CN111464295B - Bank card making method and device - Google Patents

Bank card making method and device Download PDF

Info

Publication number
CN111464295B
CN111464295B CN202010236168.8A CN202010236168A CN111464295B CN 111464295 B CN111464295 B CN 111464295B CN 202010236168 A CN202010236168 A CN 202010236168A CN 111464295 B CN111464295 B CN 111464295B
Authority
CN
China
Prior art keywords
card
file
making
card making
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010236168.8A
Other languages
Chinese (zh)
Other versions
CN111464295A (en
Inventor
林灿燎
何思略
刘洋
赵如冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010236168.8A priority Critical patent/CN111464295B/en
Publication of CN111464295A publication Critical patent/CN111464295A/en
Application granted granted Critical
Publication of CN111464295B publication Critical patent/CN111464295B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention provides a method and a device for making a bank card, wherein the method comprises the following steps: generating card making data according to the received card making request; encrypting and transmitting verification processing is carried out on the card making data to generate a card making file; and transmitting the card making file to an outsourcing card making terminal outside the bank system for making the card. The invention provides a safe and reliable means for interacting card making data, the card making data file is safely exchanged to an outsourcing card making manufacturer for making a card, and the solution of card making efficiency is improved, so that the card making efficiency of a bank can be improved, the progress of applying a bank card by a customer to receive the bank card is accelerated, and the customer experience is improved.

Description

Bank card making method and device
Technical Field
The invention relates to a data processing technology, in particular to a method and a device for manufacturing a bank card.
Background
With the development of economy and science and technology, the data volume of bank cards is increasing day by day, and the card making requirements are increasing continuously.
In the prior art, after a bank system receives a card making request of a customer, a bank card making center makes a card, but the bank card making center is limited by the conditions of the size of a bank card making center field, the number of devices, the performance of the devices and the like, and the bank card making center gradually shows the problem that the card making cannot be performed in time due to bank card making data accumulation.
Disclosure of Invention
In order to improve the card making efficiency of the bank card, the invention provides a card making method of the bank card, which comprises the following steps:
generating card making data according to the received card making request;
encrypting and transmitting verification processing is carried out on the card making data to generate a card making file;
and transmitting the card making file to an outsourcing card making terminal outside the bank system for making the card.
In the embodiment of the present invention, the card manufacturing data includes: client sensitive information and target card-making terminal information; wherein the customer sensitive information includes: the card making requests identity information and card information of the client.
In the embodiment of the present invention, the encrypting, transmitting and verifying the card making data to generate the card making file includes:
encrypting the client sensitive information by using an encryption machine;
and encrypting the encrypted client sensitive information and the encrypted target card making terminal information by using a preset key algorithm to generate a card making file and a corresponding verification file.
In an embodiment of the present invention, the method further includes:
deriving an encryption machine key from the encryption machine by using a preset protection key algorithm;
splitting the encryption machine key to generate a key component;
sending the key component to different key receiving terminals;
and the external control card terminal receives the key component through the different key receiving terminals to obtain the encryption machine key.
In the embodiment of the present invention, the transmitting the card making file and the verification file to an outsourced card making terminal outside a bank system for making a card includes:
determining a target external card-making terminal according to the target card-making terminal information in the card-making data;
and verifying the card making file according to the verification file, and transmitting the card making file passing the verification to the target external card making terminal.
In the embodiment of the present invention, the transmitting the card making file to an outsourcing card making terminal for making a card further includes:
signing the card making file and the verification file by using a stored signature public key of the target outsourcing terminal;
storing the signed card making file and the signed verification file;
and transmitting the card making file and the verification file corresponding to the current signature public key to the target outsourcing terminal according to the signature public key of the card making terminal data.
Meanwhile, the invention also provides a bank card manufacturing device, which comprises:
the card making data generating module is used for generating card making data according to the received card making request;
the card making file generating module is used for encrypting the card making data and carrying out transmission verification processing to generate a card making file;
and the data transmission module is used for transmitting the card making file to an outsourcing card making terminal for making a card.
In the embodiment of the present invention, the card making file generating module includes:
the sensitive information encryption unit is used for encrypting the client sensitive information by using an encryption machine;
and the file generating unit is used for encrypting the encrypted client sensitive information and the encrypted target card making terminal information by using a preset key algorithm to generate a card making file and a corresponding verification file.
In the embodiment of the present invention, the apparatus further includes:
the derivation module is used for deriving the cipher key of the encryption machine from the encryption machine by utilizing a preset protection cipher key algorithm;
the splitting module is used for splitting the encryption machine key to generate a key component;
and the distribution module is used for sending the key components to different key receiving terminals so that the outsourcing card-making terminal receives the key components through the different key receiving terminals to obtain the encryption machine key.
In the embodiment of the present invention, the data transmission module includes:
the target determining unit is used for determining a target external card making terminal according to the target card making terminal information in the card making data;
and the transmission unit is used for verifying the card making file according to the verification file and transmitting the card making file passing the verification to the target external card making terminal.
In an embodiment of the present invention, the data transmission module further includes:
the signature unit is used for signing the card making file and the verification file by utilizing a stored signature public key of the target outsourcing terminal;
the storage unit is used for storing the signed card making file and the signed verification file;
and the transmission unit transmits the card making file and the verification file corresponding to the current signature public key to the target outsourcing terminal according to the signature public key of the card making terminal data.
Meanwhile, the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the method when executing the computer program.
Meanwhile, the invention also provides a computer readable storage medium, and a computer program for executing the method is stored in the computer readable storage medium.
According to the bank card making method and device provided by the invention, the card making data file is safely exchanged to an outsourcing card making manufacturer for making the card by providing a safe and reliable means for interacting the card making data, and the solution of the card making efficiency is improved, so that the bank card making efficiency can be improved, the progress of applying the bank card to the bank card by a customer is accelerated, and the customer experience is improved.
In order to make the aforementioned and other objects, features and advantages of the invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a card manufacturing method provided by the present invention;
FIG. 2 is a flow chart in an embodiment of the present invention;
FIG. 3 is a schematic illustration provided in an embodiment of the present invention;
FIG. 4 is a flow chart in an embodiment of the present invention;
FIG. 5 is a flow chart in an embodiment of the present invention;
FIG. 6 is a block diagram of a card-making apparatus provided by the present invention;
FIG. 7 is a block diagram of an embodiment of the present invention;
FIG. 8 is a block diagram of an embodiment of the present invention;
FIG. 9 is a block diagram in an embodiment of the present invention;
fig. 10 is a schematic diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the method for making a bank card according to the present invention includes:
step S101, generating card making data according to the received card making request;
step S102, encrypting, transmitting and verifying the card making data to generate a card making file;
and step S103, transmitting the card making file to an outsourcing card making terminal outside the bank system for making a card.
In an embodiment of the present invention, the card manufacturing data includes: client sensitive information and target card-making terminal information; wherein the customer sensitive information includes: the card making requests identity information and card information of the client.
In the embodiment of the present invention, the encrypting and transmission verifying the card making data to generate the card making file includes:
encrypting the client sensitive information by using an encryption machine;
and encrypting the encrypted client sensitive information and the encrypted target card making terminal information by using a preset key algorithm to generate a card making file and a corresponding verification file.
According to the embodiment of the invention, the client sensitive information, namely the sensitive data applied by the client card making, comprises the client name, the client identity card, the card CVV, the card validity period and the like, hardware encryption is realized through an internal encryption machine of a bank, all data encryption cannot be processed on the ground, a data ciphertext is input into the ciphertext, the security is greatly ensured, and the client sensitive information is ensured not to be leaked.
In the embodiment of the present invention, the method further includes:
deriving an encryption machine key from the encryption machine by using a preset protection key algorithm;
splitting the encryption machine key to generate a key component;
sending the key component to different key receiving terminals;
and the external control card terminal receives the key component through the different key receiving terminals to obtain the encryption machine key.
In the implementation process of the invention, encryption and decryption keys stored in an encryption machine need to be transcrypted and recorded to an outsourcing manufacturer, so that outsourcing terminal equipment can acquire card making data to make a card, and in order to ensure the security of the encryption machine key, in the embodiment of the invention, when the card making key is derived, a protection key is firstly used for protecting a key derived from a source encryption machine (namely, the encryption machine for encrypting client sensitive information), the derived encryption machine key is split to generate key components, and the key components are sent to different key receiving terminals, or the key receiving terminals respectively acquire one of the key components at different times and then record the key components into the manufacturer encryption machine. Since which terminal is responsible for which key cannot be known in advance, the component holding terminals do not know the rest holding terminals respectively, thereby ensuring the security of the key.
Further, as shown in fig. 2, in the embodiment of the present invention, the step S103 of transmitting the card making file and the verification file to an outsourced card making terminal outside the bank system for making a card includes:
step S1031, determining a target external card-making terminal according to the target card-making terminal information in the card-making data;
and S1032, verifying the card making file according to the verification file, and transmitting the card making file passing the verification to the target external package card making terminal.
In the embodiment of the present invention, the transmitting the card making file to an outsourced card making terminal for making a card further includes:
signing the card making file and the verification file by using a stored signature public key of the target outsourcing terminal;
storing the signed card making file and the signed verification file;
and transmitting the card making file and the verification file corresponding to the current signature public key to the target outsourcing terminal according to the signature public key of the card making terminal data.
In one embodiment of the invention, the file is verified in a bank system by utilizing an API internal file signature forwarding server, the server judges outsourcing manufacturers needing to distribute the file according to information on the card making file and the verification file, data signature is carried out by using a data signature public key provided by the corresponding outsourcing manufacturer, and the card making data file conforming to the verification rule is subjected to file signature again to generate a sign signature file and a check verification file. And then starting a file transfer service, transferring the signed card making file and the signed signature verification file to a signature encryption file exchange server, wherein the signature encryption file exchange server is used for storing the signed card making data file and the signature verification file of each outsourcing manufacturer, and waiting for the manufacturer to actively log in and obtain the relevant files, so that the card making file and the verification file corresponding to the current signature public key are transmitted to the target outsourcing terminal according to the signature public key of the card making terminal data.
The invention provides a safe and reliable solution for interacting card making data and improving card making efficiency, which can improve the card making efficiency of a bank, quicken the progress of a customer applying a bank card to receive the bank card and improve customer experience, and the technical scheme of the invention is explained in detail by combining with the attached drawings, and the scheme realizes the processing of the card making data of the bank card, and mainly comprises two related aspects:
the bank system interacts the card making data file to an outsourcing manufacturer;
and the outsourcing manufacturer card making result is returned to the value bank system.
In the implementation process of the invention, the card making data flow of the bank system is in the opposite data flow direction from the outsourcing manufacturer to return the card making result to the bank system, and for a person skilled in the art, it is clear how to interact the card making data file of the bank system to the outsourcing manufacturer, that is, how to transmit the reverse data, therefore, the card making data file is interacted to the outsourcing manufacturer only by combining the bank system for explanation in the embodiment.
As shown in fig. 3, the system for making a card by outsourcing a bank card provided in this embodiment includes a bank data receiving server 2, a bank data processing server 3, a GTP universal file transfer sending node server 4, a UDS unified data exchange server 5, a GTP universal file transfer receiving node server 6, an API internal file signature forwarding server 7, a signature encryption file exchange server 8, an encryptor 9, and an outsourcing manufacturer card making machine 10.
The customer application 1 in the embodiment shown in fig. 3 refers to a bank card application including a debit card or a credit card, which is performed online or offline by a customer through a counter service, an online banking service, an intelligent terminal, and the like provided by a bank. According to the process, the system or equipment provided by the bank is used by the customer, even the business handling place is in the bank, the data enters the bank background system through the proprietary network, and the safety of the customer data is fully guaranteed.
As shown in fig. 4, it is a data processing flow in this embodiment:
step 21, receiving the information of a customer application card;
step 22, applying for information auditing treatment;
step 23, generating a card-making original file;
and 24, distributing to a downstream processing system.
The bank data receiving server 2 in this embodiment refers to a system for receiving client application data inside a bank, and includes client data entered by a user through a counter, an internet bank, a mobile phone bank, an intelligent terminal, and the like, and finally enters a host system for data receiving and analysis preparation. After the data applied by the client is processed, a series of original card making data files are formed and distributed to the data processing server 3 for use through the automatic data distribution system. The sensitive data applied by the client card making comprises a client name, a client identity card, a card CVV (composite video) and a card validity period, hardware encryption is realized through an internal encryption machine of a bank, all data encryption cannot fall to the ground for processing, data ciphertext is input and output, safety is greatly guaranteed, and client sensitive information cannot be revealed.
In this embodiment, the bank data processing server 3 is a system for processing card making data in a bank, and is configured to receive an original card making data file processed by the bank data receiving server 2, and import contents in the card making data file into a database according to different processing rules.
And then starting a data preparation process, connecting the hardware encryption machine and the data preparation server, performing financial data preparation and industrial data preparation operation, finally forming chip data required by card making and updating the chip data into a database table. And starting a card making file generation process, forming the final card making data of the client into a card making file, encrypting the card making file by using a cryptographic algorithm, and generating a corresponding check CHK file for transmission check. The bank data processing server 3 can control whether card making data can be distributed to manufacturers for outsourcing card making according to different technical switches, and the subdivision granularity can be subdivided according to different card types and different manufacturers. The flow chart refers to fig. 5, which includes:
step 31, receiving an original card making file;
step 32, importing original data;
step 33, data preparation processing;
step 34, generating a card making file;
and step 35, distributing to an API internal file signature forwarding server.
In this process, the data security measures involved are as follows:
all encryption and decryption operations related to client sensitive information, such as client names, identity card information, card CVV (composite video) and card validity periods, are realized by directly connecting a hardware encryption machine, and all data cannot be decrypted on the ground.
The card making file can be encrypted, the card making data file can be decrypted only by using a preset decryption suite, and card making data analysis and card making are finally realized. Aiming at a special decryption tool, the key is replaced irregularly, and is exchanged to an outsourcing manufacturer according to the safety specification, so that the data file is protected. Under the protection mechanism, even if a manufacturer obtains the encrypted card making file through an illegal way, the bank card making data cannot be decrypted and stolen because an effective decryption key cannot be obtained.
In this embodiment, the encryption and decryption keys stored in the encryption device need to be transferred to the outsourcing manufacturer. When the card-making key is exported, the protection key is used for protecting the key exported from the source encryption machine, then different manufacturer key acquisition terminals respectively acquire one key component at different time, and the key components are sequentially recorded into the manufacturer encryption machine. Since which key of each manufacturer key acquisition terminal cannot be known in advance, the component holding terminals cannot respectively know the held key components of the other terminals, thereby ensuring the security of the key.
And starting from the moment that the client data enters the bank system, the card making data file after the signature encryption is transmitted to the signature encryption file server, and all networks are transmitted through the exclusive network of the bank, so that the data can not be leaked to the outside.
In the embodiment of the invention, the transfer transmission of card making data and verification data in the bank system is realized by using a GTP universal file transmission sending node server 4, a UDS unified data exchange server 5 and a GTP universal file transmission receiving node server 6.
And the GTP general file transmission and transmission node server 4 is used for receiving the card making data file and the CHK file, starting a sending service at regular time, and exchanging the card making file and the CHK check file under the sending directory through the UDS unified data exchange platform.
The UDS (Unified Data Switch) Unified Data exchange server 5 is configured to provide a Unified Data exchange service, check files from different sending nodes through configuration, forward files from different sending nodes to different receiving nodes, and also distribute files from the same sending node to different receiving nodes.
And the GTP universal file transmission receiving node server 6 is used for receiving the card making file and the CHK check file transmitted by the UDS unified data exchange server 5.
The API internal file signature forwarding server 7 in this embodiment is configured to process the card making file and the CHK verification file on the GTP common file transmission receiving node server 6, and verify the files. The API internal file signature forwarding server 7 judges the outsourcing manufacturer to be distributed by the file according to the information on the card making file and the check file, uses the data signature public key provided by the corresponding outsourcing manufacturer to perform data signature, and performs file signature again on the card making data file conforming to the check rule to generate a sign signature file and a check file. And then starting a file transfer service, and transferring the signed card making file and the signed signature verification file to the signature encryption file exchange server 8.
In this embodiment, the signature encryption file exchange server 8 is configured to store the signed card making data file and the signature verification file of each outsourcing manufacturer, and wait for the manufacturer to log in and obtain a relevant file.
In this embodiment, the outsourcer manufacturer card making machine 10 and the encryption machine 9 are mainly responsible for receiving the signed card making file, decrypting and checking the signature by using a private key thereof, analyzing the card making file, and actually making the card. And the card key is recorded in advance in the related hardware encryption machine according to the steps described above. In the process, the related data security is ensured by adopting the following technical means:
the API internal file signature forwarding server 7 provides an internal pipe registration function, registration is carried out on manufacturers needing to access the signature encryption file server, and after registration verification is successful, an ID and a returned file signature verification public key are issued to the manufacturers
The manufacturer needs to generate two pairs of public and private key files according to requirements, and the public and private key files are used for decryption and signature verification when card making files are received and are used for logging in a signature encryption file exchange server 8; the public key file of the login signature encryption file exchange server 8 needs to be registered in advance on the inner pipe platform of the API internal file signature forwarding server 7. And the public and private key pair is used for controlling that only a legal manufacturer can log in the server to obtain the card making file and carrying out decryption operation on the card making file.
The card-making data file received by the manufacturer can be decrypted by using a special data file decryption suite provided by a bank, and a key used by the decryption suite is updated irregularly. After the key is updated, if the manufacturer does not obtain the latest key therewith, the card making file cannot be decrypted continuously, so that the security of the card making file is ensured.
The manufacturer dispatches different personnel according to the key interaction supervision flow and the number of different key components, uses different terminal equipment to receive the password in a bank in sequence, and then feeds the password into a hardware encryption machine special for the manufacturer, so that the safety of the card-making key is ensured.
The scheme also comprises the step of automatically processing and receiving the return processing of the manufacturer card making list, wherein the data flow direction is just opposite to the direction of outsourcing the card making file to the manufacturer, and the detailed description is omitted.
The main related servers of the return implementation scheme are a bank data processing server 3, a GTP universal file transmission sending node server 4, a UDS unified data exchange server 5, a GTP universal file transmission receiving node server 6, an API internal file signature forwarding server 7, and a signature encryption file exchange server 8 shown in fig. 3. The data flow is roughly as follows:
after the card making is finished, a manufacturer forms a card making result list file, and places the card making list on the signature encryption file exchange server 8 after using a self file key for signature; the API internal file signature forwarding server 7 acquires the file from the signature encryption file exchange server 8 at regular time and verifies the signature, and then transmits the file to the receiving node server 6 through the GTP general file (the receiving node can be automatically converted into a sending node and has the file sending capability); then the file is transmitted to a GTP universal file transmission sending node server 4 through a UDS unified data exchange server 5 (at this moment, the sending node is automatically converted into a receiving node and has receiving capacity); the bank data processing server 3 acquires the returned card making list file, introduces the card making result into a bank processing system, and finally displays a related report so as to track the card making state in real time.
Meanwhile, as shown in fig. 6, the present invention also provides a bank card making device, including:
the card making data generating module 601 is configured to generate card making data according to the received card making request;
a card making file generating module 602, configured to encrypt, transmit, and check the card making data to generate a card making file;
and the data transmission module 603 is used for transmitting the card making file to an outsourcing card making terminal for making a card.
In the embodiment of the present invention, as shown in fig. 7, the card making file generating module 602 includes:
a sensitive information encryption unit 6021, configured to encrypt the client sensitive information by using an encryption device;
the file generating unit 6022 is configured to encrypt the encrypted client sensitive information and the target card making terminal information by using a preset key algorithm to generate a card making file and a corresponding verification file.
As shown in fig. 8, in the embodiment of the present invention, the apparatus further includes:
a derivation module 604, configured to derive an encryptor key from the encryptor by using a preset protection key algorithm;
a splitting module 605, configured to split the encryption key to generate a key component;
a distributing module 606, configured to send the key component to different key receiving terminals, so that the outsourced card manufacturing terminal receives the key component through the different key receiving terminals, to obtain the encryption key of the encryption machine.
In this embodiment of the present invention, as shown in fig. 9, the data transmission module 603 includes:
a target determination unit 6031 configured to determine a target external package card making terminal according to target card making terminal information in the card making data;
and a transmission unit 6032, configured to verify the card making file according to the verification file, and transmit the card making file that passes the verification to the target outsourcing card making terminal.
In the embodiment of the present invention, the data transmission module further includes:
a signature unit 6033, configured to sign the card making file and the verification file by using a stored signature public key of the target outsourcing terminal;
a storage unit 6034 configured to store the signed card making file and the signed verification file;
and the transmission unit transmits the card making file and the verification file corresponding to the current signature public key to the target outsourcing terminal according to the signature public key of the card making terminal data.
The invention provides a safe and reliable solution for interacting card making data and improving card making efficiency, which can improve the card making efficiency of a bank, accelerate the progress of a customer applying a bank card to receive the bank card and improve the customer experience. The problem that card making efficiency possibly cannot meet the increasing card requirements of market customers for cards due to the fact that a bank card making center is limited by factors such as site size, equipment performance and equipment number is solved. The experience and the viscosity of the card for the client can be effectively improved. Due to the improvement of the card making efficiency, the time from applying for the card to getting the card by the customer is shortened, the goodness and the stickiness of the customer to the bank are improved, and the complaint risk of the customer can be reduced.
The present embodiment also provides an electronic device, which may be a desktop computer, a tablet computer, a mobile terminal, and the like, but is not limited thereto. In this embodiment, the electronic device may refer to the foregoing embodiments, and the contents thereof are incorporated herein, and repeated descriptions thereof are omitted.
Fig. 10 is a schematic block diagram of a system configuration of an electronic apparatus 600 according to an embodiment of the present invention. As shown in fig. 10, the electronic device 600 may include a central processor 100 and a memory 140; memory 140 is coupled to central processor 100. Notably, this diagram is exemplary; other types of structures may also be used in addition to or in place of the structures to implement telecommunications or other functions.
In one embodiment, the bank card functionality may be integrated into the central processor 100. The central processor 100 may be configured to control as follows:
generating card making data according to the received card making request;
encrypting and transmitting verification processing is carried out on the card making data to generate a card making file;
transmitting the card making file to an outsourcing card making terminal outside the bank system for making the card
In another embodiment, the bank card clamping device may be configured separately from the central processor 100, for example, the bank card clamping device may be configured as a chip connected to the central processor 100, and the bank card clamping function is realized by the control of the central processor.
As shown in fig. 10, the electronic device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the electronic device 600 does not necessarily include all of the components shown in FIG. 10; in addition, the electronic device 600 may further include components not shown in fig. 10, which may be referred to in the prior art.
As shown in fig. 10, the central processor 100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the electronic device 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable devices. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the electronic device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142 for storing application programs and function programs or a flow for executing the operation of the electronic device 600 by the central processing unit 100.
The memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by the electronic device. The driver storage portion 144 of the memory 140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging application, address book application, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
Embodiments of the present invention further provide a computer-readable program, where when the program is executed in an electronic device, the program causes a computer to execute the bank card making method in the electronic device according to the above embodiments.
The embodiment of the invention also provides a storage medium storing a computer readable program, wherein the computer readable program enables a computer to execute the bank card making method in the electronic equipment.
The invention provides a safe and reliable solution for interacting card making data and improving card making efficiency, which can improve the card making efficiency of a bank, accelerate the progress of a customer applying a bank card to receive the bank card and improve the customer experience. The problem that card making efficiency possibly cannot meet the increasing card requirements of market customers for cards due to the fact that a bank card making center is limited by factors such as site size, equipment performance and equipment number is solved. The experience and the viscosity of the card for the client can be effectively improved. Due to the improvement of card making efficiency, the time from applying for the card to getting the card by the customer is shortened, the comfort and the stickiness of the customer to a bank are improved, and the complaint risk of the customer can be reduced.
The preferred embodiments of the present invention are described above with reference to the accompanying drawings. The many features and advantages of the embodiments are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the embodiments that fall within the true spirit and scope thereof. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the embodiments of the invention to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope thereof.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (6)

1. A method for manufacturing a bank card is characterized by comprising the following steps:
generating card making data according to the received card making request; the card making data comprises: client sensitive information and target card-making terminal information; wherein the customer sensitive information includes: making a card to request identity information and card information of a client;
encrypting the card making data and carrying out transmission and verification processing to generate a card making file and a verification file;
transmitting the card making file and the verification file to an outsourcing card making terminal outside the bank system for making a card;
the encrypting and transmitting verification processing of the card making data to generate a card making file and a verification file comprises the following steps:
encrypting the client sensitive information by using an encryption machine;
encrypting the encrypted client sensitive information and the encrypted target card making terminal information by using a preset key algorithm to generate a card making file and a corresponding verification file;
the card making process of transmitting the card making file and the verification file to an outsourcing card making terminal outside a bank system comprises the following steps:
determining a target external card-making terminal according to the target card-making terminal information in the card-making data;
verifying the card making file according to the verification file, and transmitting the card making file passing the verification to the target external card making terminal;
the method further comprises the following steps:
deriving an encryption machine key from the encryption machine by using a preset protection key algorithm;
splitting the encryption machine key to generate a key component;
sending the key component to different key receiving terminals;
and the external control card terminal receives the key component through the different key receiving terminals to obtain the encryption machine key.
2. The method for making a card according to claim 1, wherein said transmitting the card making file to an outsourced card making terminal for making a card further comprises:
signing the card making file and the verification file by using a stored signature public key of the target outsourcing terminal;
storing the signed card making file and the signed verification file;
and transmitting the card making file and the verification file corresponding to the current signature public key to the target outsourcing terminal according to the signature public key of the card making terminal data.
3. A bank card system clamps puts characterized in that, the device includes:
the card making data generation module is used for generating card making data according to the received card making request; the card making data comprises: client sensitive information and target card-making terminal information; wherein the customer sensitive information includes: making a card to request identity information and card information of a client;
the card making file generating module is used for encrypting the card making data and carrying out transmission verification processing to generate a card making file and a verification file;
the data transmission module is used for transmitting the card making file and the verification file to an outsourcing card making terminal for making a card;
wherein, the card making file generating module comprises:
the sensitive information encryption unit is used for encrypting the client sensitive information by using an encryption machine;
the file generating unit is used for encrypting the encrypted client sensitive information and the encrypted target card making terminal information by using a preset key algorithm to generate a card making file and a corresponding verification file;
the data transmission module comprises:
the target determining unit is used for determining a target external card making terminal according to the target card making terminal information in the card making data;
the transmission unit is used for verifying the card making file according to the verification file and transmitting the card making file passing the verification to the target external card making terminal;
the device further comprises:
the derivation module is used for deriving the cipher key of the encryption machine from the encryption machine by utilizing a preset protection cipher key algorithm;
the splitting module is used for splitting the encryption machine key to generate a key component;
and the distribution module is used for sending the key components to different key receiving terminals so that the external package card-making terminal receives the key components through the different key receiving terminals to obtain the encryption machine key.
4. The bank card clamping device according to claim 3, wherein the data transmission module further comprises:
the signature unit is used for signing the card making file and the verification file by utilizing a stored signature public key of the target outsourcing terminal;
the storage unit is used for storing the signed card making file and the signed verification file;
and the transmission unit transmits the card making file and the verification file corresponding to the current signature public key to the target outsourcing terminal according to the signature public key of the card making terminal data.
5. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1 to 2 when executing the computer program.
6. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 2.
CN202010236168.8A 2020-03-30 2020-03-30 Bank card making method and device Active CN111464295B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010236168.8A CN111464295B (en) 2020-03-30 2020-03-30 Bank card making method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010236168.8A CN111464295B (en) 2020-03-30 2020-03-30 Bank card making method and device

Publications (2)

Publication Number Publication Date
CN111464295A CN111464295A (en) 2020-07-28
CN111464295B true CN111464295B (en) 2022-11-15

Family

ID=71680519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010236168.8A Active CN111464295B (en) 2020-03-30 2020-03-30 Bank card making method and device

Country Status (1)

Country Link
CN (1) CN111464295B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112215566A (en) * 2020-09-27 2021-01-12 东信和平科技股份有限公司 Card making data processing method, system, equipment and storage medium of bank card
CN113205650B (en) * 2021-04-27 2023-04-07 中国工商银行股份有限公司 Self-service card making method and device, computer equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201804386U (en) * 2010-09-02 2011-04-20 中国工商银行股份有限公司 Equipment for manufacturing commercial prepaid cards
CN103426238A (en) * 2012-05-23 2013-12-04 中兴通讯股份有限公司 Smart cart issuing system and method based on plug-ins
CN103473851A (en) * 2012-06-06 2013-12-25 汉斯·杰里·乌尔本·彼得森 Rapid card issuing authorization method and system
CN104318281A (en) * 2014-10-27 2015-01-28 中国建设银行股份有限公司 Credit card granting system and method
WO2015154536A1 (en) * 2014-04-11 2015-10-15 闻进 Payment method and system having multiple security composition mechanisms based on visible code
CN107274283A (en) * 2017-05-31 2017-10-20 中国银联股份有限公司 A kind of aerial hair fastener method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201804386U (en) * 2010-09-02 2011-04-20 中国工商银行股份有限公司 Equipment for manufacturing commercial prepaid cards
CN103426238A (en) * 2012-05-23 2013-12-04 中兴通讯股份有限公司 Smart cart issuing system and method based on plug-ins
CN103473851A (en) * 2012-06-06 2013-12-25 汉斯·杰里·乌尔本·彼得森 Rapid card issuing authorization method and system
WO2015154536A1 (en) * 2014-04-11 2015-10-15 闻进 Payment method and system having multiple security composition mechanisms based on visible code
CN104318281A (en) * 2014-10-27 2015-01-28 中国建设银行股份有限公司 Credit card granting system and method
CN107274283A (en) * 2017-05-31 2017-10-20 中国银联股份有限公司 A kind of aerial hair fastener method and device

Also Published As

Publication number Publication date
CN111464295A (en) 2020-07-28

Similar Documents

Publication Publication Date Title
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
CN105027107A (en) Secure virtual machine migration
CN102427442A (en) Combining request-dependent metadata with media content
CN109660534B (en) Multi-merchant-based security authentication method and device, electronic equipment and storage medium
CN106576043A (en) Virally distributable trusted messaging
CN111143474B (en) One-key binding changing method for mobile phone number based on block chain technology
US20210241270A1 (en) System and method of blockchain transaction verification
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN111522809A (en) Data processing method, system and equipment
CN113472720A (en) Digital certificate key processing method and device, terminal equipment and storage medium
CN111464295B (en) Bank card making method and device
CN111931209A (en) Contract information verification method and device based on zero knowledge certification
CN108846671B (en) Online secure transaction method and system based on block chain
CN111431922A (en) Internet of things data encryption transmission method and system
CN111010283B (en) Method and apparatus for generating information
CN111245594A (en) Homomorphic operation-based collaborative signature method and system
CN114549206A (en) Transaction anti-repudiation method, system, electronic equipment and readable storage medium
CN111832046B (en) Trusted data certification method based on blockchain technology
CN112966287B (en) Method, system, device and computer readable medium for acquiring user data
CN113535852A (en) File processing method, file access method, device and system based on block chain
CN113626848A (en) Sample data generation method and device, electronic equipment and computer readable medium
CN109639409B (en) Key initialization method, key initialization device, electronic equipment and computer-readable storage medium
CN113190868A (en) Payment information viewing method and node based on block chain system
CN114640491A (en) Communication method and system
CN114826616B (en) Data processing method, device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant