CN110727946A - Process protection method based on fingerprint verification, automatic teller machine and storage medium - Google Patents
Process protection method based on fingerprint verification, automatic teller machine and storage medium Download PDFInfo
- Publication number
- CN110727946A CN110727946A CN201910944116.3A CN201910944116A CN110727946A CN 110727946 A CN110727946 A CN 110727946A CN 201910944116 A CN201910944116 A CN 201910944116A CN 110727946 A CN110727946 A CN 110727946A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- teller machine
- processes
- automatic teller
- white list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44589—Program code verification, e.g. Java bytecode verification, proof-carrying code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention relates to a process protection method based on fingerprint verification, an automatic teller machine and a storage medium, wherein the method comprises the following steps: traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list; intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code; and judging whether the process fingerprint is the same as a legal fingerprint in the process white list, if so, allowing the process to be started, and otherwise, refusing the process to be started. The process protection method based on fingerprint verification provided by the invention can judge whether the process to be started is a legal process or not by generating the process white list containing the legal fingerprint of the process and then verifying the process fingerprint of the process to be started, thereby reducing the probability that the illegal process is disguised as the legal process and improving the system safety of the automatic teller machine; the problem that in the prior art, the automatic teller machine is easily implanted into an illegal program by a criminal and has low safety is solved.
Description
Technical Field
The invention relates to the technical field of financial security, in particular to a process protection method based on fingerprint verification, an automatic teller machine and a storage medium.
Background
An ATM is an abbreviation of Automatic Teller Machine, which means an ATM, and is also called an ATM because most of them are used for withdrawing money. The device is a highly precise electromechanical integrated device, realizes self-service of financial transactions by utilizing a magnetic code card or an intelligent card, and replaces the work of bank counter personnel. The work of withdrawing cash, inquiring deposit balance, transferring funds among accounts, inquiring balance and the like can be carried out; it can also perform cash deposit (real-time account entry), check deposit (domestic nothing), bankbook subsidy, intermediate business, etc. The card holder can use credit card or deposit card to transact services such as automatic withdrawal, balance inquiry, account transfer, cash deposit, bankbook registration, fund purchase, password change, mobile phone charge payment and the like according to the password.
A plurality of application programs are usually operated in the automatic teller machine, different services can be provided for users, and the automatic teller machine is very convenient; however, the security is low because criminals are easy to implant illegal programs to control illegal activities such as automatic cash dispensing of the ATM.
Therefore, the prior art has yet to be improved.
Disclosure of Invention
In view of the above, it is necessary to provide a process protection method based on fingerprint verification, an automatic teller machine and a storage medium, aiming at solving the problem that the prior art automatic teller machine is easy to be implanted into an illegal program by a criminal and has low security.
The technical scheme of the invention is as follows:
a process protection method based on fingerprint verification, comprising:
traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list;
intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code;
and judging whether the process fingerprint is the same as a legal fingerprint in the process white list, if so, allowing the process to be started, and otherwise, refusing the process to be started.
In a further preferred embodiment, after the step of traversing the processes in the atm and calculating legal fingerprints one by one using the unique feature codes of the processes to form a process white list, the step of intercepting the process to be started and calculating the process fingerprint of the process by using the unique feature codes further includes: and uploading and storing the process white list to a server.
In a further preferred embodiment, after the step of uploading and storing the process white list to the server, the step of intercepting the process to be started and calculating the process fingerprint of the process by using the unique feature code further includes: and after the automatic teller machine is started, acquiring a process white list from the storage and loading the process white list to a memory of the automatic teller machine.
In a further preferred embodiment, the step of traversing the processes in the atm and calculating the legal fingerprints one by one using the unique feature codes of the processes further includes, after the step of forming the white list of the processes:
when an application program in the automatic teller machine is upgraded, acquiring modification information of a legal process in the automatic teller machine, and generating an audit list;
and receiving an audit confirmation instruction of an administrator, and updating the process white list according to the modification information.
In a further preferred embodiment, after the step of traversing the processes in the atm and calculating legal fingerprints one by one using the unique feature codes of the processes to form a process white list, the step of intercepting the process to be started and calculating the process fingerprint of the process by using the unique feature codes further includes: and uploading and storing the process white list to a server.
In a further preferred embodiment, the step of acquiring modification information of a legal process in the automatic teller machine and generating an audit list when the application program in the automatic teller machine is upgraded specifically includes:
when an application program in the automatic teller machine is upgraded, the server controls the automatic teller machine to enter an upgrading mode;
the automatic teller machine collects the modification information of the process of the aggregation method and generates an audit list; the modification information includes deletion, replacement and addition of legal processes.
In a further preferred embodiment, the step of intercepting the process to be started and calculating the process fingerprint of the process by using the unique feature code further comprises: starting a process interceptor;
the steps of intercepting the process to be started and calculating the process fingerprint of the process through the unique feature code are specifically as follows: the process interceptor receives a start request for a process and computes a process fingerprint for the process from the unique feature code.
In a further preferred embodiment, the step of traversing the processes in the automated teller machine and calculating the legal fingerprints one by one using the unique feature codes of the processes to form the process white list specifically includes:
when the automatic teller machine is installed, the processes in the system are traversed, and the legal fingerprints are calculated one by using the unique feature codes of the processes to form a process white list.
An automatic teller machine comprises a memory and a processor, wherein the memory stores a process protection program based on fingerprint verification, and the process protection program based on fingerprint verification is executed by the processor to realize the process protection method based on fingerprint verification.
A storage medium having a computer program stored thereon, wherein the computer program when executed by a processor implements the steps of the process protection method based on fingerprint verification as defined in any one of the above.
Compared with the prior art, the process protection method based on fingerprint verification provided by the invention comprises the following steps: traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list; intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code; and judging whether the process fingerprint is the same as a legal fingerprint in the process white list, if so, allowing the process to be started, and otherwise, refusing the process to be started. The process protection method based on fingerprint verification provided by the invention can judge whether the process to be started is a legal process or not by generating the process white list containing the legal fingerprint of the process and then verifying the process fingerprint of the process to be started, thereby reducing the probability that the illegal process is disguised as the legal process and improving the system safety of the automatic teller machine; the problem that in the prior art, the automatic teller machine is easily implanted into an illegal program by a criminal and has low safety is solved.
Drawings
Fig. 1 is a flow chart of a process protection method based on fingerprint verification in the preferred embodiment of the present invention.
Fig. 2 is a functional block diagram of an automated teller machine in a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, the process protection method based on fingerprint verification provided by the present invention includes the steps of:
s100, traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list.
The unique feature code can uniquely determine the feature code of the real identity of an application, such as the content of a binary file in a process; legal fingerprints are process fingerprints of legal processes, such as MD 5.
Taking a wsap. exe process as an example for schematic illustration, when calculating the legal fingerprint of the wsap. exe, first, the process information of the wsap. exe is collected, binary data of the wsap. exe file is obtained, then MD5 is calculated by using the binary data, and the MD5 obtained by calculation is the legal fingerprint of the wsap. exe.
It can be understood that the present invention does not need to limit the traversal order of the processes and the calculation order of the legal fingerprints, as long as the legal processes in the automatic teller machine are guaranteed to complete the calculation of the legal fingerprints, and are added into the process white list.
Because the illegal process can be disguised as a legal process (the name is the same), the method of adding the name of the legal process into the white list and intercepting the illegal process by using the white list is infeasible, and the illegal process cannot be ensured to be intercepted; therefore, the invention collects the unique characteristic code of each process and calculates the legal fingerprints corresponding to the processes one by one, thereby improving the system security of the automatic teller machine.
Preferably, the process in the step S100 is a legal process, and the step S100 is performed when the automatic teller machine is installed, the automatic teller machine is not operated yet, an illegal process is not implanted by a hacker in the automatic teller machine, and the obtained processes are all legal processes without screening; therefore, the invention specifically comprises the following steps: when the automatic teller machine is installed, the processes in the system are traversed, and the legal fingerprints are calculated one by using the unique feature codes of the processes to form a process white list.
S200, intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code.
As a preferred embodiment of the present invention, after S100 and before S200, the method further includes the steps of: and starting the process interceptor. The process interceptor in the present invention is different from the process interceptor in the prior art, which has the following functions: 1. automatically judging the currently running application program; 2. intercepting shutdown, a window, a timer and the like of a specified process; 3. if the foreground process of a certain application program is detected to be quitted, the background process of the application program is ended within a certain time; 4. a process specified by a user is intercepted. The process interceptor can intercept all processes, is irrelevant to which application program, and belongs to indifferent interception; and the process interceptor in the invention can also calculate the process fingerprint according to the unique feature code of the process to be started.
Suitably, the S200 is specifically: the process interceptor receives a start request for a process and computes a process fingerprint for the process from the unique feature code. All processes need to be started through a process interceptor, and the processes to be started cannot be started before the fingerprint calculation and the fingerprint checking are not completed.
S300, judging whether the process fingerprint is the same as a legal fingerprint in the process white list or not, if so, allowing the process to be started, and otherwise, refusing the process to be started.
The process protection method based on fingerprint verification provided by the invention can judge whether the process to be started is a legal process or not by generating the process white list containing the legal fingerprint of the process and then verifying the process fingerprint of the process to be started, thereby reducing the probability that the illegal process is disguised as the legal process and improving the system safety of the automatic teller machine; the problem that in the prior art, the automatic teller machine is easily implanted into an illegal program by a criminal and has low safety is solved.
Further, after S100 and before S200, the method further includes the steps of: and uploading and storing the process white list to a server. Uploading and storing the process white list to a server, so that the process white list can be prevented from being tampered, and the integrity of the process white list is ensured; and secondly, the process white list can be prevented from being lost or damaged due to the failure of the automatic teller machine system.
After the process white list is uploaded and stored in the server, the operation related to the process white list can not be performed except the conditions of updating, losing and the like of the process white list; alternatively, the process white list may be downloaded to a plurality of automated teller machines of the same series (the plurality of automated teller machines have the same legitimate process), and the trouble of generating the process white lists of the automated teller machines one by one may be avoided in the case of tamper prevention.
In specific implementation, after the step of uploading and storing the process white list to the server, the method further includes, before the step S200: and after the automatic teller machine is started, acquiring a process white list from the storage and loading the process white list to a memory of the automatic teller machine.
According to another aspect of the present invention, the S100 further comprises the following steps:
when an application program in the automatic teller machine is upgraded, acquiring modification information of a legal process in the automatic teller machine, and generating an audit list; the modification information includes deletion, replacement and addition of legal processes.
And receiving an audit confirmation instruction of an administrator, and updating the process white list according to the modification information.
Further, the step of acquiring modification information of a legal process in the automatic teller machine and generating an audit list when the application program in the automatic teller machine is upgraded specifically includes:
when an application program in the automatic teller machine is upgraded, the server controls the automatic teller machine to enter an upgrading mode;
the automatic teller machine collects the modification information of the process of the aggregation method and generates an audit list; the modification information includes deletion, replacement and addition of legal processes.
When an application is upgraded, the processes used by the application may change, such as deleting certain processes, updating certain processes, and/or adding certain processes. The invention provides an upgrading mode, the server controls the opening and closing, when the system upgrading mode is opened, the invention can automatically collect the process information of the system addition and deletion, and pushes the process information to the server, the server generates an audit list, and after the audit is passed by an administrator, a new process fingerprint white list is automatically updated.
It is easy to understand that there are many ways to compute a process fingerprint, but the basic idea is to collect a unique feature code of a process file and compute a unique value using an algorithm. For example, when the WSAP.exe process needs to be allowed to be started, in the installation process, the process information of the WSAP.exe is collected, binary data of a WSAP.exe file is obtained, the MD5 is calculated by using the data, the obtained value is the process fingerprint of the process, the process fingerprint is configured into a process white list and is placed into a server side, and when the ATM is started, the process white list is automatically synchronized into the ATM. When the wsap. exe process is started, the process start filter obtains the process fingerprint in the same manner, and compares it with the process fingerprint in the white list, and then allows the wsap. exe process to start.
In summary, the invention intercepts the process starting information in the ATM through the process interceptor, then calculates the process fingerprint through the unique feature code (such as binary file content) of the process, and performs security protection on the process by checking the process fingerprint.
As shown in fig. 2, the present invention further provides an automatic teller machine, which includes a memory 10 and a processor 20, where the memory 10 stores a process protection program based on fingerprint authentication, and when the process protection program based on fingerprint authentication is executed by the processor 20, the process protection method based on fingerprint authentication as described above is implemented.
The present invention also provides a storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of the process protection method based on fingerprint authentication as described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (SyNchlinNk) DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A process protection method based on fingerprint verification is characterized by comprising the following steps:
traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list;
intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code;
and judging whether the process fingerprint is the same as a legal fingerprint in the process white list, if so, allowing the process to be started, and otherwise, refusing the process to be started.
2. The fingerprint-based process protection method of claim 1, wherein after the step of traversing the processes in the atm and computing legal fingerprints one by one using the unique feature codes of the processes to form a process white list, the step of intercepting the process to be started and computing the process fingerprint of the process by the unique feature codes further comprises: and uploading and storing the process white list to a server.
3. The fingerprint-based process protection method of claim 2, wherein after the step of uploading and storing the process white list to the server, the step of intercepting the process to be started and calculating the process fingerprint of the process by the unique feature code further comprises: and after the automatic teller machine is started, acquiring a process white list from the storage and loading the process white list to a memory of the automatic teller machine.
4. The fingerprint authentication-based process protection method according to claim 1, wherein the step of traversing the processes in the automatic teller machine and computing legal fingerprints one by one using the unique feature codes of the processes further comprises the steps of:
when an application program in the automatic teller machine is upgraded, acquiring modification information of a legal process in the automatic teller machine, and generating an audit list;
and receiving an audit confirmation instruction of an administrator, and updating the process white list according to the modification information.
5. The fingerprint-based process protection method of claim 4, wherein after the step of traversing the processes in the ATM and computing legal fingerprints one by one using the unique feature codes of the processes to form a process white list, the step of intercepting the process to be started and computing the process fingerprint of the process by the unique feature codes further comprises: and uploading and storing the process white list to a server.
6. The fingerprint authentication-based process protection method according to claim 5, wherein the step of acquiring modification information of legal processes in the ATM and generating the audit list when the application program in the ATM is upgraded specifically comprises:
when an application program in the automatic teller machine is upgraded, the server controls the automatic teller machine to enter an upgrading mode;
the automatic teller machine collects the modification information of the process of the aggregation method and generates an audit list; the modification information includes deletion, replacement and addition of legal processes.
7. The fingerprint authentication-based process protection method according to claim 1, wherein the step of intercepting the process to be started and calculating the process fingerprint of the process by the unique feature code further comprises: starting a process interceptor;
the steps of intercepting the process to be started and calculating the process fingerprint of the process through the unique feature code are specifically as follows: the process interceptor receives a start request for a process and computes a process fingerprint for the process from the unique feature code.
8. The fingerprint authentication-based process protection method according to any one of claims 1 to 7, wherein the step of traversing the processes in the ATM and calculating the legal fingerprints one by one using the unique feature codes of the processes to form the process white list specifically comprises:
when the automatic teller machine is installed, the processes in the system are traversed, and the legal fingerprints are calculated one by using the unique feature codes of the processes to form a process white list.
9. An automatic teller machine comprising a memory and a processor, wherein the memory stores a process protection program based on fingerprint authentication, and the process protection program based on fingerprint authentication is executed by the processor to implement the process protection method based on fingerprint authentication according to any one of claims 1 to 8.
10. A storage medium having stored thereon a computer program, wherein the computer program, when being executed by a processor, is adapted to carry out the steps of the fingerprint authentication based process protection method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910944116.3A CN110727946A (en) | 2019-09-30 | 2019-09-30 | Process protection method based on fingerprint verification, automatic teller machine and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910944116.3A CN110727946A (en) | 2019-09-30 | 2019-09-30 | Process protection method based on fingerprint verification, automatic teller machine and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110727946A true CN110727946A (en) | 2020-01-24 |
Family
ID=69218689
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910944116.3A Pending CN110727946A (en) | 2019-09-30 | 2019-09-30 | Process protection method based on fingerprint verification, automatic teller machine and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110727946A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111310180A (en) * | 2020-02-18 | 2020-06-19 | 上海迅软信息科技有限公司 | Computer process anti-counterfeiting method for enterprise information security |
CN111949951A (en) * | 2020-08-07 | 2020-11-17 | 山东英信计算机技术有限公司 | Account number management and control method, account number management and control system, storage medium and electronic equipment |
CN113641423A (en) * | 2021-08-31 | 2021-11-12 | 青岛海信传媒网络技术有限公司 | Display device and system starting method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101650768A (en) * | 2009-07-10 | 2010-02-17 | 深圳市永达电子股份有限公司 | Security guarantee method and system for Windows terminals based on auto white list |
CN101706851A (en) * | 2009-11-03 | 2010-05-12 | 广州广电运通金融电子股份有限公司 | Method and system for controlling process of self-help terminal |
-
2019
- 2019-09-30 CN CN201910944116.3A patent/CN110727946A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101650768A (en) * | 2009-07-10 | 2010-02-17 | 深圳市永达电子股份有限公司 | Security guarantee method and system for Windows terminals based on auto white list |
CN101706851A (en) * | 2009-11-03 | 2010-05-12 | 广州广电运通金融电子股份有限公司 | Method and system for controlling process of self-help terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111310180A (en) * | 2020-02-18 | 2020-06-19 | 上海迅软信息科技有限公司 | Computer process anti-counterfeiting method for enterprise information security |
CN111949951A (en) * | 2020-08-07 | 2020-11-17 | 山东英信计算机技术有限公司 | Account number management and control method, account number management and control system, storage medium and electronic equipment |
CN113641423A (en) * | 2021-08-31 | 2021-11-12 | 青岛海信传媒网络技术有限公司 | Display device and system starting method |
CN113641423B (en) * | 2021-08-31 | 2023-07-07 | 青岛海信传媒网络技术有限公司 | Display device and system starting method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110727946A (en) | Process protection method based on fingerprint verification, automatic teller machine and storage medium | |
US9691067B2 (en) | Validation database resident on a network server and containing specified distinctive identifiers of local/mobile computing devices may be used as a digital hardware key in the process of gaining authorized access to a users online website account such as, but not limited to, e-commerce website account, online financial accounts and online email accounts | |
US20200143377A1 (en) | Systems and methods for user identity authentication | |
WO2017189492A1 (en) | Systems and methods for extracting browser-obtained device information for authenticating user devices | |
US20200320535A1 (en) | Method for securing an electronic device and corresponding electronic device | |
TWI787571B (en) | Payment identity verification method and device | |
US8931080B2 (en) | Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource | |
CN115761939A (en) | Withdrawal box lock and unlock control method, withdrawal box, system and device | |
CA2851898A1 (en) | Biometric-based transaction fraud detection | |
US10657774B1 (en) | System and method of authentication using a re-writable card verification value | |
KR101876672B1 (en) | Digital signature method using block chain and system performing the same | |
CN106875175B (en) | Method and device convenient for payment subject expansion | |
EP3876176A1 (en) | Method for authorizing a person to perform a transaction involving a smart card | |
CN110490577A (en) | A kind of anti-attack method of pasting card, device, SIM pasting card and storage medium | |
US11640597B2 (en) | Method of managing an emergency mode transaction procedure, and an associated device | |
CN111681010A (en) | Transaction verification method and device | |
JP4453502B2 (en) | IC card system | |
CN110719175B (en) | Interface calling verification method, automatic teller machine and storage medium | |
KR20210048210A (en) | Method, system and program for create virtual account for each cryptocurrency for financial transactions | |
Ogata et al. | An ATM security measure to prevent unauthorized deposit with a smart card | |
US20220335420A1 (en) | Memory management in a transaction processing device | |
US20230394450A1 (en) | System and method for storing automated teller machine session data | |
KR20100131860A (en) | System and method for lossaccept process of electronic money | |
JP2013105438A (en) | Card collation system, and card collation method | |
CN117273872A (en) | Equipment leasing data processing method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200124 |