Trusted payment computer system

A computer system and computer technology, applied in the field of information security, can solve the problems of inconvenience for users, error-prone, reduced ease of use of electronic payment services, etc., and achieve the effects of enhancing ease of use, preventing attacks and ensuring security.

Inactive Publication Date: 2010-06-16
TSINGHUA TONGFANG CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the entered account number and password appear in clear text in the payment terminal computer, it is very vulnerable to security attacks
Moreover, because the user often needs to input a very long number string, it is easy to make mistakes, which reduces the ease of use of electronic payment services and is not convenient for users to use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted payment computer system
  • Trusted payment computer system
  • Trusted payment computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] see Figure 1 to Figure 4 , the invention includes sequentially connected input device, trusted computer host, output device and trusted card swiping device interconnected with trusted computer host through USB-HID interface. The input device is the keyboard and mouse, and the output device is the monitor. The trusted card-swiping device is connected to the trusted computer host through the USB-HID protocol as a separate USB device, or is integrated with the PC keyboard and connected to the USB-HUB in parallel, and then connected to the trusted computer host through the USB-HID protocol. The TCM chip is embedded in the trusted computer host as the trusted measurement root, trusted reporting root and trusted storage root, and the trusted measurement system inside the trusted computer host measures TCM step by step——trusted BIOS——MBR——OS Kernel And trusted monitoring program - PE file integrity. The software system installed on the trusted computer host includes a TCM m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A trusted payment computer system relates to the technical field of information security. The system comprises input equipment, a trusted computer mainframe, output equipment and trusted card reading equipment, wherein the input equipment, the trusted computer mainframe and the output equipment are connected in sequence; and the trusted card reading equipment is connected with the trusted computer mainframe by a USB-HID interface. The input equipment includes a keyboard and a mouse and the output equipment is a display. The system is characterized in that TCM chips are embedded in the trusted computer mainframe to serve as the root of trust for measurement, the root of trust for reporting and the root of trust for storage. A system of trust for measurement inside the trusted computer mainframe completes the following step-by-step measurement: measurement of integrity carried out on trusted BIOS by TCM, measurement of integrity carried out on MBR by trusted BIOS, measurement of integrity carried out on OS Kernel by MBR and measurement of integrity carried out on a PE file by a trusted monitoring program. A software system installed on the trusted computer mainframe contains a TCM management program, a trusted card reading equipment management program and a payment transaction management program. The system is convenient and easy to use and can reliably ensure the security of the whole trusted payment transaction.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a trusted payment computer system. Background technique [0002] With the vigorous development of the electronic payment industry, in order to ensure the security of electronic payment, many security measures have been applied to various payment links. Adding a password to an account is the simplest and least secure method. Phishing, fake websites, fraudulent text messages, etc. can easily defraud users' accounts and passwords. A keyboard sniffer can steal a user's username and password by recording the user's keystrokes. In order to prevent the above attacks, browser security controls and soft keyboard technology were born, but the ever-evolving rootkit attack technology can still break through this defense measure. Digital certificate technology is currently the most secure identity authentication technology, but the confidential storage of asymmetric public and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/00G07F7/10
Inventor 刘锋周培军赵珍李术亮
Owner TSINGHUA TONGFANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products