CN108234427A - The exchange method of multi-screen Android POS systems - Google Patents

The exchange method of multi-screen Android POS systems Download PDF

Info

Publication number
CN108234427A
CN108234427A CN201611196690.8A CN201611196690A CN108234427A CN 108234427 A CN108234427 A CN 108234427A CN 201611196690 A CN201611196690 A CN 201611196690A CN 108234427 A CN108234427 A CN 108234427A
Authority
CN
China
Prior art keywords
host
slave
cloud server
exchange method
android
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201611196690.8A
Other languages
Chinese (zh)
Inventor
曲德君
李进岭
曹大军
凌涛
刘锡禹
魏洪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Xinfeifan E-Commerce Co Ltd
Original Assignee
Shanghai Xinfeifan E-Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Xinfeifan E-Commerce Co Ltd filed Critical Shanghai Xinfeifan E-Commerce Co Ltd
Priority to CN201611196690.8A priority Critical patent/CN108234427A/en
Publication of CN108234427A publication Critical patent/CN108234427A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of exchange methods of multi-screen Android POS systems, applied to Android platform, include cloud server, host and multiple slaves, mainly include the following steps that:Host carries out identity validation by wireless network and cloud server;The host is established by wireless network with each slave and connected;Each slave performs handshake steps with the host;The host obtains the information of each slave, performs the cloud server verification step of each slave;The host performs connection validity detecting step with each slave.

Description

The exchange method of multi-screen Android POS systems
Technical field
The present invention relates to wireless communication technology field more particularly to a kind of exchange method of multi-screen Android POS systems, It is mainly used for the business terminal equipments such as the cash register, the POS that are applied based on Android platform.
Background technology
Although the development of the communication technology, various terminals all obtain update upgrading in every field, are based on Windows The cash register of platform, POS machine still use in a conventional manner, that is, are mainly dominated by trade company end, between customer Selection and confirm still confirmed using vival voice.Under interaction scenarios of traditional POS based on cash register, this pattern It disclosure satisfy that demand substantially.But various mobile Internet business such as integrate, certificate more and more gets involved in line now After in lower flow, this mode can cause the number of communication repeatedly of salesman and customer to increase, and cash register efficiency declines, and easily goes out The situation that existing maloperation or customer go back on one's word.And it in the case where selecting seat, selecting that room is this customer is needed to be carefully chosen, cares for It is objective to wish to understanding more information, and customer is difficult describe in words the clearly demand of oneself and expansion before making their own selection Selection face, this has resulted in traditional approach occur, and some are discontented, are eager to be further improved.
And traditional cash register, POS machine are using split screen display available technology primary windows, can accomplish cash register Visitor's screen shows that different contents are watched, but due to the limitation of windows, only quotient's screen can respectively for customer and waiter with quotient's screen With touch operation, visitor's screen can not touch operation.It can not namely realize the touch interaction of salesman and customer.It is based in recent years The business terminal of Android gradually rises.But primary of Android supports external second piece of print screen to show first piece of screen Curtain, while two pieces of screens is not supported to be carried out at the same time touch yet.
In the prior art, the shuangping san technology of windows and android using video export technique (vga, hdmi, The various protocols such as mini-dp, mhl), only cover in these technologies and realize and double replicate display or the control of double asynchronous displays association View, and it is not covered by the input agreement of touch operation.Therefore industry, which there is no, has double multi-screens for touching asynchronous display ability Android POS systems.
Invention content
It is an object of the present invention to provide a kind of multi-screen Android POS systems and its exchange method, based on Android platform reality Existing double screen or multi-screen POS machine real-time asynchronous show and can the method that interacts of live touch, to solve primary Android POS machine The problem of external connection display apparatus is supported to carry out print screen and show, and double-screen touch interaction can not be carried out.
The present invention solves technical problem and adopts the following technical scheme that:A kind of exchange method of multi-screen Android POS systems, Applied to Android platform, include cloud server, host and multiple slaves, which is characterized in that mainly including following step Suddenly:
Host carries out identity validation by wireless network and cloud server;
The host is established by wireless network with each slave and connected;
Each slave performs handshake steps with the host;
The host obtains the information of each slave, performs the cloud server verification step of each slave;
The host performs connection validity detecting step with each slave.
Wherein, the host includes the following steps with cloud server identity validation:
User logs in the host, and the host public key of setting is sent to the host by cloud server;
The required parameter of public key encryption user described in the host computer is sent to the cloud server;
The cloud server is decrypted the information received with the private key set and is compared, and confirms the host Identity.
Wherein, the host is established connection by wireless network with each slave and is included the following steps:
The host-initiated network communication function establishes socket connections, and it is server end to set the host;
The slave starts network communication function, starts socket connections, and it is client to set the slave;
It is described to search for the host from POS machine, the connection relation of the principal and subordinate is established after successful connection.
Wherein, the handshake steps that each slave is performed with the host include:
Each slave timing, which is sent, to be instructed by shaking hands for public key encryption to the host;
The host is decrypted by the host private key, and carries out parameter comparison, and such as acquisition parameter is consistent, shakes hands into Work(if inconsistent, disconnects the socket connections between the slave.
Wherein, the instruction of shaking hands includes equipment of itself information and software version information.
Wherein, the cloud server verification step for performing the slave includes:
The required parameter of slave described in public key encryption described in the host computer is sent to the cloud server;
The cloud server is decrypted the information received with the private key set and is compared, and verifies the slave Identity.
Wherein, the host performs connection validity detecting step with each slave and uses heartbeat mechanism, including:
The host is spaced according to setting sends heartbeat packet to each slave;
Each slave carries out the heartbeat packet received response, and the host judges that slave connection is effective.
Wherein, the slave uses identical instruction set, and the instruction is included at least in instruction type and instruction Hold.
Wherein, the slave is that can show the simultaneously cash register of touch operation or business sales terminal.
The present invention has the advantages that:
This interactive mode provided by the invention allows customer can the freer target requirement for easily selecting oneself and bright For true submission result to salesman, salesman, which need to only make the selection of customer, confirms and jumps to downstream, reduces and links up cost While, decrease the workload of salesman, customer think deeply and decision during salesman do not have to cooperation customer always and carry out It awaits orders and operates;And customer experience and StoreFront efficiency of operation can be promoted effectively, and subsequently more to need salesman and Gu Flexible enough and elasticity development platform has been reserved in the complexity interaction that visitor carries out.
Description of the drawings
Fig. 1 is the flow chart of the exchange method of multi-screen Android POS systems of the present invention;
Fig. 2 is the structure diagram of the multi-screen Android POS systems of the present invention.
Specific embodiment
Technical scheme of the present invention is further elaborated with reference to embodiment and attached drawing.
The present invention proposes a kind of exchange method of multi-screen Android POS systems, applied to Android platform, including There are cloud server, host and multiple slaves, as shown in Figure 1, mainly including the following steps that:
S100:Main POS machine carries out identity validation by wireless network and cloud server;
S200:The main POS machine is connected with respectively being established from POS machine by wireless network;
S300:It is described respectively to perform handshake steps from POS machine and the main POS machine;
S400:The main POS machine obtains the information from POS machine, performs the cloud server from POS machine and verifies Step;
S500:The main POS machine respectively performs connection validity detecting step with described from POS machine.
In an embodiment of the present invention, referring to shown in Fig. 2, host and slave are communicated to connect with high in the clouds, the master Machine only has one, and slave can have more, and host can be interacted with more slaves.Physical connection between host and slave is adopted With Ethernet protocol or WiFi protocol realizations, can wirelessly or non-wirelessly be connected according to specific demand.In the present invention, the master The identity validation of machine and cloud server includes the following steps:User logs in the host, and cloud server is by the master of setting Machine public key is sent to the host;The required parameter of public key encryption user described in the host computer is sent to the cloud Hold server;The cloud server is decrypted the information received with the private key set and is compared, and confirms the host Identity.
Specifically, public and private key is a kind of common mode, and public key (Public Key) is with private key (Private Key) The key pair (i.e. a public key and a private key) obtained by a kind of algorithm, public key is part disclosed in cipher key pair, Private key is then private part.Public key can be used corresponding commonly used in encrypted session key, verification digital signature or encryption The data of private key decryption.It is worldwide unique that the key pair obtained by this algorithm, which can guarantee,.It is close using this Key to when, if with one of key encrypt one piece of data, it is necessary to another secret key decryption.For example use public key encryption Data must just be decrypted with private key, if must also use public key decryptions with private key encryption, otherwise decryption will not succeed.And private key Encryption Algorithm carrys out encrypting and decrypting data using single private key.Since the either side with key can use the key solution Ciphertext data, it is therefore necessary to key be protected not obtained by unwarranted agency.Private key encryption is also known as symmetric cryptography, because same Key is not only for encrypting but also for decrypting.Personal key algorithm is very fast (compared with public key algorithm), especially suitable for larger Data flow perform encryption conversion.In general, private key algorithm (being known as block encryption) is for one data block of one-time pad encryption.Block encryption The input block of n bytes is converted to the output block of encrypted byte by encrypting by (such as RC2, DES, TripleDES and Rijndael). If encrypt or decrypt byte sequence, it is necessary to which block-by-block carries out.Since n very littles are (for RC2, DES and TripleDES, n=8 words Section;N=16 [default value];N=24;For Rijndael, n=32), it is therefore necessary to being more than the data value one-time pad encryption one of n A block.
In an embodiment of the present invention, host and slave be before manufacture, respectively private key built in host and slave with it is public Key, host after user logs in, by network from cloud server obtain itself public key (this public key be used for and high in the clouds verify Handshaking information will be further described later.) when host receives other interface requests, to total interface required parameter After public key encryption, it is sent to cloud server.It after cloud server gets request, is decrypted with private key, obtains required parameter Content, and with interface requests parameter comparison.If consistent, show that interface requests data are consistent, it is on the contrary then think interface requests number According to being tampered with, it is considered as illegal request, is not handled.
Such as:In facility information interface is obtained, required parameter is device id, logs in people, then by using public key to it After encryption, corresponding data content is got.By taking a wherein equipment design parameter as an example, current device ID not 00001 is stepped on Lu Renwei abc are then by the data after public key encryption: o2zux4cnv98na5kjd89ghua9hsw08g7erba78bf2dkfa.Then it is passed into high in the clouds with parameter mode.It is complete Whole request is as follows:
https://api.ffan.com/v1/getDeviceInfoDeviceId=00001&operator=abc& Key=o2zux4cnv98na5kjd89ghua9hsw08g7erba78bf2dkfa
After high in the clouds gets request, the value in key is first taken out, after being decrypted by private key to key, gets solicited message: Required parameter DeviceId=00001&operator=abc mono- in DeviceId=00001&operator=abc, with interface Cause, then it is assumed that be to be properly requested, it is on the contrary then be illegal request.
In addition, the public and private key mentioned in the present embodiment can also be used for shaking hands between host and slave and instruction interaction work( Energy.
In the present invention, the host is established connection by wireless network with each slave and is included the following steps:The host Start network communication function, establish socket connections, it is server end to set the host;The slave starts network communication work( Can, start socket connections, it is client to set the slave;The slave searches for the host, and institute is established after successful connection State the connection relation of principal and subordinate.
In the present embodiment, host and each slave are all by network connection, in a LAN.After host-initiated, Network communication function is opened, socket connections is established, sets itself to Server ends, and open specific port, prepares to receive Slave is shaken hands instruction.After slave starts, network communication function is opened, starts socket linkage functions, sets itself to Client ends based on own IP address, start the IP address and port numbers of base unit search equipment.Setting in relation to port can To be configured according to the content of the prior art, details are not described herein.Such as after host-initiated, the IP address of acquisition is 192.168.1.1, the port numbers of opening are 80, at this time slave start after, the IP address of acquisition is 192.168.1.3, then with Based on oneself this IP address, start to search for, for example the next address to be searched for is:192.168.1.2 if connection is lost It loses, then continues, to next search 192.168.1.1, if successful connection, to show to establish connection, and be successfully found host and set It is standby.In the present embodiment, the instruction if connection was not shaken hands after being successfully established more than 10 seconds, host can actively disconnect and slave Connection.Slave after disconnection then needs to re-establish connection, and verify instruction of shaking hands if necessary to connect with host again. During this, can also encryption and decryption be carried out using public and private key, detailed process repeats no more.
In the method for the present invention, the handshake steps respectively performed from POS machine with the main POS machine include:
Each sent from POS machine timing is instructed by shaking hands for public key encryption to the main POS machine;
The main POS machine is decrypted by the host private key, and carries out parameter comparison, and such as acquisition parameter is consistent, shakes hands Success, if inconsistent, disconnects the socket connections between principal and subordinate's POS machine.
The effect of the instruction of shaking hands of the present invention is to establish host and the relationship of slave between the two, it is understood that is phase The process mutually confirmed.Host is established with slave connect after, slave starts assembling and shakes hands instruction, and shaking hands to instruct includes equipment of itself Information and software version information, then by being sent to host after public key encryption.Host after the instruction of shaking hands of slave is got, After first by host private key decoding request parameter, compared with its required parameter.It is if consistent, then it is assumed that success of shaking hands, it is on the contrary Then think to shake hands unsuccessfully, be considered as illegal request, be then turned off socket connections.In the present embodiment, the data structure for instruction of shaking hands Including:Equipment MAC Address itself, the version name of software, version number.Such as:The MAC Address of slave is:F1:8C:9E:83: AE:4F, the machine version number are 100, and version is entitled:1.0.0, it is by the value after oneself public key encryption by two parameters: 9zyugkk3l36asnd65uxunbe7ysa2dfu9ewxou3j4hhb5w, then its complete handshake request content be:mac: F1:8C:9E:83:AE:4F, version:100, versionNmae:1.0.0, key: 9zyugkk3l36asnd65uxunbe7ysa2dfu9ewxou3j4hhb5w.Host receives request, decrypts key values with private key, obtains To content be:mac:F1:8C:9E:83:AE:4F, version:100, versionNmae:1.0.0, in required parameter Content is consistent, then it is assumed that socket connections are established in success of shaking hands.
In the present invention, include in the cloud server verification step for performing the slave:Described in the host computer The required parameter of slave described in public key encryption is sent to the cloud server;The cloud server private set Key is decrypted the information received and is compared, and verifies the identity of the slave.
Specifically, although slave both sides establish socket connection relations, at this moment host will not receive and judge to appoint The data that slave sends over, only when host is by the mac address parameters of slave, be sent to high in the clouds it is authenticated after, can just connect Receive the required parameter that slave is sent.If high in the clouds verification failure, disconnects, is considered as illegal request.
Host is completed by the mac of slave to the high in the clouds processes verified and by the form of interface requests.It is also intended to pass through Public key encrypts required parameter, and then required parameter is decrypted in high in the clouds.These steps elaborate in front, here just no longer It explains.The example of a url request connection is given below:
https://api.ffan.com/v1/checkDeviceDeviceType=ClientMAC=F1:8C:9E: 83:AE:4F&key=o2zux4cnv98na5kjd89ghua9hsw08g7erba78bf2dkfa
Due to every equipment before being taken into use, all facility information can be entered into high in the clouds, so high in the clouds obtains MAC Address Afterwards, whether can inquire had typing to cross the facility information originally.If inquiring the equipment, success is returned, otherwise returns to failure.
In the method for the invention, the main POS machine respectively performs the detecting step use of connection validity with described from POS machine Heartbeat mechanism, including:The main POS machine is spaced according to setting sends heartbeat packet to described respectively from POS machine;It is described respectively from POS machine Response is carried out to the heartbeat packet received, the main POS machine judges that the connection of principal and subordinate's POS machine is effective.
The heartbeat mechanism be in order to ensure the connection between host and slave be to maintain it is unimpeded, to ensure slave Connection validity.Because host and slave are two incoherent equipment in itself, simply by network connection, slave breaks Electricity, cable are extracted, mechanical disorder, and host is to be unable to find out, and therefore, at regular intervals, heartbeat packet are sent to slave by host, To judge slave connection state.If the heartbeat sent is surrounded by response, illustrate that slave connection is normal, otherwise, then it is assumed that slave Connection failure.In the present embodiment, it needs to communicate with slave in real time, so heartbeat packet transmission is set to 30 seconds once. In the present invention, heartbeat packet takes minimum byte to realize.
In the present invention, the communication linkage of host and slave, be Intrusion Detection based on host and slave carrys out reality using identical instruction set Existing, i.e., the action command that host is sent mutually with slave can be identified correctly mutually.Instruction is made of two parts:Instruction class Type and command content.Its data structure is as follows:
Public class Command{private final int mType;// instruction type private final String mContent;// command content }
Such as:We will complete one and word is inputted in the dialog box of host, meanwhile, it can be corresponding on slave screen It is shown on position.Firstly, since slave use identical instruction set system, host can be shown in interface one it is right Frame is talked about, while slave can then show a text box in interface.It is 1 that host arranges instruction type jointly with slave, is represented Host input content needs are shown on slave.And command content is exactly corresponding input word.For example we are in host screen Typing 123456 on curtain, then, assembled instruction is type:1,content:123456.Then host passes through public key encryption Afterwards, it is sent to slave.About host public key ciphering process, the existing explanation in foregoing, is no longer repeated here.
After slave receives instruction and decrypts, instruction type type is first taken out, instruction type is 1 here, is inputted for host Content needs are shown on slave.Then command content content is further taken out, command content is 123456 here, to need The word shown in text box.After slave has identified instruction, just according to the content of instruction, by text importing in text box. In the present embodiment, defined instruction type may include:Input instruction, selection instruction (alternative column list item), changing interface refers to It enables, idsplay order, advertisement play instruction etc. can also continue to extend as needed later.
In the method for the invention, the slave is that can show that the simultaneously cash register of touch operation or business sales are whole End.By taking the application for selling Terminal Type as an example:
1st, salesman inputs kinds of goods coding on master terminal (host), and master terminal (host) reads the volume from database (high in the clouds) The corresponding inventory information of code, and the instruction for showing the inventory information is sent to auxiliary terminal (slave), auxiliary terminal (slave) displaying should Inventory information;
2nd, for customer after salesman confirms purchase intention, salesman confirms this order on master terminal (host), and master terminal is (main Machine) cash register interface is switched to, and checkout instruction is sent to auxiliary terminal (slave), auxiliary terminal (slave) shows that this order deals with gold Volume, salesman inquire customer's intention means of payment (swiping the card, the payment of cash or barcode scanning), and select on master terminal (host) corresponding The means of payment;
3rd, master terminal (host) selects the means of payment to send means of payment instruction, auxiliary end to auxiliary terminal (slave) according to salesman (slave) is held to show the corresponding means of payment.Swiping card mode is such as selected, then auxiliary terminal (slave) prompting customer gives bank card Salesman swipes the card.Salesman sends prompting input cipher instruction after the completion of master terminal (host) is swiped the card, to auxiliary terminal (slave), Auxiliary terminal (slave) display reminding character.Customer is completed on code keyboard after swiping the card, master terminal (host) switch to payment into The work(page, and send payment result instruction, the result of auxiliary terminal (slave) displaying cCredit card payment to auxiliary terminal (slave).
By taking the application of ticketing Terminal Type as an example:
After the sales date that salesman selects film ticket, show ticket on master terminal (host), master terminal (host) display should The residue of play can sell seat information, and be sent to auxiliary terminal (from end) as displaying instruction, and auxiliary terminal (slave) is on the screen It says to sell and shows customer as information.Customer carries out the seat number for selecting intention in touch point, auxiliary terminal in auxiliary terminal (from end) (from end) selects seat to instruct to master terminal (host) transmission, shows that certain seat has been selected on master terminal (host) screen.Salesman After the selection for confirming customer, payment is clicked on master terminal (host).Then enter with aforementioned sale Terminal Type using same branch Pay flow.
For selecting the application of room Terminal Type:
Salesman selected on master terminal (host) hotel guest room move in the time after, master terminal (host) displaying the same day can enter House type firmly.Master terminal (host) owns to the instruction that displaying house type is sent in auxiliary terminal (slave), auxiliary terminal (slave) displaying Available house type, customer can click house type in auxiliary terminal (slave) and amplify, and select after the house type moved in the house type On click confirmation, auxiliary terminal (slave) sends the instruction in selected room to master terminal (host), and master terminal (host) is by the room Lock and enter the payment flow of sale class as the aforementioned.
And in above-mentioned three classes application, related specific encrypting and decrypting and processing procedure as described above, herein It is no longer repeated in three classes application.
The POS terminal of Android native systems is run in the embodiment of the present invention using several, all terminals have There is the ability of display and touch, communication is attached by the uniform protocol in the present invention, realize that the multi-screen of all terminal rooms is real When asynchronous display simultaneously can live touch interaction combination POS system.
The sequencing of above example is not only for ease of description, represent the quality of embodiment.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that:It still may be used To modify to the technical solution recorded in foregoing embodiments or carry out equivalent replacement to which part technical characteristic; And these modification or replace, various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (9)

1. a kind of exchange method of multi-screen Android POS systems, applied to Android platform, includes cloud server, main Machine and multiple slaves, which is characterized in that mainly include the following steps that:
Host carries out identity validation by wireless network and cloud server;
The host is established by wireless network with each slave and connected;
Each slave performs handshake steps with the host;
The host obtains the information of each slave, performs the cloud server verification step of each slave;
The host performs connection validity detecting step with each slave.
2. the exchange method of multi-screen Android POS systems according to claim 1, which is characterized in that the host Include the following steps with cloud server identity validation:
User logs in the host, and the host public key of setting is sent to the host by cloud server;
The required parameter of public key encryption user described in the host computer is sent to the cloud server;
The cloud server is decrypted the information received with the private key set and is compared, and confirms the body of the host Part.
3. the exchange method of multi-screen Android POS systems according to claim 1, which is characterized in that the host with Each slave is established connection by wireless network and is included the following steps:
The host-initiated network communication function establishes socket connections, and it is server end to set the host;
The slave starts network communication function, starts socket connections, and it is client to set the slave;
It is described to search for the host from POS machine, the connection relation of the principal and subordinate is established after successful connection.
4. the exchange method of multi-screen Android POS systems according to claim 1, which is characterized in that each slave The handshake steps performed with the host include:
Each slave timing, which is sent, to be instructed by shaking hands for public key encryption to the host;
The host is decrypted by the host private key, and carries out parameter comparison, and such as acquisition parameter is consistent, success of shaking hands, if It is inconsistent, disconnect the socket connections between the slave.
5. the exchange method of multi-screen Android POS systems according to claim 4, which is characterized in that described shakes hands Instruction includes equipment of itself information and software version information.
6. the exchange method of multi-screen Android POS systems according to claim 1, which is characterized in that perform it is described from The cloud server verification step of machine includes:
The required parameter of slave described in public key encryption described in the host computer is sent to the cloud server;
The cloud server is decrypted the information received with the private key set and is compared, and verifies the body of the slave Part.
7. the exchange method of multi-screen Android POS systems according to claim 1, which is characterized in that the host with Each slave performs connection validity detecting step and uses heartbeat mechanism, including:
The host is spaced according to setting sends heartbeat packet to each slave;
Each slave carries out the heartbeat packet received response, and the host judges that slave connection is effective.
8. the exchange method of the multi-screen Android POS systems according to claim 1-7, which is characterized in that the master Slave uses identical instruction set, and the instruction includes at least instruction type and command content.
9. the exchange method of multi-screen Android POS systems according to claim 8, which is characterized in that the principal and subordinate Machine is that can show the simultaneously cash register of touch operation or business sales terminal.
CN201611196690.8A 2016-12-22 2016-12-22 The exchange method of multi-screen Android POS systems Withdrawn CN108234427A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611196690.8A CN108234427A (en) 2016-12-22 2016-12-22 The exchange method of multi-screen Android POS systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611196690.8A CN108234427A (en) 2016-12-22 2016-12-22 The exchange method of multi-screen Android POS systems

Publications (1)

Publication Number Publication Date
CN108234427A true CN108234427A (en) 2018-06-29

Family

ID=62656268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611196690.8A Withdrawn CN108234427A (en) 2016-12-22 2016-12-22 The exchange method of multi-screen Android POS systems

Country Status (1)

Country Link
CN (1) CN108234427A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111555903A (en) * 2020-03-26 2020-08-18 浙江口碑网络技术有限公司 Data communication method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111555903A (en) * 2020-03-26 2020-08-18 浙江口碑网络技术有限公司 Data communication method and device

Similar Documents

Publication Publication Date Title
US11893561B2 (en) System for interfacing a client device with a point of sale system
US20210365938A1 (en) Authentication system and method for server-based payments
CN105719413B (en) A kind of POS system realized multiple terminals screen asynchronous display and touch interaction
CN101164086B (en) Methods, system and mobile device capable of enabling credit card personalization using a wireless network
US6877093B1 (en) System and method for secure provisioning and configuration of a transaction processing device
JP2019204556A (en) Method and apparatus for facilitating electronic payment using wearable device
US20100299265A1 (en) Methods and systems for security authentication and key exchange
US20100153273A1 (en) Systems for performing transactions at a point-of-sale terminal using mutating identifiers
WO2012113189A1 (en) Mobile payment system, mobile terminal and method for realizing mobile payment service
WO2022199186A1 (en) Internet-of-things communication system based on quantum technology
CN105871857A (en) Authentication method, authentication device, authentication system and treatment equipment
CN114143784A (en) Providing access credentials to secure networks using wireless beacons
US11494758B2 (en) Wireless communication device and payment system
US9424438B2 (en) Privacy leakage protection
JP2006323728A (en) Service system and optimal service provision method
WO2017107733A1 (en) Off-line payment method, terminal device, background payment apparatus and off-line payment system
CN108470279B (en) Electronic ticket transferring and verifying method, client, server and ticketing system
JPH10105612A (en) Authentification system
JP2013187698A (en) Secret information transmission method and system for transmitting different pieces of secret information from terminal to each company server
CN108234427A (en) The exchange method of multi-screen Android POS systems
EP3411845A1 (en) Payment handling apparatus and method
CN106909850A (en) A kind of internet code keypad system and its implementation based on HTML5
JP5245447B2 (en) Payment system, TV receiver, payment method
JP2007249349A (en) Cardless debit settlement system, method, and control program thereof
JPH10149396A (en) Commercial transaction system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180629

WW01 Invention patent application withdrawn after publication