CN114255532A - Money box management method and device, electronic equipment and storage medium - Google Patents

Money box management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114255532A
CN114255532A CN202111558832.1A CN202111558832A CN114255532A CN 114255532 A CN114255532 A CN 114255532A CN 202111558832 A CN202111558832 A CN 202111558832A CN 114255532 A CN114255532 A CN 114255532A
Authority
CN
China
Prior art keywords
target
money box
initial
identification information
box
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111558832.1A
Other languages
Chinese (zh)
Inventor
张扬
吴迪
吴渊
管正国
任玉栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202111558832.1A priority Critical patent/CN114255532A/en
Publication of CN114255532A publication Critical patent/CN114255532A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Abstract

The present disclosure provides a money box management method, which can be applied to the technical field of computers and the technical field of finance. The method comprises the following steps: generating a dynamic unlocking code corresponding to a target lock in the target money box under the condition that the target money box operator is determined to have authority to open the target lock in the target money box according to the identification information of the target money box operator and the identification information of the target money box; sending an unlocking instruction and a dynamic unlocking code of the target money box to the target money box by using the edge gateway equipment so as to facilitate the target money box to verify the dynamic unlocking code; and receiving a new locking code sent by the edge gateway device, wherein the new locking code is sent to the edge gateway device after the dynamic unlocking code is verified by the target money box and the last locking code is updated. In addition, the present disclosure also provides a money box management apparatus, an electronic device, a readable storage medium, and a program product.

Description

Money box management method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technology and financial technology, and in particular, to a money box management method, apparatus, electronic device, readable storage medium, and program product.
Background
The existing financial institution business network is provided with money boxes for storing important articles for daily business work of the network, and the security management of the money boxes is concerned by more and more people. At present, the business network of the financial institution mostly adopts a mechanical offline management mode for money box management. Usually, a set of two keys are needed to be managed by two persons and are responsible for the two keys together. In actual use, the key is easy to lose and copy, the procedure is complex during handover, and the storage risk is increased.
Disclosure of Invention
In view of the above, the present disclosure provides a money box management method, apparatus, electronic device, readable storage medium, and program product.
According to a first aspect of the present disclosure, there is provided a money box management method comprising: generating a dynamic unlocking code corresponding to a target lock in a target money box under the condition that the target money box operator is determined to have authority to open the target lock in the target money box according to the identification information of the target money box operator and the identification information of the target money box; sending an unlocking instruction of the target money box and the dynamic unlocking code to the target money box by using edge gateway equipment so that the target money box can verify the dynamic unlocking code; and receiving a new locking code sent by the edge gateway device, wherein the new locking code is sent to the edge gateway device after the last locking code is updated after the dynamic unlocking code is verified by the target cash box.
According to an embodiment of the present disclosure, the method further includes: verifying the identification information of the target money box operator in response to an unlocking request for unlocking the target money box; and acquiring the identification information of the target money box under the condition that the verification is passed.
According to an embodiment of the present disclosure, the obtaining of the identification information of the target money box includes: acquiring the electronic label information of the target money box; and determining the identification information of the target money box matched with the electronic label information according to the electronic label information.
According to an embodiment of the present disclosure, the generating of the dynamic unlock code corresponding to the target lock in the target money box includes: performing data compression on the last locking code and the time factor of the target money box to obtain compressed data of the last locking code of the target money box and compressed data of the time factor, wherein the last locking code is a locking code which is updated after the last unlocking sent by the target money box is received; performing hash operation on the compressed data of the last locking code of the target money box and the compressed data of the time factor to obtain the operated data; carrying out XOR logical operation on the operated data to obtain the data subjected to the XOR logical operation; encrypting the data subjected to the exclusive-or logical operation by using a working key as a key; and performing decimal conversion on the encrypted data subjected to the exclusive or logical operation to generate a dynamic unlocking code corresponding to the target lockset in the target money box.
According to an embodiment of the present disclosure, the target money box includes at least one target lock, each target lock includes target lock identification information, and the work key is obtained by: and generating the working key corresponding to the target lock identification information according to the target lock identification information and the time factor.
According to the embodiment of the disclosure, the method is applied to a core system end, and the core system end and the target money box are in communication connection through the edge gateway device; wherein, the method further comprises: initializing the target money box; initializing the target money box comprises: receiving an initial target lock list of at least one target lock on the target money box, wherein the initial target lock list comprises identification information of an initial target lock corresponding to each target lock; generating initial target lock identification information corresponding to the target lock and an initial public key signature corresponding to the initial target lock identification information under the condition that the initial target lock identification information corresponding to the target lock is empty; determining an initial communication key according to initial target lockset identification information corresponding to the target lockset, an initial public key corresponding to the initial target lockset identification information and an initial public key signature; generating an initial working key corresponding to the target lockset according to the initial target lockset identification information corresponding to the target lockset and the initial time factor; encrypting an initial working key corresponding to the target lockset by using the initial communication key to obtain an encrypted initial working key; sending the encrypted initial working key to the target money box so that the target money box generates an initial locking code based on the encrypted initial working key; and receiving the initial locking code sent by the target money box so as to finish the initialization of the target money box.
According to an embodiment of the present disclosure, determining an initial communication key according to an initial target lock identification information corresponding to the target lock, an initial public key corresponding to the initial target lock identification information, and an initial public key signature includes: sending initial target lock identification information corresponding to the target lock, an initial public key corresponding to the initial target lock identification information and an initial public key signature to the target cash box so that the target cash box can generate an encrypted initial random number; receiving the encrypted initial random number sent by the target cash box to generate the initial communication key.
According to an embodiment of the present disclosure, before receiving a target lock list of at least one target lock on the target money box sent by the target money box, the method further includes: and activating the target money box.
According to the embodiment of the disclosure, the target money box is in communication connection with the edge gateway device through a ZigBee network protocol; and the core system end and the edge gateway equipment are in communication connection through an instant messaging protocol.
A second aspect of the present disclosure provides a money box management apparatus comprising: a generating module, configured to generate a dynamic unlock code corresponding to a target lock in the target money box when it is determined that the target money box operator has permission to unlock the lock of the target money box according to the identification information of the target money box operator and the identification information of the target money box; a sending module, configured to send, by using an edge gateway device, an unlocking instruction of the target money box and the dynamic unlocking code to the target money box, so that the target money box verifies the dynamic unlocking code; and a receiving module, configured to receive a new locking code sent by the edge gateway device, where the new locking code is sent to the edge gateway device after the target cash box verifies the dynamic unlocking code and updates the last locking code.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the cash box management method.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above money box management method.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above money box management method.
According to the embodiment of the disclosure, the cash box is accessed into the edge gateway device network by using the edge gateway device, and the unlocking instruction and the dynamic unlocking code of the cash box are sent to the cash box, so that the cash box can verify the dynamic unlocking code; and receiving the new locking code sent by the edge gateway equipment. The technical problems that the cash box adopts a mechanical lock lockset, networking is not available, the unlocking authority cannot be updated in real time, complete recording cannot be achieved for tracking of operation records, and the mechanical key corresponding to the mechanical lockset is copied conveniently, the key is copied to be large in opening, and the wind control difficulty is high are solved, so that the cash box management is realized by adopting an edge gateway device network, the unlocking authority of the cash box is updated in real time, and the safety management performance of the cash box is improved.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of a money box management method and a money box management device according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a method of money box management according to an embodiment of the disclosure;
FIG. 3 schematically illustrates a flow chart for initializing a target money box according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a schematic diagram of a method of money box management according to an embodiment of the disclosure;
FIG. 5 schematically illustrates a schematic diagram of the initialization of a cash box according to an embodiment of the present disclosure;
FIG. 6 is a block diagram schematically illustrating the construction of a cash box management apparatus according to an embodiment of the present disclosure; and
FIG. 7 schematically illustrates a block diagram of an electronic device suitable for implementing a cash box management method in accordance with an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
At present, when a mechanical lock is adopted for managing a money box by a business network of a financial institution, the management of a mechanical key mainly depends on the restriction of the regulation and the regulation of the business network, and the opening and the closing of the money box need to be realized by opening and closing the money box at the same time and locking the money box at the same time, so that the work of workers is inconvenient. Meanwhile, for the management of the mechanical key, when the work is handed over, the handing over procedure is complicated, the working efficiency is reduced, the possibility that the key is copied and lost easily occurs in the process of keeping the mechanical key, and the risk control difficulty is high.
To this end, embodiments of the present disclosure provide a money box management method, apparatus, electronic device, readable storage medium, and program product. The method comprises the following steps: generating a dynamic unlocking code corresponding to a target lock in the target money box under the condition that the target money box operator is determined to have authority to open the lock of the target money box according to the identification information of the target money box operator and the identification information of the target money box; sending an unlocking instruction and a dynamic unlocking code of the target money box to the target money box by using the edge gateway equipment so as to facilitate the target money box to verify the dynamic unlocking code; and receiving a new locking code sent by the edge gateway device, wherein the new locking code is sent to the edge gateway device after the dynamic unlocking code is verified by the target money box and the last locking code is updated.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, necessary security measures are taken, and the customs of the public order is not violated.
It should be noted that the money box management method and apparatus provided by the embodiment of the present disclosure may be used in the financial field, and may also be used in the computer technology field other than the financial field, and the application field of the money box management method and apparatus provided by the embodiment of the present disclosure is not limited.
Fig. 1 schematically shows an application scenario diagram of a money box management method and a money box management device according to an embodiment of the present disclosure.
As shown in fig. 1, the application scenario 100 according to the present embodiment may include an edge gateway device 101, a short-range communication network protocol 102, a money box 103, an intelligent handheld terminal device 104, a network 105, and a core system 106. The network 105 is used to provide a medium for communication links between the core system 106 and the edge gateway device 101 and the smart handheld terminal device 104. Network 105 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The money box 103 accesses the edge gateway device 101 through the short-distance communication network protocol 102, then enters the core system 106 through the network 105, and the core system 106 sends data to the edge gateway device 101 through the network 105 for data conversion and then sends the data to the money box through the short-distance communication network protocol 102. The edge gateway device 101 converts data between the core system and the cash box 103 via the short-range communication network protocol 102. Through the network 105, the intelligent handheld terminal device 104 sends the unlocking authority data of the money box operator to the core system 106 for authentication, and then sends the authentication result to the handheld terminal device 104 through the network 105, and under the condition that the authentication result passes, the intelligent handheld terminal device 104 identifies the money box 103 through scanning.
It should be understood that the number of devices, networks, and core systems in fig. 1 is merely illustrative. There may be any number of devices, networks and core systems, according to practical needs.
The money box management method of the disclosed embodiment will be described in detail below with reference to fig. 2 to 5 based on the scenario described in fig. 1.
FIG. 2 schematically illustrates a flow chart of a cash box management method according to an embodiment of the disclosure.
As shown in fig. 2, the money box management method of this embodiment includes operations S210 to S230.
In operation S210, a dynamic unlock code corresponding to a target lock in the target money box is generated when it is determined that the target money box operator has a right to unlock the target lock in the target money box according to the identification information of the target money box operator and the identification information of the target money box.
According to the embodiment of the disclosure, the core system is internally pre-stored with identification information of each target money box and identification information of an operator corresponding to the target money box. And determining whether the target money box operator has the authority to open the target money box according to the matching relation between the identification information of the target money box operator and the identification information of the target money box.
According to the embodiment of the disclosure, the target money box may include at least one target lock, and a dynamic unlock code corresponding to each target lock in the target money is generated according to a last lock code, a work key and a time factor for each target lock on the target money box.
In operation S220, the edge gateway device is used to send the unlocking instruction and the dynamic unlocking code of the target money box to the target money box, so that the target money box verifies the dynamic unlocking code.
According to the embodiment of the disclosure, the edge gateway device may be used for data conversion between the core system and the target cash box under a specific network protocol, and simultaneously, after the data conversion, the data transmission between the core system and the target cash box is performed through the edge gateway device.
According to the embodiment of the disclosure, the core system sends the unlocking instruction and the dynamic unlocking code of the target money box to the target money box through the edge gateway device, and the target money box forwards the dynamic unlocking code to the corresponding target lockset for verification after receiving the unlocking instruction.
In operation S230, a new blocking code sent by the edge gateway device is received, where the new blocking code is sent to the edge gateway device after the dynamic unlocking code is verified by the target cash box and the last blocking code is updated.
According to the embodiment of the disclosure, the dynamic unlocking code corresponding to each target lockset in the target money box is verified according to the last locking code, and the target lockset is unlocked after the verification is passed. And updating the locking code of the target lockset after the target lockset is opened to obtain a new locking code of the target lockset.
According to the embodiment of the disclosure, the target lockset forwards the corresponding new locking code to the target money box, the target money box sends the new locking code to the edge gateway device based on a specific network protocol, and the edge gateway device sends the new locking code to the core system for storage through a wireless or wired network.
According to the embodiment of the disclosure, the cash box is accessed into the edge gateway device network by using the edge gateway device, and the unlocking instruction and the dynamic unlocking code of the cash box are sent to the cash box, so that the cash box can verify the dynamic unlocking code; and receiving the new locking code sent by the edge gateway equipment. The technical problems that the cash box adopts a mechanical lock lockset, networking is not available, the unlocking authority cannot be updated in real time, complete recording cannot be achieved for tracking of operation records, and the mechanical key corresponding to the mechanical lockset is copied conveniently, the key is copied to be large in opening, and the wind control difficulty is high are solved, so that the cash box management is realized by adopting an edge gateway device network, the unlocking authority of the cash box is updated in real time, and the safety management performance of the cash box is improved.
According to an embodiment of the present disclosure, the money box management method of the embodiment further includes: verifying the identification information of the target money box operator in response to an unlocking request for unlocking the target money box; and acquiring the identification information of the target money box under the condition that the verification is passed.
According to embodiments of the present disclosure, the target money box may be a teller money box of a financial institution's business outlet. The money box management method can be applied to a core system end, and the core system can be a back-end system for realizing the centralized management of the target money box.
According to the embodiment of the disclosure, the operator in charge of the target money box inputs identification information, the core system side verifies the identification information of the operator in the target money box prestored with the core system side after receiving the identification information of the operator in the target money box, and if the verification is passed, the operator in charge of the target money box is determined to belong to the operator in charge of the target money box. The operator will use the intelligent hand-held terminal device to obtain the identification information of the target money box.
According to the embodiment of the disclosure, the obtaining of the identification information of the target money box comprises the following steps: acquiring electronic tag information of a target money box; and determining the identification information of the target money box matched with the electronic tag information according to the electronic tag information.
According to the embodiment of the disclosure, the target money box is provided with an identification module for providing electronic label information of the target money box. The identification module may be, for example, an RFID electronic tag, an IC card, an NFC card, or the like. The target money box electronic label information can be, for example, a 001 money box or an A money box.
According to an embodiment of the present disclosure, the identification information of the target money box may be an equipment serial number of the target money box, and each target money box has a unique equipment serial number. The electronic label information of each target money box corresponds to a unique equipment serial number.
According to an embodiment of the present disclosure, generating a dynamic unlock code corresponding to a target lock in a target cash box includes: performing data compression on the last locking code and the time factor of the target money box to obtain the data of the last locking code of the compressed target money box and the data of the compressed time factor, wherein the last locking code is the locking code which is updated after the last unlocking sent by the target money box is received; performing hash operation on the data of the last locking code of the compressed target money box and the data of the compressed time factor to obtain the operated data; carrying out XOR logic operation on the operated data to obtain the data subjected to the XOR logic operation; encrypting the data subjected to the XOR logical operation by using the working key as a key; and carrying out decimal conversion on the encrypted data subjected to the XOR logical operation to generate a dynamic unlocking code corresponding to a target lockset in the target cash box.
According to an embodiment of the present disclosure, the last locking code may be a locking code updated based on the last target money box being unlocked. The working key can be a key randomly generated by the current unlocking target money box and used for encrypting the unlocking code, and the time factor can be a system time stamp of the current core system.
According to the embodiments of the present disclosure, data compression may be a technique that reduces the amount of data to reduce the storage space and improve the efficiency of data transmission, storage, and processing, or reorganizes data according to a certain algorithm and reduces the redundancy and storage space of data, without losing useful information.
According to the embodiment of the disclosure, for example, the last locking code corresponding to the target lock in the target money box is 16-bit data, the time factor is 14-bit data, after the last locking code and the time factor are subjected to data compression, the last locking code is compressed into 8-bit data, and the time factor is compressed into 7-bit data.
According to an embodiment of the present disclosure, the hash operation may be to transform an input of an arbitrary length into an output of a fixed length through a hash algorithm, where the output is a hash value.
According to the embodiment of the disclosure, the last locking code data corresponding to the target lockset with 8 data obtained after data compression and the time factor data of 7-bit data obtained after data compression are subjected to hash operation to obtain a hash operation value.
According to the embodiment of the disclosure, the first 16 bytes of data and the last 16 bytes of data of the hash operation value are subjected to an exclusive or logic operation to obtain 16 bytes of data. And encrypting the 16-byte data obtained through the exclusive logical operation by using a working key corresponding to the target lock, converting the encrypted data through a decimal conversion table, and taking the front 8-bit data as a dynamic unlocking code corresponding to the target lock.
According to the embodiment of the disclosure, the target money box comprises at least one target lock, each target lock comprises target lock identification information, and the working key is obtained through the following operations: and generating a working key corresponding to the target lock identification information according to the target lock identification information and the time factor.
According to an embodiment of the present disclosure, the target lock identification information may be ID information of the target lock. And generating a working key corresponding to each target lock according to the identification information corresponding to each target lock in the target money box, the time stamp of the current core system and other calculation factors.
According to the embodiment of the disclosure, the money box management method is applied to a core system end, the core system end and a target money box are in communication connection through edge gateway equipment, and the method can further comprise initializing the target money box.
FIG. 3 schematically illustrates a flow chart for initializing a target money box according to an embodiment of the disclosure.
As shown in fig. 3, the method for initializing the target money box may include: operation S310 to operation S370.
In operation S310, an initial target lock list of at least one target lock on a target money box sent by the target money box is received, where the initial target lock list includes identification information of an initial target lock corresponding to each target lock.
In operation S320, in a case that the original target lock identification information corresponding to the target lock is empty, the original target lock identification information corresponding to the target lock and the original public key signature corresponding to the original target lock identification information are generated.
In operation S330, an initial communication key is determined according to initial target lock identification information corresponding to the target lock, an initial public key corresponding to the initial target lock identification information, and an initial public key signature.
In operation S340, an initial work key corresponding to the target lock is generated according to the initial target lock identification information and the initial time factor corresponding to the target lock.
In operation S350, an initial working key corresponding to the target lock is encrypted by using the initial communication key to obtain an encrypted initial working key.
In operation S360, the encrypted initial working key is sent to the target money box, so that the target money box generates an initial locking code based on the encrypted initial working key.
In operation S370, the initial lock code transmitted by the target money box is received to complete the initialization of the target money box.
According to an embodiment of the present disclosure, the initial target lock list of the target locks may include the number of target locks, target lock identification information, and the status of the target locks. The target lock has a plurality of physical locks, and the physical locks correspond to a plurality of pieces of target lock identification information. The target lock identification information may include ID information of the target lock, and the state of the target lock may be open or closed.
According to an embodiment of the present disclosure, the core system assigns the initial target lock identification information to the empty target lock, where each initial target lock identification information corresponds to a corresponding initial public key and public key signature.
According to the embodiment of the disclosure, the core system sends the initial target lock identification information, the public key and the public key signature corresponding to the target lock to the target money box through the edge computing gateway, and the target money box sends the initial target lock identification information, the public key and the public key signature to the corresponding target lock.
According to the embodiment of the disclosure, the communication key may be an initial encrypted random number generated by the target lock according to an agreed algorithm, and the initial encrypted random number is stored in the target lock, and meanwhile, the initial encrypted random number is sent to the core system for decryption, and the generated initial communication key is stored in the core system.
According to the embodiment of the disclosure, the core system encrypts the generated initial working key by using the initial communication key, and sends the encrypted initial working key to the target cash box through the edge gateway device, and the target cash box forwards the encrypted initial working key to the target lockset.
According to the embodiment of the disclosure, after receiving the encrypted initial working key, the target lock decrypts the initial working key by using the initial communication key of the target lock end, writes the initial working key into an encryption chip of the target lock, generates an initial locking code by the target lock, encrypts the initial working key by using the initial locking code, and sends the encrypted initial locking code to the core system.
According to the embodiment of the disclosure, the core system receives the initial locking code which is sent by the target lock of the target money box and encrypted by the initial working key, and saves the initial locking code in the core system.
According to an embodiment of the present disclosure, determining an initial communication key according to initial target lock identification information corresponding to a target lock, an initial public key corresponding to the initial target lock identification information, and an initial public key signature includes: sending initial target lockset identification information corresponding to the target lockset, an initial public key corresponding to the initial target lockset identification information and an initial public key signature to a target money box so as to generate an encrypted initial random number by the target money box; and receiving the encrypted initial random number sent by the target money box to generate an initial communication key.
According to an embodiment of the disclosure, the random number may be randomly generated, and the random number generated by the target lock in the target mailbox at each time is different, that is, the initial random number generated by the target lock in the target mailbox after receiving the initial target lock identification information, the public key, and the public key signature sent by the core system is different.
According to an embodiment of the present disclosure, before receiving a target lock list of at least one target lock on a target money box sent by the target money box, the method further includes: the target cash box is activated.
According to an embodiment of the present disclosure, activating the target money box may include: and reading the identification information of the target money box and the service application identification information corresponding to the target money box by using a user, sending the identification information to a core system for initial registration, and binding the target money box, the identification information of the target money box and the operator authority corresponding to the target money box by the core system. The core system also stores identification information of the operator, identification of the organization to which the operator belongs, money box type and other information.
According to the embodiment of the disclosure, the core system receives the activation request sent by the target money box through the edge gateway device, and activates the target money box.
According to the embodiment of the disclosure, the target money box is in communication connection with the edge gateway device through a ZigBee network protocol; and the core system end and the edge gateway equipment are in communication connection through an instant messaging protocol.
According to the embodiment of the disclosure, because the ZigBee short-distance communication network protocol has low power consumption, high safety and wide signal coverage, the money box based on the short-distance transmission wireless ZigBee online protocol is introduced, so that the money box is more convenient, intelligent and safe to control, and the control of the money box in a business outlet of a financial institution is realized.
FIG. 4 schematically illustrates a schematic diagram of a money box management method according to an embodiment of the disclosure.
As shown in fig. 4, in response to an unlocking request for the target money box, the identification information 401 of the operator of the target money box is obtained, the identification information 402 of the operator of the target money box is verified, and if the verification is passed, the identification information 403 of the target money box is obtained. Determining whether a target lock 404 in the target money box is authorized to be opened by the target money box operator according to the target money box operator identification information 401 and the target money box identification information 403, generating a dynamic unlocking code 405 corresponding to the target lock in the target money box according to a last locking code, a working key and a time factor of the target money box under the condition of determining that the target lock 404 is authorized, sending the dynamic unlocking code 405 to the edge gateway device, sending the dynamic unlocking code 405 and an unlocking instruction 406 to the target money box for opening 407 the target lock based on a ZigBee network protocol between the edge gateway device and the target money box, updating the locking code 408 after the target lock is opened, sending the updated locking code 408 to the edge gateway device, and sending the updated locking code 408 to the core system 409 for storage.
FIG. 5 schematically illustrates a schematic diagram of the initialization of a cash box according to an embodiment of the present disclosure.
As shown in fig. 5, a target cash box device is registered to a core system, the target cash box is bound to an edge gateway device, initial target lock identification information 501 in an initial target lock list of at least one target lock on the target cash box is received, an initial public key and an initial public key signature 502 corresponding to the initial target lock identification information are generated, an initial communication key 503 is determined according to the initial target lock identification information 501, the initial public key and the initial public key signature 502 corresponding to the initial target lock identification information, an initial working key 504 is encrypted by using the initial communication key 503 to obtain an encrypted initial working key 505, the encrypted initial working key 505 is sent to the target cash box 506, the target cash box generates an initial locking code 507 based on the encrypted initial working key 506, and the initial locking code 507 is stored in the core system 508.
Based on the money box management method, the invention also provides a money box management device. The apparatus will be described in detail below with reference to fig. 6.
Fig. 6 schematically shows a block diagram of the structure of the money box management device according to the embodiment of the present disclosure.
As shown in fig. 6, the money box management apparatus 600 of this embodiment may include a generation module 610, a transmission module 620, and a reception module 630.
The generating module 610 is configured to generate a dynamic unlock code corresponding to a target lock in the target money box when it is determined that the target money box operator has a right to unlock the target lock of the target money box according to the identification information of the target money box operator and the identification information of the target money box. In an embodiment, the generating module 610 may be configured to perform the operation S210 described above, which is not described herein again.
The sending module 620 is configured to send the unlocking instruction and the dynamic unlocking code of the target money box to the target money box by using the edge gateway device, so that the target money box verifies the dynamic unlocking code. In an embodiment, the sending module 620 may be configured to perform the operation S220 described above, which is not described herein again.
The receiving module 630 is configured to receive a new locking code sent by the edge gateway device, where the new locking code is sent to the edge gateway device after the dynamic unlocking code is verified by the target cash box and the last locking code is updated. In an embodiment, the receiving module 630 may be configured to perform the operation S230 described above, which is not described herein again.
According to the embodiment of the disclosure, the cash box is accessed into the edge gateway device network by using the edge gateway device, and the unlocking instruction and the dynamic unlocking code of the cash box are sent to the cash box, so that the cash box can verify the dynamic unlocking code; and receiving the new locking code sent by the edge gateway equipment. The technical problems that the cash box adopts a mechanical lock lockset, networking is not available, the unlocking authority cannot be updated in real time, complete recording cannot be achieved for tracking of operation records, and the mechanical key corresponding to the mechanical lockset is copied conveniently, the key is copied to be large in opening, and the wind control difficulty is high are solved, so that the cash box management is realized by adopting an edge gateway device network, the unlocking authority of the cash box is updated in real time, and the safety management performance of the cash box is improved.
According to the embodiment of the present disclosure, the money box management device 600 may include a response module and an obtaining module. And the response module is used for responding to an unlocking request for unlocking the target money box and verifying the identification information of the target money box operator.
And the acquisition module is used for acquiring the identification information of the target money box under the condition of passing the verification.
According to an embodiment of the present disclosure, the obtaining module may include: the device comprises an acquisition submodule and a first determination submodule.
And the obtaining submodule is used for obtaining the electronic tag information of the target money box.
And the first determining submodule is used for determining the identification information of the target money box matched with the electronic tag information according to the electronic tag information.
According to an embodiment of the disclosure, the generating module 610 may include: the device comprises a compression sub-module, a first operation sub-module, a second operation sub-module, an encryption sub-module and a first generation sub-module.
And the compression submodule is used for carrying out data compression on the last locking code and the time factor of the target money box to obtain the data of the last locking code of the compressed target money box and the data of the compressed time factor, wherein the last locking code is the locking code which is updated after the last unlocking and is sent by the target money box is received.
And the first operation submodule is used for carrying out hash operation on the data of the last locking code of the compressed target money box and the data of the compressed time factor to obtain the operated data.
And the second operation submodule is used for carrying out XOR logical operation on the operated data to obtain the data subjected to the XOR logical operation.
And the encryption submodule is used for encrypting the data subjected to the XOR logical operation by using the working key as a key.
And the first generation submodule is used for performing decimal conversion on the encrypted data subjected to the exclusive or logical operation to generate a dynamic unlocking code corresponding to a target lock in the target money box.
According to the embodiment of the disclosure, the target money box comprises at least one target lock, each target lock comprises target lock identification information, and the working key is obtained through the following operations: and generating a working key corresponding to the target lock identification information according to the target lock identification information and the time factor.
According to the embodiment of the disclosure, the money box management device is applied to a core system end, and the core system end and the target money box are in communication connection through edge gateway equipment.
According to an embodiment of the present disclosure, the money box management apparatus 600 may further include: and initializing the module.
According to an embodiment of the present disclosure, the initialization module includes: the device comprises a first receiving submodule, a second generating submodule, a second determining submodule, a third generating submodule, an obtaining submodule, a sending submodule and a second receiving submodule.
The first receiving submodule is used for receiving an initial target lock list of at least one target lock on the target money box, wherein the initial target lock list comprises identification information of the initial target lock corresponding to each target lock, and the identification information of the initial target lock is sent by the target money box.
And the second generation submodule is used for generating initial target lock identification information corresponding to the target lock and an initial public key signature corresponding to the initial target lock identification information under the condition that the initial target lock identification information corresponding to the target lock is empty.
And the second determining submodule is used for determining an initial communication key according to the initial target lock identification information corresponding to the target lock, the initial public key corresponding to the initial target lock identification information and the initial public key signature.
And the third generation submodule is used for generating an initial working key corresponding to the target lock according to the initial target lock identification information corresponding to the target lock and the initial time factor.
And the obtaining submodule is used for encrypting the initial working key corresponding to the target lock by using the initial communication key to obtain an encrypted initial working key.
And the sending submodule is used for sending the encrypted initial working key to the target money box so that the target money box can generate an initial locking code based on the encrypted initial working key.
And the second receiving submodule is used for receiving the initial locking code sent by the target money box so as to complete the initialization of the target money box.
According to an embodiment of the present disclosure, the second determining sub-module may include: a transmitting unit and a receiving unit.
And the sending unit is used for sending the initial target lock identification information corresponding to the target lock, the initial public key corresponding to the initial target lock identification information and the initial public key signature to the target money box so as to facilitate the target money box to generate an encrypted initial random number.
And the receiving unit is used for receiving the encrypted initial random number sent by the target money box so as to generate an initial communication key.
According to an embodiment of the present disclosure, before receiving a target lock list of at least one target lock on a target money box sent by the target money box, the method further includes: the target cash box is activated.
According to the embodiment of the disclosure, the target money box is in communication connection with the edge gateway device through a ZigBee network protocol; and the core system end and the edge gateway equipment are in communication connection through an instant messaging protocol.
According to an embodiment of the present disclosure, any plurality of the generating module 610, the transmitting module 620, and the receiving module 630 may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the generating module 610, the sending module 620, and the receiving module 630 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware by any other reasonable manner of integrating or packaging a circuit, or may be implemented in any one of three implementations of software, hardware, and firmware, or in a suitable combination of any of the three. Alternatively, at least one of the generating module 610, the transmitting module 620 and the receiving module 630 may be at least partially implemented as a computer program module, which when executed may perform a corresponding function.
FIG. 7 schematically illustrates a block diagram of an electronic device suitable for implementing a cash box management method in accordance with an embodiment of the present disclosure.
As shown in fig. 7, an electronic device 700 according to an embodiment of the present disclosure includes a processor 701, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. The processor 701 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 701 may also include on-board memory for caching purposes. The processor 701 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM703, various programs and data necessary for the operation of the electronic apparatus 700 are stored. The processor 701, the ROM 702, and the RAM703 are connected to each other by a bus 704. The processor 701 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 702 and/or the RAM 703. Note that the above-described programs may also be stored in one or more memories other than the ROM 702 and the RAM 703. The processor 701 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories described above.
Electronic device 700 may also include input/output (I/O) interface 705, which input/output (I/O) interface 705 is also connected to bus 704, according to an embodiment of the present disclosure. The electronic device 700 may also include one or more of the following components connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 702 and/or the RAM703 and/or one or more memories other than the ROM 702 and the RAM703 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. When the computer program product runs in a computer system, the program code is used for causing the computer system to realize the money box management method provided by the embodiment of the disclosure.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 701. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted in the form of a signal on a network medium, distributed, downloaded and installed via the communication section 709, and/or installed from the removable medium 711. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program, when executed by the processor 701, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (13)

1. A money box management method comprising:
generating a dynamic unlocking code corresponding to a target lock in a target money box under the condition that the target money box operator is determined to have authority to open the target lock in the target money box according to the identification information of the target money box operator and the identification information of the target money box;
sending an unlocking instruction of the target money box and the dynamic unlocking code to the target money box by using edge gateway equipment so that the target money box can verify the dynamic unlocking code;
and receiving a new locking code sent by the edge gateway device, wherein the new locking code is sent to the edge gateway device after the last locking code is updated after the dynamic unlocking code is verified by the target money box.
2. The method of claim 1, further comprising:
verifying the identification information of the target money box operator in response to an unlocking request for unlocking the target money box;
and acquiring the identification information of the target money box under the condition that the verification is passed.
3. The method of claim 2, wherein said obtaining identification information of said target cash box comprises:
acquiring electronic label information of the target money box;
and determining the identification information of the target money box matched with the electronic tag information according to the electronic tag information.
4. The method of claim 1, wherein the generating a dynamic unlock code corresponding to a target lock in the target deposit box comprises:
performing data compression on the last locking code and the time factor of the target money box to obtain compressed data of the last locking code of the target money box and compressed data of the time factor, wherein the last locking code is a locking code which is updated after the last unlocking and is sent by the target money box is received;
performing hash operation on the compressed data of the last locking code of the target money box and the compressed data of the time factor to obtain the operated data;
carrying out XOR logic operation on the operated data to obtain the data subjected to the XOR logic operation;
encrypting the data subjected to the XOR logical operation by using a working key as a key;
and carrying out decimal conversion on the encrypted data subjected to the XOR logical operation to generate a dynamic unlocking code corresponding to a target lockset in the target money box.
5. The method of claim 4, wherein the target cash box comprises at least one target lock, each target lock comprises target lock identification information, and the working key is obtained by:
and generating the working key corresponding to the target lock identification information according to the target lock identification information and the time factor.
6. The method according to claim 1, wherein the method is applied to a core system side, and the core system side and the target money box are in communication connection through the edge gateway device;
wherein the method further comprises: initializing the target money box;
the initializing the target money box comprises the following steps:
receiving an initial target lock list of at least one target lock on the target cash box sent by the target cash box, wherein the initial target lock list comprises initial target lock identification information corresponding to each target lock;
generating initial target lockset identification information corresponding to the target lockset and an initial public key signature corresponding to the initial target lockset identification information under the condition that the initial target lockset identification information corresponding to the target lockset is empty;
determining an initial communication key according to initial target lockset identification information corresponding to the target lockset, an initial public key corresponding to the initial target lockset identification information and an initial public key signature;
generating an initial working key corresponding to the target lockset according to initial target lockset identification information corresponding to the target lockset and the initial time factor;
encrypting an initial working key corresponding to the target lockset by using the initial communication key to obtain an encrypted initial working key;
sending the encrypted initial working key to the target money box so that the target money box can generate an initial locking code based on the encrypted initial working key;
and receiving the initial locking code sent by the target money box so as to finish the initialization of the target money box.
7. The method of claim 6, wherein determining an initial communication key according to initial target lock identification information corresponding to the target lock, an initial public key corresponding to the initial target lock identification information, and an initial public key signature comprises:
sending initial target lock identification information corresponding to the target lock, an initial public key corresponding to the initial target lock identification information and an initial public key signature to the target cash box so that the target cash box can generate an encrypted initial random number;
receiving the encrypted initial random number sent by the target cash box to generate the initial communication key.
8. The method of claim 6, wherein prior to receiving the target lock list of at least one target lock on the target cash box sent by the target cash box, further comprising: and activating the target money box.
9. The method of claim 6, wherein the target cash box is communicatively coupled with the edge gateway device via a ZigBee network protocol; and the core system end is in communication connection with the edge gateway equipment through an instant messaging protocol.
10. A cash box management apparatus comprising:
the generation module is used for generating a dynamic unlocking code corresponding to a target lock in a target money box under the condition that the target money box operator is determined to have authority to open the target lock in the target money box according to the identification information of the target money box operator and the identification information of the target money box;
the sending module is used for sending the unlocking instruction of the target money box and the dynamic unlocking code to the target money box by using edge gateway equipment so as to facilitate the target money box to verify the dynamic unlocking code;
and the receiving module is used for receiving a new locking code sent by the edge gateway device, wherein the new locking code is sent to the edge gateway device after the last locking code is updated after the target money box verifies the dynamic unlocking code.
11. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-9.
12. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 9.
13. A computer program product comprising a computer program which, when executed by a processor, implements a method according to any one of claims 1 to 9.
CN202111558832.1A 2021-12-17 2021-12-17 Money box management method and device, electronic equipment and storage medium Pending CN114255532A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111558832.1A CN114255532A (en) 2021-12-17 2021-12-17 Money box management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111558832.1A CN114255532A (en) 2021-12-17 2021-12-17 Money box management method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114255532A true CN114255532A (en) 2022-03-29

Family

ID=80795846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111558832.1A Pending CN114255532A (en) 2021-12-17 2021-12-17 Money box management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114255532A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117593817A (en) * 2024-01-18 2024-02-23 昆山佰奥智能装备股份有限公司 Switch control method and system of intelligent money box electronic lock

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6583712B1 (en) * 1999-01-06 2003-06-24 Kaba Mas Corporation Supervisor and subordinate lock system
KR20150030122A (en) * 2013-09-11 2015-03-19 농협은행(주) Financial service proving method using keylock
CN105827576A (en) * 2015-01-05 2016-08-03 珠海汇金科技股份有限公司 Unlocking method and system based on dynamic cipher lock
CN106600788A (en) * 2016-12-23 2017-04-26 嘉应学院 Method for realizing time data security interaction of coded lock
CN207337507U (en) * 2017-09-30 2018-05-08 广州广电银通金融电子科技有限公司 Dynamic puzzle-lock system
CN109905235A (en) * 2017-12-08 2019-06-18 北京邮电大学 A kind of smart lock unlocking method, smart lock, terminal, server and system
CN113192241A (en) * 2021-03-26 2021-07-30 珠海汇金科技股份有限公司 Unlocking method, system and device and readable storage medium
CN113674456A (en) * 2021-08-19 2021-11-19 中国建设银行股份有限公司 Unlocking method, unlocking device, electronic equipment and storage medium
CN113708940A (en) * 2021-10-29 2021-11-26 深圳百纳维科技有限公司 Container lock data processing method, related equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6583712B1 (en) * 1999-01-06 2003-06-24 Kaba Mas Corporation Supervisor and subordinate lock system
KR20150030122A (en) * 2013-09-11 2015-03-19 농협은행(주) Financial service proving method using keylock
CN105827576A (en) * 2015-01-05 2016-08-03 珠海汇金科技股份有限公司 Unlocking method and system based on dynamic cipher lock
CN106600788A (en) * 2016-12-23 2017-04-26 嘉应学院 Method for realizing time data security interaction of coded lock
CN207337507U (en) * 2017-09-30 2018-05-08 广州广电银通金融电子科技有限公司 Dynamic puzzle-lock system
CN109905235A (en) * 2017-12-08 2019-06-18 北京邮电大学 A kind of smart lock unlocking method, smart lock, terminal, server and system
CN113192241A (en) * 2021-03-26 2021-07-30 珠海汇金科技股份有限公司 Unlocking method, system and device and readable storage medium
CN113674456A (en) * 2021-08-19 2021-11-19 中国建设银行股份有限公司 Unlocking method, unlocking device, electronic equipment and storage medium
CN113708940A (en) * 2021-10-29 2021-11-26 深圳百纳维科技有限公司 Container lock data processing method, related equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117593817A (en) * 2024-01-18 2024-02-23 昆山佰奥智能装备股份有限公司 Switch control method and system of intelligent money box electronic lock

Similar Documents

Publication Publication Date Title
US11063749B2 (en) Cryptographic key management based on identity information
CN104715187B (en) Method and apparatus for the node in certification electronic communication system
CN106465112A (en) Offline authentication
CN111147432B (en) KYC data sharing system with confidentiality and method thereof
US20230368194A1 (en) Encryption method and decryption method for payment key, payment authentication method, and terminal device
CN106936588B (en) Hosting method, device and system of hardware control lock
CN113674456B (en) Unlocking method, unlocking device, electronic equipment and storage medium
AU2019204711B2 (en) Securely performing cryptographic operations
CN103944734A (en) Data security interactive method
CN106789024A (en) A kind of remote de-locking method, device and system
CN107133512A (en) POS terminal control method and device
CN104657855A (en) Mobile payment identity verification device with NFC interface
CN103944728A (en) Data security interactive system
US20200313874A1 (en) Managing cryptographic keys based on identity information
CN114255532A (en) Money box management method and device, electronic equipment and storage medium
US8904508B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
US11234235B2 (en) Resource distribution hub generation on a mobile device
CN101588243A (en) A kind of electronic transaction historical record querying method and system
CN114240399A (en) Government affair data processing method and system based on block chain platform
CN103944909A (en) Data updating method and system
CN103944911A (en) Data security interactive system
CN102324005A (en) Security authentication method, system and device for terminal without computing capability
CN103177365A (en) Intelligent device with USB (Universal Serial Bus) interface and safe transaction mode of intelligent device
US20220300923A1 (en) Systems and methods for secondary merchant card delivery
WO2023056569A1 (en) A method and a validation device for executing blockchain transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination