Business processing security verification method and device

A business processing and security verification technology, which is applied in the field of business processing security verification methods and devices, can solve problems such as abnormal result display and transaction failure, and achieve the effect of increasing cracking costs and improving security

Active Publication Date: 2021-03-12
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although malicious attacks cannot decipher the ciphertext tampering, they can intercept the request return packet and replace the return packet of the same scenario business, resulting in transaction failure or abnormal results display
In addition, high-frequency repeated calls to intercepted transactions (for example, query related transactions) will also put a certain pressure on the application server cluster

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business processing security verification method and device
  • Business processing security verification method and device
  • Business processing security verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0024] figure 1 It is a schematic flowchart of a business processing security verification method according to an embodiment of the present invention. Such as figure 1 As shown, the business processing security verification method of this embodiment may include:

[0025] Step S110: Query the local database to obtain the codebook and unused identification bits, and obtain random numbers according to the codebook and the identification bits;

[0026] Step S120: use the random number to symmetrically encrypt the service request data, and use a fixed key to encrypt the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a business processing safety verification method and device. The method includes: querying a local database to obtain a codebook and unused identification bits, and obtaining a random number according to the codebook and identification bits; using the random number to process the service request data Symmetric encryption, and use a fixed key to encrypt the identification bit; send the symmetrically encrypted service request data and the encrypted identification bit, and receive a return package, which includes the service processing data returned for the service request data and the returned encrypted identification bit; use the fixed key to decrypt the returned encrypted identification bit; in the case that the decrypted returned identification bit is invalid, refuse to perform further business processing on the returned business processing data; If the returned identification bit is valid, the returned service processing data is decrypted by using the decrypted returned identification bit for further service processing. The invention can improve the security of business processing.

Description

technical field [0001] The invention relates to the technical field of Internet information security, in particular to a business processing security verification method and device. Background technique [0002] At present, the information transmission between the mobile client and the server of the Internet instant messaging system generally uses a symmetric encryption algorithm to ensure the security of customer information and prevent customer information from being stolen. The server side needs to prevent malicious attacks on the client side. For example, after illegal personnel intercept client transactions, they make frequent repeated calls (for example, query related transactions), which puts pressure on the application server cluster. [0003] The original symmetric encryption key consists of three parts: random number, gesture password lock and fixed key string. Among them, the random number is updated once a day. Therefore, when the gesture password and the fixed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/14H04L9/08
CPCH04L9/0822H04L9/14H04L63/0435H04L2209/56H04L2463/102
Inventor 张爽于浩程佘志宇蔡岳
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products