Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Transaction protection method, transaction accepting device and transaction submitting device

A technology of transaction and transaction terminal, which is applied in the fields of communication, electronics, finance, software and information security, and can solve problems that have not been seen, cannot be effectively prevented, neglected and forgotten, etc.

Inactive Publication Date: 2014-02-26
杨筑平
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, in addition to the above-mentioned security issues of stealing passwords, there are two security issues to face: one is negligence and forgetting, the cardholder inserts the card for transactions (withdrawal, transfer, etc.), forgets to withdraw the card, and others follow up after leaving. The second is violent snatching, where gangsters wait for the cardholder to enter the password, and take the opportunity to violently crowd out and force withdrawals and transfers, while the victim is weak and unable to resist, watching the money being robbed
There are real cases in these two situations. Although the bank has video surveillance, it can only be investigated afterwards, and it cannot be effectively prevented. At present, there are no other practical and applicable technical solutions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction protection method, transaction accepting device and transaction submitting device
  • Transaction protection method, transaction accepting device and transaction submitting device
  • Transaction protection method, transaction accepting device and transaction submitting device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] For an embodiment of the invention, see figure 1 . First design the transaction acceptance device (2), wherein the control unit (23) adopts an 8051 compatible processor chip, the positioning unit (21) adopts a GPS module containing an antenna to connect the processor chip with a serial port, and the communication unit (22) adopts a bluetooth communication module and also uses a The serial port is connected to the processor chip, the interface unit (24) is configured as the standard keyboard interface (115) of the standard PS / 2 keyboard interface chip connected to the processor chip externally connected to the transaction host (11), and the security unit (25) is realized by the processor firmware programming Encrypt and decrypt functions and store keys. The transaction accepting device constituted in this way is passive, connected to the standard keyboard interface (115) of the transaction host (11), and obtains electric energy from the power line of the interface. For f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a transaction protection method, a transaction accepting device and a transaction submitting device, which relate to the technical fields of finance, electronics, communications, software and information security. A transaction mechanism, especially a piece of bank transaction terminal equipment (such as an ATM and a POS) is equipped with a supporting wireless transaction accepting device, a customer mobile phone inputs transaction information (a password and / or the amount of cash), and a secure channel is established in a short-range wireless communication mode (such as Bluetooth) to send and submit the transaction information. The accepting device is configured to automatically identify a keyboard interface, convert the transaction information to generate a keyboard scanning code sequence and simulate a keyboard key to transfer the keyboard scanning code sequence to a transaction host, which is equivalent to input from a code keyboard. The position (GPS) distance between the accepting device and the submitting device is monitored and calculated at any time and external sound is monitored and sensed, and when the distance exceeds a limit, voice alarm is carried out and a channel is interrupted, a cancel command is sent to transaction terminal equipment, which is equivalent to cancel of the current transaction by pressing a cancel key on the code keyboard. The password and account are protected, and troubles caused by negligence, oblivion and forcible robbery are avoided; and both the equipment system and the business process do not need to be changed.

Description

technical field [0001] The invention relates to the technical fields of finance, electronics, communication, software and information security. Background technique [0002] Electronic financial services, bank ATM (automatic teller machine), POS machine and other transaction terminal equipment can be seen everywhere, people hold bank cards (credit cards, debit cards), they can withdraw cash from their bank accounts at any time, transfer payment. However, such a convenient financial service has potential safety hazards. Incidents of criminals stealing bank cards occur from time to time, seriously infringing on financial order and customers' money. Card theft methods include picking up, stealing, and cloning bank cards, and the key link is stealing customer passwords. Lawbreakers even use high-tech means to cover and arrange fake keylogging keys, secretly install miniature cameras to spy on input, and steal customer passwords. In order to solve the bank card password securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/382
Inventor 杨霄杨筑平周跃平
Owner 杨筑平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products