WO2020133068A1 - 一种传递密钥的方法、终端及*** - Google Patents

一种传递密钥的方法、终端及*** Download PDF

Info

Publication number
WO2020133068A1
WO2020133068A1 PCT/CN2018/124364 CN2018124364W WO2020133068A1 WO 2020133068 A1 WO2020133068 A1 WO 2020133068A1 CN 2018124364 W CN2018124364 W CN 2018124364W WO 2020133068 A1 WO2020133068 A1 WO 2020133068A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
pos terminal
transmission
file
sending end
Prior art date
Application number
PCT/CN2018/124364
Other languages
English (en)
French (fr)
Inventor
洪逸轩
Original Assignee
福建联迪商用设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 福建联迪商用设备有限公司 filed Critical 福建联迪商用设备有限公司
Priority to CN201880002660.XA priority Critical patent/CN109792380B/zh
Priority to PCT/CN2018/124364 priority patent/WO2020133068A1/zh
Publication of WO2020133068A1 publication Critical patent/WO2020133068A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the invention relates to the field of electronic payment, in particular to a method, terminal and system for transferring keys.
  • TMK Terminal Master Key
  • the working key TAK or TPK to realize the online transmission of the working key is provided to the payment device manufacturer, and the manufacturer injects the terminal master key TMK into the payment device during the production process of the payment device.
  • the TMK of each device is different.
  • the acquirer can pass the TMK to the payment device manufacturer in clear text, or it can pass the protection key to the payment device manufacturer first, and then encrypt the TMK with the protection key, and then pass it to the payment device manufacturer in cipher text.
  • TMK or the protection key is delivered, it is often delivered in clear text. Currently, it is generally delivered in paper by component, or the key administrator of the sender directly injects the key to the receiver.
  • the management process is more cumbersome.
  • the key administrator of the sender needs to record the key on paper and package it in a unique way to ensure that the receiver can recognize the package after it has been maliciously opened. When the package is incomplete, the key has been compromised.
  • the key sender since the key information is shipped through a third-party express delivery company, the key sender is often concerned about the key being compromised.
  • the key administrator of the sender directly injects the key to the receiver. Although the security problem in the key transmission process is solved, at least two people must be sent by the sender to the receiver to inject the key, which increases key injection. Expenses.
  • the technical problem to be solved by the present invention is to provide a method, terminal and system for transferring keys, and realize low-cost key transfer on the premise of ensuring the security and reliability of the transferred keys.
  • a method for transferring keys including steps:
  • a method for transferring keys including steps:
  • the key receiving end inputs the transmission key of the first key to be transferred to a POS terminal;
  • the key sending end injects the first key to be transferred into the POS terminal
  • the POS terminal uses the transmission key to encrypt the first key to be transferred, obtain a key file, and send the key file to the key sending end;
  • the key sending end sends the key file to the key receiving end
  • the key receiving end decrypts the key file by using the transmission key to obtain the first key.
  • a terminal for transferring keys including a first memory, a first processor, and a first computer program stored on the first memory and executable on the first processor, the first processor executes
  • the first computer program implements the following steps:
  • a key delivery system includes a key receiving end, a POS terminal, and a key sending end.
  • the key receiving end includes a second memory, a second processor, and is stored on the second memory and can be A second computer program running on the second processor
  • the POS terminal includes a third memory, a third processor, and a third computer stored on the third memory and executable on the third processor
  • the key sending end includes a fourth memory, a fourth processor, and a fourth computer program stored on the fourth memory and executable on the fourth processor
  • the second processor executes The second computer program implements the following steps:
  • the beneficial effect of the present invention is that the transmission key of the first key to be transferred is input to a POS terminal, the key sending end injects the first key to be transferred into the POS terminal, and the POS terminal uses the The transmission key encrypts the first key to obtain a key file, and the POS end sends the key file to the key sending end, and then the key sending end sends the key file to the secret key.
  • the key receiving end uses the POS terminal to transfer the key, which does not require personnel to travel to realize the injection, reducing the cost of personnel travel, and does not need to worry about the leakage of the paper transmission method. It is realized on the premise of ensuring the security and reliability of the transmitted key. Low-cost key delivery.
  • FIG. 1 is a flowchart of steps of a method for implementing key transfer according to an embodiment of the present invention
  • FIG. 2 is a specific implementation diagram of transmission key injection into a POS terminal according to an embodiment of the present invention
  • FIG. 3 is a specific implementation diagram of generating a key file according to an embodiment of the present invention.
  • FIG. 4 is a specific implementation diagram of a first key injection POS terminal according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of steps of a method for implementing key wear according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal for implementing key penetration according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a system for implementing key wear according to an embodiment of the present invention.
  • a terminal for transferring keys 2. First memory; 3. First processor; 4. Key receiving end; 5. Second memory; 6. Second processor; 7. POS terminal; 8. Third memory; 9. Third processor; 10. Key sending end; 11. Fourth memory; 12. Fourth processor; 13. A system for transferring keys.
  • the transmission key of the first key to be transferred is input to a POS terminal
  • the key sending end injects the first key to be transferred into the POS terminal
  • the POS terminal uses the The transmission key encrypts the first key to obtain a key file
  • the POS end sends the key file to the key sending end
  • the key sending end sends the key file to the secret key.
  • Key receiving end the transmission key of the first key to be transferred is input to a POS terminal
  • the key sending end injects the first key to be transferred into the POS terminal
  • the POS terminal uses the The transmission key encrypts the first key to obtain a key file
  • the POS end sends the key file to the key sending end
  • the key sending end sends the key file to the secret key. Key receiving end.
  • a method for transferring a key including steps:
  • the beneficial effect of the present invention is that: the transmission key of the first key to be transferred is input to a POS terminal, and the key sending end injects the first key to be transferred into the POS terminal, through the The POS terminal uses the transmission key to encrypt the first key to obtain a key file.
  • the POS terminal sends the key file to the key sending terminal, and the key sending terminal then encrypts the secret key.
  • the key file is sent to the key receiving end, and the key is transferred through the POS terminal. No personnel travel is required to inject, reducing the cost of personnel travel, and there is no need to worry about the leakage of paper transfer methods. Realize low-cost key transfer on the premise of reliability.
  • the transmission key includes multiple transmission key components
  • the step S1 includes:
  • the plurality of transmission key components are respectively input to the POS terminal through input terminals corresponding one-to-one to the transmission key components.
  • splitting the transmission key into multiple components and inputting them from different input terminals further improves security and reduces the risk of forgery.
  • step S1 it includes:
  • step S0 Transmit the verification password to the POS terminal through the input terminals corresponding to the transmission key components one by one, determine whether the verification password transmission information sent by the POS terminal is received, and if so, perform step S1.
  • the input of the transmission key to the POS terminal is allowed only when the verification password is correct, which avoids the random input of illegal transmission keys, further improves the security, and prevents the illegality of the POS terminal Invasion.
  • the multiple transmission key components can be pieced together into a first transmission key component and a second transmission key component;
  • the key file includes the first key ciphertext, the first key description information, and the first verification code of the first key;
  • the first key ciphertext is obtained after the POS terminal encrypts the first key by using the first transmission key component;
  • the first key description information is injected into the POS terminal through the key sending end;
  • the first verification code of the first key is obtained by the POS terminal using the second transmission key component to calculate a message authentication code for the first key ciphertext and the first key description information;
  • the step S3 includes:
  • the first key ciphertext is decrypted using a decryption key corresponding to the first key ciphertext to obtain the first key.
  • the key file includes the verification code of the first key, and the correctness of the first key can be verified by the verification code, and the first key can only be decrypted if the verification is correct. , To prevent the key from being tampered with during transmission, and to ensure the reliability and security of key transmission.
  • the key file is in the form of an electronic photo, and the electronic photo is obtained by taking pictures after the key sending end receives the printing paper printed by the POS terminal and containing the key file;
  • the key file is an electronic document format containing the key file in a preset format received by the key sending end from the POS terminal.
  • the key file can be transferred in different forms, with high flexibility.
  • a method for transferring a key including steps:
  • the key receiving end inputs the transmission key of the first key to be transferred to a POS terminal;
  • the key sending end injects the first key to be transferred into the POS terminal
  • the POS terminal uses the transmission key to encrypt the first key to be transferred, obtain a key file, and send the key file to the key sending end;
  • the key sending end sends the key file to the key receiving end
  • the key receiving end decrypts the key file by using the transmission key to obtain the first key.
  • the beneficial effect of the present invention is that: the transmission key of the first key to be transferred is input to a POS terminal, and the key sending end injects the first key to be transferred into the POS terminal, through the The POS terminal uses the transmission key to encrypt the first key to obtain a key file.
  • the POS terminal sends the key file to the key sending terminal, and the key sending terminal then encrypts the secret key.
  • the key file is sent to the key receiving end, and the key is transferred through the POS terminal. No personnel travel is required to inject, reducing the cost of personnel travel, and there is no need to worry about the leakage of paper transfer methods. Realize low-cost key transfer on the premise of reliability.
  • the transmission key includes multiple transmission key components
  • the step S1 includes:
  • the key receiving end inputs the plurality of transmission key components to the POS terminal through input terminals corresponding one-to-one to the transmission key components.
  • splitting the transmission key into multiple components and inputting them from different input terminals further improves security and reduces the risk of forgery.
  • step S1 it includes:
  • the key receiving end transmits an authentication password to the POS terminal through input terminals corresponding to the transmitted key components, and determines whether the authentication password passing information sent by the POS terminal is received. If so, Then step S1 is executed.
  • the input of the transmission key to the POS terminal is allowed only when the verification password is correct, which avoids the random input of illegal transmission keys, further improves the security, and prevents the illegality of the POS terminal Invasion.
  • the multiple transmission key components can be pieced together into a first transmission key component and a second transmission key component;
  • the step S2 further includes:
  • the key sending end injects the first key description information into the POS terminal
  • step S3 the key file includes the first key ciphertext, the first key description information, and the first verification code of the first key;
  • the POS terminal uses the first transmission key component to encrypt the first key to obtain the first key ciphertext;
  • the POS terminal uses the second transmission key component to calculate a message authentication code for the first key ciphertext and the first key description information to obtain a first verification code for the first key;
  • the step S5 includes:
  • the key receiving end calculates a message authentication code for the first key ciphertext in the key file and the first key description information by using the second transmission cipher component to obtain the first key Second verification code;
  • the key receiving end judges whether the first verification code and the second verification code are equal, and if so, decrypts the first key ciphertext using a decryption key corresponding to the first key ciphertext to obtain The first key.
  • the key file includes the verification code of the first key, and the correctness of the first key can be verified by the verification code, and the first key can be decrypted only if the verification is correct. , To prevent the key from being tampered with during transmission, and to ensure the reliability and security of key transmission.
  • the key file is in the form of an electronic photo, and the electronic photo is obtained by taking pictures after the key sending end receives the printing paper printed by the POS terminal and containing the key file;
  • the key file is an electronic document format containing the key file in a preset format received by the key sending end from the POS terminal.
  • the key file can be transferred in different forms, with high flexibility.
  • the POS terminal detects whether the hardware is abnormal, and if so, it automatically clears the transmission key.
  • a terminal for transferring keys includes a first memory, a first processor, and a first computer program stored on the first memory and executable on the first processor, the The first processor implements the following steps when executing the first computer program:
  • the beneficial effect of the present invention is that: the transmission key of the first key to be transferred is input to a POS terminal, and the key sending end injects the first key to be transferred into the POS terminal, through the The POS terminal uses the transmission key to encrypt the first key to obtain a key file.
  • the POS terminal sends the key file to the key sending terminal, and the key sending terminal then encrypts the secret key.
  • the key file is sent to the key receiving end, and the key is transferred through the POS terminal. No personnel travel is required to inject, reducing the cost of personnel travel, and there is no need to worry about the leakage of paper transfer methods. Realize low-cost key transfer on the premise of reliability.
  • the transmission key includes multiple transmission key components
  • the step S1 includes:
  • the plurality of transmission key components are respectively input to the POS terminal through input terminals corresponding one-to-one to the transmission key components.
  • splitting the transmission key into multiple components and inputting them from different input terminals further improves security and reduces the risk of forgery.
  • step S1 it includes:
  • step S0 Transmit the verification password to the POS terminal through the input terminals corresponding to the transmission key components one by one, determine whether the verification password transmission information sent by the POS terminal is received, and if so, perform step S1.
  • the input of the transmission key to the POS terminal is allowed only when the verification password is correct, which avoids the random input of illegal transmission keys, further improves the security, and prevents the illegality of the POS terminal Invasion.
  • the multiple transmission key components can be pieced together into a first transmission key component and a second transmission key component;
  • the key file includes the first key ciphertext, the first key description information, and the first verification code of the first key;
  • the first key ciphertext is obtained after the POS terminal encrypts the first key by using the first transmission key component;
  • the first key description information is injected into the POS terminal through the key sending end;
  • the first verification code of the first key is obtained by the POS terminal using the second transmission key component to calculate a message authentication code for the first key ciphertext and the first key description information;
  • the step S3 includes:
  • the first key ciphertext is decrypted using a decryption key corresponding to the first key ciphertext to obtain the first key.
  • the key file includes the verification code of the first key, and the correctness of the first key can be verified by the verification code, and the first key can be decrypted only if the verification is correct. , To prevent the key from being tampered with during transmission, and to ensure the reliability and security of key transmission.
  • the key file is in the form of an electronic photo, and the electronic photo is obtained by taking pictures after the key sending end receives the printing paper printed by the POS terminal and containing the key file;
  • the key file is an electronic document format containing the key file in a preset format received by the key sending end from the POS terminal.
  • the key file can be transferred in different forms, with high flexibility.
  • a system for transferring keys includes a key receiving end, a POS terminal, and a key sending end.
  • the key receiving end includes a second memory, a second processor, and stored in the second memory
  • the POS terminal includes a third memory, a third processor, and is stored on the third memory and can be on the third processor
  • the key sending end includes a fourth memory, a fourth processor, and a fourth computer program stored on the fourth memory and executable on the fourth processor
  • the The second processor implements the following steps when executing the second computer program:
  • the beneficial effect of the present invention is that: the transmission key of the first key to be transferred is input to a POS terminal, and the key sending end injects the first key to be transferred into the POS terminal, through the The POS terminal uses the transmission key to encrypt the first key to obtain a key file.
  • the POS terminal sends the key file to the key sending terminal, and the key sending terminal then encrypts the secret key.
  • the key file is sent to the key receiving end, and the key is transferred through the POS terminal. No personnel travel is required to inject, reducing the cost of personnel travel, and there is no need to worry about the leakage of paper transfer methods. Realize low-cost key transfer on the premise of reliability.
  • the transmission key includes multiple transmission key components
  • the S11 includes:
  • the plurality of transmission key components are respectively input to the POS terminal through input terminals corresponding one-to-one to the transmission key components.
  • splitting the transmission key into multiple components and inputting them from different input terminals further improves security and reduces the risk of forgery.
  • step S10 Transmit the verification password to the POS terminal through the input terminals corresponding to the transmission key components one by one, and determine whether the verification password transmission information sent by the POS terminal is received. If yes, perform step S11.
  • the input of the transmission key to the POS terminal is allowed only when the verification password is correct, which avoids the random input of illegal transmission keys, further improves the security, and prevents the illegality of the POS terminal Invasion.
  • the multiple transmission key components can be pieced together into a first transmission key component and a second transmission key component;
  • the step S31 further includes:
  • the step S22 further includes:
  • the key file includes the first key ciphertext, the first key description information, and the first verification code of the first key
  • the step S13 includes:
  • the first key ciphertext is decrypted using a decryption key corresponding to the first key ciphertext to obtain the first key.
  • the key file includes the verification code of the first key, and the correctness of the first key can be verified by the verification code, and the first key can be decrypted only if the verification is correct. , To prevent the key from being tampered with during transmission, and to ensure the reliability and security of key transmission.
  • the key file is in the form of an electronic photo, and the electronic photo is obtained by taking pictures after the key sending end receives the printing paper printed by the POS terminal and containing the key file;
  • the key file is an electronic document format containing the key file in a preset format received by the key sending end from the POS terminal.
  • the key file can be transferred in different forms, with high flexibility.
  • this embodiment describes how to implement key transfer from the perspective of a key receiving end, including steps:
  • the transmission key is a protection key used for transmitting the first key between the sender and the receiver, that is, KTK, Key Transport Key, and the KTK includes multiple transmission key components, which can be generated by an encryption machine , And then the corresponding number of key administrators securely manage the multiple transmission key components;
  • the plurality of key management personnel When inputting, the plurality of key management personnel respectively input their transmission key components into the POS terminal;
  • the key management personnel Before inputting, the key management personnel need to input verification passwords on the POS terminal respectively, and only after inputting multiple transmission key components on the POS terminal after passing the verification password on the POS terminal, if the verification password is entered Incorrect, the POS terminal prompts an input error and prohibits input;
  • the POS terminal will save the multiple transmission key components to the security area of the POS terminal. Once the POS terminal detects a hardware abnormality, the transmission key will be automatically cleared.
  • the specific injection of the transmission key component See Figure 2 for the form;
  • the key receiver administrator After the injection of the POS terminal transmission key is completed, the key receiver administrator will mail the POS terminal to the key sender administrator;
  • the key file may be in the form of an electronic photo, and the electronic photo is obtained after the key sending end receives the printing paper containing the key file printed by the printing module of the POS terminal;
  • the key file may also be in the form of an electronic document containing the key file in a preset format received by the key sending end from the POS terminal;
  • the key receiver After receiving the key file, the key receiver enters the key file into the encryption machine according to the content of the key file. The specific process is shown in FIG. 4. For security, the key is injected In the case of a file, the key file may also be split into a plurality of different key receiver administrators for entry, and the key file may be decrypted by the encryption machine to obtain the first key;
  • the key may be the terminal master key TMK or the protection key of the terminal master key TMK. If it is the protection key of the terminal master key TMK, the encryption machine has already received the protection The TMK encrypted with the key needs to be decrypted with the protection key to obtain the TMK.
  • This embodiment differs from the first embodiment in that the multiple transmission key components can be pieced together into a first transmission key component and a second transmission key component, so preferably, when the transmission key is injected into the POS terminal, it can be Divide the transmission key into two transmission key components, namely the first transmission key component and the second transmission key component, and then input by two different key administrators;
  • the key file includes the first key ciphertext, the first key description information, and the first verification code of the first key;
  • the first key ciphertext is obtained after the POS terminal encrypts the first key by using the first transmission key component;
  • the first key description information is injected into the POS terminal through the key sending end;
  • the first verification code of the first key is obtained by the POS terminal using the second transmission key component to calculate a message authentication code MAC for the first key ciphertext and the first key description information;
  • the step S3 includes:
  • the first transmission cipher component may be KTK_ENC to encrypt the first key
  • the second transmission cipher component may be KTK_MAC to encrypt the first key ciphertext and the first key description information (I.e. the purpose of the first key) calculate the MAC and place the first key to be tampered with
  • the public key and the private key in the asymmetric key can also be used as the first and second transmission cipher components, respectively, so
  • the public and private key pairs can be generated by the POS terminal itself, or can be imported into the POS terminal externally.
  • this embodiment describes how to implement key transfer from the perspective of a key receiving end, a POS terminal, and a key sending end, including steps:
  • the key receiving end inputs the transmission key of the first key to be transferred to a POS terminal;
  • the transmission key is a protection key used for transmitting the first key between the sender and the receiver, that is, KTK, Key Transport Key, and the KTK includes multiple transmission key components, which can be generated by an encryption machine , And then the corresponding number of key administrators securely manage the multiple transmission key components;
  • the plurality of key management personnel When inputting, the plurality of key management personnel respectively input their transmission key components into the POS terminal;
  • the key management personnel Before inputting, the key management personnel need to input verification passwords on the POS terminal respectively, and only after inputting multiple transmission key components on the POS terminal after passing the verification password on the POS terminal, if the verification password is entered Incorrect, the POS terminal prompts an input error and prohibits input;
  • the POS terminal will save the multiple transmission key components to the security area of the POS terminal. Once the POS terminal detects a hardware abnormality, the transmission key will be automatically cleared.
  • the specific injection of the transmission key component See Figure 2 for the form;
  • the key receiver administrator After the injection of the POS terminal transmission key is completed, the key receiver administrator will mail the POS terminal to the key sender administrator;
  • the key sending end injects the first key to be transferred into the POS terminal
  • the key sending end After receiving the POS terminal, the key sending end checks whether the appearance of the POS terminal is abnormal (such as whether the casing is opened);
  • two key sender administrators can separately inject the components of the first key to the POS terminal (here, it can also be the complete first key directly), the key type , Usage, algorithm, first key index number and other key description information;
  • the POS terminal combines the components of the injected first key into a complete first key; the transmission key is used to encrypt the first key to be transferred, a key file is obtained, and the The key file is sent to the key sending end, and the specific implementation process is shown in FIG. 3;
  • the key sending end sends the key file to the key receiving end
  • the key file may be in the form of an electronic photo, and the electronic photo is obtained after the key sending end receives the printing paper containing the key file printed by the printing module of the POS terminal;
  • the key file may also be in the form of an electronic document containing the key file in a preset format received by the key sending end from the POS terminal;
  • the key receiving end decrypts the key file by using the transmission key to obtain the first key
  • the key receiver After receiving the key file, the key receiver enters the key file into the encryption machine according to the content of the key file. The specific process is shown in FIG. 4. For security, the key is injected In the case of a file, the key file may also be split into a plurality of different key receiver administrators for entry, and the key file may be decrypted by the encryption machine to obtain the first key;
  • the key may be the terminal master key TMK or the protection key of the terminal master key TMK. If it is the protection key of the terminal master key TMK, the encryption machine has already received the protection The TMK encrypted with the key needs to be decrypted with the protection key to obtain the TMK.
  • Embodiment 3 differs from Embodiment 3 in that the multiple transmission key components can be pieced together into a first transmission key component and a second transmission key component, so preferably, when the transmission key is injected into the POS terminal,
  • the transmission key may be divided into two transmission key components, namely a first transmission key component and a second transmission key component, and then input by two different key administrators;
  • the step S2 further includes:
  • the key sending end injects the first key description information into the POS terminal
  • step S3 the key file includes the first key ciphertext, the first key description information, and the first verification code of the first key;
  • the POS terminal uses the first transmission key component to encrypt the first key to obtain the first key ciphertext;
  • the POS terminal uses the second transmission key component to calculate a message authentication code MAC for the first key ciphertext and the first key description information to obtain a first verification code for the first key;
  • the step S5 includes:
  • the key receiving end calculates a message authentication code MAC for the first key ciphertext in the key file and the first key description information by using the second transmission cipher component to obtain the first key 'S second verification code;
  • the key receiving end judges whether the first verification code and the second verification code are equal, and if so, decrypts the first key ciphertext using a decryption key corresponding to the first key ciphertext to obtain The first key, storing the first key, thereby completing the entire process of the first key from the key sending end to the key receiving end;
  • the first transmission cipher component may be KTK_ENC to encrypt the first key
  • the second transmission cipher component may be KTK_MAC to encrypt the first key ciphertext and the first key description information (I.e. the purpose of the first key) calculate the MAC and place the first key to be tampered with
  • the public key and the private key in the asymmetric key can also be used as the first and second transmission cipher components, respectively, so
  • the public and private key pairs can be generated by the POS terminal itself, or can be imported into the POS terminal externally.
  • a terminal 1 for transferring keys includes a first memory 2, a first processor 3, and a first memory stored in the first memory 2 and capable of running on the first processor 3
  • a computer program when the first processor 2 executes the first computer program, the steps in the first embodiment are implemented.
  • a terminal 1 for transferring keys includes a first memory 2, a first processor 3, and a first memory stored in the first memory 2 and capable of running on the first processor 3
  • a computer program when the first processor 2 executes the first computer program, the steps in the second embodiment are implemented.
  • a key transfer system 13 includes a key receiving terminal 4, a POS terminal 7 and a key transmitting terminal 10.
  • the key receiving terminal 4 includes a second memory 5, a second processor 6 and stored in the first A second computer program that can be run on the second processor 6 on the second memory 5, and the POS terminal 7 includes a third memory 8, a third processor 9, and stored on the third memory 8 and can A third computer program running on the third processor 9,
  • the key sending end 10 includes a fourth memory 11, a fourth processor 12, and is stored on the fourth memory 11 and can be stored in the third A fourth computer program running on the four processors 12, when the second processor 6 executes the second computer program, the steps performed by the key receiving end 4 in the third embodiment are implemented; the third processor 9 executes When the third computer program is described, the steps performed by the POS terminal 7 in Embodiment 3 are implemented; when the fourth processor 12 executes the second computer program, the steps performed by the key sending terminal 10 in Embodiment 3 are implemented.
  • a key transfer system 13 includes a key receiving terminal 4, a POS terminal 7 and a key transmitting terminal 10.
  • the key receiving terminal 4 includes a second memory 5, a second processor 6 and stored in the first A second computer program that can be run on the second processor 6 on the second memory 5, and the POS terminal 7 includes a third memory 8, a third processor 9, and stored on the third memory 8 and can A third computer program running on the third processor 9,
  • the key sending end 10 includes a fourth memory 11, a fourth processor 12, and is stored on the fourth memory 11 and can be stored in the third A fourth computer program running on the four processors 12, when the second processor 6 executes the second computer program, the steps performed by the key receiving end 4 in the third embodiment are implemented; the third processor 9 executes When the third computer program is described, the steps performed by the POS terminal 7 in Embodiment 3 are implemented; when the fourth processor 12 executes the second computer program, the steps performed by the key sending terminal 10 in Embodiment 4 are implemented.
  • the method, terminal and system for transferring keys input the transfer key of the first key to be transferred into a POS terminal, and the key sending end inputs the first key to be transferred Inject into the POS terminal, use the transmission key to encrypt the first key through the POS terminal to obtain a key file, and the POS terminal sends the key file to the key sending terminal, and then The key file is sent by the key sending end to the key receiving end.
  • the key file contains the verification value of the first key.
  • the receiving end judges the correctness of the verification value, and once the POS terminal Hardware abnormality is detected, that is, the key is automatically cleared to prevent the key from being tampered with or leaked during the transmission process.
  • the POS terminal is used to achieve the secure transmission of the key, and no personnel travel is needed to achieve injection, reducing the cost of personnel travel and do not need to worry
  • the leakage problem of paper transmission mode realizes low-cost key transmission on the premise of ensuring the safety and reliability of the transmitted key.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

本发明公开一种传递密钥的方法、终端及***,将待传递的第一密钥的传送密钥输入一POS终端,密钥发送端将待传递的第一密钥注入所述POS终端,通过所述POS终端采用所述传送密钥对所述第一密钥进行加密,得到密钥文件,所述POS端将所述密钥文件发送给密钥发送端,再由密钥发送端将所述密钥文件发送给密钥接收端,借助POS终端实现密钥的传递,不需要人员出差实现注入,减少人员出差的成本,也不需要担心纸质传递方式的泄密问题,在保证传递的密钥安全可靠的前提下实现低成本的密钥传递。

Description

一种传递密钥的方法、终端及*** 技术领域
本发明涉及电子支付领域,尤其涉及一种传递密钥的方法、终端及***。
背景技术
在电子支付日益发展的今天,为了提高电子支付设备(如POS)的布放效率,越来越多的第三方支付公司,将终端主密钥TMK(Terminal Master Key,用来加密、解密需要传输的工作密钥 TAK 或 TPK,实现工作密钥联机传送)提供给支付设备厂商,由厂商在支付设备的生产过程中,将终端主密钥TMK注入到支付设备中。
为了保证TMK管理的安全性,防止一个TMK的泄露影响到所有的设备,每台设备的TMK均不同。收单机构可以把TMK以明文方式传递给支付设备厂商,也可以把保护密钥先传递给支付设备厂商,再将TMK用保护密钥加密后,以密文方式传递给支付设备厂商。
不论是传递TMK还是保护密钥,往往是通过明文方式传递,当前一般是通过纸质以分量方式传递,或者是由发送方的密钥管理员直接到接收方注入密钥。
但是,通过纸质方式传递的话,管理流程较为繁琐,需要发送方的密钥管理员将密钥记录在纸上,并通过特有方式打包,用于保证包裹被恶意拆开后,接收方可以识别到包裹不完整,密钥已泄密。另外,由于是通过第三方快递公司运送密钥信息,密钥发送方常常担心密钥被泄密。
而发送方的密钥管理员直接到接收方注入密钥的方式虽然解决了密钥传递过程中的安全性问题,但需要发送方至少派出两人到接收方注入密钥,增加了密钥注入的费用开销。
技术问题
本发明所要解决的技术问题是:提供一种传递密钥的方法、终端及***,在保证传递的密钥安全可靠的前提下实现低成本的密钥传递。
技术解决方案
为了解决上述技术问题,本发明采用的一种技术方案为:
一种传递密钥的方法,包括步骤:
S1、将待传递的第一密钥的传送密钥输入一POS终端;
S2、接收密钥发送端发送的密钥文件,所述密钥文件是所述密钥发送端将待传递的第一密钥注入所述POS终端后从POS终端接收的,所述密钥文件包括所述POS终端采用所述传送密钥加密所述待传递的第一密钥后得到的加密数据;
S3、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥
为了解决上述技术问题,本发明采用的另一种技术方案为:
一种传递密钥的方法,包括步骤:
S1、密钥接收端将待传递的第一密钥的传送密钥输入一POS终端;
S2、密钥发送端将待传递的第一密钥注入所述POS终端;
S3、所述POS终端采用所述传送密钥加密所述待传递的第一密钥,得到密钥文件,将所述密钥文件发送给所述密钥发送端;
S4、所述密钥发送端将所述密钥文件发送给所述密钥接收端;
S5、所述密钥接收端采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥。
为了解决上述技术问题,本发明采用的另一种技术方案为:
一种传递密钥的终端,包括第一存储器、第一处理器及存储在所述第一存储器上并可在所述第一处理器上运行的第一计算机程序,所述第一处理器执行所述第一计算机程序时实现以下步骤:
S1、将待传递的第一密钥的传送密钥输入一POS终端;
S2、接收密钥发送端发送的密钥文件,所述密钥文件是所述密钥发送端将待传递的第一密钥注入所述POS终端后从POS终端接收的,所述密钥文件包括所述POS终端采用所述传送密钥加密所述待传递的第一密钥后得到的加密数据;
S3、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥。
为了解决上述技术问题,本发明采用的另一种技术方案为:
一种传递密钥的***,包括密钥接收端、POS终端和密钥发送端,所述密钥接收端包括第二存储器、第二处理器及存储在所述第二存储器上并可在所述第二处理器上运行的第二计算机程序,所述POS终端包括第三存储器、第三处理器及存储在所述第三存储器上并可在所述第三处理器上运行的第三计算机程序,所述密钥发送端包括第四存储器、第四处理器及存储在所述第四存储器上并可在所述第四处理器上运行的第四计算机程序,所述第二处理器执行所述第二计算机程序时实现以下步骤:
S11、将待传递的第一密钥的传送密钥输入一POS终端;
S12、接收所述密钥发送端发送的密钥文件;
S13、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥;
所述第三处理器执行所述第三计算机程序时实现以下步骤:
S21、接收所述密钥接收端输入的待传递的第一密钥的传送密钥;
S22、接收所述密钥发送端注入的待传递的第一密钥;
S23、采用所述传送密钥加密所述待传递的第一密钥,得到密钥文件,将所述密钥文件发送给所述密钥发送端;
所述第四处理器执行所述第四计算机程序时实现以下步骤:
S31、将待传递的第一密钥注入所述POS终端;
S32、接收所述POS终端发送的密钥文件,将所述密钥文件发送给所述密钥接收端。
有益效果
本发明的有益效果在于:将待传递的第一密钥的传送密钥输入一POS终端,密钥发送端将待传递的第一密钥注入所述POS终端,通过所述POS终端采用所述传送密钥对所述第一密钥进行加密,得到密钥文件,所述POS端将所述密钥文件发送给密钥发送端,再由密钥发送端将所述密钥文件发送给密钥接收端,借助POS终端实现密钥的传递,不需要人员出差实现注入,减少人员出差的成本,也不需要担心纸质传递方式的泄密问题,在保证传递的密钥安全可靠的前提下实现低成本的密钥传递。
附图说明
图1为本发明实施例的一种实现密钥传递的方法的步骤流程图;
图2为本发明实施例的传送密钥注入POS终端的具体实现图;
图3为本发明实施例生成密钥文件的具体实现图;
图4为本发明实施例的第一密钥注入POS终端的具体实现图;
图5为本发明实施例的一种实现密钥穿的的方法的步骤流程图;
图6为本发明实施例的一种实现密钥穿的终端的结构示意图;
图7为本发明实施例的一种实现密钥穿的***的结构示意图;
标号说明:
1、一种传递密钥的终端;2、第一存储器; 3、第一处理器; 4、密钥接收端;5、第二存储器;6、第二处理器;7、POS终端;8、第三存储器;9、第三处理器;10、密钥发送端;11、第四存储器;12、第四处理器;13、一种传递密钥的***。
本发明的实施方式
为详细说明本发明的技术内容、所实现目的及效果,以下结合实施方式并配合附图予以说明。
本发明最关键的构思在于: 待传递的第一密钥的传送密钥输入一POS终端,密钥发送端将待传递的第一密钥注入所述POS终端,通过所述POS终端采用所述传送密钥对所述第一密钥进行加密,得到密钥文件,所述POS端将所述密钥文件发送给密钥发送端,再由密钥发送端将所述密钥文件发送给密钥接收端。
请参照图1,一种传递密钥的方法,包括步骤:
S1、将待传递的第一密钥的传送密钥输入一POS终端;
S2、接收密钥发送端发送的密钥文件,所述密钥文件是所述密钥发送端将待传递的第一密钥注入所述POS终端后从POS终端接收的,所述密钥文件包括所述POS终端采用所述传送密钥加密所述待传递的第一密钥后得到的加密数据;
S3、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥。
从上述描述可知,本发明的有益效果在于:将待传递的第一密钥的传送密钥输入一POS终端,密钥发送端将待传递的第一密钥注入所述POS终端,通过所述POS终端采用所述传送密钥对所述第一密钥进行加密,得到密钥文件,所述POS端将所述密钥文件发送给密钥发送端,再由密钥发送端将所述密钥文件发送给密钥接收端,借助POS终端实现密钥的传递,不需要人员出差实现注入,减少人员出差的成本,也不需要担心纸质传递方式的泄密问题,在保证传递的密钥安全可靠的前提下实现低成本的密钥传递。
进一步的,所述传送密钥包括多个传送密钥分量;
所述步骤S1包括:
通过与所述传送密钥分量一一对应的输入端分别将所述多个传送密钥分量输入所述POS终端。
由上述描述可知,将传送密钥拆分成多个分量由不同中输入端进行输入,进一步提高了安全性,降低了被伪造的风险。
进一步的,所述步骤S1之前包括:
S0、通过与所述传送密钥分量一一对应的输入端分别传送验证口令至所述POS终端,判断是否接收到所述POS终端发送的验证口令通过的信息,若是,则执行步骤S1。
由上述描述可知,只有验证口令正确时,才允许传送密钥向所述POS终端的输入,避免了不合法的传送密钥的随意输入,进一步提高了安全性,阻止对所述POS终端的非法入侵。
进一步的,所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量;
所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
所述第一密钥密文是所述POS终端采用所述第一传送密钥分量加密所述第一密钥后得到;
所述第一密钥描述信息通过所述密钥发送端注入所述POS终端;
所述第一密钥的第一验证码是所述POS终端采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码得到;
所述步骤S3包括:
采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第二验证码;
判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥。
由上述描述可知,所述密钥文件包括第一密钥的验证码,通过所述验证码能够对第一密钥的正确性与否进行验证,只有验证正确才会进行解密得到第一密钥,防止密钥在传输过程中被篡改,保证了密钥传递的可靠性和安全性。
进一步的,所述密钥文件为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端打印出来的包含所述密钥文件的打印纸后拍照得到;
或者密钥文件为所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式。
由上述描述可知,可以通过不同的形式实现密钥文件的传递,灵活度高。
请参照图5,一种传递密钥的方法,包括步骤:
S1、密钥接收端将待传递的第一密钥的传送密钥输入一POS终端;
S2、密钥发送端将待传递的第一密钥注入所述POS终端;
S3、所述POS终端采用所述传送密钥加密所述待传递的第一密钥,得到密钥文件,将所述密钥文件发送给所述密钥发送端;
S4、所述密钥发送端将所述密钥文件发送给所述密钥接收端;
S5、所述密钥接收端采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥。
从上述描述可知,本发明的有益效果在于:将待传递的第一密钥的传送密钥输入一POS终端,密钥发送端将待传递的第一密钥注入所述POS终端,通过所述POS终端采用所述传送密钥对所述第一密钥进行加密,得到密钥文件,所述POS端将所述密钥文件发送给密钥发送端,再由密钥发送端将所述密钥文件发送给密钥接收端,借助POS终端实现密钥的传递,不需要人员出差实现注入,减少人员出差的成本,也不需要担心纸质传递方式的泄密问题,在保证传递的密钥安全可靠的前提下实现低成本的密钥传递。
进一步的,所述传送密钥包括多个传送密钥分量;
所述步骤S1包括:
所述密钥接收端通过与所述传送密钥分量一一对应的输入端分别将所述多个传送密钥分量输入所述POS终端。
由上述描述可知,将传送密钥拆分成多个分量由不同中输入端进行输入,进一步提高了安全性,降低了被伪造的风险。
进一步的,所述步骤S1之前包括:
S0、所述密钥接收端通过与所述传送密钥分量一一对应的输入端分别传送验证口令至所述POS终端,判断是否接收到所述POS终端发送的验证口令通过的信息,若是,则执行步骤S1。
由上述描述可知,只有验证口令正确时,才允许传送密钥向所述POS终端的输入,避免了不合法的传送密钥的随意输入,进一步提高了安全性,阻止对所述POS终端的非法入侵。
进一步的,所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量;
所述步骤S2还包括:
所述密钥发送端将所述第一密钥描述信息注入所述POS终端;
所述步骤S3中所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
所述POS终端采用所述第一传送密钥分量加密所述第一密钥,得到所述第一密钥密文;
所述POS终端采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第一验证码;
所述步骤S5包括:
所述密钥接收端采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第二验证码;
所述密钥接收端判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥。
由上述描述可知,所述密钥文件包括第一密钥的验证码,通过所述验证码能够对第一密钥的正确性与否进行验证,只有验证正确才会进行解密得到第一密钥,防止密钥在传输过程中被篡改,保证了密钥传递的可靠性和安全性。
进一步的,所述密钥文件为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端打印出来的包含所述密钥文件的打印纸后拍照得到;
或者密钥文件为所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式。
由上述描述可知,可以通过不同的形式实现密钥文件的传递,灵活度高。
进一步的,还包括:
所述POS终端检测硬件是否异常,若是,则自动清除所述传送密钥。
由上述描述可知,通过对POS终端硬件异常与否的检测判断所述POS终端是否受到攻击,若有异常,则自动清除所述传送密钥,放置传送密钥的泄露,进一步提高了密钥传递的安全性。
请参照图6,一种传递密钥的终端,包括第一存储器、第一处理器及存储在所述第一存储器上并可在所述第一处理器上运行的第一计算机程序,所述第一处理器执行所述第一计算机程序时实现以下步骤:
S1、将待传递的第一密钥的传送密钥输入一POS终端;
S2、接收密钥发送端发送的密钥文件,所述密钥文件是所述密钥发送端将待传递的第一密钥注入所述POS终端后从POS终端接收的,所述密钥文件包括所述POS终端采用所述传送密钥加密所述待传递的第一密钥后得到的加密数据;
S3、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥。
从上述描述可知,本发明的有益效果在于:将待传递的第一密钥的传送密钥输入一POS终端,密钥发送端将待传递的第一密钥注入所述POS终端,通过所述POS终端采用所述传送密钥对所述第一密钥进行加密,得到密钥文件,所述POS端将所述密钥文件发送给密钥发送端,再由密钥发送端将所述密钥文件发送给密钥接收端,借助POS终端实现密钥的传递,不需要人员出差实现注入,减少人员出差的成本,也不需要担心纸质传递方式的泄密问题,在保证传递的密钥安全可靠的前提下实现低成本的密钥传递。
进一步的,所述传送密钥包括多个传送密钥分量;
所述步骤S1包括:
通过与所述传送密钥分量一一对应的输入端分别将所述多个传送密钥分量输入所述POS终端。
由上述描述可知,将传送密钥拆分成多个分量由不同中输入端进行输入,进一步提高了安全性,降低了被伪造的风险。
进一步的,所述步骤S1之前包括:
S0、通过与所述传送密钥分量一一对应的输入端分别传送验证口令至所述POS终端,判断是否接收到所述POS终端发送的验证口令通过的信息,若是,则执行步骤S1。
由上述描述可知,只有验证口令正确时,才允许传送密钥向所述POS终端的输入,避免了不合法的传送密钥的随意输入,进一步提高了安全性,阻止对所述POS终端的非法入侵。
进一步的,所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量;
所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
所述第一密钥密文是所述POS终端采用所述第一传送密钥分量加密所述第一密钥后得到;
所述第一密钥描述信息通过所述密钥发送端注入所述POS终端;
所述第一密钥的第一验证码是所述POS终端采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码得到;
所述步骤S3包括:
采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第二验证码;
判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥。
由上述描述可知,所述密钥文件包括第一密钥的验证码,通过所述验证码能够对第一密钥的正确性与否进行验证,只有验证正确才会进行解密得到第一密钥,防止密钥在传输过程中被篡改,保证了密钥传递的可靠性和安全性。
进一步的,所述密钥文件为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端打印出来的包含所述密钥文件的打印纸后拍照得到;
或者密钥文件为所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式。
由上述描述可知,可以通过不同的形式实现密钥文件的传递,灵活度高。
请参照图7,一种传递密钥的***,包括密钥接收端、POS终端和密钥发送端,所述密钥接收端包括第二存储器、第二处理器及存储在所述第二存储器上并可在所述第二处理器上运行的第二计算机程序,所述POS终端包括第三存储器、第三处理器及存储在所述第三存储器上并可在所述第三处理器上运行的第三计算机程序,所述密钥发送端包括第四存储器、第四处理器及存储在所述第四存储器上并可在所述第四处理器上运行的第四计算机程序,所述第二处理器执行所述第二计算机程序时实现以下步骤:
S11、将待传递的第一密钥的传送密钥输入一POS终端;
S12、接收所述密钥发送端发送的密钥文件;
S13、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥;
所述第三处理器执行所述第三计算机程序时实现以下步骤:
S21、接收所述密钥接收端输入的待传递的第一密钥的传送密钥;
S22、接收所述密钥发送端注入的待传递的第一密钥;
S23、采用所述传送密钥加密所述待传递的第一密钥,得到密钥文件,将所述密钥文件发送给所述密钥发送端;
所述第四处理器执行所述第四计算机程序时实现以下步骤:
S31、将待传递的第一密钥注入所述POS终端;
S32、接收所述POS终端发送的密钥文件,将所述密钥文件发送给所述密钥接收端。
从上述描述可知,本发明的有益效果在于:将待传递的第一密钥的传送密钥输入一POS终端,密钥发送端将待传递的第一密钥注入所述POS终端,通过所述POS终端采用所述传送密钥对所述第一密钥进行加密,得到密钥文件,所述POS端将所述密钥文件发送给密钥发送端,再由密钥发送端将所述密钥文件发送给密钥接收端,借助POS终端实现密钥的传递,不需要人员出差实现注入,减少人员出差的成本,也不需要担心纸质传递方式的泄密问题,在保证传递的密钥安全可靠的前提下实现低成本的密钥传递。
进一步的,所述传送密钥包括多个传送密钥分量;
所述S11包括:
通过与所述传送密钥分量一一对应的输入端分别将所述多个传送密钥分量输入所述POS终端。
由上述描述可知,将传送密钥拆分成多个分量由不同中输入端进行输入,进一步提高了安全性,降低了被伪造的风险。
进一步的,所述第二处理器执行所述第二计算机程序时实现以下步骤:
所述步骤S11之前执行:
S10、通过与所述传送密钥分量一一对应的输入端分别传送验证口令至所述POS终端,判断是否接收到所述POS终端发送的验证口令通过的信息,若是,则执行步骤S11。
由上述描述可知,只有验证口令正确时,才允许传送密钥向所述POS终端的输入,避免了不合法的传送密钥的随意输入,进一步提高了安全性,阻止对所述POS终端的非法入侵。
进一步的,所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量;
所述步骤S31还包括:
将所述第一密钥描述信息注入所述POS终端;
所述步骤S22还包括:
接收所述密钥发送端注入的所述第一密钥描述信息;
所述步骤S23中所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
采用所述第一传送密钥分量加密所述第一密钥,得到所述第一密钥密文;
采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第一验证码;
所述步骤S13包括:
采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第二验证码;
判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥。
由上述描述可知,所述密钥文件包括第一密钥的验证码,通过所述验证码能够对第一密钥的正确性与否进行验证,只有验证正确才会进行解密得到第一密钥,防止密钥在传输过程中被篡改,保证了密钥传递的可靠性和安全性。
进一步的,所述密钥文件为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端打印出来的包含所述密钥文件的打印纸后拍照得到;
或者密钥文件为所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式。
由上述描述可知,可以通过不同的形式实现密钥文件的传递,灵活度高。
进一步的,所述第三处理器执行所述第三计算机程序时实现以下步骤:
检测硬件是否异常,若是,则自动清除所述传送密钥。
由上述描述可知,通过对POS终端硬件异常与否的检测判断所述POS终端是否受到攻击,若有异常,则自动清除所述传送密钥,放置传送密钥的泄露,进一步提高了密钥传递的安全性。
实施例一
请参照图1,一种传递密钥的方法,本实施例以密钥接收端的角度描述如何实现密钥传递,包括步骤:
S1、将待传递的第一密钥的传送密钥输入一POS终端;
其中,所述传送密钥是用于发送方与接收方之间传递第一密钥的保护密钥,即KTK,Key Transport Key,所述KTK包括多个传送密钥分量,可以通过加密机生成,然后再由相应个数的密钥管理员安全管理所述多个传送密钥分量;
进行输入时,则由所述多个密钥管理人员分别将其传输密钥分量输入所述POS终端;
在进行输入之前,密钥管理人员需要分别在所述POS终端上输入验证口令,在POS终端验证口令通过后,才在所述POS终端上分别输入多个传送密钥分量,若输入的验证口令不正确,则所述POS终端提示输入错误,禁止输入;
所述POS终端会将所述多个传送密钥分量保存至POS终端的安全区,一旦POS终端检测到硬件异常,则所述传送密钥会被自动清除,所述传送密钥分量注入的具体形式参见图2所示;
在完成POS终端传送密钥的注入后,密钥接收方管理员会将所述POS终端邮寄给密钥发送方管理员;
S2、接收密钥发送端发送的密钥文件,所述密钥文件是所述密钥发送端将待传递的第一密钥注入所述POS终端后从POS终端接收的,所述密钥文件包括所述POS终端采用所述传送密钥加密所述待传递的第一密钥后得到的加密数据,其具体实现过程如图3所示;
其中,所述密钥文件可以为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端的打印模块打印出来的包含所述密钥文件的打印纸后拍照得到;
密钥文件也可以是所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式;
S3、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥;
接收到所述密钥文件后,密钥接收方根据所述密钥文件的内容将所述密钥文件录入到加密机中,其具体过程如图4所示,为了安全起见,在注入密钥文件时,也可以将密钥文件拆分成多个分别由不同的密钥接收方管理员进行录入,通过所述加密机对所述密钥文件进行解密得到所述第一密钥;
其中,所述密钥可以是终端主密钥TMK,也可以是终端主密钥TMK的保护密钥,如果是终端主密钥TMK的保护密钥,则加密机已经事先接收到用所述保护密钥加密过的TMK,需要用所述保护密钥进行解密,才能得到所述TMK。
实施例二
本实施例与实施例一不同在于:所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量,所以优选地,在进行传输密钥注入POS端时,可以将所述传送密钥分成两个传送密钥分量,分别是第一传送密钥分量和第二传送密钥分量,然后由两个不同的密钥管理员分别进行输入;
所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
所述第一密钥密文是所述POS终端采用所述第一传送密钥分量加密所述第一密钥后得到;
所述第一密钥描述信息通过所述密钥发送端注入所述POS终端;
所述第一密钥的第一验证码是所述POS终端采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码MAC得到;
所述步骤S3包括:
采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码MAC,得到所述第一密钥的第二验证码;
判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥,将所述第一密钥进行保存,以此完成第一密钥从密钥发送端到密钥接收端的整个流程;
其中,所述第一传送密码分量可以是KTK_ENC,用于对第一密钥进行加密,所述第二传送密码分量可以是KTK_MAC,用于对第一密钥密文和第一密钥描述信息(即第一密钥用途)计算MAC,放置第一密钥被篡改;也可以用非对称密钥里的公钥和私钥分别作为所述第一传送密码分量和第二传送密码分量,所述公私钥对可以由POS终端自己生成,也可以通过外部导入POS终端中。
实施例三
请参照图5,一种传递密钥的方法,本实施例以密钥接收端、POS终端以及密钥发送端的角度描述如何实现密钥传递,包括步骤:
S1、密钥接收端将待传递的第一密钥的传送密钥输入一POS终端;
其中,所述传送密钥是用于发送方与接收方之间传递第一密钥的保护密钥,即KTK,Key Transport Key,所述KTK包括多个传送密钥分量,可以通过加密机生成,然后再由相应个数的密钥管理员安全管理所述多个传送密钥分量;
进行输入时,则由所述多个密钥管理人员分别将其传输密钥分量输入所述POS终端;
在进行输入之前,密钥管理人员需要分别在所述POS终端上输入验证口令,在POS终端验证口令通过后,才在所述POS终端上分别输入多个传送密钥分量,若输入的验证口令不正确,则所述POS终端提示输入错误,禁止输入;
所述POS终端会将所述多个传送密钥分量保存至POS终端的安全区,一旦POS终端检测到硬件异常,则所述传送密钥会被自动清除,所述传送密钥分量注入的具体形式参见图2所示;
在完成POS终端传送密钥的注入后,密钥接收方管理员会将所述POS终端邮寄给密钥发送方管理员;
S2、密钥发送端将待传递的第一密钥注入所述POS终端;
密钥发送端接收到所述POS终端后,检查POS终端外观有没有异常(如外壳有没有被打开);
根据所述POS终端上的提示,可以由两名密钥发送方管理员分别往所述POS终端注入第一密钥的分量(此处也可以直接是完整的第一密钥)、密钥类型、用途、算法、第一密钥索引号等密钥描述信息;
S3、所述POS终端根据所述注入的第一密钥的分量组合成完整的第一密钥;采用所述传送密钥加密所述待传递的第一密钥,得到密钥文件,将所述密钥文件发送给所述密钥发送端,其具体实现过程如图3所示;
S4、所述密钥发送端将所述密钥文件发送给所述密钥接收端;
其中,所述密钥文件可以为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端的打印模块打印出来的包含所述密钥文件的打印纸后拍照得到;
密钥文件也可以是所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式;
S5、所述密钥接收端采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥;
接收到所述密钥文件后,密钥接收方根据所述密钥文件的内容将所述密钥文件录入到加密机中,其具体过程如图4所示,为了安全起见,在注入密钥文件时,也可以将密钥文件拆分成多个分别由不同的密钥接收方管理员进行录入,通过所述加密机对所述密钥文件进行解密得到所述第一密钥;
其中,所述密钥可以是终端主密钥TMK,也可以是终端主密钥TMK的保护密钥,如果是终端主密钥TMK的保护密钥,则加密机已经事先接收到用所述保护密钥加密过的TMK,需要用所述保护密钥进行解密,才能得到所述TMK。
实施例四
本实施例与实施例三的不同在于:所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量,所以优选地,在进行传输密钥注入POS端时,可以将所述传送密钥分成两个传送密钥分量,分别是第一传送密钥分量和第二传送密钥分量,然后由两个不同的密钥管理员分别进行输入;
所述步骤S2还包括:
所述密钥发送端将所述第一密钥描述信息注入所述POS终端;
所述步骤S3中所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
所述POS终端采用所述第一传送密钥分量加密所述第一密钥,得到所述第一密钥密文;
所述POS终端采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码MAC,得到所述第一密钥的第一验证码;
所述步骤S5包括:
所述密钥接收端采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码MAC,得到所述第一密钥的第二验证码;
所述密钥接收端判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥,将所述第一密钥进行保存,以此完成第一密钥从密钥发送端到密钥接收端的整个流程;
其中,所述第一传送密码分量可以是KTK_ENC,用于对第一密钥进行加密,所述第二传送密码分量可以是KTK_MAC,用于对第一密钥密文和第一密钥描述信息(即第一密钥用途)计算MAC,放置第一密钥被篡改;也可以用非对称密钥里的公钥和私钥分别作为所述第一传送密码分量和第二传送密码分量,所述公私钥对可以由POS终端自己生成,也可以通过外部导入POS终端中。
实施例五
请参照图6,一种传递密钥的终端1,包括第一存储器2、第一处理器3及存储在所述第一存储器2上并可在所述第一处理器3上运行的第一计算机程序,所述第一处理器2执行所述第一计算机程序时实现实施例一中的步骤。
实施例六
请参照图6,一种传递密钥的终端1,包括第一存储器2、第一处理器3及存储在所述第一存储器2上并可在所述第一处理器3上运行的第一计算机程序,所述第一处理器2执行所述第一计算机程序时实现实施例二中的步骤。
实施例七
一种传递密钥的***13,包括密钥接收端4、POS终端7和密钥发送端10,所述密钥接收端4包括第二存储器5、第二处理器6及存储在所述第二存储器5上并可在所述第二处理器6上运行的第二计算机程序,所述POS终端7包括第三存储器8、第三处理器9及存储在所述第三存储器8上并可在所述第三处理器9上运行的第三计算机程序,所述密钥发送端10包括第四存储器11、第四处理器12及存储在所述第四存储器11上并可在所述第四处理器12上运行的第四计算机程序,所述第二处理器6执行所述第二计算机程序时实现实施例三中密钥接收端4执行的步骤;所述第三处理器9执行所述第三计算机程序时实现实施例三中POS终端7执行的步骤;所述第四处理器12执行所述第二计算机程序时实现实施例三中密钥发送端10执行的步骤。
实施例八
一种传递密钥的***13,包括密钥接收端4、POS终端7和密钥发送端10,所述密钥接收端4包括第二存储器5、第二处理器6及存储在所述第二存储器5上并可在所述第二处理器6上运行的第二计算机程序,所述POS终端7包括第三存储器8、第三处理器9及存储在所述第三存储器8上并可在所述第三处理器9上运行的第三计算机程序,所述密钥发送端10包括第四存储器11、第四处理器12及存储在所述第四存储器11上并可在所述第四处理器12上运行的第四计算机程序,所述第二处理器6执行所述第二计算机程序时实现实施例三中密钥接收端4执行的步骤;所述第三处理器9执行所述第三计算机程序时实现实施例三中POS终端7执行的步骤;所述第四处理器12执行所述第二计算机程序时实现实施例四中密钥发送端10执行的步骤。
综上所述,本发明提供的一种传递密钥的方法、终端及***,将待传递的第一密钥的传送密钥输入一POS终端,密钥发送端将待传递的第一密钥注入所述POS终端,通过所述POS终端采用所述传送密钥对所述第一密钥进行加密,得到密钥文件,所述POS端将所述密钥文件发送给密钥发送端,再由密钥发送端将所述密钥文件发送给密钥接收端,所述密钥文件包含第一密钥的校验值,接收端根据对校验值的正确性的判断,并且POS终端一旦检测到硬件异常,即自动清除密钥,防止密钥在传递过程中被篡改或泄露,借助POS终端实现密钥的安全传递,不需要人员出差实现注入,减少人员出差的成本,也不需要担心纸质传递方式的泄密问题,在保证传递的密钥安全可靠的前提下实现低成本的密钥传递。
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等同变换,或直接或间接运用在相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (22)

  1. 一种传递密钥的方法,其特征在于,包括步骤:
    S1、将待传递的第一密钥的传送密钥输入一POS终端;
    S2、接收密钥发送端发送的密钥文件,所述密钥文件是所述密钥发送端将待传递的第一密钥注入所述POS终端后从POS终端接收的,所述密钥文件包括所述POS终端采用所述传送密钥加密所述待传递的第一密钥后得到的加密数据;
    S3、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥。
  2. 根据权利要求1所述的一种传递密钥的方法,其特征在于,所述传送密钥包括多个传送密钥分量;
    所述步骤S1包括:
    通过与所述传送密钥分量一一对应的输入端分别将所述多个传送密钥分量输入所述POS终端。
  3. 根据权利要求2所述的一种传递密钥的方法,其特征在于,所述步骤S1之前包括:
    S0、通过与所述传送密钥分量一一对应的输入端分别传送验证口令至所述POS终端,判断是否接收到所述POS终端发送的验证口令通过的信息,若是,则执行步骤S1。
  4. 根据权利要求2或3所述的一种传递密钥的方法,其特征在于,所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量;
    所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
    所述第一密钥密文是所述POS终端采用所述第一传送密钥分量加密所述第一密钥后得到;
    所述第一密钥描述信息通过所述密钥发送端注入所述POS终端;
    所述第一密钥的第一验证码是所述POS终端采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码得到;
    所述步骤S3包括:
    采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第二验证码;
    判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥。
  5. 根据权利要求1至3中任一项所述的一种传递密钥的方法,其特征在于,所述密钥文件为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端打印出来的包含所述密钥文件的打印纸后拍照得到;
    或者密钥文件为所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式。
  6. 一种传递密钥的方法,其特征在于,包括步骤:
    S1、密钥接收端将待传递的第一密钥的传送密钥输入一POS终端;
    S2、密钥发送端将待传递的第一密钥注入所述POS终端;
    S3、所述POS终端采用所述传送密钥加密所述待传递的第一密钥,得到密钥文件,将所述密钥文件发送给所述密钥发送端;
    S4、所述密钥发送端将所述密钥文件发送给所述密钥接收端;
    S5、所述密钥接收端采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥。
  7. 根据权利要求6所述的一种传递密钥的方法,其特征在于,所述传送密钥包括多个传送密钥分量;
    所述步骤S1包括:
    所述密钥接收端通过与所述传送密钥分量一一对应的输入端分别将所述多个传送密钥分量输入所述POS终端。
  8. 根据权利要求7所述的一种传递密钥的方法,其特征在于,所述步骤S1之前包括:
    S0、所述密钥接收端通过与所述传送密钥分量一一对应的输入端分别传送验证口令至所述POS终端,判断是否接收到所述POS终端发送的验证口令通过的信息,若是,则执行步骤S1。
  9. 根据权利要求7或8所述的一种传递密钥的方法,其特征在于,所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量;
    所述步骤S2还包括:
    所述密钥发送端将所述第一密钥描述信息注入所述POS终端;
    所述步骤S3中所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
    所述POS终端采用所述第一传送密钥分量加密所述第一密钥,得到所述第一密钥密文;
    所述POS终端采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第一验证码;
    所述步骤S5包括:
    所述密钥接收端采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第二验证码;
    所述密钥接收端判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥。
  10. 根据权利要求6至8中任一项所述的一种传递密钥的方法,其特征在于,所述密钥文件为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端打印出来的包含所述密钥文件的打印纸后拍照得到;
    或者密钥文件为所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式。
  11. 根据权利要求6至8中任一项所述的一种传递密钥的方法,其特征在于,还包括:
    所述POS终端检测硬件是否异常,若是,则自动清除所述传送密钥。
  12. 一种传递密钥的终端,包括第一存储器、第一处理器及存储在所述第一存储器上并可在所述第一处理器上运行的第一计算机程序,其特征在于,所述第一处理器执行所述第一计算机程序时实现以下步骤:
    S1、将待传递的第一密钥的传送密钥输入一POS终端;
    S2、接收密钥发送端发送的密钥文件,所述密钥文件是所述密钥发送端将待传递的第一密钥注入所述POS终端后从POS终端接收的,所述密钥文件包括所述POS终端采用所述传送密钥加密所述待传递的第一密钥后得到的加密数据;
    S3、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥。
  13. 根据权利要求12所述的一种传递密钥的终端,其特征在于,所述传送密钥包括多个传送密钥分量;
    所述步骤S1包括:
    通过与所述传送密钥分量一一对应的输入端分别将所述多个传送密钥分量输入所述POS终端。
  14. 根据权利要求13所述的一种传递密钥的终端,其特征在于,所述步骤S1之前包括:
    S0、通过与所述传送密钥分量一一对应的输入端分别传送验证口令至所述POS终端,判断是否接收到所述POS终端发送的验证口令通过的信息,若是,则执行步骤S1。
  15. 根据权利要求13或14所述的一种传递密钥的终端,其特征在于,所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量;
    所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
    所述第一密钥密文是所述POS终端采用所述第一传送密钥分量加密所述第一密钥后得到;
    所述第一密钥描述信息通过所述密钥发送端注入所述POS终端;
    所述第一密钥的第一验证码是所述POS终端采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码得到;
    所述步骤S3包括:
    采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第二验证码;
    判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥。
  16. 根据权利要求12至14中任一项所述的一种传递密钥的终端,其特征在于,所述密钥文件为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端打印出来的包含所述密钥文件的打印纸后拍照得到;
    或者密钥文件为所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式。
  17. 一种传递密钥的***,包括密钥接收端、POS终端和密钥发送端,所述密钥接收端包括第二存储器、第二处理器及存储在所述第二存储器上并可在所述第二处理器上运行的第二计算机程序,所述POS终端包括第三存储器、第三处理器及存储在所述第三存储器上并可在所述第三处理器上运行的第三计算机程序,所述密钥发送端包括第四存储器、第四处理器及存储在所述第四存储器上并可在所述第四处理器上运行的第四计算机程序,其特征在于,所述第二处理器执行所述第二计算机程序时实现以下步骤:
    S11、将待传递的第一密钥的传送密钥输入一POS终端;
    S12、接收所述密钥发送端发送的密钥文件;
    S13、采用所述传送密钥对所述密钥文件进行解密得到所述第一密钥;
    所述第三处理器执行所述第三计算机程序时实现以下步骤:
    S21、接收所述密钥接收端输入的待传递的第一密钥的传送密钥;
    S22、接收所述密钥发送端注入的待传递的第一密钥;
    S23、采用所述传送密钥加密所述待传递的第一密钥,得到密钥文件,将所述密钥文件发送给所述密钥发送端;
    所述第四处理器执行所述第四计算机程序时实现以下步骤:
    S31、将待传递的第一密钥注入所述POS终端;
    S32、接收所述POS终端发送的密钥文件,将所述密钥文件发送给所述密钥接收端。
  18. 根据权利要求17所述的一种传递密钥的***,其特征在于,所述传送密钥包括多个传送密钥分量;
    所述S11包括:
    通过与所述传送密钥分量一一对应的输入端分别将所述多个传送密钥分量输入所述POS终端。
  19. 根据权利要求18所述的一种传递密钥的***,其特征在于,所述第二处理器执行所述第二计算机程序时实现以下步骤:
    所述步骤S11之前执行:
    S10、通过与所述传送密钥分量一一对应的输入端分别传送验证口令至所述POS终端,判断是否接收到所述POS终端发送的验证口令通过的信息,若是,则执行步骤S11。
  20. 根据权利要求18或19所述的一种传递密钥的***,其特征在于,所述多个传送密钥分量能够拼凑成第一传送密钥分量和第二传送密钥分量;
    所述步骤S31还包括:
    将所述第一密钥描述信息注入所述POS终端;
    所述步骤S22还包括:
    接收所述密钥发送端注入的所述第一密钥描述信息;
    所述步骤S23中所述密钥文件包括第一密钥密文、第一密钥描述信息和第一密钥的第一验证码;
    采用所述第一传送密钥分量加密所述第一密钥,得到所述第一密钥密文;
    采用所述第二传送密钥分量对所述第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第一验证码;
    所述步骤S13包括:
    采用所述第二传送密码分量对所述密钥文件中的第一密钥密文和所述第一密钥描述信息计算消息认证码,得到所述第一密钥的第二验证码;
    判断所述第一验证码与第二验证码是否相等,若是,则使用与所述第一密钥密文对应的解密密钥解密所述第一密钥密文,得到第一密钥。
  21. 根据权利要求17至19中任一项所述的一种传递密钥的***,其特征在于,所述密钥文件为电子照片形式,所述电子照片是所述密钥发送端接收到所述POS终端打印出来的包含所述密钥文件的打印纸后拍照得到;
    或者密钥文件为所述密钥发送端从所述POS终端接收的预设格式的包含所述密钥文件的电子文档形式。
  22. 根据权利要求17至19中任一项所述的一种传递密钥的***,其特征在于,所述第三处理器执行所述第三计算机程序时实现以下步骤:
    检测硬件是否异常,若是,则自动清除所述传送密钥。
PCT/CN2018/124364 2018-12-27 2018-12-27 一种传递密钥的方法、终端及*** WO2020133068A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201880002660.XA CN109792380B (zh) 2018-12-27 2018-12-27 一种传递密钥的方法、终端及***
PCT/CN2018/124364 WO2020133068A1 (zh) 2018-12-27 2018-12-27 一种传递密钥的方法、终端及***

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/124364 WO2020133068A1 (zh) 2018-12-27 2018-12-27 一种传递密钥的方法、终端及***

Publications (1)

Publication Number Publication Date
WO2020133068A1 true WO2020133068A1 (zh) 2020-07-02

Family

ID=66499483

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/124364 WO2020133068A1 (zh) 2018-12-27 2018-12-27 一种传递密钥的方法、终端及***

Country Status (2)

Country Link
CN (1) CN109792380B (zh)
WO (1) WO2020133068A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746801B (zh) * 2021-07-30 2023-07-11 佛山市青松科技股份有限公司 基于临时密钥的通信方法、发送终端、接收终端及***
CN117135000B (zh) * 2023-10-27 2024-02-02 深圳鼎智通讯有限公司 一种pos机动态数据远程管理方法及***

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020056039A1 (en) * 2000-11-04 2002-05-09 Korea Telecom System for providing certification confirming agency service using double electronic signature
CN103220270A (zh) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和***
CN106027247A (zh) * 2016-07-29 2016-10-12 宁夏丝路通网络支付有限公司北京分公司 Pos密钥远程下发方法
CN108183795A (zh) * 2017-12-29 2018-06-19 新开普电子股份有限公司 一卡通密钥管理方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7627125B2 (en) * 2005-06-23 2009-12-01 Efunds Corporation Key loading systems and methods
CN103237005A (zh) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 密钥管理方法及***
CN103220271A (zh) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和***
CN105260884A (zh) * 2015-11-18 2016-01-20 北京微智全景信息技术有限公司 Pos机密钥分发方法及装置
CN107666479A (zh) * 2017-08-02 2018-02-06 上海壹账通金融科技有限公司 信息加密解密方法、装置、计算机设备和存储介质
WO2019153110A1 (zh) * 2018-02-06 2019-08-15 福建联迪商用设备有限公司 一种传输密钥的方法、接收终端和分发终端
CN108496336A (zh) * 2018-03-21 2018-09-04 福建联迪商用设备有限公司 一种传输密钥的方法及pos终端
CN108513704B (zh) * 2018-04-17 2021-01-19 福建联迪商用设备有限公司 终端主密钥的远程分发方法及其***

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020056039A1 (en) * 2000-11-04 2002-05-09 Korea Telecom System for providing certification confirming agency service using double electronic signature
CN103220270A (zh) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 密钥下载方法、管理方法、下载管理方法及装置和***
CN106027247A (zh) * 2016-07-29 2016-10-12 宁夏丝路通网络支付有限公司北京分公司 Pos密钥远程下发方法
CN108183795A (zh) * 2017-12-29 2018-06-19 新开普电子股份有限公司 一卡通密钥管理方法

Also Published As

Publication number Publication date
CN109792380A (zh) 2019-05-21
CN109792380B (zh) 2022-08-16

Similar Documents

Publication Publication Date Title
CN108092776B (zh) 一种基于身份认证服务器和身份认证令牌的***
US9253162B2 (en) Intelligent card secure communication method
CN103118027B (zh) 基于国密算法建立tls通道的方法
CN107786550B (zh) 一种自助设备的安全通信方法、安全通信***及自助设备
EP2204008B1 (en) Credential provisioning
CN107248075B (zh) 一种实现智能密钥设备双向认证和交易的方法及装置
CN103338215A (zh) 基于国密算法建立tls通道的方法
CN109379387B (zh) 一种物联网设备间的安全认证和数据通信***
EP3001598B1 (en) Method and system for backing up private key in electronic signature token
US9215070B2 (en) Method for the cryptographic protection of an application
CN101771699A (zh) 一种提高SaaS应用安全性的方法及***
CN103714639A (zh) 一种实现对pos终端安全操作的方法及***
JP5954609B1 (ja) 電子署名トークンの私有鍵のバックアップ方法およびシステム
CN106953732B (zh) 芯片卡的密钥管理***及方法
CN107104795B (zh) Rsa密钥对和证书的注入方法、架构及***
CN105162808A (zh) 一种基于国密算法的安全登录方法
CN113726733B (zh) 一种基于可信执行环境的加密智能合约隐私保护方法
CN114692218A (zh) 一种面向个人用户的电子签章方法、设备和***
CN111435390A (zh) 一种配电终端运维工具安全防护方法
CN114267100A (zh) 开锁认证方法、装置、安全芯片及电子钥匙管理***
WO2020133068A1 (zh) 一种传递密钥的方法、终端及***
CN112865965B (zh) 一种基于量子密钥的列车业务数据处理方法及***
CN111435389A (zh) 一种配电终端运维工具安全防护***
CN111817856B (zh) 基于零知识证明和密码技术的身份认证方法及认证***
CN103916237B (zh) 对用户加密密钥恢复进行管理的方法和***

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18944285

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18944285

Country of ref document: EP

Kind code of ref document: A1