Transaction security method, acceptance device and submission software

A transaction confidentiality and transaction technology, applied in the fields of software and information security, electronics, communications, and finance, it can solve the problems of discounted effects, difficult implementation, too mechanical physical barriers, etc., to achieve easy popularization and application, and unlimited social and economic benefits. , Improve the effect of security and confidentiality functions

Inactive Publication Date: 2011-11-30
杨筑平
View PDF16 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among the above-mentioned technical solutions, the physical barrier method is too mechanical, and its reliability is questionable; the effect of the visual interference method must be discounted; while the biometric, system integration and mobile phone methods all involve changes in the software and hardware systems of transaction equipment and even bank cards and business process reengineering , high cost and difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction security method, acceptance device and submission software
  • Transaction security method, acceptance device and submission software
  • Transaction security method, acceptance device and submission software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] For an embodiment of the invention, see figure 1 . First design the transaction acceptance device, in which MCU1 uses 8051 compatible processor chip, HID keyboard is realized by CY7C63803 controller chip, encryption and decryption 1 functional unit is realized by 8051 processor firmware programming, and wireless communication 1 is realized by a Bluetooth communication module. The transaction accepting device constituted in this way itself is passive, and the power cord of the USB is used as an external power supply to take power directly. On the one hand, the 8051 processor is connected with CY7C63803 by two IO pins, and its firmware programming realizes the I2C bus sending function; on the other hand, it is connected with the Bluetooth communication module by a standard serial port. Use CY7C63803 controller endpoint 0 as the default control endpoint to implement HID and USB protocols, configure endpoint 1 as a HID keyboard (low speed, interrupt mode), program its firm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A transaction confidentiality method, acceptance device and submission software relate to the technical fields of finance, electronics, communication, software and information security. Trading institutions, especially banks' trading terminal equipment (such as ATM, POS) are equipped with wireless transaction acceptance devices. Customers use mobile phones to input transaction information (password and / or amount), and use short-range wireless communication (such as Bluetooth) to establish a confidential channel to send and submit; transaction acceptance The device is configured to automatically identify the HID keyboard, convert the transaction information to generate a key character code sequence, and transmit the simulated keyboard keys to the host of the transaction terminal device, which is equivalent to inputting from a physical keyboard; the key negotiation process bilaterally generates and exchanges random keys, and the transaction acceptance device Randomly generate or transform the exported key, and finally use it to encrypt and decrypt transaction information; limit the valid value range of the character code of the verification key, and shield and not pass invalid character codes; the mobile phone submission software also encrypts and transforms to prevent peeping, effectively protecting the account password; device system No changes to business processes are required.

Description

technical field [0001] The invention relates to the technical fields of finance, electronics, communication, software and information security. Background technique [0002] The electronicization of financial services has penetrated into all aspects of social life. Transaction terminal equipment such as ATMs (automated teller machines) and POS machines can be seen everywhere. Withdraw cash and pay for purchases. However, such convenient financial services have always had security problems, and incidents of criminals stealing bank cards have occurred from time to time, seriously infringing on financial order and customers' money. The basic method of card theft is picking up, stealing, and cloning bank cards, and the key link is to steal customer Mima. The main ways to steal passwords are guessing passwords, recording keystrokes and peeping input. Some lawbreakers even use technological means to cover and arrange fake keyloggers, and secretly install micro-cameras to record...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/00
Inventor 杨霄杨筑平周跃平
Owner 杨筑平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products