CN106991333A - A kind of safeguard method and device of data - Google Patents

A kind of safeguard method and device of data Download PDF

Info

Publication number
CN106991333A
CN106991333A CN201710285513.5A CN201710285513A CN106991333A CN 106991333 A CN106991333 A CN 106991333A CN 201710285513 A CN201710285513 A CN 201710285513A CN 106991333 A CN106991333 A CN 106991333A
Authority
CN
China
Prior art keywords
input
signal
safe
communication connection
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710285513.5A
Other languages
Chinese (zh)
Inventor
林培春
蔡锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Which Shanghai Department Of Information Technology Co Ltd
Original Assignee
Which Shanghai Department Of Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Which Shanghai Department Of Information Technology Co Ltd filed Critical Which Shanghai Department Of Information Technology Co Ltd
Priority to CN201710285513.5A priority Critical patent/CN106991333A/en
Publication of CN106991333A publication Critical patent/CN106991333A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to information security field, more particularly to a kind of safeguard method and device of data.The present invention by when safe end receive from input when being ready for secure data signal, the communication connection of cut-out input and application end and sets up the communication connection of input and safe end.So that before user's input secure data, disconnecting the communication connection of input and application end, can not also being obtained the input signal of input generation by assault even if application end, so that reaching effectively prevents data to be stolen, the purpose of Information Security is improved.

Description

A kind of safeguard method and device of data
Technical field
The present invention relates to information security field, more particularly to a kind of safeguard method and device of data.
Background technology
At present, on the market the structure of most POS as shown in figure 1, including input (touch-screen), display end (liquid crystal Screen), application end and safe end;Wherein, application end includes application processor, and the data for handling common level of security are such as obtained The input signal (data that user is inputted by touch-screen) of input is taken, on a display screen display information etc.;Safe end includes Safe processor, storage and encryption and decryption hardware etc., all software and hardwares in safe end are all closings, controlled, believable, use In the high data of processing level of security, information, encryption and the decryption of IC-card, magnetic card and contactless smart card are such as read.
Generally, application end operation Android system, Android system is an open system, and leak is more, is easily attacked by hacker Hit.And the password that holder inputs on the touchscreen must be forwarded to peace by the POS with structure shown in Fig. 1 by application end Quan Duan, when causing the holder to input password on the touchscreen, is easily monitored by the trojan horse program on Android system backstage, snatches password. Therefore, the security of the POS with structure shown in Fig. 1 is poor.
In order to solve the above-mentioned technical problem, the patent document of Application No. 201310441921.7 provides a kind of Intelligent touch Shield POS cipher safe protecting device and method, as shown in Fig. 2 being connect including FPGA module, display screen interface circuit, touch-screen Mouth circuit and built-in hiding internal memory;The FPGA module connects POS display screen by display screen interface circuit, passes through touch-screen Interface circuit connects POS touch-screen, and the FPGA module is used to realize electricity under the control that Android system drives and closed, After the power-up, the control of display screen and touch-screen is obtained, the interface of display screen is carried out using built-in hiding internal memory as video memory It has been shown that, computing is then encrypted to the password inputted by touch-screen and produces ciphertext, and by ciphertext scrambled transmission;It is described built-in Hide internal memory be connected with FPGA module, for FPGA module acquisition display screen and touch-screen control after, one side conduct Video memory carries out the interface display of display screen, and the data buffer storage of process is on the other hand encrypted.Above-mentioned patent document passes through physics Isolation ensures safety, using built-in hiding internal memory as video memory, has prevented to be hidden in trojan horse program, the firmware of Android system bottom Program, processor microcode etc. intercept and capture the possibility of password by way of copy system internal memory.
But, in the scheme that above-mentioned patent document is provided, when FPGA module is opened, be answering by operation Android system Controlled with end.This is resulted in, and if Android system is by assault, application end can be controlled not enable FPGA module, Forge a transaction interface, induction holder's input password, so as to reach the purpose snatched password on a display screen simultaneously.
The content of the invention
The technical problems to be solved by the invention are:The present invention provides a kind of safeguard method and device of data, has Effect prevents data to be stolen, and improves the security of data.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:
The present invention provides a kind of method for security protection of data, including:
When safe end receive from input when being ready for secure data signal, cut-out input and application end Communication connection, and set up the communication connection of input and safe end.
The present invention also provides a kind of safety guard of data, including:
Handover module, for when safe end receive from input when being ready for secure data signal, cut off it is defeated Enter end and the communication connection of application end, and set up the communication connection of input and safe end.
The beneficial effects of the present invention are:Be different from prior art control whether to cut off by application end or set up input with The communication connection of application end, because application end is easily injected into code so that input is not performed and cut when inputting secure data The operation that disconnected input is communicated to connect with application end, so as to cause data to be stolen;The present invention is by the high safe end of level of security Directly receive input is ready for secure data signal, and cuts off input according to the control of secure data signal is ready for With the communication connection of application end so that before user's input secure data, disconnect the communication connection of input and application end, even if Application end can not also be obtained the input signal of input generation by assault, so that reaching effectively prevents data to be stolen, carry The purpose of high Information Security.
Brief description of the drawings
Fig. 1 is a kind of POS structural representation;
Fig. 2 is a kind of structured flowchart of intelligent touch screen POS cipher safe protecting device;
Fig. 3 is a kind of FB(flow block) of the embodiment of the method for security protection of data;
Fig. 4 is a kind of structured flowchart of the embodiment of the safety guard of data;
Fig. 5 is a kind of the first implementation schematic diagram of safety guard of data;
Fig. 6 is a kind of schematic diagram of the safety guard of data;
Fig. 7 is a kind of the second implementation schematic diagram of safety guard of data;
Fig. 8 is a kind of 3rd implementation schematic diagram of the safety guard of data;
Label declaration:
1st, handover module;11st, first acquisition unit;12nd, the first control unit;13rd, second acquisition unit;14th, first block Cut unit;15th, retransmission unit;16th, the 3rd acquiring unit;17th, the second interception unit;
2nd, module is set up;3rd, display end;4th, input;5th, application end;6th, safe end.
Embodiment
To describe technology contents, the objects and the effects of the present invention in detail, below in conjunction with embodiment and coordinate attached Figure is explained.
The design of most critical of the present invention is:The letter whether input is inputting secure data is directly received by safe end Number, and whether be connected according to the signal control signal with application end, improve the security of data.
Fig. 3 be refer to Fig. 8,
As shown in figure 3, the present invention provides a kind of method for security protection of data, including:
When safe end receive from input when being ready for secure data signal, cut-out input and application end Communication connection, and set up the communication connection of input and safe end.
Further, it is described to be ready for secure data signal for signal of swiping the card.
Seen from the above description, safe end is used to handle the high data of level of security, such as reads IC-card, magnetic card and noncontact Information, encryption and decryption of smart card etc..When user performs swiping card, safe end can receive signal of swiping the card, according to POS The specific flow of machine is understood, input Password Operations are carried out after user card punching, therefore, when safe end, which is received, swipes the card signal, I.e. before user's input password, by handover module so that touch-screen only has communication port with safe end, even if application end is hacked Visitor's attack can not also obtain the touch signal of touch-screen generation, so as to reach the purpose for improving cipher safety.
Further, the communication connection of cut-out input and application end, and set up the communication connection of input and safe end, Specially:
Obtain the level controling signal from safe end;
The communication connection of analog switch cut-out input and application end is controlled according to the level controling signal, and sets up defeated Enter end and the communication connection of safe end.
Seen from the above description, after the physical connection of input and application end is disconnected, apparatus, only is not being destroyed In application end it is that can not obtain the sensitive data of input by software attacks;The relevant sensitization data of all inputs can only be by Safe end is obtained.This have the advantage that, the safety requirements of application end can be reduced, such as using the Android systems increased income System, Linux etc., have numerous open sources can be used;And the safe end of core simplifies design by oneself designing, secrecy is reached Purpose;The separate operation of two systems, does not interfere with each other.
Further, the communication connection of cut-out input and application end, and set up the communication connection of input and safe end, Specially:
Obtain the input signal of input;
Intercept and send to the input signal of first port;The first port carries out data transmission with application end COM1;
The input signal is forwarded to safe end by second port.
Seen from the above description, when not needing the secure data of input input sensitivity, input and application end are direct Connection, does not influence real experiences;Only when needing to input sensitive coherent signal, just input and application end are disconnected, and will be defeated Enter end and safe end links together, carry out sensitive secure data input.Control signal is connected with application end or safe end Handover module must by safe end control, prevent application end resulted in the need for after being attacked handover module handoff functionality failure, So that input is connected with application end always, sensitive data is caused to leak.
Further, the communication connection of cut-out input and application end, and set up the communication connection of input and safe end, Specially:
Safe end obtains the input signal of input;
Intercept and send to the input signal of the 3rd port;3rd port is the communication ends of safe end and application end Mouthful.
Further, in addition to:
When safe end, which receives the secure data input from input, finishes signal, input and application end are set up Communication connection.
Seen from the above description, after safe end is completely received secure data, the communication of input and application end is set up Connection so that application end can be triggered by input input instruction and perform corresponding operation.
As shown in figure 4, the present invention also provides a kind of safety guard of data, including:
Handover module 1, for when safe end 6 receive from input 4 when being ready for secure data signal, cut-out Input 4 and the communication connection of application end 5, and set up the communication connection of input 4 and safe end 6.
Further, the handover module 1 includes:
First acquisition unit 11, for obtaining the level controling signal from safe end 6;
First control unit 12, for controlling analog switch cut-out input 4 and application according to the level controling signal The communication connection at end 5, and set up the communication connection of input 4 and safe end 6.
Further, the handover module 1 includes:
Second acquisition unit 13, the input signal for obtaining input 4;
First interception unit 14, sends to the input signal of first port for intercepting;The first port be with The COM1 that application end 5 carries out data transmission;
Retransmission unit 15, for the input signal to be forwarded into safe end 6 by second port.
Further, the handover module 1 includes:
3rd acquiring unit 16, the input signal of input 4 is obtained for safe end 6;
Second interception unit 17, sends to the input signal of the 3rd port for intercepting;3rd port is peace Full end 6 and the COM1 of application end 5.
Further, it is characterised in that also include:
Module 2 is set up, for when safe end 6 receives the data input from input 4 and finishes signal, setting up input End 4 and the communication connection of application end 5.
Embodiments of the invention one are:
The present embodiment provides a kind of method for security protection of data, including:
S1, when safe end 6 receive from input 4 when being ready for secure data signal, cut-out input 4 with should With the communication connection at end 5, and the communication connection of input 4 and safe end 6 is set up;The secure data signal that is ready for is brush Card signal;
Wherein, cut-out input 4 and the communication connection of application end 5, and set up the communication connection of input 4 and safe end 6 Method include implementations below:
First implementation:Obtain the level controling signal from safe end 6;Mould is controlled according to the level controling signal Intend switch cutoff input 4 and the communication connection of application end 5, and set up the communication connection of input 4 and safe end 6;
Second implementation:Obtain the input signal of input 4;Intercept and send to the input signal of first port; The first port is the COM1 carried out data transmission with application end 5;The input signal is forwarded by second port To safe end 6;
3rd implementation:Safe end 6 obtains the input signal of input 4;Interception transmission is described defeated to the 3rd port Enter signal;3rd port is safe end 6 and the COM1 of application end 5;
S2, when safe end 6 receive from input 4 secure data input finish signal when, set up input 4 with should With the communication connection at end 5.
Embodiments of the invention two are:
As shown in figure 4, the present embodiment provides a kind of safety guard of data, including handover module 1 and set up module 2nd, display end 3, input 4, application end 5 and safe end 6;
The handover module 1, for when safe end 6 receive from input 4 when being ready for secure data signal, Input 4 and the communication connection of application end 5 are cut off, and sets up the communication connection of input 4 and safe end 6;
It is described to set up module 2, for when safe end 6 receives the data input from input 4 and finishes signal, setting up Input 4 and the communication connection of application end 5;
The display end 3 is used for the result for showing application end or display user interface.
Embodiments of the invention three are:
The present embodiment provides a kind of safety guard of data, including handover module 1, display end 3, input 4, application End 5 and safe end 6;The display end 3 is used for the result for showing application end or display user interface.
Wherein, input 4 includes the input equipments such as touch-screen and keyboard;Safe end 6 includes meeting UPTS or PCI specification Safe CPU, such as Freescale K21/K81, MAXIM MAX32555, Broadcom BCM58101, million news MH1902;Application end 5 includes that Android or Linux universal cpu, such as high-pass processor MSM8909, MTK processing can be run Device X30, the kylin processor of Huawei;
Wherein, the handover module 1 has following several implementations:
As shown in figure 5, the first implementation, which is the handover module 1, includes the control unit of first acquisition unit 11 and first 12;
The first acquisition unit 11, for obtaining the level controling signal from safe end 6;
First control unit 12, for according to the level controling signal control analog switch cut-out input 4 with The communication connection of application end 5, and set up the communication connection of input 4 and safe end 6;
Wherein, analog switch includes single analog switch, multiway analog switch, throws analog switch or single-pole single-throw(SPST hilted broadsword more Analog switch;
For example, the method for realizing handover module function using SGM3157 analog switch chips is:
As shown in fig. 6, the level controling signal output pin of safe end 6 is connected with the COM pins of SGM3157 chips, IN Pin is connected with the output pin of input 4, and NO pins are connected with the input pin of safe end 6, and NC pins are defeated with application end 5 Enter pin connection;When safe end 6 exports low level control signal, IN pins and the conducting of NC pins, then input pin and application Communication connection is set up at end 5;When safe end 6 export high-level control signal when, IN pins and NO pins conducting, then input 4 with Safe end 6 sets up communication connection.
As shown in fig. 7, the second implementation, which is the handover module 1, includes second acquisition unit 13, the first interception unit 14 and retransmission unit 15;
The second acquisition unit 13, the input signal for obtaining input 4;
First interception unit 14, sends to the input signal of first port for intercepting;The first port For the COM1 carried out data transmission with application end 5;
The retransmission unit 15, for the input signal to be forwarded into safe end 6 by second port;
Wherein, the handover module is realized by FPGA or CPLD chips.
As shown in figure 8, the 3rd implementation is, the handover module 1 includes the 3rd acquiring unit 16 and second and intercepts list Member 17;
3rd acquiring unit 16, the input signal of input 4 is obtained for safe end 6;
Second interception unit 17, sends to the input signal of the 3rd port for intercepting;3rd port For safe end 6 and the COM1 of application end 5;
Wherein, input 4 is directly connected with safe end 6, and application end 5 is connected with safe end 6.Usually normal operating When, the input signal received is directly forwarded to application end 5 by safe end 6;If input secure data, such as PIN code is then pacified 6 intercepting input signals of full end, are not sent to application end 5 by input signal;
The forwarding of safe end 6 input signal can use software mode to application end 5:Safe end 6 first passes through integrated electricity all the way Road bus receives input signal, then is connected by another road IC bus and application end 5, sends touch signals;This scheme Because software is participated in, the response of touch screen has certain delay, causes touch screen response to have blunt;
Safe end 6 can also be by the way of DMA forwardings, and safe end 6 is total by the integrated circuit for wherein connecing input 4 all the way Line and another road connect the IC bus of application end 5 directly by DMA transfer, it is not necessary to software intervention, improve response speed, Reduce time delay.
In summary, a kind of safeguard method and device for data that the present invention is provided, the present invention is high by level of security Safe end directly receive input be ready for secure data signal, and cut according to the control of secure data signal is ready for The communication connection of disconnected input and application end so that before user's input secure data, disconnect the communication of input and application end Connection, the input signal of input generation can not be also obtained even if application end, so that reaching effectively prevents data by assault It is stolen, improves the purpose of Information Security.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalents that bright specification and accompanying drawing content are made, or the technical field of correlation is directly or indirectly used in, similarly include In the scope of patent protection of the present invention.

Claims (11)

1. a kind of method for security protection of data, it is characterised in that including:
When safe end receive from input when being ready for secure data signal,
The communication connection of input and application end is cut off, and sets up the communication connection of input and safe end.
2. the method for security protection of data according to claim 1, it is characterised in that described to be ready for secure data letter Number to swipe the card signal.
3. the method for security protection of data according to claim 1, it is characterised in that cut-out input and application end it is logical Letter connection, and the communication connection of input and safe end is set up, it is specially:
Obtain the level controling signal from safe end;
The communication connection of analog switch cut-out input and application end is controlled according to the level controling signal, and sets up input With the communication connection of safe end.
4. the method for security protection of data according to claim 1, it is characterised in that cut-out input and application end it is logical Letter connection, and the communication connection of input and safe end is set up, it is specially:
Obtain the input signal of input;
Intercept and send to the input signal of first port;The first port is the communication carried out data transmission with application end Port;
The input signal is forwarded to safe end by second port.
5. the method for security protection of data according to claim 1, it is characterised in that cut-out input and application end it is logical Letter connection, and the communication connection of input and safe end is set up, it is specially:
Safe end obtains the input signal of input;
Intercept and send to the input signal of the 3rd port;3rd port is safe end and the COM1 of application end.
6. the method for security protection of data according to claim 1, it is characterised in that also include:
When safe end, which receives the secure data input from input, finishes signal, the communication of input and application end is set up Connection.
7. a kind of safety guard of data, it is characterised in that including:
Handover module, for when safe end receive from input when being ready for secure data signal, cut off input With the communication connection of application end, and the communication connection of input and safe end is set up.
8. the safety guard of data according to claim 7, it is characterised in that the handover module includes:
First acquisition unit, for obtaining the level controling signal from safe end;
First control unit, the communication for controlling analog switch cut-out input and application end according to the level controling signal Connection, and set up the communication connection of input and safe end.
9. the safety guard of data according to claim 7, it is characterised in that the handover module includes:
Second acquisition unit, the input signal for obtaining input;
First interception unit, sends to the input signal of first port for intercepting;The first port is and application end The COM1 carried out data transmission;
Retransmission unit, for the input signal to be forwarded into safe end by second port.
10. the safety guard of data according to claim 7, it is characterised in that the handover module includes:
3rd acquiring unit, the input signal of input is obtained for safe end;
Second interception unit, sends to the input signal of the 3rd port for intercepting;3rd port be safe end with The COM1 of application end.
11. the safety guard of data according to claim 7, it is characterised in that also include:
Module is set up, for when safe end receives the data input from input and finishes signal, setting up input with answering With the communication connection at end.
CN201710285513.5A 2017-04-27 2017-04-27 A kind of safeguard method and device of data Pending CN106991333A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710285513.5A CN106991333A (en) 2017-04-27 2017-04-27 A kind of safeguard method and device of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710285513.5A CN106991333A (en) 2017-04-27 2017-04-27 A kind of safeguard method and device of data

Publications (1)

Publication Number Publication Date
CN106991333A true CN106991333A (en) 2017-07-28

Family

ID=59417068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710285513.5A Pending CN106991333A (en) 2017-04-27 2017-04-27 A kind of safeguard method and device of data

Country Status (1)

Country Link
CN (1) CN106991333A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114694326A (en) * 2020-12-29 2022-07-01 腾讯科技(深圳)有限公司 Extended display equipment of face payment equipment and face payment system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102769847A (en) * 2011-05-05 2012-11-07 国民技术股份有限公司 Safety communication method and equipment in wireless local area network
CN204102259U (en) * 2014-10-10 2015-01-14 深圳长城开发科技股份有限公司 A kind of POS terminal operating system hardware platform
CN104615552A (en) * 2014-12-29 2015-05-13 浪潮(北京)电子信息产业有限公司 Safe transmission method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102769847A (en) * 2011-05-05 2012-11-07 国民技术股份有限公司 Safety communication method and equipment in wireless local area network
CN204102259U (en) * 2014-10-10 2015-01-14 深圳长城开发科技股份有限公司 A kind of POS terminal operating system hardware platform
CN104615552A (en) * 2014-12-29 2015-05-13 浪潮(北京)电子信息产业有限公司 Safe transmission method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114694326A (en) * 2020-12-29 2022-07-01 腾讯科技(深圳)有限公司 Extended display equipment of face payment equipment and face payment system
CN114694326B (en) * 2020-12-29 2023-08-08 腾讯科技(深圳)有限公司 Expansion display device of face payment device and face payment system

Similar Documents

Publication Publication Date Title
US20070199058A1 (en) Method of using a security token
CN103930899B (en) Method for the management public data of input and private data at equipment
EP3381003B1 (en) System for and method of authenticating a user on a device
WO2016192165A1 (en) Data encryption method and apparatus
WO2012000092A1 (en) Seamless end-to-end data obfuscation and encryption
CN205103825U (en) Computer information safety control
US20190377863A1 (en) Password input method, computer device and storage medium
CN101364187A (en) Double operating system computer against worms
WO2016192453A1 (en) Safety control method and apparatus, and terminal
CN101535957A (en) System and method for sharing atrusted platform module
CN106650514A (en) Secure input system and method based on TrustZone technology
CN106778337A (en) Document protection method, device and terminal
CN103198247A (en) Computer safety protection method and computer safety protection system
CN103198037A (en) Reliable pipe control method and system for IO (input output) equipment
CN102024115B (en) Computer with user security subsystem
US20120317410A1 (en) Protecting data from data leakage or misuse while supporting multiple channels and physical interfaces
CN208848330U (en) A kind of double-core POS machine safety chip
CN106991333A (en) A kind of safeguard method and device of data
CN106161481B (en) A kind of device of mobile terminal physical button isolation safe module prevention security risk
CN106548099A (en) A kind of chip of circuit system safeguard protection
Zhang Trustfa: Trustzone-assisted facial authentication on smartphone
CN109190407B (en) High-performance encryption and decryption operation capability expansion method and system
CN111522496A (en) Control management system of VR and AR equipment
CN103745170A (en) Processing method and device for disk data
CN105488924A (en) POS high-end application system and solving method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170728