CN117014152A - Method and device for testing activation link of industry card and electronic equipment - Google Patents

Method and device for testing activation link of industry card and electronic equipment Download PDF

Info

Publication number
CN117014152A
CN117014152A CN202310980980.5A CN202310980980A CN117014152A CN 117014152 A CN117014152 A CN 117014152A CN 202310980980 A CN202310980980 A CN 202310980980A CN 117014152 A CN117014152 A CN 117014152A
Authority
CN
China
Prior art keywords
test
card
industry
key
activation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310980980.5A
Other languages
Chinese (zh)
Inventor
黄琨然
刘洋
林灿燎
杨胜杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310980980.5A priority Critical patent/CN117014152A/en
Publication of CN117014152A publication Critical patent/CN117014152A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method and a device for testing an activation link of an industry card and electronic equipment. Relates to the field of financial science and technology, and the method comprises the following steps: performing authentication processing on the test industry card through each node of the activated link of the industry card to obtain a first processing result, and sending the first processing result and a first secret key to a secret key symmetry tool; judging whether test activation authentication information fed back by a key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key is matched with a second key to obtain the test activation authentication information; and under the condition that the test activation authentication information is received, determining that the active link test is successful, and under the condition that the test activation authentication information is not received, determining that the active link test is failed. The application solves the problem that the activation verification of the industry card is difficult to normally execute in the test stage in the related technology.

Description

Method and device for testing activation link of industry card and electronic equipment
Technical Field
The application relates to the field of financial science and technology, in particular to a method and a device for testing an activation link of an industry card and electronic equipment.
Background
Industry cards have other special industry functions in addition to financial functions, and the industry cards need to be activated to use the industry functions, for example, insurance cards have financial functions and insurance business functions, and the insurance business functions need to be activated to use.
The activation of industry side functions requires a link formed by a plurality of terminals to be realized, the terminals in the link have the requirement of transformation and upgrading, after transformation and upgrading, whether the link can be conducted or not, whether the activation functions can be normally completed or not is required to be tested in a test stage, and the activation functions can be normally completed and then formally put into use.
It should be noted that, on the one hand, the activation of functions of the industry side needs to be verified, on the other hand, the data of the production environment belongs to important assets of clients, and is not suitable for activation verification, on the other hand, the verification of the activation of functions of some industry cards needs to be realized by configuring a symmetric key with the industry side, the industry side can only configure a production key, but the test stage can not configure the production key, and the test key used during the verification is asymmetric with the production key configured by the industry side, so that the flow of the test environment is difficult to dredge, and the function authentication test can not be normally executed.
Aiming at the problem that the activation verification of the industry card is difficult to normally execute in the test stage in the related technology, no effective solution is proposed at present.
Disclosure of Invention
The application mainly aims to provide a method and a device for testing an activation link of an industry card and electronic equipment, so as to solve the problem that in the related technology, in the testing stage, the activation verification of the industry card is difficult to normally execute.
In order to achieve the above object, according to one aspect of the present application, there is provided a method for testing an active link of an industry card. The method comprises the following steps: performing authentication processing on the test industry card through each node of an activated link of the industry card to obtain a first processing result, and sending the first processing result and a first key to a key symmetry tool, wherein the first key is generated by a first cryptographic machine configured with a test certificate; judging whether test activation authentication information fed back by a key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key is matched with a second key to obtain the test activation authentication information, and the second key is generated by a second cipher machine configured with a test certificate; and under the condition that the test activation authentication information is received, determining that the active link test is successful, and under the condition that the test activation authentication information is not received, determining that the active link test is failed.
Optionally, the key symmetry tool is configured to determine whether the first key and the second key are matched, extract the test client element information and the test industry card information from the first processing result when the first key and the second key are matched, and input the test client element information, the test industry card information and a preset activation result into a preset template to generate test activation authentication information when the extraction is successful, where the preset activation result is activation success or activation failure.
Optionally, before the authentication processing is performed on the test industry card by each node of the active link of the industry card, the method further includes: detecting whether a node in an active link is reformed or not; and under the condition that any node in the activated link is detected to be transformed, triggering a test program of the activated link, and executing the step of performing authentication processing on the test industry card through each node of the activated link of the industry card.
Optionally, the nodes in the activation link at least include a service terminal, a card authentication platform and a third party industry application, authentication processing is performed on the test industry card by each node in the activation link of the industry card to obtain a first processing result, and sending the first processing result and the first key to the key symmetry tool includes: triggering an industry side function activation program through a service terminal, and performing card reading authentication on a test industry card through a card authentication platform; under the condition that the card reading authentication passes, the card authentication platform sends the test client elements and the test industry card information related to the test industry card to a third party industry application; the third party industry application obtains the first key and sends the first key, the test client element, and the test industry card information to the key symmetry tool.
Optionally, the card reading authentication of the test industry card by the card authentication platform includes: under the condition that the test industry card is inserted into the card reader, acquiring the information of the test industry card read by the card reader and a first MAC value, wherein the first MAC value is a value calculated by the test industry card based on a third key and the information of the test industry card; acquiring a second MAC value calculated by the card reader based on a fourth key and test industry card information, and judging whether the first MAC value and the second MAC value are symmetrical, wherein the third key and the fourth key are symmetrical keys; and under the condition that the first MAC value is symmetrical with the second MAC value, determining that the card reading authentication passes.
Optionally, before sending the first key, the test client element, and the test industry card information to the key symmetry tool, the method further comprises: the industry side application judges whether the test industry card is a card which needs to be activated by a preset industry side according to the test client element and the test industry card information; in the case that the test industry card is a card that a preset industry party needs to activate, the step of sending the first key, the test client element, and the test industry card information to the key symmetry tool is performed.
Optionally, after determining that the active link test is successful, the method further comprises: under the condition that the activation requirement of the target industry card is received, performing authentication processing on the target industry card through each node of an activation link of the industry card to obtain a second processing result, and sending the second processing result and a fifth secret key to an industry party, wherein the fifth secret key is generated by a third cipher machine configured with a production certificate; and receiving activation authentication information fed back by the industry party, acquiring an activation result from the activation authentication information, and writing the activation result into a chip of the target industry card, wherein the industry party inquires the activation result from a database based on the processing result under the condition that the fifth key is matched with the sixth key, and generates the activation authentication information according to the activation result, and the sixth key is generated by a fourth cryptographic machine configured with a production certificate.
To achieve the above object, according to another aspect of the present application, there is provided a test apparatus for an activation link of an industry card. The device comprises: the first authentication unit is used for performing authentication processing on the test industry card through each node of the activation link of the industry card to obtain a first processing result, and sending the first processing result and a first secret key to the secret key symmetry tool, wherein the first secret key is generated by a first cipher machine configured with a test certificate; the judging unit is used for judging whether test activation authentication information fed back by the key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key is matched with a second key to obtain the test activation authentication information, and the second key is generated by a second cipher machine configured with a test certificate; and the determining unit is used for determining that the active link test is successful under the condition that the test activation authentication information is received, and determining that the active link test is failed under the condition that the test activation authentication information is not received.
According to the application, the following steps are adopted: performing authentication processing on the test industry card through each node of an activated link of the industry card to obtain a first processing result, and sending the first processing result and a first key to a key symmetry tool, wherein the first key is generated by a first cryptographic machine configured with a test certificate; judging whether test activation authentication information fed back by a key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key is matched with a second key to obtain the test activation authentication information, and the second key is generated by a second cipher machine configured with a test certificate; under the condition that the test activation authentication information is received, the activation link test is determined to be successful, and under the condition that the test activation authentication information is not received, the activation link test is determined to be failed, so that the problem that the activation verification of the industry card is difficult to normally execute in the test stage in the related technology is solved. And providing a second key matched with the first key in the testing stage by the key symmetry tool, and generating activation authentication information by simulating by the key symmetry tool, so that an activation link of the industry card is conducted, and the activation verification of the industry card is normally executed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
FIG. 1 is a flow chart of a method for testing an active link of an industry card provided in accordance with an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative method of testing an active link of an industry card provided in accordance with an embodiment of the present application;
FIG. 3 is a schematic diagram of a test apparatus for an activation link of an industry card provided in accordance with an embodiment of the present application;
fig. 4 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the application herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, related information (including, but not limited to, user equipment information, user personal information, etc.) and data (including, but not limited to, data for presentation, analyzed data, etc.) related to the present disclosure are information and data authorized by a user or sufficiently authorized by each party. For example, an interface is provided between the system and the relevant user or institution, before acquiring the relevant information, the system needs to send an acquisition request to the user or institution through the interface, and acquire the relevant information after receiving the consent information fed back by the user or institution.
It should be noted that, the method and the device for testing the activation link of the industry card and the electronic device determined by the present disclosure may be used in the field of financial technology, and may also be used in any field other than the field of financial technology, and the method and the device for testing the activation link of the industry card and the application field of the electronic device determined by the present disclosure are not limited.
For convenience of description, the following will describe some terms or terminology involved in the embodiments of the present application:
industry card: besides financial functions, the card also has other special industry functions, such as insurance cards, hotel cards and the like, which need to be activated to use the industry functions.
The present application is described below in connection with preferred implementation steps, and fig. 1 is a flowchart of a method for testing an active link of an industry card according to an embodiment of the present application, as shown in fig. 1, where the method includes the following steps:
step S101, performing authentication processing on the test industry card through each node of an activated link of the industry card to obtain a first processing result, and sending the first processing result and a first key to a key symmetry tool, wherein the first key is generated by a first cipher machine configured with a test certificate.
Specifically, the industry card has other special industry side functions besides the financial function, and the industry side functions of the industry card need to be activated for use. For example, an industry card is an insurance card that has both financial and insurance business functions that need to be activated for use. For another example, the industry card is a hotel card, which has a financial function and a hotel business function that requires activation for use. The test industry card is an industry card used when testing each node of the active link of the industry card, and the type is not limited.
The authentication processing of the test industry card comprises activation authentication and authentication processing before activation authentication, and after a first processing result of the authentication processing before activation authentication is obtained, the first processing result and a first secret key are sent to a secret key symmetry tool to perform activation authentication.
Optionally, in the method for testing an active link of an industry card provided by the embodiment of the present application, the nodes in the active link at least include a service terminal, a card authentication platform and a third party industry application, authentication processing is performed on the tested industry card by each node of the active link of the industry card to obtain a first processing result, and sending the first processing result and a first key to a key symmetry tool includes: triggering an industry side function activation program through a service terminal, and performing card reading authentication on a test industry card through a card authentication platform; under the condition that the card reading authentication passes, the card authentication platform sends the test client elements and the test industry card information related to the test industry card to a third party industry application; the third party industry application obtains the first key and sends the first key, the test client element, and the test industry card information to the key symmetry tool.
The business terminal may include a business transaction device of a financial institution and a reader, among others. Firstly, inputting test user elements and test service card information into a service handling device, selecting an industry side function to be activated, thereby triggering an activation program of the industry side function, for example, testing the industry card as an insurance card, inputting the name, sex, identity card number and card number of a test user, selecting the insurance function to be activated, and triggering the activation program of the insurance function.
And then, executing card reading operation on the test industry card through the card reader, specifically, inputting a password corresponding to the card number of the test industry card into the card reader after inserting the card, outputting a card reading result by the card reader, uploading the card reading result to a card authentication platform, and authenticating the card reading result through the card authentication platform. And sending prompt information under the condition that card reading authentication fails, and sending the test client element and the test industry card information to a third party industry application under the condition that card reading authentication is successful, wherein the third party industry application can be an application of a financial institution responsible for the business of the corresponding industry card, for example, the test industry card is an insurance card, and the third party industry application can be an application of a bank responsible for insurance business.
When the industry card is actually used, the third party industry application interacts with the industry party to realize activation verification, and the industry party needs to use customer information to perform activation verification. On the other hand, when the industry card is actually used, the customer information is stored in the industry party in advance when the customer applies for the card, so that the activation verification can be successfully performed, if the test customer information is sent to the industry party in the test stage, the industry party is used for the activation verification, the industry party does not reserve data of the test environment, and the activation verification can not be realized. In addition, since the third party industry application cannot connect the encryptor configured with the production certificate in the test stage, only the encryptor configured with the test certificate can be connected, and only the test key can be generated by the encryptor configured with the test certificate, and the production key cannot be generated. Therefore, the third party industry application cannot acquire the production key and cannot interact with the industry party through the production key to achieve activation verification.
In order to solve the problems, the application is used for connecting a first cryptographic machine for a third party industry application in a test stage, wherein the first cryptographic machine is configured with a test certificate, a test key can be generated, and meanwhile, a key symmetry tool is arranged, and the key symmetry tool is connected with a second cryptographic machine configured with the test certificate. The third party industry application obtains the first key, i.e. the first key, which is currently generated by the first cryptographic engine, and then sends the first key, the test client element and the test industry card information to the key symmetry tool, and the second key of the key symmetry tool can be matched with the first key of the third party industry application, so that the activation link of the test section stage is opened.
Step S102, judging whether test activation authentication information fed back by a key symmetry tool is received, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key is matched with a second key, and obtaining the test activation authentication information, and the second key is generated by a second cipher machine configured with a test certificate.
Optionally, in the method for testing an activation link of an industry card provided by the embodiment of the present application, the key symmetry tool is configured to determine whether the first key and the second key are matched, extract test client element information and test industry card information from the first processing result when the first key and the second key are matched, and input the test client element information, the test industry card information and a preset activation result into a preset template to generate test activation authentication information when the extraction is successful, where the preset activation result is activation success or activation failure.
It should be noted that, in the testing stage, the third party industry application does not need to be connected to the industry side, the third party industry application and the key symmetry tool are both connected with the cryptographic machine configured with the test certificate, so that the first key and the second key can be matched, if each node in the activation link is normal, a processing result contains the test client element information and the test industry card information, the key symmetry tool analyzes the first processing result, the test client element information and the test industry card information can be successfully extracted, the key symmetry tool prepares an activation result, namely the preset activation result, and writes the preset activation result into the message, and the simulation industry side returns the message, so that the test procedure is completed. According to the embodiment, the baffle information for activating the authentication is generated through the key symmetry tool, and the dilemma that the production certificate and the key are not symmetrical in the test stage is broken through, so that the function authentication test can be normally executed.
Step S103, under the condition that the test activation authentication information is received, the success of the active link test is determined, and under the condition that the test activation authentication information is not received, the failure of the active link test is determined.
It should be noted that, the activation result is customized according to a preset rule, because the activation success and failure need to be verified, the activation result may be the result of the activation success or the result of the activation failure, and as long as the third party industry application can receive the test activation authentication information, it indicates that the activation link may be turned on, and the activation link test is successful, otherwise, it indicates that the activation link test fails.
According to the method for testing the activation link of the industry card, provided by the embodiment of the application, the authentication processing is carried out on the test industry card through each node of the activation link of the industry card, so that a first processing result is obtained, and the first processing result and a first secret key are sent to a secret key symmetry tool, wherein the first secret key is generated by a first cipher machine configured with a test certificate; judging whether test activation authentication information fed back by a key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key is matched with a second key to obtain the test activation authentication information, and the second key is generated by a second cipher machine configured with a test certificate; under the condition that the test activation authentication information is received, the activation link test is determined to be successful, and under the condition that the test activation authentication information is not received, the activation link test is determined to be failed, so that the problem that the activation verification of the industry card is difficult to normally execute in the test stage in the related technology is solved. The method further achieves the effects that the second secret key matched with the first secret key in the testing stage is provided by the secret key symmetry tool, activation authentication information is simulated and generated by the secret key symmetry tool, and the activation link of the industry card is conducted, so that the activation verification of the industry card can be normally executed.
In the case that the node in the activated link is modified, there is a case that the modified node is incompatible with other nodes, and the activated link needs to be tested, optionally, in the method for testing the activated link of the industry card provided by the embodiment of the application, before the authentication processing is performed on the tested industry card by each node of the activated link of the industry card, the method further includes: detecting whether a node in an active link is reformed or not; and under the condition that any node in the activated link is detected to be transformed, triggering a test program of the activated link, and executing the step of performing authentication processing on the test industry card through each node of the activated link of the industry card.
Specifically, the modification of the nodes in the active links may include upgrades and maintenance of the devices. For example, the service terminal changes the machine, and needs to determine whether the service terminal can normally process the service; the card reader is replaced with a new one, and whether the card reader can be normally used in an activated link or not needs to be judged; the third party industry application changes the machine, and needs to judge whether the third party industry application can normally send and receive messages or not and can normally interact with the front node and the back node.
That is, it should be noted that, when the node of the active link is modified, the docking logic of the third party industry application and the industry party in the active link is not changed, so in the test stage, if any node in the active link is modified, the active link can be tested to test whether the active link can be conducted, and the equipment of each node can be debugged under the condition that the active link cannot be conducted, and the active verification is performed without the need of the regular use of the service card in the production stage, so as to ensure that each node of the active link can normally activate the service card in the regular use.
When the test industry card is manufactured, an encryption machine is connected, and a third secret key and a calculation rule generated by the encryption machine are written into a chip of the test industry card. Optionally, in the method for testing an activation link of an industry card provided by the embodiment of the present application, performing card reading authentication on the tested industry card by using a card authentication platform includes: under the condition that the test industry card is inserted into the card reader, acquiring the information of the test industry card read by the card reader and a first MAC value, wherein the first MAC value is a value calculated by the test industry card based on a third key and the information of the test industry card; acquiring a second MAC value calculated by the card reader based on a fourth key and test industry card information, and judging whether the first MAC value and the second MAC value are symmetrical, wherein the third key and the fourth key are symmetrical keys; and under the condition that the first MAC value is symmetrical with the second MAC value, determining that the card reading authentication passes.
Specifically, when the test industry card is inserted into the card reader, the chip of the test industry card automatically calculates the first MAC value according to the third key, the test industry card information and the calculation rule. Meanwhile, the encryption machine connected with the card reader generates a fourth secret key, the encryption machine is matched with the encryption machine connected when the test industry card is manufactured, the card reader calculates a second MAC value according to the fourth secret key, the test industry card information and the stored calculation rule, the calculation rule stored by the card reader is identical to the calculation rule stored by the test industry card, and if the third secret key is symmetrical with the fourth secret key, the first MAC value is symmetrical with the second MAC value.
Further, the card reader sends the first MAC value and the second MAC value to the card authentication platform in a message sending mode, the card authentication module of the card authentication platform analyzes the first MAC value and the second MAC value from the received message, judges whether the first MAC value and the second MAC value are symmetrical, determines that card reading authentication passes under the condition that the first MAC value and the second MAC value are symmetrical, and determines that card reading authentication fails under the condition that the first MAC value and the second MAC value are asymmetrical.
It should be noted that, in the case that the card-reading authentication of the industry card passes, if the industry card is incorrect and cannot be issued to the industry party, it is necessary to determine to which industry party the industry card belongs, so as to ensure that the industry card is a card to be activated by a specific industry party, and accordingly, in the test stage, before activation, it is also necessary to determine whether the test industry card is a card to be activated by a preset industry party, and optionally, in the test method of the activation link of the industry card provided by the embodiment of the present application, before the first secret key, the test client element and the test industry card information are sent to the secret key symmetry tool, the method further includes: the industry side application judges whether the test industry card is a card which needs to be activated by a preset industry side according to the test client element and the test industry card information; in the case that the test industry card is a card that a preset industry party needs to activate, the step of sending the first key, the test client element, and the test industry card information to the key symmetry tool is performed.
For example, the preset industry side is an a insurance company, the test industry card is an insurance card belonging to the a insurance company, the industry side application judges that the insurance card belongs to the a insurance company according to the test industry card information of the insurance card, if the insurance card is determined to be a card which needs to be activated by the a insurance company according to the test client element associated with the insurance card, the insurance card is determined to be a card which needs to be activated by the a insurance company, if the insurance card is determined not to be a card which needs to be activated by the a insurance company according to the test client element associated with the insurance card.
For another example, the preset industry party is an insurance company a, the test industry card is an insurance card belonging to an insurance company B, and it is determined that the insurance card is not a card that the insurance company a needs to activate.
For another example, the preset industry party is an a insurance company, the test industry card is a hotel card belonging to a hotel B, and it is determined that the hotel card is not a card that the a insurance company needs to activate. In addition, since one industry card has only one industry side function except the financial function, when inputting the card information of the user element and the hotel card to the business handling equipment and selecting the industry side function needing to be activated, the hotel card can be initially determined not to be the card needing to be activated by the A insurance company.
By the method, before activation, whether the test industry card is a card which needs to be activated by a preset industry party is judged, and subsequent activation verification is not performed under the condition that the test industry card is not a card which needs to be activated by the preset industry party, so that the workload of the activation verification is reduced.
In the case that the active link test is successful, the modified node on the active link may be compatible with other nodes, and the active link may be used normally, or optionally, in the method for testing an active link of an industry card provided by the embodiment of the present application, after determining that the active link test is successful, the method further includes: under the condition that the activation requirement of the target industry card is received, performing authentication processing on the target industry card through each node of an activation link of the industry card to obtain a second processing result, and sending the second processing result and a fifth secret key to an industry party, wherein the fifth secret key is generated by a third cipher machine configured with a production certificate; and receiving activation authentication information fed back by the industry party, acquiring an activation result from the activation authentication information, and writing the activation result into a chip of the target industry card, wherein the industry party inquires the activation result from a database based on the processing result under the condition that the fifth key is matched with the sixth key, and generates the activation authentication information according to the activation result, and the sixth key is generated by a fourth cryptographic machine configured with a production certificate.
The target industry card is a formally used card, such as an insurance card, the business terminal can comprise business handling equipment of a financial institution and a reader, the third party industry application can be an application of the financial institution in charge of business of the corresponding industry card, and the third party industry application can be an application of the bank in charge of insurance business under the condition that the target industry card is the insurance card.
When the activation authentication of the industry card is actually performed, firstly, the name, the sex, the identification card number and the card number of a user associated with the target industry card are input into the business handling equipment, and an activation program of the insurance function is selected to be activated, so that the insurance function is triggered. And then, reading the target industry card by the card reader, inputting a password corresponding to the card number of the target industry card to the card reader, outputting a card reading result by the card reader, sending the card reading result to the card authentication platform, and authenticating the card reading result by the card authentication platform. And sending prompt information under the condition that card reading authentication fails, and sending the client element and industry card information to the application responsible for insurance business of the bank under the condition that card reading authentication is successful.
The bank is responsible for the application of insurance business to connect the third encryption machine configured with the production certificate, the industry insurance company connects the fourth encryption machine configured with the production certificate, which application the production certificate is provided with, which insurance company can connect the encryption machines, and the real-time generation keys of different encryption machines configured with the same production certificate can be matched. The application responsible for insurance service obtains the production key currently generated by the third cipher machine, namely, the fifth key, generates a message according to the fifth key, the client element and the industry card information, and sends the message to an industry insurance company, for example, the message can record information such as an area, a website, a teller, a transaction date, a transaction time, a card number, a client name, a sex, an identity card number, a company client name and the like, the industry insurance company obtains the production key currently generated by the fourth cipher machine, namely, the sixth key, analyzes the message to obtain the fifth key, and judges whether the fifth key and the sixth key are matched.
And when the fifth key and the sixth key are not matched, returning activation authentication information representing activation failure, and when the fifth key and the sixth key are matched, inquiring an activation result of the insurance card from a database through a client element, wherein the activation result can be success or failure, and the activation result is determined according to specific terms of an insurance agreement, is calculated in advance by an insurance company and is stored in the database. Further, activation authentication information is generated according to the activation result and the card information, the application responsible for insurance service is returned in a message mode, and the application responsible for insurance service writes the activation result into the chip of the insurance card.
Fig. 2 is a schematic diagram of an alternative method for testing an active link of an industry card according to an embodiment of the present application. As shown in fig. 2, the method includes:
and initiating an industry application activation function at the service terminal, inserting the card into a card reader, marking the card, inputting a password, and connecting the card reader with a card authentication platform.
The card authentication platform acquires the authentication data in the chip, is connected with the encryption machine to generate a card MAC, compares whether the card MAC is consistent with the MAC calculated by the card chip, and is in butt joint with the third party industry application under the condition of consistency.
And the third party industry application is connected with an encryption machine configured with a test certificate, acquires key information generated by the encryption machine, and sends the client element, the card information and the key information to a key symmetry tool.
The key symmetry tool replaces an industry side in a test stage, the key symmetry tool is also connected with an encryptor provided with a test certificate, key information generated by the encryptor is acquired, and under the condition that the key symmetry tool detects that a received key and the acquired key are symmetrical, an authentication simulation result is returned.
After receiving the simulation authentication result, the third party industry application updates the chip industry function through the service terminal after judging that the card activation is available, thereby completing the activation function.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
The embodiment of the application also provides a device for testing the activation link of the industry card, and the device for testing the activation link of the industry card can be used for executing the method for testing the activation link of the industry card. The following describes a testing device for an activation link of an industry card provided by an embodiment of the present application.
Fig. 3 is a schematic diagram of a test apparatus for an active link of an industry card according to an embodiment of the present application. As shown in fig. 3, the apparatus includes: a first authentication unit 301, a judgment unit 302, and a determination unit 303.
The first authentication unit 301 is configured to perform authentication processing on the test industry card through each node of the activation link of the industry card, obtain a first processing result, and send the first processing result and a first key to the key symmetry tool, where the first key is generated by a first cryptographic machine configured with a test certificate;
the judging unit 302 is configured to judge whether test activation authentication information fed back by the key symmetric tool is received, where the key symmetric tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key and a second key are matched, so as to obtain the test activation authentication information, and the second key is generated by a second cryptographic machine configured with a test certificate;
and a determining unit 303, configured to determine that the active link test is successful if the test activation authentication information is received, and determine that the active link test is failed if the test activation authentication information is not received.
The test device for the activation link of the industry card provided by the embodiment of the application is used for carrying out authentication processing on the test industry card through each node of the activation link of the industry card through the first authentication unit 301 to obtain a first processing result, and sending the first processing result and a first secret key to a secret key symmetry tool, wherein the first secret key is generated by a first crypto-engine configured with a test certificate; the judging unit 302 is configured to judge whether test activation authentication information fed back by the key symmetric tool is received, where the key symmetric tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key and a second key are matched, so as to obtain the test activation authentication information, and the second key is generated by a second cryptographic machine configured with a test certificate; the determining unit 303 is configured to determine that the active link test is successful when the test activation authentication information is received, and determine that the active link test is failed when the test activation authentication information is not received, so that the problem that in the related art, in a test stage, activation verification of an industry card is difficult to normally execute is solved, and further, a second key matched with a first key in the test stage is provided by a key symmetry tool, and the key symmetry tool simulates and generates the activation authentication information, and further, an activation link of the industry card is conducted, so that the activation verification of the industry card can be normally executed.
Optionally, in the test device for an activated link of an industry card provided by the embodiment of the present application, the key symmetry tool is configured to determine whether the first key and the second key are matched, extract test client element information and test industry card information from the first processing result when the first key and the second key are matched, and input the test client element information, the test industry card information and a preset activation result into a preset template to generate test activation authentication information when the extraction is successful, where the preset activation result is activation success or activation failure.
Optionally, in the device for testing an activation link of an industry card provided by the embodiment of the present application, the device further includes: the detection unit is used for detecting whether the nodes in the activated link are transformed or not before each node of the activated link of the industry card performs authentication processing on the test industry card; the triggering unit is used for triggering the testing program of the activated link and executing the step of authenticating the tested industry card through each node of the activated link of the industry card under the condition that any node in the activated link is detected to be transformed.
Optionally, in the test device for an activation link of an industry card provided in the embodiment of the present application, a node in the activation link at least includes a service terminal, a card authentication platform, and a third party industry application, and the first authentication unit 301 includes: the authentication module is used for triggering an industry side function activation program through the service terminal and carrying out card reading authentication on the test industry card through the card authentication platform; the card authentication platform is used for transmitting the test client elements and the test industry card information related to the test industry card to the third party industry application under the condition that the card reading authentication passes; and the second sending module is used for acquiring the first secret key through the third party industry application and sending the first secret key, the test client element and the test industry card information to the secret key symmetry tool.
Optionally, in the test device for an activation link of an industry card provided by the embodiment of the present application, the authentication module includes: the reading sub-module is used for acquiring the information of the test industry card read by the card reader and a first MAC value under the condition that the test industry card is inserted into the card reader, wherein the first MAC value is a value calculated by the test industry card based on the third key and the information of the test industry card; the judging sub-module is used for acquiring a second MAC value calculated by the card reader based on the fourth key and the test industry card information and judging whether the first MAC value and the second MAC value are symmetrical, wherein the third key and the fourth key are symmetrical keys; and the determining submodule is used for determining that the card reading authentication passes under the condition that the first MAC value is symmetrical with the second MAC value.
Optionally, in the test device for an activation link of an industry card provided in the embodiment of the present application, the first authentication unit 301 further includes: the judging module is used for judging whether the test industry card is a card which needs to be activated by the preset industry party according to the test client element and the test industry card information before the first key, the test client element and the test industry card information are sent to the key symmetry tool; and the execution module is used for executing the step of sending the first key, the test client element and the test industry card information to the key symmetry tool under the condition that the test industry card is a card which needs to be activated by a preset industry party.
Optionally, in the device for testing an activation link of an industry card provided by the embodiment of the present application, the device further includes: the second authentication unit is used for performing authentication processing on the target industry card through each node of the activation link of the industry card after the activation link test is determined to be successful under the condition that the activation requirement of the target industry card is received, obtaining a second processing result, and sending the second processing result and a fifth secret key to the industry party, wherein the fifth secret key is generated by a third cipher machine configured with a production certificate; the activation unit is used for receiving activation authentication information fed back by the industry party, acquiring an activation result from the activation authentication information and writing the activation result into a chip of the target industry card, wherein the industry party inquires the activation result from the database based on the processing result under the condition that the fifth key and the sixth key are matched, and generates the activation authentication information according to the activation result, and the sixth key is generated by a fourth cipher machine configured with a production certificate.
The test device for the activation link of the industry card includes a processor and a memory, where the first authentication unit 301, the judging unit 302, the determining unit 303, and the like are stored as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one kernel, and the problem that activation verification of the industry card is difficult to normally execute in a test stage in the related technology is solved by adjusting kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
The embodiment of the application provides a computer readable storage medium, wherein a program is stored on the computer readable storage medium, and the program is executed by a processor to realize the method for testing the activation link of the industry card.
The embodiment of the application provides a processor which is used for running a program, wherein the program runs to execute a testing method of an activation link of an industry card.
Fig. 4 is a schematic diagram of an electronic device according to an embodiment of the present application, as shown in fig. 4, the electronic device 401 includes a processor, a memory, and a program stored on the memory and executable on the processor, and the following steps are implemented when the processor executes the program: performing authentication processing on the test industry card through each node of the activated link of the industry card to obtain a first processing result, and sending the first processing result and a first secret key to a secret key symmetry tool; judging whether test activation authentication information fed back by a key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key is matched with a second key to obtain the test activation authentication information; and under the condition that the test activation authentication information is received, determining that the active link test is successful, and under the condition that the test activation authentication information is not received, determining that the active link test is failed. The device herein may be a server, PC, PAD, cell phone, etc.
The application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with the method steps of: performing authentication processing on the test industry card through each node of the activated link of the industry card to obtain a first processing result, and sending the first processing result and a first secret key to a secret key symmetry tool; judging whether test activation authentication information fed back by a key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on a first processing result under the condition that a first key is matched with a second key to obtain the test activation authentication information; and under the condition that the test activation authentication information is received, determining that the active link test is successful, and under the condition that the test activation authentication information is not received, determining that the active link test is failed.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (10)

1. A method for testing an active link of an industry card, the method comprising:
performing authentication processing on the test industry card through each node of an activated link of the industry card to obtain a first processing result, and sending the first processing result and a first key to a key symmetry tool, wherein the first key is generated by a first cipher machine configured with a test certificate;
judging whether test activation authentication information fed back by the key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on the first processing result under the condition that the first key is matched with a second key, and obtains the test activation authentication information, and the second key is generated by a second cryptographic machine configured with the test certificate;
and under the condition that the test activation authentication information is received, determining that the active link test is successful, and under the condition that the test activation authentication information is not received, determining that the active link test is failed.
2. The method according to claim 1, wherein the key symmetry tool is configured to determine whether the first key and the second key match, extract test customer element information and test industry card information from the first processing result if the first key and the second key match, and input the test customer element information, the test industry card information and a preset activation result into a preset template to generate the test activation authentication information if the extraction is successful, where the preset activation result is activation success or activation failure.
3. The method of claim 1, wherein prior to authenticating the test industry card by each node of the industry card's active link, the method further comprises:
detecting whether the node in the active link is reformed or not;
and under the condition that any node in the activated link is detected to be transformed, triggering a test program of the activated link, and executing the step of authenticating the test industry card by each node of the activated link passing through the industry card.
4. The method of claim 1, wherein the nodes in the activation link at least include a business terminal, a card authentication platform, and a third party industry application, wherein authenticating the test industry card through each node of the activation link of the industry card to obtain a first processing result, and wherein sending the first processing result and the first key to the key symmetry tool comprises:
triggering an industry application activation function of the industry card through the service terminal, and performing card reading authentication on the test industry card through the card authentication platform;
under the condition that card reading authentication is passed, the card authentication platform sends the test client elements and the test industry card information associated with the test industry card to the third party industry application;
The third party industry application obtains the first key and sends the first key, the test client element and the test industry card information to the key symmetry tool.
5. The method of claim 4, wherein card reading authentication of the test industry card by the card authentication platform comprises:
under the condition that the test industry card is inserted into a card reader, acquiring the test industry card information and a first MAC value read by the card reader, wherein the first MAC value is a value calculated by the test industry card based on a third key and the test industry card information;
acquiring a second MAC value calculated by the card reader based on a fourth key and the test industry card information, and judging whether the first MAC value and the second MAC value are symmetrical, wherein the third key and the fourth key are symmetrical keys;
and under the condition that the first MAC value is symmetrical to the second MAC value, determining that the card reading authentication passes.
6. The method of claim 4, wherein prior to sending the first key, the test customer element, and the test industry card information to the key symmetry tool, the method further comprises:
The industry side application judges whether the test industry card is a card which needs to be activated by the preset industry side according to the test client element and the test industry card information;
and in the case that the test industry card is a card that the preset industry party needs to activate, performing the step of sending the first key, the test client element and the test industry card information to the key symmetry tool.
7. The method of claim 1, wherein after determining that the active link test was successful, the method further comprises:
under the condition that the activation requirement of a target industry card is received, performing authentication processing on the target industry card through each node of an activation link of the industry card to obtain a second processing result, and sending the second processing result and a fifth secret key to an industry party, wherein the fifth secret key is generated by a third crypto machine configured with a production certificate;
and receiving activation authentication information fed back by the industry party, acquiring an activation result from the activation authentication information, and writing the activation result into a chip of the target industry card, wherein the industry party inquires the activation result from a database based on the processing result under the condition that the fifth key and the sixth key are matched, and generates the activation authentication information according to the activation result, and the sixth key is generated by a fourth cryptographic machine configured with the production certificate.
8. An apparatus for testing an active link of an industry card, the apparatus comprising:
the first authentication unit is used for performing authentication processing on the test industry card through each node of the activation link of the industry card to obtain a first processing result, and sending the first processing result and a first secret key to the secret key symmetry tool, wherein the first secret key is generated by a first crypto machine configured with a test certificate;
the judging unit is used for judging whether test activation authentication information fed back by the key symmetry tool is received or not, wherein the key symmetry tool simulates activation authentication information of a preset industry party based on the first processing result under the condition that the first key is matched with a second key, and obtains the test activation authentication information, and the second key is generated by a second cipher machine configured with the test certificate;
and the determining unit is used for determining that the active link test is successful under the condition that the test activation authentication information is received, and determining that the active link test fails under the condition that the test activation authentication information is not received.
9. A computer storage medium for storing a program, wherein the program when run controls a device in which the computer storage medium is located to perform the method of testing an activation link of an industry card according to any one of claims 1 to 7.
10. An electronic device comprising one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of testing an activation link of an industry card of any of claims 1-7.
CN202310980980.5A 2023-08-04 2023-08-04 Method and device for testing activation link of industry card and electronic equipment Pending CN117014152A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310980980.5A CN117014152A (en) 2023-08-04 2023-08-04 Method and device for testing activation link of industry card and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310980980.5A CN117014152A (en) 2023-08-04 2023-08-04 Method and device for testing activation link of industry card and electronic equipment

Publications (1)

Publication Number Publication Date
CN117014152A true CN117014152A (en) 2023-11-07

Family

ID=88561478

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310980980.5A Pending CN117014152A (en) 2023-08-04 2023-08-04 Method and device for testing activation link of industry card and electronic equipment

Country Status (1)

Country Link
CN (1) CN117014152A (en)

Similar Documents

Publication Publication Date Title
US10977162B2 (en) Real time application error identification and mitigation
CN113468602A (en) Data inspection method, device and equipment
KR20180113229A (en) Loan service providing method using black chain and system performing the same
CN112200569B (en) Digital seal using method and device based on block chain and electronic equipment
JP2017514218A (en) Running third-party applications
US9558097B2 (en) Automated recording and playback of application interactions
CN109871312B (en) Interface testing method, device, equipment and readable storage medium
CN110032846B (en) Identity data anti-misuse method and device and electronic equipment
CN108718337A (en) Website account login, verification, verification information processing method, apparatus and system
CN111090581A (en) Intelligent contract testing method and device, computer equipment and storage medium
CN107454041B (en) Method and device for preventing server from being attacked
CN115296794A (en) Key management method and device based on block chain
CN110021291B (en) Method and device for calling voice synthesis file
KR102160379B1 (en) Testing method for decentralized application based on blockchain and testing apparatus
CN116451280A (en) Asset management method and device based on blockchain
KR101737559B1 (en) Apparatus and method for generating identification information for replacing account number, and computer program for the same
CN117014152A (en) Method and device for testing activation link of industry card and electronic equipment
CN114925405A (en) Block chain-based digital seal verification method and device and electronic equipment
CN113886894A (en) Digital signature method and digital signature device
Ouerdi et al. Security vulnerabilities tests generation from SysML and Event-B models for EMV cards
CN106533685A (en) Identity authentication method, identity authentication device, and identity authentication system
CN111027992A (en) Asset transaction method and device based on blockchain system and hardware equipment
CN112699023B (en) Project interface testing method and device, computer equipment and storage medium
CN113485905B (en) Test method, device, equipment and computer storage medium in data transaction
CN116522396A (en) Data desensitization method and device, processor and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination