CN112149166A - Unconventional password protection method and intelligent bank machine - Google Patents

Unconventional password protection method and intelligent bank machine Download PDF

Info

Publication number
CN112149166A
CN112149166A CN202011047447.6A CN202011047447A CN112149166A CN 112149166 A CN112149166 A CN 112149166A CN 202011047447 A CN202011047447 A CN 202011047447A CN 112149166 A CN112149166 A CN 112149166A
Authority
CN
China
Prior art keywords
key
machine
encryption
bank
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011047447.6A
Other languages
Chinese (zh)
Other versions
CN112149166B (en
Inventor
张盛素
张立强
刘兴
丁秀梅
赵明月
董海丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202011047447.6A priority Critical patent/CN112149166B/en
Publication of CN112149166A publication Critical patent/CN112149166A/en
Application granted granted Critical
Publication of CN112149166B publication Critical patent/CN112149166B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses an unconventional password protection method and a bank intelligent machine, wherein the method comprises the following steps: a front-end client of the bank intelligent machine receives a password input by a user through a soft keyboard, wherein the password comprises numbers and letters; a front-end client of the intelligent bank machine performs soft encryption on a password plaintext to obtain a first ciphertext; and the front-end server of the bank intelligent machine decrypts the first ciphertext to obtain a password plaintext, then calls the encryption machine to perform hard encryption on the password plaintext to obtain a second ciphertext, and sends the second ciphertext to the background end of the bank intelligent machine for encryption verification. The invention can only input numbers on the password keyboard without the need of inputting numbers like the prior transaction password, and can input the password of numbers and letters by using the soft keyboard at present; and the encryption and decryption passwords are encrypted in a mode of combining soft encryption and hard encryption, so that the passwords are safely transmitted to a background to be verified.

Description

Unconventional password protection method and intelligent bank machine
Technical Field
The invention relates to the technical field of password protection, in particular to an unconventional password protection method and a bank intelligent machine.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
The method is characterized in that a certain scene on an intelligent machine (such as an intelligent counter) of a bank, for example, a client applies for opening an internet bank (other scenes using passwords can be involved), a login password and a transaction password exist, the password setting cannot be only numbers due to requirements such as supervision and the like, letters or the combination of the numbers and the letters can exist, a traditional password keyboard can only input the numbers, the numbers are transmitted to a background end through hard encryption of the password keyboard for verification, and the system of all the hard encryptions cannot conform to certain scenes in actual use. For many soft encryption algorithms, passwords such as numbers, letters and the like can be used, encryption and decryption are performed in a soft encryption mode, the security of a secret key is difficult to guarantee, and the security is not high enough and does not necessarily accord with the security standard of a bank. How to ensure the safety between internal systems by the password with letters does not have a corresponding solution in the prior art.
Disclosure of Invention
The embodiment of the invention provides an unconventional password protection method, which is used for solving the technical problems that in the prior art, when a client applies for opening internet bank, a single hard encryption or soft encryption is used, the scene which cannot meet certain practical use and the password security cannot meet, and the method comprises the following steps:
a front-end client of the bank intelligent machine receives a password input by a user through a soft keyboard, wherein the password comprises numbers and letters;
a front-end client of the intelligent bank machine performs soft encryption on a password plaintext to obtain a first ciphertext;
and the front-end server of the bank intelligent machine decrypts the first ciphertext to obtain a password plaintext, then calls the encryption machine to perform hard encryption on the password plaintext to obtain a second ciphertext, and sends the second ciphertext to the background end of the bank intelligent machine for encryption verification.
The embodiment of the invention also provides an intelligent bank machine, which is used for solving the technical problems that in the prior art, when a client applies for opening the internet bank, single hard encryption or single soft encryption is used, the scene which can not meet certain practical use and the password security cannot be met, and the intelligent bank machine comprises:
the front-end client is used for receiving a password input by a user through a soft keyboard, wherein the password comprises numbers and letters, and soft encryption is carried out on a password plaintext to obtain a first ciphertext;
and the front-end server is used for decrypting the first ciphertext to obtain a cipher plaintext, calling the encryption machine to perform hard encryption on the cipher plaintext to obtain a second ciphertext, and sending the second ciphertext to the background end for encryption processing.
The embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the processor implements the above-mentioned unconventional password protection method.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program for executing the above-mentioned irregular password protection method is stored in the computer-readable storage medium.
In the embodiment of the invention, a front-end client of a bank intelligent machine receives a password input by a user through a soft keyboard, wherein the password comprises numbers and letters; a front-end client of the intelligent bank machine performs soft encryption on a password plaintext to obtain a first ciphertext; and the front-end server of the bank intelligent machine decrypts the first ciphertext to obtain a password plaintext, then calls the encryption machine to perform hard encryption on the password plaintext to obtain a second ciphertext, and sends the second ciphertext to the background end of the bank intelligent machine for encryption verification. Compared with the technical scheme that a client uses single hard encryption or soft encryption when applying for opening the internet bank in the prior art, the client can input a password with numbers and letters by using a soft keyboard instead of inputting the numbers on a password keyboard like the prior transaction password; and the encryption and decryption passwords are encrypted in a mode of combining soft encryption and hard encryption, so that the passwords are safely transmitted to a background to be verified.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
FIG. 1 is a first flowchart of a method for protecting an irregular password according to an embodiment of the present invention;
FIG. 2 is a flowchart of a method for protecting an irregular password according to an embodiment of the present invention;
FIG. 3 is a flow chart of a method for protecting an irregular password according to an embodiment of the present invention;
FIG. 4 is a flow chart of a method for protecting an irregular password according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a bank intelligent machine according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
Technical term interpretation:
AES: advanced Encryption Standard (AES) in cryptography, also known as Rijndael Encryption, is a block Encryption Standard adopted by the federal government in the united states.
Based on a password security mechanism (namely, only through the hard encryption of a traditional password keyboard) when a bank applies for opening the internet bank (other scenes using passwords can also be involved) in the prior art, the invention provides an unconventional password protection method.
Fig. 1 is a first flowchart of a method for protecting an irregular password according to an embodiment of the present invention, as shown in fig. 1, the method includes:
step 101: a front-end client of the bank intelligent machine receives a password input by a user through a soft keyboard, wherein the password comprises numbers and letters;
step 102: a front-end client of the intelligent bank machine performs soft encryption on a password plaintext to obtain a first ciphertext; then sending the data to a front-end server of the intelligent bank machine;
step 103: and the front-end server of the bank intelligent machine decrypts the first ciphertext to obtain a password plaintext, then calls the encryption machine to perform hard encryption on the password plaintext to obtain a second ciphertext, and sends the second ciphertext to the background end of the bank intelligent machine for encryption verification.
The front end comprises two parts, one is a client and the other is a server, and the client and the server of the front end realize the method. By doing so, not only the password with letters can be allowed, but also the encrypted transmission as safe as possible is realized, and the security of the password is ensured.
In this embodiment of the present invention, the step 102 of soft-encrypting the cipher plaintext by the front-end client of the bank intelligent machine to obtain the first ciphertext includes:
a front-end client of the intelligent bank machine can perform soft encryption on a cipher plaintext by adopting an AES (advanced encryption standard) mode to obtain a first ciphertext;
103, the front end of the bank intelligent machine decrypts the first ciphertext to obtain a cipher plaintext, which comprises:
the front-end server of the bank intelligent machine can decrypt the first ciphertext in an AES mode to obtain a cipher plaintext.
Other ways of encrypting and decrypting the input password including letters and numbers are of course possible.
In the embodiment of the present invention, as shown in fig. 2, the method further includes:
step 201: a front-end server and a front-end client of a bank intelligent machine agree on a first key;
step 202: a front-end server of the intelligent bank machine generates a random number as a second key, the second key is encrypted by using the first key, and the encrypted second key is transmitted to a front-end client of the intelligent bank machine;
step 203: the front-end client of the intelligent bank machine decrypts the encrypted second key by using the first key to obtain a second key;
102, the front-end client of the intelligent bank machine soft-encrypts a cipher plaintext, and the soft-encryption method comprises the following steps:
and the front-end client of the intelligent bank machine utilizes the second key to perform soft encryption on the cipher plaintext.
Specifically, the embodiment of the present invention is used in a bank intelligent machine, a secret key 1 is agreed between a front-end client and a front-end server, each time the machine is restarted, the front-end server generates a random number as a secret key 2, and the secret key 2 is encrypted by using the secret key 1 (the AES algorithm may be used) and transmitted to the front-end client, so that the front-end client can decrypt the secret key 2 by using the agreed secret key 1 (the corresponding AES algorithm may be used), and the obtained secret key 2 is the secret key of the encrypted password. The key 1 may be determined as the actual case may be, and may be set to a numeric string associated with the number of the front-end client, for example.
In the embodiment of the present invention, as shown in fig. 3, the method further includes:
step 301: the front-end server and the background end of the intelligent bank machine agree on a third key;
step 302: the front-end server of the bank intelligent machine calls the encryption machine to generate an encrypted fourth key by using the third key, and synchronizes the encrypted fourth key to the background end of the bank intelligent machine;
step 103, the front-end server of the bank intelligent machine recalls the encryption machine to perform hard encryption on the password plaintext, and the method comprises the following steps:
the front-end server of the intelligent bank machine utilizes a fourth key to carry out hard encryption on the password plaintext;
step 303: and the background end of the intelligent bank machine decrypts the encrypted fourth secret key by using the third secret key and performs encryption verification processing on the second ciphertext based on the fourth secret key.
Alternatively, as shown in fig. 4, the method further includes:
step 401: the front-end server and the background end of the intelligent bank machine agree on a third key;
step 402: the background end of the bank intelligent machine calls the encryption machine to generate an encrypted fourth secret key by using the third secret key, and the encrypted fourth secret key is synchronized to the front-end server of the bank intelligent machine;
step 103, the front-end server of the bank intelligent machine recalls the encryption machine to perform hard encryption on the password plaintext, and the method comprises the following steps:
the front-end server of the intelligent bank machine decrypts the encrypted fourth key by using the third key and performs hard encryption on the cipher plaintext by using the fourth key;
step 403: and the background terminal of the bank intelligent machine performs encryption verification processing on the second ciphertext based on the fourth secret key.
Further comprising:
and the front-end server or the background end of the bank intelligent machine stores a fourth key encrypted by the encryption machine by using a fifth key, wherein the fifth key is a key determined by the encryption machine.
The front end and the background agree to form a secret key 3, the front end and the background use the encryption machine to generate the secret key 4 at regular or irregular intervals, and the front end and the back end are synchronized (the secret key 4 can be generated by a front-end server and then synchronized to the background end, or the secret key 4 can be generated by a background end and then synchronized to the front-end server.
Description of the drawings: the names of the key 1, the key 2, the key 3, the key 4 and the like with numbers are all codes, and the keys or the ciphertexts represent the keys or the ciphertexts with specific names, and different systems or companies can have specific names of the keys or the ciphertexts.
The embodiment of the invention also provides an unconventional password protection device (namely a bank intelligent machine), which is described in the following embodiment. Because the principle of the device for solving the problems is similar to that of the non-conventional password protection method, the implementation of the device can refer to the implementation of the non-conventional password protection method, and repeated details are not repeated.
Fig. 5 is a schematic structural diagram of a bank intelligent machine according to an embodiment of the present invention, and as shown in fig. 5, the bank intelligent machine includes:
the front-end client 02 is used for receiving a password input by a user through a soft keyboard, wherein the password comprises numbers and letters, and soft encryption is performed on a password plaintext to obtain a first ciphertext;
the front-end server 04 is configured to decrypt the first ciphertext to obtain a cipher plaintext, then invoke an encryptor to perform hard encryption on the cipher plaintext to obtain a second ciphertext, and send the second ciphertext to the backend 06 for decryption processing.
In this embodiment of the present invention, the front-end server is further configured to:
appointing a first key with a front-end client;
generating a random number as a second key, encrypting the second key by using the first key, and transmitting the encrypted second key to the front-end client;
the front-end client is further configured to:
appointing a first secret key with a front-end server;
decrypting the encrypted second key by using the first key to obtain a second key;
and soft encrypting the cipher plaintext by using the second key.
In the embodiment of the present invention, the front-end and front-end server contract is further configured to:
appointing a third key with a background end;
calling an encryptor to generate an encrypted fourth key by using the third key, and synchronizing the encrypted fourth key to the background end;
carrying out hard encryption on the cipher plaintext by using a fourth key;
the back end is also for:
appointing a third key with the front-end server;
and decrypting the encrypted fourth secret key by using the third secret key, and verifying the second ciphertext based on the fourth secret key.
In this embodiment of the present invention, the backend is further configured to:
appointing a third key with the front-end server;
calling the encryption machine to generate an encrypted fourth key by using the third key, and synchronizing the encrypted fourth key to the front-end server;
the front-end server is further configured to:
appointing a third key with a background end;
decrypting the encrypted fourth key by using the third key, and carrying out hard encryption on a cipher plaintext by using the fourth key;
the back end is also for: and performing encryption verification processing on the second ciphertext based on the fourth key.
In this embodiment of the present invention, the front-end server or the backend is further configured to:
and storing a fourth key encrypted by the encryption machine by using a fifth key, wherein the fifth key is a key determined by the encryption machine.
The embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the processor implements the above-mentioned unconventional password protection method.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program for executing the above-mentioned irregular password protection method is stored in the computer-readable storage medium.
In the embodiment of the invention, a front-end client of a bank intelligent machine receives a password input by a user through a soft keyboard, wherein the password comprises numbers and letters; a front-end client of the intelligent bank machine performs soft encryption on a password plaintext to obtain a first ciphertext; and the front-end server of the bank intelligent machine decrypts the first ciphertext to obtain a password plaintext, then calls the encryption machine to perform hard encryption on the password plaintext to obtain a second ciphertext, and sends the second ciphertext to the background end of the bank intelligent machine for encryption verification. Compared with the technical scheme that a client uses single hard encryption or soft encryption when applying for opening the internet bank in the prior art, the client can input a password with numbers and letters by using a soft keyboard instead of inputting the numbers on a password keyboard like the prior transaction password; and the encryption and decryption passwords are encrypted in a mode of combining soft encryption and hard encryption, so that the passwords are safely transmitted to a background to be verified.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (12)

1. A method for protecting an irregular password, comprising:
a front-end client of the bank intelligent machine receives a password input by a user through a soft keyboard, wherein the password comprises numbers and letters;
a front-end client of the intelligent bank machine performs soft encryption on a password plaintext to obtain a first ciphertext;
and the front-end server of the bank intelligent machine decrypts the first ciphertext to obtain a password plaintext, then calls the encryption machine to perform hard encryption on the password plaintext to obtain a second ciphertext, and sends the second ciphertext to the background end of the bank intelligent machine for encryption verification.
2. The irregular password protection method of claim 1, further comprising:
a front-end server and a front-end client of a bank intelligent machine agree on a first key;
a front-end server of the intelligent bank machine generates a random number as a second key, the second key is encrypted by using the first key, and the encrypted second key is transmitted to a front-end client of the intelligent bank machine;
the front-end client of the intelligent bank machine decrypts the encrypted second key by using the first key to obtain a second key;
the front-end client of the intelligent bank machine softly encrypts the cipher plaintext, and the method comprises the following steps:
and the front-end client of the intelligent bank machine utilizes the second key to perform soft encryption on the cipher plaintext.
3. The irregular password protection method of claim 1, further comprising:
the front-end server and the background end of the intelligent bank machine agree on a third key;
the front-end server of the bank intelligent machine calls the encryption machine to generate an encrypted fourth key by using the third key, and synchronizes the encrypted fourth key to the background end of the bank intelligent machine;
the front-end server of the intelligent bank machine calls the encryption machine again to carry out hard encryption on the cipher plaintext, and the hard encryption method comprises the following steps:
the front-end server of the intelligent bank machine utilizes a fourth key to carry out hard encryption on the password plaintext;
and the background end of the intelligent bank machine decrypts the encrypted fourth secret key by using the third secret key and performs encryption verification processing on the second ciphertext based on the fourth secret key.
4. The irregular password protection method of claim 1, further comprising:
the front-end server and the background end of the intelligent bank machine agree on a third key;
the background end of the bank intelligent machine calls the encryption machine to generate an encrypted fourth secret key by using the third secret key, and the encrypted fourth secret key is synchronized to the front-end server of the bank intelligent machine;
the front-end server of the intelligent bank machine calls the encryption machine again to carry out hard encryption on the cipher plaintext, and the hard encryption method comprises the following steps:
the front-end server of the intelligent bank machine decrypts the encrypted fourth key by using the third key and performs hard encryption on the cipher plaintext by using the fourth key;
and the background terminal of the bank intelligent machine performs encryption verification processing on the second ciphertext based on the fourth secret key.
5. The irregular password protection method of claim 1, further comprising:
and the front-end server or the background end of the bank intelligent machine stores a fourth key encrypted by the encryption machine by using a fifth key, wherein the fifth key is a key determined by the encryption machine.
6. A bank intelligent machine, comprising:
the front-end client is used for receiving a password input by a user through a soft keyboard, wherein the password comprises numbers and letters, and soft encryption is carried out on a password plaintext to obtain a first ciphertext;
and the front-end server is used for decrypting the first ciphertext to obtain a cipher plaintext, calling the encryption machine to perform hard encryption on the cipher plaintext to obtain a second ciphertext, and sending the second ciphertext to the background end for encryption processing.
7. The bank intelligent machine of claim 6, wherein the front-end server is further to:
appointing a first key with a front-end client;
generating a random number as a second key, encrypting the second key by using the first key, and transmitting the encrypted second key to the front-end client;
the front-end client is further configured to:
appointing a first secret key with a front-end server;
decrypting the encrypted second key by using the first key to obtain a second key;
and soft encrypting the cipher plaintext by using the second key.
8. The bank intelligent machine of claim 6, wherein the front-end server is further to:
appointing a third key with a background end;
calling an encryptor to generate an encrypted fourth key by using the third key, and synchronizing the encrypted fourth key to the background end;
carrying out hard encryption on the cipher plaintext by using a fourth key;
the back end is also for:
appointing a third key with the front-end server;
and decrypting the encrypted fourth secret key by using the third secret key, and verifying the second ciphertext based on the fourth secret key.
9. The intelligent banking machine of claim 6, wherein the back end is further to:
appointing a third key with the front-end server;
calling the encryption machine to generate an encrypted fourth key by using the third key, and synchronizing the encrypted fourth key to the front-end server;
the front-end server is further configured to:
appointing a third key with a background end;
decrypting the encrypted fourth key by using the third key, and carrying out hard encryption on a cipher plaintext by using the fourth key;
the back end is also for: and performing encryption verification processing on the second ciphertext based on the fourth key.
10. The bank smart machine of claim 6, wherein the front-end server or back-end is further configured to:
and storing a fourth key encrypted by the encryption machine by using a fifth key, wherein the fifth key is a key determined by the encryption machine.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the unconventional password protection method of any one of claims 1 to 5 when executing the computer program.
12. A computer-readable storage medium, wherein a computer program for executing the unconventional password protection method according to any one of claims 1 to 5 is stored in the computer-readable storage medium.
CN202011047447.6A 2020-09-29 2020-09-29 Unconventional password protection method and intelligent bank machine Active CN112149166B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011047447.6A CN112149166B (en) 2020-09-29 2020-09-29 Unconventional password protection method and intelligent bank machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011047447.6A CN112149166B (en) 2020-09-29 2020-09-29 Unconventional password protection method and intelligent bank machine

Publications (2)

Publication Number Publication Date
CN112149166A true CN112149166A (en) 2020-12-29
CN112149166B CN112149166B (en) 2023-09-26

Family

ID=73895076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011047447.6A Active CN112149166B (en) 2020-09-29 2020-09-29 Unconventional password protection method and intelligent bank machine

Country Status (1)

Country Link
CN (1) CN112149166B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127900A (en) * 2021-04-19 2021-07-16 上海同态信息科技有限责任公司 Privacy computing software and hardware service mode based on homomorphic configuration encryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095456A (en) * 2013-01-10 2013-05-08 天地融科技股份有限公司 Method and system for processing transaction messages
US20140025964A1 (en) * 2011-03-31 2014-01-23 Huawei Device Co., Ltd. Mobile terminal encryption method, hardware encryption device and mobile terminal
CN104182876A (en) * 2013-05-24 2014-12-03 中国电信股份有限公司 Secure payment trading method and secure payment trading system
CN106296177A (en) * 2016-08-30 2017-01-04 中国民生银行股份有限公司 Data processing method based on bank's Mobile solution and equipment
CN106330888A (en) * 2016-08-19 2017-01-11 中国银行股份有限公司 Method and device for ensuring security of Internet online payment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140025964A1 (en) * 2011-03-31 2014-01-23 Huawei Device Co., Ltd. Mobile terminal encryption method, hardware encryption device and mobile terminal
CN103095456A (en) * 2013-01-10 2013-05-08 天地融科技股份有限公司 Method and system for processing transaction messages
CN104182876A (en) * 2013-05-24 2014-12-03 中国电信股份有限公司 Secure payment trading method and secure payment trading system
CN106330888A (en) * 2016-08-19 2017-01-11 中国银行股份有限公司 Method and device for ensuring security of Internet online payment
CN106296177A (en) * 2016-08-30 2017-01-04 中国民生银行股份有限公司 Data processing method based on bank's Mobile solution and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127900A (en) * 2021-04-19 2021-07-16 上海同态信息科技有限责任公司 Privacy computing software and hardware service mode based on homomorphic configuration encryption

Also Published As

Publication number Publication date
CN112149166B (en) 2023-09-26

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
EP3192207B1 (en) Apparatus and method for data encryption
CN110059458B (en) User password encryption authentication method, device and system
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN103378971A (en) Data encryption system and method
CN111526007B (en) Random number generation method and system
CN112084525B (en) Distributed key encryption method and device, electronic equipment and storage medium
EP3476078A1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN108809936A (en) A kind of intelligent mobile terminal auth method and its realization system based on Hybrid Encryption algorithm
JP2020532177A (en) Computer-implemented systems and methods for advanced data security, high-speed encryption, and transmission
Yousif et al. Enhancing approach for information security in hadoop
CN113645235A (en) Distributed data encryption and decryption system and encryption and decryption method
CN113326518A (en) Data processing method and device
WO2015166701A1 (en) Encryption method, program, and system
CN112149166B (en) Unconventional password protection method and intelligent bank machine
CN115499118A (en) Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium
CN109936448A (en) A kind of data transmission method and device
CN114285557A (en) Communication encryption method, system and device
CN111212068B (en) Method for encrypting and decrypting characters by input method
CN114499825A (en) Double-control key management method, system, encryption machine and storage medium
CN114205144A (en) Data transmission method, device, equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant