WO2018165921A1 - Procédé et dispositif d'entrée sécurisée de mot de passe de machine de pos - Google Patents
Procédé et dispositif d'entrée sécurisée de mot de passe de machine de pos Download PDFInfo
- Publication number
- WO2018165921A1 WO2018165921A1 PCT/CN2017/076812 CN2017076812W WO2018165921A1 WO 2018165921 A1 WO2018165921 A1 WO 2018165921A1 CN 2017076812 W CN2017076812 W CN 2017076812W WO 2018165921 A1 WO2018165921 A1 WO 2018165921A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- pos machine
- input
- security
- security chip
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000010586 diagram Methods 0.000 description 14
- 238000012795 verification Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 8
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 230000008054 signal transmission Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
Definitions
- the present invention relates to the field of POS terminal technology, and in particular, to a password security input method and apparatus in a POS machine.
- the security of the android system is slowly accepted by the payment industry, and is used to express the full touch screen of the smart POS terminal, the full touch screen intelligent POS terminal is Intelligent POS terminal based on Internet and cloud computing, integrating secure payment, full acceptance, membership marketing, P0S
- a primary object of the present invention is to provide a cryptographic security input method and apparatus in a POS machine, which aims to enhance the security of use of the POS machine.
- the present invention provides a password security input method in a POS machine, wherein the POS machine is provided with a security chip and a POS machine operation processor, and the password security input method includes the following steps:
- the operating system of the POS operating system based on the POS running processor receives the password input command ⁇ , and switches the input signal of the touch screen to the security chip;
- the password information is encrypted and sent to the POS machine running processor.
- the step of switching the input signal of the touch screen into the security chip includes:
- the step of switching the input signal of the touch screen to the security chip includes: [0012] controlling the display interface of the operating system end of the POS machine to switch to the password input display state.
- the method includes:
- the password information is encrypted and then sent to the POS machine, and the step of running the processor includes:
- the present invention also provides a password security input device in a POS machine, wherein the POS machine is provided with a security chip and a POS machine running processor, and the password security input device includes:
- a switching unit configured to receive a password input command by the POS operating system running the processor based on the POS, and switch the input signal of the touch screen to the security chip;
- an obtaining unit configured to acquire, by using the security chip, password information input by the touch screen
- the processing unit is configured to encrypt the password information after the password input is completed, and then send the password information to the POS operation processor.
- the switching unit is specifically configured to:
- the switching unit is further configured to:
- the acquiring unit is further configured to:
- the device further includes:
- the clearing unit is configured to clear the plaintext password cache that the security chip obtains the password information.
- the password security input method and apparatus in the POS machine provided by the present invention have the following beneficial effects: [0031] The password security input method and apparatus in the POS machine provided by the present invention, based on the POS machine running the processor After the POS machine operating system receives the password input command, the input signal of the touch screen is switched to the security chip; the password information input by the touch screen is obtained by the security chip; after the password input is completed, the password information is encrypted and sent to The POS machine runs the processor; after the user inputs the password, the security chip obtains the password information, prevents the password information from being stolen, and enhances the security of the POS machine.
- FIG. 1 is a schematic diagram showing the steps of a password security input method in a POS machine according to an embodiment of the present invention
- FIG. 2 is a schematic diagram showing the steps of a password security input method in a POS machine according to another embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of a password security input device in a POS machine according to an embodiment of the present invention
- FIG. 4 is a schematic structural diagram of a password security input device in a POS machine according to another embodiment of the present invention.
- FIG. 1 is a schematic diagram of steps of a password security input method in a POS machine according to an embodiment of the present invention.
- a password security input method in a POS machine is provided.
- the POS machine is provided with a security chip and a POS machine running processor.
- the password security input method includes the following steps:
- Step S1 the POS machine operating system based on the POS running processor receives the password input command, and switches the input signal of the touch screen to the security chip;
- Step S2 acquiring, by using the security chip, password information input by the touch screen;
- Step S3 After the password input is completed, the password information is encrypted and sent to the P0S machine running processor.
- the POS machine is a full touch screen payment terminal of an android (Android) system based on a linux kernel.
- an android surfaceflinger graphical interface is displayed on the touch screen.
- the user uses the POS machine to make payment and enters the corresponding password input interface, the user touches the corresponding area on the screen to issue a password input command, and the POS machine switches all input signals of the touch screen to the security chip, that is, The POS machine running processor can not receive the password information input by the touch screen, and the Trojan program cannot steal the user's password information from the android system.
- the POS machine obtains the password information input by the touch screen through the above security chip, and the security chip and the Android system are independent of each other, and the Trojan horse program cannot enter the security chip to ensure the security of the password information.
- the security chip encrypts the password information and then sends it to the POS machine to run the processor.
- the password is verified on the android system. If the verification is passed, the payment is made. If the verification fails, the password is verified through the touch screen. .
- the security chip is a trusted platform module, and is a device capable of independently performing key generation, encryption and decryption, and has an independent processor and a storage unit, and can store key and feature data. , providing encryption and security authentication services. Encrypted with a security chip, the keys are stored in hardware, and the stolen data cannot be decrypted, thereby protecting business privacy and data security.
- the function of the security chip is equivalent to a "safe".
- the important password data is stored in the security chip.
- the security chip communicates with the POS operating system based on the POS machine running the processor through the SPI bus. According to the principle of the security chip. Since the password data can only be output, but cannot be input, the encryption and decryption operations are completed inside the security chip, and only the result is output to the upper layer, thereby avoiding the chance that the password is cracked.
- the security chip may also be a general processor that is different from the POS machine running the processor, that is, two processors are disposed in the POS machine, and one processor is used to run the POS operation.
- the system, the other processor is used for the password input, obtains the password information, and is encrypted and sent to the processor running the POS operating system, which is substantially the same as the above embodiment, and will not be described herein.
- the password security input method in the POS machine provided in the embodiment of the present invention, the POS machine operating system based on the POS machine running processor receives the password input command, and switches the input signal of the touch screen to the security chip; The security chip obtains the password information input by the touch screen; after the password input is completed, the password information is encrypted and sent to the POS machine to run the processor; after the user inputs the password, the security chip obtains the password information to avoid the password information. Stealed, enhanced POS security.
- step S1 of switching the input signal of the touch screen into the security chip is as follows:
- the touch screen is provided with a signal data line.
- one end of the signal data line is connected to the touch screen, and the other end is connected to the POS running processor, and the other end can also be connected to the security chip.
- the signal data line of the touch screen is connected to the POS machine running processor, and when the POS machine operating system receives the password input command, the signal data line of the control touch screen is switched and connected to the security chip. Therefore, the signal transmission between the touch screen and the running processor of the POS machine is cut off, and the data acquired by the touch screen is all transmitted to the security chip, and even if the operating system hits the Trojan, the password information input by the user touching the screen cannot be obtained, and the password is avoided. Information is stolen and POS security is enhanced.
- the step S1 of switching the input signal of the touch screen to the security chip includes: [0054] controlling the display interface of the operating system end of the POS machine to switch to the password input display state.
- the card user When the card user is required to input a password, enter the card user password input state, the signal data of the touch screen The line is connected to the security chip, and the security chip sends the control information to the linux kernel of the application POS operating system to switch to the password input display state, so that the display content of the original application is not destroyed.
- step S2 of acquiring the password information input by the touch screen by the security chip includes:
- [0057] Sending an instruction without a plaintext PIN to the operating system end of the POS machine, and displaying the password in a password invisible manner on the display interface of the operating system end of the POS machine.
- the security chip obtains the input data of the touch screen, analyzes which key the user presses, presses the key, and sends an instruction without the plaintext PIN to the Linux kernel of the operating system, and the linux kernel update password input "*" at the operating system end of the POS machine. No., the password is displayed invisible in the password.
- the password information input by the touch screen is obtained by the security chip, a text input keyboard is provided in a password input interface of the touch screen, and the user inputs the account information by pressing a corresponding character on the keyboard;
- the entered password is encrypted and displayed, for example, the password is displayed as a special character such as "*" to prevent the screen from stealing the password.
- the text input keyboard inputs a password corresponding to the payment account, and the input characters are randomly displayed in the text input keyboard, so that the order of each display is different.
- the input method input characters on the POS machine are sorted according to the input characters on the keyboard.
- the input characters are randomly displayed in the text input keyboard, which means that the input characters on the keyboard are re-randomly randomized.
- the order of each display is different, so that the password input by the user can be obtained according to the position where the user clicks the text input keyboard, thereby further ensuring the security of the password input by the user.
- the password information is encrypted and then sent to the POS machine to run the processor, and the step S3 includes:
- Step S4 Clear the plaintext password cache of the security chip to obtain the password information. After the card user password is entered, the plaintext password is encrypted by using the password encryption key inside the security chip, and the plaintext password cache of the password information is also cleared.
- the security chip after the security chip obtains the password information, it does not send it to the POS machine to run the processor for verification, but performs password verification directly in the security chip, and then sends the verification result to the POS based verification.
- the machine runs the processor's POS operating system.
- the fingerprint data may be transmitted to the security chip after the fingerprint data is collected, and the fingerprint data of the fingerprint identifier is cut off. The POS machine runs the channel of the processor.
- a password security input device in the POS machine is further provided in the embodiment of the present invention.
- a password security input device in a POS machine is provided.
- the POS device is provided with a security chip and a POS machine running processor, and the password security input device includes:
- the switching unit 10 is configured to: after receiving the password input command by the POS operating system running the processor based on the POS machine, switching the input signal of the touch screen to the security chip;
- the obtaining unit 20 is configured to acquire, by using the security chip, password information input by the touch screen;
- the processing unit 30 is configured to encrypt the password information after the password input is completed, and then send the password information to the POS running processor.
- the POS running processor is a processor running by an operating system of the POS, that is, a central processing unit in which the POS device operates.
- the POS machine is a full touch screen payment terminal of the android kernel based android system.
- the android surface flinger graphical interface is displayed on the touch screen.
- the user uses the POS machine to make payment and enters the corresponding password input interface, the user touches the corresponding area on the screen to issue a password input command, and the POS machine switches all input signals of the touch screen to the security chip, that is,
- the POS machine running processor can not receive the password information input by the touch screen, and the Trojan program cannot steal the user's password information from the android system.
- the POS machine obtains the password information input by the touch screen through the above security chip, and the security chip and the security system are independent of each other, and the Trojan horse program cannot enter the security chip to ensure the security of the password information.
- the security chip encrypts the password information and then sends it to the POS machine to run the processor.
- the password is verified on the android system. If the verification is passed, the payment is made. If the verification fails, the password is verified through the touch screen. .
- the security chip is a trusted platform module, and is a device capable of independently performing key generation, encryption and decryption, and has an independent processor and a storage unit internally, and can store key and feature data. , providing encryption and security authentication services. Encrypted with a security chip, the keys are stored in hardware, and the stolen data cannot be decrypted, thereby protecting business privacy and data security.
- the role of the security chip is quite In a "safe", important password data is stored in the security chip.
- the security chip communicates with the POS operating system based on the POS machine running the processor through the SPI bus. According to the principle of the security chip, the password data can only be output. , and can not be input, so the encryption and decryption operations are completed inside the security chip, and only the results are output to the upper layer, avoiding the chance that the password is cracked.
- the security chip may also be a general processor that is different from the POS machine running the processor, that is, two processors are disposed in the POS machine, and one processor is used to run the POS operation.
- the system, the other processor is used for the password input, obtains the password information, and is encrypted and sent to the processor running the POS operating system, which is substantially the same as the above embodiment, and will not be described herein.
- the password security input device in the POS machine provided in the embodiment of the present invention, the POS machine operating system based on the POS machine running processor receives the password input command, and the switching unit 10 switches the input signal of the touch screen to the security chip.
- the obtaining unit 20 acquires the password information input by the touch screen through the security chip; after the password input is completed, the processing unit 30 encrypts the password information and sends the password information to the POS machine to run the processor; after the user inputs the password,
- the password information is obtained by the security chip to prevent the password information from being stolen and enhance the security of the POS machine.
- the switching unit 10 is specifically configured to:
- the touch screen is provided with a signal data line.
- one end of the signal data line is connected to the touch screen, and the other end is connected to the POS running processor, and the other end can also be connected to the security chip.
- the signal data line of the touch screen is connected to the POS machine running processor, and when the POS machine operating system receives the password input command, the signal data line of the control touch screen is switched and connected to the security chip. Therefore, the signal transmission between the touch screen and the running processor of the POS machine is cut off, and the data acquired by the touch screen is all transmitted to the security chip, and even if the operating system hits the Trojan, the password information input by the user touching the screen cannot be obtained, and the password is avoided. Information is stolen and POS security is enhanced.
- the switching unit 10 is further configured to:
- the card user When the card user is required to input a password, enter the card user password input state, the signal data line of the touch screen is connected to the security chip, and the control chip sends the control information to the application POS operating system through the security chip.
- the linux kernel switches to the password input display state, so that the display content of the original application is not destroyed.
- the obtaining unit 20 is further configured to:
- [0080] Sending an instruction without a plaintext PIN to the operating system end of the POS machine, and displaying the password in a password invisible manner on the display interface of the operating system end of the POS machine.
- the security chip obtains the input data of the touch screen, analyzes which key the user presses, presses the key, and sends an instruction without the plaintext PIN to the Linux kernel of the operating system, and the linux kernel update password input "*" at the operating system end of the POS machine. No., the password is displayed invisible in the password.
- the password information input by the touch screen is obtained by the security chip, a text input keyboard is provided in a password input interface of the touch screen, and the user inputs the account information by pressing a corresponding character on the keyboard;
- the entered password is encrypted and displayed, for example, the password is displayed as a special character such as "*" to prevent the screen from stealing the password.
- the text input keyboard inputs a password corresponding to the payment account, and the input characters are randomly displayed in the text input keyboard, so that the order of each display is different.
- the input method input characters on the POS machine are sorted according to the input characters on the keyboard.
- the input characters are randomly displayed in the text input keyboard, which means that the input characters on the keyboard are re-randomly randomized.
- the order of each display is different, so that the password input by the user can be obtained according to the position where the user clicks the text input keyboard, thereby further ensuring the security of the password input by the user.
- the apparatus further includes:
- the clearing unit 40 is configured to clear the plaintext password cache that the security chip obtains the password information. After the card user enters the password, the password is encrypted inside the security chip using the password encryption key.
- the security chip after the security chip obtains the password information, it does not send it to the POS machine to run the processor for verification, but performs password verification directly in the security chip, and then sends the verification result to the POS-based authentication.
- the machine runs the processor's POS operating system.
- the fingerprint data may be transmitted to the security chip after the fingerprint data is collected for payment, and the fingerprint data of the fingerprint identifier is cut off.
- the POS machine runs the channel of the processor.
- the password security input method and device in the POS machine provided in the embodiment of the present invention, the POS machine operating system based on the POS machine running processor receives the password input command, and the switching unit 10 will touch the screen.
- the input signal is switched to the security chip; the obtaining unit 20 acquires the password information input by the touch screen through the security chip; after the password input is completed, the processing unit 30 encrypts the password information and sends the password information to the POS machine for processing.
- the security chip obtains the password information, avoids the password information being stolen, and enhances the security of the POS machine.
- the present invention includes apparatus related to performing one or more of the operations described herein.
- These devices may be specially designed and manufactured for the required purposes, or may also include known devices in a general purpose computer.
- These devices have computer programs stored therein that are selectively activated or reconfigured.
- Such computer programs may be stored in a device (eg, computer) readable medium or in any type of medium suitable for storing electronic instructions and respectively coupled to a bus, including but not limited to any Types of disks (including floppy disks, hard disks, CDs, CD-ROMs, and magneto-optical disks), ROM (Read-Only Memory, read-only memory), RAM (Random Access Memory), EPROM (Erasable)
- a readable medium includes any medium that is stored or transmitted by a device (e.g., a computer) in a readable form.
- each block of the block diagrams and/or block diagrams and/or flow diagrams can be implemented with computer program instructions, and/or in the block diagrams and/or block diagrams and/or flow diagrams.
- Those skilled in the art will appreciate that these computer program instructions can be implemented by a general purpose computer, a professional computer, or a processor of other programmable data processing methods, such that the processor is executed by a computer or other programmable data processing method.
- the block diagrams and/or block diagrams of the invention and/or the schemes specified in the blocks or blocks of the flow diagram are invented.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Cash Registers Or Receiving Machines (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
L'invention a trait à un procédé et un dispositif d'entrée sécurisée de mot de passe de machine de POS, le procédé comprenant les étapes consistant : lorsqu'un système d'exploitation de machine de POS basé sur un processeur de traitement de machine de POS reçoit une instruction d'entrée de mot de passe, à faire passer un signal d'entrée d'un écran tactile sur une puce sécurisée (S1) ; à obtenir des informations de mot de passe d'une entrée d'écran tactile par l'intermédiaire de la puce sécurisée (S2) ; et, quand une entrée de mot de passe est terminée, à chiffrer les informations de mot de passe et à les envoyer au processeur de traitement de machine de POS (S3). Le procédé empêche le vol des informations de mot de passe, et renforce la sécurité d'utilisation de la machine de POS.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/076812 WO2018165921A1 (fr) | 2017-03-15 | 2017-03-15 | Procédé et dispositif d'entrée sécurisée de mot de passe de machine de pos |
CN201780001538.6A CN108521822A (zh) | 2017-03-15 | 2017-03-15 | Pos机中的密码安全输入方法及装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/076812 WO2018165921A1 (fr) | 2017-03-15 | 2017-03-15 | Procédé et dispositif d'entrée sécurisée de mot de passe de machine de pos |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018165921A1 true WO2018165921A1 (fr) | 2018-09-20 |
Family
ID=63434481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/076812 WO2018165921A1 (fr) | 2017-03-15 | 2017-03-15 | Procédé et dispositif d'entrée sécurisée de mot de passe de machine de pos |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108521822A (fr) |
WO (1) | WO2018165921A1 (fr) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN209471528U (zh) * | 2019-03-26 | 2019-10-08 | 百富计算机技术(深圳)有限公司 | 一种安全切换装置及pos机 |
CN112231735A (zh) * | 2020-11-02 | 2021-01-15 | 北京蜂窝科技有限公司 | 一种数据传输方法及系统 |
CN112462980B (zh) * | 2020-12-15 | 2021-07-20 | 深圳市捷诚技术服务有限公司 | 密码防截取方法、装置及pos机 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101000703A (zh) * | 2006-11-30 | 2007-07-18 | 上海麦柯信息技术有限公司 | 可保证信息传输机密性与完整性的电子支付终端 |
CN103136668A (zh) * | 2011-11-28 | 2013-06-05 | 中兴通讯股份有限公司 | 终端支付方法、终端和支付平台 |
CN105761389A (zh) * | 2016-02-02 | 2016-07-13 | 上海动联信息技术股份有限公司 | 一种全通道的智能pos机 |
CN106096961A (zh) * | 2016-06-13 | 2016-11-09 | 上海盛本智能科技股份有限公司 | 智能pos终端双芯片安全触控输入系统及其实现方法 |
CN106169091A (zh) * | 2016-07-03 | 2016-11-30 | 恒宝股份有限公司 | 一种金融卡及其使用方法 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7815107B2 (en) * | 2005-07-25 | 2010-10-19 | Blackhawk Network, Inc. | Payment program for use in point-of-sale transactions |
CN101359991A (zh) * | 2008-09-12 | 2009-02-04 | 湖北电力信息通信中心 | 基于标识的公钥密码体制私钥托管系统 |
CN104009963B (zh) * | 2013-02-26 | 2019-05-10 | 中国银联股份有限公司 | 远程密码的安全认证机制 |
CN104156642B (zh) * | 2014-07-22 | 2019-04-09 | 杭州晟元数据安全技术股份有限公司 | 一种基于安全触控屏控制芯片的安全密码输入系统和方法 |
CN105426790A (zh) * | 2015-11-18 | 2016-03-23 | 北京微智全景信息技术有限公司 | 一种基于触摸屏的密码安全输入方法及装置 |
CN205721819U (zh) * | 2016-04-28 | 2016-11-23 | 湖南美景创意文化建设有限公司 | 基于nfc感应实时交互式数字化三维标识 |
-
2017
- 2017-03-15 WO PCT/CN2017/076812 patent/WO2018165921A1/fr active Application Filing
- 2017-03-15 CN CN201780001538.6A patent/CN108521822A/zh active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101000703A (zh) * | 2006-11-30 | 2007-07-18 | 上海麦柯信息技术有限公司 | 可保证信息传输机密性与完整性的电子支付终端 |
CN103136668A (zh) * | 2011-11-28 | 2013-06-05 | 中兴通讯股份有限公司 | 终端支付方法、终端和支付平台 |
CN105761389A (zh) * | 2016-02-02 | 2016-07-13 | 上海动联信息技术股份有限公司 | 一种全通道的智能pos机 |
CN106096961A (zh) * | 2016-06-13 | 2016-11-09 | 上海盛本智能科技股份有限公司 | 智能pos终端双芯片安全触控输入系统及其实现方法 |
CN106169091A (zh) * | 2016-07-03 | 2016-11-30 | 恒宝股份有限公司 | 一种金融卡及其使用方法 |
Also Published As
Publication number | Publication date |
---|---|
CN108521822A (zh) | 2018-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6239788B2 (ja) | 指紋認証方法、装置、インテリジェント端末及びコンピュータ記憶媒体 | |
KR102322118B1 (ko) | 월렛 앱이 설치된 소유 디바이스 및/또는 블록체인 노드에 키를 분산 저장하는 비밀 키 보안 방법 | |
CN104243451B (zh) | 一种信息交互方法、系统和智能密钥设备 | |
US7861015B2 (en) | USB apparatus and control method therein | |
CN102419805B (zh) | 一种终端设备及其用户信息加密方法 | |
US20160057136A1 (en) | Computer network system with single-key quick secure login function | |
WO2017028711A1 (fr) | Procédé pour traiter des données, équipement électronique pouvant être porté et système | |
GB2512595A (en) | Integrated contactless mpos implementation | |
CN103886234A (zh) | 一种基于加密硬盘的安全计算机及其数据安全控制方法 | |
TW201539247A (zh) | 密碼輸入與確認方法及其系統 | |
CN103971071B (zh) | 防止输入数据被侧录的计算机网络系统 | |
WO2013167043A2 (fr) | Procédé et dispositif de vérification de sécurité des données | |
CN101335754B (zh) | 一种利用远程服务器进行信息验证的方法 | |
US20100031045A1 (en) | Methods and system and computer medium for loading a set of keys | |
TW201108696A (en) | Account identification system, method and peripheral device of performing function thereof | |
KR101792220B1 (ko) | 생체 인증 결합 사용자 간편 인증 방법, 이를 위한 인증 어플리케이션이 탑재된 사용자 모바일 단말기, 인증 서비스 장치 및 컴퓨터 프로그램 | |
TW201223225A (en) | Method for personal identity authentication utilizing a personal cryptographic device | |
TW202036384A (zh) | 具有身分驗證的加密晶片 | |
TWI739778B (zh) | 作業系統之登入機制 | |
WO2020063435A1 (fr) | Carte à puce | |
WO2018165921A1 (fr) | Procédé et dispositif d'entrée sécurisée de mot de passe de machine de pos | |
CN200993803Y (zh) | 网上银行系统安全终端 | |
CN101206779A (zh) | 网上银行系统安全终端及其数据安全处理方法 | |
CN105426727A (zh) | 指纹解密方法及移动终端 | |
CN102957541A (zh) | 一种基于saas的密码加密方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17900822 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 17/01/2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17900822 Country of ref document: EP Kind code of ref document: A1 |