×

KEY MANAGEMENT METHOD AND SYSTEM

  • US 20160028539A1
  • Filed: 01/23/2014
  • Published: 01/28/2016
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A key management method, characterized by comprising:

  • calling a first hardware and security module to generate a public key Pu and a private key Pr, storing the private key Pr in the first hardware and security module and sending the public key Pu to the security module of the POS terminal, by a MTMS system;

    calling the first hardware and security module by the MTMS system and calling the second hardware and security module by a KMS system to respectively combine MTMS access components and KMS access components into a protective key PK and a MAC key MAK in the respective hardware and security module and store the protective key PK and the MAC key MAK in the first hardware and security module and the second hardware and security module;

    controlling by the operating terminal to generate a transmission key TK and store the transmission key in the security module of the POS terminal, by an operating terminal, wherein the transmission key TK consists of a transmission encryption key TEK and an authentication key AUK;

    encrypting the transmission key TK by using the public key Pu to generate the first transmission key cipher text Ctk_Pu in the security module, by the POS terminal;

    sending the first transmission key cipher text Ctk_Pu and the terminal sequence number SN to the MTMS system through the operating terminal by the POS terminal;

    storing the received terminal sequence number SN and the first transmission key cipher text Ctk_Pu connectedly in the SN-Key_MTMS database by the MTMS system;

    calling the hardware and security module to decrypt the first transmission key cipher text Ctk_Pu by using the private key Pr so as to obtain the transmission key TK, then encrypting the transmission key TK by using the protective key PK and calculating the MAC value by using the MAC key MAK so as to generate the second transmission key cipher text Ctk_Pk by the MTMS system;

    sending the terminal sequence number SN and the second transmission key cipher text Ctk_Pk to the KMS system by the MTMS system;

    connectedly storing the terminal sequence number SN and the second transmission key cipher text Ctk_Pk sent from the MTMS system in the SN-TK_KMS database by the KMS system;

    sending the terminal sequence number SN and a downloading master key application to the KMS system by the POS terminal;

    inquiring about the second transmission key cipher text Ctk_Pk corresponding to the terminal sequence number SN by the KMS system after receiving the terminal sequence number and the downloading master key application sent by the POS terminal;

    calling the second hardware and security module to verify the MAC validity of the inquired-about second transmission key cipher text Ctk_Pk by using the MAC key MAK, and if the verification is passed, decrypting the second transmission key cipher text Ctk_Pk by using the protective key PK to obtain the transmission key TK, and storing the transmission key in the second hardware and security module, by the KMS system;

    calling the second hardware and security module to perform bidirectional authentication by using the authentication key AUK and the POS terminal by the KMS system after obtaining the transmission key TK, and if the authentication is passed, calling the second hardware and security module to encrypt the terminal master key TMK by using the transmission decryption key TEK so as to generate the master key cipher text Ctmk, and sending the master key cipher text to the POS terminal, by the KMS system;

    decrypting the master key cipher text Ctmk by using the transmission encryption key TEK to obtain the terminal master key TMK and storing the TMK in the security module, by the POS terminal after receiving the master key cipher text Ctmk sent by the KSM system.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×