WO2014106372A1 - 一种基于金融自助设备的认证方法及装置 - Google Patents

一种基于金融自助设备的认证方法及装置 Download PDF

Info

Publication number
WO2014106372A1
WO2014106372A1 PCT/CN2013/078879 CN2013078879W WO2014106372A1 WO 2014106372 A1 WO2014106372 A1 WO 2014106372A1 CN 2013078879 W CN2013078879 W CN 2013078879W WO 2014106372 A1 WO2014106372 A1 WO 2014106372A1
Authority
WO
WIPO (PCT)
Prior art keywords
financial self
service equipment
key certificate
information
authentication device
Prior art date
Application number
PCT/CN2013/078879
Other languages
English (en)
French (fr)
Inventor
徐俊
熊飞
雷正生
宁群伟
王庆华
Original Assignee
广州广电运通金融电子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州广电运通金融电子股份有限公司 filed Critical 广州广电运通金融电子股份有限公司
Publication of WO2014106372A1 publication Critical patent/WO2014106372A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Definitions

  • the present invention relates to the field of program testing and, more particularly, to authentication methods and apparatus based on financial self-service devices.
  • financial self-service equipment With the popularization of financial self-service, financial self-service equipment has become the most important payment channel for financial institutions to contact customers with convenient and fast service. Among them, financial self-service equipment includes ATM automatic teller machine and self-service information inquiry machine. The testing, troubleshooting and maintenance of system performance of financial self-service equipment has also become a concern of various manufacturers and maintenance personnel.
  • the existing financial self-service equipment testing tools are usually stored in ordinary U disk or mobile storage media. When maintenance personnel need to test or maintain financial self-service devices, they need to insert the USB flash drive into the financial self-service device and use U. The test tools inside the disk test or maintain financial self-service devices.
  • test U disk or removable storage media does not have any security protection mechanism or authorization processing.
  • the process of daily maintenance of the financial self-service device by the staff through the USB flash drive if the mobile storage medium is lost or stolen, it will bring considerable security risks to the financial self-service device.
  • the present invention is directed to providing an authentication method and apparatus based on financial self-service devices to improve the security of financial self-service devices.
  • a financial self-service device-based authentication method for connecting to the financial self-service device The authentication device, wherein the testing device stores the testing tool, including:
  • the financial self-service device After receiving the second authorization information sent by the financial self-service device, generating a corresponding slave key certificate according to the user information, where the second authorization information is that the financial self-service device determines that the user information is legal Information sent after the information;
  • test tool When receiving the instruction to execute the test tool sent by the financial self-service device, it is determined whether the user information has a corresponding slave key certificate, and if so, the test tool is executed; otherwise, it is not executed.
  • the master key certificate includes an expiration date, vendor information, bank information, and usage rights.
  • the method further includes: clearing the first authorization information, the second authorization information, and the slave key certificate pre-stored in the authentication device.
  • the method further includes:
  • the method further includes: encrypting the slave key certificate;
  • the encrypted slave certificate is stored in a hidden area inside the authentication device.
  • the normal user can use the test tool.
  • the usage authority of the master key certificate is an advanced user
  • the advanced user can use or modify the test tool.
  • a financial self-service device-based authentication method is applied to the financial self-service device that can be connected to the authentication device, and the testing device stores the testing tool, including:
  • An instruction to execute the test tool is sent to the authentication device.
  • An authentication device based on a financial self-service device the authentication device being connectable to the financial self-service device, wherein the testing device stores a testing tool, including:
  • a first sending module configured to send, when the authentication device is connected to the financial self-service device, a master key certificate stored in advance by the authentication device to the financial self-service device;
  • a first receiving module configured to receive first authorization information that is sent by the financial self-service device, where the first authorization information is information that is sent by the financial self-service device after determining that the master key certificate is a legal certificate;
  • a second sending module configured to send user information to the financial self-service device after the first receiving module receives the first authorization information
  • a second receiving module configured to receive second authorization information that is sent by the financial self-service device, where the second authorization information is information that is sent by the financial self-service device after determining that the user information is legal information;
  • a slave key certificate generating module configured to generate a corresponding slave key certificate according to the user information after the second receiving module receives the second authorization information
  • a third receiving module configured to receive an instruction sent by the financial self-service device to execute the testing tool
  • the slave key certificate detecting module is configured to: when the third receiving module receives the instruction to execute the testing tool, determine whether the user information has a corresponding slave key certificate, and if yes, execute the testing tool; Otherwise, it will not be executed.
  • the technical solution provided by this embodiment has the following advantages and features:
  • the correctness of the master key certificate and the user information needs to be separately determined, so as to obtain the authority of the authentication device. Double authentication with the identity of the maintenance personnel. If the authentication device is lost or stolen, as long as the user information entered is incorrect, the test tool inside the authentication device cannot be used; if the user information entered is correct, but the authentication device cannot provide the correct The master key certificate, then the test tool inside the authentication device cannot be used. Therefore, the dual authentication method provided by the present invention improves the security of the financial self-service device. DRAWINGS
  • FIG. 1 is a flowchart of a method for authenticating a financial self-service device according to the present invention
  • FIG. 2 is a flowchart of another method for authenticating a financial self-service device according to the present invention
  • a block diagram of a financial self-service device based authentication device
  • FIG. 4 is a block diagram of another financial self-service device based authentication device provided by the present invention.
  • Embodiments of the present invention provide a method and apparatus for authenticating a financial self-service device to improve the security of a financial self-service device. Since there are various ways to implement the above test driver method, a detailed description will be given below through specific embodiments:
  • FIG. 1 is a method for authenticating a financial self-service device, and the method is applied to an authentication device that can be connected to the financial self-service device, where the testing device stores a testing tool.
  • the method includes:
  • Step S11 When the authentication device is connected to the financial self-service device, send the master key certificate stored in advance by the authentication device to the financial self-service device;
  • the master key certificate includes an expiration date, vendor information, bank information, and usage rights of the authentication device. For the expiration date of the authentication device, if the current time is not within the validity period, the master key certificate will be invalidated; for the vendor information, it refers to the manufacturer of the financial self-service device; for the bank information , refers to the bank that uses the financial self-service device;
  • the test user may use the test tool when the usage right of the master key certificate is an ordinary user, and when the use right of the master key certificate is an advanced user, the advanced The test tool can be used or modified by the user.
  • the authentication device is connected to the financial self-service device, it is also necessary to clear the first authorization information, the second authorization information, and the authentication information such as the key certificate stored in the authentication device, because the last authentication device and the financial self-service device When the connection is made, some authentication information is also stored in the authentication device. Therefore, in order to prevent the previous authentication information from interfering with the current authentication operation, it is necessary to clear the authentication information inside the authentication device.
  • Step S12 After receiving the first authorization information sent by the financial self-service device, sending the user information input by the user to the financial self-service device, where the first authorization information is used by the financial self-service device to determine the primary secret
  • the information sent after the key certificate is a legal certificate
  • the user information may be a username and a password
  • the password may be a static password and/or a dynamic password.
  • Step S13 After receiving the second authorization information sent by the financial self-service device, generate a corresponding slave key certificate according to the user information, where the second authorization information is used by the financial self-service device to determine the user.
  • Information sent after the information is legal information;
  • the slave key certificate After the corresponding slave key certificate is generated, in order to ensure the security of the key certificate and avoid external leakage, the slave key certificate needs to be encrypted, and the encrypted slave key certificate is saved in the The hidden area inside the authentication device.
  • Step S14 when receiving an instruction to execute the test tool sent by the financial self-service device, determining whether the user information has a corresponding slave key certificate, and if yes, executing the test tool; otherwise, not executing .
  • test tool Before using the test tool, it is necessary to determine whether the user information corresponds to the slave certificate, so that each use of the test tool requires legal authorization to be used.
  • the correctness of the master key certificate and the user information needs to be separately determined, so that the authority of the authentication device and the identity of the maintenance personnel are double-authenticated. If the authentication device is lost or stolen, If the entered user information is incorrect, then the test tool inside the authentication device cannot be used; if the user information entered is correct, but the authentication device cannot provide the correct master key certificate, then the test tool inside the authentication device cannot be used. Therefore, the dual authentication method provided by the present invention improves the security of the financial self-service device. In the embodiment shown in Fig. 1, in the execution of this embodiment, it is necessary to record the execution of each process, thus achieving tracking of all events. If the staff member uses the authentication device internally without authorization, or the staff member takes the authentication device out of the internal environment or the authentication device is infected with the virus, it will be recorded, so it is convenient to inquire about the illegal use of the authentication device. Embodiment 2
  • FIG. 2 shows a financial self-service device-based authentication method, which is applied to the financial self-service device that can be connected to an authentication device, where the authentication device stores a test tool.
  • the method includes:
  • Step S21 When the authentication device is connected to the financial self-service device, acquire a master key certificate pre-stored by the authentication device;
  • the master key certificate includes an expiration date, vendor information, bank information, and usage rights of the authentication device.
  • expiration date of the authentication device if the current time is not within the validity period, the master key certificate will be invalid; for the vendor information, it refers to the manufacturer of the financial self-service device; for the bank information Referring to the bank that uses the financial self-service device; for the usage right, when the usage authority of the master key certificate is a normal user, the ordinary user can use the test tool, when the master When the usage authority of the key certificate is an advanced user, the advanced user can use or modify the test tool.
  • Step S22 When it is determined that the master key certificate is a legal certificate, send the first authorization information to the authentication device, and obtain user information input by the user;
  • the user information may be a username and a password
  • the password may be a static password and/or a dynamic password.
  • Step S23 When it is determined that the user information is legal information, send the second authorization information to the authentication device.
  • Step S24 Send an instruction to execute the test tool to the authentication device.
  • the correctness of the master key certificate and the user information needs to be separately determined, so that the authority of the authentication device and the identity of the maintenance personnel are double-authenticated. If the authentication device is lost or stolen, If the entered user information is incorrect, then the test tool inside the authentication device cannot be used; if the user information entered is correct, but the authentication device cannot provide the correct master key certificate, then the test tool inside the authentication device cannot be used. Therefore, the double recognition provided by the present invention The way of certification increases the security of financial self-service devices.
  • FIG. 3 shows a financial self-service device-based authentication device 1 , which includes a first sending module 11 for when the authentication device 1 is associated with the financial self-service device 2 When the connection is made, the master key certificate stored in advance by the authentication device 1 is sent to the financial self-service device 2; the first receiving module 12 is configured to receive the first authorization information sent by the financial self-service device 2, An authorization information is used by the financial self-service device 2 to determine that the master key certificate is a legal certificate.
  • the second sending module 13 is configured to: after the first receiving module 12 receives the first authorization information, And sending the user information to the financial self-service device 2; the second receiving module 14 is configured to receive the second authorization information sent by the financial self-service device 2, where the second authorization information is determined by the financial self-service device 2 The information sent after the user information is the legal information; the slave key certificate generating module 15 is configured to: after receiving the second authorization information by the second receiving module 14, The user information generates a corresponding slave key certificate; the third receiving module 16 is configured to receive an instruction for executing the test tool sent by the financial self-service device 2; and the slave key certificate detecting module 17 is configured to be in the third When receiving the instruction to execute the test tool, the receiving module 16 determines whether the user information has a corresponding slave key certificate, and if so, executes the test tool; otherwise, it does not execute.
  • Embodiment 4 corresponds to the method in the first embodiment. Therefore, for the function of the module in the third embodiment, refer to the corresponding part in the first embodiment, and details are not described herein again.
  • Embodiment 4 corresponds to the corresponding part in the first embodiment, and details are not described herein again.
  • FIG. 4 shows another financial self-service device-based authentication device 3.
  • the authentication device 3 includes five functional modules, namely a login module 31, a test tool module 32, and a user certificate authorization module. 33.
  • the hardware storage area of the authentication device 3 is divided into four areas, which are a CDROM area, a work area, a backup area, and a hidden area, respectively.
  • the function modules, the four sub-areas use and function are as follows: CDROM area for storing maintenance login program and encryption disable settings; work area for storing commonly used test programs and for ordinary authorized users; backup area is to store work area
  • the installation package of the installation work is the advanced user permission access area; the hidden area is further divided into: the authorization certificate area and the event tracking area, and the hidden state is not publicly disclosed as the background management class, wherein the The rights area stores all authorization information, and the event tracking area stores the log system information.
  • the login module 31 is disposed in the CDROM area.
  • the user identity authentication mechanism is provided by the system that logs in to the financial self-service device, and the system in which the legitimate user logs in to the financial self-service device will invoke the user authorization module 33 to authorize the user and generate a slave key certificate. Otherwise, it is not authorized and ends, and the event tracking module 34 is called to record and track the events of the login process.
  • the test tool module 32 is set in the work area.
  • the user authorization module 33 is first invoked to detect whether the legal authorization authentication has been performed, and the authorization is legally given to the execution, otherwise it is not executed, and the event tracking module 34 is called to the event of the login process. Record and track.
  • the user authorization module 33 is set in the authorization certificate area of the hidden area.
  • the user authorization module 33 includes two parts of the user key certificate authority unit program and the authorization certificate detection unit program, and the module user is irreplaceable. Furthermore, the key certificate authority module is used to authenticate the user identity by calling the login module, and then the slave key authorization certificate is generated by the module, and the authorization certificate is monitored by the authorization certificate detecting unit program.
  • the event tracking module 34 is set in the event tracking area of the hidden area, and provides maintenance and management of recording and tracking of events such as user landing, authorization, and execution period testing tools.
  • the security initialization module 35 is provided in the authentication device 3. After the authentication device 3 is inserted into the financial self-service device, the authentication device 3 is initially set and the history authorization information record is cleared.
  • test self-service equipment is authenticated by the maintenance personnel; 2. Each test implements a legal authorization test; 3. The test content implements event tracking. Therefore, the embodiment provided by the present invention requires security authorization and dual certificate authentication before each test using the test tool, thereby improving the security during the self-service device testing process and effectively controlling the client funds in the financial self-service device during the test period. The risk of security.
  • FIG. 1 to FIG. 4 are only preferred embodiments of the present invention, and those skilled in the art can design more embodiments based on this, and therefore will not be described herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明公开了一种基于金融自助设备的认证方法,包括:当认证装置与金融自助设备相连接时,将认证装置预先存储的主密钥证书发送至金融自助设备;在接收到金融自助设备发送的第一授权信息后,则向金融自助设备发送用户输入的用户信息,第一授权信息为金融自助设备判断主密钥证书为合法证书后发送的信息;在接收到金融自助设备发送的第二授权信息后,则在根据用户信息生成对应的从密钥证书,第二授权信息为金融自助设备判断用户信息为合法信息后发送的信息;当接收到金融自助设备发送的执行测试工具的指令时,判断用户信息是否具有对应的从密钥证书,若是则执行测试工具;否则不予执行。本发明提供的双重认证的方式可以提高了金融自助设备的安全性。

Description

一种基于金融自助设备的认证方法及装置
本申请要求于 2013 年 1 月 7 日提交中国专利局、 申请号为 201310004998.8、 发明名称为"一种基于金融自助设备的认证方法及装置 "的中 国专利申请的优先权, 其全部内容引用在本申请中。 技术领域
本发明涉及程序测试领域, 更具体的说, 涉及基于金融自助设备的认证方 法及装置。
背景技术
随着金融自助服务的普及,金融自助设备凭借便利、快捷的服务已经成为 了金融机构与客户接触的最主要的支付渠道, 其中, 金融自助设备包括 ATM 自动取款机和自助信息查询机等。金融自助设备的***性能的测试、故障排除 和维护也成为各厂商及维护人员非常关注的问题。
现有的金融自助设备的测试工具通常存储在普通的 U盘或移动存储介质 中, 当维护人员需要对金融自助设备进行测试或维护时, 需要将 U盘***到 金融自助设备上, 并使用 U盘内部的测试工具对金融自助设备进行测试或维 护。
但是现有的测试 U盘或移动存储介质不存在任何的安全防护机制或授权 处理。 在工作人员通过 U盘对金融自助设备的日常维护过程中, 如果出现移 动存储介质丟失或被盗等情况, 都会给金融自助设备带来相当大的安全隐患。
因此,如何提供一种基于金融自助设备的安全性高的认证方法及装置, 成 为目前最需要解决的问题。
发明内容
有鉴于此, 本发明的设计目的在于,提供一种基于金融自助设备的认证方 法及装置, 以提高金融自助设备的安全性。
一种基于金融自助设备的认证方法,应用于可与所述金融自助设备相连接 的认证装置, 所述认证装置内存储有测试工具, 包括:
当所述认证装置与所述金融自助设备相连接时,将所述认证装置预先存储 的主密钥证书发送至所述金融自助设备;
在接收到所述金融自助设备发送的第一授权信息后,则向所述金融自助设 备发送用户输入的用户信息,所述第一授权信息为所述金融自助设备判断所述 主密钥证书为合法证书后发送的信息;
在接收到所述金融自助设备发送的第二授权信息后,则在根据所述用户信 息生成对应的从密钥证书,所述第二授权信息为所述金融自助设备判断所述用 户信息为合法信息后发送的信息;
当接收到所述金融自助设备发送的执行所述测试工具的指令时,判断所述 用户信息是否具有对应的从密钥证书, 若是, 则执行所述测试工具; 否则, 不 予执行。
优选地,所述主密钥证书包括有效期限、厂商信息、银行信息和使用权限。 优选地, 当所述认证装置与所述金融自助设备相连接时, 还包括: 清除所述认证装置内预先存储的第一授权信息、第二授权信息和从密钥证 书。
优选地, 在执行所述测试工具时, 还包括:
记录执行所述测试工具的整个过程。
优选地, 在根据所述用户信息生成对应的从密钥证书的步骤后, 还包括: 将所述从密钥证书进行加密;
将加密后的从密钥证书保存在所述认证装置内部的隐藏区域。
优选地, 当所述主密钥证书的使用权限为普通用户时, 则所述普通用户可 使用所述测试工具。
优选地, 当所述主密钥证书的使用权限为高级用户时, 则所述高级用户可 使用或修改所述测试工具。
一种基于金融自助设备的认证方法,应用于可与认证装置相连接的所述金 融自助设备, 所述认证装置内存储有测试工具, 包括:
当所述认证装置与所述金融自助设备相连接时,获取所述认证装置预先存 储的主密钥证书;
当判断出所述主密钥证书为合法证书时,则向所述认证装置发送第一授权 信息, 并获取用户输入的用户信息;
当判断出所述用户信息为合法信息时 ,则向所述认证装置发送第二授权信 息;
向所述认证装置发送执行所述测试工具的指令。
一种基于金融自助设备的认证装置,所述认证装置可与所述金融自助设备 相连接, 所述认证装置内存储有测试工具, 包括:
第一发送模块, 用于当所述认证装置与所述金融自助设备相连接时,将所 述认证装置预先存储的主密钥证书发送至所述金融自助设备;
第一接收模块, 用于接收所述金融自助设备发送的第一授权信息, 所述第 一授权信息为所述金融自助设备判断所述主密钥证书为合法证书后发送的信 息;
第二发送模块, 用于在所述第一接收模块接收到所述第一授权信息后, 则 向所述金融自助设备发送用户信息;
第二接收模块, 用于接收到所述金融自助设备发送的第二授权信息, 所述 第二授权信息为所述金融自助设备判断所述用户信息为合法信息后发送的信 息;
从密钥证书生成模块, 用于在所述第二接收模块接收到第二授权信息后, 则在根据所述用户信息生成对应的从密钥证书;
第三接收模块,用于接收所述金融自助设备发送的执行所述测试工具的指 令;
从密钥证书检测模块,用于在所述第三接收模块接收到执行所述测试工具 的指令时, 判断所述用户信息是否具有对应的从密钥证书, 若是, 则执行所述 测试工具; 否则, 不予执行。
与现有技术相比, 本实施例提供的技术方案具有以下优点和特点: 在本发明提供的方案中,需要分别对主密钥证书和用户信息的正确性进行 判断, 以便对认证装置的权限和维护人员的身份进行双重认证,如果认证装置 丟失或被盗, 只要输入的用户信息不正确, 那么就无法使用该认证装置内部的 测试工具; 如果输入的用户信息正确,但是认证装置无法提供正确的主密钥证 书, 那么也无法使用该认证装置内部的测试工具, 因此, 本发明提供的双重认 证的方式提高了金融自助设备的安全性。 附图说明
为了更清楚地说明本发明或现有技术中的技术方案,下面将对实施例或现 有技术描述中所需要使用的附图作简单地介绍,显而易见地, 下面描述中的附 图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造 性劳动的前提下, 还可以根据这些附图获得其他的附图。
图 1为本发明所提供的一种基于金融自助设备的认证方法的流程图; 图 2为本发明所提供的另一种基于金融自助设备的认证方法的流程图; 图 3为本发明所提供的一种基于金融自助设备的认证装置的模块图; 图 4为本发明所提供的另一种基于金融自助设备的认证装置的模块图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清 楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是 全部的实施例。基于本发明中的实施例, 本领域普通技术人员在没有做出创造 性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
本发明实施例提供了一种基于金融自助设备的认证方法及装置,以提高金 融自助设备的安全性。 由于上述测试驱动程序的方法的具体实现存在多种方 式, 下面通过具体实施例进行详细说明:
实施例一
请参见图 1所示, 图 1所示的为一种基于金融自助设备的认证方法, 该方 法应用于可与所述金融自助设备相连接的认证装置,所述认证装置内存储有测 试工具, 该方法包括:
步骤 Sll、 当所述认证装置与所述金融自助设备相连接时, 将所述认证装 置预先存储的主密钥证书发送至所述金融自助设备;
其中, 主密钥证书包括该认证装置的有效期限、 厂商信息、 银行信息和使 用权限。 对于认证装置的有效期限而言, 如果当前的时间不在有效期限内, 那 么该主密钥证书就会作废; 对于厂商信息而言,指代的为金融自助设备的生产 厂商; 对于银行信息而言, 指代的是使用该金融自助设备的银行; 对于使用权 限而言, 当所述主密钥证书的使用权限为普通用户时, 则所述普通用户可使用 所述测试工具, 当所述主密钥证书的使用权限为高级用户时, 则所述高级用户 可使用或修改所述测试工具。
在每次将认证装置与金融自助设备相连接时,还需要清除认证装置内预先 存储的第一授权信息、第二授权信息和从密钥证书等认证信息, 因为上一次认 证装置与金融自助设备连接时,有一些认证信息还存储在认证装置中, 所以为 了避免上一次的认证信息会干扰到本次的认证操作,所以需要清空认证装置内 部的认证信息。
步骤 S12、 在接收到所述金融自助设备发送的第一授权信息后, 则向所述 金融自助设备发送用户输入的用户信息,所述第一授权信息为所述金融自助设 备判断所述主密钥证书为合法证书后发送的信息;
其中, 用户信息可以为用户名和密码, 密码具体可以为静态密码和 /或动 态密码。
步骤 S13、 在接收到所述金融自助设备发送的第二授权信息后, 则在根据 所述用户信息生成对应的从密钥证书 ,所述第二授权信息为所述金融自助设备 判断所述用户信息为合法信息后发送的信息;
其中, 在生成对应的从密钥证书之后, 为了保证从密钥证书的安全, 避免 对外泄露,还需要将所述从密钥证书进行加密, 并将加密后的从密钥证书保存 在所述认证装置内部的隐藏区域中。
步骤 S14、 当接收到所述金融自助设备发送的执行所述测试工具的指令 时, 判断所述用户信息是否具有对应的从密钥证书, 若是, 则执行所述测试工 具; 否则, 不予执行。
其中,每一次使用测试工具前,都需要判断该用户信息是否对应有从密钥 证书, 从而实现了每一次使用测试工具都需要合法授权才能够使用。
在图 1所示的实施例中,需要分别对主密钥证书和用户信息的正确性进行 判断, 以便对认证装置的权限和维护人员的身份进行双重认证,如果认证装置 丟失或被盗, 只要输入的用户信息不正确, 那么就无法使用该认证装置内部的 测试工具; 如果输入的用户信息正确,但是认证装置无法提供正确的主密钥证 书, 那么也无法使用该认证装置内部的测试工具, 因此, 本发明提供的双重认 证的方式提高了金融自助设备的安全性。 在图 1所示的实施例中,在本实施例执行的过程中,都需要记录每个过程 的执行, 这样实现了对所有事件的跟踪。如果工作人员未经授权在内部使用认 证装置, 或者工作人员将认证装置带出内部环境使用、或者认证装置遭受病毒 感染, 都会被记录下来, 所以便于对认证装置的非法使用进行查询。 实施例二
请参见图 2所示, 图 2所示的为一种基于金融自助设备的认证方法, 该方 法应用于可与认证装置相连接的所述金融自助设备,所述认证装置内存储有测 试工具, 该方法包括:
步骤 S21、 当所述认证装置与所述金融自助设备相连接时, 获取所述认证 装置预先存储的主密钥证书;
其中, 主密钥证书包括该认证装置的有效期限、 厂商信息、 银行信息和使 用权限。 对于认证装置的有效期限而言, 如果当前的时间不在有效期限内, 那 么该主密钥证书就会作废; 对于厂商信息而言, 指代的为金融自助设备的生产 厂商; 对于银行信息而言, 指代的是使用该金融自助设备的银行; 对于使用权 限而言, 当所述主密钥证书的使用权限为普通用户时, 则所述普通用户可使用 所述测试工具, 当所述主密钥证书的使用权限为高级用户时, 则所述高级用户 可使用或修改所述测试工具。
步骤 S22、 当判断出所述主密钥证书为合法证书时, 则向所述认证装置发 送第一授权信息, 并获取用户输入的用户信息;
其中, 用户信息可以为用户名和密码, 密码具体可以为静态密码和 /或动 态密码。
步骤 S23、 当判断出所述用户信息为合法信息时, 则向所述认证装置发送 第二授权信息;
步骤 S24、 向所述认证装置发送执行所述测试工具的指令。
在图 2所示的实施例中,需要分别对主密钥证书和用户信息的正确性进行 判断, 以便对认证装置的权限和维护人员的身份进行双重认证,如果认证装置 丟失或被盗, 只要输入的用户信息不正确, 那么就无法使用该认证装置内部的 测试工具; 如果输入的用户信息正确,但是认证装置无法提供正确的主密钥证 书, 那么也无法使用该认证装置内部的测试工具, 因此, 本发明提供的双重认 证的方式提高了金融自助设备的安全性。 实施例三
请参见图 3所示, 图 3所示的为一种基于金融自助设备的认证装置 1 , 该 认证装置包括第一发送模块 11 ,用于当所述认证装置 1与所述金融自助设备 2 相连接时,将所述认证装置 1预先存储的主密钥证书发送至所述金融自助设备 2; 第一接收模块 12, 用于接收所述金融自助设备 2发送的第一授权信息, 所 述第一授权信息为所述金融自助设备 2 判断所述主密钥证书为合法证书后发 送的信息; 第二发送模块 13 , 用于在所述第一接收模块 12接收到所述第一授 权信息后, 则向所述金融自助设备 2发送用户信息; 第二接收模块 14, 用于 接收到所述金融自助设备 2发送的第二授权信息,所述第二授权信息为所述金 融自助设备 2判断所述用户信息为合法信息后发送的信息;从密钥证书生成模 块 15 , 用于在所述第二接收模块 14接收到第二授权信息后, 则在根据所述用 户信息生成对应的从密钥证书; 第三接收模块 16, 用于接收所述金融自助设 备 2发送的执行所述测试工具的指令; 从密钥证书检测模块 17, 用于在所述 第三接收模块 16接收到执行所述测试工具的指令时, 判断所述用户信息是否 具有对应的从密钥证书, 若是, 则执行所述测试工具; 否则, 不予执行。
在图 3所示的实施例中, 由于本实施例与实施例一所述的方法相对应, 所 以关于实施例三的模块的功能请参见实施例一对应的部分, 在此不再贅述。 实施例四
请参见图 4所示, 图 4所示的为另一种基于金融自助设备的认证装置 3 , 该认证装置 3包括 5个功能模块, 分别为登陆模块 31、 测试工具模块 32、 用 户证书授权模块 33、 事件跟踪模块 34和安全初始化模块 35; 其中, 将认证装 置 3的硬件存储区域划分为 4个区域, 分别为 CDROM区域、 工作区域、 备 份区域、 隐藏区域, 这几个区域分别承载着上述的功能模块, 这 4个分区域用 途与功能分别如下: CDROM区域为存放维护登陆程序并加密禁用设置; 工作 区域为存放常用的测试程序并为普通授权的用户提供使用;备份区域是存放工 作区域的安装工作的安装包为高级用户权限访问区域; 隐藏区域又分为: 授权 证书区与事件跟踪区, 为隐藏状态不对外公开作为后台管理类使用, 其中的授 权区存放的是所有授权信息, 也事件跟踪区存放的是日志***信息。 具体的: 登陆模块 31设置在 CDROM区域中。 管理维护者使用认证装置 3时, 通 过登陆金融自助设备的***提供用户身份验证机制,合法的用户登录金融自助 设备的***将调用用户授权模块 33 , 对该用户进行授权, 并生成从密钥证书, 否则不予授权并结束, 同时调用事件跟踪模块 34对登录过程的事件进行记录 与跟踪。
测试工具模块 32设置在工作区域中。 金融自助设备执行认证装置 3内的 测试工具时, 首先调用用户授权模块 33检测是否经过了合法授权认证, 授权 合法给予其执行, 否则不予其执行, 同时调用事件跟踪模块 34对登录过程的 事件进行记录与跟踪。
用户授权模块 33设置在隐藏区域的授权证书区中。用户授权模块 33包括 用户从密钥证书授权单元程序和授权证书检测单元程序两个部分,本模块用户 不可替代。 更进一步说, 其中从密钥证书授权单元程序,通过调用登陆模块来 对用户身份验证后再通过该模块生成从密钥授权证书,并通过其授权证书检测 单元程序对授权证书进行监测。
事件跟踪模块 34设置在隐藏区域的事件跟踪区中, 提供维护管理用户登 陆、 授权、 执行期测试工具等事件的记录与追踪。
安全初始化模块 35设置在认证装置 3中。 当认证装置 3***金融自助设 备后, 对认证装置 3进行初始化设置, 并清除历史授权信息记录。
在图 4所示的实施例中, 实现了以下技术效果: 1、 测试自助设备均做到 维护人员身份认证; 2、 每一次测试实现合法授权测试; 3、 测试内容实现了事 件跟踪。 因此, 本发明提供的实施例在每次使用测试工具进行测试之前都需要 安全授权与双重证书的认证,从而提升了自助设备测试过程中的安全性,有效 控制测试期间金融自助设备内的客户资金安全的风险。
需要说明的是,图 1至图 4所示的实施例只是本发明所介绍的优选实施例, 本领域技术人员在此基础上, 完全可以设计出更多的实施例, 因此不在此处贅 述。
对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的, 本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其它 实施例中实现。 因此, 本发明将不会被限制于本文所示的这些实施例, 而是要 符合与本文所公开的原理和新颖特点相一致的最宽的范围。
+

Claims

权 利 要 求
1、 一种基于金融自助设备的认证方法, 应用于可与所述金融自助设备相 连接的认证装置, 所述认证装置内存储有测试工具, 其特征在于, 包括: 当所述认证装置与所述金融自助设备相连接时,将所述认证装置预先存储 的主密钥证书发送至所述金融自助设备; 在接收到所述金融自助设备发送的第一授权信息后,则向所述金融自助设 备发送用户输入的用户信息,所述第一授权信息为所述金融自助设备判断所述 主密钥证书为合法证书后发送的信息; 在接收到所述金融自助设备发送的第二授权信息后,则在根据所述用户信 息生成对应的从密钥证书,所述第二授权信息为所述金融自助设备判断所述用 户信息为合法信息后发送的信息; 当接收到所述金融自助设备发送的执行所述测试工具的指令时,判断所述 用户信息是否具有对应的从密钥证书, 若是, 则执行所述测试工具; 否则, 不 予执行。
2、 根据权利要求 1所述的基于金融自助设备的认证方法, 其特征在于, 所述主密钥证书包括有效期限、 厂商信息、 银行信息和使用权限。
3、 根据权利要求 1所述的基于金融自助设备的认证方法, 其特征在于, 当所述认证装置与所述金融自助设备相连接时, 还包括:
清除所述认证装置内预先存储的第一授权信息、第二授权信息和从密钥证 书。
4、 根据权利要求 1所述的基于金融自助设备的认证方法, 其特征在于, 在执行所述测试工具时, 还包括:
记录执行所述测试工具的整个过程。
5、 根据权利要求 1所述的基于金融自助设备的认证方法, 其特征在于, 在根据所述用户信息生成对应的从密钥证书的步骤后, 还包括:
将所述从密钥证书进行加密;
将加密后的从密钥证书保存在所述认证装置内部的隐藏区域。
6、 根据权利要求 2所述的基于金融自助设备的认证方法, 其特征在于, 当所述主密钥证书的使用权限为普通用户时,则所述普通用户可使用所述测试 工具。
7、 根据权利要求 2所述的基于金融自助设备的认证方法, 其特征在于, 当所述主密钥证书的使用权限为高级用户时,则所述高级用户可使用或修改所 述测试工具。
8、 一种基于金融自助设备的认证方法, 应用于可与认证装置相连接的所 述金融自助设备, 所述认证装置内存储有测试工具, 其特征在于, 包括: 当所述认证装置与所述金融自助设备相连接时,获取所述认证装置预先存 储的主密钥证书; 当判断出所述主密钥证书为合法证书时,则向所述认证装置发送第一授权 信息, 并获取用户输入的用户信息; 当判断出所述用户信息为合法信息时 ,则向所述认证装置发送第二授权信 息; 向所述认证装置发送执行所述测试工具的指令。
9、 一种基于金融自助设备的认证装置, 所述认证装置可与所述金融自助 设备相连接, 所述认证装置内存储有测试工具, 其特征在于, 包括: 第一发送模块, 用于当所述认证装置与所述金融自助设备相连接时,将所 述认证装置预先存储的主密钥证书发送至所述金融自助设备; 第一接收模块, 用于接收所述金融自助设备发送的第一授权信息, 所述第 一授权信息为所述金融自助设备判断所述主密钥证书为合法证书后发送的信 息;
第二发送模块, 用于在所述第一接收模块接收到所述第一授权信息后, 则 向所述金融自助设备发送用户信息;
第二接收模块, 用于接收到所述金融自助设备发送的第二授权信息, 所述 第二授权信息为所述金融自助设备判断所述用户信息为合法信息后发送的信 息;
从密钥证书生成模块, 用于在所述第二接收模块接收到第二授权信息后, 则在根据所述用户信息生成对应的从密钥证书;
第三接收模块,用于接收所述金融自助设备发送的执行所述测试工具的指 令;
从密钥证书检测模块,用于在所述第三接收模块接收到执行所述测试工具 的指令时, 判断所述用户信息是否具有对应的从密钥证书, 若是, 则执行所述 测试工具; 否则, 不予执行。
+
PCT/CN2013/078879 2013-01-07 2013-07-05 一种基于金融自助设备的认证方法及装置 WO2014106372A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310004998.8 2013-01-07
CN201310004998.8A CN103107884B (zh) 2013-01-07 2013-01-07 一种基于金融自助设备的认证方法及装置

Publications (1)

Publication Number Publication Date
WO2014106372A1 true WO2014106372A1 (zh) 2014-07-10

Family

ID=48315470

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/078879 WO2014106372A1 (zh) 2013-01-07 2013-07-05 一种基于金融自助设备的认证方法及装置

Country Status (2)

Country Link
CN (1) CN103107884B (zh)
WO (1) WO2014106372A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103107884B (zh) * 2013-01-07 2016-09-28 广州广电运通金融电子股份有限公司 一种基于金融自助设备的认证方法及装置
CN104539654A (zh) * 2014-12-05 2015-04-22 江苏大学 一种基于隐私保护的个人资料填写***解决方法
CN109191099B (zh) * 2018-07-18 2022-05-13 南京怡化信息技术有限公司 基于xfs命令的电子签名方法及***

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010017584A1 (en) * 2000-02-24 2001-08-30 Takashi Shinzaki Mobile electronic apparatus having function of verifying a user by biometrics information
US20070061871A1 (en) * 2005-08-25 2007-03-15 Ryan Simpkins Authentication and account protection method and apparatus
CN101145903A (zh) * 2007-10-24 2008-03-19 中兴通讯股份有限公司 一种用户认证方法
CN101350723A (zh) * 2008-06-20 2009-01-21 北京天威诚信电子商务服务有限公司 一种USB Key设备及其实现验证的方法
CN102404112A (zh) * 2010-09-08 2012-04-04 清大安科(北京)科技有限公司 一种可信终端接入认证方法
CN103107884A (zh) * 2013-01-07 2013-05-15 广州广电运通金融电子股份有限公司 一种基于金融自助设备的认证方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010017584A1 (en) * 2000-02-24 2001-08-30 Takashi Shinzaki Mobile electronic apparatus having function of verifying a user by biometrics information
US20070061871A1 (en) * 2005-08-25 2007-03-15 Ryan Simpkins Authentication and account protection method and apparatus
CN101145903A (zh) * 2007-10-24 2008-03-19 中兴通讯股份有限公司 一种用户认证方法
CN101350723A (zh) * 2008-06-20 2009-01-21 北京天威诚信电子商务服务有限公司 一种USB Key设备及其实现验证的方法
CN102404112A (zh) * 2010-09-08 2012-04-04 清大安科(北京)科技有限公司 一种可信终端接入认证方法
CN103107884A (zh) * 2013-01-07 2013-05-15 广州广电运通金融电子股份有限公司 一种基于金融自助设备的认证方法及装置

Also Published As

Publication number Publication date
CN103107884A (zh) 2013-05-15
CN103107884B (zh) 2016-09-28

Similar Documents

Publication Publication Date Title
JP5021838B2 (ja) 暗号化されたストレージデバイスについてのチップセット鍵管理サービスの利用の強制
US9166966B2 (en) Apparatus and method for handling transaction tokens
US8572689B2 (en) Apparatus and method for making access decision using exceptions
Bertholon et al. Certicloud: a novel tpm-based approach to ensure cloud iaas security
US8572714B2 (en) Apparatus and method for determining subject assurance level
US8726339B2 (en) Method and apparatus for emergency session validation
US8752123B2 (en) Apparatus and method for performing data tokenization
WO2015196659A1 (zh) 一种桌面云客户端和服务端之间连接认证的方法及装置
US8752124B2 (en) Apparatus and method for performing real-time authentication using subject token combinations
CN102884535A (zh) 受保护装置管理
US8806602B2 (en) Apparatus and method for performing end-to-end encryption
WO2013025590A1 (en) Method and apparatus for making token-based access decisions
WO2013025586A2 (en) Apparatus and method for performing session validation
EP2769502A1 (en) Methods, systems and apparatus to facilitate client-based authentication
WO2013025592A1 (en) Method and apparatus for token-based conditioning
JP4469892B2 (ja) 車両内の制御機器の認証
WO2013025581A1 (en) Apparatus and method for token-based access control
US8726341B2 (en) Apparatus and method for determining resource trust levels
US20130047245A1 (en) Apparatus and Method for Performing Session Validation to Access Confidential Resources
JP6481953B2 (ja) データ管理方法、そのためのコンピュータプログラム、その記録媒体、及びデータ管理方法を実行するユーザークライアント
WO2014106372A1 (zh) 一种基于金融自助设备的认证方法及装置
US8584202B2 (en) Apparatus and method for determining environment integrity levels
US8850515B2 (en) Method and apparatus for subject recognition session validation
US9159065B2 (en) Method and apparatus for object security session validation
US8584201B2 (en) Method and apparatus for session validation to access from uncontrolled devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13869886

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13869886

Country of ref document: EP

Kind code of ref document: A1