Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Financial POS system against channel Trojan horse attack and its anti-attack implementation method

A POS system and Trojan horse technology, applied in cash registers, instruments, digital data authentication, etc., can solve the problem that the bank card system cannot distinguish and bear responsibilities, and achieve the effect of increasing risks

Inactive Publication Date: 2014-10-29
GUANGZHOU UNIVERSITY +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the attack examples 2 and 3 above, the cardholder was attacked without fault. When the attack example 1 and attack example 4 are added, the existing bank card system cannot distinguish who should bear the responsibility.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Financial POS system against channel Trojan horse attack and its anti-attack implementation method
  • Financial POS system against channel Trojan horse attack and its anti-attack implementation method
  • Financial POS system against channel Trojan horse attack and its anti-attack implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0092] like Figure 7As shown, the financial POS system of a kind of anti-channel Trojan horse attack of the present embodiment comprises POS main board, IC card box, password keyboard, user PIN disk, nonvolatile memory, IC card, and trust management side, described IC card box Be connected with the POS main board, the password keyboard is connected with the IC card box, the POS main board is connected with the trust management side through the I / O interface, and the IC card is connected with the trust management side through the IC card box;

[0093] The password keyboard is used to receive the user's PIN password;

[0094] The user PIN disk is used to display the transaction amount and receive the user PIN password;

[0095] The non-volatile memory is used to store the authorization certificate of the transaction;

[0096] The IC card box, password keyboard, user PIN disk, and IC card are all provided with a password chip;

[0097] The trusted management party shares keys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a financial POS system capable of resisting a channel Trojan attack and an anti-attack implementation method thereof. The system comprises a POS mainboard, an IC card box, a password keyboard, a user PIN disk, a nonvolatile memory, an IC card, and a trust management party. The IC card box is connected to the POS mainboard, the password keyboard is connected to the IC card box, the POS mainboard is connected to the trust management party through an I / O interface, and the IC card is connected to the trust management party through the IC card box. In the present invention, under a condition that a subliminal channel can be reliably shielded on a POS terminal of a dealer and a card holder uses a private user PIN disk to confirm a transaction amount and input a PIN password, the dealer and the card holder can avoid the attack of the channel Trojan.

Description

technical field [0001] The invention relates to the application field of a cryptographic chip used for confidentiality and authentication in information security, in particular to a financial POS system against channel Trojan attacks and an anti-attack implementation method. Background technique [0002] IC cards with cryptographic chips as the core have been widely used in various fields such as finance, telecommunications, transportation, public utilities, government departments, national defense and the military. EMV is a bank IC card specification jointly formulated by the three major international bank card organizations Europay, MasterCard, and VISA. EMV migration refers to the transfer of bank cards from magnetic stripe cards to integrated circuit (IC) cards. The purpose of EMV migration is to replace magnetic stripe cards with IC cards to prevent financial crimes such as making and using fake credit cards, credit card fraud, and transnational financial fraud. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07G1/12G06F21/34G06F21/83G06F21/31
CPCG06F21/62
Inventor 邹候文唐韶华唐春明张世渡苏胡双
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products