CN113808339A - Self-service system and verification method of self-service equipment - Google Patents

Self-service system and verification method of self-service equipment Download PDF

Info

Publication number
CN113808339A
CN113808339A CN202111093388.0A CN202111093388A CN113808339A CN 113808339 A CN113808339 A CN 113808339A CN 202111093388 A CN202111093388 A CN 202111093388A CN 113808339 A CN113808339 A CN 113808339A
Authority
CN
China
Prior art keywords
information
self
service
bank card
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111093388.0A
Other languages
Chinese (zh)
Inventor
黄文强
徐晨敏
訾志博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202111093388.0A priority Critical patent/CN113808339A/en
Publication of CN113808339A publication Critical patent/CN113808339A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/02Devices for alarm or indication, e.g. when empty; Advertising arrangements in coin-freed apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

The application provides a self-service system and a verification method of self-service equipment, which are applied to the field of information security or the field of finance. Wherein, self-service system includes: host computer and self-service equipment. The self-service equipment is used for writing the generated service number and verification information into the bank card after the bank card finishes the transaction, and sending first encryption information comprising the service number and the encrypted verification information to the upper computer; and the first request information including the service number stored by the bank card is sent to the upper computer before the bank card transacts the service again, so that the first encryption information is acquired from the upper computer, and when the authentication information acquired according to the first encryption information is consistent with the authentication information stored in the bank card, the transaction for the bank card is allowed. By utilizing the scheme provided by the application, the illegal equipment can be effectively prevented from stealing the information of the bank card.

Description

Self-service system and verification method of self-service equipment
Technical Field
The application relates to the technical field of information security, in particular to a self-service system and a verification method of self-service equipment.
Background
At present, when login operation or financial operation is performed on self-service equipment of a bank, the risk of information leakage of a bank card may exist. A typical scenario is that a lawbreaker places an illegal device similar to a card slot at a card slot of a self-service device of a bank, and after a user inserts a bank card into the illegal device, the illegal device can steal specific bank card information of the user when the self-service device reads the bank card information after the user inputs a password of the bank card, thereby bringing great hidden danger to property safety and information safety of the user.
Therefore, a scheme capable of effectively avoiding illegal equipment from stealing information of the bank card is needed.
Disclosure of Invention
In order to solve the technical problems in the prior art, the application provides a self-service system and a verification method of self-service equipment, which can effectively prevent illegal equipment from stealing bank card information.
In a first aspect, the present application provides a self-service system, comprising: host computer and self-service equipment. The self-service equipment can communicate with the upper computer. After the bank card transacts the business, the self-service equipment writes the generated business number and verification information into the bank card and sends first encryption information comprising the business number and the encrypted verification information to the upper computer. The self-service equipment sends first request information including a service number stored in the bank card to the upper computer before the bank card transacts the service again so as to obtain first encryption information from the upper computer, and when verification information obtained according to the first encryption information is consistent with the verification information stored in the bank card, the self-service equipment allows the service to be transacted for the bank card.
By utilizing the scheme provided by the application, after the previous business transaction of the bank card is completed, the bank card can bind the business number and the verification information, and sends the verification information to the upper computer after being encrypted, when the bank card transacts the business again, namely after the self-service equipment is inserted again, the self-service equipment acquires the encrypted verification information from the upper computer and decrypts the verification information according to the business number of the previous business transaction of the bank card, when the verification information obtained by decryption is consistent with the verification information bound on the bank card, the business transaction for the bank card is allowed, namely the self-service system is allowed to read the information of the bank card. Even if illegal equipment is installed at the card inserting port of the self-service system, the information of the bank card cannot be read because the illegal equipment cannot pass through the verification process, so that the illegal equipment can be prevented from stealing the information of the bank card, and the safety of the self-service equipment is improved.
In a possible implementation manner, the first encryption information further includes an identifier of an encryption algorithm;
the self-service equipment is specifically used for randomly selecting an encryption algorithm to encrypt the verification information after the bank card transacts business; and before the bank card transacts the business again, determining a corresponding encryption algorithm according to the identification of the encryption algorithm in the first encryption information acquired from the upper computer, and decrypting the encrypted verification information by using the corresponding encryption algorithm.
In a possible implementation manner, the first request information further includes a device identifier of the current self-service device. The upper computer is also used for sending first encryption information to the current self-service equipment when the identification of the equipment is correct. That is, only the device designated by the bank can read the bank card information.
In a possible implementation manner, the upper computer is further configured to perform an early warning operation when the verification device identifier is incorrect, where the early warning operation includes one or more of displaying abnormal information on the current self-service device, or stopping providing services for the current self-service device.
In one possible implementation, the verification information is a character string, and the verification information includes at least one of the following:
letters, numbers or special characters.
In one possible implementation, the self-service device is any one of the following:
an automatic teller machine, or a POS machine.
In a second aspect, the present application further provides a verification method for a self-service device, which is applied to the self-service device, and the method includes the following steps:
after the bank card finishes transacting the business, writing the generated business number and verification information into the bank card, and sending first encryption information comprising the business number and the encrypted verification information to an upper computer;
before the bank card transacts the business again, sending first request information including a business number stored by the bank card to the upper computer;
and acquiring first encrypted information sent by the upper computer, and allowing the bank card to handle business when the verification information acquired according to the first encrypted information is consistent with the verification information stored on the bank card.
In summary, with the method provided by the embodiment of the present application, even if an illegal device is installed at the card slot of the self-service system, since the illegal device cannot pass through the verification process, the information of the bank card cannot be read, that is, the illegal device can be prevented from stealing the information of the bank card, and the security of the self-service device is improved.
In one possible implementation, the method further includes:
after the transaction of the bank card is completed, randomly selecting an encryption algorithm to encrypt the verification information, wherein the identifier of the encryption algorithm is included in the first encryption information;
at this time, when the verification information obtained according to the first encryption information is consistent with the verification information stored on the bank card, the business transaction for the bank card is allowed, which specifically includes:
and determining a corresponding encryption algorithm according to the identification of the encryption algorithm in the first encryption information acquired from the upper computer, decrypting the encrypted verification information by using the corresponding encryption algorithm, and allowing the bank card to transact business when the verification information obtained after decryption is consistent with the verification information stored on the bank card.
In one possible implementation, the method further includes:
and before the bank card transacts the business again, sending a self equipment identifier to the upper computer, wherein the self equipment identifier is included in the first request information.
In one possible implementation, the verification information is a character string, and the verification information includes at least one of the following:
letters, numbers or special characters.
In a third aspect, the present application further provides a verification method for a self-service device, which is applied to an upper computer, and the method includes the following steps:
receiving and storing first encrypted information sent by self-service equipment;
receiving first request information sent by self-service equipment, and sending first encrypted information corresponding to a service number in the first request information to the self-service equipment.
In a possible implementation manner, the first request information further includes a device identifier of the current self-service device, and the method further includes the following steps:
and when the identification of the verification equipment is correct, sending first encryption information corresponding to the service number in the first request information to the current self-service equipment.
In one possible implementation, the method further comprises the steps of:
when the verification device identification is wrong, executing early warning operation, wherein the early warning operation comprises at least one of the following operations:
and displaying the abnormal information by the current self-service equipment, or stopping providing the service by the current self-service equipment.
Drawings
Fig. 1 is a schematic view of a scenario when information of a bank card provided by the present application is leaked;
fig. 2 is a schematic diagram of a self-service system according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a communication process of a self-service system according to an embodiment of the present disclosure;
fig. 4 is a flowchart illustrating a verification method of a self-service device according to an embodiment of the present disclosure when the verification method is applied to the self-service device;
fig. 5 is a flowchart of a verification method of the self-service device according to the embodiment of the present application when the verification method is applied to an upper computer.
Detailed Description
In order to make the technical solution more clearly understood by those skilled in the art, an application scenario of the technical solution of the present application is first described below.
Referring to fig. 1, the figure is a schematic view of a scenario when information of a bank card provided by the present application is leaked.
For a bank's self-service device 10, it typically includes a keypad 101, a display screen 102, and a card slot 103. When the self-service device is an automatic depository, the self-service device 10 may also include a deposit port; when the self-service device is an automatic teller machine, the self-service device 10 may further include a withdrawal port; when the self-service device supports both deposit and withdrawal, the withdrawal port and the deposit port may be shared. The embodiment of the present application does not limit the specific type of the self-service device 10.
The lawbreaker sets an illegal device 20 at the card insertion slot to acquire the bank card information, and the following description will take an example that the illegal device 20 is specifically a card reader.
In order to acquire the bank card information of the user, lawbreakers firstly select a corresponding card reader cover template according to the shape of the card insertion opening 103 of the self-service device 10, the card reader cover is fixed on the card insertion opening 103, then the card reader of the bank card is arranged under the card reader cover, and then the appearance is disguised. Lawbreakers search for a hidden position near the keyboard 101 and install a miniature camera for shooting the password of the bank card.
When a user inserts a bank card into the card slot 103, the bank card passes through the card slot on the cover of the card reader installed by a lawless person, and after the user inputs a password and passes verification, the card reader reads information of the bank card and records information such as a card number and a transaction record.
At the same time, when the user enters the password on the self-service device 10 without taking any blocking action, it is recorded by the camera above the keyboard.
Lawbreakers access the card reader of the recorded information such as the bank card number to a computer for collection, connect the bank card duplicator with the computer through special computer software, and write the stolen bank card information into a blank magnetic card by using the bank card duplicator, thereby realizing the duplication of the bank card.
In order to solve the above problems, embodiments of the present application provide a self-service system and a verification method for a self-service device. The self-service system comprises an upper computer and self-service equipment. The self-service equipment can communicate with the upper computer. After the bank card transacts the business, the self-service equipment writes the generated business number and verification information into the bank card and sends first encryption information comprising the business number and the encrypted verification information to the upper computer. The self-service equipment sends first request information including a service number stored in the bank card to the upper computer before the bank card transacts the service again so as to obtain first encryption information from the upper computer, and when verification information obtained according to the first encryption information is consistent with the verification information stored in the bank card, the self-service equipment allows the service to be transacted for the bank card. Even if illegal equipment is installed at the card inserting port of the self-service system, because the illegal equipment cannot pass the verification, the information of the bank card cannot be read, the illegal equipment can be prevented from stealing the information of the bank card, and the safety of the self-service equipment is improved.
In order to make the technical solutions more clearly understood by those skilled in the art, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
The terms "first", "second", and the like in the description of the present application are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated
In the present application, unless expressly stated or limited otherwise, the term "coupled" is to be construed broadly, e.g., "coupled" may be a fixed connection, a removable connection, or an integral part; may be directly connected or indirectly connected through an intermediate.
The embodiment of the application provides a self-service system, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 2, the figure is a schematic view of a self-service system according to an embodiment of the present disclosure.
The self-service system comprises an upper computer 20 and a self-service device 10.
The upper computer 20 may be a server, a computer, or the like, the upper computer 20 may establish contact with a plurality of self-service devices 10, and the plurality of self-service devices 10 may be distributed in different physical locations.
The scheme of the embodiment of the application does not limit whether the used self-service equipment 10 is the same equipment or not when the user uses the bank card for multiple times to transact business, and in practical application, the used self-service equipment 10 is not the same equipment when the user often uses the bank card for multiple times to transact business.
When a user transacts a business on the self-service device 10 by using a bank card for the first time, the self-service device 10 generates a specific business number for the business and generates verification information. The self-service device 10 writes the service number and the verification information into the bank card, then encrypts the verification information, carries the service number and the encrypted verification information in the first encryption information, and sends the first encryption information to the upper computer 20.
The upper computer 20 stores the first encrypted information therein.
When the bank card is inserted into the same or other self-service equipment to transact business again, the self-service equipment inserted with the card reads the business number stored in the bank card and generated when the business is transacted last time before reading the information of the bank card, carries the obtained business number in the first request information, and sends the first request information to the upper computer.
And the upper computer inquires first encrypted information corresponding to the service number according to the service number in the first request information and sends the first encrypted information to the self-service equipment of the current card.
The self-service equipment of present plug-in card deciphers the verification information after encrypting that includes in the first encryption information to obtain verification information, compares this verification information with the verification information of storage on the bank card, and when two are unanimous, just can continue to read the information on the bank card and handle the business for the user, otherwise can not continue to read the information.
Therefore, even if illegal equipment is installed at a card plug-in port of the self-service system, the illegal equipment cannot pass through the verification process, namely the illegal equipment does not send the first request information to the host computer, and the first encrypted verification information cannot be encrypted, so that the information of the bank card cannot be read.
The following description is made with reference to specific implementations.
Referring to fig. 3, the figure is a schematic diagram of a communication process of the self-service system provided in the embodiment of the present application.
The self-service device of the bank may be an automatic deposit machine, an automatic teller machine, or a POS machine, and the embodiments of the present application are not particularly limited.
Firstly, an encryption module is added to the self-service equipment of the bank, the encryption module supports various encryption algorithms, and each encryption algorithm corresponds to a unique identifier.
In one possible implementation, the plurality of encryption algorithms supported by the encryption module are symmetric encryption algorithms. The symmetric Encryption algorithm refers to an Encryption algorithm using the same key for Encryption and decryption, and is used for encrypting information such as sensitive Data, and commonly used symmetric Encryption algorithms include, but are not limited to, Data Encryption Standard (DES), Triple Data Encryption Standard (3 DES), Advanced Encryption Standard (AES), Blowfish, RC49(Rivest Cipher 4), RC5(Rivest Cipher 5), and RC6(Rivest Cipher 6).
And after the self-service equipment completes the transaction of the bank card for the first time, generating a service number and verification information corresponding to the service.
In a possible implementation manner, the verification information is a character string, which may include letters, numbers, or special characters, and this is not particularly limited in this embodiment of the application, and the verification information has uniqueness, that is, the generated verification information is not repeated each time.
And the self-service equipment writes the service number and the verification information into the bank card.
The encryption module randomly selects an encryption algorithm to encrypt the verification information, and then the self-service equipment carries the service number, the encrypted verification information and the identification of the encryption algorithm in the first encryption information and sends the first encryption information to the upper computer. I.e. corresponding to the a procedure in fig. 3.
And the upper computer stores the acquired first encryption information.
When the bank card is inserted into the self-service device again, the next self-service device is the last self-service device or another self-service device, which is not limited in the embodiment of the present application.
At this time, the self-service device first obtains the service number stored on the bank card, the service number and the device identifier of the self-service device are carried in the first request information, and the first request information is sent to the upper computer, namely corresponding to the process B in fig. 3.
After the upper computer receives the first request information, whether the equipment identification is correct is firstly verified, if not, the self-service equipment is judged to be unauthorized equipment, the first encrypted information cannot be fed back, so that the self-service equipment cannot continuously read other information of the bank card, and the information of the bank card is protected.
And if the upper computer verifies that the equipment identifier is correct, matching the corresponding first encrypted information according to the service number in the first request information, and sending the corresponding first encrypted information to the self-service equipment of the current card, namely corresponding to the process C in the figure 3.
And the self-service equipment of the current card determines the correspondingly used encryption algorithm according to the identification of the encryption algorithm in the first encryption information, and decrypts the encrypted verification information in the first encryption information by using the determined encryption algorithm. The self-service equipment matches the verification information obtained by decryption with the verification information recorded on the bank card, if the verification information obtained by decryption is inconsistent with the verification information recorded on the bank card, other information of the bank card cannot be read continuously, and the information of the bank card is protected; if the two are consistent, the information of the bank card can be continuously read, and the business is transacted for the user.
After the self-service equipment completes the business again, encryption is continuously carried out again according to the process, namely only the equipment appointed by the bank can read the information of the bank card, so that other unauthorized equipment is prevented from stealing the information of the bank card, and the information safety and property safety of a customer are protected.
In a possible implementation manner, the upper computer is further configured to execute an early warning operation when the device identifier is verified to be incorrect, where the early warning operation includes causing the current self-service device to display abnormal information or causing the current self-service device to stop providing services, so as to ensure that unauthorized devices cannot continue or bank card information.
In summary, with the self-service system provided by the embodiment of the present application, the illegal device is installed at the card slot of the self-service system, and the information of the bank card cannot be read because the illegal device cannot pass through the verification process, that is, the illegal device can be prevented from stealing the information of the bank card, so that the security of the self-service device is improved.
Based on the self-service system provided by the above embodiment, the embodiment of the present application further provides a verification method for the self-service device, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 4, the figure is a flowchart of a verification method of a self-service device provided in the embodiment of the present application when the verification method is applied to the self-service device.
The method comprises the following steps:
s401: after the bank card finishes transacting the business, the generated business number and verification information are written into the bank card, and first encryption information comprising the business number and the encrypted verification information is sent to the upper computer.
S402: and before the bank card transacts the business again, sending first request information comprising the business number and the business number stored in the bank card to the upper computer.
S403: and acquiring first encrypted information sent by the upper computer, and allowing the information of the bank card to be read continuously when the verification information acquired according to the first encrypted information is consistent with the verification information stored on the bank card.
In a possible implementation manner, when encrypting the verification information, the method specifically includes the following steps:
randomly selecting an encryption algorithm to encrypt the verification information, wherein the identification of the encryption algorithm is included in the first encryption information.
Correspondingly, when the first encrypted information acquired from the upper computer is decrypted, the method specifically comprises the following steps:
determining a corresponding encryption algorithm according to the identification of the encryption algorithm in the first encryption information acquired from the upper computer;
and decrypting the encrypted verification information by using a corresponding encryption algorithm, and allowing the information of the bank card to be read continuously when the verification information obtained after decryption is consistent with the verification information stored on the bank card.
In a possible implementation manner, the first request information further includes an identifier of the device, where S402 specifically includes:
and before the bank card transacts the business again, sending first request information carrying the self equipment identification and the business number stored by the bank card to the upper computer.
In one possible implementation, the verification information is a character string, and the verification information includes at least one of letters, numbers, or special characters.
Specifically, the self-service equipment supports various encryption algorithms, and after a user transacts business on the self-service equipment by using a bank card for the first time, the self-service equipment generates a special business number for the business and generates verification information. The self-service equipment writes the service number and the verification information into the bank card, then encrypts the verification information, carries the service number and the encrypted verification information in the first encryption information and sends the first encryption information to the upper computer.
When the bank card is inserted into the same or other self-service equipment to transact business again, the self-service equipment inserted with the card reads the business number stored in the bank card and generated when the business is transacted last time before reading the information of the bank card, carries the obtained business number in the first request information, and sends the first request information to the upper computer. And the upper computer inquires first encrypted information corresponding to the service number according to the service number in the first request information and sends the first encrypted information to the self-service equipment of the current card.
The self-service equipment of present plug-in card deciphers the verification information after encrypting that includes in the first encryption information to obtain verification information, compares this verification information with the verification information of storage on the bank card, and when two are unanimous, just can continue to read the information on the bank card and handle the business for the user, otherwise can not continue to read the information.
Referring to fig. 5, the figure is a flowchart of the verification method of the self-service device provided in the embodiment of the present application when the verification method is applied to the upper computer.
S501: first encrypted information sent by the self-service equipment is received and stored.
S502: receiving first request information sent by the self-service equipment, and sending first encrypted information corresponding to the service number in the first request information to the self-service equipment.
In a possible implementation manner, the first request information further includes a device identifier of the current self-service device, and the method further includes the following steps:
and when the identification of the verification equipment is correct, sending first encryption information corresponding to the service number in the first request information to the current self-service equipment.
In one possible implementation, the method further comprises the steps of:
when the verification device identification is wrong, executing early warning operation, wherein the early warning operation comprises at least one of the following operations:
and displaying the abnormal information by the current self-service equipment, or stopping providing the service by the current self-service equipment.
In summary, with the method provided by the embodiment of the present application, even if an illegal device is installed at the card slot of the self-service system, since the illegal device cannot pass through the verification process, the information of the bank card cannot be read, that is, the illegal device can be prevented from stealing the information of the bank card, and the security of the self-service device is improved.
The self-service system and the verification method of the self-service equipment provided by the invention can be used in the financial field or other fields, for example, can be used in self-service business handling application scenes in the financial field. The other fields are arbitrary fields other than the financial field, for example, the field of information security. The above is only an example, and the application fields of the self-service system and the verification method of the self-service device provided by the present invention are not limited.
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The above-described apparatus embodiments are merely illustrative, and the units and modules described as separate components may or may not be physically separate. In addition, some or all of the units and modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is directed to embodiments of the present application and it is noted that numerous modifications and adaptations may be made by those skilled in the art without departing from the principles of the present application and are intended to be within the scope of the present application.

Claims (10)

1. A self-service system, characterized in that the self-service system comprises: the system comprises an upper computer and self-service equipment;
the self-service equipment is used for writing the generated service number and verification information into the bank card after the bank card finishes transacting the service, and sending first encryption information comprising the service number and the encrypted verification information to the upper computer; and the first request information including the service number stored in the bank card is sent to the upper computer before the bank card transacts the service again so as to acquire the first encryption information from the upper computer, and when the authentication information acquired according to the first encryption information is consistent with the authentication information stored in the bank card, the information of the bank card is allowed to be read continuously.
2. The self-service system of claim 1, wherein the first encrypted information further comprises an identification of an encryption algorithm;
the self-service equipment is specifically used for randomly selecting an encryption algorithm to encrypt the verification information after the bank card transaction is completed; and before the bank card transacts the business again, determining a corresponding encryption algorithm according to the identification of the encryption algorithm in the first encryption information acquired from the upper computer, and decrypting the encrypted verification information by using the corresponding encryption algorithm.
3. The self-service system according to claim 1 or 2, wherein the first request information further comprises a current device identification of the self-service device;
and the upper computer is also used for sending the first encryption information to the current self-service equipment when the equipment identification is verified to be correct.
4. The self-service system of claim 3, wherein the host computer is further configured to, upon verifying that the device identifier is incorrect, perform a pre-warning operation, the pre-warning operation comprising at least one of:
and displaying abnormal information on the current self-service equipment, or stopping providing service for the current self-service equipment.
5. The self-service system of claim 1, wherein the verification information is a string, the verification information comprising at least one of:
letters, numbers or special characters.
6. The self-service system of claim 1, wherein the self-service device is any one of:
an automatic teller machine, or a POS machine.
7. A verification method of self-service equipment is applied to the self-service equipment, and the verification method of the self-service equipment comprises the following steps:
after the bank card finishes transacting the business, writing the generated business number and verification information into the bank card, and sending first encryption information comprising the business number and the encrypted verification information to the upper computer;
before the bank card transacts the business again, sending first request information including the business number stored by the bank card to the upper computer;
and acquiring first encrypted information sent by the upper computer, and allowing the information of the bank card to be read continuously when the verification information acquired according to the first encrypted information is consistent with the verification information stored on the bank card.
8. The method of validating a self-service device as recited in claim 7, the method further comprising:
after the bank card finishes transacting business, randomly selecting an encryption algorithm to encrypt the verification information, wherein the identifier of the encryption algorithm is included in the first encryption information;
at this time, when the verification information obtained according to the first encryption information is consistent with the verification information stored on the bank card, the business transaction for the bank card is allowed, which specifically includes:
and determining a corresponding encryption algorithm according to the identification of the encryption algorithm in the first encryption information acquired from the upper computer, decrypting the encrypted verification information by using the corresponding encryption algorithm, and allowing the information of the bank card to be read continuously when the verification information obtained after decryption is consistent with the verification information stored on the bank card.
9. A method of verification of a self-service device according to claim 7 or 8, the method further comprising:
and before the bank card transacts the business again, sending a self equipment identifier to the upper computer, wherein the self equipment identifier is included in the first request information.
10. The method of validating a self-service device as recited in claim 7, wherein the validation information is a string of characters, the validation information including at least one of:
letters, numbers or special characters.
CN202111093388.0A 2021-09-17 2021-09-17 Self-service system and verification method of self-service equipment Pending CN113808339A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111093388.0A CN113808339A (en) 2021-09-17 2021-09-17 Self-service system and verification method of self-service equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111093388.0A CN113808339A (en) 2021-09-17 2021-09-17 Self-service system and verification method of self-service equipment

Publications (1)

Publication Number Publication Date
CN113808339A true CN113808339A (en) 2021-12-17

Family

ID=78939685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111093388.0A Pending CN113808339A (en) 2021-09-17 2021-09-17 Self-service system and verification method of self-service equipment

Country Status (1)

Country Link
CN (1) CN113808339A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729643A (en) * 2010-01-19 2010-06-09 任军亮 Anti-theft encryption method for IC card or magnetic card
CN106657142A (en) * 2017-01-19 2017-05-10 深圳市金立通信设备有限公司 Data transmission method and terminal and system
CN109151823A (en) * 2018-09-10 2019-01-04 中国联合网络通信集团有限公司 The method and system of eSIM card authentication
CN109241760A (en) * 2018-09-28 2019-01-18 北京北信源信息安全技术有限公司 Data ciphering method, decryption method, encryption device and decryption device
CN109447653A (en) * 2018-11-08 2019-03-08 广东启正电子科技有限公司 A kind of IC card encryption method, device, terminal and storage medium
CN109753837A (en) * 2018-12-27 2019-05-14 佛山市伟邦电子科技有限公司 A kind of anti-copying and tamper resistant method of IC card
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device
CN111740827A (en) * 2020-07-28 2020-10-02 北京金山云网络技术有限公司 Data transmission method and device, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729643A (en) * 2010-01-19 2010-06-09 任军亮 Anti-theft encryption method for IC card or magnetic card
CN106657142A (en) * 2017-01-19 2017-05-10 深圳市金立通信设备有限公司 Data transmission method and terminal and system
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device
CN109151823A (en) * 2018-09-10 2019-01-04 中国联合网络通信集团有限公司 The method and system of eSIM card authentication
CN109241760A (en) * 2018-09-28 2019-01-18 北京北信源信息安全技术有限公司 Data ciphering method, decryption method, encryption device and decryption device
CN109447653A (en) * 2018-11-08 2019-03-08 广东启正电子科技有限公司 A kind of IC card encryption method, device, terminal and storage medium
CN109753837A (en) * 2018-12-27 2019-05-14 佛山市伟邦电子科技有限公司 A kind of anti-copying and tamper resistant method of IC card
CN111740827A (en) * 2020-07-28 2020-10-02 北京金山云网络技术有限公司 Data transmission method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US11462070B2 (en) System and method for selective encryption of input data during a retail transaction
US5475756A (en) Method of authenticating a terminal in a transaction execution system
EP0385400B1 (en) Multilevel security apparatus and method with personal key
EP2143028B1 (en) Secure pin management
US6779112B1 (en) Integrated circuit devices with steganographic authentication, and steganographic authentication methods
CN100495430C (en) Biometric authentication apparatus, terminal device and automatic transaction machine
EP2852121A2 (en) Pre-generation of session keys for electronic transactions and devices that pre-generate session keys for electronic transactions
US20060218096A1 (en) Method and device for generating a single-use financial account number
WO2015143235A2 (en) Systems and methods for decryption as a service
US20090287937A1 (en) Identity verification
CN103942896A (en) System for money withdrawing without card on ATM
US9520991B2 (en) Apparatus for handling bills and/or coins, and method for initializing and operating such an apparatus
JP4372919B2 (en) Automatic cash transaction apparatus and method
CN113595714A (en) Contactless card with multiple rotating security keys
CN110532791A (en) A kind of encryption and decryption method and system for movable storage medium
CN113808339A (en) Self-service system and verification method of self-service equipment
US20090037744A1 (en) Biometric pin block
JP4104801B2 (en) IC card reader and IC card system
US20190034891A1 (en) Automated transaction system, method for control thereof, and card reader
MX2008014397A (en) Terminal activation method.
JP2001134738A (en) Ic card and ic card reader
RU2507588C2 (en) Method of improving security of automated payment system
AU2016269392B2 (en) System and method for selective encryption of input data during a retail transaction
JP4046918B2 (en) IC card, IC card reader and IC card system
JPH05333774A (en) Information processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211217