CN106779645A - Information ciphering method and device - Google Patents

Information ciphering method and device Download PDF

Info

Publication number
CN106779645A
CN106779645A CN201710069530.5A CN201710069530A CN106779645A CN 106779645 A CN106779645 A CN 106779645A CN 201710069530 A CN201710069530 A CN 201710069530A CN 106779645 A CN106779645 A CN 106779645A
Authority
CN
China
Prior art keywords
key
plain text
information
enterprise
guid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710069530.5A
Other languages
Chinese (zh)
Other versions
CN106779645B (en
Inventor
何立伟
朱涛
赵西法
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JINAN ZHENGHE TECHNOLOGY Co Ltd
Original Assignee
JINAN ZHENGHE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JINAN ZHENGHE TECHNOLOGY Co Ltd filed Critical JINAN ZHENGHE TECHNOLOGY Co Ltd
Priority to CN201710069530.5A priority Critical patent/CN106779645B/en
Publication of CN106779645A publication Critical patent/CN106779645A/en
Application granted granted Critical
Publication of CN106779645B publication Critical patent/CN106779645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of information ciphering method and device, methods described includes:According to company information and GUID, enterprise is generated in plain text and first key;Mechanism information and the GUID according to the third-party institution, generating mechanism plaintext and the second key;First is generated in plain text with the mechanism in plain text according to the enterprise in plain text and the first ciphertext;Verified with the first ciphertext in plain text according to the first key, the second key, first, and the result is sent to bank, so that money is beaten according to the result to the third-party institution by the bank.The technical scheme of the embodiment of the present invention can be with the accuracy of guarantee information and the security of exchange link fund.

Description

Information ciphering method and device
Technical field
The present invention relates to technical field of network security, more particularly to a kind of information ciphering method and device.
Background technology
Information management system be one kind artificially to dominate, using computer hardware, software, network communication equipment and other Office equipment, the system for entering collection, transmission, processing, storage, renewal, expansion and the maintenance of row information.Management information is by information Collection, the transmission of information, the storage of information, the processing of information, six aspect compositions of the maintenance of information and the use of information.
The one kind of through ticket management system as information management system is created, is a kind of data analysis system for Sci Tech cadre System, the system by innovation undertaking individual, team, enterprise and the third party service organization wound through ticket application and used and The business datum of middle generation carries out visualization statistical analysis, by data processing, for enterprise management decision-making provides information.
Wound through ticket management system needs the accuracy of guarantee information and exchanges the peace of link fund in wound through ticket intermediate links Quan Xing.
The content of the invention
In view of this, the purpose of the embodiment of the present invention is to provide a kind of accuracy that ensure that information and exchanges link money The information ciphering method and device of the security of gold.
To achieve these goals, a kind of information ciphering method is the embodiment of the invention provides, including:
Wait to supplement
Compared with prior art, the embodiment of the present invention has the advantages that:The technical scheme of the embodiment of the present invention is led to Cross according to company information and GUID, generate enterprise in plain text and first key, the mechanism's letter according to the third-party institution Breath and the GUID, generating mechanism plaintext and the second key, according to enterprise plaintext and the mechanism in plain text The plaintext of generation first and the first ciphertext, are tested with the first ciphertext in plain text according to the first key, the second key, first Card, and the result is sent to bank, so that money is beaten according to the result to the third-party institution by the bank, the technology Scheme can be with the accuracy of guarantee information and the security of exchange link fund.
Brief description of the drawings
Fig. 1 is the flow chart of the embodiment one of information ciphering method of the invention;
Fig. 2 is the flow chart of the embodiment two of information ciphering method of the invention;
Fig. 3 is the schematic diagram of the embodiment one of information encryption device of the invention;
Fig. 4 is the schematic diagram of the embodiment two of information encryption device of the invention.
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiment of the invention is described in further detail.Hereinafter implement Example is not limited to the scope of the present invention for illustrating the present invention.
Fig. 1 is the flow chart of the embodiment one of information ciphering method of the invention, as shown in figure 1, the information of the present embodiment Encryption method, specifically may include steps of:
S101, according to company information and GUID, generates enterprise in plain text and first key.
The executive agent of the present embodiment is wound through ticket management system.Wherein, company information can include the unified society of enterprise Meeting credit code, for example, being 91120110103745785R.GUID (Globally Unique Identifier, GUID), be the binary number of 128, can be used for unique identifier in need computer and net Network, the possibility that this identifier is repeated is very small, for example, being expressed as AEF42F9B-9C89-4553-B with hexadecimal number DF5-179E0D738B1B.Can be using the first key after the adjustment of the first eight bits of GUID as enterprise, by unified society Meeting information code generates enterprise in plain text with the 9th to the 12nd coding splicing of GUID, for example, 91120110103745785R4553.Enterprise's plaintext and first key of enterprise are stored simultaneously.
S102, mechanism information and the GUID according to the third-party institution, generating mechanism plaintext and second Key.
Specifically, mechanism information of the through ticket management system according to the third-party institution is created, for example, mechanism information can include it Local title abbreviation, date of application etc., for example, " TJ " (abbreviation of Tianjin), the date, wherein, the moon and day can set It is double figures, not enough numeral can also include connector "-" with polishing, with reference to the 9th of GUID to the 12 coding generation third-party institutions need the mechanism encrypted in plain text.Arrived by intercepting the 0th of GUID simultaneously 8th, and the second key of generating mechanism is adjusted to it.
S103, the first plaintext and the first ciphertext are generated according to the enterprise in plain text with the mechanism in plain text.
Specifically, enterprise can in plain text be processed with mechanism in plain text, is generated the first plaintext and the first ciphertext, in order to Security verification is carried out when the later stage, money was beaten by bank.
S104, is verified, and checking is tied with the first ciphertext in plain text according to the first key, the second key, first Fruit is sent to bank, so that money is beaten according to the result to the third-party institution by the bank.
The technical scheme of the embodiment of the present invention by according to company information and GUID, generation enterprise in plain text and First key, mechanism information and the GUID according to the third-party institution, generating mechanism plaintext and the second key, First is generated in plain text with the mechanism in plain text according to the enterprise in plain text and the first ciphertext, according to the first key, second Key, first are verified with the first ciphertext in plain text, and the result is sent to bank, so that the bank ties according to checking Fruit beats money to the third-party institution, and the technical scheme can be with the accuracy of guarantee information and the security of exchange link fund.
Fig. 2 is the flow chart of the embodiment two of information ciphering method of the invention, and the information ciphering method of the present embodiment exists On the basis of above-described embodiment one, technical scheme is further introduced in further detail.As shown in Fig. 2 the present embodiment Information ciphering method, specifically may include steps of:
S201, the enterprise encrypted is needed in plain text according to the company information and GUID generation.
The executive agent of the present embodiment is wound through ticket management system.Wherein, company information can include the unified society of enterprise Meeting credit code, for example, being 91120110103745785R.GUID is the binary number of 128, can be used for institute in need The cyber-net of unique identifier, the possibility that this identifier is repeated is very small, for example, being expressed as with hexadecimal number AEF42F9B-9C89-4553-BDF5-179E0D738B1B.By the of unified social information's code and GUID Nine to the 12nd coding splicings generate enterprises in plain text, for example, 91120110103745785R4553.Enterprise is stored simultaneously Enterprise is in plain text.
S202, the 3rd key is generated according to the company information and GUID.
Specifically, it is used as the 3rd key by intercepting a certain section of GUID, for example, GUID can be intercepted 1 to the 8th, as the 3rd key.
S203, the 3rd key to enterprise carries out secondary encryption, to form the first key.
Specifically, S203 includes:Putting in order for the character in the 3rd key is adjusted according to the first preset rules.Example Such as, wound through ticket management system is carried out in two-way ciphering process is carried out using des encryption algorithm by the position to the 3rd key Adjustment, for example, the 4th is adjusted to the 1st, the 7th adjusts to the 2nd, and the 6th adjusts to the 3rd, and the 8th adjusts to the 4th Position, the 3rd adjusts to the 5th, and the 5th adjusts to the 6th, and the 2nd adjusts to the 7th, and the 1st adjusts to the 8th, generation the One key, for example, DD416137.
S204, preserves the first key.
Specifically, first key is stored, when beating money in order to bank, it is possible to use first key is verified.Meanwhile, wound First key is sent to enterprise customer's mobile phone by through ticket management system by way of short message or mail etc..
S205, it is bright that mechanism information and the GUID according to the third-party institution generate the mechanism Text.
Specifically, mechanism information of the through ticket management system according to the third-party institution is created, for example, mechanism information can include it Local title abbreviation, date of application etc., for example, " TJ " (abbreviation of Tianjin), the date, wherein, the moon and day can set It is double figures, not enough numeral can also include connector "-" with polishing, with reference to the 9th of GUID to the 12 coding generation third-party institutions need the mechanism encrypted in plain text, for example, being 9440CE17-B37A-48FF-8F18- 2E80CA67405E。
S206, the 4th key is generated according to the GUID.
For example, the 1st to the 8th of GUID can be intercepted as the 4th key.
S207, secondary encryption is carried out to the 4th key, to form second key.
Specifically, through ticket management system is created in using the two-way ciphering process of des encryption algorithm by the 4th key Position is adjusted, for example, the 5th is adjusted to the 1st, the 4th adjusts to the 2nd, and the 6th adjusts to the 3rd, the 3rd Adjust to the 4th, the 7th adjusts to the 5th, and the 2nd adjusts to the 6th, and the 8th adjusts to the 7th, and the 1st adjusts to the 8th Position, produces the second key, for example, being 5CA4F45C.Second key is sent to by system by way of short message or mail etc. The mobile phone of the user of tripartite mechanism, and store the second key.
S208, by the enterprise in plain text with the combined formation first of mechanism plaintext in plain text.
For example, enterprise in plain text in plain text can be by being spliced to form first in plain text with mechanism, enterprise is in plain text 91120110103745785R4553, mechanism is in plain text 9440CE17-B37A-48FF-8F18-2E80CA67405E- TJ20160817-B37A, then one section in intercepting mechanism in plain text splices in plain text with enterprise, for example, the first plaintext of generation is TJ20160817-B37A91120110103745785R4553。
S209, first plaintext is encrypted by predetermined encryption method to form first ciphertext.
Specifically, it is possible to use md5 encryption algorithm is encrypted to above-mentioned second plaintext, the first ciphertext is formed.
S210, if third-party institution application is cashed, is decrypted to second key, and according to encryption factor, Coding after decryption is encrypted, the 5th key is obtained.
Specifically, when the third-party institution cashes to enterprise's application, the second key is decrypted first, can will creates through ticket Date created as encryption factor, the coding to obtaining is encrypted again, obtains the 5th key.
S211, if the enterprise confirms to cash, is decrypted to the first key, and according to encryption factor, to decryption Coding afterwards is encrypted, and obtains the 6th key.
Specifically, when enterprise confirms to cash, first key is decrypted, the date created that can also will create through ticket is made It is encryption factor, the coding after decryption is encrypted again, obtains the 6th key.
S212, if money is beaten in third-party institution application, is decrypted to the 5th key and the 6th key, according to The coding obtained after decryption forms the second ciphertext.
Specifically, according to default encryption, decipherment algorithm, the 5th key and the 6th key are decrypted, can be obtained First in plain text, then the first plaintext is encrypted by md5 encryption algorithm, forms the second ciphertext.
S213, second ciphertext is compared with first ciphertext, and comparison result is sent to bank, so that Money is beaten according to comparison result to the third-party institution by the bank.
Specifically, if after second ciphertext is compared with first ciphertext, comparison result is consistent, then illustrate whole During individual, without the situation that information is tampered.Bank can carry out beating money.
The technical scheme of the embodiment of the present invention by according to company information and GUID, generation enterprise in plain text and First key, mechanism information and the GUID according to the third-party institution, generating mechanism plaintext and the second key, First is generated in plain text with the mechanism in plain text according to the enterprise in plain text and the first ciphertext, according to the first key, second Key, first are verified with the first ciphertext in plain text, and the result is sent to bank, so that the bank ties according to checking Fruit beats money to the third-party institution, and the technical scheme can be with the accuracy of guarantee information and the security of exchange link fund.
Fig. 3 is the schematic diagram of the embodiment one of information encryption device of the invention, as shown in figure 3, the information of the present embodiment Encryption device, can specifically include the first generation module 31, the second generation module 32, the 3rd generation module 33 and authentication module 34。
First generation module 31, is configured to according to company information and GUID, generation enterprise plaintext and first Key;
Second generation module 32, is configured to the mechanism information and the GUID according to the third-party institution, raw Into mechanism's plaintext and the second key;
3rd generation module 33, be configured to according to the enterprise in plain text and the mechanism generation first is in plain text and the in plain text One ciphertext;
Authentication module 34, is configured to be tested with the first ciphertext in plain text according to the first key, the second key, first Card, and the result is sent to bank, so that money is beaten according to the result to the third-party institution by the bank.
The information encryption device of the present embodiment, is encrypted, with the standard of guarantee information by using above-mentioned module to information The realization mechanism of true property and the security for exchanging link fund realizes machine with the information ciphering method of above-mentioned embodiment illustrated in fig. 1 System is identical, and the record of above-mentioned embodiment illustrated in fig. 1 is may be referred in detail, will not be repeated here.
Fig. 4 is the schematic diagram of the embodiment two of information encryption device of the invention, and the information encryption device of the present embodiment exists On the basis of embodiment one as shown in Figure 3, technical scheme is further introduced in further detail.As shown in figure 4, this The information encryption device of embodiment, can further include:
First generation module 31, including:
First generation submodule 311, is configured to need encryption according to the company information and GUID generation The enterprise in plain text;
Second generation submodule 312, is configured to generate the 3rd key according to the company information and GUID;
3rd generation submodule 313, is configured to carry out secondary encryption to the 3rd key of enterprise, to form described the One key;
Sub-module stored 314, is configured to preserve the first key.
Described 3rd generates submodule 33, and concrete configuration is:
Putting in order for the character in the 3rd key is adjusted according to the first preset rules.
The concrete configuration of second generation module 32 is;
Mechanism information and the GUID according to the third-party institution generate the mechanism in plain text;
4th key is generated according to the mechanism information and GUID;
Secondary encryption is carried out to the 4th key, to form second key.
The information encryption device of the present embodiment, is encrypted, with the standard of guarantee information by using above-mentioned module to information The realization mechanism of true property and the security for exchanging link fund realizes machine with the information ciphering method of above-mentioned embodiment illustrated in fig. 2 System is identical, and the record of above-mentioned embodiment illustrated in fig. 2 is may be referred in detail, will not be repeated here.
Above example is only exemplary embodiment of the invention, is not used in the limitation present invention, protection scope of the present invention It is defined by the claims.Those skilled in the art can make respectively in essence of the invention and protection domain to the present invention Modification or equivalent are planted, this modification or equivalent also should be regarded as being within the scope of the present invention.

Claims (10)

1. a kind of information ciphering method, it is characterised in that including:
According to company information and GUID, enterprise is generated in plain text and first key;
Mechanism information and the GUID according to the third-party institution, generating mechanism plaintext and the second key;
First plaintext and the first ciphertext are generated according to the enterprise in plain text with the mechanism in plain text;
Verified with the first ciphertext in plain text according to the first key, the second key, first, and the result is sent to silver OK, so that money is beaten according to the result to the third-party institution by the bank.
2. method according to claim 1, it is characterised in that according to company information and GUID, generation enterprise Industry plaintext and first key, including:
The enterprise encrypted is needed in plain text according to the company information and GUID generation;
3rd key is generated according to the GUID;
The 3rd key to enterprise carries out secondary encryption, to form the first key;
Preserve the first key.
3. method according to claim 2, it is characterised in that the 3rd key to enterprise carries out secondary encryption, bag Include:
Putting in order for the character in the 3rd key is adjusted according to the first preset rules.
4. method according to claim 1, it is characterised in that mechanism information according to the third-party institution and it is described it is global only One identifier, generating mechanism plaintext and the second key, including;
Mechanism information and the GUID according to the third-party institution generate the mechanism in plain text;
4th key is generated according to the GUID;
Secondary encryption is carried out to the 4th key, to form second key.
5. method according to claim 1, it is characterised in that according to the enterprise in plain text and mechanism generation the in plain text One plaintext and the first ciphertext, including:
By the enterprise in plain text with the combined formation first of mechanism plaintext in plain text;
First plaintext is encrypted by predetermined encryption method to form first ciphertext.
6. method according to claim 1, it is characterised in that according to the first key, the second key, first in plain text and First ciphertext is verified, and the result is sent to bank so that the bank according to the result to the third party Money is beaten by mechanism, including:
If third-party institution's application is cashed, second key is decrypted, and according to encryption factor, after decryption Coding is encrypted, and obtains the 5th key;
If the enterprise confirms to cash, the first key is decrypted, and according to encryption factor, the coding after decryption is entered Row encryption, obtains the 6th key;
If money is beaten in third-party institution application, the 5th key and the 6th key are decrypted, according to being obtained after decryption The coding for obtaining forms the second ciphertext;
Second ciphertext is compared with first ciphertext, and comparison result is sent to bank, so that the bank Money is beaten to the third-party institution according to comparison result.
7. a kind of information encryption device, it is characterised in that including:
First generation module, is configured to according to company information and GUID, generates enterprise in plain text and first key;
Second generation module, is configured to the mechanism information and the GUID according to the third-party institution, generating mechanism In plain text with the second key;
3rd generation module, is configured to generate first in plain text in plain text with the mechanism in plain text according to the enterprise and first is close Text;
Authentication module, is configured to be verified with the first ciphertext in plain text according to the first key, the second key, first, and will The result is sent to bank, so that money is beaten according to the result to the third-party institution by the bank.
8. device according to claim 7, it is characterised in that first generation module, including:
First generation submodule, is configured to be needed according to the company information and GUID generation the enterprise of encryption Industry is in plain text;
Second generation submodule, is configured to generate the 3rd key according to the company information and GUID;
3rd generation submodule, is configured to carry out secondary encryption to the 3rd key of enterprise, to form the first key;
Sub-module stored, is configured to preserve the first key.
9. device according to claim 8, it is characterised in that the 3rd generation submodule, concrete configuration is:
Putting in order for the character in the 3rd key is adjusted according to the first preset rules.
10. device according to claim 1, it is characterised in that the second generation module concrete configuration is;
Mechanism information and the GUID according to the third-party institution generate the mechanism in plain text;
4th key is generated according to the mechanism information and GUID;
Secondary encryption is carried out to the 4th key, to form second key.
CN201710069530.5A 2017-02-08 2017-02-08 Information encryption method and device Active CN106779645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710069530.5A CN106779645B (en) 2017-02-08 2017-02-08 Information encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710069530.5A CN106779645B (en) 2017-02-08 2017-02-08 Information encryption method and device

Publications (2)

Publication Number Publication Date
CN106779645A true CN106779645A (en) 2017-05-31
CN106779645B CN106779645B (en) 2020-06-26

Family

ID=58955534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710069530.5A Active CN106779645B (en) 2017-02-08 2017-02-08 Information encryption method and device

Country Status (1)

Country Link
CN (1) CN106779645B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108183789A (en) * 2017-12-28 2018-06-19 创通票科技有限公司 The generation of electronic code and authentication method
CN112001729A (en) * 2020-08-17 2020-11-27 浪潮软件股份有限公司 Method for realizing online encrypted payment based on MD5

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030278A (en) * 2007-04-04 2007-09-05 王忠杰 Paper-bill payment system based on Internet service
US7634659B2 (en) * 2002-09-20 2009-12-15 Cable Television Laboratories, Inc. Roaming hardware paired encryption key generation
CN102332978A (en) * 2011-05-26 2012-01-25 施彬 Lottery ticket off-line verification system
CN104268758A (en) * 2014-09-15 2015-01-07 周刚 Merchandise anti-counterfeiting system based on invoice and third-party e-commerce platform
CN106228281A (en) * 2016-07-11 2016-12-14 政和科技股份有限公司 Exempt to examine finance and cash methods, devices and systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7634659B2 (en) * 2002-09-20 2009-12-15 Cable Television Laboratories, Inc. Roaming hardware paired encryption key generation
CN101030278A (en) * 2007-04-04 2007-09-05 王忠杰 Paper-bill payment system based on Internet service
CN102332978A (en) * 2011-05-26 2012-01-25 施彬 Lottery ticket off-line verification system
CN104268758A (en) * 2014-09-15 2015-01-07 周刚 Merchandise anti-counterfeiting system based on invoice and third-party e-commerce platform
CN106228281A (en) * 2016-07-11 2016-12-14 政和科技股份有限公司 Exempt to examine finance and cash methods, devices and systems

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108183789A (en) * 2017-12-28 2018-06-19 创通票科技有限公司 The generation of electronic code and authentication method
CN108183789B (en) * 2017-12-28 2023-03-28 创通票科技有限公司 Electronic code generation and authentication method
CN112001729A (en) * 2020-08-17 2020-11-27 浪潮软件股份有限公司 Method for realizing online encrypted payment based on MD5

Also Published As

Publication number Publication date
CN106779645B (en) 2020-06-26

Similar Documents

Publication Publication Date Title
US20240119429A1 (en) Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts
KR102212817B1 (en) Off-chain smart contract service based on a trusted execution environment
CA2289452C (en) Initial secret key establishment including facilities for verification of identity
KR20180116278A (en) Common information secrets for secure information exchange and hierarchical and deterministic cryptographic keys
CN107911216A (en) A kind of block chain transaction method for secret protection and system
CN106559211A (en) Secret protection intelligence contract method in a kind of block chain
CN110214325A (en) Data mask
CZ78798A3 (en) System and method of proving authenticity of documents
CN110390212B (en) Supply monitoring method based on block chain and node device
CN111262852B (en) Business card signing and issuing method and system based on block chain
CN105022966A (en) Database data encryption and decryption method and system
CN113674077A (en) Consumption credit risk prevention method, system, equipment and storage medium
CN113486407B (en) Deposit list management system and method based on block chain
CN108537537A (en) A kind of safe and reliable digital cash Wallet System
TWI724667B (en) System of identity management and authorization and method thereof
CN106779645A (en) Information ciphering method and device
Shazmeen et al. A practical approach for secure internet banking based on cryptography
CN109741050A (en) Extend method of financial IC card service life and associated method and device
CN113159767A (en) Transfer processing method, device and system based on block chain
CN109889343A (en) Electronic invoice circulation control method and device
Yanti et al. Implementation of Advanced Encryption Standard (AES) and QR code algorithm on digital legalization system
CN110457911A (en) A kind of bill management method, system and computer readable storage medium
Rabtsani et al. Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications
CN113570369A (en) Block chain privacy transaction method, device, equipment and readable storage medium
CN115114315B (en) Lawyer sensitive data privacy chaining certificate storing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Information encryption method and device

Effective date of registration: 20220214

Granted publication date: 20200626

Pledgee: Ji'nan rural commercial bank Limited by Share Ltd. high tech branch

Pledgor: ZHENGHE TECHNOLOGY Co.,Ltd.

Registration number: Y2022980001521

PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20221212

Granted publication date: 20200626

Pledgee: Ji'nan rural commercial bank Limited by Share Ltd. high tech branch

Pledgor: ZHENGHE TECHNOLOGY Co.,Ltd.

Registration number: Y2022980001521

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Information encryption method and device

Effective date of registration: 20230203

Granted publication date: 20200626

Pledgee: Ji'nan rural commercial bank Limited by Share Ltd. high tech branch

Pledgor: ZHENGHE TECHNOLOGY Co.,Ltd.

Registration number: Y2023980031993

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Granted publication date: 20200626

Pledgee: Ji'nan rural commercial bank Limited by Share Ltd. high tech branch

Pledgor: ZHENGHE TECHNOLOGY Co.,Ltd.

Registration number: Y2023980031993

PC01 Cancellation of the registration of the contract for pledge of patent right