Keyboard encrypting method

An encryption method and keyboard technology, which is applied to the data security of ATM operating keyboards and the field of ATM operating keyboards, can solve the problems of user account and password confidentiality data confidentiality, and achieve the effect of preventing data leakage and theft and improving data security.

Active Publication Date: 2007-12-26
SHENZHEN ZHENGTONG ELECTRONICS
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that the ATM operation keyboard needs to effectively prevent data leakage and theft, and ensure the data security of the keyboard operation. The above-mentioned existing keyboards cannot solve this problem well, and there is still the possibility of confidential data such as user account numbers and passwords being lost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyboard encrypting method
  • Keyboard encrypting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The preferred embodiments of the present invention shown in the accompanying drawings will be described in detail below.

[0025] The metal encryption keyboard for an ATM terminal realized by the keyboard encryption method of the present invention includes a panel, a liner, a sealing gasket, a conductive rubber key board, and the keys are electrically connected to the printed circuit board and the base, and the panel is connected to the base. The base surrounds a keyboard cavity, the cavity is provided with a printed circuit board for keyboard processing and a power supply battery, the panel is provided with openings, and each key protrudes from the openings, and also includes a panel located between the panel and the lining. The protection small axis between the boards; the keyboard processing printed circuit board can be divided into a security function processing part and a non-secret function processing part, and the security function processing part is closed with a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Word of the keyboard said in the invention includes print circuit board for processing keyboard. The invention uses following security measure for the keyboard: print circuit board in use for processing keyboard is divided into a part for processing function of secrecy, and a part for processing not confidential function. A mechanism for protecting secrecy information is setup on the keyboard to surround physical space of the part for processing function of secrecy. Once the mechanism gives signal to show that secrecy information meets with attack, secrecy information inside the part for processing function of secrecy is destroyed. A mechanism for protecting keyboard body is setup on the keyboard. Once the mechanism gives signal to show that keyboard meets with attack, the said secrecy information is also destroyed. The secrecy information includes at least a cipher key, and program run on microprocessor includes DES algorithm. The invention raises data security of keyboard operation.

Description

technical field [0001] The present invention relates to financial equipment, in particular to an ATM (automatic teller machine) operating keyboard, and in particular to a data security method for the ATM operating keyboard. Background technique [0002] The existing banking system usually consists of three parts: host, terminal and network to form a huge network banking system. Bank key management software is usually installed in the mainframe of the bank or in the front-end server, and terminal processing software is installed in the bank terminal. The mainframe and the terminal are connected through the network, the data format follows the IS08583 standard, and there is a network encryption mechanism. . From the network point of view, this system is quite safe on the surface, but from the perspective of relevant professionals who conduct internal debugging of bank terminals, there are considerable security risks: because existing bank terminals, such as ATM machines, have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/02G06F1/00G07F19/00
Inventor 谢立民黄洪
Owner SHENZHEN ZHENGTONG ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products