Data safety protection method and device

A security protection device and security protection technology, applied in the field of data security protection methods and devices, can solve the problems of poor security of POS machines, easy to be attacked by hackers, stealing passwords, etc., to prevent data from being stolen and improve data security Effect

Inactive Publication Date: 2017-07-28
上海汇尔通信息技术有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Usually, the application side runs the Android system, which is an open system with many loopholes and is easy to be attacked by hackers.
and have figure 1 The POS machine with the structure shown must forward the password entered by the cardholder on the touch screen to the security termin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data safety protection method and device
  • Data safety protection method and device
  • Data safety protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] This embodiment provides a data security protection method, including:

[0062] S1. When the safety terminal 6 receives the ready-to-input safety data signal from the input terminal 4, cut off the communication connection between the input terminal 4 and the application terminal 5, and establish the communication connection between the input terminal 4 and the safety terminal 6; The data signal is a card swiping signal;

[0063] Among them, the method of cutting off the communication connection between the input terminal 4 and the application terminal 5, and establishing the communication connection between the input terminal 4 and the safety terminal 6 includes the following implementation methods:

[0064] The first implementation mode: obtain the level control signal from the safety terminal 6; control the analog switch to cut off the communication connection between the input terminal 4 and the application terminal 5 according to the level control signal, and establ...

Embodiment 2

[0069] like Figure 4 As shown, this embodiment provides a data security protection device, including a switching module 1 and a building module 2, a display terminal 3, an input terminal 4, an application terminal 5 and a security terminal 6;

[0070] The switching module 1 is configured to cut off the communication connection between the input terminal 4 and the application terminal 5 and establish the communication connection between the input terminal 4 and the security terminal 6 when the safety terminal 6 receives a signal ready to input safety data from the input terminal 4 ;

[0071] The establishment module 2 is used to establish a communication connection between the input terminal 4 and the application terminal 5 when the security terminal 6 receives the data input completion signal from the input terminal 4;

[0072] The display terminal 3 is used for displaying the processing result of the application terminal or displaying a user interface.

Embodiment 3

[0074] This embodiment provides a data security protection device, including a switching module 1, a display terminal 3, an input terminal 4, an application terminal 5, and a security terminal 6; the display terminal 3 is used to display processing results of the application terminal or display a user interface.

[0075] Among them, the input terminal 4 includes input devices such as touch screen and keyboard; the security terminal 6 includes a security CPU that conforms to UPTS or PCI specifications, such as Freescale’s K21 / K81, MAXIM’s MAX32555, Broadcom’s BCM58101, and Zhaoxun’s MH1902; the application terminal 5 includes General-purpose CPUs that can run Android or Linux, such as Qualcomm processor MSM8909, MTK processor X30, Huawei's Kirin processor;

[0076] Wherein, the switching module 1 has the following implementation methods:

[0077] like Figure 5 As shown, the first implementation is that the switching module 1 includes a first acquisition unit 11 and a first co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information security, in particular to a data safety protection method and device. According to the data safety protection method and device, when a safety terminal receives a to-be-input safety data signal from an input terminal, the communication between the input terminal and an application terminal is built, and the communication between the input terminal and the safety terminal is built. Before a user inputs safety data, the communication between the input terminal and the application terminal is cut off, even if the application terminal is attacked by a cracker, the input signal generated by the input terminal can not be obtained, data theft is thus effectively prevented, and the data safety is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a data security protection method and device. Background technique [0002] At present, the structure of most POS machines on the market is as follows: figure 1 As shown, it includes an input terminal (touch screen), a display terminal (LCD screen), an application terminal, and a security terminal; wherein, the application terminal includes an application processor, which is used to process data at a normal security level, such as obtaining input signals from the input terminal (users pass data input by the touch screen), display information on the display screen, etc.; the security end includes a security processor, storage, and encryption and decryption hardware, etc., and all software and hardware in the security end are closed, controlled, and credible, and are used for processing Data with high security level, such as reading IC card, magnetic card and contactless smart ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/606
Inventor 林培春蔡锋
Owner 上海汇尔通信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products