Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for remotely issuing POS key

A key and remote technology, applied in the field of POS key remote delivery, can solve the problem of high cost, save time and cost, and shorten the time for refilling

Inactive Publication Date: 2016-10-12
宁夏丝路通网络支付有限公司北京分公司
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In the traditional POS filling key is manually operated by the manufacturer through special software before the POS machine leaves the factory or before the merchant ships. high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for remotely issuing POS key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without cre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for remotely issuing a POS key, comprising the following steps in sequence: S1. a POS terminal uploads a request to acquire a public key to a management platform, and the management platform issues the public key to a POS machine; S2. the POS machine generates a transmission key at random, encrypts same using the public key, and uploads same to the management platform, and the management platform decrypts and verifies same using a private key; S3. after the transmission key passes validation, the management platform decrypts same to obtain transmission key plaintext, encrypts a master key using the transmission key plaintext, and returns same to the POS terminal; and S4. after decrypting same, the POS terminal encapsulates the master key in the machine, and notifies the platform of key encapsulation success. By means of the method for remotely issuing a POS key disclosed by the present invention, key encapsulation can be performed on each POS machine through a mechanism requested by a customer without performing key encapsulation on each POS machine by the manufacturer before it leaves the factory or by the merchant before delivery, thereby greatly saving time costs of key encapsulation.

Description

technical field [0001] The invention relates to the field of network payment security, in particular to a method for remotely issuing POS keys. Background technique [0002] In the prior art, a key is a parameter that is input in an algorithm that converts plaintext into ciphertext or converts ciphertext into plaintext. Keys are divided into symmetric keys and asymmetric keys. [0003] According to whether the encryption key and the decryption key used in the cryptographic algorithm are the same, and whether the decryption process can be deduced from the encryption process (or the encryption process can be deduced from the decryption process), the cryptosystem can be divided into symmetric cryptosystems (also called single Key cryptosystem, secret key cryptosystem, symmetric key cryptosystem) and asymmetric key cryptosystem (also called double key cryptosystem, public key cryptosystem, asymmetric key cryptosystem). [0004] Symmetric key encryption, also known as private k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08G06Q20/20
CPCH04L9/083G06Q20/20
Inventor 谷文仲程文华
Owner 宁夏丝路通网络支付有限公司北京分公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products