CN111127000A - Rechargeable card information encryption method and device, terminal equipment and rechargeable platform - Google Patents

Rechargeable card information encryption method and device, terminal equipment and rechargeable platform Download PDF

Info

Publication number
CN111127000A
CN111127000A CN201911255247.7A CN201911255247A CN111127000A CN 111127000 A CN111127000 A CN 111127000A CN 201911255247 A CN201911255247 A CN 201911255247A CN 111127000 A CN111127000 A CN 111127000A
Authority
CN
China
Prior art keywords
recharging
key
rechargeable card
platform
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911255247.7A
Other languages
Chinese (zh)
Other versions
CN111127000B (en
Inventor
邓景文
赵锡成
马永亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201911255247.7A priority Critical patent/CN111127000B/en
Publication of CN111127000A publication Critical patent/CN111127000A/en
Application granted granted Critical
Publication of CN111127000B publication Critical patent/CN111127000B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/349Rechargeable cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The invention provides a rechargeable card information encryption method, a rechargeable card information encryption device, terminal equipment and a rechargeable platform, wherein the method comprises the following steps: after a terminal device sends a rechargeable card purchase request, a rechargeable platform encrypts a rechargeable card password by using a first encryption key to obtain first encrypted data, then the first encrypted data is sent to the terminal device, the terminal device decrypts the first encrypted data of the rechargeable card password according to the stored first decryption key to obtain the rechargeable card password, and in the process of purchasing the rechargeable card, the rechargeable card password is encrypted to be transmitted in the form of the first encrypted data, even if an illegal user steals the first encrypted data, the rechargeable card password cannot be acquired, so that the password transmission process is safer and more reliable, and property loss of the user or an operator is avoided.

Description

Rechargeable card information encryption method and device, terminal equipment and rechargeable platform
Technical Field
The invention relates to an information security technology, in particular to a rechargeable card information encryption method, a rechargeable card information encryption device, terminal equipment and a rechargeable platform.
Background
The telecommunication industry widely uses the electronic rechargeable card to charge and pay for users, the electronic rechargeable card stores the rechargeable card password, the users open the electronic rechargeable card to obtain the rechargeable card password, and the rechargeable card password can be used for charging and paying. The rechargeable card password is used for verifying whether the rechargeable card is valid or not when the user recharges.
In the existing electronic rechargeable card purchasing process, after receiving a card purchasing request initiated by a user at a client, an operator rechargeable card management platform directly sends a rechargeable card password plaintext to the client.
However, this process presents a security risk and the prepaid card code may be stolen by an illegal user, resulting in loss of property to the user or operator.
Disclosure of Invention
The invention provides a rechargeable card information encryption method, a rechargeable card information encryption device, terminal equipment and a rechargeable platform, which are used for solving the problem that in the process of purchasing a rechargeable card, a password of the rechargeable card is possibly stolen by an illegal user, so that property loss of the user or an operator is caused.
In a first aspect, the present invention provides a method for encrypting information of a rechargeable card, including:
the method comprises the steps that terminal equipment sends a rechargeable card purchase request to a recharging platform, wherein the rechargeable card purchase request is used for requesting to purchase a rechargeable card;
the terminal equipment receives a response of the rechargeable card purchase request sent by the recharging platform, wherein the response of the rechargeable card purchase request comprises first encrypted data of a rechargeable card password, and the first encrypted data is data obtained by encrypting the rechargeable card password by the recharging platform through a first encryption key;
and the terminal equipment decrypts the first encrypted data of the recharging card password according to the stored first decryption key to obtain the recharging card password.
Optionally, before the terminal device sends the request for purchasing the rechargeable card to the recharging platform, the method further includes:
the terminal equipment generates a first key pair by adopting an asymmetric encryption algorithm according to the operation of purchasing the rechargeable card triggered by a user, wherein the first key pair comprises a first public key and a first private key, the first public key is the first encryption key, and the first private key is the first decryption key;
and the terminal equipment carries the first encryption key in the rechargeable card purchase request and stores the first decryption key.
Optionally, the first encryption key and the first decryption key are the same.
Optionally, the rechargeable card information encryption method further includes:
the terminal equipment encrypts the recharging card password by using a second encryption key to obtain second encryption data of the recharging card password;
the terminal equipment sends a second recharging request to the recharging platform, wherein the second recharging request comprises second encrypted data of the recharging card password and a mobile phone number to be recharged;
the terminal equipment receives a response of the second recharging request sent by the recharging platform;
optionally, before the terminal device encrypts the recharge card password by using the second encryption key, the method further includes:
the terminal equipment sends a first recharging request to the recharging platform according to a recharging operation triggered by a user;
the terminal device receives a response of the first recharging request sent by the recharging platform, the response of the first recharging request includes the second encryption key, the second encryption key is a second public key in a second key pair generated by the recharging platform, and the second key pair includes the second public key and a second private key.
In a second aspect, the present invention provides a method for encrypting information of a rechargeable card, including:
a charging platform receives a rechargeable card purchase request sent by terminal equipment, wherein the rechargeable card purchase request is used for requesting to purchase a rechargeable card;
the recharging platform determines a rechargeable card password according to the rechargeable card purchase request;
the recharging platform encrypts the recharging card password according to a first encryption key to obtain first encryption data of the recharging card password;
and the recharging platform sends a response of the recharging card purchase request to the terminal equipment, wherein the response of the recharging card purchase request comprises first encrypted data of the recharging card password.
Optionally, the rechargeable card purchase request includes the first encryption key, the second encryption key is a first public key in a first key pair generated by the terminal device, and the first key pair includes the first public key and a first private key.
Optionally, the rechargeable card information encryption method further includes:
the recharging platform receives a second recharging request sent by the terminal equipment, wherein the second recharging request comprises second encrypted data of the recharging card password and a mobile phone number to be recharged, and the second encrypted data is obtained by encrypting the terminal equipment by using a second encryption key;
the recharging platform decrypts the second encrypted data of the recharging card password by using the stored second decryption key to obtain the recharging card password;
the recharging platform recharges the mobile phone number to be recharged according to the rechargeable card password;
and the recharging platform sends a response of the second recharging request to the terminal equipment.
Optionally, before the recharging platform receives the second recharging request sent by the terminal device, the method further includes:
the recharging platform receives a first recharging request sent by the terminal equipment;
the recharging platform generates a second key pair according to the first recharging request, wherein the second key pair comprises a second public key and a second private key, the second public key is the second encryption key, and the second private key is the second decryption key;
and the recharging platform carries the second encryption key in the response of the first recharging request and sends the response to the terminal equipment, and stores the second decryption key.
Optionally, the second encryption key and the second decryption key are the same.
In a third aspect, the present invention provides a rechargeable card information encryption apparatus, including:
the system comprises a first sending module, a second sending module and a charging platform, wherein the first sending module is used for sending a rechargeable card purchase request to the charging platform, and the rechargeable card purchase request is used for requesting to purchase a rechargeable card;
the first receiving module is used for receiving a response of the rechargeable card purchase request sent by the recharging platform, wherein the response of the rechargeable card purchase request comprises first encrypted data of a rechargeable card password, and the first encrypted data is data obtained by encrypting the rechargeable card password by the recharging platform through a first encryption key;
and the first decryption module is used for decrypting the first encrypted data of the recharging card password according to the stored first decryption key to obtain the recharging card password.
Optionally, the rechargeable card information encryption apparatus further includes:
the first generation module is used for generating a first key pair by adopting an asymmetric encryption algorithm according to operation of purchasing a rechargeable card triggered by a user, wherein the first key pair comprises a first public key and a first private key, the first public key is the first encryption key, and the first private key is the first decryption key;
and the first storage module is used for carrying the first encryption key in the rechargeable card purchase request and storing the first decryption key.
Optionally, the first encryption key and the first decryption key are the same.
Optionally, the rechargeable card information encryption apparatus further includes:
the first encryption module is used for encrypting the recharging card password by using a second encryption key to obtain second encryption data of the recharging card password;
the second sending module is used for sending a second recharging request to the recharging platform, wherein the second recharging request comprises second encrypted data of the recharging card password and a mobile phone number to be recharged;
and the second receiving module is used for receiving the response of the second recharging request sent by the recharging platform.
Optionally, the rechargeable card information encryption apparatus further includes:
the third sending module is used for sending a first recharging request to the recharging platform according to the recharging operation triggered by the user;
a third receiving module, configured to receive a response to the first recharging request sent by the recharging platform, where the response to the first recharging request includes the second encryption key, the second encryption key is a second public key in a second key pair generated by the recharging platform, and the second key pair includes the second public key and a second private key.
In a fourth aspect, the present invention provides a rechargeable card information encryption apparatus, including:
the fourth receiving module is used for receiving a rechargeable card purchasing request sent by the terminal equipment, wherein the rechargeable card purchasing request is used for requesting to purchase a rechargeable card;
the determining module is used for determining a rechargeable card password according to the rechargeable card purchase request;
the second encryption module is used for encrypting the recharging card password according to the first encryption key to obtain first encryption data of the recharging card password;
and the fourth sending module is used for sending a response of the rechargeable card purchase request to the terminal equipment, wherein the response of the rechargeable card purchase request comprises the first encrypted data of the rechargeable card password.
Optionally, the rechargeable card purchase request includes the first encryption key, where the first encryption key is a first public key in a first key pair generated by the terminal device, and the first key pair includes the first public key and a first private key.
Optionally, the rechargeable card information encryption apparatus further includes:
a fifth receiving module, configured to receive a second recharging request sent by the terminal device, where the second recharging request includes second encrypted data of the recharging card password and a mobile phone number to be recharged, and the second encrypted data is obtained by encrypting, by using a second encryption key, the terminal device;
the second decryption module is used for decrypting second encrypted data of the recharging card password by using a stored second decryption key to obtain the recharging card password;
the recharging module is used for recharging the mobile phone number to be recharged according to the rechargeable card password;
and the fifth sending module is used for sending the response of the second recharging request to the terminal equipment.
Optionally, the rechargeable card information encryption apparatus further includes:
a sixth receiving module, configured to receive the first recharging request sent by the terminal device;
a second generating module, configured to generate a second key pair according to the first recharging request, where the second key pair includes a second public key and a second private key, the second public key is the second encryption key, and the second private key is the second decryption key;
and the second storage module is used for the recharging platform to carry the second encryption key in the response of the first recharging request and send the response to the terminal equipment, and stores the second decryption key.
Optionally, the second encryption key and the second decryption key are the same.
In a fifth aspect, the present invention provides a terminal device, including:
a processor, a memory and a transceiver, the memory being configured to store instructions and the transceiver being configured to communicate with other devices, the processor being configured to execute the instructions stored in the memory to cause the terminal device to perform the method of the first aspect as described above:
in a sixth aspect, the present invention provides a top-up platform, including:
a processor, a memory for storing instructions, and a transceiver for communicating with other devices, the processor being configured to execute the instructions stored in the memory to cause the top-up platform to perform the method of the second aspect as described above:
in a seventh aspect, the present invention provides a computer-readable storage medium, which is applied in a terminal device, and the computer-readable storage medium stores computer-executable instructions, which when executed by a processor, are used to implement the rechargeable card information encryption method according to any one of the above first aspects.
In an eighth aspect, the present invention provides a computer-readable storage medium, which is applied in a top-up platform, and the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium implements the method for encrypting the information of the top-up card according to any one of the second aspects.
According to the information encryption method, device, terminal equipment and charging platform of the rechargeable card, after the terminal equipment sends the purchase request of the rechargeable card, the charging platform encrypts the password of the rechargeable card by using the first encryption key to obtain first encrypted data, then the first encrypted data is sent to the terminal equipment, the terminal equipment decrypts the first encrypted data of the password of the rechargeable card according to the stored first decryption key to obtain the password of the rechargeable card, the password of the rechargeable card is encrypted in the process of purchasing the rechargeable card, so that the password of the rechargeable card is transmitted in the form of the first encrypted data, even if an illegal user steals the first encrypted data, the password transmission process cannot be obtained, and the property loss of the user or an operator is avoided.
Further, in the process of recharging by using the rechargeable card, the terminal device encrypts the rechargeable card password by using a second encryption key to obtain second encrypted data, sends the second encrypted data and the mobile phone number to be recharged to the recharging platform, the recharging platform decrypts the second encrypted data by using a second decryption key to obtain the rechargeable card password, and the recharging platform verifies the validity of the rechargeable card password, and if the second encrypted data is valid, the recharging operation is performed; if the result is invalid, the recharging operation is not carried out, and the recharging is finished. In the recharging process, the recharging card password is encrypted, so that the recharging card password is transmitted in the form of second encrypted data, and even if an illegal user steals the second encrypted data, the recharging card password cannot be acquired, so that the password transmission process is safer and more reliable, and property loss of the user or an operator is avoided.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a schematic view of an application scenario of the information encryption method for a rechargeable card according to the present invention;
fig. 2 is a schematic flow chart of a method for encrypting information of a rechargeable card according to the present invention;
FIG. 3 is a schematic view of a prepaid card purchasing page according to the present invention;
FIG. 4 is a schematic flow chart illustrating another method for encrypting information of a rechargeable card according to the present invention;
FIG. 5 is a schematic flow chart illustrating a method for encrypting information of a rechargeable card according to another embodiment of the present invention;
fig. 6 is a schematic flow chart illustrating another method for encrypting the information of the rechargeable card according to the present invention;
FIG. 7 is an interaction diagram illustrating a method for encrypting information of a rechargeable card according to the present invention;
fig. 8 is a schematic structural diagram of a rechargeable card information encryption apparatus according to the present invention;
fig. 9 is a schematic structural diagram of another rechargeable card information encryption apparatus according to the present invention;
fig. 10 is a schematic structural diagram of a terminal device provided in the present invention;
fig. 11 is a schematic structural diagram of a top-up platform according to the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terms to which the present invention relates will be explained first:
electronic rechargeable card: a virtual card which can realize corresponding recharging function. The electronic rechargeable card comprises a rechargeable card password, a rechargeable card face value, a rechargeable card valid period and other information, a user can obtain the rechargeable card password by opening the electronic rechargeable card, and the rechargeable card password is used for recharging and paying corresponding to the face value. The rechargeable card password is generally a character string, the character string may include numbers, letters, special characters, and the like, and optionally, the rechargeable card password may be a combination of numbers with a character length of 19 bits. The recharge card password is used for verifying whether the recharge card is valid when the user recharges.
And (3) secret key: parameters input in an algorithm that converts plaintext into ciphertext (encryption) or converts ciphertext into plaintext (decryption). Wherein the key used for encryption and the corresponding key used for decryption form a key pair.
Symmetric encryption algorithm: the same key is used for encryption and decryption.
Asymmetric encryption algorithm: there is a key pair comprising a public key and a private key. If the data is encrypted with the public key, it can only be decrypted with the corresponding private key.
Fig. 1 is a schematic view of an application scenario of the information encryption method for a rechargeable card according to the present invention, as shown in fig. 1, the scenario includes a recharging platform 10 and a terminal device 20.
The recharging platform 10 may be provided by a telecom operator, and has a platform with a recharging and paying function for a user, and the recharging platform 10 includes, but is not limited to, an electronic rechargeable card purchasing function and a function of recharging by using an electronic rechargeable card. The user can log in a recharging client on the terminal device 20 to recharge and pay, wherein the recharging client can be an application program pre-installed on the terminal device 20 or can be opened through a web page, and the invention is not limited to this, and the terminal device 20 can be a mobile phone, a computer, a tablet device, and the like, and the invention is not limited to this. The top-up platform 10 and the terminal device 20 are connected through a network.
When a user needs to purchase an electronic rechargeable card for recharging and paying, the user logs in a recharging client through the terminal device 20 to purchase the electronic rechargeable card, the terminal device 20 sends a request to the recharging platform 10 after receiving the purchasing operation of the user, the recharging platform 10 encrypts a rechargeable card password corresponding to the request and then sends the encrypted rechargeable card password to the terminal device 20, and the terminal device 20 decrypts the received encrypted rechargeable card password and then displays the encrypted rechargeable card password to the user.
Further, when a user wants to use the electronic rechargeable card for recharging and paying, a recharging client is logged in through the terminal device 20, recharging is initiated, the terminal device 20 encrypts the password of the electronic rechargeable card and sends the encrypted password to the recharging platform 10 together with the mobile phone number to be recharged, the recharging platform 10 decrypts the cipher text of the rechargeable card, verifies whether the password is valid, if so, recharges the corresponding amount of money for the mobile phone number, sends a successful recharging message to the terminal device 20 and displays the message to the user; and if the recharging failure message is invalid, sending the recharging failure message to the terminal equipment 20, and displaying the recharging failure message to the user.
In the prior art, when a rechargeable card is purchased, after a recharging platform receives a card purchasing request sent by a terminal device, a rechargeable card password is sent to the terminal device in a plaintext mode, the process has a safety risk, the rechargeable card password is possibly stolen by an illegal user in a transmission process, and the illegal user steals the rechargeable card password and then recharges a mobile phone number of the illegal user, so that property loss of the user or an operator can be caused.
Further, when the rechargeable card is used for recharging, the terminal device sends the password of the rechargeable card to the recharging platform in a plaintext mode, the process has a safety risk, the password of the rechargeable card is possible to be stolen by an illegal user in the transmission process, and the illegal user immediately recharges the mobile phone number of the illegal user after stealing the password of the rechargeable card, so that property loss of the user or an operator can be caused.
The invention provides a rechargeable card information encryption method, a rechargeable card information encryption device, terminal equipment and a rechargeable platform, and aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 2 is a schematic flow chart of a method for encrypting information of a rechargeable card according to the present invention, as shown in fig. 2, the method of the present embodiment is as follows:
s201, the terminal device sends a rechargeable card purchase request to the recharging platform.
Wherein the rechargeable card purchase request is for requesting purchase of the rechargeable card. Specifically, the terminal device receives a rechargeable card purchase request initiated by a user in a recharging client, and sends the purchase request to a recharging platform, wherein the rechargeable card purchase request includes information such as the face value and the number of the rechargeable card, and the face value and the number of the rechargeable card are input by the user through the recharging client.
S202, the terminal equipment receives a response of the rechargeable card purchase request sent by the recharging platform.
The recharge card database is accessible to the recharge platform. The method can store valid rechargeable cards which are not used, and also can store invalid rechargeable cards which are rechargeable cards, can be deleted in a database immediately, and can also change the validity information in the rechargeable cards from valid to invalid. Each rechargeable card stores information such as a rechargeable card password and face value. The recharging platform can acquire a corresponding recharging card from a recharging card database according to a recharging card purchase request so as to acquire a recharging card password; the method can also compare any recharging card password received by the recharging platform with the recharging card password in the recharging card database to verify the validity of the recharging card password.
After receiving a rechargeable card purchase request of the terminal equipment, the recharging platform acquires rechargeable card passwords corresponding to the face value and the quantity from a rechargeable card database according to the face value, the quantity and other information in the rechargeable card purchase request, encrypts the rechargeable card passwords by using a first encryption key to obtain first encrypted data, and then sends the first encrypted data to the terminal equipment.
For example, in the rechargeable card purchase request, a request for purchasing 2 rechargeable cards with 30-yuan face values is made, and then 2 rechargeable cards with 30-yuan face values need to be found in a rechargeable card database, the passwords of the rechargeable cards are obtained, 2 rechargeable card passwords are obtained, the obtained 2 rechargeable card passwords are encrypted by using a first encryption key, first encrypted data are obtained, and then the first encrypted data are sent to the terminal device.
The recharging platform can encrypt the rechargeable card password by using a symmetric encryption algorithm or an asymmetric encryption algorithm, and when the recharging platform encrypts the rechargeable card password by using the symmetric encryption algorithm, a first encryption key used by the recharging platform for encryption is the same as a first decryption key used by the terminal device for decryption.
The first encryption key and the first decryption key may be pre-configured in the recharging platform and the terminal device, for example, when the user logs in the recharging client for the first time, the recharging platform applies for the first decryption key and the first encryption key from the third party key management device, and sends the first decryption key and the first encryption key to the terminal device and the recharging platform, respectively.
Or, the first decryption key is loaded while downloading and installing the recharge client, or the first decryption key is directly loaded while opening the webpage of the recharge card client, correspondingly, the recharge platform stores the first encryption key, and simultaneously stores the corresponding relationship between the first encryption key and the recharge client, the corresponding relationship can be determined by an information identifier which can uniquely determine the recharge client, and the information identifier can be an installation serial number of the recharge client or a user mobile phone number and the like, and the invention is not limited herein.
When the recharging platform encrypts the rechargeable card password by using an asymmetric encryption algorithm, the recharging platform and the terminal equipment use a key pair to encrypt and decrypt, the key pair comprises a public key and a private key, and the data encrypted by the public key can be decrypted only by using the private key. In this embodiment, the first encryption key used by the recharging platform for encryption is a first public key, the first decryption key used by the terminal device for decryption is a first private key, and the first public key and the first private key form a first key pair.
Optionally, the first key pair is generated by the terminal device, the terminal device may carry the first public key in the purchase request and send the purchase request to the recharge platform, and store the first private key, and after the recharge platform obtains the recharge card password, the recharge platform encrypts the recharge card password by using the first public key.
S203, the terminal equipment decrypts the first encrypted data of the recharging card password according to the stored first decryption key to obtain the recharging card password.
When a symmetric encryption algorithm is employed, the first encryption key and the first decryption key are the same. When the asymmetric encryption algorithm is adopted, the first decryption key is a private key, and the terminal equipment decrypts by adopting the private key corresponding to the first encryption key.
The method comprises the steps of generating a first key pair by adopting an asymmetric encryption algorithm, carrying a first public key in the first key pair in a rechargeable card purchase request and sending the first public key to a rechargeable platform, storing a first private key by the first private key, namely, in the information transmission process, transmitted data is first encrypted data after the first public key and a rechargeable card password are encrypted, and the first private key is not transmitted, so that even if an illegal user steals the first encrypted data and/or the first public key, the rechargeable card password cannot be acquired, the password transmission process is safer and more reliable, and property loss of the user or an operator is avoided.
For example, the terminal device takes a mobile phone as an example, and fig. 3 is a schematic view of a rechargeable card purchasing page provided by the present invention, as shown in fig. 3, when a user wants to charge 40 yuan for a certain mobile phone number, the terminal device opens a charging client to enter the charging page, finds a rechargeable card with a face value of 20 yuan, and selects 2 in the number of purchased cards, clicks a "confirm purchase" button, enters a payment page to pay, and after the payment is completed, the terminal device generates a first key pair, carries the first encryption key in a rechargeable card purchasing request, and sends the first encryption key to a charging platform. The "confirm purchase" button may also be in other forms such as a "confirm" button, and the position of the button may be in the lower left corner or the lower right corner of the page, and the invention is not limited to this.
In the embodiment, the recharging platform encrypts the rechargeable card password by using the first encryption key to obtain first encrypted data, and then sends the first encrypted data to the terminal device, the terminal device decrypts the first encrypted data of the rechargeable card password according to the stored first decryption key to obtain the rechargeable card password, and in the process of purchasing the rechargeable card, the rechargeable card password is encrypted to transmit in the form of the first encrypted data, even if an illegal user steals the first encrypted data, the illegal user cannot know the rechargeable card password, so that the password transmission process is safer and more reliable, and property loss of the user or an operator is avoided.
Fig. 4 is a schematic flow chart of another method for encrypting the information of the rechargeable card according to the present invention, where fig. 4 is a flowchart of the embodiment shown in fig. 2, and further includes, after S203, S204, S205, and S206, as shown in fig. 4:
s204, the terminal equipment encrypts the rechargeable card password by using the second encryption key to obtain second encryption data of the rechargeable card password.
When the user wants to use the rechargeable card for recharging, the rechargeable client on the terminal device is opened, the password of the rechargeable card can be input, and the electronic document of the rechargeable card when the user purchases the rechargeable card before can be directly imported into the password of the rechargeable card, so that the invention is not limited. And the terminal equipment receives the rechargeable card password, encrypts the rechargeable card password by using the second encryption key to obtain second encryption data of the rechargeable card password, namely, the encryption of the rechargeable card password is completed.
The terminal equipment can encrypt the rechargeable card password by using a symmetric encryption algorithm or an asymmetric encryption algorithm, and when the terminal equipment encrypts the rechargeable card password by using the symmetric encryption algorithm, a second encryption key used by the terminal equipment for encryption is the same as a second decryption key used by the recharging platform for decryption.
The second encryption key and the second decryption key may be pre-configured in the terminal device and the recharging platform, for example, when the user logs in the recharging client for the first time, the recharging platform applies for the second decryption key and the second encryption key from the third party key management device, and sends the second decryption key and the second encryption key to the terminal device and the recharging platform, respectively.
Or, the second encryption key is loaded while downloading and installing the recharge client, or the second encryption key is directly loaded while opening the webpage of the recharge card client, correspondingly, the recharge platform stores the second decryption key, and simultaneously stores the corresponding relationship between the second decryption key and the recharge client, the corresponding relationship can be determined by an information identifier which can uniquely determine the recharge client, and the information identifier can be an installation serial number of the recharge client or a mobile phone number of a user, and the like, and the invention is not limited herein.
When the terminal equipment uses the asymmetric encryption algorithm to encrypt the password of the rechargeable card, the rechargeable platform and the terminal equipment use a key pair to encrypt and decrypt, the key pair comprises a public key and a private key, and the data encrypted by the public key can be decrypted only by using the private key. In this embodiment, the second encryption key used by the terminal device for encryption is a second public key, the second decryption key used by the recharge platform for decryption is a second private key, and the second public key and the second private key form a second key pair.
Optionally, the second key pair is generated by the charging platform, the terminal device sends the first charging request to the charging platform according to the charging operation triggered by the user, the charging platform may send the second public key to the terminal device, and store the second private key, and after the terminal device obtains the second public key, the terminal device encrypts the rechargeable card password by using the second public key to obtain second encrypted data. The second encryption key is a second public key in a second key pair generated by the recharging platform, and the second key pair comprises the second public key and a second private key.
S205, the terminal device sends a second recharging request to the recharging platform, wherein the second recharging request comprises second encrypted data of the recharging card password and the mobile phone number to be recharged, and the second encrypted data is obtained by encrypting the terminal device by using a second encryption key.
The mobile phone number to be charged may be any mobile phone number in the operator platform, and the mobile phone number is not limited to the mobile phone number used when the rechargeable card is purchased.
And the terminal equipment sends the second encrypted data and the mobile phone number to be recharged to the recharging platform together.
S206, the terminal equipment receives the response of the second recharging request sent by the recharging platform.
The recharging platform decrypts the second encrypted data by using a second decryption key to obtain a recharging card password, compares the recharging card password with the recharging card password in the recharging card database to check the validity of the recharging card password, if the recharging card password which is the same as the recharging card password is found in the recharging card database and the validity information is valid, the recharging card is indicated to be valid, the recharging platform can send the face value of the recharging card and the mobile phone number to be recharged to the charging platform, the charging platform charges the mobile phone number to be recharged with corresponding amount, and optionally, the charging platform sends a message of successful recharging to the recharging platform after completing corresponding recharging operation; if the rechargeable card password is not found in the rechargeable card database or the validity information of the rechargeable card is found to be invalid, the rechargeable card is indicated to be invalid, and the recharging platform does not recharge the mobile phone number to be recharged.
Optionally, the recharging platform sends the recharging result to the terminal device, and specifically, if the recharging is successful, the recharging platform returns the information of successful recharging to the terminal device; and if the recharging fails, the recharging platform returns the information of the recharging failure to the terminal equipment. The terminal device displays the recharging result for the user to view, and the recharging result can be displayed to the terminal user in a popup mode or in a dialogue message mode, and the invention is not limited herein.
The recharging result is returned to the recharging user for checking, so that the user can know the recharging condition in time, and the user experience is improved.
In this embodiment, in the process of recharging by using the rechargeable card, the terminal device encrypts the rechargeable card password by using the second encryption key to obtain second encrypted data, and sends the second encrypted data and the mobile phone number to be recharged to the recharging platform, the recharging platform decrypts the second encrypted data by using the second decryption key to obtain the rechargeable card password, and the recharging platform verifies the validity of the rechargeable card password, and if the second encrypted data is valid, performs recharging operation; if the result is invalid, the recharging operation is not carried out, and the recharging is finished. In the recharging process, the recharging card password is encrypted, so that the recharging card password is transmitted in the form of second encrypted data, and even if an illegal user steals the second encrypted data, the recharging card password cannot be acquired, so that the password transmission process is safer and more reliable, and property loss of the user or an operator is avoided.
Fig. 5 is a schematic flow chart of another method for encrypting information of a rechargeable card according to the present invention, as shown in fig. 5, the method of this embodiment is as follows:
s501, the charging platform receives a rechargeable card purchase request sent by the terminal device, and the rechargeable card purchase request is used for requesting to purchase the rechargeable card.
S502, the charging platform determines the password of the charging card according to the purchase request of the charging card.
S503, the recharging platform encrypts the recharging card password according to the first encryption key to obtain first encryption data of the recharging card password.
The recharging platform can encrypt the rechargeable card password by using a symmetric encryption algorithm or an asymmetric encryption algorithm, and when the recharging platform encrypts the rechargeable card password by using the symmetric encryption algorithm, a first encryption key used by the recharging platform for encryption is the same as a first decryption key used by the terminal device for decryption.
When the recharging platform encrypts the rechargeable card password by using an asymmetric encryption algorithm, the recharging platform and the terminal equipment use a key pair to encrypt and decrypt, the key pair comprises a public key and a private key, and the data encrypted by the public key can be decrypted only by using the private key. In this embodiment, the first encryption key used by the recharging platform for encryption is a first public key, the first decryption key used by the terminal device for decryption is a first private key, and the first public key and the first private key form a first key pair.
Optionally, the first key pair is generated by the terminal device, the terminal device may carry the first public key in the purchase request and send the purchase request to the recharge platform, and store the first private key, and after the recharge platform obtains the recharge card password, the recharge platform encrypts the recharge card password by using the first public key.
S504, the charging platform sends a response of the charging card purchase request to the terminal equipment, and the response of the charging card purchase request comprises first encrypted data of a password of the charging card.
The method of this embodiment, which has similar implementation principle and technical effect to the embodiment shown in fig. 2, is not described herein again.
Fig. 6 is a schematic flow chart of another method for encrypting the information of the rechargeable card according to the present invention, where fig. 6 is based on the embodiment shown in fig. 5, and further includes S505, S506, and S507 after S504, as shown in fig. 6, the method of this embodiment is as follows:
and S505, the recharging platform receives a second recharging request sent by the terminal equipment, wherein the second recharging request comprises second encrypted data of the password of the recharging card and the mobile phone number to be recharged, and the second encrypted data is obtained by encrypting the terminal equipment by using a second encryption key.
The terminal equipment can encrypt the rechargeable card password by using a symmetric encryption algorithm or an asymmetric encryption algorithm, and when the terminal equipment encrypts the rechargeable card password by using the symmetric encryption algorithm, a second encryption key used by the terminal equipment for encryption is the same as a second decryption key used by the recharging platform for decryption.
When the terminal equipment uses the asymmetric encryption algorithm to encrypt the password of the rechargeable card, the rechargeable platform and the terminal equipment use a key pair to encrypt and decrypt, the key pair comprises a public key and a private key, and the data encrypted by the public key can be decrypted only by using the private key. In this embodiment, the second encryption key used by the terminal device for encryption is a second public key, the second decryption key used by the recharge platform for decryption is a second private key, and the second public key and the second private key form a second key pair.
Optionally, the second key pair is generated by the charging platform, the terminal device sends the first charging request to the charging platform according to the charging operation triggered by the user, the charging platform may send the second public key to the terminal device, and store the second private key, and after the terminal device obtains the second public key, the terminal device encrypts the rechargeable card password by using the second public key to obtain second encrypted data. The second encryption key is a second public key in a second key pair generated by the recharging platform, and the second key pair comprises the second public key and a second private key.
S506, the recharging platform decrypts the second encrypted data of the recharging card password by using the stored second decryption key to obtain the recharging card password.
And S507, the recharging platform recharges the mobile phone number to be recharged according to the recharging card password.
The method of this embodiment, which has similar implementation principle and technical effect to the embodiment shown in fig. 4, is not described herein again.
The following describes the information encryption method of the rechargeable card by taking asymmetric encryption algorithm as an example for encryption of the password of the rechargeable card, and fig. 7 is an interaction schematic diagram of the information encryption method of the rechargeable card provided by the present invention, as shown in fig. 7, the method of the present embodiment is as follows:
s701, the terminal device generates a first key pair according to the operation of purchasing the rechargeable card triggered by the user, wherein the first key pair comprises a first public key and a first private key.
S702, the terminal device sends a rechargeable card purchase request to the recharging platform, wherein the rechargeable card purchase request comprises a first public key.
S703, the charging platform determines a password of the charging card according to the purchase request of the charging card, and encrypts the password of the charging card by using the first public key to obtain first encrypted data of the password of the charging card.
S704, the charging platform sends a response of the rechargeable card purchase request to the terminal device, wherein the response of the rechargeable card purchase request comprises first encrypted data of a rechargeable card password.
S705, the terminal device decrypts the first encrypted data of the rechargeable card password by using the first private key to obtain the rechargeable card password.
S706, the terminal device sends a first recharging request to the recharging platform according to the recharging operation triggered by the user.
S707, the recharging platform generates a second key pair according to the first recharging request, wherein the second key pair comprises a second public key and a second private key.
S708, the recharging platform sends a response of the first recharging request to the terminal device, and the response of the first recharging request comprises the second public key.
And S709, the terminal equipment encrypts the rechargeable card password by using the second public key to obtain second encrypted data of the rechargeable card password, wherein the second encrypted data is obtained by encrypting the terminal equipment by using the second encryption key.
And S710, the terminal equipment sends a second recharging request to the recharging platform, wherein the second recharging request comprises second encrypted data of the recharging card password and the mobile phone number to be recharged.
S711, the recharging platform decrypts the second encrypted data of the recharging card password by using the second private key to obtain the recharging card password, and recharges the mobile phone number to be recharged according to the recharging card password.
And S712, the recharging platform sends a response of the second recharging request to the terminal device.
The method of the present embodiment, which has the similar implementation principle and technical effect to those of the above-mentioned embodiments, is not described herein again.
Fig. 8 is a schematic structural diagram of a rechargeable card information encryption apparatus according to the present invention, as shown in fig. 8, the rechargeable card information encryption apparatus includes:
a first sending module 801, configured to send a rechargeable card purchase request to a recharging platform, where the rechargeable card purchase request is used to request to purchase a rechargeable card;
a first receiving module 802, configured to receive a response of a rechargeable card purchase request sent by a recharging platform, where the response of the rechargeable card purchase request includes first encrypted data of a rechargeable card password, and the first encrypted data is data obtained by encrypting the rechargeable card password by using a first encryption key by the recharging platform;
the first decryption module 803 is configured to decrypt the first encrypted data of the recharge card password according to the stored first decryption key, so as to obtain the recharge card password.
Optionally, the first encryption key and the first decryption key are the same.
Optionally, the rechargeable card information encryption apparatus further includes:
the first generation module is used for generating a first key pair by adopting an asymmetric encryption algorithm according to the operation of purchasing the rechargeable card triggered by the user, wherein the first key pair comprises a first public key and a first private key, the first public key is a first encryption key, and the first private key is a first decryption key;
and the first storage module is used for carrying the first encryption key in the rechargeable card purchase request and storing the first decryption key.
Optionally, the rechargeable card information encryption apparatus further includes:
the first encryption module is used for encrypting the rechargeable card password by using a second encryption key to obtain second encryption data of the rechargeable card password;
the second sending module is used for sending a second recharging request to the recharging platform, wherein the second recharging request comprises second encrypted data of the password of the recharging card and the mobile phone number to be recharged, and the second encrypted data is obtained by encrypting the terminal equipment by using a second encryption key;
and the second receiving module is used for receiving a response of the second recharging request sent by the recharging platform.
Optionally, the rechargeable card information encryption apparatus further includes:
the third sending module is used for sending a first recharging request to the recharging platform according to the recharging operation triggered by the user;
and the third receiving module is used for receiving a response of the first recharging request sent by the recharging platform, wherein the response of the first recharging request comprises a second encryption key, the second encryption key is a second public key in a second key pair generated by the recharging platform, and the second key pair comprises the second public key and a second private key.
Fig. 9 is a schematic structural diagram of another rechargeable card information encryption device provided in the present invention, and as shown in fig. 9, the rechargeable card information encryption device includes:
a fourth receiving module 901, configured to receive a rechargeable card purchase request sent by a terminal device, where the rechargeable card purchase request is used to request to purchase a rechargeable card;
a determining module 902, configured to determine a password of the prepaid card according to the prepaid card purchase request;
the second encryption module 903 is configured to encrypt the recharge card password according to the first encryption key to obtain first encryption data of the recharge card password;
a fourth sending module 904, configured to send a response to the prepaid card purchase request to the terminal device, where the response to the prepaid card purchase request includes the first encrypted data of the prepaid card password.
Optionally, the rechargeable card purchase request includes a first encryption key, the second encryption key is a first public key in a first key pair generated by the terminal device, and the first key pair includes the first public key and a first private key.
Optionally, the rechargeable card information encryption apparatus further includes:
the fifth receiving module is used for receiving a second recharging request sent by the terminal equipment, wherein the second recharging request comprises second encrypted data of the password of the recharging card and the mobile phone number to be recharged, and the second encrypted data is obtained by encrypting the terminal equipment by using a second encryption key;
the second decryption module is used for decrypting second encrypted data of the rechargeable card password by using the stored second decryption key to obtain the rechargeable card password;
and the recharging module is used for recharging the mobile phone number to be recharged according to the password of the recharging card.
Optionally, the second encryption key and the second decryption key are the same.
Optionally, the rechargeable card information encryption apparatus further includes:
the sixth receiving module is used for receiving the first recharging request sent by the terminal equipment;
the second generation module is used for generating a second key pair according to the first recharging request, wherein the second key pair comprises a second public key and a second private key, the second public key is a second encryption key, and the second private key is a second decryption key;
and the second storage module is used for the recharging platform to carry the second encryption key in the response of the first recharging request and send the response to the terminal equipment, and stores the second decryption key.
The apparatus of the foregoing embodiment may be configured to implement the technical solution of the foregoing method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 10 is a schematic structural diagram of a terminal device provided in the present invention, and as shown in fig. 10, the terminal device includes:
a processor 101, a memory 102 and a transceiver 103, the memory 102 being configured to store instructions, the transceiver 103 being configured to communicate with other devices, the processor 101 being configured to execute the instructions stored in the memory 102 to cause the terminal device to perform the method in the embodiment shown in fig. 2 or fig. 4.
Fig. 11 is a schematic structural diagram of a top-up platform provided in the present invention, as shown in fig. 11, the top-up platform includes:
a processor 111, a memory 112 and a transceiver 113, the memory 112 being adapted to store instructions, the transceiver 113 being adapted to communicate with other devices, the processor 111 being adapted to execute the instructions stored in the memory 112 to cause the terminal device to perform the method as in the embodiment shown in fig. 5 or fig. 6.
Those of ordinary skill in the art will understand that: all or part of the steps executed by the terminal device in the method embodiment shown in fig. 2 or fig. 4 can be implemented by hardware related to program instructions. The foregoing program may be stored in a computer-readable storage medium. Which when executed performs steps comprising the method embodiments described above.
Those of ordinary skill in the art will understand that: all or part of the steps executed by the top-up platform in the embodiment of the method shown in fig. 5 or fig. 6 can be completed by hardware related to the program instruction. The foregoing program may be stored in a computer-readable storage medium. Which when executed performs steps comprising the method embodiments described above.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (24)

1. A rechargeable card information encryption method is characterized by comprising the following steps:
the method comprises the steps that terminal equipment sends a rechargeable card purchase request to a recharging platform, wherein the rechargeable card purchase request is used for requesting to purchase a rechargeable card;
the terminal equipment receives a response of the rechargeable card purchase request sent by the recharging platform, wherein the response of the rechargeable card purchase request comprises first encrypted data of a rechargeable card password, and the first encrypted data is data obtained by encrypting the rechargeable card password by the recharging platform through a first encryption key;
and the terminal equipment decrypts the first encrypted data of the recharging card password according to the stored first decryption key to obtain the recharging card password.
2. The method of claim 1, wherein before the terminal device sends the request for purchasing the rechargeable card to the recharging platform, the method further comprises:
the terminal equipment generates a first key pair by adopting an asymmetric encryption algorithm according to the operation of purchasing the rechargeable card triggered by a user, wherein the first key pair comprises a first public key and a first private key, the first public key is the first encryption key, and the first private key is the first decryption key;
and the terminal equipment carries the first encryption key in the rechargeable card purchase request and stores the first decryption key.
3. The method of claim 1, wherein the first encryption key and the first decryption key are the same.
4. The method according to any one of claims 1-3, further comprising:
the terminal equipment encrypts the recharging card password by using a second encryption key to obtain second encryption data of the recharging card password;
the terminal equipment sends a second recharging request to the recharging platform, wherein the second recharging request comprises second encrypted data of the recharging card password and a mobile phone number to be recharged;
and the terminal equipment receives the response of the second recharging request sent by the recharging platform.
5. The method of claim 4, wherein before the terminal device encrypts the charger card password using the second encryption key, the method further comprises:
the terminal equipment sends a first recharging request to the recharging platform according to a recharging operation triggered by a user;
the terminal device receives a response of the first recharging request sent by the recharging platform, the response of the first recharging request includes the second encryption key, the second encryption key is a second public key in a second key pair generated by the recharging platform, and the second key pair includes the second public key and a second private key.
6. A rechargeable card information encryption method is characterized by comprising the following steps:
a charging platform receives a rechargeable card purchase request sent by terminal equipment, wherein the rechargeable card purchase request is used for requesting to purchase a rechargeable card;
the recharging platform determines a rechargeable card password according to the rechargeable card purchase request;
the recharging platform encrypts the recharging card password according to a first encryption key to obtain first encryption data of the recharging card password;
and the recharging platform sends a response of the recharging card purchase request to the terminal equipment, wherein the response of the recharging card purchase request comprises first encrypted data of the recharging card password.
7. The method of claim 6, wherein the first encryption key is included in the rechargeable card purchase request, wherein the first encryption key is a first public key of a first key pair generated by the terminal device, and wherein the first key pair includes the first public key and a first private key.
8. The method of claim 6 or 7, further comprising:
the recharging platform receives a second recharging request sent by the terminal equipment, wherein the second recharging request comprises second encrypted data of the recharging card password and a mobile phone number to be recharged, and the second encrypted data is obtained by encrypting the terminal equipment by using a second encryption key;
the recharging platform decrypts the second encrypted data of the recharging card password by using the stored second decryption key to obtain the recharging card password;
the recharging platform recharges the mobile phone number to be recharged according to the rechargeable card password;
and the recharging platform sends a response of the second recharging request to the terminal equipment.
9. The method of claim 8, wherein before the recharging platform receives the second recharging request sent by the terminal device, the method further comprises:
the recharging platform receives a first recharging request sent by the terminal equipment;
the recharging platform generates a second key pair according to the first recharging request, wherein the second key pair comprises a second public key and a second private key, the second public key is the second encryption key, and the second private key is the second decryption key;
and the recharging platform carries the second encryption key in the response of the first recharging request and sends the response to the terminal equipment, and stores the second decryption key.
10. The method of claim 8, wherein the second encryption key and the second decryption key are the same.
11. A rechargeable card information encryption apparatus, comprising:
the system comprises a first sending module, a second sending module and a charging platform, wherein the first sending module is used for sending a rechargeable card purchase request to the charging platform, and the rechargeable card purchase request is used for requesting to purchase a rechargeable card;
the first receiving module is used for receiving a response of the rechargeable card purchase request sent by the recharging platform, wherein the response of the rechargeable card purchase request comprises first encrypted data of a rechargeable card password, and the first encrypted data is data obtained by encrypting the rechargeable card password by the recharging platform through a first encryption key;
and the first decryption module is used for decrypting the first encrypted data of the recharging card password according to the stored first decryption key to obtain the recharging card password.
12. The apparatus of claim 11, wherein the rechargeable card information encryption apparatus further comprises:
the first generation module is used for generating a first key pair by adopting an asymmetric encryption algorithm according to operation of purchasing a rechargeable card triggered by a user, wherein the first key pair comprises a first public key and a first private key, the first public key is the first encryption key, and the first private key is the first decryption key;
and the first storage module is used for carrying the first encryption key in the rechargeable card purchase request and storing the first decryption key.
13. The apparatus of claim 11, wherein the first encryption key and the first decryption key are the same.
14. The apparatus according to any one of claims 11-13, wherein the rechargeable card information encryption apparatus further comprises:
the first encryption module is used for encrypting the recharging card password by using a second encryption key to obtain second encryption data of the recharging card password;
the second sending module is used for sending a second recharging request to the recharging platform, wherein the second recharging request comprises second encrypted data of the recharging card password and a mobile phone number to be recharged;
and the second receiving module is used for receiving the response of the second recharging request sent by the recharging platform.
15. The apparatus of claim 14, wherein the rechargeable card information encryption apparatus further comprises:
the third sending module is used for sending a first recharging request to the recharging platform according to the recharging operation triggered by the user;
a third receiving module, configured to receive a response to the first recharging request sent by the recharging platform, where the response to the first recharging request includes the second encryption key, the second encryption key is a second public key in a second key pair generated by the recharging platform, and the second key pair includes the second public key and a second private key.
16. A rechargeable card information encryption apparatus, comprising:
the fourth receiving module is used for receiving a rechargeable card purchasing request sent by the terminal equipment, wherein the rechargeable card purchasing request is used for requesting to purchase a rechargeable card;
the determining module is used for determining a rechargeable card password according to the rechargeable card purchase request;
the second encryption module is used for encrypting the recharging card password according to the first encryption key to obtain first encryption data of the recharging card password;
and the fourth sending module is used for sending a response of the rechargeable card purchase request to the terminal equipment, wherein the response of the rechargeable card purchase request comprises the first encrypted data of the rechargeable card password.
17. The apparatus of claim 16, wherein the first encryption key is included in the rechargeable card purchase request, wherein the first encryption key is a first public key of a first key pair generated by the terminal device, and wherein the first key pair includes the first public key and a first private key.
18. The apparatus according to claim 16 or 17, wherein the prepaid card information encryption apparatus further comprises:
a fifth receiving module, configured to receive a second recharging request sent by the terminal device, where the second recharging request includes second encrypted data of the recharging card password and a mobile phone number to be recharged, and the second encrypted data is obtained by encrypting, by using a second encryption key, the terminal device;
the second decryption module is used for decrypting second encrypted data of the recharging card password by using a stored second decryption key to obtain the recharging card password;
the recharging module is used for recharging the mobile phone number to be recharged according to the rechargeable card password;
and the fifth sending module is used for sending the response of the second recharging request to the terminal equipment.
19. The apparatus of claim 18, wherein the rechargeable card information encryption apparatus further comprises:
a sixth receiving module, configured to receive the first recharging request sent by the terminal device;
a second generating module, configured to generate a second key pair according to the first recharging request, where the second key pair includes a second public key and a second private key, the second public key is the second encryption key, and the second private key is the second decryption key;
and the second storage module is used for carrying the second encryption key in the response of the first recharging request, sending the response to the terminal equipment and storing the second decryption key.
20. The apparatus of claim 18, wherein the second encryption key and the second decryption key are the same.
21. A terminal device, comprising:
a processor, a memory for storing instructions, and a transceiver for communicating with other devices, the processor being configured to execute the instructions stored in the memory to cause the terminal device to perform the method of any one of claims 1-5.
22. A top-up platform, comprising:
a processor, a memory for storing instructions, and a transceiver for communicating with other devices, the processor for executing the instructions stored in the memory to cause the top-up platform to perform the method of any of claims 6-10.
23. A computer-readable storage medium applied in a terminal device, wherein the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions when executed by a processor are used for implementing the rechargeable card information encryption method according to any one of claims 1-5.
24. A computer-readable storage medium applied in a top-up platform, wherein the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are executed by a processor to implement the rechargeable card information encryption method according to any one of claims 6-10.
CN201911255247.7A 2019-12-10 2019-12-10 Rechargeable card information encryption method and device, terminal equipment and recharging platform Active CN111127000B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911255247.7A CN111127000B (en) 2019-12-10 2019-12-10 Rechargeable card information encryption method and device, terminal equipment and recharging platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911255247.7A CN111127000B (en) 2019-12-10 2019-12-10 Rechargeable card information encryption method and device, terminal equipment and recharging platform

Publications (2)

Publication Number Publication Date
CN111127000A true CN111127000A (en) 2020-05-08
CN111127000B CN111127000B (en) 2023-04-25

Family

ID=70497980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911255247.7A Active CN111127000B (en) 2019-12-10 2019-12-10 Rechargeable card information encryption method and device, terminal equipment and recharging platform

Country Status (1)

Country Link
CN (1) CN111127000B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112101935A (en) * 2020-09-11 2020-12-18 上海阿吉必信息技术有限公司 Processing method and device for block chain rechargeable card
CN112532388A (en) * 2020-12-04 2021-03-19 广州羊城通有限公司 Encryption method and device for air-issued data of air-issued card

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1913547A (en) * 2006-08-28 2007-02-14 华为技术有限公司 Card distributing user terminer, centre and method and system for protecting repaid card data
CN101098225A (en) * 2006-06-29 2008-01-02 中国银联股份有限公司 Safety data transmission method and paying method, paying terminal and paying server
CN101609575A (en) * 2009-07-09 2009-12-23 中国网通集团宽带业务应用国家工程实验室有限公司 Automatically obtain the method and the device of rechargeable card
US20120311322A1 (en) * 2011-06-06 2012-12-06 Kobil Systems Gmbh Secure Access to Data in a Device
CN104504806A (en) * 2010-12-17 2015-04-08 谷歌公司 Local Trusted Services Manager For A Contactless Smart Card
US20150149365A1 (en) * 2013-11-24 2015-05-28 Zanguli Llc Secure payment card
US20150332262A1 (en) * 2014-05-13 2015-11-19 Phaneendra Ramaseshu Lingappa Master applet for secure remote payment processing
CN105989472A (en) * 2015-03-06 2016-10-05 华立科技股份有限公司 Wireless mobile configuration, wireless payment configuration and wireless payment configuration method of electric energy measurement system, and public commodity wireless payment configuration
CN106375090A (en) * 2016-08-31 2017-02-01 中城智慧科技有限公司 Recharging system and recharging method thereof
CN106815761A (en) * 2016-12-31 2017-06-09 中国移动通信集团江苏有限公司 E-voucher center card processing method, device and system
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
US20180349901A1 (en) * 2016-01-25 2018-12-06 Alibaba Group Holding Limited Credit payment method and apparatus based on mobile terminal peer-to-peer
CN109886684A (en) * 2019-02-26 2019-06-14 努比亚技术有限公司 A kind of mobile terminal safety means of defence, mobile terminal and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098225A (en) * 2006-06-29 2008-01-02 中国银联股份有限公司 Safety data transmission method and paying method, paying terminal and paying server
CN1913547A (en) * 2006-08-28 2007-02-14 华为技术有限公司 Card distributing user terminer, centre and method and system for protecting repaid card data
CN101609575A (en) * 2009-07-09 2009-12-23 中国网通集团宽带业务应用国家工程实验室有限公司 Automatically obtain the method and the device of rechargeable card
CN104504806A (en) * 2010-12-17 2015-04-08 谷歌公司 Local Trusted Services Manager For A Contactless Smart Card
US20120311322A1 (en) * 2011-06-06 2012-12-06 Kobil Systems Gmbh Secure Access to Data in a Device
US20150149365A1 (en) * 2013-11-24 2015-05-28 Zanguli Llc Secure payment card
US20150332262A1 (en) * 2014-05-13 2015-11-19 Phaneendra Ramaseshu Lingappa Master applet for secure remote payment processing
CN105989472A (en) * 2015-03-06 2016-10-05 华立科技股份有限公司 Wireless mobile configuration, wireless payment configuration and wireless payment configuration method of electric energy measurement system, and public commodity wireless payment configuration
US20180349901A1 (en) * 2016-01-25 2018-12-06 Alibaba Group Holding Limited Credit payment method and apparatus based on mobile terminal peer-to-peer
CN106375090A (en) * 2016-08-31 2017-02-01 中城智慧科技有限公司 Recharging system and recharging method thereof
CN106815761A (en) * 2016-12-31 2017-06-09 中国移动通信集团江苏有限公司 E-voucher center card processing method, device and system
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
CN109886684A (en) * 2019-02-26 2019-06-14 努比亚技术有限公司 A kind of mobile terminal safety means of defence, mobile terminal and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112101935A (en) * 2020-09-11 2020-12-18 上海阿吉必信息技术有限公司 Processing method and device for block chain rechargeable card
CN112532388A (en) * 2020-12-04 2021-03-19 广州羊城通有限公司 Encryption method and device for air-issued data of air-issued card
CN112532388B (en) * 2020-12-04 2023-10-13 广州羊城通有限公司 Encryption method and device for air issuing data of air issuing card

Also Published As

Publication number Publication date
CN111127000B (en) 2023-04-25

Similar Documents

Publication Publication Date Title
US10595201B2 (en) Secure short message service (SMS) communications
CN109150835B (en) Cloud data access method, device, equipment and computer readable storage medium
KR100791432B1 (en) Providing a user device with a set of access codes
CN106878245B (en) Graphic code information providing and obtaining method, device and terminal
KR101800737B1 (en) Control method of smart device for self-identification, recording medium for performing the method
CN105684346A (en) Method for securing over-the-air communication between a mobile application and a gateway
CN111861451A (en) Offline transaction method, client device and POS (point of sale) machine
JP2013514556A (en) Method and system for securely processing transactions
CN108199847B (en) Digital security processing method, computer device, and storage medium
WO2017190633A1 (en) Method and device for reliably verifying identity of financial card user
CN108616352B (en) Dynamic password generation method and system based on secure element
CN109905350A (en) A kind of data transmission method and system
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN112241527B (en) Secret key generation method and system of terminal equipment of Internet of things and electronic equipment
CN112248844A (en) Charging starting method of charging pile, intelligent terminal and charging system
CN111127000B (en) Rechargeable card information encryption method and device, terminal equipment and recharging platform
CN106980977B (en) Payment method and system based on Internet of things
CN113674456A (en) Unlocking method, unlocking device, electronic equipment and storage medium
CN109379345B (en) Sensitive information transmission method and system
JP2003208409A (en) Authentication system and method
JP4028849B2 (en) Communication system, portable terminal, and program
CN109949457B (en) Intelligent door lock control method and related device
CN116599719A (en) User login authentication method, device, equipment and storage medium
CN106815761B (en) Electronic rechargeable card processing method, device and system
CN115801232A (en) Private key protection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant