Confidentiality input equipment for financial industry

An input device and industry technology, applied in the input/output of user/computer interaction, the input/output process of data processing, the protection of internal/peripheral computer components, etc., can solve problems such as hardware encryption, and achieve the effect of meeting input requirements

Inactive Publication Date: 2018-06-29
四川安亮科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is that most of the existing encryptions rely on programs to complete, and seldom encrypts the hardware directly. After entering the password and logging in, anyone can input data through the input device, and the pu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confidentiality input equipment for financial industry
  • Confidentiality input equipment for financial industry

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] Such as figure 1 , 2 As shown, the security input device used in the financial industry of the present invention includes a keyboard body 1 of Filco 87 keys, and also includes a small keyboard 2 connected to the left side of the keyboard body 1 through a buckle assembly 3, and the small keyboard 2 is connected to the keyboard body 1. A communication interface 203 and a TF card chip interface 204 are provided on the connection side, and the small keyboard 2 communicates with the keyboard body 1 through the communication interface 203. The keyboard body 1 and the keypad 2 are connected together through the detachable buckle assembly 3. When data needs to be input to the encryption system, the buckle assembly 3 is first opened, and the decryption chip corresponding to the system is inserted into the chip interface 204, and then the The combination of the keyboard body 1 and the small keyboard 2 solves the problem that most of the existing encryptions rely on programs to c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a confidentiality input device for a financial industry. The equipment comprises a keyboard body with 87 keys and a keypad connected to the left side of the keyboard body through a buckle assembly, one side, connected with the keyboard body, of the keypad is provided with a communication interface and a chip interface, and the keypad communicates with the keyboard body through the communication interface for communication. The keyboard body is connected with the keypad through the demountable buckle assembly, when it is needed that data is input into a cryptosystem, firstly the buckle assembly is opened, a decryption chip corresponding to the system is embedded in the chip interface, then the keyboard body and the keypad are closed, the problems are solved that theexisting encryption is completed mostly depend on a program, the situation that hardwires are directly encrypted is less, as long as passwords are input, after the system is logged in, anyone can input data through the input equipment.

Description

technical field [0001] The invention relates to an input device, in particular to a security input device used in the financial industry. Background technique [0002] With the deepening of the informatization process and the wide application of the Internet, the problem of information security has become more and more serious, which has been agreed by everyone. Generally speaking, cryptography refers to cryptography-related technologies, mainly referring to the disciplines of cryptography, analysis and deciphering, including the principles, methods and tools of cryptographic algorithms, cryptographic protocols, and design and analysis of cryptographic systems. The reason why encryption is safe is not because you don’t know the encryption and decryption algorithm, but the encryption key is absolutely hidden. The popular RSA and AES encryption algorithms are completely open. If one party obtains the encrypted data, even if he knows the encryption key Regardless of the algori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/83G06F3/02
CPCG06F21/83G06F3/0219
Inventor 王勇
Owner 四川安亮科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products