Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Example one
Referring to fig. 1, an embodiment of the present invention relates to a secure payment method based on a quantum key distribution network, which can be used in an enterprise account payment service, and can effectively improve the security and payment efficiency of enterprise payment, and a preferred embodiment of the method includes the following steps,
and S101, if an authority unlocking request is received, distributing a quantum key K1 to a first quantum terminal so as to perform decoding verification on the quantum key K1.
When receiving the permission unlocking request, the system administrator sends out the permission unlocking request through the financial system to obtain the authorization system order, in order to unlock the permission, the quantum key K1 needs to be distributed to the first quantum terminal, the first quantum terminal can be the quantum terminal of the system administrator, and the parameters such as the key digits and bytes of the quantum key K1 can be configured correspondingly according to the actual situation.
When the first quantum terminal receives the quantum key K1, the quantum key K1 needs to be decoded, and then the decoded quantum key K1 can be compared and checked with another quantum key corresponding to the quantum key K1. Because each pair of distributed quantum keys has a unique application number, each quantum key can be correspondingly verified.
In addition, each pair of quantum keys uses the same standard in the distribution, decryption and verification processes, and multiple standards can exist in the whole system. At the same time, the distribution of quantum keys over long distances allows access to quantum relay or trusted relay systems.
If the quantum key K1 fails to be verified, the quantum key K1 and another corresponding quantum key are both invalid, and at this time, the person making the order cannot obtain the authorization of the financial system and cannot complete the corresponding order making operation.
Step S102, if the first quantum terminal successfully decodes and checks the quantum key K1, when the order is completed through the authorization of the financial system and the order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and the quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2.
If the first quantum terminal successfully decodes and verifies the quantum key K1, the order making personnel can obtain the authorization of the financial system, and complete order making through a unit module for making orders in the financial system under the condition of obtaining the authorization to obtain an order to be paid, and the order to be paid should be submitted for auditing after the order making is completed.
Before the order to be paid is submitted, the order to be paid needs to be encrypted and transmitted to a unit module for payment in the financial system, where the encrypted transmission refers to quantum encrypted transmission, that is, encryption corresponding to the quantum key K2. Preferably, in order to improve the payment efficiency, after the order to be paid is subjected to secret transmission, the quantum key K2 may be directly distributed to the payment quantum terminal, so as to facilitate the next decryption verification operation. If the decryption verification fails, the financial system cannot authorize the auditor to audit the order, and the safety of the payment process is ensured.
Step S103, if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, the encrypted order to be paid is decrypted so that the financial system can perform auditing and payment operations on the decrypted order to be paid.
When the quantum key K2 is successfully decoded and verified by the payment quantum terminal, the encrypted order to be paid can be decrypted, and the financial system can correspondingly audit the decrypted order to be paid and perform corresponding payment operation after the audit is passed, so that the efficiency of audit and payment is improved, and the payment safety is effectively ensured.
In addition, as a preferred embodiment, the step S103 includes,
and if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted order to be paid so that the financial system can verify the decrypted order to be paid and input a payment password. Specifically, after the financial system performs corresponding audit on the order to be paid, a payment secret order can be input for payment. Of course, the payment secret may be input after the payment operation is performed.
In general, the invention can effectively improve the safety and payment efficiency of the payment process and realize the quantization upgrade of the enterprise transaction safety.
Example two
Referring to fig. 2, a second embodiment of the present invention relates to a secure payment method based on a quantum key distribution network, and the difference between the method of the second embodiment of the present invention and the method of the first embodiment of the present invention is that the second embodiment of the present invention further includes the following steps:
and step S104, when the financial system confirms payment and generates a payment order, encrypting and transmitting the payment order, and distributing the quantum key Km to the financial quantum terminal so as to decode and check the quantum key Km.
When the financial system confirms payment and generates a payment order, the payment order needs to be encrypted and transmitted to the financial system, wherein the encrypted transmission refers to quantum encryption, namely encryption corresponding to the quantum key Km. If the quantum key Km is not successfully decoded and checked by the financial quantum terminal, the financial system cannot complete corresponding payment, that is, cannot process a corresponding payment order.
And step S105, if the quantum key Km is successfully decoded and verified by the financial quantum terminal, decrypting the encrypted payment order so that the financial system executes the decrypted payment order.
When the financial quantum terminal successfully decodes and checks the quantum key Km, the encrypted payment order is decrypted, and the financial system can correspondingly execute the decrypted payment order, namely, correspondingly pay, so that the whole payment process is completed.
The embodiment further ensures the security performance of enterprise payment by sending the quantum key Km to the financial quantum terminal to realize decoding verification.
EXAMPLE III
Referring to fig. 3, a third embodiment of the present invention relates to a secure payment method based on a quantum key distribution network, and the difference between the method of the third embodiment of the present invention and the method of the first embodiment of the present invention is that the number of audits for an order to be paid is increased, and specifically, the third embodiment of the present invention includes the following steps:
step S201, if an authority unlocking request is received, a quantum key K1 is distributed to a first quantum terminal, so that decoding verification is carried out on the quantum key K1.
Step S202, if the decoding verification of the quantum key K1 by the first quantum terminal is successful, when order making is completed through financial system authorization and an order to be paid is submitted for verification, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to a second quantum terminal so as to perform decoding verification of the quantum key K2.
The encrypted transmission of the order to be paid refers to transmission to a unit module for auditing in a financial system, where the encrypted transmission refers to quantum encrypted transmission, that is, encrypted transmission corresponding to the quantum key K2.
Step S203, if the second quantum terminal successfully decodes and verifies the quantum key K2, the encrypted order to be paid is decrypted so that the financial system performs a first audit operation on the decrypted order to be paid. After the first audit operation of the order to be paid is completed, the corresponding payment operation can be performed, that is, step S204 is executed.
And S204, when the financial system finishes the first audit, carrying out encryption transmission on the order to be paid after the first audit is finished, and distributing the quantum key K3 to the payment quantum terminal so as to carry out decoding verification on the quantum key K3.
After the financial system completes the first audit, encrypted transmission needs to be performed on the order to be paid, which has completed the first audit, where the encrypted transmission refers to quantum encrypted transmission, that is, encryption corresponding to the quantum key K3.
Step S205, if the quantum key K3 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order that has been subjected to the first audit so that the financial system performs audit and payment operations on the decrypted to-be-paid order that has been subjected to the first audit.
Compared with the first embodiment, in the third embodiment, one audit can be performed on the order to be paid between the completion of the order to be paid and the audit and completion of the payment of the order to be paid, so that the safety performance of the payment is further improved. Of course, the number of audits may be adjusted accordingly as needed and as needed to better facilitate payment security.
Example four
Referring to fig. 4, a fourth embodiment of the present invention relates to a secure payment method based on a quantum key distribution network, and compared with a third embodiment, the fourth embodiment of the present invention has more auditing, so that the method according to the fourth embodiment may specifically include the following steps:
step S301, if an authority unlocking request is received, a quantum key K1 is distributed to the first quantum terminal, so that decoding verification is carried out on the quantum key K1.
Step S302, if the decoding verification of the quantum key K1 by the first quantum terminal is successful, when order making is completed through financial system authorization and an order to be paid is submitted for verification, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to a second quantum terminal so as to perform decoding verification of the quantum key K2.
Step S303, if the second quantum terminal successfully decodes and verifies the quantum key K2, the encrypted order to be paid is decrypted, so that the financial system performs a first audit operation on the decrypted order to be paid.
And S304, when the financial system finishes the first audit, carrying out encryption transmission on the order to be paid after the first audit is finished, and distributing the quantum key K3 to a third quantum terminal so as to carry out decoding verification on the quantum key K3.
Step S305, if the third quantum terminal successfully decodes and verifies the quantum key K3, decrypting the encrypted to-be-paid order that has been subjected to the first audit, so that the financial system performs a second audit operation on the decrypted to-be-paid order that has been subjected to the first audit.
And S306, when the financial system finishes the second audit, carrying out encryption transmission on the order to be paid after the second audit is finished, and distributing the quantum key K4 to the payment quantum terminal so as to carry out decoding verification on the quantum key K4.
Step S307, if the quantum key K4 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order that has been subjected to the second audit, so that the financial system performs audit and payment operations on the decrypted to-be-paid order that has been subjected to the second audit.
In the fourth embodiment, two audits can be performed on the order to be paid between the completion of the order to be paid and the audit and completion of the payment of the order to be paid, so that the safety performance of the payment is further improved. Of course, the number of audits may be adjusted accordingly as needed and as needed to better facilitate payment security.
EXAMPLE five
Referring to fig. 5, an embodiment of the present invention relates to a system, the system 100 comprising,
a memory 101 for storing program instructions;
the processor 102 is configured to run the program instruction, so as to execute, if an authority unlocking request is received, distributing a quantum key K1 to the first quantum terminal, so as to perform decoding verification on the quantum key K1; if the first quantum terminal successfully decodes and checks the quantum key K1, when order making is completed through financial system authorization and an order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2; and if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted order to be paid so that the financial system can verify and pay the decrypted order to be paid.
In a preferred embodiment, the processor further executes the following steps, when the financial system confirms payment and generates a payment order, performing encrypted transmission on the payment order, and distributing the quantum key Km to the financial quantum terminal so as to perform decoding verification on the quantum key Km; and if the quantum key Km is successfully decoded and verified by the financial quantum terminal, decrypting the encrypted payment order so that the financial system executes the decrypted payment order.
In a preferred embodiment, the processor executes the financial system to decrypt the decrypted data to be used
And checking the payment order and inputting a payment secret order.
As a preferred embodiment, the processor further executes if the first quantum terminal pair is terminated
The quantum key K1 is successfully decoded and verified, and when the order is completed through the authorization of the financial system
When an order to be paid is manufactured and submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to a second quantum terminal so as to perform decoding verification on the quantum key K2; if the second quantum terminal successfully decodes and verifies the quantum key K2, the encrypted order to be paid is decrypted so that the financial system can decrypt the decrypted order to be paid
Carrying out first auditing operation on the payment order;
when the financial system completes the first audit, the order to be paid, which has completed the first audit, is encrypted and transmitted, and a quantum key K3 is distributed to the payment quantum terminal, so that the quantum key K3 is decoded and verified; and if the quantum key K3 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order which is subjected to the first audit so that the financial system can perform audit and payment operation on the decrypted to-be-paid order which is subjected to the first audit.
In a preferred embodiment, when the financial system completes the first audit, the processor further performs encrypted transmission on the order to be paid after the first audit is completed, and distributes the quantum key K3 to a third quantum terminal so as to perform decoding verification on the quantum key K3; if the third quantum terminal successfully decodes and checks the quantum key K3, decrypting the encrypted to-be-paid order which has been subjected to the first audit, so that the financial system performs a second audit operation on the decrypted to-be-paid order which has been subjected to the first audit;
when the financial system completes the second audit, the order to be paid, which has completed the second audit, is encrypted and transmitted, and a quantum key K4 is distributed to the payment quantum terminal, so that the quantum key K4 is decoded and verified; and if the quantum key K4 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order which is subjected to the second audit, so that the financial system can perform audit and payment operation on the decrypted to-be-paid order which is subjected to the second audit.
Various other changes and modifications to the above-described embodiments and concepts will become apparent to those skilled in the art from the above description, and all such changes and modifications are intended to be included within the scope of the present invention as defined in the appended claims.