Keyboard encrypting method

An encryption method and keyboard technology, which are applied to the data security of ATM operating keyboards and the field of ATM operating keyboards, can solve the problems of user account and password confidentiality data loss, etc., and achieve the effect of preventing data leakage and theft, and improving the degree of data security.

Active Publication Date: 2006-08-09
SHENZHEN ZHENGTONG ELECTRONICS
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that the ATM operation keyboard needs to effectively prevent data leakage and theft, and ensure the data security of the keyboard operation. The above-mentioned existing keyboards cannot solve this problem well, and there is still the possibility of confidential data such as user account numbers and passwords being lost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyboard encrypting method
  • Keyboard encrypting method
  • Keyboard encrypting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Describe in detail below in conjunction with the preferred embodiment of the present invention shown in accompanying drawing

[0025] The metal encryption keyboard for ATM terminal that adopts keyboard encryption method of the present invention to realize, comprises the panel that distributes successively from top to bottom, backing plate, gasket, conductive rubber key plate, and key is electrically connected printed circuit board and base, and described panel and The base surrounds a keyboard cavity, which is provided with a printed circuit board for keyboard processing and a power supply battery. There are openings on the panel, and each key protrudes from the opening. The small axis of protection between the boards; the printed circuit board for keyboard processing can be divided into a security function processing part and a non-secrecy function processing part, and the side of the security function processing part where components are placed is closed with a protect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Word of the keyboard said in the invention includes print circuit board for processing keyboard. The invention uses following security measure for the keyboard: print circuit board in use for processing keyboard is divided into a part for processing function of secrecy, and a part for processing not confidential function. A mechanism for protecting secrecy information is setup on the keyboard to surround physical space of the part for processing function of secrecy. Once the mechanism gives signal to show that secrecy information meets with attack, secrecy information inside the part for processing function of secrecy is destroyed. A mechanism for protecting keyboard body is setup on the keyboard. Once the mechanism gives signal to show that keyboard meets with attack, the said secrecy information is also destroyed. The secrecy information includes at least a cipher key, and program run on microprocessor includes DES algorithm. The invention raises data security of keyboard operation.

Description

technical field [0001] The invention relates to financial equipment, in particular to an ATM (automatic teller machine) operating keyboard, in particular to a data security method for the ATM operating keyboard. Background technique [0002] The existing banking system usually consists of three parts: host, terminal and network to form a huge network banking system. Bank key management software is usually installed in the bank host or front-end server, and terminal processing software is installed in the bank terminal. The host and terminal are connected through the network. The data format complies with the ISO8583 standard and has a network encryption mechanism. . From the perspective of the network, this system is quite safe on the surface, but from the perspective of relevant professionals who carry out internal debugging on bank terminals, there are considerable security risks: because in existing bank terminals, such as ATM machines During use, the user's account inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/02G06F1/00G07F19/00
Inventor 谢立民黄洪
Owner SHENZHEN ZHENGTONG ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products