[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105678543B - Pay cipher key calculation method and apparatus - Google Patents

Pay cipher key calculation method and apparatus Download PDF

Info

Publication number
CN105678543B
CN105678543B CN201511030922.8A CN201511030922A CN105678543B CN 105678543 B CN105678543 B CN 105678543B CN 201511030922 A CN201511030922 A CN 201511030922A CN 105678543 B CN105678543 B CN 105678543B
Authority
CN
China
Prior art keywords
payment
terminal
application software
key
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201511030922.8A
Other languages
Chinese (zh)
Other versions
CN105678543A (en
Inventor
卢道和
陈朝亮
杨军
韩海燕
黄兵
黎成
孙曦
邓翔
蔡毅
方镇举
邓志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN201511030922.8A priority Critical patent/CN105678543B/en
Publication of CN105678543A publication Critical patent/CN105678543A/en
Application granted granted Critical
Publication of CN105678543B publication Critical patent/CN105678543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1011Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of payment cipher key calculation method and apparatus, and the method comprising the steps of: receiving the first facility information of terminal that payment application software is sent in terminal, be the terminal configuring identifier according to first facility information;The identifier is sent to the payment application software, and the payment account in the identifier and the payment application software is bound;If detecting the more new command for updating parameter in the payment application software, the first limitation key is calculated by Encryption Algorithm according to the parameter in parameter needed for obtaining calculating the first limitation key;The first limitation key is sent to the payment application software, when detecting the operational order paid for the payment application software, according to the identifier and the first limitation key, the second limitation key is calculated by the Encryption Algorithm.The present invention prevents the risk used after limitation Key Exposure in other terminals.

Description

Pay cipher key calculation method and apparatus
Technical field
The present invention relates to terminal payment technical field more particularly to a kind of payment cipher key calculation method and apparatus.
Background technique
With the fast development of terminal, and the convenience carried, more and more users carry out delivery operation at the terminal. But due to the opening of terminal computing resource, currently based on HCE (host-based cardemulation, Intrusion Detection based on host Card mold is quasi-) NFC (Near Field Communication, the short distance wireless communication technology) the payment application realized of technology faces Very big security risk.Usually using the security risk of NFC payment is reduced in conjunction with cloud payment, payment process beyond the clouds In, having mostly used limitation cipher key technique, i.e. the corresponding card master key of cloud payment account is placed on cloud payment back-stage management, and The application cryptogram for calculating transaction being stored in user terminal payment application software is by card master key according to some points Scattered Factor minute sheds the limitation key come, these limitation keys restriction access times or validity period, can reduce key and be leaked Risk of loss caused by afterwards.
But at present in existing limitation cipher key calculation method, do not tie up and using the terminal device foundation of the key Determine relationship, this there is after limitation key is leaked in the terminal, can be propped up in other terminals using the limitation key Operation is paid, user's monetary losses are caused.
Summary of the invention
The main purpose of the present invention is to provide a kind of payment cipher key calculation method and apparatus, it is intended to solve in the prior art After limitation key is leaked in the terminal, delivery operation can be carried out using the limitation key in other terminals, user is caused to provide The technical issues of gold loss.
To achieve the above object, the present invention provides a kind of payment cipher key calculation method, comprising steps of
The first facility information of terminal that payment application software is sent in terminal is received, according to first facility information of terminal For the terminal configuring identifier;
The identifier is sent to the payment application software, and will be in the identifier and the payment application software Payment account binding;
If detecting the more new command for updating parameter in the payment application software, the first limitation of calculating key institute is obtained Parameter is needed, according to the parameter, the first limitation key is calculated by Encryption Algorithm;
By it is described first limitation key be sent to the payment application software, for the payment application software detect into When the operational order of row payment, according to the identifier and the first limitation key, it is calculated by the Encryption Algorithm Second limitation key.
Preferably, described to receive the first facility information of terminal that payment application software is sent in terminal, according to the terminal After the step of first facility information is the terminal configuring identifier, further includes:
It is that the identifier establishes first eigenvector according to first facility information of terminal;
It is described that the identifier is sent to the payment application software and the identifier and payment application is soft After the step of payment account in part is bound, further includes:
Determine that the instruction that detects is to update in the payment application software the more new command of parameter or to the payment The management instruction of payment account in application software;
If the instruction detected is to receive the payment to the management instruction of payment account in the payment application software The second facility information of terminal that application software is sent;
Second feature vector is established according to the identifier that second facility information of terminal is the terminal;
If the similarity between the first eigenvector and the second feature vector is greater than default similarity, determine The management instruction to the payment account is executable instruction.
Preferably, described that second feature vector is established according to the identifier that second facility information of terminal is the terminal The step of after, further includes:
Calculate the similarity between the first eigenvector and the second feature vector;
Judge whether the similarity is greater than the default similarity;
If the similarity is less than or equal to the default similarity, the management to the payment account is determined There are risks for instruction.
Preferably, if described detect the more new command for updating parameter in the payment application software, calculating the is obtained Parameter needed for one limitation key, according to the parameter, the step of the first limitation key is calculated by Encryption Algorithm packet It includes:
If detecting the more new command for updating parameter in the payment application software, master key, the branch of credit card issuer are obtained Pay card card number, Payment Card card sequence number, current time parameter and calculate it is described first limitation cipher key processes in distribute it is random Number;
According to the master key of the credit card issuer, the Payment Card card number and the Payment Card card sequence number, calculated by encryption The card key of the Payment Card is calculated in method;
According to the card key of the Payment Card, the time parameter and the random number, pass through the Encryption Algorithm meter Calculation obtains the first limitation key.
Preferably, the facility information include International Mobile Station Equipment Identification, international mobile subscriber identity, hardware address, The terminal device model, Internet protocol address, WiFi list, central processing unit information, memory information, screen resolution and Using installation list.
In addition, to achieve the above object, the present invention also provides a kind of payment cipher key calculation device, described device includes:
Configuration module, for receiving the first facility information of terminal for paying application software in terminal and sending, according to the end Holding the first facility information is the terminal configuring identifier;
First sending module, for the identifier to be sent to the payment application software, and by the identifier with Payment account binding in the payment application software;
First computing module, if being obtained for detecting the more new command for updating parameter in the payment application software The first limitation key is calculated by Encryption Algorithm according to the parameter in parameter needed for calculating the first limitation key;
Second sending module, for the first limitation key to be sent to the payment application software, for the branch Application software is paid when detecting the operational order paid, according to the identifier and the first limitation key, passes through institute It states Encryption Algorithm and the second limitation key is calculated.
Preferably, the payment cipher key calculation device further include:
First establishes module, for according to first facility information of terminal be the identifier establish fisrt feature to Amount;
Determining module, for determining that the instruction detected is to update the more new command for paying parameter in application software also It is the management instruction to payment account in the payment application software;
Receiving module, if the instruction for detecting is the management instruction to payment account in the payment application software, Then receive the second facility information of terminal that the payment application software is sent;
Second establishes module, for establishing the second spy according to the identifier that second facility information of terminal is the terminal Levy vector;
Determination module, if being greater than for the similarity between the first eigenvector and the second feature vector default Similarity then determines that the management instruction to the payment account is executable instruction.
Preferably, the payment cipher key calculation device further include:
Second computing module, for calculating the similarity between the first eigenvector and the second feature vector;
Judgment module, is also used to judge whether the similarity is greater than the default similarity;
The determination module, if being also used to the similarity less than or equal to the default similarity, determine described in To the management of payment account instruction, there are risks.
Preferably, first computing module includes:
Acquiring unit, if obtaining hair fastener for detecting the more new command for updating parameter in the payment application software Capable master key, Payment Card card number, Payment Card card sequence number, current time parameter and calculating the first limitation cipher key processes The random number of middle distribution;
First computing unit, for the master key, the Payment Card card number and the Payment Card card according to the credit card issuer The card key of the Payment Card is calculated by Encryption Algorithm for sequence number;
Second computing unit, for leading to according to the card key of the Payment Card, the time parameter and the random number It crosses the Encryption Algorithm and the first limitation key is calculated.
Preferably, the facility information include International Mobile Station Equipment Identification, international mobile subscriber identity, hardware address, The terminal device model, Internet protocol address, WiFi list, central processing unit information, memory information, screen resolution and Using installation list.
The identifier is sent to branch by being the terminal configuring identifier according to the facility information of terminal by the present invention Application software is paid, and the payment account in the identifier and the payment application software is bound, in payment process, works as institute State payment application software receive backstage send first limitation key when, according to the identifier and it is described first limitation key The second limitation key is calculated.It realizes after the second limitation key is lost, since the identifier of each terminal is different, Other users also can not carry out delivery operation using the second limitation key in other terminals, it is therefore prevented that limitation Key Exposure The risk used afterwards in other terminals protects the safety of user's fund.
Detailed description of the invention
Fig. 1 is the flow diagram of present invention payment cipher key calculation method first embodiment;
If Fig. 2 is to detect the more new command for updating parameter in the payment application software in the embodiment of the present invention, obtain The first limitation key is calculated by Encryption Algorithm according to the parameter in parameter needed for taking calculating the first limitation key A kind of flow diagram;
Fig. 3 is the flow diagram of present invention payment cipher key calculation method second embodiment;
Fig. 4 is the functional block diagram of present invention payment cipher key calculation device first embodiment;
Fig. 5 is a kind of the functional block diagram of the first computing module in the embodiment of the present invention;
Fig. 6 is the functional block diagram of present invention payment cipher key calculation device second embodiment.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present invention provides a kind of payment cipher key calculation method.
Referring to Fig.1, Fig. 1 is the flow diagram of present invention payment cipher key calculation method first embodiment.
In the present embodiment, the payment cipher key calculation method includes:
Step S10 receives the first facility information of terminal that payment application software is sent in terminal, according to the terminal first Facility information is the terminal configuring identifier;
Terminal in application fairground downloading payment application software and installs the payment application software by its user, when described After payment application software is installed successfully, the payment application software is scanned the terminal, acquires the terminal first and sets Standby information, and first facility information is sent in background server.Wherein, first facility information includes but unlimited In International Mobile Station Equipment Identification, international mobile subscriber identity, hardware address, the terminal device model, Internet protocol Location, WiFi list, central processing unit information, memory information, screen resolution and application installation list etc..The international movement is set Standby mark IMEI (International Mobile Equipment Identity) is made of, each movement 15 bit digitals Equipment has unique International Mobile Station Equipment Identification, and International Mobile Station Equipment Identification is that the whole world is unique;The international shifting Dynamic CUSTOMER ID IMSI (International Mobile Subscriber Identity) shares 15 codings, with SIM (Subscriber Identity Module, subscriber identification card) card or USIM (Universal Subscriber Identity Module, Global Subscriber identification card) card correspondence;The hardware address, i.e. MAC (Media Access Control, media access control) address, there are 6 byte lengths, indicates the identifier of each host on internet.
After the payment application software collects first facility information of terminal, by first facility information of terminal It is sent to background server.After the background server receives first facility information of terminal, the background server Unique identifier is configured for the terminal.Further, when the terminal detects the user by applying interface to hair When the operational order of cloud payment account is opened in card row application, the terminal prompts the user to input on the application interface Authentication information.After the terminal receives the authentication information of user's input, by the authentication information Be sent to background server, the background server according to the authentication information received to the application of the user into Row risk analysis, analyzed as a result, and the application of the user is classified according to the analysis result, directly pass through wind Danger reduces the application of user, the application of risk high user is then needed further to verify identity information, use very high for risk The application at family is then directly refused.
The identifier is sent to the payment application software, and the identifier and the payment is answered by step S20 It is bound with the payment account in software;
After the background server is that the terminal configures unique identifier, the background server is by the mark The payment application software being sent in the terminal is accorded with, and the payment account of the identifier and user application is bound, After the identifier and the payment account are bound, the background server is according to the identifier to the payment account It is managed, only when the identifier of the terminal is consistent with the identifier that the payment account is bound, the user just may be used It is grasped with data, download transactions voucher, the progress payment transaction etc. that execute downloading counterpart expenditure card in the payment application software Make.After the payment application software in the terminal receives the identifier that the background server is sent, the payment application Software encrypts the identifier.And encrypted identifier is stored in the terminal.
Step S30 obtains the first limit of calculating if detecting the more new command for updating parameter in the payment application software The first limitation key is calculated by Encryption Algorithm according to the parameter in parameter needed for key processed;
The first limitation key is sent to the payment application software, for the payment application software by step S40 When detecting the operational order paid, according to the identifier and the first limitation key, pass through the Encryption Algorithm The second limitation key is calculated.
When the background server, which detects, updates the more new command of parameter in the payment application software, such as detect The operational order that the user is paid in the payment application software, or detect the user and change the payment When the account of account and/or password etc. instruct, parameter needed for the background server obtains calculating the first limitation key, and according to It is close that the first limitation is calculated by 3DES (triple Data Encryption Standard) Encryption Algorithm in the parameter Key.Wherein, the limitation key is to download to from the background server restricted in the terminal beyond the clouds in payment process Access times and there is the key information using validity period, for calculating application cryptogram information in the cloud payment process.Institute It states background server and limits the payment application software that key is sent in the terminal for calculating resulting described first.When described After payment application software in terminal receives the first limitation key that the background server is sent, and detect described When user is using the operational order paid, key is limited according to the identifier of the terminal of its storage and described first, Corresponding second limitation key is calculated by the 3DES encryption algorithm.Further, when the payment application software meter After calculation obtains the second limitation key, the transaction data in Payment Card in application transaction counter, the application transaction are obtained The value range of counter is 0000~FFFF (maximum value is 65535), when the Payment Card write-in that bank is issued for it is personal After changing data, the initial value of the application transaction counter of the Payment Card is 0000, uses the payment when the user is every At card transaction one time, the numerical value in the application transaction counter is correspondingly increased 1.The payment application software is according to Transaction data and the second limitation key in application transaction counter, are calculated one by the 3DES encryption algorithm Temporary key.When the payment application software obtains the temporary key, the transaction data of counterpart expenditure account is obtained, according to It is close that corresponding application is calculated by the 3DES encryption algorithm in the transaction data of the payment account and the temporary key Text.After the payment application software obtains the application cryptogram, the application cryptogram is sent to the background server. After the background server receives the application cryptogram, the application cryptogram is verified, to complete this time to trade.
The identifier is sent to by the present embodiment by being the terminal configuring identifier according to the facility information of terminal Application software is paid, and the payment account in the identifier and the payment application software is bound, in payment process, when It is close according to the identifier and first limitation when payment application software receives the first limitation key that backstage is sent The second limitation key is calculated in key.It realizes after the second limitation key is lost, since the identifier of each terminal is different Sample, other users also can not carry out delivery operation using the second limitation key in other terminals, it is therefore prevented that limitation key The risk used after leakage in other terminals protects the safety of user's fund.
Referring to Fig. 2, if Fig. 2 is to detect the update update for paying parameter in application software in the embodiment of the present invention to refer to It enables, then parameter needed for obtaining calculating the first limitation key, according to the parameter, first limit is calculated by Encryption Algorithm A kind of flow diagram of key processed.
In the present embodiment, the step S30 includes:
Step S31 obtains the master of credit card issuer if detecting the more new command for updating parameter in the payment application software It is distributed in key, Payment Card card number, Payment Card card sequence number, current time parameter and calculating the first limitation cipher key processes Random number;
Step S32 leads to according to the master key of the credit card issuer, the Payment Card card number and the Payment Card card sequence number Cross the card key that the Payment Card is calculated in Encryption Algorithm;
Step S33 is added according to the card key of the Payment Card, the time parameter and the random number by described The first limitation key is calculated in close algorithm.
When the background server, which detects the user, updates the more new command of parameter in the payment application software, The background server obtains master key, Payment Card card number, Payment Card card sequence number, the current time parameter and meter of credit card issuer Calculate the random number distributed in the first limitation cipher key processes.The current time parameter is that the user uses the payment The time that application software is traded.The background server according to the master key of the credit card issuer, the Payment Card card number and The card key of the Payment Card is calculated by the 3DES encryption algorithm for the Payment Card card sequence number.After described When the card key of the Payment Card is calculated in platform server, the background server is close according to the card of the Payment Card The first limitation key is calculated by the 3DES encryption algorithm in key, the time parameter and the random number.
It is the flow diagram of present invention payment cipher key calculation method second embodiment referring to Fig. 3, Fig. 3, based on the present invention It pays cipher key calculation method first embodiment and proposes present invention payment cipher key calculation method second embodiment.
In the present embodiment, the payment cipher key calculation method further include:
Step S50 is that the identifier establishes first eigenvector according to first facility information of terminal;
When the background server obtains unique identifier of the terminal, the background server is by the terminal First facility information is standardized.Since the form of expression of certain information in first facility information of terminal is different It causes, it is lack of standardization, it is therefore desirable to first facility information of terminal is standardized, first facility information of terminal is made It is indicated in the form of defined.The background server will be standardized after the first facility information of the terminal as institute State the corresponding first eigenvector of the unique identifier of terminal.Further, institute is deleted when the user executes the terminal State payment application software operation, when the unique identifier stored in the terminal being caused to be deleted, when the user again When installing the payment application software using the terminal downloads, the background server obtains the payment reinstalled using soft The feature vector of part calculates the similarity between the feature vector of the terminal and the feature vector before deletion, according to described Similarity restores the identifier of the terminal when the similarity is greater than certain numerical value to restore the identifier of the terminal; When the similarity is less than or equal to the similarity, the identifier of the terminal is reacquired.
Step S60 determines that the instruction that detects is to update in the payment application software the more new command of parameter or right The management instruction of payment account in the payment application software;
Step S70, if the instruction detected is received to the management instruction of payment account in the payment application software The second facility information of terminal that the payment application software is sent;
Step S80 establishes second feature vector according to the identifier that second facility information of terminal is the terminal;
The background server determines that the operational order for detecting the user is that the user updates the payment application The more new command of parameter or the user instruct the management of payment account in the payment application software in software.Work as institute When stating operational order to be the user instructing the management of payment account in the payment application software, props up and pay a bill as described in changing The state at family or download transactions voucher etc., the payment application software in the terminal acquire second facility information of terminal, And second facility information of terminal is sent to the background server.It is soft that the background server receives the payment application The second facility information of the terminal that part is sent establishes the according to the identifier that second facility information of terminal is the terminal Two feature vectors.Second facility information includes but is not limited to International Mobile Station Equipment Identification, international mobile subscriber identity, hard Part address, the terminal device model, Internet protocol address, WiFi list, central processing unit information, memory information, screen Resolution ratio and application installation list.
Step S90, if the similarity between the first eigenvector and the second feature vector is similar greater than presetting Degree then determines that the management instruction to the payment account is executable instruction.
It is described when the similarity between the first eigenvector and the second feature vector is greater than default similarity Background server determines operational order of the user to the operational order for paying payment account in application software for safety. The default similarity can be set to 85%, 90% or 95%, such as when the default similarity is 90%, when described the When similarity between one feature vector and the second feature vector is greater than 90%.The background server determines the user Management instruction to the payment account is executable instruction.
Further, the payment cipher key calculation method further include:
Calculate the similarity between the first eigenvector and the second feature vector;
Judge whether the similarity is greater than the default similarity;
If the similarity is less than or equal to the default similarity, the management to the payment account is determined There are risks for instruction.
Further, the background server calculates the phase between the first eigenvector and the second feature vector Like degree, judge the similarity between the first eigenvector and the second feature vector whether be greater than it is described preset it is similar Degree, when the similarity between the first eigenvector and the second feature vector is less than or equal to the default similarity When, the background server determines management instruction of the user to the payment account, and there are risks.
The present embodiment according to the similarity between feature vector by determining user to propping up in the payment application software The enforceability that the management at family of paying a bill instructs, improves the safety of cloud payment.
The present invention further provides a kind of payment cipher key calculation devices.
It is the functional block diagram of present invention payment cipher key calculation device first embodiment referring to Fig. 4, Fig. 4.
In the present embodiment, the payment cipher key calculation device includes:
Configuration module 10, for receiving the first facility information of terminal for paying application software in terminal and sending, according to described The first facility information of terminal is the terminal configuring identifier;
Terminal in application fairground downloading payment application software and installs the payment application software by its user, when described After payment application software is installed successfully, the payment application software is scanned the terminal, acquires the terminal first and sets Standby information, and first facility information is sent in background server.Wherein, first facility information includes but unlimited In International Mobile Station Equipment Identification, international mobile subscriber identity, hardware address, the terminal device model, Internet protocol Location, WiFi list, central processing unit information, memory information, screen resolution and application installation list etc..The international movement is set Standby mark IMEI (International Mobile Equipment Identity) is made of, each movement 15 bit digitals Equipment has unique International Mobile Station Equipment Identification, and International Mobile Station Equipment Identification is that the whole world is unique;The international shifting Dynamic CUSTOMER ID IMSI (International Mobile Subscriber Identity) shares 15 codings, with SIM (Subscriber Identity Module, subscriber identification card) card or USIM (Universal Subscriber Identity Module, Global Subscriber identification card) card correspondence;The hardware address, i.e. MAC (Media Access Control, media access control) address, there are 6 byte lengths, indicates the identifier of each host on internet.
After the payment application software collects first facility information of terminal, by first facility information of terminal It is sent to background server.After the background server receives first facility information of terminal, the background server Unique identifier is configured for the terminal.Further, when the terminal detects the user by applying interface to hair When the operational order of cloud payment account is opened in card row application, the terminal prompts the user to input on the application interface Authentication information.After the terminal receives the authentication information of user's input, by the authentication information Be sent to background server, the background server according to the authentication information received to the application of the user into Row risk analysis, analyzed as a result, and the application of the user is classified according to the analysis result, directly pass through wind Danger reduces the application of user, the application of risk high user is then needed further to verify identity information, use very high for risk The application at family is then directly refused.
First sending module 20, for the identifier to be sent to the payment application software, and by the identifier It is bound with the payment account in the payment application software;
After the background server is that the terminal configures unique identifier, the background server is by the mark The payment application software being sent in the terminal is accorded with, and the payment account of the identifier and user application is bound, After the identifier and the payment account are bound, the background server is according to the identifier to the payment account It is managed, only when the identifier of the terminal is consistent with the identifier that the payment account is bound, the user just may be used It is grasped with data, download transactions voucher, the progress payment transaction etc. that execute downloading counterpart expenditure card in the payment application software Make.After the payment application software in the terminal receives the identifier that the background server is sent, the payment application Software encrypts the identifier.And encrypted identifier is stored in the terminal.
First computing module 30, if being obtained for detecting the more new command for updating parameter in the payment application software The first limitation key is calculated by Encryption Algorithm according to the parameter in parameter needed for taking calculating the first limitation key;
Second sending module 40, for the first limitation key to be sent to the payment application software, for described When payment application software detects the operational order paid, according to the identifier and the first limitation key, pass through The second limitation key is calculated in the Encryption Algorithm.
When the background server, which detects, updates the more new command of parameter in the payment application software, such as detect The operational order that the user is paid in the payment application software, or detect the user and change the payment When the account of account and/or password etc. instruct, parameter needed for the background server obtains calculating the first limitation key, and according to It is close that the first limitation is calculated by 3DES (triple Data Encryption Standard) Encryption Algorithm in the parameter Key.Wherein, the limitation key is to download to from the background server restricted in the terminal beyond the clouds in payment process Access times and there is the key information using validity period, for calculating application cryptogram information in the cloud payment process.Institute It states background server and limits the payment application software that key is sent in the terminal for calculating resulting described first.When described After payment application software in terminal receives the first limitation key that the background server is sent, and detect described When user is using the operational order paid, key is limited according to the identifier of the terminal of its storage and described first, Corresponding second limitation key is calculated by the 3DES encryption algorithm.Further, when the payment application software meter After calculation obtains the second limitation key, the transaction data in Payment Card in application transaction counter, the application transaction are obtained The value range of counter is 0000~FFFF (maximum value is 65535), when the Payment Card write-in that bank is issued for it is personal After changing data, the initial value of the application transaction counter of the Payment Card is 0000, uses the payment when the user is every At card transaction one time, the numerical value in the application transaction counter is correspondingly increased 1.The payment application software is according to Transaction data and the second limitation key in application transaction counter, are calculated one by the 3DES encryption algorithm Temporary key.When the payment application software obtains the temporary key, the transaction data of counterpart expenditure account is obtained, according to It is close that corresponding application is calculated by the 3DES encryption algorithm in the transaction data of the payment account and the temporary key Text.After the payment application software obtains the application cryptogram, the application cryptogram is sent to the background server. After the background server receives the application cryptogram, the application cryptogram is verified, to complete this time to trade.
The identifier is sent to by the present embodiment by being the terminal configuring identifier according to the facility information of terminal Application software is paid, and the payment account in the identifier and the payment application software is bound, in payment process, when It is close according to the identifier and first limitation when payment application software receives the first limitation key that backstage is sent The second limitation key is calculated in key.It realizes after the second limitation key is lost, since the identifier of each terminal is different Sample, other users also can not carry out delivery operation using the second limitation key in other terminals, it is therefore prevented that limitation key The risk used after leakage in other terminals protects the safety of user's fund.
It is a kind of the functional block diagram of the first computing module in the embodiment of the present invention referring to Fig. 5, Fig. 5.
In the present embodiment, first computing module 30 includes:
Acquiring unit 31, if obtaining hair for detecting the more new command for updating parameter in the payment application software Block master key, Payment Card card number, Payment Card card sequence number, current time parameter and calculating the first limitation key mistake of row The random number distributed in journey;
First computing unit 32, for the master key, the Payment Card card number and the Payment Card according to the credit card issuer The card key of the Payment Card is calculated by Encryption Algorithm for card sequence number;
Second computing unit 33, for according to the card key of the Payment Card, the time parameter and the random number, The first limitation key is calculated by the Encryption Algorithm.
When the background server, which detects the user, updates the more new command of parameter in the payment application software, The background server obtains master key, Payment Card card number, Payment Card card sequence number, the current time parameter and meter of credit card issuer Calculate the random number distributed in the first limitation cipher key processes.Master key of the background server according to the credit card issuer, institute Payment Card card number and the Payment Card card sequence number are stated, the card of the Payment Card is calculated by the 3DES encryption algorithm Key.When the card key of the Payment Card is calculated in the background server, the background server is according to the branch Card key, the time parameter and the random number for paying card, are calculated described first by the 3DES encryption algorithm Limit key.
It is the functional block diagram of present invention payment cipher key calculation device second embodiment referring to Fig. 6, Fig. 6, based on this Invention payment cipher key calculation device first embodiment proposes present invention payment cipher key calculation device second embodiment.
In the present embodiment, the payment cipher key calculation device includes:
First establishes module 50, for according to first facility information of terminal be the identifier establish fisrt feature to Amount;
When the background server obtains unique identifier of the terminal, the background server is by the terminal First facility information is standardized.Since the form of expression of certain information in first facility information of terminal is different It causes, it is lack of standardization, it is therefore desirable to first facility information of terminal is standardized, first facility information of terminal is made It is indicated in the form of defined.The background server will be standardized after the first facility information of the terminal as institute State the corresponding first eigenvector of the unique identifier of terminal.Further, institute is deleted when the user executes the terminal State payment application software operation, when the unique identifier stored in the terminal being caused to be deleted, when the user again When installing the payment application software using the terminal downloads, the background server obtains the payment reinstalled using soft The feature vector of part calculates the similarity between the feature vector of the terminal and the feature vector before deletion, according to described Similarity restores the identifier of the terminal when the similarity is greater than certain numerical value to restore the identifier of the terminal; When the similarity is less than or equal to the similarity, the identifier of the terminal is reacquired.
Determining module 60, for determining that the instruction detected is to update the more new command of parameter in the payment application software Or the management of payment account in the payment application software is instructed;
Receiving module 70, if the instruction for detecting is referred to the management of payment account in the payment application software It enables, then receives the second facility information of terminal that the payment application software is sent;
Second establishes module 80, for establishing second according to the identifier that second facility information of terminal is the terminal Feature vector;
The background server determines that the operational order for detecting the user is that the user updates the payment application The more new command of parameter or the user instruct the management of payment account in the payment application software in software.Work as institute When stating operational order to be the user instructing the management of payment account in the payment application software, props up and pay a bill as described in changing The state at family or download transactions voucher etc., the payment application software in the terminal acquire second facility information of terminal, And second facility information of terminal is sent to the background server.It is soft that the background server receives the payment application The second facility information of the terminal that part is sent establishes the according to the identifier that second facility information of terminal is the terminal Two feature vectors.Second facility information includes but is not limited to International Mobile Station Equipment Identification, international mobile subscriber identity, hard Part address, the terminal device model, Internet protocol address, WiFi list, central processing unit information, memory information, screen Resolution ratio and application installation list.
Determination module 90, if being greater than for the similarity between the first eigenvector and the second feature vector pre- If similarity, then determine that the management instruction to the payment account is executable instruction.
It is described when the similarity between the first eigenvector and the second feature vector is greater than default similarity Background server determines operational order of the user to the operational order for paying payment account in application software for safety. The default similarity can be set to 85%, 90% or 95%, such as when the default similarity is 90%, when described the When similarity between one feature vector and the second feature vector is greater than 90%.The background server determines the user Management instruction to the payment account is executable instruction.
Further, the payment cipher key calculation device further include:
Second computing module, for calculating the similarity between the first eigenvector and the second feature vector;
Judgment module, is also used to judge whether the similarity is greater than the default similarity;
The determination module 90 determines institute if being also used to the similarity less than or equal to the default similarity Stating the instruction of the management to the payment account, there are risks.
Further, the background server calculates the phase between the first eigenvector and the second feature vector Like degree, judge the similarity between the first eigenvector and the second feature vector whether be greater than it is described preset it is similar Degree, when the similarity between the first eigenvector and the second feature vector is less than or equal to the default similarity When, the background server determines management instruction of the user to the payment account, and there are risks.
The present embodiment according to the similarity between feature vector by determining user to propping up in the payment application software The enforceability that the management at family of paying a bill instructs, improves the safety of cloud payment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of payment cipher key calculation method, which is characterized in that the payment cipher key calculation method the following steps are included:
The first facility information of terminal that payment application software is sent in terminal is received, is institute according to first facility information of terminal State terminal configuring identifier;
The identifier is sent to the payment application software, and by the branch in the identifier and the payment application software Pay a bill family binding;
If detecting the more new command for updating parameter in the payment application software, ginseng needed for obtaining calculating the first limitation key The first limitation key is calculated by Encryption Algorithm according to the parameter in number;
The first limitation key is sent to the payment application software, is propped up so that the payment application software detects When the operational order paid, according to the identifier and the first limitation key, second is calculated by the Encryption Algorithm Limit key.
2. payment cipher key calculation method as described in claim 1, which is characterized in that pay application software in the reception terminal The first facility information of terminal of transmission, according to first facility information of terminal be the terminal configuring identifier the step of it Afterwards, further includes:
It is that the identifier establishes first eigenvector according to first facility information of terminal;
It is described that the identifier is sent to the payment application software, and will be in the identifier and the payment application software Payment account binding the step of after, further includes:
Determine that the instruction detected is to update the more new command of parameter in the payment application software or apply to the payment The management instruction of payment account in software;
If the instruction detected is the management instruction to payment account in the payment application software, the payment application is received The second facility information of terminal that software is sent;
Second feature vector is established according to the identifier that second facility information of terminal is the terminal;
If the similarity between the first eigenvector and the second feature vector, which is greater than, presets similarity, described in judgement Management instruction to the payment account is executable instruction.
3. payment cipher key calculation method as claimed in claim 2, which is characterized in that described to be believed according to second equipment of terminal After the step of breath establishes second feature vector for the identifier of the terminal, further includes:
Calculate the similarity between the first eigenvector and the second feature vector;
Judge whether the similarity is greater than the default similarity;
If the similarity is less than or equal to the default similarity, determine that the management to the payment account instructs There are risks.
4. payment cipher key calculation method as described in claim 1, which is characterized in that if described detect updates the payment and answer With the more new command of parameter in software, then parameter needed for obtaining calculating the first limitation key is calculated according to the parameter by encryption Method be calculated it is described first limitation key the step of include:
If detecting the more new command for updating parameter in the payment application software, master key, the Payment Card of credit card issuer are obtained The random number distributed in card number, Payment Card card sequence number, current time parameter and calculating the first limitation cipher key processes;
According to the master key of the credit card issuer, the Payment Card card number and the Payment Card card sequence number, pass through Encryption Algorithm meter Calculation obtains the card key of the Payment Card;
According to the card key of the Payment Card, the time parameter and the random number, calculated by the Encryption Algorithm To the first limitation key.
5. such as the described in any item payment cipher key calculation methods of Claims 1-4, which is characterized in that the facility information includes International Mobile Station Equipment Identification, international mobile subscriber identity, hardware address, the terminal device model, Internet protocol address, WiFi list, central processing unit information, memory information, screen resolution and application installation list.
6. a kind of payment cipher key calculation device, which is characterized in that the payment cipher key calculation device includes:
Configuration module, for receiving the first facility information of terminal for paying application software in terminal and sending, according to the terminal the One facility information is the terminal configuring identifier;
First sending module, for the identifier to be sent to the payment application software, and by the identifier with it is described Pay the payment account binding in application software;
First computing module, if obtaining calculating for detecting the more new command for updating parameter in the payment application software The first limitation key is calculated by Encryption Algorithm according to the parameter in parameter needed for first limitation key;
Second sending module, for the first limitation key to be sent to the payment application software, so that the payment is answered When detecting the operational order paid with software, according to the identifier and the first limitation key, added by described The second limitation key is calculated in close algorithm.
7. payment cipher key calculation device as claimed in claim 6, which is characterized in that the payment cipher key calculation device also wraps It includes:
First establishes module, for being that the identifier establishes first eigenvector according to first facility information of terminal;
Determining module, for determining that the instruction that detects is to update in the payment application software the more new command of parameter or right The management instruction of payment account in the payment application software;
Receiving module, if the instruction for detecting is connect to the management instruction of payment account in the payment application software Receive the second facility information of terminal that the payment application software is sent;
Second establishes module, for according to second facility information of terminal be the terminal identifier establish second feature to Amount;
Determination module, if similar greater than presetting for the similarity between the first eigenvector and the second feature vector Degree then determines that the management instruction to the payment account is executable instruction.
8. payment cipher key calculation device as claimed in claim 7, which is characterized in that the payment cipher key calculation device also wraps It includes:
Second computing module, for calculating the similarity between the first eigenvector and the second feature vector;
Judgment module, is also used to judge whether the similarity is greater than the default similarity;
The determination module determines described to institute if being also used to the similarity less than or equal to the default similarity State payment account management instruction there are risks.
9. payment cipher key calculation device as claimed in claim 6, which is characterized in that first computing module includes:
Acquiring unit, if obtaining credit card issuer for detecting the more new command for updating parameter in the payment application software Divide in master key, Payment Card card number, Payment Card card sequence number, current time parameter and calculating the first limitation cipher key processes The random number matched;
First computing unit, for the master key, the Payment Card card number and the Payment Card card sequence according to the credit card issuer Number, the card key of the Payment Card is calculated by Encryption Algorithm;
Second computing unit, for passing through institute according to the card key of the Payment Card, the time parameter and the random number It states Encryption Algorithm and the first limitation key is calculated.
10. such as the described in any item payment cipher key calculation devices of claim 6 to 9, which is characterized in that the facility information includes International Mobile Station Equipment Identification, international mobile subscriber identity, hardware address, the terminal device model, Internet protocol address, WiFi list, central processing unit information, memory information, screen resolution and application installation list.
CN201511030922.8A 2015-12-31 2015-12-31 Pay cipher key calculation method and apparatus Active CN105678543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511030922.8A CN105678543B (en) 2015-12-31 2015-12-31 Pay cipher key calculation method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511030922.8A CN105678543B (en) 2015-12-31 2015-12-31 Pay cipher key calculation method and apparatus

Publications (2)

Publication Number Publication Date
CN105678543A CN105678543A (en) 2016-06-15
CN105678543B true CN105678543B (en) 2019-11-29

Family

ID=56298377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511030922.8A Active CN105678543B (en) 2015-12-31 2015-12-31 Pay cipher key calculation method and apparatus

Country Status (1)

Country Link
CN (1) CN105678543B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357663A (en) * 2016-09-30 2017-01-25 中国银联股份有限公司 Data encryption method for host card emulation (HCE) mode
CN109754511B (en) * 2019-01-14 2021-05-14 深圳前海微众银行股份有限公司 Shopping cart equipment firmware updating method, system, platform, gateway and storage medium
CN117314430B (en) * 2023-11-22 2024-03-01 山东同其万疆科技创新有限公司 Payment data monitoring method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841416A (en) * 2009-12-31 2010-09-22 北京握奇数据系统有限公司 Method, device and system for realizing mobile phone bank
CN102402746A (en) * 2010-09-09 2012-04-04 深圳市财付通科技有限公司 Method, device and system for mobile payment safety validation
CN103400269A (en) * 2013-07-24 2013-11-20 江苏晓山信息产业股份有限公司 Smart community home gateway-based safety payment method
CN104504567A (en) * 2014-12-23 2015-04-08 城联数据有限公司 Recharge method and device of micro-payment card
CN104753675A (en) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 Information verification method, and electronic payment method, terminal, server and system
CN105046486A (en) * 2015-07-17 2015-11-11 百度在线网络技术(北京)有限公司 NFC-based mobile payment method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841416A (en) * 2009-12-31 2010-09-22 北京握奇数据系统有限公司 Method, device and system for realizing mobile phone bank
CN102402746A (en) * 2010-09-09 2012-04-04 深圳市财付通科技有限公司 Method, device and system for mobile payment safety validation
CN103400269A (en) * 2013-07-24 2013-11-20 江苏晓山信息产业股份有限公司 Smart community home gateway-based safety payment method
CN104753675A (en) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 Information verification method, and electronic payment method, terminal, server and system
CN104504567A (en) * 2014-12-23 2015-04-08 城联数据有限公司 Recharge method and device of micro-payment card
CN105046486A (en) * 2015-07-17 2015-11-11 百度在线网络技术(北京)有限公司 NFC-based mobile payment method and device

Also Published As

Publication number Publication date
CN105678543A (en) 2016-06-15

Similar Documents

Publication Publication Date Title
CN104601327B (en) A kind of safe verification method, relevant device and system
US10515352B2 (en) System and method for providing diverse secure data communication permissions to trusted applications on a portable communication device
US20150046323A1 (en) Method and system for local evaluation of computer
US20140143108A1 (en) Mobile device provisioning framework system
CN105678543B (en) Pay cipher key calculation method and apparatus
CN104469736B (en) A kind of data processing method, server and terminal
CN104268756A (en) Mobile payment method and system
AU2015230197A1 (en) Method of controlling access to a reserve zone with control of the validity of an access entitlement installed in the memory of a mobile terminal
CN104363589A (en) Identity authentication method, device and terminal
CN106203021A (en) The application login method of a kind of many certification modes integration and system
CN108228211A (en) Smart card, the method and system of intelligent card data security update
CN107948970A (en) System of real name method of network entry, system and the mobile terminal of subordinate terminal
CN104821951B (en) A kind of method and apparatus of secure communication
EP3104635B1 (en) Method for an improved installation of a secure-element-related service application in a secure element being located in a communication device, system and telecommunications network for an improved installation of a secure-element-related service application in a secure element being located in a communication device, program comprising a computer readable program code, and computer program product
US9836618B2 (en) System and method of authentication of a first party respective of a second party aided by a third party
CN106888448B (en) Application downloading method, secure element and terminal
CN105743651A (en) Method and apparatus for utilizing card application in chip security domain, and application terminal
CN105574720A (en) Secure information processing method and secure information processing apparatus
US20140136421A1 (en) Method of registering a membership for an electronic payment, system for same, and apparatus and terminal thereof
CN103475661A (en) Method and system for safely obtaining authentication programs
CN102999839A (en) Cloud platform and virtual SE (security element) based electronic currency security payment system and cloud platform and virtual SE based electronic currency security payment method
CN102685704B (en) Method and system for mobile phone trading
CN108133142A (en) A kind of mobile device remote connection and the method for manipulation PC machine
CN105678542A (en) Payment business interaction method, payment terminal and payment cloud terminal
CN106651366A (en) Mobile terminal and transaction confirmation method and device thereof, and smart card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant