Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for verifying upper layer application identity, self-service terminal and application server

A self-service terminal and authorization server technology, which is applied in the field of self-service terminals, can solve the problems of ATM machine fund security threats, lack of verification of upper-level application ATMC software, etc., so as to avoid fund loss and improve security.

Active Publication Date: 2021-08-13
SHENZHEN YIHUA COMP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the ATM terminal cross-platform system of the prior art, as the direct driver SP of the core hardware device, it does not have the function of verifying the identity of the upper-layer application ATMC software, and criminals can easily develop a fake upper-layer application ATMC and install it on ATM terminal, to realize the control of drive SP and movement hardware equipment, has brought a great threat to the capital security of ATM machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying upper layer application identity, self-service terminal and application server
  • Method for verifying upper layer application identity, self-service terminal and application server
  • Method for verifying upper layer application identity, self-service terminal and application server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0036] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for verifying the identity of an upper layer application, a self-service terminal and an application authorization server, relating to the technical field of self-service terminals. Wherein the method includes: if it is detected that the SP driver library is loaded or the cash-out instruction interface is called, then obtain the executable file information of the application program that loads the SP driver library or calls the cash-out instruction interface; according to the executable The file information and the pre-stored authorized executable file rule base verify whether the application program is a legal application; if it is a legal application, the application program is allowed to continue to execute the business process; or, if it is an illegal application, it is suspended According to the business processing flow currently executed by the application program, the method can improve the security of the self-service terminal and avoid the problem of fund loss caused by criminals forging ATMC software to realize the control of SP and core hardware equipment.

Description

technical field [0001] The invention relates to the technical field of self-service terminals, in particular to a method for verifying the identity of an upper layer application, a self-service terminal and an application server. Background technique [0002] In recent years, with the rapid expansion of banking business, the number of ATM machines has increased sharply. According to the "Overall Situation of Payment System Operation in the First Quarter of 2016" published by the central bank, there are 889,800 ATM machines, an increase of 23,100 from the previous quarter. At present, most of these ATM terminals operate on cross-platform software based on the CEN / XFS standard. The CEN / XFS standard is an interface and protocol that is open to the world. ATMC can be installed on the ATM machine. At present, many technologies such as virus infection and U disk transmission can be done. [0003] However, in the ATM terminal cross-platform system of the prior art, as the direct d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51G06F21/44G07F19/00
CPCG06F21/44G06F21/51G06F2221/033G07F19/206
Inventor 谢卫平贺光容沈俊谢兴锋郑明都王庆华胡小敏
Owner SHENZHEN YIHUA COMP