Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CEN/XFS SP implementation method and device based on security authorization and financial self-service equipment

An implementation method and security technology, applied in computer security devices, complete banking systems, complete banking systems, etc., can solve problems such as bank cash loss, loss of important credentials, etc., to prevent attacks, ensure security, and prevent people from being arbitrarily tampering effect

Active Publication Date: 2020-03-27
CHINA ELECTRONICS GREAT WALL CHANGSHA INFORMATION TECH
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the self-service device is attacked by hackers, the hacker can run the program on the self-service device, and through the CEN / XFS protocol, the device on the terminal can be easily operated to complete operations such as cash delivery and card delivery, resulting in the loss of bank cash and important vouchers lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CEN/XFS SP implementation method and device based on security authorization and financial self-service equipment
  • CEN/XFS SP implementation method and device based on security authorization and financial self-service equipment
  • CEN/XFS SP implementation method and device based on security authorization and financial self-service equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0078] First of all, a special authorization tool selects the application program under the corresponding path, and registers the EXE information by calling the extended interface of the SP SPI interface layer, that is, performs security authorization for the application program, and authorizes the information of the legal application program through the encrypted The method is stored in the authorization list.

[0079] Then, the application layer calls and connects to the SP service, and the SP SPI interface layer judges whether there is an application program for calling and connecting to the SP service in the authorization list, and if it exists, it continues to call the SP service, otherwise it refuses to report an error;

[0080] Wherein, the application layer invokes the connection SP service, and the application sends the connection request to the SP SPI interface layer through the standard SP API interface layer. If the connection operation is successful, the SP SPI in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CEN / XFS SP implementation method and device based on security authorization and financial self-service equipment, and the method comprises the steps that 1, an application program layer transmits an SP equipment scheduling request through a standard SP API interface layer; 2, the XFS manager sends the scheduling request to an SP SPI interface layer; 3, the SP SPI interface layer encrypts the information of the currently running application program and judges whether the currently running application program exists in the authorization list or not according to third ciphertext information obtained through encryption, if yes, the equipment request is sent to the SP service layer, and the step 4 continues to be executed; if not, the step 5 is executed; 4, the SP service layer analyzes the equipment request, executes corresponding actions and returns an execution result to the SP SPI interface layer; and step 5, the SP SPI interface layer returns an execution result to the application program layer through the standard SP API interface layer. Effective key protection is provided for the self-service equipment, and attacks of malicious software are prevented.

Description

technical field [0001] The invention relates to the technical field of financial self-service equipment, in particular to a security authorization-based CEN / XFS SP service implementation method, device and financial self-service equipment. Background technique [0002] WOSA (Windows Open System Architecture, Windows Open System Architecture) is a software architecture under the Windows operating system proposed by Microsoft Corporation. WOSA / XFS (Windows Open System Architecture / Extensions for Financial Services), also known as CEN / XFS protocol, is an extended financial service based on WOSA. It is a software architecture proposed by Microsoft for the global financial industry software. It is based on the WOSA software architecture On the basis, some corresponding revisions have been made for the global financial industry. [0003] The CEN / XFS protocol provides a set of standard and unified protocols for the technical field of financial self-service equipment. It is a gener...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/60G07F19/00
CPCG06F21/44G06F21/602G07F19/00G07F19/206G07F19/209G07F19/211Y02D10/00
Inventor 刘艳兰唐超赵建青刘婷余官杰
Owner CHINA ELECTRONICS GREAT WALL CHANGSHA INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products