CN116894673A - Encryption transferring method, device, equipment and storage medium - Google Patents

Encryption transferring method, device, equipment and storage medium Download PDF

Info

Publication number
CN116894673A
CN116894673A CN202310908471.1A CN202310908471A CN116894673A CN 116894673 A CN116894673 A CN 116894673A CN 202310908471 A CN202310908471 A CN 202310908471A CN 116894673 A CN116894673 A CN 116894673A
Authority
CN
China
Prior art keywords
key information
encryption
key
password
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310908471.1A
Other languages
Chinese (zh)
Inventor
李响
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202310908471.1A priority Critical patent/CN116894673A/en
Publication of CN116894673A publication Critical patent/CN116894673A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides a method, a device, equipment and a storage medium for transferring encryption, which can be used in the technical field of data security. The method comprises the following steps: acquiring an organization identifier and a first encryption password carried in a transaction request, wherein the organization identifier is an identifier of a sending organization of the transaction request; acquiring first key information corresponding to the mechanism identifier, and performing encryption conversion processing on the first encryption password by adopting the first key information to obtain a return code, wherein the first key information is the latest updated key information; if the return code indicates that the encryption transfer fails, second key information corresponding to the organization identification is obtained, the second key information is adopted to conduct encryption transfer processing on the first encryption password, and the second key information is the key information before the latest update so as to improve the success rate of the transaction.

Description

Encryption transferring method, device, equipment and storage medium
Technical Field
The present application relates to the field of data security technologies, and in particular, to a method, an apparatus, a device, and a storage medium for transcoding encryption.
Background
To ensure security in the transaction process, typically, a third party entity encrypts the transaction password entered by the user using a key negotiated with the financial entity, and sends the encrypted transaction password to the financial entity for verification, and after the verification is passed, the transaction is completed.
The key is generally dynamically exchanged between two parties of the transaction by using an online message, but a certain time difference exists due to inconsistent key effective time of a third party institution and a financial institution, and if the transaction occurs in the time, the transaction failure problem can be caused due to inconsistent keys adopted by the third party institution and the financial institution.
Disclosure of Invention
The application provides a method, a device, equipment and a storage medium for transferring encryption, which are used for improving the success rate of transactions.
In a first aspect, the present application provides a transcryption method, including: acquiring an organization identifier and a first encryption password carried in a transaction request, wherein the organization identifier is an identifier of a sending organization of the transaction request; acquiring first key information corresponding to the mechanism identifier, and performing encryption conversion processing on the first encryption password by adopting the first key information to obtain a return code, wherein the first key information is the latest updated key information; if the return code indicates that the encryption transfer fails, second key information corresponding to the organization identification is obtained, the second key information is adopted to conduct encryption transfer processing on the first encryption password, and the second key information is the key information before the latest update.
In a second aspect, the present application provides a transcrypting apparatus, comprising:
the acquisition module is used for acquiring an organization identifier and a first encryption password carried in the transaction request, wherein the organization identifier is an identifier of a sending organization of the transaction request;
the encryption transferring processing module is used for obtaining first key information corresponding to the mechanism identifier, performing encryption transferring processing on the first encryption password by adopting the first key information to obtain a return code, wherein the first key information is the latest updated key information, if the return code indicates that the encryption transferring fails, obtaining second key information corresponding to the mechanism identifier, performing encryption transferring processing on the first encryption password by adopting the second key information, and the second key information is the key information before the latest updating.
In a third aspect, the present application provides an electronic device comprising: a processor and a memory coupled to the processor; the memory stores computer-executable instructions; the processor executes computer-executable instructions stored in the memory to implement the transcryption method as in the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium having stored therein computer-executable instructions that, when executed, are adapted to carry out the transcryption method as in the first aspect.
In a fifth aspect, the application provides a computer program product comprising a computer program which, when executed, implements the transcryption method as in the first aspect.
According to the encryption transferring method, device, equipment and storage medium, the mechanism identifier carried in the transaction request and the first encryption password are obtained, and the mechanism identifier is the identifier of the sending mechanism of the transaction request; acquiring first key information corresponding to the mechanism identifier, and performing encryption conversion processing on the first encryption password by adopting the first key information to obtain a return code, wherein the first key information is the latest updated key information; if the return code indicates that the encryption transfer fails, second key information corresponding to the organization identification is obtained, the second key information is adopted to conduct encryption transfer processing on the first encryption password, and the second key information is the key information before the latest update so as to improve the success rate of the transaction.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
FIG. 2 is a flowchart of a transcryption method according to an embodiment of the present application;
FIG. 3 is a flowchart of another encryption transferring method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an encryption transferring device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
It should be noted that, the user information and data related to the present application are all information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards, and a corresponding operation entrance is provided for the user to select authorization or rejection.
It should be noted that the transcryption method, apparatus, device and storage medium of the present application may be used in the field of speech recognition, and may also be used in any field other than the field of speech recognition, and the application fields of the transcryption method, apparatus, device and storage medium of the present application are not limited.
Currently, for key exchange, there are methods: one is to use a static key, the replacement of the key requires manual intervention, and the method wastes human resources; another way is to use dynamic keys, which can cause transaction failure due to the poor time of key validation between the transaction parties.
In order to solve the problems in the related art, the application provides a transcryption method, which uses an old key to conduct transcryption if the new key is failed by conducting transcryption preferentially, so as to improve the success rate of transactions in the key exchange process.
In one embodiment, the transcryption method may be applied in an application scenario. Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application, as shown in fig. 1, including a terminal device (such as a card reader) 11, a third party institution server 12, and a financial institution server 14. In the transaction process (such as payment), a user inputs a transaction password through the terminal device 11, then the terminal device 11 sends the transaction password to the third party mechanism server 12, the third party mechanism server 12 encrypts the transaction password by adopting a pre-negotiated key and then sends the encrypted transaction password to the financial institution 13, the financial institution 13 carries out encryption transferring processing, and the transaction of the user is completed after the encryption transferring is successful.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
The application provides a method for transferring encryption, which can be applied to a server of a financial institution (such as a bank). Fig. 2 is a flow chart of the method for transferring encryption provided by the embodiment of the application, as shown in fig. 2, the method comprises the following steps:
s201: and acquiring the mechanism identifier and the first encryption password carried in the transaction request.
The institution identification is the identification of the sending institution of the transaction request. Wherein the sending means is a silver-colored link. And in the transaction process, if a user purchases goods at a certain point of sale, the card reader of the point of sale reads the bank card of the user, and the user inputs a transaction password through the card reader, so that the transaction of the user at the point of sale can be completed after the transaction password is successfully verified.
The card swiping machine sends the transaction password input by the user to the sending mechanism, the sending mechanism encrypts the transaction password by adopting the latest key information stored by the sending mechanism to obtain a first encrypted password, and then the sending mechanism sends a transaction request to the financial mechanism, wherein the transaction request carries the mechanism identification of the sending mechanism and the first encrypted password.
Further, before obtaining the first key information corresponding to the organization identifier, the method further includes: after key update triggering aiming at a sending mechanism, acquiring first key information; updating the second key information in the database to the original key information; the first key information is updated to the latest key information in the database.
After the first key information is acquired after the key update for the sending mechanism is triggered, the method further comprises the following steps: and sending first key information to the sending mechanism, wherein the first key information is used for indicating the sending mechanism to update the original key information.
In the embodiment of the application, the financial institution updates the key information at intervals, for example, the key information is updated every month, and then the updated key information is sent to the sending mechanism, and the sending mechanism updates the key information stored by the sending mechanism after receiving the key information.
A data table for storage at a financial institution, the data table comprising: the organization identifier, the key type, the latest key information (latest key value and latest key verification value), the original key information (original key and original key verification value), and the update time (update date, and update time point at update date), are exemplarily, referring to table 1, a data table in which the first updated key information is. The data table has no original key and original key check value.
TABLE 1
Referring to table 2, table 2 is obtained after one update of key information based on table 1. The update time refers to the update time of the latest key information. After one update of the key information, the latest key value and the latest key verification value in table 1 may be updated to the original key and the original key verification value in table 2. The latest key value and the latest key verification value in table 2 are the latest key and the key verification value that are updated currently. Subsequently, after each update of the key information, the original latest key information in the table is updated in the current original key information, and the latest updated key information is replaced with the latest key information in the representative.
TABLE 2
Further, in the table, ZPK refers to a region PIN key, ZAK refers to a region authentication key, and ZMK refers to a region master key.
Wherein the first key information includes: a first key value (e.g., A2 in table 2) and a first key verification value (e.g., U2 in table 2); the second key information includes: a second key value (e.g., A1 in table 2) and a second key verification value (e.g., U1 in table 2).
In the embodiment of the present application, the first key information is the current latest key information, for example, for table 1, the first key information corresponding to the organization identifier xxxxx is the latest key value A1 and the latest key verification value U1. The update time is the update date E1 (e.g. 2023, 6, 1) and the update time point L1 (15:30:29). For Table 1, the second key information corresponding to the organization identification XXXXXX is null. For Table 2, the first key information corresponding to the organization identification XXXXXX is the latest key value A2, the latest key verification value U2. The update time is the update date E2, and the update time point L2 (15:30:29). For Table 2, the second key information corresponding to the organization identification XXXXXX is the original key A1 and the original key verification value U1.
In addition, if the financial institution newly updates the latest key information, the latest key information may be transmitted to the transmitting institution, and the transmitting institution may update its own key information. For example, with respect to table 1, the transmitting organization (organization identifier xxxxx) stores the latest key information after receiving the latest key value A1 and the latest key verification value U1. As in table 3:
TABLE 3 Table 3
Latest key value Up-to-date key check value
A1 U1
Correspondingly, after the transmitting mechanism receives the latest key value A2 and the latest key verification value U2 transmitted by the financial mechanism, the table 3 is updated by using the latest key value A2 and the latest key verification value U2 to obtain the table 4:
TABLE 4 Table 4
Latest key value Up-to-date key check value
A2 U2
When encrypting the transaction password, the sending mechanism encrypts the transaction password by adopting the key information stored in the self table to obtain the encrypted password, and then sends the encrypted password to the financial institution. Further, after the transmitting mechanism receives the latest key information, it takes a certain time to update the latest key information in the table. For example, the financial institution has updated the latest key information (the latest key value A2 and the latest key verification value U2) in table 2, but the transmitting institution has not updated the latest key information in its own table, that is, the transmitting institution has not obtained table 4, and at this time, if the transmitting institution side needs a transaction, the transmitting institution side selects the key information in table 3 to encrypt the transaction password.
S202: and acquiring first key information corresponding to the mechanism identifier, and performing encryption conversion processing on the first encryption password by adopting the first key information to obtain a return code.
Further, the first encryption password is subjected to encryption conversion processing by adopting the first key information to obtain a return code, which comprises the following steps: decrypting the first encrypted password by adopting the first key information to obtain a first password to be verified; encrypting the first password to be verified by adopting a preset secret key to obtain a second encrypted password; sending a second encryption password to the verification device, wherein the password to be verified is used for indicating the verification device to decrypt the second encryption password by adopting a preset key to obtain a first code to be verified, and verifying the first code to be verified to obtain a verification result; a return code returned by the verification device is received.
In the embodiment of the application, the preset secret key is fixed and is agreed with the verification equipment, and the verification equipment can verify the transaction passwords corresponding to the bank cards. If the verification device verifies the first verification code, the verification result is that the encryption transfer is successful after the verification is passed, and if the verification is not passed, the verification result is that the encryption transfer is failed.
S203: if the return code indicates that the encryption transfer fails, second key information corresponding to the mechanism identification is obtained, and the second key information is adopted to conduct the encryption transfer processing on the first encryption password.
Wherein the second key information is key information before the latest update.
Further, obtaining second key information corresponding to the organization identifier includes: acquiring update time corresponding to the first key information from a database; determining a time difference between the current time and the update time; and under the condition that the time difference is smaller than a preset duration threshold value, acquiring second key information corresponding to the organization identifier.
In the embodiment of the application, in the range of the preset duration threshold, if the return code indicates that the encryption transfer fails, the second key information can be adopted to carry out the encryption transfer processing on the first encryption password, and if the encryption transfer is successful, the subsequent transaction step is completed. If the transfer encryption fails, the transfer encryption fails is returned to the transmitting mechanism.
Further comprises: and returning a failure of encryption transfer to the sending mechanism under the condition that the time difference is larger than a preset duration threshold value. And when the time difference is larger than a preset time threshold, only the first key information is adopted to encrypt the first encryption password, and no matter whether the encryption is successful or failed, the second key information is not adopted to encrypt the first encryption password.
In the embodiment of the present application, the preset duration threshold is preset, for example, 3 seconds or 5 seconds. The application can avoid the problem of transaction failure when transaction is carried out under the condition that the sending mechanism does not complete the update of the latest secret key.
Specific steps referring to fig. 3, comprising:
s301, acquiring a mechanism identifier and a first encryption password carried in a transaction request;
s302, accessing a database, and acquiring first key information, second key information and update date corresponding to the organization identifier;
s303, the first encryption password is subjected to encryption by using the first key information, and whether the return code fails or not is judged.
If the failure occurs, the process proceeds to S304, and if the success occurs, the process ends.
S304, comparing the time difference between the current date and the update time, and judging whether the time difference is smaller than a preset duration threshold.
If the time difference is smaller than the preset time threshold, execution proceeds to S305, and if the time difference is larger than the preset time threshold, execution proceeds to S306
S305, the first encryption password is encrypted by using the second key information.
S306, returning the failure of the rotary encryption to the transmitting mechanism.
When the key information is updated for the first time, the latest key information is stored in a database, when the key information is updated, both the new key and the old key and the updating time are updated in the database, the latest key is preferentially used for encryption within the time difference by judging the time difference between the current time and the updating time, if the encryption is successful, the process is accessed, and if the encryption is failed, the original key information is used for encryption, so that the transaction success rate in the transaction process can be improved.
Further, in the embodiment of the application, the mechanism identifier carried in the transaction request and the first encryption password are obtained, and the mechanism identifier is the identifier of the sending mechanism of the transaction request; acquiring first key information corresponding to the mechanism identifier, and performing encryption conversion processing on the first encryption password by adopting the first key information to obtain a return code, wherein the first key information is the latest updated key information; if the return code indicates that the encryption transfer fails, second key information corresponding to the organization identification is obtained, the second key information is adopted to conduct encryption transfer processing on the first encryption password, and the second key information is the key information before the latest update so as to improve the success rate of the transaction.
The embodiment of the application also provides a device for transferring the encryption. Fig. 4 is a block diagram of a transcryption device according to an embodiment of the present application, and as shown in fig. 4, the transcryption device includes:
the obtaining module 41 is configured to obtain an institution identifier and a first encryption password carried in the transaction request, where the institution identifier is an identifier of a sending institution of the transaction request;
the transcryption processing module 42 is configured to obtain first key information corresponding to the mechanism identifier, and perform transcryption processing on the first encrypted password by using the first key information to obtain a return code, where the first key information is the latest updated key information, and if the return code indicates that transcryption fails, obtain second key information corresponding to the mechanism identifier, and perform transcryption processing on the first encrypted password by using the second key information, where the second key information is the key information before the latest update.
Optionally, the database includes first key information, second key information and update time of the first key information corresponding to the organization identifier; the transcryption processing module 42 is specifically configured to, when obtaining the second key information corresponding to the organization identifier: acquiring update time corresponding to the first key information from a database; determining a time difference between the current time and the update time; and under the condition that the time difference is smaller than a preset duration threshold value, acquiring second key information corresponding to the organization identifier.
Optionally, the transcryption processing module 42 is further configured to: and returning a failure of encryption transfer to the sending mechanism under the condition that the time difference is larger than a preset duration threshold value.
Optionally, an updating module (not shown) is configured to acquire the first key information after triggering the key update for the sending mechanism before acquiring the first key information corresponding to the mechanism identifier; updating the second key information in the database to the original key information; the first key information is updated to the latest key information in the database.
Optionally, the updating module is further configured to, after acquiring the first key information after triggering the key updating for the sending mechanism, send the first key information to the sending mechanism, where the first key information is used to instruct the sending mechanism to update the original key information.
Optionally, the first encryption password is subjected to encryption conversion processing by adopting the first key information to obtain a return code, which comprises the following steps:
decrypting the first encrypted password by adopting the first key information to obtain a first password to be verified;
encrypting the first password to be verified by adopting a preset secret key to obtain a second encrypted password;
sending a second encryption password to the verification device, wherein the password to be verified is used for indicating the verification device to decrypt the second encryption password by adopting a preset key to obtain a first code to be verified, and verifying the first code to be verified to obtain a verification result;
a return code returned by the verification device is received.
Optionally, the first key information includes: a first key value and a first key verification value; the second key information includes: a second key value and a second key verification value.
The encryption transferring device provided in this embodiment is configured to execute the technical solution of the encryption transferring method in the foregoing method embodiment, where the mechanism identifier is an identifier of a sending mechanism of the transaction request by acquiring the mechanism identifier and the first encryption password carried in the transaction request; acquiring first key information corresponding to the mechanism identifier, and performing encryption conversion processing on the first encryption password by adopting the first key information to obtain a return code, wherein the first key information is the latest updated key information; if the return code indicates that the encryption transferring fails, obtaining second key information corresponding to the mechanism identifier, and performing encryption transferring processing on the first encrypted password by adopting the second key information, wherein the second key information is the key information before the latest updating so as to improve the success rate of the transaction, and the implementation principle and the technical effect are similar and are not repeated here.
The embodiment of the application also provides electronic equipment. Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application, where the electronic device may be a mobile phone, a computer, a tablet device, a personal digital assistant, etc.
Electronic device 504 may include one or more of the following components: a processing component 502, a memory 504, a power supply component 506, a multimedia component 508, an audio component 510, an input/output interface 512, a sensor component 514, and a communication component 516. The input/output interface 512 may also be referred to as an I/O interface 512.
The processing component 502 generally controls overall operation of the electronic device 50, such as operations associated with display, audio entry, speech recognition, voiceprint recognition, and the like. The processing component 502 may include one or more processors 520 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 502 can include one or more modules that facilitate interactions between the processing component 502 and other components. For example, the processing component 502 can include a multimedia module to facilitate interaction between the multimedia component 508 and the processing component 502.
The memory 504 is configured to store various types of data to support operations at the electronic device 50. Examples of such data include instructions for any application or method operating on electronic device 50, text data, audio data, voiceprint features of a user, and the like. The Memory 504 may be implemented by any type or combination of volatile or non-volatile Memory devices, such as Static Random-Access Memory (SRAM), electrically erasable programmable Read-Only Memory (EEPROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory EPROM), programmable Read-Only Memory (Programmable Read Only Memory PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk.
The power supply component 506 provides power to the various components of the electronic device 50. Power supply components 506 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for electronic device 50.
The multimedia component 508 includes a screen between the electronic device 50 and the user that provides an output interface. In some embodiments, the screen may include a liquid crystal display (Liquid Crystal Display, abbreviated as LCD) and a Touch panel (Touch Pad, abbreviated as TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 508 includes a front-facing camera and/or a rear-facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the electronic device 50 is in an operational mode, such as a shooting mode or a video mode. Each front and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities so that the user may be face-identified by the front and/or rear cameras to verify the user's identity.
The audio component 510 is configured to output and/or input audio signals. For example, the audio component 510 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 50 is in an operational mode, such as a speech recognition mode. The received audio signals may be further stored in the memory 504 or transmitted via the communication component 516. In some embodiments, the audio component 510 further comprises a speaker for outputting audio signals.
The I/O interface 512 provides an interface between the processing component 502 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 514 includes one or more sensors for providing status assessment of various aspects of the electronic device 50. For example, the sensor assembly 514 may detect an on/off state of the electronic device 50, a relative positioning of the components, such as a display and keypad of the electronic device 50, the sensor assembly 514 may also detect a change in position of the electronic device 50 or a component of the electronic device 50, the presence or absence of a user's contact with the electronic device 50, an orientation or acceleration/deceleration of the electronic device 50, and a change in temperature of the electronic device 50. The sensor assembly 514 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 514 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 516 is configured to facilitate communication between the electronic device 50 and other devices, either wired or wireless. The electronic device 50 may access a wireless network based on a communication standard, such as WiFi,4G or 5G, or a combination thereof. In one exemplary embodiment, the communication component 516 receives broadcast signals or broadcast-related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 516 further includes a near field communication (Near Field Communication, simply NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on radio frequency identification (Radio Frequency Identification, abbreviated as RFID) technology, infrared data association (Infrared Data Association, abbreviated as IrDA) technology, ultra Wide Band (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 50 may be implemented by one or more application specific integrated circuits (Application Specific Integrated Circuit, abbreviated as ASIC), digital signal processor (Digital Signal Processor, abbreviated as DSP), digital signal processing device (Digital Signal Processor Device, abbreviated as DSPD), programmable logic device (programmable logic device, abbreviated as PLD), field programmable gate array (Field programmable gate array, abbreviated as FPGA), controller, microcontroller, microprocessor, or other electronic element for performing the methods described above.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as memory 504, including instructions executable by processor 520 of electronic device 50 to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random access Memory (Random Access Memory, RAM for short), compact disk read-Only Memory (Compact Disc Read-Only Memory, CD-ROM for short), magnetic tape, floppy disk, optical data storage device, etc.
A non-transitory computer readable storage medium, which when executed by a processor of an electronic device 50, enables the electronic device 50 to perform the above-described transcryption method.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores computer execution instructions, and the computer execution instructions are used for realizing the technical scheme of the encryption transferring method provided in the embodiment of the method when being executed.
The embodiment of the application also provides a computer program product, which comprises a computer program, and the computer program is used for realizing the technical scheme of the encryption transferring method provided in the embodiment of the method when being executed.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A transcryption method, comprising:
acquiring an organization identifier and a first encryption password carried in a transaction request, wherein the organization identifier is an identifier of a sending organization of the transaction request;
acquiring first key information corresponding to the mechanism identifier, and performing encryption transferring processing on the first encryption password by adopting the first key information to obtain a return code, wherein the first key information is the latest updated key information;
and if the return code indicates that the encryption transferring fails, acquiring second key information corresponding to the mechanism identifier, and performing encryption transferring processing on the first encryption password by adopting the second key information, wherein the second key information is the key information before the latest updating.
2. The transcryption method according to claim 1, wherein a database includes the first key information, the second key information, and an update time of the first key information corresponding to the organization identification; the obtaining the second key information corresponding to the organization identifier includes:
acquiring the update time corresponding to the first key information from a database;
determining a time difference between a current time and the update time;
and under the condition that the time difference is smaller than a preset duration threshold value, acquiring second key information corresponding to the mechanism identifier.
3. The transcryption method of claim 2, wherein the transcryption method further comprises: and returning a failure of encryption transfer to the sending mechanism under the condition that the time difference is larger than a preset duration threshold value.
4. A transcryption method according to any of claims 1 to 3, wherein before said obtaining the first key information corresponding to the organization identifier, further comprises:
after triggering the key update for the sending mechanism, acquiring the first key information;
updating the second key information in the database to the original key information;
and updating the first key information into the latest key information in the database.
5. The transcryption method according to claim 4, wherein after said acquiring said first key information after said key update trigger for said transmitting mechanism, further comprising:
and sending the first key information to the sending mechanism, wherein the first key information is used for indicating the sending mechanism to update the original key information.
6. The transcryption method according to claim 1, wherein said performing a transcryption process on said first encrypted password using said first key information to obtain a return code comprises:
decrypting the first encrypted password by adopting the first key information to obtain the first password to be verified;
encrypting the first password to be verified by adopting the preset key to obtain a second encrypted password;
the second encryption password is sent to verification equipment, and the password to be verified is used for indicating the verification equipment to decrypt the second encryption password by adopting the preset key to obtain the first code to be verified, and verifying the first code to be verified to obtain a verification result;
and receiving the return code returned by the verification equipment.
7. A transcryption method according to any of claims 1 to 3, wherein said first key information comprises: a first key value and a first key verification value; the second key information includes: a second key value and a second key verification value.
8. A transcrypting apparatus, comprising:
the acquisition module is used for acquiring an organization identifier and a first encryption password carried in a transaction request, wherein the organization identifier is an identifier of a sending organization of the transaction request;
the encryption transferring processing module is used for obtaining first key information corresponding to the mechanism identifier, carrying out encryption transferring processing on the first encryption password by adopting the first key information to obtain a return code, wherein the first key information is the latest updated key information, and if the return code indicates encryption transferring failure, obtaining second key information corresponding to the mechanism identifier, carrying out encryption transferring processing on the first encryption password by adopting the second key information, and the second key information is the key information before the latest updating.
9. An electronic device, comprising: a processor, and a memory coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the transcryption method of any of claims 1 to 8.
10. A computer readable storage medium having stored therein computer executable instructions which when executed are adapted to implement the transcryption method according to any of claims 1 to 8.
CN202310908471.1A 2023-07-21 2023-07-21 Encryption transferring method, device, equipment and storage medium Pending CN116894673A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310908471.1A CN116894673A (en) 2023-07-21 2023-07-21 Encryption transferring method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310908471.1A CN116894673A (en) 2023-07-21 2023-07-21 Encryption transferring method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116894673A true CN116894673A (en) 2023-10-17

Family

ID=88313385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310908471.1A Pending CN116894673A (en) 2023-07-21 2023-07-21 Encryption transferring method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116894673A (en)

Similar Documents

Publication Publication Date Title
CN106716916B (en) Authentication system and method
US11095450B2 (en) Blockchain based alias interaction processing
US20150199673A1 (en) Method and system for secure password entry
US10810585B2 (en) Systems and methods for authenticating users in connection with mobile operations
KR20180108647A (en) Data interaction method and apparatus, and offline credit payment method and apparatus
US20130046697A1 (en) Using Mobile Device to Prevent Theft of User Credentials
US20180240110A1 (en) Transaction cryptogram
CN104283876A (en) Operation authorization method and device
JP2017537421A (en) How to secure payment tokens
CN111742314B (en) Biometric sensor on portable device
WO2018234882A1 (en) A system and method for conducting a transaction
CN101652782B (en) Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification
CN108898388B (en) Payment method and device
CN108696361B (en) Configuration method, generation method and device of smart card
CN111917728A (en) Password verification method and device
WO2018118248A1 (en) Method and system for purchase precheck
KR101754486B1 (en) Method for Providing Mobile Payment Service by Using Account Information
CN110659899A (en) Offline payment method, device and equipment
CN111709747B (en) Intelligent terminal authentication method and system
US9792607B2 (en) System and method for mobile pin synchronization
KR20140012335A (en) Apparatus and method for processing finance banking information of smart device using qr code
TWI626606B (en) Electronic card establishment system and method thereof
CN116894673A (en) Encryption transferring method, device, equipment and storage medium
WO2015107346A1 (en) Authentication method and system
US8290870B2 (en) Method and device for exchanging values between personal portable electronic entities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination