WO2017129008A1 - 基于Linux系统金融自助设备的应用认证方法和装置 - Google Patents

基于Linux系统金融自助设备的应用认证方法和装置 Download PDF

Info

Publication number
WO2017129008A1
WO2017129008A1 PCT/CN2017/071497 CN2017071497W WO2017129008A1 WO 2017129008 A1 WO2017129008 A1 WO 2017129008A1 CN 2017071497 W CN2017071497 W CN 2017071497W WO 2017129008 A1 WO2017129008 A1 WO 2017129008A1
Authority
WO
WIPO (PCT)
Prior art keywords
trust
application
layer application
upper layer
module
Prior art date
Application number
PCT/CN2017/071497
Other languages
English (en)
French (fr)
Inventor
章烈剽
梁添才
刘道余
徐俊
龚文川
Original Assignee
广州广电运通金融电子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州广电运通金融电子股份有限公司 filed Critical 广州广电运通金融电子股份有限公司
Publication of WO2017129008A1 publication Critical patent/WO2017129008A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/206Software aspects at ATMs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking
    • G06Q20/1085Remote banking, e.g. home banking involving automatic teller machines [ATMs]

Definitions

  • the invention relates to the field of financial self-service devices, and in particular to an application authentication method and device based on a Linux system financial self-service device.
  • self-service equipment also known as ATM
  • banking retail business In recent years, banks have gradually changed their business philosophy. Based on the traditional deposit and loan business, they have vigorously developed various value-added services and intermediate services.
  • the demand for self-service equipment has been increasing, the functions of self-service equipment have been continuously expanded, and the frequency and volume of self-service equipment have been used. It has reached a height that history has never had before.
  • CENXFS European Standardization Committee/Financial Development Service
  • CENXFS European Standardization Committee/Financial Development Service
  • the CENXFS standard provides a set of interface specifications for driving financial devices. As long as the software driver of any vendor's own hardware conforms to this set of specifications, its hardware can be seamlessly connected to other ATMs that also conform to this set of specifications, without Need to make any software changes.
  • the CENXFS standard stipulates that the self-service device application must invoke a unified application interface (API).
  • API application interface
  • the ATM hardware manufacturer must provide a unified device driver interface (SPI).
  • SPI unified device driver interface
  • the XFS MANAGER provided by CENXFS is used. Interaction. The XFS MANAGER finds the corresponding device driver by querying the configuration file, and converts the API interface command data invoked by the application into the corresponding SPI interface data, and forwards it to the specified device driver for processing.
  • the No. 39 document of the China Banking Regulatory Commission required that two quantitative indicators be included in the 2015 annual assessment of each bank. That is: from 2015, the application of safe and controllable information technology by banking financial institutions will increase by no less than 15% year by year until the total proportion of not less than 75% in 2019 (the technology applied in 2014) And products can be included in the 2015 calculations; from 2015, banking financial institutions should arrange an annual information budget of no less than 5%, specifically designed to support the organization's forward-looking, innovative and planning around security and controllable information systems. Sex research supports the organization's core knowledge and skills in information technology.
  • China's independent controllable operating system is basically based on the open source Linux operating system for secondary development.
  • various financial self-service equipment manufacturers are currently developing XFS MANAGER based on the Linux operating system with reference to the CENXFS standard.
  • the embodiment of the invention provides an application authentication method and device based on a Linux system financial self-service device, and a financial self-service device, which can solve the existing application authentication method that the Linux system financial self-service device does not join the calling service, and has a cash security risk. problem.
  • the trust ID of the upper application is obtained, determining whether the trust ID is in a preset trust list, and if yes, allowing the upper application to invoke the device interface; if not, disabling the upper application Calling the device interface;
  • the trust ID of the upper application is obtained in advance by the following steps:
  • the prohibiting the upper layer application from invoking the device interface specifically includes:
  • the trust ID of the upper application is not obtained, determining whether the trust list is full, and if yes, prohibiting the upper application from calling the device interface, and if not, adding a trust ID to the upper application;
  • the adding the trust ID to the upper layer application specifically includes:
  • the number of trust IDs stored in the trust list is preset by an administrator having authority.
  • the method further includes:
  • the processing results of the analysis processing include:
  • the trust ID of the upper-layer application is added to the trust list, and if the upper-layer application does not have a trust ID, a trust ID is generated for the upper-layer application. Adding the generated trust ID to the trust list;
  • the program information of the upper layer application is added to the blacklist of the background server.
  • it also includes:
  • the trust ID and the software version number of the upper application are combined into standard interface parameters
  • the device interface on the MANAGER module extracts the trust ID and the software version number of the upper layer application on the XFS MANAGER module, and provides services for the upper layer application.
  • the generating a random number is specifically: generating a random number by using the current time as a random seed.
  • a trust ID obtaining module configured to acquire a trust ID of the upper layer application when the upper layer application requests to invoke the device interface
  • a first forbidding module configured to: if the trust ID obtaining module does not obtain the trust ID of the upper layer application, prohibiting the upper layer application from calling the device interface;
  • a determining module configured to determine, if the trust ID obtaining module obtains a trust ID of the upper layer application, whether the trust ID is in a preset trust list;
  • a first enabling module configured to allow the upper layer application to invoke a device interface when the determining result of the determining module is YES;
  • a second prohibiting module configured to prohibit the upper layer application from invoking a device interface when the determining result of the determining module is negative;
  • the trust ID of the upper application is obtained in advance by the following modules:
  • a first random number module configured to generate a random number
  • a trust adding module configured to add the generated random number to the trust list
  • a trust ID returning module configured to return the random number to the upper layer application as a trust ID of the upper layer application.
  • the first forbidden module specifically includes:
  • a list status determining unit configured to determine whether the trust list is full if the trust ID of the upper application is not obtained
  • a prohibiting unit configured to prohibit the upper layer application from calling the device interface when the determination result of the list state determining unit is YES;
  • a trust ID adding unit configured to add a trust ID to the upper layer application when the determination result of the list state determining unit is negative;
  • the trust ID adding unit specifically includes:
  • a random number generating subunit configured to generate a random number when the determination result of the list state determining unit is negative
  • a trust ID returning subunit configured to return the random number to the upper layer application as a trust ID of the upper layer application
  • the number of trust IDs stored in the trust list is preset by an administrator having authority.
  • it also includes:
  • An alarm information generating module configured to generate, by the first prohibiting module or the second prohibiting module, alarm information according to program information of the upper layer application after the upper layer application is prohibited from calling the device interface;
  • An alarm information sending module configured to send the alarm information to a background server for analysis and processing
  • the processing results of the analysis processing include:
  • the trust ID of the upper-layer application is added to the trust list, and if the upper-layer application does not have a trust ID, a trust ID is generated for the upper-layer application. Adding the generated trust ID to the trust list;
  • the program information of the upper layer application is added to the blacklist of the background server.
  • it also includes:
  • An interface parameter combination module configured to combine the trust ID and the software version number of the upper application into a standard interface parameter when the upper application invokes the device interface
  • a parameter passing module configured to transfer the standard interface parameter to the XFS MANAGER module, so that the device interface connected to the XFS MANAGER module extracts the trust ID and the software version number of the upper application on the XFS MANAGER module , And provide services for the upper application.
  • the financial self-service device provided by the embodiment of the invention includes the above-mentioned application authentication device based on the Linux system financial self-service device.
  • the trust ID of the upper layer application is obtained; if the trust ID of the upper layer application is not obtained, the upper layer application is prohibited from invoking the device interface; If the trust ID of the upper application is obtained, determining whether the trust ID is in a preset trust list, and if yes, allowing the upper application to invoke the device interface; if not, disabling the upper application Call the device interface.
  • the upper layer application when the upper layer application requests to invoke the device interface, the upper layer application is authenticated by the trust ID, and if the trust ID exists and is in the preset trust list, the upper application is considered as Legal, otherwise illegal, thus avoiding illegal programs calling device interfaces, reducing the risk of cash transaction security and reducing the possibility of financial disputes.
  • FIG. 1 is a flowchart of an embodiment of an application authentication method based on a Linux system financial self-service device according to an embodiment of the present invention
  • FIG. 2 is a flowchart of another embodiment of an application authentication method based on a Linux system financial self-service device according to an embodiment of the present invention
  • FIG. 3 is a structural diagram of an embodiment of an application authentication apparatus based on a Linux system financial self-service device according to an embodiment of the present invention
  • FIG. 4 is a structural diagram of another embodiment of an application authentication apparatus based on a Linux system financial self-service device according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a prior art financial self-service device system application.
  • the embodiment of the invention provides an application authentication method and device based on a Linux system financial self-service device, which is used for solving an existing application authenticator that does not join the calling service based on the Linux system financial self-service device. Law, there is a problem of cash security risks.
  • an embodiment of an application authentication method based on a Linux system financial self-service device in an embodiment of the present invention includes:
  • the trust ID of the upper application can be obtained.
  • the trust ID of the upper application is obtained in advance by the following steps:
  • the upper application may be prohibited from calling the device interface.
  • step 104 if the trust ID of the upper application is obtained, it is determined whether the trust ID is in the preset trust list, and if so, step 104 is performed; if not, step 105 is performed;
  • step 104 it may be determined whether the trust ID is in the preset trust list, and if yes, step 104 is performed; if not, step 105 is performed.
  • the upper layer application can be allowed to invoke the device interface.
  • the upper layer application is prohibited from calling the device interface.
  • the upper application call can be disabled. Device interface.
  • the trust ID of the upper layer application is obtained; if the trust ID of the upper layer application is not obtained, the upper layer application is prohibited from invoking the device interface;
  • the trust ID of the upper application determines whether the trust ID is in the preset trust list, and if so, allows the upper application to invoke the device interface; if not, the upper application is prohibited from invoking the device interface.
  • the upper layer application is authenticated by the trust ID. If the trust ID exists and is in the preset trust list, the upper application is considered to be legal, otherwise It is illegal, thus avoiding illegal programs calling device interfaces, reducing the risk of cash transaction security and reducing the possibility of financial disputes.
  • an application authentication method based on the Linux system financial self-service device in the embodiment of the present invention is described in detail below.
  • an application authentication method based on the Linux system financial self-service device is additionally provided in the embodiment of the present invention.
  • One embodiment includes:
  • the trust ID of the upper layer application can be obtained.
  • the trust ID of the upper application may be obtained in advance by the following steps:
  • the attribute information of the upper application can be obtained first, and then the trust ID is extracted in the attribute information.
  • the attribute information of the upper application includes the file name, software version number, and unique of the software file of the upper application. The above trust ID.
  • step 203 is performed, and if not, step 204 is performed;
  • step 203 it is determined whether the trust list is full. If yes, step 203 is performed, and if no, step 204 is performed. Understandably, before the financial self-service device is used for the first time, it needs to be configured for the upper-layer application (it can also be Factory configuration). At this time, the administrator with authority can set the number of trust IDs in the trust list to the number of upper-layer applications to be configured. If it is X, the administrator can add X upper-layer applications to the trust list. Trust ID. After the configuration of the X upper-layer applications is completed, the trust list is just full, and the administrator encrypts the files of the trust list, thereby denying external modification access. Therefore, after the first configuration of the financial self-service device is completed (or after the factory configuration), the illegal molecule cannot expand the capacity of the trust list to add the trust ID of the illegal program to the trust list, thereby ensuring the security list of the trust list.
  • the upper layer application is prohibited from invoking a device interface.
  • the trust list When the trust list is full, it means that the administrator who is not the authority is configuring the upper application, so the upper application can be prohibited from calling the device interface.
  • the trust list When the trust list is not full, it indicates that the administrator with authority has configured the upper application, so the step of generating the trust ID for the upper application can be performed, and a random number is first generated.
  • the random time can be randomly generated by the random function of the Linux system with the C library with the current time as a random seed.
  • the generated random number can be added to the trust list.
  • the process returns to step 204 again. Get a new random number again, and then add the new random number to the trust list until the random number in the added trust list is different from any of the trust IDs.
  • the embodiment does not limit the order between the steps 202, 204, and 205.
  • the husband becomes a random number, and the random number is added to the trust list to determine the Whether the trust list is full, and if so, the upper layer application is prohibited from invoking the device interface. If not, the random number is successfully added to the trust list, and then step 206 is performed.
  • the random number can be returned to the upper
  • the layer application acts as the trust ID for the upper application.
  • the trust ID can be returned to the XFS MANAGER module, and then returned to the upper application through the called output parameter, so that the upper application obtains the assigned unique trust ID.
  • the upper layer application can be allowed to invoke the device interface.
  • step 208 is performed; if not, step 209 is performed;
  • step 201 it is determined whether the trust ID is in the preset trust list. If yes, step 208 is performed; if not, step 209 is performed. It can be understood that the illegal molecule may attempt to pass the application authentication by means of forging the trust ID. At this time, although the trust ID of the upper application can be obtained, the trust ID is forged, and therefore is not in the trust list, so if If it is determined that the trust ID is not in the trust list, step 209 is performed, otherwise step 208 is performed.
  • the upper layer application When the trust ID of the upper layer application is obtained and the trust ID is in the preset trust list, the upper layer application may be considered to be legal. By applying the authentication, the upper layer application may be allowed to invoke the device interface.
  • the upper layer application calling device interface specifically includes: when the upper layer application invokes the device interface, combining the trust ID and the software version number of the upper application into standard interface parameters; and transmitting the standard interface parameter to the XFS MANAGER module
  • the device interface connected to the XFS MANAGER module extracts the trust ID and the software version number of the upper layer application on the XFS MANAGER module, and provides services for the upper layer application.
  • the upper layer application is prohibited from invoking a device interface.
  • the upper layer application may be considered illegal, and the upper layer application is prohibited from calling the device interface.
  • the alarm information may be generated according to the program information of the upper application, and the alarm information may include a file name and a software version of the software file of the upper application. Number, or trust ID, etc.
  • the alarm information may be sent to the background server for analysis processing, and the analysis processing may be manually verified by the background staff, or may be automatically verified by the background server.
  • the processing result of the analysis processing includes:
  • the trust ID of the upper layer application is added to the trust list, and if the upper layer application does not have the trust ID, the generated trust is generated after the trust application ID is generated for the upper layer application. ID joins the trust list;
  • the program information of the upper layer application is added to the blacklist of the background server.
  • An embodiment of an application authentication device for a system financial self-service device includes:
  • the trust ID obtaining module 301 is configured to acquire a trust ID of the upper layer application when the upper layer application requests to invoke the device interface;
  • the first prohibiting module 302 is configured to prohibit the upper layer application from invoking the device interface if the trust ID obtaining module 301 does not obtain the trust ID of the upper layer application;
  • the determining module 303 is configured to determine, if the trust ID obtaining module 301 obtains the trust ID of the upper layer application, whether the trust ID is in a preset trust list;
  • the first permission module 304 is configured to allow the upper layer application to invoke the device interface when the determination result of the determining module 303 is YES;
  • the second prohibiting module 305 is configured to, when the determining result of the determining module 303 is negative, prohibit the upper layer application from calling the device interface;
  • the trust ID of the upper application is obtained in advance by the following modules:
  • a trust adding module 307 configured to add the generated random number to the trust list
  • the trust ID returning module 308 is configured to return the random number to the upper layer application as the trust ID of the upper layer application.
  • the trust ID obtaining module 301 acquires the trust ID of the upper layer application; if the trust ID obtaining module 301 does not obtain the trust ID of the upper layer application, The first prohibiting module 302 prohibits the upper layer application from invoking the device interface; if the trust ID obtaining module 301 obtains the trust ID of the upper layer application, the determining module 303 determines whether the trust ID is in the preset trust list; When the determination result of the determination module 303 is YES, the first permission module 304 allows the upper layer application to invoke the device interface; when the determination result of the determination module 303 is negative, the second prohibition module 305 prohibits the upper layer application from invoking the device interface;
  • the trust ID of the upper layer application is obtained in advance by the following module: a first random number module 306 is configured to generate a random number; a trust adding module 307 is configured to add the generated random number to the trust list; The module 308 is configured to return the random number to the upper layer application as
  • the upper layer application when the upper layer application requests to invoke the device interface, the upper layer application is authenticated by the trust ID. If the trust ID exists and is in the preset trust list, the upper application is considered to be legal, otherwise It is illegal, thus avoiding illegal programs calling device interfaces, reducing the risk of cash transaction security and reducing the possibility of financial disputes.
  • an application authentication device based on the Linux system financial self-service device in the embodiment of the present invention is described in detail below.
  • an application authentication device based on the Linux system financial self-service device is additionally provided in the embodiment of the present invention.
  • One embodiment includes:
  • the trust ID obtaining module 401 is configured to obtain a trust ID of the upper layer application when the upper layer application requests to invoke the device interface;
  • the first prohibiting module 402 is configured to prohibit the upper layer application from invoking the device interface if the trust ID obtaining module 401 does not obtain the trust ID of the upper layer application;
  • the determining module 403 is configured to determine, if the trust ID obtaining module 401 obtains the trust ID of the upper layer application, whether the trust ID is in a preset trust list;
  • the first permission module 404 is configured to allow the upper layer application to invoke the device interface when the determination result of the determining module 403 is YES;
  • the second prohibiting module 405 is configured to, when the determining result of the determining module 403 is negative, prohibit the upper layer application from calling the device interface;
  • the trust ID of the upper application is obtained in advance by the following modules:
  • a trust adding module 407 configured to add the generated random number to the trust list
  • the trust ID returning module 408 is configured to return the random number to the upper layer application as the trust ID of the upper layer application.
  • the first prohibiting module 402 in this embodiment may specifically include:
  • the list status determining unit 4021 is configured to determine whether the trust list is full if the trust ID of the upper layer application is not obtained;
  • the prohibiting unit 4022 is configured to, when the determination result of the list state determining unit 4021 is YES, prohibit the upper layer application from calling the device interface;
  • a trust ID adding unit 4023 configured to add a trust ID to the upper layer application when the determination result of the list state determining unit 4021 is negative;
  • the trust ID adding unit 4023 may specifically include:
  • a random number generating sub-unit 0231 configured to generate a random number when the determination result of the list state determining unit 4021 is negative;
  • the trust ID returns to the subunit 0233, and is configured to return the random number to the upper layer application as the trust ID of the upper layer application;
  • the number of trust IDs stored in the trust list is set by the administrator with authority.
  • the alarm information generating module 409 is configured to: after the prohibiting the upper layer application from calling the device interface, generating the alarm information according to the program information of the upper layer application;
  • the alarm information sending module 410 is configured to send the alarm information to the background server for analysis and processing;
  • the processing results of the analysis processing include:
  • the trust ID of the upper layer application is added to the trust list, and if the upper layer application does not have the trust ID, the generated trust is generated after the trust application ID is generated for the upper layer application. ID joins the trust list;
  • the program information of the upper layer application is added to the blacklist of the background server.
  • the interface parameter combination module 411 is configured to combine the trust ID and the software version number of the upper layer application into standard interface parameters when the upper layer application invokes the device interface;
  • a parameter passing module 412 configured to pass the standard interface parameter to the XFS MANAGER module, so that the device interface connected to the XFS MANAGER module extracts the trust ID and the software version number of the upper application on the XFS MANAGER module, and This upper layer application provides services.
  • the present invention also provides a financial self-service device, which includes an application authentication device based on a Linux system financial self-service device as described in the corresponding embodiment of FIG. 3 or FIG. 4.
  • the application authentication method and device based on the Linux system financial self-service device and the financial self-service device can send the attribute information of the upper application to the application authentication method function module to perform application authentication.
  • the application authentication result is legal
  • the upper layer application provides a calling service. If it is illegal, it is uploaded to the server through an efficient linkage alarm system, and the bank staff is notified in time to have a security threat, so as to timely deal with the processing.
  • the inherent security of the XFS MANAGER module is enhanced, and the possibility that the XFS MANAGER module itself is damaged by malicious code is reduced, thereby further improving the security protection capability of the financial system.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明实施例公开了基于Linux系统金融自助设备的应用认证方法,用于解决现有基于Linux系统金融自助设备未加入调用服务的应用认证方法,存在现金安全隐患的问题。本发明实施例方法包括:当上层应用程序请求调用设备接口时,获取所述上层应用程序的信任ID;若未获取到所述上层应用程序的信任ID,则禁止所述上层应用程序调用设备接口;若获取到所述上层应用程序的信任ID,则判断所述信任ID是否在预设的信任列表中,若是,则允许所述上层应用程序调用设备接口;若否,则禁止所述上层应用程序调用设备接口;本发明实施例还提供基于Linux系统金融自助设备的应用认证装置以及一种金融自助设备。

Description

基于Linux系统金融自助设备的应用认证方法和装置
本申请要求于2016年01月29日提交中国专利局、申请号为201610066318.9、发明名称为“基于Linux系统金融自助设备的应用认证方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及金融自助设备领域,尤其涉及基于Linux系统金融自助设备的应用认证方法和装置。
背景技术
金融IT技术的发展使得自助设备(也简称ATM)成为银行零售业务的重要渠道之一。近年来银行逐渐转变了经营理念,在传统的存贷业务基础上大力发展各种增值业务、中间业务,自助设备的需求不断增加、自助设备的功能不断扩充、自助设备的使用频率和交易量均达到了历史从未有过的高度。
CENXFS(欧洲标准化委员会/金融拓展服务)标准作为国际上通用的金融自助设备的标准,近年来在国内被越来越多的银行机构采用,特别是自助终端统一平台和网点服务智能监控管理系统都基于该标准开发,对广大的自助系统集成商提出了较高的要求。CENXFS标准提供了驱动金融设备的一套接口规范,只要任何一个厂商自己硬件的软件驱动程序符合这套规范,那么它的硬件就可以无缝连接到其他同样符合这套规范的ATM上,而不需要做任何的软件改动。
如图5所示,CENXFS标准规定自助设备应用必须调用统一的应用接口(简称API),要求ATM硬件厂商必须提供统一的设备驱动接口(简称SPI),两者之间通过CENXFS提供的XFS MANAGER进行交互。XFS MANAGER通过查询配置文件查找到对应的设备驱动,并将应用调用的API接口命令数据转换成对应SPI接口数据,转发给指定的设备驱动程序进行处理。
同时,银监会39号文要求,两个量化指标纳入各行2015年年度考核, 即:从2015年起,各银行业金融机构对安全可控信息技术的应用以不低于15%的比例逐年增加,直至2019年达到不低于75%的总体占比(2014年应用的技术和产品可纳入2015年度计算);2015年起,银行业金融机构应安排不低于5%的年度信息化预算,专门用于支持本机构围绕安全可控信息系统开展前瞻性、创新性和规划性研究,支持本机构掌握信息化核心知识和技能。
而目前我国自主可控操作系统基本上都是基于开源的Linux操作系统进行二次开发的。基于以上二个背景,目前各个金融自助设备厂家都在基于Linux操作系统上参照CENXFS标准来开发XFS MANAGER。
然而,这种方式由于未加入调用服务的应用认证方法和装置,任何程序调用CENXFS定义的接口就可以直接驱动设备,部分设备是与现金直接相关(如存取款模块),对现金安全造成威胁,容易引起账务纠纷。
发明内容
本发明实施例提供了基于Linux系统金融自助设备的应用认证方法和装置,以及一种金融自助设备,能够解决现有基于Linux系统金融自助设备未加入调用服务的应用认证方法,存在现金安全隐患的问题。
本发明实施例提供的一种基于Linux系统金融自助设备的应用认证方法,包括:
当上层应用程序请求调用设备接口时,获取所述上层应用程序的信任ID;
若未获取到所述上层应用程序的信任ID,则禁止所述上层应用程序调用设备接口;
若获取到所述上层应用程序的信任ID,则判断所述信任ID是否在预设的信任列表中,若是,则允许所述上层应用程序调用设备接口;若否,则禁止所述上层应用程序调用设备接口;
所述上层应用程序的信任ID由以下步骤预先得到:
生成一随机数;
将生成的所述随机数加入所述信任列表;
返回所述随机数至所述上层应用程序作为所述上层应用程序的信任ID。
可选地,若未获取到所述上层应用程序的信任ID,则禁止所述上层应用程序调用设备接口具体包括:
若未获取到所述上层应用程序的信任ID,则判断所述信任列表是否已满,若是,则禁止所述上层应用程序调用设备接口,若否,则为所述上层应用程序添加信任ID;
所述为所述上层应用程序添加信任ID具体包括:
生成一随机数;
将生成的所述随机数加入所述信任列表;
返回所述随机数至所述上层应用程序作为所述上层应用程序的信任ID;
所述信任列表中存放信任ID的个数由具备权限的管理员预先设定。
可选地,禁止所述上层应用程序调用设备接口之后还包括:
根据所述上层应用程序的程序信息生成报警信息;
发送所述报警信息至后台服务器进行分析处理;
所述分析处理的处理结果包括:
若处理结果为信任所述上层应用程序,则将所述上层应用程序的信任ID加入所述信任列表,若所述上层应用程序不存在信任ID,则为所述上层应用程序生成一信任ID后再将生成的信任ID加入所述信任列表;
若处理结果为不信任所述上层应用程序,则将所述上层应用程序的程序信息加入所述后台服务器的黑名单中。
可选地,还包括:
当所述上层应用程序调用设备接口时,将所述上层应用程序的信任ID以及软件版本号组合成标准接口参数;
传递所述标准接口参数至XFS MANAGER模块,使得连接在所述XFS  MANAGER模块上的设备接口在所述XFS MANAGER模块上提取到所述上层应用程序的信任ID以及软件版本号,并为所述上层应用程序提供服务。
可选地,所述生成一随机数具体为:以当前时间为随机种子生成一随机数。
本发明实施例提供的一种基于Linux系统金融自助设备的应用认证装置,包括:
信任ID获取模块,用于当上层应用程序请求调用设备接口时,获取所述上层应用程序的信任ID;
第一禁止模块,用于若所述信任ID获取模块未获取到所述上层应用程序的信任ID,则禁止所述上层应用程序调用设备接口;
判断模块,用于若所述信任ID获取模块获取到所述上层应用程序的信任ID,则判断所述信任ID是否在预设的信任列表中;
第一允许模块,用于当所述判断模块的判断结果为是时,允许所述上层应用程序调用设备接口;
第二禁止模块,用于当所述判断模块的判断结果为否时,禁止所述上层应用程序调用设备接口;
所述上层应用程序的信任ID由以下模块预先得到:
第一随机数模块,用于生成一随机数;
信任添加模块,用于将生成的所述随机数加入所述信任列表;
信任ID返回模块,用于返回所述随机数至所述上层应用程序作为所述上层应用程序的信任ID。
可选地,所述第一禁止模块具体包括:
列表状态判断单元,用于若未获取到所述上层应用程序的信任ID,则判断所述信任列表是否已满;
禁止单元,用于当所述列表状态判断单元的判断结果为是时,禁止所述上层应用程序调用设备接口;
信任ID添加单元,用于当所述列表状态判断单元的判断结果为否时,则为所述上层应用程序添加信任ID;
所述信任ID添加单元具体包括:
随机数生成子单元,用于当所述列表状态判断单元的判断结果为否时,生成一随机数;
加入列表子单元,用于将生成的所述随机数加入所述信任列表;
信任ID返回子单元,用于返回所述随机数至所述上层应用程序作为所述上层应用程序的信任ID;
所述信任列表中存放信任ID的个数由具备权限的管理员预先设定。
可选地,还包括:
报警信息生成模块,用于所述第一禁止模块或第二禁止模块在禁止所述上层应用程序调用设备接口之后,根据所述上层应用程序的程序信息生成报警信息;
报警信息发送模块,用于发送所述报警信息至后台服务器进行分析处理;
所述分析处理的处理结果包括:
若处理结果为信任所述上层应用程序,则将所述上层应用程序的信任ID加入所述信任列表,若所述上层应用程序不存在信任ID,则为所述上层应用程序生成一信任ID后再将生成的信任ID加入所述信任列表;
若处理结果为不信任所述上层应用程序,则将所述上层应用程序的程序信息加入所述后台服务器的黑名单中。
可选地,还包括:
接口参数组合模块,用于当所述上层应用程序调用设备接口时,将所述上层应用程序的信任ID以及软件版本号组合成标准接口参数;
参数传递模块,用于传递所述标准接口参数至XFS MANAGER模块,使得连接在所述XFS MANAGER模块上的设备接口在所述XFS MANAGER模块上提取到所述上层应用程序的信任ID以及软件版本号, 并为所述上层应用程序提供服务。
本发明实施例提供的一种金融自助设备,所述金融自助设备包括上述的基于Linux系统金融自助设备的应用认证装置。
从以上技术方案可以看出,本发明实施例具有以下优点:
本发明实施例中,首先,当上层应用程序请求调用设备接口时,获取上层应用程序的信任ID;若未获取到所述上层应用程序的信任ID,则禁止所述上层应用程序调用设备接口;若获取到所述上层应用程序的信任ID,则判断所述信任ID是否在预设的信任列表中,若是,则允许所述上层应用程序调用设备接口;若否,则禁止所述上层应用程序调用设备接口。在本发明实施例中,当上层应用程序请求调用设备接口时,通过信任ID认证所述上层应用程序是否合法,若该信任ID存在并且在预设的信任列表内,则认为所述上层应用程序合法,否则为不合法,从而避免非法程序调用设备接口,降低了现金交易安全风险,减少了财务纠纷的可能性。
附图说明
图1为本发明实施例中基于Linux系统金融自助设备的应用认证方法一个实施例流程图;
图2为本发明实施例中基于Linux系统金融自助设备的应用认证方法另一个实施例流程图;
图3为本发明实施例中基于Linux系统金融自助设备的应用认证装置一个实施例结构图;
图4为本发明实施例中基于Linux系统金融自助设备的应用认证装置另一个实施例结构图;
图5为现有技术的金融自助设备系统应用的示意图。
具体实施方式
本发明实施例提供了基于Linux系统金融自助设备的应用认证方法和装置,用于解决现有基于Linux系统金融自助设备未加入调用服务的应用认证方 法,存在现金安全隐患的问题。
为使得本发明的发明目的、特征、优点能够更加的明显和易懂,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,下面所描述的实施例仅仅是本发明一部分实施例,而非全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
请参阅图1,本发明实施例中一种基于Linux系统金融自助设备的应用认证方法一个实施例包括:
101、当上层应用程序请求调用设备接口时,获取该上层应用程序的信任ID;
首先,当上层应用程序请求调用设备接口时,可以获取上层应用程序的信任ID。
该上层应用程序的信任ID由以下步骤预先得到:
生成一随机数;
将生成的该随机数加入该信任列表;
返回该随机数至该上层应用程序作为该上层应用程序的信任ID。
102、若未获取到该上层应用程序的信任ID,则禁止该上层应用程序调用设备接口;
若未获取到该上层应用程序的信任ID,则可以禁止该上层应用程序调用设备接口。
103、若获取到该上层应用程序的信任ID,则判断该信任ID是否在预设的信任列表中,若是,则执行步骤104;若否,则执行步骤105;
若获取到该上层应用程序的信任ID,则可以判断该信任ID是否在预设的信任列表中,若是,则执行步骤104;若否,则执行步骤105。
104、允许该上层应用程序调用设备接口;
当该信任ID在预设的信任列表中时,可以允许该上层应用程序调用设备接口。
105、禁止该上层应用程序调用设备接口。
当该信任ID不在预设的信任列表中时,可以禁止该上层应用程序调用 设备接口。
本实施例中,首先,当上层应用程序请求调用设备接口时,获取上层应用程序的信任ID;若未获取到该上层应用程序的信任ID,则禁止该上层应用程序调用设备接口;若获取到该上层应用程序的信任ID,则判断该信任ID是否在预设的信任列表中,若是,则允许该上层应用程序调用设备接口;若否,则禁止该上层应用程序调用设备接口。在本实施例中,当上层应用程序请求调用设备接口时,通过信任ID认证该上层应用程序是否合法,若该信任ID存在并且在预设的信任列表内,则认为该上层应用程序合法,否则为不合法,从而避免非法程序调用设备接口,降低了现金交易安全风险,减少了财务纠纷的可能性。
为便于理解,下面对本发明实施例中的一种基于Linux系统金融自助设备的应用认证方法进行详细描述,请参阅图2,本发明实施例中一种基于Linux系统金融自助设备的应用认证方法另一个实施例包括:
201、当上层应用程序请求调用设备接口时,获取该上层应用程序的信任ID;
当上层应用程序请求调用设备接口时,可以获取该上层应用程序的信任ID。
其中,该上层应用程序的信任ID可以由以下步骤预先得到:
1、生成一随机数;
2、将生成的该随机数加入该信任列表;
3、返回该随机数至该上层应用程序作为该上层应用程序的信任ID。
需要说明的是,可以通过先获取上层应用程序的属性信息,然后在属性信息中提取出信任ID,上层应用程序的属性信息包括上层应用程序的软件文件的文件名称、软件版本号、以及唯一的上述信任ID。
202、若未获取到该上层应用程序的信任ID,则判断该信任列表是否已满,若是,则执行步骤203,若否,则执行步骤204;
若未获取到该上层应用程序的信任ID,则判断该信任列表是否已满,若是,则执行步骤203,若否,则执行步骤204。可以理解的是,在金融自助设备第一次使用之前,需要对其进行上层应用程序的配置(也可以是出 厂配置)。此时,具备权限的管理员可以将信任列表中的信任ID个数设置为需要配置的上层应用程序的个数,假设为X个,则管理员可以往信任列表中添加X个上层应用程序对应的信任ID。在X个上层应用程序配置完成之后,此时信任列表正好已满,管理员将信任列表的文件进行加密处理,从而拒绝外部修改访问。从而,在金融自助设备第一次配置完成之后(或者出厂配置之后),非法分子无法扩充信任列表的容量来将非法程序的信任ID添加到信任列表中,保证了信任列表的安全有效。
203、禁止该上层应用程序调用设备接口;
当信任列表已满时,说明此时并非具备权限的管理员在进行上层应用程序的配置,因此,可以禁止该上层应用程序调用设备接口。
204、生成一随机数;
当信任列表未满时,说明此时为具备权限的管理员在进行上层应用程序的配置,因此,可以进行为上层应用程序生成信任ID的步骤,首先生成一随机数。特别地,可以以当前时间为随机种子,用Linux系统自带C库的随机函数随机生成一随机数。
205、将生成的该随机数加入该信任列表;
在生成一随机数之后,可以将生成的该随机数加入该信任列表。
需要说明的是,在将生成的该随机数加入该信任列表中时,若该随机数与信任列表中已存有的信任ID相同,则为了保证信任ID的唯一性,重新返回执行步骤204,再次得到一个新的随机数,再将该新的随机数加入到信任列表中,直到加入的信任列表中的随机数与其中任何一个信任ID均不相同为止。
另外,本实施例不限定步骤202、204和205之间的顺序,也可以是在未获取到该上层应用程序的信任ID之后,先生成一随机数,在将该随机数加入信任列表时判断该信任列表是否已满,若是,则禁止该上层应用程序调用设备接口,若否,则表明该随机数成功加入到信任列表中,然后执行步骤206。
206、返回该随机数至该上层应用程序作为该上层应用程序的信任ID;
在将生成的该随机数加入该信任列表之后,可以返回该随机数至该上 层应用程序作为该上层应用程序的信任ID。特别地,可以将该信任ID返回给XFS MANAGER模块,然后通过调用的输出参数返回给该上层应用程序,从而使得该上层应用程序获取到分配得到的唯一信任ID。
可以理解的是,在返回该随机数至该上层应用程序作为该上层应用程序的信任ID,则可以允许该上层应用程序调用设备接口。
207、若获取到该上层应用程序的信任ID,则判断该信任ID是否在预设的信任列表中,若是,则执行步骤208;若否,则执行步骤209;
若在步骤201时获取到该上层应用程序的信任ID,则判断该信任ID是否在预设的信任列表中,若是,则执行步骤208;若否,则执行步骤209。可以理解的是,非法分子可能通过伪造信任ID的手段企图通过应用认证,此时,虽然能获取到上层应用程序的信任ID,但是该信任ID是伪造的,因此不在信任列表当中,所以,若判断发现该信任ID不在信任列表中,则执行步骤209,反之执行步骤208。
208、允许该上层应用程序调用设备接口;
当既能获取到该上层应用程序的信任ID并且该信任ID在预设的信任列表中时,则可以认为该上层应用程序合法,通过应用认证,可以允许该上层应用程序调用设备接口。
具体地,该上层应用程序调用设备接口具体包括:当该上层应用程序调用设备接口时,将该上层应用程序的信任ID以及软件版本号组合成标准接口参数;传递该标准接口参数至XFS MANAGER模块,使得连接在该XFS MANAGER模块上的设备接口在该XFS MANAGER模块上提取到该上层应用程序的信任ID以及软件版本号,并为该上层应用程序提供服务。
209、禁止该上层应用程序调用设备接口;
当信任ID不在信任列表中时,可以认为该上层应用程序是非法的,禁止该上层应用程序调用设备接口。
210、根据该上层应用程序的程序信息生成报警信息;
另外,如步骤203或步骤209在禁止该上层应用程序调用设备接口之后,可以根据该上层应用程序的程序信息生成报警信息,该报警信息可以包括该上层应用程序的软件文件的文件名称、软件版本号、或者信任ID等。
211、发送该报警信息至后台服务器进行分析处理。
在根据该上层应用程序的程序信息生成报警信息之后,可以发送该报警信息至后台服务器进行分析处理,该分析处理可以由后台工作人员人工进行核验,也可以由后台服务器自动核验。
其中,该分析处理的处理结果包括:
若处理结果为信任该上层应用程序,则将该上层应用程序的信任ID加入该信任列表,若该上层应用程序不存在信任ID,则为该上层应用程序生成一信任ID后再将生成的信任ID加入该信任列表;
若处理结果为不信任该上层应用程序,则将该上层应用程序的程序信息加入该后台服务器的黑名单中。
上面主要描述了一种基于Linux系统金融自助设备的应用认证方法,下面将对一种基于Linux系统金融自助设备的应用认证装置进行详细描述,请参阅图3,本发明实施例中一种基于Linux系统金融自助设备的应用认证装置一个实施例包括:
信任ID获取模块301,用于当上层应用程序请求调用设备接口时,获取该上层应用程序的信任ID;
第一禁止模块302,用于若该信任ID获取模块301未获取到该上层应用程序的信任ID,则禁止该上层应用程序调用设备接口;
判断模块303,用于若该信任ID获取模块301获取到该上层应用程序的信任ID,则判断该信任ID是否在预设的信任列表中;
第一允许模块304,用于当该判断模块303的判断结果为是时,允许该上层应用程序调用设备接口;
第二禁止模块305,用于当该判断模块303的判断结果为否时,禁止该上层应用程序调用设备接口;
该上层应用程序的信任ID由以下模块预先得到:
第一随机数模块306,用于生成一随机数;
信任添加模块307,用于将生成的该随机数加入该信任列表;
信任ID返回模块308,用于返回该随机数至该上层应用程序作为该上层应用程序的信任ID。
本实施例中,首先,当上层应用程序请求调用设备接口时,信任ID获取模块301获取该上层应用程序的信任ID;若该信任ID获取模块301未获取到该上层应用程序的信任ID,则第一禁止模块302禁止该上层应用程序调用设备接口;若该信任ID获取模块301获取到该上层应用程序的信任ID,则判断模块303判断该信任ID是否在预设的信任列表中;当该判断模块303的判断结果为是时,第一允许模块304允许该上层应用程序调用设备接口;当该判断模块303的判断结果为否时,第二禁止模块305禁止该上层应用程序调用设备接口;其中,该上层应用程序的信任ID由以下模块预先得到:第一随机数模块306,用于生成一随机数;信任添加模块307,用于将生成的该随机数加入该信任列表;信任ID返回模块308,用于返回该随机数至该上层应用程序作为该上层应用程序的信任ID。在本实施例中,当上层应用程序请求调用设备接口时,通过信任ID认证该上层应用程序是否合法,若该信任ID存在并且在预设的信任列表内,则认为该上层应用程序合法,否则为不合法,从而避免非法程序调用设备接口,降低了现金交易安全风险,减少了财务纠纷的可能性。
为便于理解,下面对本发明实施例中的一种基于Linux系统金融自助设备的应用认证装置进行详细描述,请参阅图4,本发明实施例中一种基于Linux系统金融自助设备的应用认证装置另一个实施例包括:
信任ID获取模块401,用于当上层应用程序请求调用设备接口时,获取该上层应用程序的信任ID;
第一禁止模块402,用于若该信任ID获取模块401未获取到该上层应用程序的信任ID,则禁止该上层应用程序调用设备接口;
判断模块403,用于若该信任ID获取模块401获取到该上层应用程序的信任ID,则判断该信任ID是否在预设的信任列表中;
第一允许模块404,用于当该判断模块403的判断结果为是时,允许该上层应用程序调用设备接口;
第二禁止模块405,用于当该判断模块403的判断结果为否时,禁止该上层应用程序调用设备接口;
该上层应用程序的信任ID由以下模块预先得到:
第一随机数模块406,用于生成一随机数;
信任添加模块407,用于将生成的该随机数加入该信任列表;
信任ID返回模块408,用于返回该随机数至该上层应用程序作为该上层应用程序的信任ID。
本实施例中该第一禁止模块402可以具体包括:
列表状态判断单元4021,用于若未获取到该上层应用程序的信任ID,则判断该信任列表是否已满;
禁止单元4022,用于当该列表状态判断单元4021的判断结果为是时,禁止该上层应用程序调用设备接口;
信任ID添加单元4023,用于当该列表状态判断单元4021的判断结果为否时,则为该上层应用程序添加信任ID;
该信任ID添加单元4023可以具体包括:
随机数生成子单元0231,用于当该列表状态判断单元4021的判断结果为否时,生成一随机数;
加入列表子单元0232,用于将生成的该随机数加入该信任列表;
信任ID返回子单元0233,用于返回该随机数至该上层应用程序作为该上层应用程序的信任ID;
该信任列表中存放信任ID的个数由具备权限的管理员设定。
本实施例中该基于Linux系统金融自助设备的应用认证装置还可以包括:
报警信息生成模块409,用于该第一禁止模块或第二禁止模块在禁止该上层应用程序调用设备接口之后,根据该上层应用程序的程序信息生成报警信息;
报警信息发送模块410,用于发送该报警信息至后台服务器进行分析处理;
该分析处理的处理结果包括:
若处理结果为信任该上层应用程序,则将该上层应用程序的信任ID加入该信任列表,若该上层应用程序不存在信任ID,则为该上层应用程序生成一信任ID后再将生成的信任ID加入该信任列表;
若处理结果为不信任该上层应用程序,则将该上层应用程序的程序信息加入该后台服务器的黑名单中。
本实施例中该基于Linux系统金融自助设备的应用认证装置还可以包括:
接口参数组合模块411,用于当该上层应用程序调用设备接口时,将该上层应用程序的信任ID以及软件版本号组合成标准接口参数;
参数传递模块412,用于传递该标准接口参数至XFS MANAGER模块,使得连接在该XFS MANAGER模块上的设备接口在该XFS MANAGER模块上提取到该上层应用程序的信任ID以及软件版本号,并为该上层应用程序提供服务。
本发明还提供了一种金融自助设备,该金融自助设备包括如图3或图4对应实施例描述的基于Linux系统金融自助设备的应用认证装置。
综上该,本发明提供的基于Linux系统金融自助设备的应用认证方法和装置,以及一种金融自助设备,可以通过将上层应用程序的属性信息发送到应用认证方法功能模块中以进行应用认证,在应用认证结果为合法的情况下,向上层应用程序提供调用服务,不合法情况下通过高效的联动报警系统上传到服务端,及时通知银行工作人员存在安全威胁,以便及时应对处理。增强了XFS MANAGER模块的内在安全,减少XFS MANAGER模块自身被恶意代码破坏的可能,进一步提高金融系统安全防护能力。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims (10)

  1. 一种基于Linux系统金融自助设备的应用认证方法,其特征在于,包括:
    当上层应用程序请求调用设备接口时,获取所述上层应用程序的信任ID;
    若未获取到所述上层应用程序的信任ID,则禁止所述上层应用程序调用设备接口;
    若获取到所述上层应用程序的信任ID,则判断所述信任ID是否在预设的信任列表中,若是,则允许所述上层应用程序调用设备接口;若否,则禁止所述上层应用程序调用设备接口;
    所述上层应用程序的信任ID由以下步骤预先得到:
    生成一随机数;
    将生成的所述随机数加入所述信任列表;
    返回所述随机数至所述上层应用程序作为所述上层应用程序的信任ID。
  2. 根据权利要求1所述的基于Linux系统金融自助设备的应用认证方法,其特征在于,若未获取到所述上层应用程序的信任ID,则禁止所述上层应用程序调用设备接口具体包括:
    若未获取到所述上层应用程序的信任ID,则判断所述信任列表是否已满,若是,则禁止所述上层应用程序调用设备接口,若否,则为所述上层应用程序添加信任ID;
    所述为所述上层应用程序添加信任ID具体包括:
    生成一随机数;
    将生成的所述随机数加入所述信任列表;
    返回所述随机数至所述上层应用程序作为所述上层应用程序的信任ID;
    所述信任列表中存放信任ID的个数由具备权限的管理员预先设定。
  3. 根据权利要求1所述的基于Linux系统金融自助设备的应用认证方法,其特征在于,禁止所述上层应用程序调用设备接口之后还包括:
    根据所述上层应用程序的程序信息生成报警信息;
    发送所述报警信息至后台服务器进行分析处理;
    所述分析处理的处理结果包括:
    若处理结果为信任所述上层应用程序,则将所述上层应用程序的信任ID加入所述信任列表,若所述上层应用程序不存在信任ID,则为所述上层应用程序生成一信任ID后再将生成的信任ID加入所述信任列表;
    若处理结果为不信任所述上层应用程序,则将所述上层应用程序的程序信息加入所述后台服务器的黑名单中。
  4. 根据权利要求1所述的基于Linux系统金融自助设备的应用认证方法,其特征在于,还包括:
    当所述上层应用程序调用设备接口时,将所述上层应用程序的信任ID以及软件版本号组合成标准接口参数;
    传递所述标准接口参数至XFS MANAGER模块,使得连接在所述XFS MANAGER模块上的设备接口在所述XFS MANAGER模块上提取到所述上层应用程序的信任ID以及软件版本号,并为所述上层应用程序提供服务。
  5. 根据权利要求1至4中任一项所述的基于Linux系统金融自助设备的应用认证方法,其特征在于,所述生成一随机数具体为:以当前时间为随机种子生成一随机数。
  6. 一种基于Linux系统金融自助设备的应用认证装置,其特征在于,包括:
    信任ID获取模块,用于当上层应用程序请求调用设备接口时,获取所述上层应用程序的信任ID;
    第一禁止模块,用于若所述信任ID获取模块未获取到所述上层应用程序的信任ID,则禁止所述上层应用程序调用设备接口;
    判断模块,用于若所述信任ID获取模块获取到所述上层应用程序的信任ID,则判断所述信任ID是否在预设的信任列表中;
    第一允许模块,用于当所述判断模块的判断结果为是时,允许所述上层应用程序调用设备接口;
    第二禁止模块,用于当所述判断模块的判断结果为否时,禁止所述上层应用程序调用设备接口;
    所述上层应用程序的信任ID由以下模块预先得到:
    第一随机数模块,用于生成一随机数;
    信任添加模块,用于将生成的所述随机数加入所述信任列表;
    信任ID返回模块,用于返回所述随机数至所述上层应用程序作为所述上层应用程序的信任ID。
  7. 根据权利要求6所述的基于Linux系统金融自助设备的应用认证装置,其特征在于,所述第一禁止模块具体包括:
    列表状态判断单元,用于若未获取到所述上层应用程序的信任ID,则判断所述信任列表是否已满;
    禁止单元,用于当所述列表状态判断单元的判断结果为是时,禁止所述上层应用程序调用设备接口;
    信任ID添加单元,用于当所述列表状态判断单元的判断结果为否时,则为所述上层应用程序添加信任ID;
    所述信任ID添加单元具体包括:
    随机数生成子单元,用于当所述列表状态判断单元的判断结果为否时,生成一随机数;
    加入列表子单元,用于将生成的所述随机数加入所述信任列表;
    信任ID返回子单元,用于返回所述随机数至所述上层应用程序作为所述上层应用程序的信任ID;
    所述信任列表中存放信任ID的个数由具备权限的管理员预先设定。
  8. 根据权利要求6所述的基于Linux系统金融自助设备的应用认证装置,其特征在于,还包括:
    报警信息生成模块,用于所述第一禁止模块或第二禁止模块在禁止所述上层应用程序调用设备接口之后,根据所述上层应用程序的程序信息生成报警信息;
    报警信息发送模块,用于发送所述报警信息至后台服务器进行分析处理;
    所述分析处理的处理结果包括:
    若处理结果为信任所述上层应用程序,则将所述上层应用程序的信任ID加入所述信任列表,若所述上层应用程序不存在信任ID,则为所述上层应用程序生成一信任ID后再将生成的信任ID加入所述信任列表;
    若处理结果为不信任所述上层应用程序,则将所述上层应用程序的程序信息加入所述后台服务器的黑名单中。
  9. 根据权利要求6所述的基于Linux系统金融自助设备的应用认证装置,其特征在于,还包括:
    接口参数组合模块,用于当所述上层应用程序调用设备接口时,将所述上层应用程序的信任ID以及软件版本号组合成标准接口参数;
    参数传递模块,用于传递所述标准接口参数至XFS MANAGER模块,使得连接在所述XFS MANAGER模块上的设备接口在所述XFS MANAGER模块上提取到所述上层应用程序的信任ID以及软件版本号,并为所述上层应用程序提供服务。
  10. 一种金融自助设备,其特征在于,所述金融自助设备包括如权利要求6至9中任一项所述的基于Linux系统金融自助设备的应用认证装置。
PCT/CN2017/071497 2016-01-29 2017-01-18 基于Linux系统金融自助设备的应用认证方法和装置 WO2017129008A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610066318.9A CN105741444B (zh) 2016-01-29 2016-01-29 基于Linux系统金融自助设备的应用认证方法和装置
CN201610066318.9 2016-01-29

Publications (1)

Publication Number Publication Date
WO2017129008A1 true WO2017129008A1 (zh) 2017-08-03

Family

ID=56247163

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/071497 WO2017129008A1 (zh) 2016-01-29 2017-01-18 基于Linux系统金融自助设备的应用认证方法和装置

Country Status (2)

Country Link
CN (1) CN105741444B (zh)
WO (1) WO2017129008A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105741444B (zh) * 2016-01-29 2019-01-01 广州广电运通金融电子股份有限公司 基于Linux系统金融自助设备的应用认证方法和装置
CN106372496A (zh) * 2016-08-31 2017-02-01 福建联迪商用设备有限公司 提高支付终端应用安全性的方法及系统
CN109389779A (zh) * 2018-08-28 2019-02-26 苏州浪潮智能软件有限公司 一种Linux系统下的金融设备统一调用方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499904A (zh) * 2008-02-01 2009-08-05 华为技术有限公司 一种安全接口调用方法、装置及系统
CN101917682A (zh) * 2010-08-25 2010-12-15 宇龙计算机通信科技(深圳)有限公司 一种移动终端的信息发送方法、系统及移动终端
CN102622546A (zh) * 2012-03-14 2012-08-01 深圳市紫金支点技术股份有限公司 一种基于xfs命令的调用身份认证方法及系统
CN102982091A (zh) * 2011-11-02 2013-03-20 微软公司 用于基于动态域的隔离的技术
CN105741444A (zh) * 2016-01-29 2016-07-06 广州广电运通金融电子股份有限公司 基于Linux系统金融自助设备的应用认证方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4971584B2 (ja) * 2004-05-07 2012-07-11 富士通株式会社 金融システム,自動取引装置,金融取引方法,金融取引プログラムおよび同プログラムを記録したコンピュータ読取可能な記録媒体
KR101363214B1 (ko) * 2007-05-29 2014-02-12 주식회사 엘지씨엔에스 터치 화면 제어방법과 그 장치 및 그를 포함한금융자동화기기
CN104375841B (zh) * 2014-12-03 2018-04-20 广州广电运通金融电子股份有限公司 一种基于linux系统的CEN/XFS标准的架构以及实现方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499904A (zh) * 2008-02-01 2009-08-05 华为技术有限公司 一种安全接口调用方法、装置及系统
CN101917682A (zh) * 2010-08-25 2010-12-15 宇龙计算机通信科技(深圳)有限公司 一种移动终端的信息发送方法、系统及移动终端
CN102982091A (zh) * 2011-11-02 2013-03-20 微软公司 用于基于动态域的隔离的技术
CN102622546A (zh) * 2012-03-14 2012-08-01 深圳市紫金支点技术股份有限公司 一种基于xfs命令的调用身份认证方法及系统
CN105741444A (zh) * 2016-01-29 2016-07-06 广州广电运通金融电子股份有限公司 基于Linux系统金融自助设备的应用认证方法和装置

Also Published As

Publication number Publication date
CN105741444B (zh) 2019-01-01
CN105741444A (zh) 2016-07-06

Similar Documents

Publication Publication Date Title
US11665200B2 (en) System and method for second factor authentication to perform services
US11392947B1 (en) Distributed ledger for device management
US10178081B2 (en) Authentication system, method and storage medium
CN110826043B (zh) 一种数字身份申请系统及方法、身份认证系统及方法
US8656455B1 (en) Managing data loss prevention policies
US11595384B2 (en) Digital identity network interface system
US11343256B2 (en) Systems and methods for controlling third-party access of a protected data resource
US11665155B2 (en) Systems and methods for controlling third-party access of a protected data resource
US10841315B2 (en) Enhanced security using wearable device with authentication system
CN108604990A (zh) 终端中本地授权凭证的使用方法及装置
WO2016088087A1 (en) Third party access to a financial account
WO2017129008A1 (zh) 基于Linux系统金融自助设备的应用认证方法和装置
US20140137265A1 (en) System and Method For Securing Critical Data In A Remotely Accessible Database
WO2019134494A1 (zh) 验证信息处理方法、通信设备、业务平台及存储介质
WO2015188718A1 (zh) 基于移动终端的支付方法、装置及移动终端
WO2019056343A1 (zh) 一种防范互联网和移动支付资金被盗风险的系统和方法
KR102063576B1 (ko) 가상화 기반 은닉형 소프트웨어 실행 환경 제공 방법 및 장치
CN108270569A (zh) 一种通过安全接口进行电子签章的方法及系统
US20230097515A1 (en) Combined authorization for entities within a domain
US20240202676A1 (en) Digital Currency Payment Method and Electronic Device
KR102399828B1 (ko) 텔레뱅킹 인증 시스템 및 그 방법
CN117097508A (zh) Nft跨设备安全管理的方法和装置
KR101536903B1 (ko) 클라우드 뱅킹 시스템과 인터넷 뱅킹 시스템을 연계한 뱅킹 시스템 운용 방법
CN115965370A (zh) 一种数字钱包开立的方法和装置
CN115879930A (zh) 数字钱包开立的方法、装置和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17743623

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17743623

Country of ref document: EP

Kind code of ref document: A1