CN1039367C - Bank checker forcode conversion and account check - Google Patents

Bank checker forcode conversion and account check Download PDF

Info

Publication number
CN1039367C
CN1039367C CN 90105543 CN90105543A CN1039367C CN 1039367 C CN1039367 C CN 1039367C CN 90105543 CN90105543 CN 90105543 CN 90105543 A CN90105543 A CN 90105543A CN 1039367 C CN1039367 C CN 1039367C
Authority
CN
China
Prior art keywords
money
amount
date
mouth
account number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 90105543
Other languages
Chinese (zh)
Other versions
CN1059610A (en
Inventor
何延刚
白艾丰
赵中苏
姚宇航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHANGSHA FINANCE ELECTRON TECHNOLOGY INST
Original Assignee
CHANGSHA FINANCE ELECTRON TECHNOLOGY INST
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHANGSHA FINANCE ELECTRON TECHNOLOGY INST filed Critical CHANGSHA FINANCE ELECTRON TECHNOLOGY INST
Priority to CN 90105543 priority Critical patent/CN1039367C/en
Publication of CN1059610A publication Critical patent/CN1059610A/en
Application granted granted Critical
Publication of CN1039367C publication Critical patent/CN1039367C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention discloses a bank checker of checking variable codes and accounting rechecking, which is composed of a 12 bit display, 28 keys, a confidential single-chip microcomputer, a data memory without information loss after turning off and powering off, a keyboard, a control circuit of the display and a protection wire of the data memory, wherein the confidential single-chip microcomputer can not read the content of a chip after an algorithmic program is burnt and ensealed. The present invention can output a proof whether is legal or not, marks and the rechecking codes of accounting data by the calculation of a pseudorandom function of a one-way valve in the checker according to input elements of account proofs and specimen signatures. The present invention provides a necessary condition for a computer to fast process bank service in real time.

Description

Verification becomes sign indicating number and the bank checker of keeping accounts and checking
The present invention is all accounts' of banking system verification a change code signature for a kind of code translator that relates to other purposes of the needs of maintaining secrecy in the physics, can calculate the special-purpose machines and tools of checking sign indicating number of account data simultaneously again.
Bank generally adopts knuckle to check the reserved specimen seal of account opener at present, as confirming with the foundation of levying legitimacy, continuous development along with science and technology, it is extremely easy to forge seal, differentiate true and false very difficult, and after current bank adopts computer network to focus on account successively, will be on a sales counter by hand method check any account's reserved specimen seal apace, be not satisfy with the city to circulate, terminal is faced the needs of cabinet, for addressing this problem, the bank that has at present adopts micrographics, with the reserved specimen seal at families up to ten thousand miniature on more than 20 films then under multiplying arrangement with manually proofreading, circulate with the city with realization.This way does not still break through the circle of seal seal, the legal insecure problem of seal seal still is not resolved, check seal, more supersede chop more inconvenient, and to face client, from confirming to check account data to two people with the legitimacy of levying, settle a business at once, also do not reach the requirement that computer real-time is handled on the timeliness.
The United States Patent (USP) that the present technique field retrieves (US4206315) is a kind of digital signature machine, adopt 28 of binary ones (being equivalent to 40 of the decimal systems), long number word so, be suitable for transmit leg, transmission, reciever and all adopt computer and modern communications equipment, be not suitable for China's decimal number that reaches 40 of hand filling on check for transfer.Use for convenience, get 8 decimal numbers at most.Be called " change code signature ".Its encryption method is different with conventional digital signature, so verification becomes the method for code signature, and also the digital signature with routine is different.
The objective of the invention is provides a kind of bank checker that quick, unified all accounts of verification become code signature and check account data in advance that has for bank, promptly on checker, import essential of voucher, whether legal it will export the sign indicating number of checking of voucher sign and account data immediately, handles the condition that provides necessary fast in real time for computing machine.
Technical solution of the present invention is:
1) hardware is made up of 12 demonstrations, 28 buttons (16 universal keys, 12 dedicated array of keys), the one-chip computer of maintaining secrecy, the control circuit that closes information is not still lost behind the tester in power-down state data memory, keyboard and demonstration, guarantor's electric line of data memory, the one-chip computer of Bao Miing wherein, when algorithm routine fire up seal up after, the content that can't read chip.
2) verification account's change code signature (XXXXXXYY) is in two steps on the software:
The first step, use this bank checker, input essential of voucher (payable at sight side's account number, voucher number, the amount of money, debit's account number, date) and change code signature (being XXXXXXYY) are by internal arithmetic (al), output verification sign on display screen (==...=expression check results is legal
Figure C9010554300071
The expression check results is illegal), its algorithm is to check in the middle of following two equatioies whether an establishment is arranged;
Function argument XXXX=f21 (pays square account number, voucher number, YY, the amount of money, debit's account number.Date)
Function argument XXXX=f21 (pays square account number, voucher number, YY, the amount of money.Debit's account number, date-1) wherein XXXX for becoming the center section of code signature (XXXXXXYY); F21 is the check valve pseudo-random function; XY is last two of change code signature (XXXXXXYY); Pay square account number, the essential of voucher of voucher number for importing; The amount of money, debit's account number, date be the essential of voucher for importing also, but controlled by XX.
Figure C9010554300081
Date-1 be the date-1. days ten days-1, days-1, year-1, value is controlled by XX, makes to become code signature and have certain term of validity.
Above-mentioned f 21Be the check valve pseudo-random function, its so-called check valve can only be calculated by independent variable exactly, and dependent variable can not oppositely be calculated.So-called pseudo-random function is exactly the functional value random variation, has both made and has known that algorithm all can't oppositely be calculated or the forward limit goes out systematic parameter.
Second the step, on the accounting network main frame with similar method verification XY.
When 3) firing algorithm routine and parameter on secret chip, be respectively to grasp half algorithm by concrete management department, carry out chip with the way of mutual restriction and fire work, allow the people of algorithm for design program not know systematic parameter, allow the people who grasps systematic parameter not know algorithm routine, and then algorithm routine and systematic parameter combined fire on chip, and seal up the position of maintaining secrecy, make it to read the content on the chip.
4) checker is also exported check yard (22) of an account data in the output verification mark, so that replace the step of checking of record keeping terminal input account data, the formula of calculation review sign indicating number (22) is as follows:
22=f 4(paying square account number, voucher number, YY, debit's account number, the amount of money)
F wherein 4Be compression function.
Below in conjunction with accompanying drawing, concrete further specifying done in the invention:
Fig. 1 is construction profile figure of the present invention.
Fig. 2 is a circuit structure diagram of the present invention.
Fig. 3 is a circuit embodiments of the present invention.
As can be seen from Figure 1, this bank checker has casing, 12 display screens, keyboard is i.e. 16 universal keys of 28 buttons: " 1,2,3,4,5,6,7,8,9,0,00 ,+,-, *, ÷ ,-, " 12 dedicated array of keys: " start, date, make a summary, reset, angle number, the amount of money, removing, verification, debit, change sign indicating number, pay side, carriage return." also have power switch in addition, circuit board is housed in the casing.
In circuit structure shown in Figure 2, the present invention is made up of seven segment code display driver circuit, 12 display, 28 key board matrixes, preceding 4 demonstrations and preceding 4 bit keyboard sweep circuits, back 8 demonstrations and back 8 bit keyboard sweep circuits, one-chip computer (8751), data-carrier store (RAM), address decoding, guarantor's electric line, logic control, latchs (3).
One-chip computer adopts 8751 single-chip microcomputers, and inner band 4KEPROM can not read after the encryption, and its 32 input-output line I/O lines are divided into P 0, P 1, P 2, P 3Four mouths, each mouthful is 8 lines, P 0Mouth connects 3 latchs and data memory (RAM), as 8 position datawires and RAM least-significant byte address wire, P 1Mouth connects the seven segment code display driver circuit, and control charactron and radix point show, P 26, the 7 pin link addresses decoding of mouth, P 2Other lines of mouth also connect data memory (RAM), as most-significant byte address wire, P 3Link address decoding simultaneously of 6 pin of mouth and data memory (RAM), P 37 pin of mouth directly connect data memory (RAM), above-mentioned P 3RD, WD signal that mouth 6,7 pin are read and write as control RAM respectively, P 35,4,3 pin of mouth connect 28 key board matrixes, as the incoming line of keyboard scan.
The connection of seven segment code display driver circuit is also controlled 12 displays, 12 displays are controlled by the connection of 28 key board matrixes also, and 28 key board matrixes are subjected to preceding 4 to show the control that reaches preceding 4 bit keyboard sweep circuits, back 8 demonstrations and back 8 bit keyboard sweep circuits, preceding 4 demonstrations and preceding 4 bit keyboard sweep circuits and back 8 demonstrations and back 8 bit keyboard sweep circuits are subjected to the control of one of two latchs respectively, and the P of these two latchs while link address decodings and one-chip computer (8751) 0The mouth output line, address decoding is by the P of one-chip computer (8751) 2 Mouth 7,6 pin and P 3Mouthful 6 pin phases " with " translate, again with protect after electric line is connected to logic control together, phase " with " chip selection cs end of control data memory (RAM), the least-significant byte address is from the P of one-chip computer (8751) 0Mouth is sent, and is latched in the latch by the ALE line traffic control of (8751).
Shown in the embodiment circuit of Fig. 3, above-mentioned one-chip computer is the 8751H single-chip microcomputer, the seven segment code display driver circuit is made up of resistance and eight triode amplification driving circuits, 12 displays are made up of 12 charactrons and control line, each section demonstration is connected in parallel, 28 key board matrixes are by row, alignment reaches across the button of ranks line to be formed, preceding 4 show and preceding 4 bit keyboard sweep circuits are made up of 4 M1413 drivers and the alignment that exports keyboard matrix to thereof, 8 of backs show and back 8 bit keyboard sweep circuits are made up of 8 M1413 drivers and the alignment that exports keyboard matrix to thereof, three latchs all are the 74HC373 integrated circuit block, data memory is HM6116LP one 3 static RAM (SRAM)s, address decoding, protect electric line, logic control is respectively by the U among Fig. 3 4, U 5Form Deng AND gate circuit.
From above-mentioned Fig. 2, Fig. 3 circuit, its principle of work is as follows:
Keyboard and reading scan all are to finish under 8751 control.Each of seven segment digital tubes section demonstration is connected in parallel, the P by 8751 1Mouth control, when needing to show, the P by 8751 1Mouth is sent and is shown sign indicating number, P 0Mouth is sent the control corresponding position and is latched in 14HC373, deliver to 8000H for preceding 4,4000H is delivered in 8 of backs, make this charactron bright, close after one millisecond and show and control bit that send next digital demonstration sign indicating number and control bit again, 12 scan rounds like this show, utilize the twilight sunset of light emitting diode, make charactron stably demonstrate 12 figure place sign indicating numbers.
The acceptance of keyboard number also is the scan mode that adopts, and the ranks line of keyboard all is a high level at ordinary times, and button is that off-state is connected across on the ranks line, when keyboard scan begins, by P 0Mouth is sent alignment scan control position and latch (deliver to 8000H for preceding 4, deliver to 4000H for back 8) in 74HC373, makes that by MC1413 corresponding alignment is a low level, when key is pressed, key makes low level deliver on the line ranks line short circuit, and by 8751 P 3The mouth corresponding positions is accepted, and then is intersected by the low level line of software according to alignment scan control position and acceptance, draws the number of key entry.
Keyboard scan and show control bit with two 74HC373 (latch), its address is data space 8000H and 4000H.
Data memory (RAM) adopts the HM61160P-3 static RAM (SRAM), and its address is 4000-47FFH, and address decoding is by 8751 P 2Mouthful 7,6 pin and P3 mouth 6 pin (WR) logic mutually " with " translate, again with protect electric logic mutually " with ", the chip selection cs end of control RAM, the P of data from 8751 0Mouth is sent, by RD or the read-write of WR gating control data.The least-significant byte address is also from P 0Mouth is sent, and the ALE line traffic control by 8751 is latched among the 74HC373, and the high address is by P 2Mouth provides.
Protecting electric line is made up of VARTA3/V60R rechargeable battery, resistance R X, RY and C04023, the minium operation voltage of 6116 (RAM) is 4.5V, as long as when therefore guaranteeing that voltage is reduced to 4.5V, can seal 6116 CS end with high level, provide 3 couchers to make voltage with V00 again, just can guarantee in 6116 that data do not lose because of closing tester in power-down state, seal CS after, tens microamperes of 6116 need keep electric current, get final product with small battery.
Use:
1) the input reseting cipher is removed " deadlock ";
2) startup password is set arbitrarily;
3) input time limit parameter was changed once in 1 year;
4) upgrade startup password, if forget startup password, examination only three, otherwise " deadlock " appears, can prevent other people hacking;
5) keep three accumulative totals: calculating keeps accounts checks a yard cumulative number, and verification becomes code signature cumulative number and the initial accumulative total of installing, and in time finds other people hacking;
6) frequency statistics: add up last two frequency of the last sum-bit of the voucher number side's of paying account number respectively, surpass then " high frequency deadlock " 15 times:
7) (angle number), (amount of money), (paying the side), (debit), (becoming sign indicating number) are five exclusive data keys.Be used to choose wantonly, unordered, by each the input data:
A, not according to being 0
B, empty by accessing old data
C, defeated number back button, the input new data
(paying the side), (debit) two keys are used to import account number:
A, defeated 0 is 0
B, input are no more than 8 non-0 number, and 8 fronts are filled a constant automatically
C, input surpass 8 non-0 number, fail what what then is
(summary) key is used for (+), (-), (*), (÷) four keys are set a constant respectively, and wherein the constant of (÷) key is the constant of corresponding completion account number.
Present technique is assigned " carrying out becoming the letter of code signature pilot work in lines about agreeing Changsha " through the National Industrial and Commercial Bank of China, and confirm " to leave the program among the EPROM in the 8751H in; encrypt in implement security programming back, promptly can not be read from the outside by anyone by the relevant calculation machine expert of the National University of Defense technology." so present technique maturation, reliable, novel, suitable, creative.

Claims (2)

1, a kind of verification of being made up of casing, display screen, keyboard, circuit board becomes sign indicating number and the bank checker of keeping accounts and checking, it is characterized in that this bank checker by the seven segment code display driver circuit, 12 display, 28 key board matrixes, preceding 4 demonstrations and preceding 4 bit keyboard sweep circuits, back 8 demonstrations and back 8 bit scan circuit, one-chip computer (8751), data-carrier store (RAM), address decoding, guarantor's electric line, logic control, latchs (3) are formed.One-chip computer adopts 8751 single-chip microcomputers, and inner band 4KEPROM can not read after the encryption, and its 32 input-output line 1/8 lines are divided into P 0, P1, P2, four mouths of P3, each mouthful is 8 lines, P 0Mouth connects 3 latchs and data memory (RAM), as 8 position datawires and RAM least-significant byte address wire, the P1 mouth connects the seven segment code display driver circuit, control charactron and radix point show, 6 of P2 mouth, the decoding of 7 pin link addresses, other lines of P2 mouth also connect data memory (RAM), as the most-significant byte address wire, link address decoding simultaneously of 6 pin of P3 mouth and data memory (RAM), as the most-significant byte address wire, link address decoding simultaneously of 6 pin of P3 mouth and data memory (RAM), 7 pin of P3 directly connect data memory (RAM), above-mentioned P3 mouth 6, the RD that 7 pin are read and write as control RAM respectively, the WD signal, 5 of P3 mouth, 4,3 pin connect 28 key board matrixes, incoming line as keyboard scan, the connection of seven segment code display driver circuit is also controlled 12 displays, 12 displays are controlled by the connection of 28 key board matrixes also, and 20 key board matrixes are subjected to preceding 4 to show and the scanning of preceding 4 bit keyboards, the control of 8 demonstrations in back and back 8 bit keyboard sweep circuits, preceding 4 show that reaching preceding 4 bit keyboard sweep circuits and back 8 demonstrations and back 8 key scanning circuits is subjected to the control of one of two latchs respectively, and the P of link address decoding simultaneously of these two latchs and one-chip computer (8751) 0The mouth output line, address decoding by 6 pin of P2 mouth 7,6 pin of one-chip computer (8751) and P3 mouth mutually " with " translate, again with protect after electric line is connected to logic control together, phase " with " chip selection cs end of control data memory (RAM), the least-significant byte address is from the P of one-chip computer (8751) 0Mouth is sent, and is latched in the latch by the ALE line traffic control of (8751),
This bank checker of said structure, adopt:
1) hardware is made up of 12 demonstrations, 28 buttons (16 universal keys, 12 dedicated array of keys), the one-chip computer of maintaining secrecy, the control circuit that closes information is not still lost behind the tester in power-down state data memory, keyboard and demonstration, guarantor's electric line of data memory, the one-chip computer of Bao Miing wherein, when algorithm routine fire up seal up after, can't read the content of chip
2) on the software verification account's change code signature (XXXXXXYY) in two steps,
The first step, use this bank checker, input essential of voucher (payable at sight side's account number, voucher number, the amount of money, account side's account number, date) and change code signature (being XXXXXXYY), by internal arithmetic (al), output verification sign on display screen (==...=expression check results is legal, the expression check results is illegal), its algorithm is to check in the middle of following two equatioies whether an establishment is arranged
Function argument XXXX=f21 (paying square account number, voucher number, YY, the amount of money, debit's account number, date)
Function argument XXXX=f21 (paying square account number, voucher number, YY, the amount of money, debit's account number, date-1)
Wherein XXXX is for becoming the center section of code signature (XXXXXXYY);
F21 is the check valve pseudo-random function;
YY is back two for what become code signature (XXXXXYY);
Pay square account number, the essential of voucher of voucher number for importing;
The amount of money, debit's account number, date be the essential of voucher for importing also, but controlled by XX,
00,55, the amount of money=input amount of money date is got ten days on days
1X, the 6X amount of money=-the X00 date gets days (X=1-9)
2X, the 7X amount of money=-the X000 date gets days (X=1-9)
3X, the 8X amount of money=-the X0000 date gets days (X=1-9)
4X, the 9X amount of money=-the X00000 date gets days (X=1-9)
01,51 amount of money=-1 date is got the date
02,52 amount of money=-2 dates are got ten days on days
03, the S2 amount of money=-3 dates are got days
04,54 amount of money=-4 dates are got year
0 XX<50
Debit's account number=
Debit's account number XX>50 of input
Date-1 is date-1, days ten days-1, days-1, year-1, value is controlled by XX, make to become code signature and have certain term of validity,
Above-mentioned f12 is the check valve pseudo-random function, and its so-called check valve can only be calculated dependent variable by independent variable exactly, can not oppositely calculate, so-called pseudo-random function, be exactly the functional value random variation, both made and known that algorithm all can't oppositely be calculated or the forward limit goes out systematic parameter
F12 is the check valve pseudo-random function, be input system parameter (16 figure place), pay square account number (16 figure place), voucher number (8 figure place), the amount of money (16 figure place), debit's account number (16 figure place), date (8 figure place), can calculate 4~8 pseudo random numbers, but can not and pay square account number, voucher number, the amount of money, debit's account number, date and the anti-systematic parameter of releasing of f21 function by 4~8 known pseudo random numbers, algorithm secrecy comprises the inner structure of systematic parameter and f21 function;
Second the step, on the accounting network main frame with similar method verification XY,
When 3) firing algorithm routine and parameter on secret chip, be respectively to grasp half algorithm by concrete management department, carry out chip with the way of mutual restriction and fire work, allow the people of algorithm for design program not know systematic parameter, the people that card is grasped systematic parameter does not know algorithm routine, and then algorithm routine and systematic parameter combined fires on chip, and seals up the position of maintaining secrecy, make it to read the content on the chip
4) checker is also exported check yard (22) of an account data in the output verification mark, so that replace the step of checking of record keeping terminal input account data, the formula of calculation review sign indicating number (22) is as follows:
22=f4 (paying square account number, voucher number, YY, debit's account number, the amount of money)
Wherein f4 is a compression function.
2, become sign indicating number and the bank checker of keeping accounts and checking according to the verification of claim 1, it is characterized in that described 28 buttons are respectively 16 universal keys: " 1,2,3,4,5,6,7,8,9,0,00 ,+,-, *, ÷ ,-" and 12 dedicated array of keys: " start, date, make a summary, reset, angle number, the amount of money, removing, check, debit, change sign indicating number, pair square, carriage return.”
CN 90105543 1990-09-03 1990-09-03 Bank checker forcode conversion and account check Expired - Fee Related CN1039367C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 90105543 CN1039367C (en) 1990-09-03 1990-09-03 Bank checker forcode conversion and account check

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 90105543 CN1039367C (en) 1990-09-03 1990-09-03 Bank checker forcode conversion and account check

Publications (2)

Publication Number Publication Date
CN1059610A CN1059610A (en) 1992-03-18
CN1039367C true CN1039367C (en) 1998-07-29

Family

ID=4879357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 90105543 Expired - Fee Related CN1039367C (en) 1990-09-03 1990-09-03 Bank checker forcode conversion and account check

Country Status (1)

Country Link
CN (1) CN1039367C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1526472A3 (en) * 1995-02-13 2006-07-26 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
CN111311840B (en) * 2020-01-20 2021-10-22 临沂大学 Logistics password box, logistics management system and method

Also Published As

Publication number Publication date
CN1059610A (en) 1992-03-18

Similar Documents

Publication Publication Date Title
CN1221900C (en) User's identity authentication method of dynamic electron cipher equipment and its resources sharing system
US4890323A (en) Data communication systems and methods
US5097504A (en) Method and device for qualitative saving of digitized data
US5442645A (en) Method for checking the integrity of a program or data, and apparatus for implementing this method
US8533491B2 (en) Data security for digital data storage
RU2351978C2 (en) Method for provision of data records set integrity
CN100465977C (en) Information management system
US20060242421A1 (en) Logon system for an electronic device
CN1638331A (en) Pin verification using cipher block chaining
CN113112252B (en) Resource transfer method and device based on block chain, electronic equipment and storage medium
CN100589385C (en) Measurement authentication method based on digital signature
CN1431575A (en) Intelligent secret keyboard with key values being changed randomly
CN102955571A (en) Code input device
CN1039367C (en) Bank checker forcode conversion and account check
CN1698304B (en) Method and system for retrieving secured data
CN2074926U (en) Bank checking device for changing-code and accounts checking
CN1031533C (en) Microcomputerized variable codeer to replace seal
CN116010984A (en) Multiple encryption storage method, device and equipment for relational database data
CN1474317A (en) Hidden cipher coding and identifying method
CN1197248A (en) Numeral signature method
CN2076259U (en) Microcomputer code seal device for substituting stamp by random number code
CN201037928Y (en) Dynamic displaying cipher keyboard
JPS63143667A (en) Password protective device
Denning The Science of Computing: Passwords
EP0607950B1 (en) Method and data carrier for checking the authenticity of chip memories

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C15 Extension of patent right duration from 15 to 20 years for appl. with date before 31.12.1992 and still valid on 11.12.2001 (patent law change 1993)
OR01 Other related matters
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee