Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and intelligent terminal for secure interaction under a common platform

A general-purpose platform and safe technology, applied in the field of information security, can solve problems such as loss, user economic loss, user data leakage, etc., to achieve the effect of avoiding loss and ensuring security

Active Publication Date: 2020-11-24
FEITIAN TECHNOLOGIES
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The source code of the common platform for smart terminals (for example, the common platform is Android, UNIX, XENIX, LINUX, Netware, etc.) is open source. When there are loopholes in the common platform, some sensitive data is easily leaked
Taking the smart POS machine as an example, most of the smart POS machines in the prior art use the Android operating system as the general platform, and communicate with the host computer through the general platform. Vulnerabilities increase the risk of the verification code being stolen and / or the transaction amount being tampered with. Once the verification code is stolen and / or the transaction amount is tampered with, it is very easy to bring economic losses to the user
Take the smart terminal login system of the user using the Android operating system as an example. When the user enters the verification code for login verification, if there is a loophole in the Android system, the verification code entered by the user is easily stolen. Once the verification code is stolen, it is easy to cause the user to log in. Data leakage in the system, causing unnecessary losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and intelligent terminal for secure interaction under a common platform
  • A method and intelligent terminal for secure interaction under a common platform
  • A method and intelligent terminal for secure interaction under a common platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] This embodiment provides a method for secure interaction under a general platform, which is applied to an intelligent terminal including a general platform, a security chip, a switching circuit, a touch input module, and a display module. The general platform and the security chip are connected through a security interface, and the general platform and the security chip are connected with the touch input module and the display module through a switching circuit;

[0064] Such as figure 1 As shown, the method provided in this embodiment specifically includes the following steps:

[0065] Step S11: When the verification code needs to be input, the universal platform sends a switching notification to the security chip through the security interface;

[0066] Step S12: When the security chip receives the switching notification, control the switching circuit to switch the touch input module and the display module to be controlled by the security chip;

[0067] Step S13: th...

Embodiment 2

[0138] This embodiment provides a method for secure interaction under a general platform, which is applied to an intelligent terminal including a general platform, a security chip, a switching circuit, a touch input module, and a display module. The general platform and the security chip are connected through a security interface, and the general platform and the security chip are connected with the touch input module through the switching circuit, and the display module is connected with the general platform;

[0139] Such as figure 2 As shown, the method provided in this embodiment specifically includes the following steps:

[0140] Step S21: When the verification code needs to be input, the universal platform sends a switching notification to the security chip through the security interface;

[0141] Step S22: When the security chip receives the switching notification, control the switching circuit to switch the touch input module to be controlled by the security chip, an...

Embodiment 3

[0188] This embodiment provides a method for secure interaction under a general platform, which is applied to an intelligent terminal including a general platform, a security chip, a switching circuit, a touch input module, and a display module. The general platform and the security chip are connected through a security interface, and the general platform and the security chip are connected to the display module through the switching circuit, and the touch input module is connected to the general platform;

[0189] Such as image 3 As shown, the method provided in this embodiment specifically includes the following steps:

[0190] Step S31: When the verification code needs to be input, the universal platform sends a switching notification to the security chip through the security interface;

[0191] Step S32: When the safety chip receives the switching notification, control the switching circuit to switch the display module to be controlled by the safety chip;

[0192] Step S3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for safe interaction under a general platform and an intelligent terminal, belonging to the technical field of information security. The method disclosed in the present invention includes: when a verification code needs to be input, the general platform sends a switching notification to the security chip through a security interface; Control, control the display module to prompt the user to input the verification code, control the display module to generate and display the keyboard according to the coordinate data, obtain the verification code coordinate information generated by the touch input module according to the user's touch screen information from the touch input module, and obtain the verification code coordinate information according to the verification code coordinate information and coordinate data to obtain a verification code, encrypt the obtained verification code to obtain a verification code ciphertext, output the verification code ciphertext through a preset interface, and control the switching circuit to switch the touch input module and the display module to be controlled by the general platform. The solution provided by the present invention can avoid the loss caused by the leakage of the verification code.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for safe interaction under a general platform and an intelligent terminal. Background technique [0002] With the continuous promotion of smart terminals, the security of smart terminals has gradually attracted the attention of users. The source code of the common platform of smart terminals (for example, the common platform is Android, UNIX, XENIX, LINUX, Netware, etc.) is open source. When there are loopholes in the common platform, some sensitive data is easily leaked. Taking the smart POS machine as an example, most of the smart POS machines in the prior art use the Android operating system as the general platform, and communicate with the host computer through the general platform. Vulnerabilities increase the risk of the verification code being stolen and / or the transaction amount being tampered with. Once the verification code is stolen and / or the tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/31
CPCG06F21/31G06F21/445G06F21/74G06F3/0484G06F3/04886G06F21/36
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES