Enter Peripheral Security
A technology for peripheral equipment and input commands, applied in the input/output process of data processing, protection of internal/peripheral computer components, transmission systems, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] First refer to figure 1 , shows a schematic diagram of a banking system for keypad security on an automated teller machine (ATM) according to an exemplary embodiment. It should be noted, however, that the components are shown schematically in a greatly simplified form and only those components that are relevant for understanding the illustrated embodiment are shown.
[0035] Also, for illustration purposes only, depicting ( figure 1 ), and the arrangement in which the components are presented. It should be noted, however, that more or fewer components may be arranged in other ways without departing from the teachings of input peripheral security presented herein and below.
[0036] The banking system 100 includes a bank branch 110 , an ATM host / switch 130 and a core banking system 140 . The bank branch 110 includes: ATM 111 and branch server 120 .
[0037] ATM 111 includes one or more central processing units (CPUs) 112, memory 113 and hard disk drives (HD) 115 (whi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


