Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for transmitting keys, receiving terminal and distribution terminal

A technology for receiving terminals and transmitting keys, which is applied in the field of data processing, can solve problems such as increasing the operation and maintenance cost of POS equipment, a large amount of manpower, and slowing down the speed of business expansion, so as to improve convenience and security, reduce labor costs, and meet safety effect

Active Publication Date: 2018-08-14
FUJIAN LANDI COMML EQUIP CO LTD
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Disadvantage 1: In the safe room, the key is downloaded to the POS through serial communication, and the POS is required to be sent to the safe room uniformly. It requires a lot of manpower to complete the injection of MK, which greatly increases the operation and maintenance cost of the POS equipment.
[0007] Disadvantage 2: The terminal equipment leaving the factory should be sent to the terminal key management agency first, and then resent to the actual user of the terminal after completing the terminal key injection work, which has caused huge expenses for business development, including time costs and manpower costs, etc., while slowing down the speed of business expansion
[0008] Disadvantage 3: Due to the traditional method, POS is required to download MK directly to the device through physical means in the safe room, and the operation and maintenance cost of fixed MK regular replacement is huge. In order to save business costs, some customers will omit this transaction, and In the long run, this will pose a threat to the security of MK keys in POS devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for transmitting keys, receiving terminal and distribution terminal
  • Method for transmitting keys, receiving terminal and distribution terminal
  • Method for transmitting keys, receiving terminal and distribution terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0128] This embodiment provides a method for transmitting a key, including:

[0129] S1. The receiving terminal obtains the first public key certificate from the authentication terminal; the distribution terminal obtains the second public key certificate from the authentication terminal; the authentication terminal is used to confirm the legitimacy of the terminal and issue a digital certificate.

[0130]Optionally, the receiving terminal is a POS machine.

[0131] Wherein, since this embodiment involves certificates, implementing this solution requires deploying a certification terminal (Certification Authority certification center) to build an effective PKI system. In this embodiment, the manufacturer establishes its own authentication terminal, and its main task is to perform identity authentication on the receiving terminal and the distribution terminal and issue digital certificates.

[0132] Optionally, the process for the receiving terminal to obtain the first public k...

Embodiment 2

[0184] This embodiment provides a receiving terminal, including one or more first processors 1 and a first memory 2, the first memory 2 stores a program, and is configured to be controlled by the one or more first processors 1Perform the following steps:

[0185] S1. Obtain a first public key certificate from an authentication terminal; the authentication terminal is used to confirm the legitimacy of the terminal and issue a digital certificate.

[0186] S2. Send the first public key certificate to the distribution terminal, so that the distribution terminal verifies the validity of the first public key certificate.

[0187] S3. Verify the validity of the second public key certificate from the distribution terminal to obtain a first verification result; the first verification result includes a valid certificate and an invalid certificate. Specifically:

[0188] Obtain the verification public key from the authentication terminal;

[0189] Verifying the validity of the second...

Embodiment 3

[0202] This embodiment provides a distribution terminal, including one or more second processors 3 and a second memory 4, the second memory 4 stores a program, and is configured to be controlled by the one or more second processors 3 Perform the following steps:

[0203] S1. Obtain a second public key certificate from an authentication terminal; the authentication terminal is used to confirm the legitimacy of the terminal and issue a digital certificate.

[0204] S2. Verify the validity of the first public key certificate from the receiving terminal, and obtain a third verification result; the third verification result includes valid certificate and invalid certificate; specifically:

[0205] Obtain the verification public key from the authentication terminal;

[0206] Verifying the validity of the first public key certificate according to the verification public key to obtain a third verification result.

[0207] S3. When the third verification result is that the certificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of data processing, and in particular, to a method for transmitting keys, a receiving terminal, and a distribution terminal. The method for transmitting keysincludes the steps: transmitting a first public key certificate to the distribution terminal, so as to enable the distribution terminal to verify validity of the first public key certificate; verifying validity of a second public key certificate from the distribution terminal, and obtaining a first verification result which includes certificate validation and certificate invalidation; when the first verification result is that the certificate is valid, sending a key distribution request to the distribution terminal; and according to a response message sent from the distribution terminal, obtaining a specific key. The method for transmitting keys can improve convenience and security of transmitting the key at the same time.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a key transmission method, a receiving terminal and a distribution terminal. Background technique [0002] With the rapid development of the electronic payment industry, such as bank card payment, consumer card payment, industry card payment and other electronic payment technologies through the network, they are more and more popular due to their fast and convenient features. [0003] The electronic payment system includes components such as terminal equipment, acquiring platform and bank core system. In order to ensure the security of consumers' personal sensitive information during the payment process, it is required to encrypt the personal sensitive information during the transaction process, mainly through the key of Master Key / Session Key (MK / SK) system to complete. Taking POS (Point of Sale, POS) consumption transactions as an example, the principle of terminal equipment pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08
CPCH04L9/0825H04L9/30H04L9/3263H04L63/0442H04L63/0869H04L9/0822H04L9/3247H04L9/3268H04L63/062H04L63/0823H04L63/126
Inventor 唐胤曦徐永标
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products