终端的生产环节有导出 TKP_Pu 的功能之外,在终端的二次开发环境中也不提供任何导出 TKP_Pu 的操作函数,仅仅提供了 TKP_Pu 加密的函数,从而确保了公钥的安全;在双向认证的时候,终端的应用程序并不能够接触到需要远程下装到终端中的明文密钥,只能接触到该密钥的密文形式,从而确保了安全转载。
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (1)

  1. 1、一种密钥下载方法,其特征在于,包括:
    POS终端产生随机数Rnd1,将硬件序列号SN和第一随机数Rnd1发送给密钥服务器;
    POS终端接收密钥服务器发送的第二随机数Rnd2、第一密文C1以及密钥服务器工作证书KSWCRT,所述第一密文C1由密钥服务器使用密钥服务器工作证书KSWCRT包含的公钥PuKS对应的私钥PrKS对Rnd1加密生成;
    POS终端使用密钥服务器根证书KSRCRT校验密钥服务器工作证书KSWCRT的合法性,如果合法,从KSWCRT提取公钥PuKS,使用PuKS解密第一密文C1获得第三随机数Rnd1’;
    POS终端判断第一随机数Rnd1与第三随机数Rnd1’是否一致,如果一致,使用终端鉴别公钥TKP_Pu对第二随机数Rnd2加密生成第三密文C2’,将C2’发送给密钥服务器;
    POS终端接收密钥服务器发送的密钥密文Ctmk,所述密钥密文Ctmk由密钥服务器使用硬件序列号SN对应的终端鉴别公钥TKP_Pu加密终端主密钥TMK生成;
    POS终端使用终端鉴别私钥TKP_Pr解密密钥密文Ctmk获得终端主密钥TMK,将TMK存储在安全控制模块中。
    2、一种密钥管理方法,其特征在于,包括:
    密钥服务器接收至少一个POS终端发送的硬件序列号SN和第一随机数Rnd1;
    密钥服务器生成第二随机数Rnd2,使用密钥服务器工作证书KSWCRT包含的公钥PuKS对应的私钥PrKS对Rnd1加密生成第一密文C1,将Rnd2、C1以及KSWCRT发送至POS终端;
    密钥服务器接收POS终端发送的第三密文C2’,所述第三密文C2’由POS终端使用终端鉴别公钥TKP_Pu对第二随机数Rnd2加密生成;
    密钥服务器使用硬件序列号SN对应的终端鉴别公钥TKP_Pu加密第二随机数Rnd2生成第二密文C2;
    密钥服务器判断第二密文C2和第三密文C2’是否一致,如果一致,使用硬件序列号SN对应的终端鉴别公钥TKP_Pu加密终端主密钥TMK生成密钥密文Ctmk,将密钥密文Ctmk发送至POS终端。
    3、一种主密钥下载管理方法,其特征在于,包括:
    POS终端产生随机数Rnd1,将硬件序列号SN和第一随机数Rnd1发送给密钥服务器;
    密钥服务器接收至少一个POS终端发送的硬件序列号SN和第一随机数Rnd1;
    密钥服务器生成第二随机数Rnd2,使用密钥服务器工作证书KSWCRT包含的公钥PuKS对应的私钥PrKS对Rnd1加密生成第一密文C1,将Rnd2、C1以及KSWCRT发送至POS终端;
    POS终端接收密钥服务器发送的第二随机数Rnd2、第一密文C1以及密钥服务器工作证书KSWCRT;
    POS终端使用密钥服务器根证书KSRCRT校验密钥服务器工作证书KSWCRT的合法性,如果合法,从KSWCRT提取公钥PuKS,使用PuKS解密第一密文C1获得第三随机数Rnd1’;
    POS终端判断第一随机数Rnd1与第三随机数Rnd1’是否一致,如果一致,使用终端鉴别公钥TKP_Pu对第二随机数Rnd2加密生成第三密文C2’,将C2’发送给密钥服务器;
    密钥服务器接收POS终端发送的第三密文C2’;
    密钥服务器使用硬件序列号SN对应的终端鉴别公钥TKP_Pu加密第二随机数Rnd2生成第二密文C2;
    密钥服务器判断第二密文C2和第三密文C2’是否一致,如果一致,使用硬件序列号SN对应的终端鉴别公钥TKP_Pu加密终端主密钥TMK生成密钥密文Ctmk,将密钥密文Ctmk发送至POS终端;
    POS终端接收密钥服务器发送的密钥密文Ctmk;
    POS终端使用终端鉴别私钥TKP_Pr解密密钥密文Ctmk获得终端主密钥TMK,将TMK存储在安全控制模块中。
    4、一种密钥下载装置,其特征在于,包括:
    第一发送单元,用于产生随机数Rnd1并将硬件序列号SN和第一随机数Rnd1发送给密钥服务器;
    第一接收单元,用于接收密钥服务器发送的第二随机数Rnd2、第一密文C1以及密钥服务器工作证书KSWCRT,所述第一密文C1由密钥服务器使用密钥服务器工作证书KSWCRT包含的公钥PuKS对应的私钥PrKS对Rnd1加密生成;
    服务器校验单元,用于使用密钥服务器根证书KSRCRT校验密钥服务器工作证书KSWCRT的合法性;
    第一解密单元,用于当所述服务器校验单元校验结果合法时,从KSWCRT提取公钥PuKS,使用PuKS解密第一密文C1获得第三随机数Rnd1’;
    第一判定单元,用于判断第一随机数Rnd1与第三随机数Rnd1’是否一致;
    第一加密单元,用于当所述第一判定单元判定结果一致时,使用终端鉴别公钥TKP_Pu对第二随机数Rnd2加密生成第三密文C2’,将C2’发送给密钥服务器;
    第二接收单元,用于接收密钥服务器发送的密钥密文Ctmk,所述密钥密文Ctmk由密钥服务器使用硬件序列号SN对应的终端鉴别公钥TKP_Pu加密终端主密钥TMK生成;
    第二解密单元,用于使用终端鉴别私钥TKP_Pr解密密钥密文Ctmk获得终端主密钥TMK,将TMK存储在安全控制模块中。
    5、一种密钥管理装置,其特征在于,包括:
    第三接收单元,用于接收至少一个POS终端发送的硬件序列号SN和第一随机数Rnd1;
    第二加密单元,用于生成第二随机数Rnd2,使用密钥服务器工作证书KSWCRT包含的公钥PuKS对应的私钥PrKS对Rnd1加密生成第一密文C1,将Rnd2、C1以及KSWCRT发送至POS终端;
    第四接收单元,用于接收POS终端发送的第三密文C2’,所述第三密文C2’由POS终端使用终端鉴别公钥TKP_Pu对第二随机数Rnd2加密生成;
    第三加密单元,用于使用硬件序列号SN对应的终端鉴别公钥TKP_Pu加密第二随机数Rnd2生成第二密文C2;
    第二判定单元,用于判断第二密文C2和第三密文C2’是否一致;
    第四加密单元,用于当所述第二判定单元判定结果一致时,使用硬件序列号SN对应的终端鉴别公钥TKP_Pu加密终端主密钥TMK生成密钥密文Ctmk,将密钥密文Ctmk发送至POS终端。
    6、一种密钥下载管理***,包括密钥服务器和与所述密钥服务器通信连接的至少一个POS终端,其特征在于,所述密钥服务器包括密钥管理装置,所述密钥管理装置如权利4所述;所述POS终端包括密钥下载装置,所述密钥下载装置如权利要求5所述。
PCT/CN2014/071259 2013-03-15 2014-01-23 密钥下载方法、管理方法、下载管理方法及装置和*** WO2014139343A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/777,474 US9948624B2 (en) 2013-03-15 2014-01-23 Key downloading method, management method, downloading management method, device and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310084397.2 2013-03-15
CN2013100843972A CN103237004A (zh) 2013-03-15 2013-03-15 密钥下载方法、管理方法、下载管理方法及装置和***

Publications (1)

Publication Number Publication Date
WO2014139343A1 true WO2014139343A1 (zh) 2014-09-18

Family

ID=48885021

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/071259 WO2014139343A1 (zh) 2013-03-15 2014-01-23 密钥下载方法、管理方法、下载管理方法及装置和***

Country Status (3)

Country Link
US (1) US9948624B2 (zh)
CN (2) CN103237004A (zh)
WO (1) WO2014139343A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107682147A (zh) * 2017-10-10 2018-02-09 捷德(中国)信息科技有限公司 用于智能卡芯片操作***文件的安全管理方法及***

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237004A (zh) 2013-03-15 2013-08-07 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和***
CN103716153B (zh) * 2013-03-15 2017-08-01 福建联迪商用设备有限公司 终端主密钥tmk安全下载方法及***
CN104243484B (zh) * 2014-09-25 2016-04-13 小米科技有限责任公司 信息交互方法及装置、电子设备
CN104506554B (zh) * 2015-01-04 2017-11-24 西安电子科技大学 一种手机终端访问云存储服务器的安全方法
EP3282638A1 (en) * 2016-08-11 2018-02-14 Gemalto Sa A method for provisioning a first communication device by using a second communication device
US9838203B1 (en) * 2016-09-28 2017-12-05 International Business Machines Corporation Integrity protected trusted public key token with performance enhancements
CN106656488B (zh) * 2016-12-07 2020-04-03 百富计算机技术(深圳)有限公司 一种pos终端的密钥下载方法和装置
US10438006B2 (en) * 2017-07-27 2019-10-08 Citrix Systems, Inc. Secure information storage
CN107454077B (zh) * 2017-08-01 2020-05-19 北京迪曼森科技有限公司 一种基于iki标识认证的单点登录方法
CN107944250B (zh) * 2017-11-28 2021-04-13 艾体威尔电子技术(北京)有限公司 一种应用于pos机的密钥采集方法
WO2019127145A1 (zh) * 2017-12-27 2019-07-04 福建联迪商用设备有限公司 一种公私钥对获取方法、***和pos终端
CN109067528B (zh) * 2018-08-31 2020-05-12 阿里巴巴集团控股有限公司 密码运算、创建工作密钥的方法、密码服务平台及设备
CN109274500B (zh) * 2018-10-15 2020-06-02 百富计算机技术(深圳)有限公司 一种密钥下载方法、客户端、密码设备及终端设备
CN110120870B (zh) * 2019-04-30 2021-10-08 飞天诚信科技股份有限公司 一种密钥更新方法及装置
CN112532567A (zh) * 2019-09-19 2021-03-19 ***通信集团湖南有限公司 一种交易加密方法和posp***
CN110691098A (zh) * 2019-10-29 2020-01-14 北京龙德时代技术服务有限公司 民爆信息多重加密通讯方法
CN112311528B (zh) * 2020-10-17 2023-06-23 深圳市德卡科技股份有限公司 一种基于国密算法的数据安全传输方法
CN112469039B (zh) * 2020-11-25 2023-04-28 深圳市中易通安全芯科技有限公司 一种基于安全芯片的移动终端安全授权方法
CN112491879A (zh) * 2020-11-26 2021-03-12 中电金融设备***(深圳)有限公司 固件远程更新的方法、计算机设备及存储介质
CN112769574B (zh) * 2020-12-28 2022-02-01 云从科技集团股份有限公司 密钥注入方法和***、密钥管理***、设备及机器可读介质
CN112769546A (zh) * 2021-01-27 2021-05-07 艾体威尔电子技术(北京)有限公司 一种终端设备注入密钥方法及***
CN114143777B (zh) * 2021-12-03 2024-04-23 天翼物联科技有限公司 基于sim卡的物联网终端的证书密钥下载方法及***

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807994A (zh) * 2009-12-18 2010-08-18 北京握奇数据***有限公司 一种ic卡应用数据传输的方法及***
CN101930644A (zh) * 2009-06-25 2010-12-29 ***股份有限公司 一种银行卡支付***中主密钥安全自动下载的方法及其***
CN102768744A (zh) * 2012-05-11 2012-11-07 福建联迪商用设备有限公司 一种远程安全支付方法和***
CN103237004A (zh) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和***

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7188110B1 (en) * 2000-12-11 2007-03-06 Sony Corporation Secure and convenient method and apparatus for storing and transmitting telephony-based data
US7159114B1 (en) * 2001-04-23 2007-01-02 Diebold, Incorporated System and method of securely installing a terminal master key on an automated banking machine
KR100641824B1 (ko) * 2001-04-25 2006-11-06 주식회사 하렉스인포텍 대칭키 보안 알고리즘을 이용한 금융정보 입력방법 및 그이동통신용 상거래 시스템
US8667285B2 (en) * 2007-05-31 2014-03-04 Vasco Data Security, Inc. Remote authentication and transaction signatures
CN101425208B (zh) * 2008-12-05 2010-11-10 浪潮齐鲁软件产业有限公司 一种金融税控收款机密钥安全下载方法
US8374916B2 (en) * 2009-10-27 2013-02-12 At&T Mobility Ii Llc Secure mobile-based financial transactions
KR20110064697A (ko) * 2009-12-08 2011-06-15 삼성전자주식회사 정보 업데이트 방법 및 그 장치
US8788810B2 (en) * 2009-12-29 2014-07-22 Motorola Mobility Llc Temporary registration of devices
CN102013982B (zh) * 2010-12-01 2012-07-25 银联商务有限公司 远程加密方法、管理方法、加密管理方法及装置和***
CN102647274B (zh) * 2012-04-12 2014-10-08 福建联迪商用设备有限公司 Pos终端、终端接入前置、主密钥管理***及其方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101930644A (zh) * 2009-06-25 2010-12-29 ***股份有限公司 一种银行卡支付***中主密钥安全自动下载的方法及其***
CN101807994A (zh) * 2009-12-18 2010-08-18 北京握奇数据***有限公司 一种ic卡应用数据传输的方法及***
CN102768744A (zh) * 2012-05-11 2012-11-07 福建联迪商用设备有限公司 一种远程安全支付方法和***
CN103237004A (zh) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和***

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107682147A (zh) * 2017-10-10 2018-02-09 捷德(中国)信息科技有限公司 用于智能卡芯片操作***文件的安全管理方法及***
CN107682147B (zh) * 2017-10-10 2020-08-11 捷德(中国)科技有限公司 用于智能卡芯片操作***文件的安全管理方法及***

Also Published As

Publication number Publication date
CN103729946A (zh) 2014-04-16
US9948624B2 (en) 2018-04-17
CN103237004A (zh) 2013-08-07
US20160036793A1 (en) 2016-02-04
CN103729946B (zh) 2015-11-11

Similar Documents

Publication Publication Date Title
WO2014139343A1 (zh) 密钥下载方法、管理方法、下载管理方法及装置和***
WO2014139341A1 (zh) 密钥管理方法及***
WO2014175538A1 (ko) Puf 기반 하드웨어 otp 제공 장치 및 이를 이용한 2-factor 인증 방법
WO2014139411A1 (zh) 终端主密钥tmk安全下载方法及***
CN106656488B (zh) 一种pos终端的密钥下载方法和装置
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
CN108513704B (zh) 终端主密钥的远程分发方法及其***
CN108377190B (zh) 一种认证设备及其工作方法
CN107896147B (zh) 一种基于国密算法协商临时会话密钥的方法及其***
CN108323230B (zh) 一种传输密钥的方法、接收终端和分发终端
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
WO2015037887A1 (ko) 스마트 칩 인증 서버 및 그 방법
CN107104795B (zh) Rsa密钥对和证书的注入方法、架构及***
CN102624711B (zh) 一种敏感信息传输方法及***
CN109905384B (zh) 数据迁移方法及***
WO2016206530A1 (zh) 一种高级安全的移动支付方法、装置及***
US20100031045A1 (en) Methods and system and computer medium for loading a set of keys
CN102624710B (zh) 一种敏感信息传输方法及***
CN111435390A (zh) 一种配电终端运维工具安全防护方法
CN108551391B (zh) 一种基于USB-key的认证方法
CN108323231B (zh) 一种传输密钥的方法、接收终端和分发终端
JP4198509B2 (ja) 相互認証方法
JP3863382B2 (ja) Icカードの更新方法及びシステム
KR101947408B1 (ko) PUF 기반 하드웨어 OTP 제공 장치 및 이를 이용한 2-Factor 인증 방법
JP3436476B2 (ja) 認証用暗号鍵変更方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14764829

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 14777474

Country of ref document: US

122 Ep: pct application non-entry in european phase

Ref document number: 14764829

Country of ref document: EP

Kind code of ref document: A1