CN111460405A - Method, device, equipment and medium for enabling equipment outside cabinet to enter background setting - Google Patents

Method, device, equipment and medium for enabling equipment outside cabinet to enter background setting Download PDF

Info

Publication number
CN111460405A
CN111460405A CN202010185438.7A CN202010185438A CN111460405A CN 111460405 A CN111460405 A CN 111460405A CN 202010185438 A CN202010185438 A CN 202010185438A CN 111460405 A CN111460405 A CN 111460405A
Authority
CN
China
Prior art keywords
certificate file
cabinet
password
certificate
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010185438.7A
Other languages
Chinese (zh)
Other versions
CN111460405B (en
Inventor
张恒
段琼
张登峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Centerm Information Co Ltd
Original Assignee
Fujian Centerm Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Centerm Information Co Ltd filed Critical Fujian Centerm Information Co Ltd
Priority to CN202010185438.7A priority Critical patent/CN111460405B/en
Publication of CN111460405A publication Critical patent/CN111460405A/en
Application granted granted Critical
Publication of CN111460405B publication Critical patent/CN111460405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/206Software aspects at ATMs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for setting equipment outside a cabinet to enter a background, which comprises the following steps: monitoring whether a keyboard of the equipment outside the cabinet is triggered according to a set rule; judging whether a first certificate file is acquired or not after triggering, if so, loading the first certificate file, and then generating a first password table; if not, loading a second certificate file, and then generating a second password table; acquiring an input password; and inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to an inquiry result. The method, the device, the equipment and the medium for the equipment outside the cabinet to enter the background setting can dynamically adapt to various scenes for entering the background setting and ensure the safety.

Description

Method, device, equipment and medium for enabling equipment outside cabinet to enter background setting
Technical Field
The invention relates to the field of bank out-of-cabinet equipment, in particular to a method, a device, equipment and a medium for enabling out-of-cabinet equipment to enter background setting.
Background
Currently, each big bank uses traditional out-of-cabinet equipment such as an out-of-cabinet device and the like to commonly adopt an android system, and compared with common android equipment, the out-of-cabinet equipment requires cutting for using safety, such as directly starting service application when the bank is started, and shielding a native desktop of the system; shielding the upper and lower status bars, and preventing the system from entering system settings through operating the screen; and a method for masking the opening of developer modes such as ADB. Although the safety of the equipment system can be greatly improved by the design at present, the equipment is lack of convenience for self detection, management, setting, upgrading and other maintenance.
At present, some methods for entering background setting of the outside cabinet cleaning equipment in the market include entering by clicking a screen according to rules, entering by starting an upper computer tool and the like, and the methods only trigger entering of a specified background setting interface, cannot dynamically adapt to various scenes, also have the possibility of false triggering, and cannot be guaranteed in safety.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method, a device, equipment and a medium for setting the background of an out-of-cabinet device, which can dynamically adapt to various scenes for setting the background of the out-of-cabinet device and ensure the safety.
In a first aspect, the present invention provides a method for setting a device outside a cabinet to enter a background, including:
step 10, monitoring whether a keyboard of the equipment outside the cabinet is triggered according to a set rule, if not, continuing monitoring, and if so, entering step 20;
step 20, judging whether a first certificate file is acquired, if so, loading the first certificate file, and then generating a first password table; if not, loading a second certificate file, and then generating a second password table;
step 30, acquiring an input password;
and step 40, inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to an inquiry result.
Preferably, the first certificate file includes an encryption algorithm type, a key serial number, and an encrypted first cipher table, the encrypted first cipher table is encrypted by using a key of an outside-cabinet device, and the "loading the first certificate file, and then generating the first cipher table" further specifically includes:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching in an out-of-cabinet device according to the encryption algorithm type and the key serial number to obtain the key, and then decrypting the encrypted first cipher table by using the key to obtain the decrypted first cipher table.
Preferably, the first certificate file further includes a certificate validity date, the validity of the first certificate file is judged according to the certificate validity date, and when the first certificate file is invalid, loading of the second certificate file is executed.
Preferably, the first certificate file is acquired from an external storage device connected to the outside of the cabinet device.
In a second aspect, the present invention provides a device for enabling an external device to enter a background setting, including: the system comprises a monitoring module, a password table generating module, a password obtaining module and an executing module;
the monitoring module is used for monitoring whether a keyboard of the equipment outside the cabinet is triggered according to a set rule, if not, the monitoring is continued, and if so, the equipment enters the password table module;
the password table module is used for judging whether a first certificate file is acquired or not, if so, loading the first certificate file, and then generating a first password table; if not, loading a second certificate file, and then generating a second password table;
the password acquisition module is used for acquiring an input password;
the execution module is used for inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to an inquiry result.
Preferably, the first certificate file includes an encryption algorithm type, a key serial number, and an encrypted first cipher table, the encrypted first cipher table is encrypted by using a key of an outside-cabinet device, and the "loading the first certificate file, and then generating the first cipher table" further specifically includes:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching in an out-of-cabinet device according to the encryption algorithm type and the key serial number to obtain the key, and then decrypting the encrypted first cipher table by using the key to obtain the decrypted first cipher table.
Preferably, the first certificate file further includes a certificate validity date, the validity of the first certificate file is judged according to the certificate validity date, and when the first certificate file is invalid, loading of the second certificate file is executed.
Preferably, the first certificate file is acquired from an external storage device connected to the outside of the cabinet device.
In a third aspect, the present invention provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of the first aspect when executing the program.
In a fourth aspect, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the method of the first aspect.
One or more technical solutions provided in the embodiments of the present invention have at least the following technical effects or advantages:
1. by monitoring whether a keyboard of the equipment outside the cabinet triggers to enter password input according to a set rule or not, a user can be prevented from entering a set interface by mistake so as to influence the handling of normal business; meanwhile, the operation is convenient enough, and the use efficiency is not influenced;
2. different functions are realized through various different passwords through more convenient configuration of the form of the password table, and the expansibility is quite good;
3. the operation legality can be ensured through the certificate file authorization mode, the main body part of the certificate file can be prevented from being maliciously tampered by adopting an encryption mode, and the safety is greatly improved;
4. by setting the effective date for the certificate file, the use of the password login function is further specified, and the misuse is avoided.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a flow chart of a method according to one embodiment of the present invention;
FIG. 2 is a schematic structural diagram of an apparatus according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to a third embodiment of the invention;
FIG. 4 is a schematic structural diagram of a medium according to a fourth embodiment of the present invention;
FIG. 5 is a diagram illustrating the composition of a certificate file according to a fifth embodiment of the present invention;
FIG. 6 is a schematic flow chart of a fifth embodiment of the present invention;
FIG. 7 is a schematic diagram of a cipher table in accordance with a fifth embodiment of the present invention;
fig. 8 is a schematic diagram of a password input interface in the fifth embodiment of the present invention.
Detailed Description
The embodiment of the application provides a method, a device, equipment and a medium for enabling the equipment outside the cabinet to enter the background setting, so that various scenes for entering the background setting of the equipment outside the cabinet can be dynamically adapted, and the safety is guaranteed.
The technical scheme in the embodiment of the application has the following general idea:
1. compared with the screen in the area which is frequently clicked, the physical key carried by the cabinet external device (such as the cabinet external cleaning device) is used as a triggering medium for entering the background setting. To distinguish from conventional keypad use, the activation takes the form of a combination of keys.
2. In order to further avoid the situation of false triggering, the keyboard combination key firstly enters a password input interface after being triggered, and the keyboard combination key is allowed to enter a background only by inputting a correct password.
3. In order to support different passwords to enter different setting interfaces and facilitate dynamic configuration, before the password is judged, a table (namely a password table) of the password and the designated function is generated by loading a certificate file in a storage device (such as a TF card), the different passwords are supported to enter different setting interfaces, and different passwords trigger different non-interface functions; and if the storage equipment is not accessed, loading a default certificate file to ensure the lowest degree of adaptability.
4. In order to prevent the cipher table from being tampered, the cipher table is encrypted and is attached with key information to form a certificate file; the legality of the certificate file is judged to ensure that the password table is not maliciously modified.
5. The certificate file provides a certificate expiration date, ensuring that expired certificate files are not used.
Example one
The embodiment provides a method for enabling an external device to enter a background setting, which may include the following steps as shown in fig. 1;
s101, monitoring whether a keyboard of the equipment outside the cabinet is triggered according to a set rule (for example, pressing a cancel key for 6 times continuously), if not, continuing monitoring, and if so, entering S102;
s102, judging whether a first certificate file is acquired or not, if so, loading the first certificate file, and then generating a first password table; if not, loading a second certificate file, and then generating a second password table;
s103, acquiring an input password;
s104, inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to an inquiry result.
In order to support different passwords to enter different setting interfaces and facilitate dynamic configuration, a first password table is generated by acquiring a first certificate file (for example, a certificate file in an external storage device) before the password is judged, so that different passwords are supported to enter different setting interfaces, and different passwords trigger different non-interface functions; if the first certificate file is not acquired, a second certificate file (for example, a default certificate file stored in the out-of-cabinet device) is loaded to generate a second password table (i.e., a default password table), so that the minimum degree of adaptability is ensured.
In a possible implementation manner, the first certificate file includes an encryption algorithm type, a key serial number, and an encrypted first cipher table, where the encrypted first cipher table is encrypted by using a key of an outside-cabinet device, and the "loading the first certificate file, and then generating the first cipher table" further specifically includes:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching in an out-of-cabinet device according to the encryption algorithm type and the key serial number to obtain the key, and then decrypting the encrypted first cipher table by using the key to obtain the decrypted first cipher table.
In order to prevent the cipher table from being tampered, the cipher table is encrypted and is attached with key information to form a certificate file; the security code table is ensured not to be maliciously modified by judging the legality of the certificate file, and the security is ensured.
In a possible implementation manner, the first certificate file further includes a certificate validity date, the validity of the first certificate file is judged according to the certificate validity date, and when the first certificate file is invalid (for example, the current time exceeds the certificate validity date), loading of the second certificate file is performed.
The certificate file provides the valid period of the certificate, and ensures that the expired certificate file is not adopted, thereby further improving the security.
The first certificate file is obtained from an external storage device (such as a TF card) connected with the equipment outside the cabinet, and flexible configuration is facilitated.
Based on the same inventive concept, the application also provides a device corresponding to the method in the first embodiment, which is detailed in the second embodiment.
Example two
In this embodiment, an apparatus 200 for entering a background setting of an out-of-cabinet device is provided, as shown in fig. 2, including: a monitoring module 201, a password table module 202, a password obtaining module 203 and an execution module 204;
the monitoring module 201 is configured to monitor whether a keyboard of the outside-cabinet device is triggered according to a set rule, if not, continue monitoring, and if so, enter the password table module 202;
the password table module 202 is configured to determine whether a first certificate file is acquired, and if so, load the first certificate file and then generate a first password table; if not, loading a second certificate file, and then generating a second password table;
the password obtaining module 203 is configured to obtain an input password;
the execution module 204 is configured to query the input password in the first password table or the second password table, and enter a background setting interface or trigger a background function or send an error prompt according to a query result.
In a possible implementation manner, the first certificate file includes an encryption algorithm type, a key serial number, and an encrypted first cipher table, where the encrypted first cipher table is encrypted by using a key of an outside-cabinet device, and the "loading the first certificate file, and then generating the first cipher table" further specifically includes:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching in an out-of-cabinet device according to the encryption algorithm type and the key serial number to obtain the key, and then decrypting the encrypted first cipher table by using the key to obtain the decrypted first cipher table.
In a possible implementation manner, the first certificate file further includes a certificate validity date, the validity of the first certificate file is judged according to the certificate validity date, and when the first certificate file is invalid, loading of the second certificate file is executed.
In one possible implementation, the first certificate file is obtained from an external storage device connected to the out-of-cabinet device.
Since the apparatus described in the second embodiment of the present invention is an apparatus used for implementing the method of the first embodiment of the present invention, based on the method described in the first embodiment of the present invention, a person skilled in the art can understand the specific structure and the deformation of the apparatus, and thus the details are not described herein. All the devices adopted in the method of the first embodiment of the present invention belong to the protection scope of the present invention.
Based on the same inventive concept, the application provides an electronic device embodiment corresponding to the first embodiment, which is detailed in the third embodiment.
EXAMPLE III
The present embodiment provides an electronic device 300, as shown in fig. 3, which includes a memory 310, a processor 320, and a computer program 311 stored in the memory and running on the processor, and when the processor 320 executes the computer program 311, any embodiment of the first embodiment can be implemented.
Since the electronic device described in this embodiment is a device used for implementing the method in the first embodiment of the present application, based on the method described in the first embodiment of the present application, a specific implementation of the electronic device in this embodiment and various variations thereof can be understood by those skilled in the art, and therefore, how to implement the method in the first embodiment of the present application by the electronic device is not described in detail herein. The equipment used by those skilled in the art to implement the methods in the embodiments of the present application is within the scope of the present application.
Based on the same inventive concept, the application provides a storage medium corresponding to the fourth embodiment, which is described in detail in the fourth embodiment.
Example four
The embodiment provides a computer-readable storage medium 400, as shown in fig. 4, on which a computer program 411 is stored, and when the computer program 411 is executed by a processor, any one of the embodiment modes can be implemented.
EXAMPLE five
The present embodiment is a specific application embodiment, please refer to fig. 5 to 8, which may include the following steps:
1. when the equipment (hereinafter referred to as the equipment end) leaves the factory, the key generation tool randomly generates 100 sets of international algorithm (3DES) keys and 100 sets of national algorithm (SM4) keys, and the keys are imported into a password keyboard encryption chip (hereinafter referred to as an encryption chip) of the equipment end for storage.
2. A set of keys is randomly used to synthesize a certificate file with a cryptogram and other information. The certificate file is divided into a basic information part and a main body part: the basic information part comprises a key algorithm and a key serial number used by the encryption of the main body part; the main body part is data encrypted by a specified key, and specifically comprises a certificate issuer, a certificate valid date and a cipher table.
3. The equipment outside the cabinet starts a key monitoring service in an idle state of the equipment, monitors a combined key broadcast returned by the encryption chip, and sends a triggered combined key broadcast to the equipment end when the encryption chip monitors whether the keyboard is triggered according to a set rule (for example, pressing a 'cancel' key for 6 times continuously).
4. And after monitoring the combined key broadcast, the equipment terminal scans the certificate file in the TF card, and if the TF card has no file, the equipment terminal loads the certificate file specified in the program to analyze.
5. The device side reads the basic information part of the certificate file to obtain a key algorithm and a key serial number, and then transmits the key algorithm and the key serial number to the encryption chip; the encryption chip judges whether the algorithm type is the 3DES algorithm or the SM4 algorithm according to the obtained algorithm type, obtains a specified key according to the key serial number, and then decrypts the main part of the certificate file by using the key.
6. If the decryption is successful, whether the issuer is correct and whether the current system time is within the certificate validity date are determined.
7. If the certificate is valid, the password table is analyzed, and different functions guided by different passwords are loaded into the memory.
8. The password table may be represented in xml (as in fig. 7), and each entry contains a specific password, the type of execution (going to a certain interface or executing a function), and the name of the application package and the name of the class to be relied upon.
9. After the password table is loaded, the equipment end displays a password input interface (as shown in fig. 8); after the password is input and determined, searching is carried out according to the password table, and then corresponding operation is carried out. If the input password does not exist in the password table, prompting that the input password is wrong.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages: according to the method, the device, the equipment and the medium for the equipment outside the cabinet to enter the background setting, whether the keyboard of the equipment outside the cabinet triggers to enter the password input according to the set rule or not is monitored, and the situation that a user mistakenly triggers to enter a setting interface to influence the handling of normal business can be prevented to the maximum extent; meanwhile, the operation is convenient enough, and the use efficiency is not influenced; different functions are realized through various different passwords through more convenient configuration of the form of the password table, and the expansibility is quite good; the operation legality can be ensured through the certificate file authorization mode, the main body part of the certificate file can be prevented from being maliciously tampered by adopting an encryption mode, and the safety is greatly improved; by setting the effective date for the certificate file, the use of the password login function is further specified, and the misuse is avoided.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, device or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (10)

1. A method for enabling a device outside a cabinet to enter background setting is characterized in that: the method comprises the following steps:
step 10, monitoring whether a keyboard of the equipment outside the cabinet is triggered according to a set rule, if not, continuing monitoring, and if so, entering step 20;
step 20, judging whether a first certificate file is acquired, if so, loading the first certificate file, and then generating a first password table; if not, loading a second certificate file, and then generating a second password table;
step 30, acquiring an input password;
and step 40, inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to an inquiry result.
2. The method for enabling the out-of-cabinet device to enter the background setting according to claim 1, wherein the method comprises the following steps: the first certificate file comprises an encryption algorithm type, a key serial number and an encrypted first password table, the encrypted first password table is encrypted by using a key of an outside-cabinet device, and the step of loading the first certificate file and then generating the first password table further specifically comprises the steps of:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching in an out-of-cabinet device according to the encryption algorithm type and the key serial number to obtain the key, and then decrypting the encrypted first cipher table by using the key to obtain the decrypted first cipher table.
3. The method for enabling the out-of-cabinet device to enter the background setting according to claim 2, wherein the method comprises the following steps: the first certificate file also comprises a certificate valid date, the validity of the first certificate file is judged according to the certificate valid date, and when the first certificate file is invalid, loading of a second certificate file is executed.
4. The method for enabling the equipment outside the cabinet to enter the background setting according to any one of claims 1 to 3, wherein the method comprises the following steps: the first certificate file is obtained from an external storage device connected with the equipment outside the cabinet.
5. The utility model provides a device that equipment got into backstage setting outside cabinet which characterized in that: the method comprises the following steps: the system comprises a monitoring module, a password table module, a password acquisition module and an execution module;
the monitoring module is used for monitoring whether a keyboard of the equipment outside the cabinet is triggered according to a set rule, if not, the monitoring is continued, and if so, the equipment enters the password table module;
the password table module is used for judging whether a first certificate file is acquired or not, if so, loading the first certificate file, and then generating a first password table; if not, loading a second certificate file, and then generating a second password table;
the password acquisition module is used for acquiring an input password;
the execution module is used for inquiring the input password in the first password table or the second password table, and entering a background setting interface or triggering a background function or sending an error prompt according to an inquiry result.
6. The device for enabling the equipment outside the cabinet to enter the background setting according to claim 5, wherein: the first certificate file comprises an encryption algorithm type, a key serial number and an encrypted first password table, the encrypted first password table is encrypted by using a key of an outside-cabinet device, and the step of loading the first certificate file and then generating the first password table further specifically comprises the steps of:
and loading the first certificate file to obtain an encryption algorithm type and a key serial number, searching in an out-of-cabinet device according to the encryption algorithm type and the key serial number to obtain the key, and then decrypting the encrypted first cipher table by using the key to obtain the decrypted first cipher table.
7. The device for enabling the equipment outside the cabinet to enter the background setting according to claim 5, wherein: the first certificate file also comprises a certificate valid date, the validity of the first certificate file is judged according to the certificate valid date, and when the first certificate file is invalid, loading of a second certificate file is executed.
8. The device for enabling the equipment outside the cabinet to enter the background setting is characterized in that: the first certificate file is obtained from an external storage device connected with the equipment outside the cabinet.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 4 when executing the program.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 4.
CN202010185438.7A 2020-03-17 2020-03-17 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting Active CN111460405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010185438.7A CN111460405B (en) 2020-03-17 2020-03-17 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010185438.7A CN111460405B (en) 2020-03-17 2020-03-17 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting

Publications (2)

Publication Number Publication Date
CN111460405A true CN111460405A (en) 2020-07-28
CN111460405B CN111460405B (en) 2023-06-30

Family

ID=71682832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010185438.7A Active CN111460405B (en) 2020-03-17 2020-03-17 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting

Country Status (1)

Country Link
CN (1) CN111460405B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742658A (en) * 2021-07-22 2021-12-03 深圳市智微智能科技股份有限公司 adb tool encryption method, system, terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090282258A1 (en) * 2006-09-12 2009-11-12 Microlatch Pty Ltd. Password generator
US20100111300A1 (en) * 2007-06-27 2010-05-06 Keisuke Kido Server certificate issuing system
CN102970288A (en) * 2012-11-09 2013-03-13 江苏乐买到网络科技有限公司 Network transaction system with dynamic password generator
CN105447358A (en) * 2015-12-04 2016-03-30 小米科技有限责任公司 Password setting method and apparatus
CN207937976U (en) * 2017-07-20 2018-10-02 中国建设银行股份有限公司 A kind of electronic signature interactive terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090282258A1 (en) * 2006-09-12 2009-11-12 Microlatch Pty Ltd. Password generator
US20100111300A1 (en) * 2007-06-27 2010-05-06 Keisuke Kido Server certificate issuing system
CN102970288A (en) * 2012-11-09 2013-03-13 江苏乐买到网络科技有限公司 Network transaction system with dynamic password generator
CN105447358A (en) * 2015-12-04 2016-03-30 小米科技有限责任公司 Password setting method and apparatus
CN207937976U (en) * 2017-07-20 2018-10-02 中国建设银行股份有限公司 A kind of electronic signature interactive terminal equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李锋等: "安全网络认证平台的研究与设计", 《实验室研究与探索》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742658A (en) * 2021-07-22 2021-12-03 深圳市智微智能科技股份有限公司 adb tool encryption method, system, terminal and storage medium

Also Published As

Publication number Publication date
CN111460405B (en) 2023-06-30

Similar Documents

Publication Publication Date Title
CN111917773B (en) Service data processing method and device and server
US20170237775A1 (en) Method for implementing online anti-phishing
WO2014100640A1 (en) Verification of password using a keyboard with a secure password entry mode
US20170099144A1 (en) Embedded encryption platform comprising an algorithmically flexible multiple parameter encryption system
JP2004213216A (en) Information security microcomputer and its program developing device and program development system
CN109842616B (en) Account binding method and device and server
WO2021051591A1 (en) Secure keyboard realizing method and apparatus, and computer device and storage medium
CN111475823A (en) Data sharing method, equipment, server and readable storage medium
CN112468294A (en) Access method and authentication equipment for vehicle-mounted TBOX
CN114528602B (en) Security chip operation method and device based on attack detection behavior
JP2004246715A (en) Authentication information processing method
CN111460405A (en) Method, device, equipment and medium for enabling equipment outside cabinet to enter background setting
KR101769861B1 (en) User biometric authentication method and system using HSM smart card without password exposure
US9977907B2 (en) Encryption processing method and device for application, and terminal
CN112231674A (en) Skip verification method and system for URL (Uniform resource locator) address and electronic equipment
CN109344569B (en) Software use authorization method and system
CN115643081A (en) Industrial control system authentication method and device and computer equipment
KR101745390B1 (en) Data leakage prevention apparatus and method thereof
CN111523128B (en) Information protection method, system, electronic equipment and medium
KR20130053008A (en) Surveillance system and method for authentication procedure based by unique identifier
CN111600732B (en) Method and device for automatically activating and adding front-end equipment by front-end management equipment
CN112580003B (en) Permission control method and server based on BS architecture
CN115630377B (en) External device access method and device, computer device and external device
CN114679278B (en) Production maintenance method based on financial equipment and financial equipment
CN112395604B (en) System monitoring login protection method, client, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant