CN113434845B - Business handling method and device, electronic equipment and computer readable storage medium - Google Patents

Business handling method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN113434845B
CN113434845B CN202110773793.0A CN202110773793A CN113434845B CN 113434845 B CN113434845 B CN 113434845B CN 202110773793 A CN202110773793 A CN 202110773793A CN 113434845 B CN113434845 B CN 113434845B
Authority
CN
China
Prior art keywords
service
input information
client terminal
ciphertext
handling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110773793.0A
Other languages
Chinese (zh)
Other versions
CN113434845A (en
Inventor
吴敏悦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCB Finetech Co Ltd filed Critical CCB Finetech Co Ltd
Priority to CN202110773793.0A priority Critical patent/CN113434845B/en
Publication of CN113434845A publication Critical patent/CN113434845A/en
Application granted granted Critical
Publication of CN113434845B publication Critical patent/CN113434845B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a business handling method, a business handling device, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: receiving a business transaction request submitted by a client terminal, wherein the business transaction request comprises: information of a wireless network to which the client terminal is connected; if the wireless network connected with the client terminal belongs to the authentication wireless network corresponding to the service handling two-dimensional code, sending a service handling page corresponding to the service handling request to the client terminal so as to display the service handling page on the client terminal; receiving a cipher text of the service input information and a cipher text of the encryption parameter sent by the client terminal; and carrying out decryption processing according to the ciphertext of the service input information and the ciphertext of the encryption parameter to obtain the service input information, and further carrying out service handling processing according to the service input information. The invention is beneficial to the safety of the two-dimension code information transmission of the high bank outlets for business handling.

Description

Business handling method and device, electronic equipment and computer readable storage medium
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a business handling method, a business handling device, electronic equipment and a computer readable storage medium.
Background
At present, a customer can enter a corresponding page to conduct business handling through scanning a two-dimensional code at a bank outlet. The two-dimensional code arranges black and white patterns in a specific plane area according to a certain standard to store data and transmits the data to a receiver. With the rapid development of mobile internet technology and the popularity of various social network technologies, especially the popularization of personal digital devices such as smart phones, two-dimensional codes have affected aspects of daily life as a brand new technology capable of storing and transmitting digitalized information such as characters, audio and video. However, since the generation standard of the two-dimensional code is public and there is no corresponding encryption standard, the stored and transmitted information is easily intercepted and utilized by lawbreakers, causing unnecessary property loss. How to improve the security of two-dimension code information transmission for business handling at bank outlets is a technical problem which needs to be solved urgently in the field.
Disclosure of Invention
In order to solve at least one technical problem in the background art, the present invention provides a service handling method, an apparatus, an electronic device, and a computer-readable storage medium.
In order to achieve the above object, according to one aspect of the present invention, there is provided a service handling method including:
receiving a business handling request submitted by a client terminal, wherein the business handling request is submitted by the client terminal through scanning a business handling two-dimensional code, and the business handling request comprises: information of a wireless network to which the client terminal is connected;
if the wireless network connected with the client terminal belongs to the authentication wireless network corresponding to the service handling two-dimensional code, sending a service handling page corresponding to the service handling request to the client terminal so as to display the service handling page on the client terminal;
receiving a cipher text of service input information and a cipher text of an encryption parameter, wherein the service input information is obtained by inputting on the service transaction page, the cipher text of the service input information is obtained by encrypting the service input information by adopting an encryption algorithm, and the cipher text of the encryption parameter is obtained by encrypting the encryption parameter of the encryption algorithm;
and carrying out decryption processing according to the ciphertext of the service input information and the ciphertext of the encryption parameter to obtain the service input information, and further carrying out service handling processing according to the service input information.
Optionally, the service transaction request further includes: location information of the client terminal and device information of the client terminal.
Optionally, the ciphertext of the service input information is obtained by encrypting the service input information by using a logistic chaotic map.
Optionally, the ciphertext of the encryption parameter is obtained by encrypting the logistic chaotic mapping parameter by using an RSA algorithm.
Optionally, the decrypting the ciphertext according to the service input information and the ciphertext of the encryption parameter to obtain the service input information specifically includes:
decrypting the ciphertext of the encryption parameter according to an RSA algorithm to obtain a logistic chaotic mapping parameter;
and decrypting the ciphertext of the service input information according to the logistic chaotic mapping parameter to obtain the service input information.
Optionally, the service handling method further includes:
and receiving the marketing staff information corresponding to the service handling two-dimensional code, which is simultaneously sent when the client terminal sends the ciphertext of the service input information and the ciphertext of the encryption parameter.
In order to achieve the above object, according to another aspect of the present invention, there is provided a business handling apparatus including:
a service transaction request receiving unit, configured to receive a service transaction request submitted by a client terminal, where the service transaction request is submitted by the client terminal by scanning a service transaction two-dimensional code, and the service transaction request includes: information of a wireless network to which the client terminal is connected;
a service handling page sending unit, configured to send a service handling page corresponding to the service handling request to the client terminal if a wireless network connected to the client terminal belongs to an authentication wireless network corresponding to the service handling two-dimensional code, so as to display the service handling page on the client terminal;
the system comprises a ciphertext receiving unit, a ciphertext processing unit and a parameter encrypting unit, wherein the ciphertext receiving unit is used for receiving a ciphertext of the service input information and a ciphertext of an encryption parameter sent by the client terminal, the service input information is obtained by inputting the service input information on the service transaction page, the ciphertext of the service input information is obtained by encrypting the service input information by adopting an encryption algorithm, and the ciphertext of the encryption parameter is obtained by encrypting the encryption parameter of the encryption algorithm;
and the service handling unit is used for carrying out decryption processing according to the ciphertext of the service input information and the ciphertext of the encryption parameter to obtain the service input information, and further carrying out service handling processing according to the service input information.
Optionally, the ciphertext of the service input information is obtained by encrypting the service input information by using a logistic chaotic map; the cipher text of the encryption parameters is obtained by encrypting the logistic chaotic mapping parameters by adopting an RSA algorithm.
In order to achieve the above object, according to another aspect of the present invention, there is also provided an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the business transaction method when executing the computer program.
In order to achieve the above object, according to another aspect of the present invention, there is also provided a computer-readable storage medium storing a computer program which, when executed in a computer processor, implements the steps in the above-mentioned service handling method.
The invention has the beneficial effects that: according to the invention, a client submits a business handling request through scanning the business handling two-dimensional code by a client terminal, wherein the business handling request comprises information of a wireless network connected with the client terminal, and only when the wireless network connected with the client terminal is verified to belong to an authentication wireless network corresponding to the business handling two-dimensional code, a business handling page is sent to the client terminal to enable the client to handle the business, namely the two-dimensional code can be identified and opened only in the authentication wireless connection, so that the safety of two-dimensional code information transmission used for business handling by a bank outlet is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts. In the drawings:
FIG. 1 is a flow chart of a business handling method according to an embodiment of the invention;
FIG. 2 is a flow chart of ciphertext decryption in accordance with an embodiment of the present invention;
FIG. 3 is a diagram of a first application scenario in accordance with an embodiment of the present invention;
FIG. 4 is a diagram of a second application scenario in accordance with an embodiment of the present invention;
FIG. 5 is a block diagram of a business handling apparatus according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of the present invention and the above-described drawings, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict. The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 3 and 4 are application scenarios of the embodiment of the present invention, and as shown in fig. 3 and 4, in the scenario of transaction of the present invention, a client in a banking outlet may scan a service transaction two-dimensional code through a client terminal to perform transaction of a corresponding service. Specifically, the client terminal enters a preset service handling interface by scanning the service handling two-dimensional code, then the client inputs information on the service handling interface, submits the information after completing the information input, transmits the filled service input information to the banking system, and then the banking system handles the service according to the service input information.
Fig. 1 is a flowchart of a business handling method according to an embodiment of the present invention, which is applied to a banking system, that is, a banking system is implemented as a main body, and as shown in fig. 1, in an embodiment of the present invention, the business handling method according to the present invention includes steps S101 to S104.
Step S101, receiving a service handling request submitted by a client terminal, wherein the service handling request is submitted by the client terminal through scanning a service handling two-dimensional code, and the service handling request comprises: information of a wireless network to which the client terminal is connected.
And step S102, if the wireless network connected with the client terminal belongs to the authentication wireless network corresponding to the service handling two-dimensional code, sending a service handling page corresponding to the service handling request to the client terminal so as to display the service handling page on the client terminal.
In an embodiment of the present invention, after verifying that the wireless network connected to the client terminal belongs to the authenticated wireless network corresponding to the service handling two-dimensional code, the step first obtains a URL of a service handling page corresponding to the service handling request, and then obtains service handling page data according to the URL, and further sends the service handling page data to the client terminal.
In one embodiment of the invention, the business transaction page may be a WEB page.
Step S103, receiving a cipher text of the service input information and a cipher text of the encryption parameter sent by the client terminal, wherein the service input information is obtained by inputting on the service transaction page, the cipher text of the service input information is obtained by encrypting the service input information by adopting an encryption algorithm, and the cipher text of the encryption parameter is obtained by encrypting the encryption parameter of the encryption algorithm.
In an embodiment of the present invention, the ciphertext of the service input information is obtained by encrypting the service input information by using a logistic chaotic map.
In an embodiment of the present invention, the ciphertext of the encrypted parameter is obtained by encrypting the logistic chaotic mapping parameter by using RSA algorithm.
And step S104, carrying out decryption processing according to the ciphertext of the service input information and the ciphertext of the encryption parameter to obtain the service input information, and further carrying out service handling processing according to the service input information.
Therefore, the invention can send the service transaction page to the client terminal to enable the client to perform service transaction only when verifying that the wireless network connected with the client terminal belongs to the authentication wireless network corresponding to the service transaction two-dimensional code, thereby greatly enhancing the security of the two-dimensional code information transmission used for service transaction by the bank outlets.
In an embodiment of the present invention, the service transaction request further includes: location information of the client terminal and device information of the client terminal.
In an embodiment of the present invention, the location information of the client terminal may be information of a banking outlet where the client terminal is located. In an embodiment of the present invention, the device information may be a device ID.
The invention also brings some necessary information for business handling such as the positioning information of the client terminal and the equipment information of the client terminal into the system without feeling when the user handles the business, thereby reducing the filling and operation of the client during the business handling and avoiding the missing filling of the information. The information of the invention is not inducted, and some necessary information for business handling can be collected to the banking business system without being perceived by the client, thereby improving the business handling efficiency and the user experience.
In an embodiment of the present invention, the performing the service processing according to the service input information in step S104 specifically includes: and performing service handling processing according to service input information, information of a wireless network connected with the client terminal, positioning information of the client terminal and equipment information of the client terminal.
In an embodiment of the present invention, the service handling method of the present invention further includes:
and receiving the marketing staff information corresponding to the service handling two-dimensional code, which is simultaneously sent when the client terminal sends the ciphertext of the service input information and the ciphertext of the encryption parameter.
In an optional embodiment of the present invention, the marketer information may specifically be a customer manager ID.
In one embodiment of the invention, for some product subscription services, marketing staff information is often needed during service handling, the service handling two-dimensional codes of the services correspond to the marketing staff information, and then the marketing staff information is collected by adopting a non-inductive bringing method, so that filling and operation of clients during service handling are reduced, information missing filling is avoided, and the service handling efficiency and user experience are further improved.
In an embodiment of the present invention, the performing the service processing according to the service input information in step S104 specifically includes: and performing service handling processing according to service input information, information of a wireless network connected with the client terminal, positioning information of the client terminal, equipment information of the client terminal and marketing staff information.
Fig. 2 is a flowchart of ciphertext decryption according to an embodiment of the present invention, and as shown in fig. 2, in an embodiment of the present invention, the decrypting process performed according to the ciphertext of the service input information and the ciphertext of the encryption parameter in step S104 described above obtains the service input information, which specifically includes step S201 and step S202.
Step S201, the ciphertext of the encryption parameter is decrypted according to the RSA algorithm to obtain the logistic chaotic mapping parameter.
And S202, decrypting the ciphertext of the service input information according to the logistic chaotic mapping parameter to obtain the service input information.
In an embodiment of the present invention, a logic chaotic map is adopted to encrypt service input information to obtain a ciphertext of the service input information, which specifically includes the following steps:
step 11, A, selecting initial parameters (x0, mu 0) of the logistic chaotic mapping;
step 12, generating an original chaotic sequence L by a logistic chaotic model by utilizing the initial parameters;
step 13, A, sequencing the original chaotic sequence from small to large to obtain a sequenced sequence L';
step 14, A converts the service input information M into a 0-1 sequence DS according to the coding rule. And the mapping relation of L → L 'is used for carrying out position scrambling on the DS to obtain a cipher text DS' of the service input information.
In one embodiment of the invention, the method for encrypting the logistic chaotic mapping parameter by using the RSA algorithm specifically comprises the following steps:
step 21, B generates a public key Ku ═ e, n and a private key Kr ═ d, n by using an RSA algorithm, and sends the public key to a, and the private key is stored in a secret manner;
step 22, A, preprocessing initial parameters (x0, mu 0) of the logistic chaotic mapping, namely expanding the decimal number by multiple into an integer to obtain (x '0, mu' 0);
step 23, a encrypts x '0, μ' 0(CS) by using the received public key Ku ═ e, n and RSA encryption algorithm to obtain a parameter ciphertext (x "0, μ" 0);
step 24, A converts the parameter cipher text (x "0, μ" 0) into binary code CS'.
As can be seen from the above embodiments, the present invention achieves at least the following advantageous effects:
1. and only when the wireless network connected with the client terminal is verified to belong to the authenticated wireless network corresponding to the service handling two-dimensional code, the service handling page is sent to the client terminal to enable the client to handle the service, namely, the two-dimensional code can be identified and opened only in the authenticated wireless connection, so that the safety of the two-dimensional code information transmission used for handling the service by a bank outlet is greatly improved.
2. The invention brings no sense to the information of the marketing personnel and the network points, reduces the filling and operation of the purchase requisition data of the user and avoids the missing filling of the information of the marketing personnel.
3. The invention has low application cost and wide application range, can be implemented based on the quick matching of the existing equipment, does not need to be additionally provided with hardware facility support, and can be implemented only by connecting a signal transmitter in a wireless way and using a mobile phone.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
Based on the same inventive concept, the embodiment of the present invention further provides a service handling apparatus, which can be used to implement the service handling method described in the foregoing embodiment, as described in the following embodiment. Because the principle of the service handling device for solving the problem is similar to that of the service handling method, the embodiment of the service handling device can be referred to as the embodiment of the service handling method, and repeated parts are not described again. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 5 is a block diagram of a business handling apparatus according to an embodiment of the present invention, and as shown in fig. 5, in an embodiment of the present invention, the business handling apparatus includes:
a service transaction request receiving unit 1, configured to receive a service transaction request submitted by a client terminal, where the service transaction request is submitted by the client terminal by scanning a service transaction two-dimensional code, and the service transaction request includes: information of a wireless network to which the client terminal is connected;
a service handling page sending unit 2, configured to send a service handling page corresponding to the service handling request to the client terminal if the wireless network connected to the client terminal belongs to the authenticated wireless network corresponding to the service handling two-dimensional code, so as to display the service handling page on the client terminal;
a ciphertext receiving unit 3, configured to receive a ciphertext of the service input information and a ciphertext of the encryption parameter, where the service input information is obtained by inputting the service input information on the service transaction page, the ciphertext of the service input information is obtained by encrypting the service input information by using an encryption algorithm, and the ciphertext of the encryption parameter is obtained by encrypting the encryption parameter of the encryption algorithm;
and the service handling unit 4 is used for carrying out decryption processing according to the ciphertext of the service input information and the ciphertext of the encryption parameter to obtain the service input information, and further carrying out service handling processing according to the service input information.
In one embodiment of the invention, the ciphertext of the service input information is obtained by encrypting the service input information by using a logistic chaotic mapping; the cipher text of the encryption parameter is obtained by encrypting the logistic chaotic mapping parameter by adopting an RSA algorithm.
In an embodiment of the present invention, the service transaction request further includes: location information of the client terminal and device information of the client terminal.
In an embodiment of the present invention, the ciphertext receiving unit 3 is further configured to receive the marketer information corresponding to the service handling two-dimensional code, which is sent by the client terminal when sending the ciphertext of the service input information and the ciphertext of the encryption parameter.
In an embodiment of the present invention, the service handling unit 4 specifically includes:
the first decryption module is used for decrypting the ciphertext of the encryption parameter according to an RSA algorithm to obtain a logistic chaotic mapping parameter;
and the second decryption module is used for decrypting the ciphertext of the service input information according to the logistic chaotic mapping parameter to obtain the service input information.
In order to achieve the above object, according to another aspect of the present application, there is also provided an electronic device. As shown in fig. 6, the electronic device includes a memory, a processor, a communication interface, and a communication bus, where a computer program that can run on the processor is stored in the memory, and the processor executes the computer program to implement the steps of the method of the above-mentioned embodiment.
The processor may be a Central Processing Unit (CPU). The Processor may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or a combination thereof.
The memory, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and units, such as the corresponding program units in the above-described method embodiments of the present invention. The processor executes various functional applications of the processor and the processing of the work data by executing the non-transitory software programs, instructions and modules stored in the memory, that is, the method in the above method embodiment is realized.
The memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor, and the like. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory located remotely from the processor, and such remote memory may be coupled to the processor via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more units are stored in the memory and when executed by the processor perform the method of the above embodiments.
The specific details of the electronic device may be understood by referring to the corresponding related descriptions and effects in the above embodiments, and are not described herein again.
In order to achieve the above object, according to another aspect of the present application, there is also provided a computer-readable storage medium storing a computer program which, when executed in a computer processor, implements the steps in the above-mentioned service handling method. It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for transaction, comprising:
receiving a service handling request submitted by a client terminal, wherein the service handling request is submitted by the client terminal through scanning a service handling two-dimensional code, and the service handling request comprises: information of a wireless network to which the client terminal is connected;
if the wireless network connected with the client terminal belongs to the authentication wireless network corresponding to the service handling two-dimensional code, sending a service handling page corresponding to the service handling request to the client terminal so as to display the service handling page on the client terminal;
receiving a cipher text of service input information and a cipher text of an encryption parameter, wherein the service input information is obtained by inputting on the service transaction page, the cipher text of the service input information is obtained by encrypting the service input information by adopting an encryption algorithm, and the cipher text of the encryption parameter is obtained by encrypting the encryption parameter of the encryption algorithm;
and carrying out decryption processing according to the ciphertext of the service input information and the ciphertext of the encryption parameter to obtain the service input information, and further carrying out service handling processing according to the service input information.
2. The service transaction method according to claim 1, wherein the service transaction request further comprises: location information of the client terminal and device information of the client terminal.
3. The service transaction method according to claim 1, wherein the ciphertext of the service input information is obtained by encrypting the service input information using a logistic chaotic map.
4. The transaction method according to claim 1, wherein the encrypted text of the encrypted parameter is obtained by encrypting the logistic chaotic mapping parameter by using RSA algorithm.
5. The business handling method according to claim 4, wherein the decrypting according to the ciphertext of the business input information and the ciphertext of the encryption parameter to obtain the business input information specifically comprises:
decrypting the ciphertext of the encryption parameter according to an RSA algorithm to obtain a logistic chaotic mapping parameter;
and decrypting the ciphertext of the service input information according to the logistic chaotic mapping parameter to obtain the service input information.
6. A transaction method according to claim 1, further comprising:
and receiving the marketing staff information corresponding to the service handling two-dimensional code, which is simultaneously sent when the client terminal sends the ciphertext of the service input information and the ciphertext of the encryption parameter.
7. A transaction apparatus, comprising:
a service transaction request receiving unit, configured to receive a service transaction request submitted by a client terminal, where the service transaction request is submitted by the client terminal by scanning a service transaction two-dimensional code, and the service transaction request includes: information of a wireless network to which the client terminal is connected;
a service handling page sending unit, configured to send a service handling page corresponding to the service handling request to the client terminal if a wireless network connected to the client terminal belongs to an authentication wireless network corresponding to the service handling two-dimensional code, so as to display the service handling page on the client terminal;
the system comprises a ciphertext receiving unit, a ciphertext processing unit and a parameter encrypting unit, wherein the ciphertext receiving unit is used for receiving a ciphertext of the service input information and a ciphertext of an encryption parameter sent by the client terminal, the service input information is obtained by inputting the service input information on the service transaction page, the ciphertext of the service input information is obtained by encrypting the service input information by adopting an encryption algorithm, and the ciphertext of the encryption parameter is obtained by encrypting the encryption parameter of the encryption algorithm;
and the service handling unit is used for carrying out decryption processing according to the ciphertext of the service input information and the ciphertext of the encryption parameter to obtain the service input information, and further carrying out service handling processing according to the service input information.
8. The service handling device according to claim 7, wherein the ciphertext of the service input information is obtained by encrypting the service input information by using a logistic chaotic map; the cipher text of the encryption parameter is obtained by encrypting the logistic chaotic mapping parameter by adopting an RSA algorithm.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when executed in a computer processor, implements the method of any one of claims 1 to 6.
CN202110773793.0A 2021-07-08 2021-07-08 Business handling method and device, electronic equipment and computer readable storage medium Active CN113434845B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110773793.0A CN113434845B (en) 2021-07-08 2021-07-08 Business handling method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110773793.0A CN113434845B (en) 2021-07-08 2021-07-08 Business handling method and device, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN113434845A CN113434845A (en) 2021-09-24
CN113434845B true CN113434845B (en) 2022-08-02

Family

ID=77759622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110773793.0A Active CN113434845B (en) 2021-07-08 2021-07-08 Business handling method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113434845B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932793A (en) * 2012-11-15 2013-02-13 北京易和迅科技有限公司 Wireless network authentication method and system based on two-dimension code
WO2014023124A1 (en) * 2012-08-09 2014-02-13 Tencent Technology (Shenzhen) Company Limited Authorization method, apparatus, and system
CN104835071A (en) * 2015-04-22 2015-08-12 中国建设银行股份有限公司 Form-filling method and device
WO2017096868A1 (en) * 2015-12-11 2017-06-15 乐视控股(北京)有限公司 Wireless display connection method and apparatus, and terminal device
CN111213167A (en) * 2017-10-09 2020-05-29 华为技术有限公司 Payment method, unlocking method and related terminal
JP2020145726A (en) * 2020-05-21 2020-09-10 華為終端有限公司 Method of connecting to wi-fi hotspot device, wi-fi hotspot device, and user device
CN112291712A (en) * 2020-10-26 2021-01-29 鲸数科技(北京)有限公司 Data processing method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014023124A1 (en) * 2012-08-09 2014-02-13 Tencent Technology (Shenzhen) Company Limited Authorization method, apparatus, and system
CN102932793A (en) * 2012-11-15 2013-02-13 北京易和迅科技有限公司 Wireless network authentication method and system based on two-dimension code
CN104835071A (en) * 2015-04-22 2015-08-12 中国建设银行股份有限公司 Form-filling method and device
WO2017096868A1 (en) * 2015-12-11 2017-06-15 乐视控股(北京)有限公司 Wireless display connection method and apparatus, and terminal device
CN111213167A (en) * 2017-10-09 2020-05-29 华为技术有限公司 Payment method, unlocking method and related terminal
JP2020145726A (en) * 2020-05-21 2020-09-10 華為終端有限公司 Method of connecting to wi-fi hotspot device, wi-fi hotspot device, and user device
CN112291712A (en) * 2020-10-26 2021-01-29 鲸数科技(北京)有限公司 Data processing method and system

Also Published As

Publication number Publication date
CN113434845A (en) 2021-09-24

Similar Documents

Publication Publication Date Title
US10972251B2 (en) Secure web browsing via homomorphic encryption
CN111130803B (en) Method, system and device for digital signature
CN106888183A (en) Data encryption, decryption, the method and apparatus and system of key request treatment
CN111741020B (en) Public data set determination method, device and system based on data privacy protection
CN204360381U (en) mobile device
CN113242134B (en) Digital certificate signing method, device, system and storage medium
CN112232814A (en) Encryption and decryption method of payment key, payment authentication method and terminal equipment
CN109728905B (en) Anti-quantum computation MQV key negotiation method and system based on asymmetric key pool
CN102404337A (en) Data encryption method and device
CN111970114A (en) File encryption method, system, server and storage medium
CN114154181A (en) Privacy calculation method based on distributed storage
CN109005187A (en) A kind of communication information guard method and device
CN110598427B (en) Data processing method, system and storage medium
CN104868994A (en) Collaboration secret key management method, device and system
CN117349685A (en) Clustering method, system, terminal and medium for communication data
CN116095671B (en) Resource sharing method based on meta universe and related equipment thereof
CN113434845B (en) Business handling method and device, electronic equipment and computer readable storage medium
CN114866317B (en) Multi-party data security calculation method and device, electronic equipment and storage medium
WO2018171302A1 (en) Method and apparatus for use in information processing
CN114157425A (en) Method and device for responding service request
CN111125734B (en) Data processing method and system
CN114036546A (en) Identity verification method and device based on mobile phone number, computer equipment and medium
CN110098915B (en) Authentication method and system, and terminal
CN112788046A (en) Method and system for encrypting transmission information
CN112862488A (en) Data signature method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant