CN111460405B - Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting - Google Patents

Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting Download PDF

Info

Publication number
CN111460405B
CN111460405B CN202010185438.7A CN202010185438A CN111460405B CN 111460405 B CN111460405 B CN 111460405B CN 202010185438 A CN202010185438 A CN 202010185438A CN 111460405 B CN111460405 B CN 111460405B
Authority
CN
China
Prior art keywords
certificate file
cabinet
password
certificate
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010185438.7A
Other languages
Chinese (zh)
Other versions
CN111460405A (en
Inventor
张恒
段琼
张登峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Centerm Information Co Ltd
Original Assignee
Fujian Centerm Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Centerm Information Co Ltd filed Critical Fujian Centerm Information Co Ltd
Priority to CN202010185438.7A priority Critical patent/CN111460405B/en
Publication of CN111460405A publication Critical patent/CN111460405A/en
Application granted granted Critical
Publication of CN111460405B publication Critical patent/CN111460405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/206Software aspects at ATMs

Abstract

The invention discloses a method for entering a background setting outside a cabinet, which comprises the following steps: monitoring whether a keyboard of equipment outside the cabinet is triggered according to a set rule; after triggering, judging whether a first certificate file is acquired or not, if yes, loading the first certificate file, and then generating a first cipher table; if not, loading a second certificate file, and then generating a second cipher table; acquiring an input password; inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to an inquiry result. The method, the device, the equipment and the medium for setting the external equipment to enter the background can dynamically adapt to various scenes for setting the external equipment to enter the background, and ensure the safety.

Description

Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting
Technical Field
The invention relates to the field of external equipment of a bank cabinet, in particular to a method, a device, equipment and a medium for entering a background setting of external equipment of the cabinet.
Background
Currently, the external cabinet devices such as the traditional external cabinet cleaner are commonly used by each big bank, compared with the common android device, the external cabinet device is required to be cut for safety in use, such as starting up to directly start service application, and shielding the original desktop of the system; shielding the upper and lower status bars, and stopping entering system setting through an operation screen; and a method for opening a developer mode such as masking ADB. At present, the design can greatly improve the safety of the equipment system, but lacks the convenience of maintenance such as self-detection, management, setting, upgrading and the like of equipment.
At present, some methods for setting the external cleaning equipment of the cabinets in the market to enter the background are performed by clicking a screen according to a rule, starting the access through an upper machine tool, and the like, and the methods are only used for triggering the access to a designated background setting interface, so that multiple scenes cannot be dynamically adapted, meanwhile, the possibility of false triggering exists, and the security cannot be guaranteed.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method, a device, equipment and a medium for setting the external equipment of a cabinet to enter the background, which can dynamically adapt to various scenes for setting the external equipment of the cabinet to enter the background and ensure the safety.
In a first aspect, the present invention provides a method for entering a background setting outside a cabinet, comprising:
step 10, monitoring whether a keyboard of equipment outside the cabinet is triggered according to a set rule, if not, continuing monitoring, and if so, entering a step 20;
step 20, judging whether a first certificate file is acquired, if yes, loading the first certificate file, and then generating a first cipher table; if not, loading a second certificate file, and then generating a second cipher table;
step 30, acquiring an input password;
and step 40, inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to the inquiry result.
Preferably, the first certificate file includes an encryption algorithm type, a key serial number and an encrypted first encryption table, the encrypted first encryption table is encrypted by using a key of an external device, and the steps of loading the first certificate file and then generating the first encryption table are further specifically as follows:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching the key in the external equipment according to the encryption algorithm type and the key serial number, and decrypting the encrypted first cipher table by using the key to obtain a decrypted first cipher table.
Preferably, the first certificate file further includes a certificate validity date, the validity of the first certificate file is judged according to the certificate validity date, and when the first certificate file is invalid, loading of the second certificate file is executed.
Preferably, the first certificate file is obtained from an external storage device connected to the outside of the cabinet.
In a second aspect, the present invention provides an apparatus for accessing a background setting outside a cabinet, comprising: the device comprises a monitoring module, a password table generating module, a password acquisition module and an execution module;
the monitoring module is used for monitoring whether a keyboard of equipment outside the cabinet is triggered according to a set rule, if not, continuing monitoring, and if so, entering the cipher table module;
the code table module is used for judging whether a first certificate file is acquired or not, if so, loading the first certificate file, and then generating a first code table; if not, loading a second certificate file, and then generating a second cipher table;
the password acquisition module is used for acquiring an input password;
the execution module is used for inquiring the input password in the first password table or the second password table, entering a background setting interface according to the inquiring result, triggering a background function or sending an error prompt.
Preferably, the first certificate file includes an encryption algorithm type, a key serial number and an encrypted first encryption table, the encrypted first encryption table is encrypted by using a key of an external device, and the steps of loading the first certificate file and then generating the first encryption table are further specifically as follows:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching the key in the external equipment according to the encryption algorithm type and the key serial number, and decrypting the encrypted first cipher table by using the key to obtain a decrypted first cipher table.
Preferably, the first certificate file further includes a certificate validity date, the validity of the first certificate file is judged according to the certificate validity date, and when the first certificate file is invalid, loading of the second certificate file is executed.
Preferably, the first certificate file is obtained from an external storage device connected to the outside of the cabinet.
In a third aspect, the invention provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of the first aspect when executing the program.
In a fourth aspect, the present invention provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the method of the first aspect.
One or more technical solutions provided in the embodiments of the present invention at least have the following technical effects or advantages:
1. whether the keyboard of the equipment outside the monitoring cabinet triggers the entering password input according to the set rule can be prevented to the greatest extent from mistakenly triggering the entering setting interface by a user so as to influence the handling of normal business; meanwhile, the operation is enough and convenient, and the use efficiency is not affected;
2. different functions are realized through various different passwords by more convenient configuration of the form of the password table, so that the method has quite good expansibility;
3. the validity of the operation can be ensured through the certificate file authorization form, the main body part of the certificate file can be prevented from being tampered maliciously by adopting an encryption mode, and the safety is greatly improved;
4. by setting the expiration date for the certificate file, the use of the password login function is further standardized, and the password login function is ensured not to be abused.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present invention more readily apparent.
Drawings
The invention will be further described with reference to examples of embodiments with reference to the accompanying drawings.
FIG. 1 is a flow chart of a method according to a first embodiment of the invention;
FIG. 2 is a schematic diagram of a device according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to a third embodiment of the present invention;
FIG. 4 is a schematic diagram of a medium structure in a fourth embodiment of the present invention;
FIG. 5 is a schematic diagram of certificate file composition in a fifth embodiment of the present invention;
FIG. 6 is a flow chart of a method in a fifth embodiment of the invention;
FIG. 7 is a schematic diagram of a cipher table in a fifth embodiment of the present invention;
fig. 8 is a schematic diagram of a password input interface in a fifth embodiment of the present invention.
Detailed Description
According to the method, the device, the equipment and the medium for setting the external equipment of the cabinet to enter the background, various scenes for setting the external equipment of the cabinet to enter the background can be dynamically adapted, and safety is guaranteed.
According to the technical scheme in the embodiment of the application, the overall thought is as follows:
1. instead of the screen being clicked on frequently, physical keys on the external device (e.g., an external cleaning device) should be used as a trigger medium for entering the background setting. In order to distinguish from the use of a conventional code keyboard, the triggering takes the form of a combination key.
2. In order to further avoid the situation of false triggering, the keyboard combination key is firstly entered into the password input interface after triggering, and the background is allowed to be entered only by inputting a correct password.
3. In order to support different passwords to enter different setting interfaces, dynamic configuration is convenient, a table (namely a password table) of the passwords and the specified functions is generated by loading certificate files in storage equipment (such as a TF card) before judging the passwords, different passwords are supported to enter different setting interfaces, and different non-interface functions are triggered by different passwords; if the storage device is not accessed, loading a default certificate file to ensure the minimum suitability.
4. In order to prevent the password table from being tampered, encrypting the password table, and attaching key information to form a certificate file; by judging the validity of the certificate file, the secret code table is determined not to be modified maliciously.
5. The certificate file provides a validity period for the certificate, ensuring that expired certificate files are not employed.
Example 1
The embodiment provides a method for entering a background setting outside a cabinet, as shown in fig. 1, which can comprise the following steps;
s101, monitoring whether a keyboard of equipment outside the cabinet is triggered by a set rule (for example, a cancel key is continuously pressed for 6 times), if not, continuing monitoring, and if so, entering S102;
s102, judging whether a first certificate file is acquired or not, if so, loading the first certificate file, and then generating a first cipher table; if not, loading a second certificate file, and then generating a second cipher table;
s103, acquiring an input password;
s104, inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to an inquiry result.
In order to support different passwords to enter different setting interfaces, dynamic configuration is convenient, a first password table is generated by acquiring a first certificate file (for example, a certificate file in external storage equipment) before judging the passwords, so that the different passwords are supported to enter the different setting interfaces, and different non-interface functions are triggered by the different passwords; if the first certificate file is not obtained, a second certificate file (e.g., a default certificate file stored in the off-board device) is loaded to generate a second encryption table (i.e., a default encryption table), ensuring minimal suitability.
In one possible implementation manner, the first certificate file includes an encryption algorithm type, a key serial number, and an encrypted first encryption table, the encrypted first encryption table is encrypted by using a key of an external device, and the steps of loading the first certificate file and then generating the first encryption table are further specifically:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching the key in the external equipment according to the encryption algorithm type and the key serial number, and decrypting the encrypted first cipher table by using the key to obtain a decrypted first cipher table.
In order to prevent the password table from being tampered, encrypting the password table, and attaching key information to form a certificate file; by judging the validity of the certificate file, the security code table is determined not to be modified maliciously, and the security is ensured.
In one possible implementation, the first certificate file further includes a certificate validity date, the validity of the first certificate file is determined according to the certificate validity date, and when the first certificate file is invalid (for example, the current time exceeds the certificate validity date), loading of the second certificate file is performed.
The certificate file provides the valid period of the certificate, ensures that the expired certificate file is not adopted, and further improves the security.
The first certificate file is obtained from an external storage device (such as a TF card) connected with the external equipment of the cabinet, so that the configuration is convenient and flexible.
Based on the same inventive concept, the present application also provides a device corresponding to the method in the first embodiment, and details of the second embodiment are described in the following.
Example two
In this embodiment, there is provided a device 200 for entering a background setting outside a cabinet, as shown in fig. 2, including: a monitoring module 201, a code table module 202, a code acquisition module 203 and an execution module 204;
the monitoring module 201 is configured to monitor whether a keyboard of an external device of the cabinet is triggered according to a set rule, if not, continue monitoring, if yes, enter the cipher table module 202;
the cipher table module 202 is configured to determine whether a first certificate file is obtained, if yes, load the first certificate file, and then generate a first cipher table; if not, loading a second certificate file, and then generating a second cipher table;
the password obtaining module 203 is configured to obtain an input password;
the execution module 204 is configured to query the first encryption table or the second encryption table for the input encryption, enter a background setting interface according to a query result, trigger a background function, or send an error prompt.
In one possible implementation manner, the first certificate file includes an encryption algorithm type, a key serial number, and an encrypted first encryption table, the encrypted first encryption table is encrypted by using a key of an external device, and the steps of loading the first certificate file and then generating the first encryption table are further specifically:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching the key in the external equipment according to the encryption algorithm type and the key serial number, and decrypting the encrypted first cipher table by using the key to obtain a decrypted first cipher table.
In one possible implementation manner, the first certificate file further includes a certificate validity date, the validity of the first certificate file is judged according to the certificate validity date, and when the first certificate file is invalid, loading of the second certificate file is performed.
In one possible implementation, the first certificate file is obtained from an external storage device connected to the outside of the cabinet.
Since the device described in the second embodiment of the present invention is a device for implementing the method described in the first embodiment of the present invention, based on the method described in the first embodiment of the present invention, a person skilled in the art can understand the specific structure and the deformation of the device, and thus the detailed description thereof is omitted herein. All devices used in the method according to the first embodiment of the present invention are within the scope of the present invention.
Based on the same inventive concept, the application provides an electronic device embodiment corresponding to the first embodiment, and the details of the third embodiment are described in detail.
Example III
The present embodiment provides an electronic device 300, as shown in fig. 3, including a memory 310, a processor 320, and a computer program 311 stored in the memory and capable of running on the processor, where any implementation of the first embodiment may be implemented when the processor 320 executes the computer program 311.
Since the electronic device described in this embodiment is a device for implementing the method described in the first embodiment of the present application, those skilled in the art will be able to understand the specific implementation of the electronic device and various modifications thereof based on the method described in the first embodiment of the present application, so how the method described in the embodiment of the present application is implemented in this electronic device will not be described in detail herein. The apparatus used to implement the methods of the embodiments of the present application are within the scope of what is intended to be protected by the present application.
Based on the same inventive concept, the application provides a storage medium corresponding to the first embodiment, and the details of the fourth embodiment are described in detail.
Example IV
The present embodiment provides a computer readable storage medium 400, as shown in fig. 4, on which a computer program 411 is stored, where the computer program 411 may implement any implementation of the first embodiment when executed by a processor.
Example five
The present embodiment is a specific application embodiment, please refer to fig. 5 to 8, which may include the following steps:
1. when leaving the factory, the external clearing equipment (hereinafter referred to as an equipment end) randomly generates 100 groups of international algorithm (3 DES) keys and 100 groups of national encryption algorithm (SM 4) keys through a key generation tool, and the keys are imported into a cipher keyboard encryption chip (hereinafter referred to as an encryption chip) of the equipment end for storage.
2. A set of keys is used randomly to synthesize a table of keys and other information into a certificate file. The certificate file is divided into a basic information part and a main body part: the basic information part comprises a key algorithm and a key serial number which are used by the encryption of the main body part; the main body part is the data encrypted by the appointed key, and specifically comprises a certificate issuer, a certificate effective date and a cipher table.
3. The external cabinet cleaning equipment starts key monitoring service in the idle state of the equipment, monitors the combination key broadcast returned by the encryption chip, and sends the trigger combination key broadcast to the equipment after the encryption chip monitors whether the keyboard is triggered by pressing a set rule (for example, the cancel key is continuously pressed for 6 times).
4. After the equipment end monitors the combination key broadcast, the equipment end scans the certificate file in the TF card, and if the TF card has no file, the loading program internally designates the certificate file for analysis.
5. The equipment end firstly reads the basic information part of the certificate file to obtain a key algorithm and a key serial number, and then transmits the key algorithm and the key serial number to the encryption chip; the encryption chip judges whether the algorithm is a 3DES algorithm or an SM4 algorithm according to the obtained algorithm type, obtains a designated key according to the key serial number, and then decrypts the main body part of the certificate file by using the key.
6. If the decryption is successful, judging whether the issuer is correct and whether the current system time is within the valid date of the certificate.
7. If the certificate is valid, the encryption table is analyzed, and different functions guided by different passwords are loaded into the memory.
8. The encryption tables may be represented in xml (fig. 7), each item containing a specific password, type of execution (going to an interface or executing a function), and application package and class names that are relied upon.
9. After the cipher table is loaded, the equipment end displays a cipher input interface (as shown in fig. 8); after the password is input and determined, searching is carried out according to the password table, and then corresponding operation is carried out. If the input password does not exist in the password table, prompting to input the password error.
The technical scheme provided in the embodiment of the application has at least the following technical effects or advantages: according to the method, the device, the equipment and the medium for setting the external equipment of the cabinet to enter the background, whether the keyboard of the external equipment of the cabinet triggers the entering password input according to the set rule is monitored, and the situation that a user mistakenly triggers the entering setting interface to influence the handling of normal business can be prevented to the greatest extent; meanwhile, the operation is enough and convenient, and the use efficiency is not affected; different functions are realized through various different passwords by more convenient configuration of the form of the password table, so that the method has quite good expansibility; the validity of the operation can be ensured through the certificate file authorization form, the main body part of the certificate file can be prevented from being tampered maliciously by adopting an encryption mode, and the safety is greatly improved; by setting the expiration date for the certificate file, the use of the password login function is further standardized, and the password login function is ensured not to be abused.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, device, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the invention, and that equivalent modifications and variations of the invention in light of the spirit of the invention will be covered by the claims of the present invention.

Claims (8)

1. A method for entering a background setting outside a cabinet, which is characterized in that: comprising the following steps:
step 10, monitoring whether a keyboard of equipment outside the cabinet is triggered according to a set rule, if not, continuing monitoring, and if so, entering a step 20;
step 20, judging whether a first certificate file is acquired, if yes, loading the first certificate file, and then generating a first cipher table; if not, loading a second certificate file, and then generating a second cipher table;
the first certificate file comprises an encryption algorithm type, a key serial number and an encrypted first cipher table, the encrypted first cipher table is encrypted by using a key of an external device, and the steps of loading the first certificate file and then generating the first cipher table are further specifically as follows:
loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching for a key from the external cabinet device according to the encryption algorithm type and the key serial number, and decrypting the encrypted first password table by using the key to obtain a decrypted first password table;
step 30, acquiring an input password;
and step 40, inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to the inquiry result.
2. A method of entering a background setting outside a cabinet according to claim 1, characterized by: the first certificate file also comprises a certificate effective date, the validity of the first certificate file is judged according to the certificate effective date, and when the first certificate file is invalid, loading of the second certificate file is executed.
3. A method of entering a background setting outside a cabinet according to claim 1 or 2, characterized in that: the first certificate file is obtained from an external storage device connected with the outside of the cabinet.
4. The utility model provides a device that cabinet external equipment got into backstage setting which characterized in that: comprising the following steps: the device comprises a monitoring module, a password table module, a password acquisition module and an execution module;
the monitoring module is used for monitoring whether a keyboard of equipment outside the cabinet is triggered according to a set rule, if not, continuing monitoring, and if so, entering the cipher table module;
the code table module is used for judging whether a first certificate file is acquired or not, if so, loading the first certificate file, and then generating a first code table; if not, loading a second certificate file, and then generating a second cipher table;
the first certificate file comprises an encryption algorithm type, a key serial number and an encrypted first cipher table, the encrypted first cipher table is encrypted by using a key of an external device, and the steps of loading the first certificate file and then generating the first cipher table are further specifically as follows:
loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching for the key from the external equipment according to the encryption algorithm type and the key serial number, and decrypting the encrypted first cipher table by using the key to obtain a decrypted first cipher table;
the password acquisition module is used for acquiring an input password;
the execution module is used for inquiring the input password in the first password table or the second password table, entering a background setting interface according to the inquiring result, triggering a background function or sending an error prompt.
5. A device for accessing a back-end setting outside a cabinet as defined in claim 4, wherein: the first certificate file also comprises a certificate effective date, the validity of the first certificate file is judged according to the certificate effective date, and when the first certificate file is invalid, loading of the second certificate file is executed.
6. A device for accessing a back-end setting outside a cabinet according to claim 4 or 5, characterized in that: the first certificate file is obtained from an external storage device connected with the outside of the cabinet.
7. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 3 when the program is executed by the processor.
8. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any one of claims 1 to 3.
CN202010185438.7A 2020-03-17 2020-03-17 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting Active CN111460405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010185438.7A CN111460405B (en) 2020-03-17 2020-03-17 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010185438.7A CN111460405B (en) 2020-03-17 2020-03-17 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting

Publications (2)

Publication Number Publication Date
CN111460405A CN111460405A (en) 2020-07-28
CN111460405B true CN111460405B (en) 2023-06-30

Family

ID=71682832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010185438.7A Active CN111460405B (en) 2020-03-17 2020-03-17 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting

Country Status (1)

Country Link
CN (1) CN111460405B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742658A (en) * 2021-07-22 2021-12-03 深圳市智微智能科技股份有限公司 adb tool encryption method, system, terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970288A (en) * 2012-11-09 2013-03-13 江苏乐买到网络科技有限公司 Network transaction system with dynamic password generator
CN105447358A (en) * 2015-12-04 2016-03-30 小米科技有限责任公司 Password setting method and apparatus
CN207937976U (en) * 2017-07-20 2018-10-02 中国建设银行股份有限公司 A kind of electronic signature interactive terminal equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2009200408B2 (en) * 2006-09-12 2012-05-10 Cpc Patent Technologies Pty Ltd Password generator
CN101828358B (en) * 2007-06-27 2012-07-04 环球标志株式会社 Server certificate issuing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970288A (en) * 2012-11-09 2013-03-13 江苏乐买到网络科技有限公司 Network transaction system with dynamic password generator
CN105447358A (en) * 2015-12-04 2016-03-30 小米科技有限责任公司 Password setting method and apparatus
CN207937976U (en) * 2017-07-20 2018-10-02 中国建设银行股份有限公司 A kind of electronic signature interactive terminal equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
安全网络认证平台的研究与设计;李锋等;《实验室研究与探索》;20100615(第06期);全文 *

Also Published As

Publication number Publication date
CN111460405A (en) 2020-07-28

Similar Documents

Publication Publication Date Title
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
CN100407174C (en) Data protection program and data protection method
US7587608B2 (en) Method and apparatus for storing data on the application layer in mobile devices
US11842348B2 (en) Data management system and data management method
CN110889130B (en) Database-based fine-grained data encryption method, system and device
US20030046566A1 (en) Method and apparatus for protecting software against unauthorized use
EP2251810B1 (en) Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method
CN107483495B (en) Big data cluster host management method, management system and server
US20090228450A1 (en) Digital right management client system and method thereof as well as digital right management system
JP2012524309A (en) Electronic ticket processing method and apparatus
US20170099144A1 (en) Embedded encryption platform comprising an algorithmically flexible multiple parameter encryption system
KR20080101333A (en) Secutiry method using virtual keyboard
US20160103988A1 (en) Secure automatic authorized access to any application through a third party
CN111475782A (en) API (application program interface) key protection method and system based on SGX (secure gateway) software extension instruction
WO2008118602A1 (en) Secure data storage and retrieval incorporating human participation
CN111475823A (en) Data sharing method, equipment, server and readable storage medium
CN111460405B (en) Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting
CN112468294A (en) Access method and authentication equipment for vehicle-mounted TBOX
US20110023083A1 (en) Method and apparatus for digital rights management for use in mobile communication terminal
CN114978605A (en) Page access method and device, electronic equipment and storage medium
JP4587688B2 (en) Encryption key management server, encryption key management program, encryption key acquisition terminal, encryption key acquisition program, encryption key management system, and encryption key management method
CN117375986A (en) Application access method, device and server
JP6711042B2 (en) Decryption program, encryption program, decryption device, encryption device, decryption method, and encryption method
CN116662957A (en) Identity authentication method, identity authentication device, computer readable storage medium and computer equipment
CN115643081A (en) Industrial control system authentication method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant