CN110727946A - Process protection method based on fingerprint verification, automatic teller machine and storage medium - Google Patents

Process protection method based on fingerprint verification, automatic teller machine and storage medium Download PDF

Info

Publication number
CN110727946A
CN110727946A CN201910944116.3A CN201910944116A CN110727946A CN 110727946 A CN110727946 A CN 110727946A CN 201910944116 A CN201910944116 A CN 201910944116A CN 110727946 A CN110727946 A CN 110727946A
Authority
CN
China
Prior art keywords
fingerprint
teller machine
processes
automatic teller
white list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910944116.3A
Other languages
Chinese (zh)
Inventor
朱洪亮
谭建辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZIJIN FULCRUM TECHNOLOGY Co Ltd
Original Assignee
BEIJING ZIJIN FULCRUM TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZIJIN FULCRUM TECHNOLOGY Co Ltd filed Critical BEIJING ZIJIN FULCRUM TECHNOLOGY Co Ltd
Priority to CN201910944116.3A priority Critical patent/CN110727946A/en
Publication of CN110727946A publication Critical patent/CN110727946A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44589Program code verification, e.g. Java bytecode verification, proof-carrying code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to a process protection method based on fingerprint verification, an automatic teller machine and a storage medium, wherein the method comprises the following steps: traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list; intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code; and judging whether the process fingerprint is the same as a legal fingerprint in the process white list, if so, allowing the process to be started, and otherwise, refusing the process to be started. The process protection method based on fingerprint verification provided by the invention can judge whether the process to be started is a legal process or not by generating the process white list containing the legal fingerprint of the process and then verifying the process fingerprint of the process to be started, thereby reducing the probability that the illegal process is disguised as the legal process and improving the system safety of the automatic teller machine; the problem that in the prior art, the automatic teller machine is easily implanted into an illegal program by a criminal and has low safety is solved.

Description

Process protection method based on fingerprint verification, automatic teller machine and storage medium
Technical Field
The invention relates to the technical field of financial security, in particular to a process protection method based on fingerprint verification, an automatic teller machine and a storage medium.
Background
An ATM is an abbreviation of Automatic Teller Machine, which means an ATM, and is also called an ATM because most of them are used for withdrawing money. The device is a highly precise electromechanical integrated device, realizes self-service of financial transactions by utilizing a magnetic code card or an intelligent card, and replaces the work of bank counter personnel. The work of withdrawing cash, inquiring deposit balance, transferring funds among accounts, inquiring balance and the like can be carried out; it can also perform cash deposit (real-time account entry), check deposit (domestic nothing), bankbook subsidy, intermediate business, etc. The card holder can use credit card or deposit card to transact services such as automatic withdrawal, balance inquiry, account transfer, cash deposit, bankbook registration, fund purchase, password change, mobile phone charge payment and the like according to the password.
A plurality of application programs are usually operated in the automatic teller machine, different services can be provided for users, and the automatic teller machine is very convenient; however, the security is low because criminals are easy to implant illegal programs to control illegal activities such as automatic cash dispensing of the ATM.
Therefore, the prior art has yet to be improved.
Disclosure of Invention
In view of the above, it is necessary to provide a process protection method based on fingerprint verification, an automatic teller machine and a storage medium, aiming at solving the problem that the prior art automatic teller machine is easy to be implanted into an illegal program by a criminal and has low security.
The technical scheme of the invention is as follows:
a process protection method based on fingerprint verification, comprising:
traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list;
intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code;
and judging whether the process fingerprint is the same as a legal fingerprint in the process white list, if so, allowing the process to be started, and otherwise, refusing the process to be started.
In a further preferred embodiment, after the step of traversing the processes in the atm and calculating legal fingerprints one by one using the unique feature codes of the processes to form a process white list, the step of intercepting the process to be started and calculating the process fingerprint of the process by using the unique feature codes further includes: and uploading and storing the process white list to a server.
In a further preferred embodiment, after the step of uploading and storing the process white list to the server, the step of intercepting the process to be started and calculating the process fingerprint of the process by using the unique feature code further includes: and after the automatic teller machine is started, acquiring a process white list from the storage and loading the process white list to a memory of the automatic teller machine.
In a further preferred embodiment, the step of traversing the processes in the atm and calculating the legal fingerprints one by one using the unique feature codes of the processes further includes, after the step of forming the white list of the processes:
when an application program in the automatic teller machine is upgraded, acquiring modification information of a legal process in the automatic teller machine, and generating an audit list;
and receiving an audit confirmation instruction of an administrator, and updating the process white list according to the modification information.
In a further preferred embodiment, after the step of traversing the processes in the atm and calculating legal fingerprints one by one using the unique feature codes of the processes to form a process white list, the step of intercepting the process to be started and calculating the process fingerprint of the process by using the unique feature codes further includes: and uploading and storing the process white list to a server.
In a further preferred embodiment, the step of acquiring modification information of a legal process in the automatic teller machine and generating an audit list when the application program in the automatic teller machine is upgraded specifically includes:
when an application program in the automatic teller machine is upgraded, the server controls the automatic teller machine to enter an upgrading mode;
the automatic teller machine collects the modification information of the process of the aggregation method and generates an audit list; the modification information includes deletion, replacement and addition of legal processes.
In a further preferred embodiment, the step of intercepting the process to be started and calculating the process fingerprint of the process by using the unique feature code further comprises: starting a process interceptor;
the steps of intercepting the process to be started and calculating the process fingerprint of the process through the unique feature code are specifically as follows: the process interceptor receives a start request for a process and computes a process fingerprint for the process from the unique feature code.
In a further preferred embodiment, the step of traversing the processes in the automated teller machine and calculating the legal fingerprints one by one using the unique feature codes of the processes to form the process white list specifically includes:
when the automatic teller machine is installed, the processes in the system are traversed, and the legal fingerprints are calculated one by using the unique feature codes of the processes to form a process white list.
An automatic teller machine comprises a memory and a processor, wherein the memory stores a process protection program based on fingerprint verification, and the process protection program based on fingerprint verification is executed by the processor to realize the process protection method based on fingerprint verification.
A storage medium having a computer program stored thereon, wherein the computer program when executed by a processor implements the steps of the process protection method based on fingerprint verification as defined in any one of the above.
Compared with the prior art, the process protection method based on fingerprint verification provided by the invention comprises the following steps: traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list; intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code; and judging whether the process fingerprint is the same as a legal fingerprint in the process white list, if so, allowing the process to be started, and otherwise, refusing the process to be started. The process protection method based on fingerprint verification provided by the invention can judge whether the process to be started is a legal process or not by generating the process white list containing the legal fingerprint of the process and then verifying the process fingerprint of the process to be started, thereby reducing the probability that the illegal process is disguised as the legal process and improving the system safety of the automatic teller machine; the problem that in the prior art, the automatic teller machine is easily implanted into an illegal program by a criminal and has low safety is solved.
Drawings
Fig. 1 is a flow chart of a process protection method based on fingerprint verification in the preferred embodiment of the present invention.
Fig. 2 is a functional block diagram of an automated teller machine in a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, the process protection method based on fingerprint verification provided by the present invention includes the steps of:
s100, traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list.
The unique feature code can uniquely determine the feature code of the real identity of an application, such as the content of a binary file in a process; legal fingerprints are process fingerprints of legal processes, such as MD 5.
Taking a wsap. exe process as an example for schematic illustration, when calculating the legal fingerprint of the wsap. exe, first, the process information of the wsap. exe is collected, binary data of the wsap. exe file is obtained, then MD5 is calculated by using the binary data, and the MD5 obtained by calculation is the legal fingerprint of the wsap. exe.
It can be understood that the present invention does not need to limit the traversal order of the processes and the calculation order of the legal fingerprints, as long as the legal processes in the automatic teller machine are guaranteed to complete the calculation of the legal fingerprints, and are added into the process white list.
Because the illegal process can be disguised as a legal process (the name is the same), the method of adding the name of the legal process into the white list and intercepting the illegal process by using the white list is infeasible, and the illegal process cannot be ensured to be intercepted; therefore, the invention collects the unique characteristic code of each process and calculates the legal fingerprints corresponding to the processes one by one, thereby improving the system security of the automatic teller machine.
Preferably, the process in the step S100 is a legal process, and the step S100 is performed when the automatic teller machine is installed, the automatic teller machine is not operated yet, an illegal process is not implanted by a hacker in the automatic teller machine, and the obtained processes are all legal processes without screening; therefore, the invention specifically comprises the following steps: when the automatic teller machine is installed, the processes in the system are traversed, and the legal fingerprints are calculated one by using the unique feature codes of the processes to form a process white list.
S200, intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code.
As a preferred embodiment of the present invention, after S100 and before S200, the method further includes the steps of: and starting the process interceptor. The process interceptor in the present invention is different from the process interceptor in the prior art, which has the following functions: 1. automatically judging the currently running application program; 2. intercepting shutdown, a window, a timer and the like of a specified process; 3. if the foreground process of a certain application program is detected to be quitted, the background process of the application program is ended within a certain time; 4. a process specified by a user is intercepted. The process interceptor can intercept all processes, is irrelevant to which application program, and belongs to indifferent interception; and the process interceptor in the invention can also calculate the process fingerprint according to the unique feature code of the process to be started.
Suitably, the S200 is specifically: the process interceptor receives a start request for a process and computes a process fingerprint for the process from the unique feature code. All processes need to be started through a process interceptor, and the processes to be started cannot be started before the fingerprint calculation and the fingerprint checking are not completed.
S300, judging whether the process fingerprint is the same as a legal fingerprint in the process white list or not, if so, allowing the process to be started, and otherwise, refusing the process to be started.
The process protection method based on fingerprint verification provided by the invention can judge whether the process to be started is a legal process or not by generating the process white list containing the legal fingerprint of the process and then verifying the process fingerprint of the process to be started, thereby reducing the probability that the illegal process is disguised as the legal process and improving the system safety of the automatic teller machine; the problem that in the prior art, the automatic teller machine is easily implanted into an illegal program by a criminal and has low safety is solved.
Further, after S100 and before S200, the method further includes the steps of: and uploading and storing the process white list to a server. Uploading and storing the process white list to a server, so that the process white list can be prevented from being tampered, and the integrity of the process white list is ensured; and secondly, the process white list can be prevented from being lost or damaged due to the failure of the automatic teller machine system.
After the process white list is uploaded and stored in the server, the operation related to the process white list can not be performed except the conditions of updating, losing and the like of the process white list; alternatively, the process white list may be downloaded to a plurality of automated teller machines of the same series (the plurality of automated teller machines have the same legitimate process), and the trouble of generating the process white lists of the automated teller machines one by one may be avoided in the case of tamper prevention.
In specific implementation, after the step of uploading and storing the process white list to the server, the method further includes, before the step S200: and after the automatic teller machine is started, acquiring a process white list from the storage and loading the process white list to a memory of the automatic teller machine.
According to another aspect of the present invention, the S100 further comprises the following steps:
when an application program in the automatic teller machine is upgraded, acquiring modification information of a legal process in the automatic teller machine, and generating an audit list; the modification information includes deletion, replacement and addition of legal processes.
And receiving an audit confirmation instruction of an administrator, and updating the process white list according to the modification information.
Further, the step of acquiring modification information of a legal process in the automatic teller machine and generating an audit list when the application program in the automatic teller machine is upgraded specifically includes:
when an application program in the automatic teller machine is upgraded, the server controls the automatic teller machine to enter an upgrading mode;
the automatic teller machine collects the modification information of the process of the aggregation method and generates an audit list; the modification information includes deletion, replacement and addition of legal processes.
When an application is upgraded, the processes used by the application may change, such as deleting certain processes, updating certain processes, and/or adding certain processes. The invention provides an upgrading mode, the server controls the opening and closing, when the system upgrading mode is opened, the invention can automatically collect the process information of the system addition and deletion, and pushes the process information to the server, the server generates an audit list, and after the audit is passed by an administrator, a new process fingerprint white list is automatically updated.
It is easy to understand that there are many ways to compute a process fingerprint, but the basic idea is to collect a unique feature code of a process file and compute a unique value using an algorithm. For example, when the WSAP.exe process needs to be allowed to be started, in the installation process, the process information of the WSAP.exe is collected, binary data of a WSAP.exe file is obtained, the MD5 is calculated by using the data, the obtained value is the process fingerprint of the process, the process fingerprint is configured into a process white list and is placed into a server side, and when the ATM is started, the process white list is automatically synchronized into the ATM. When the wsap. exe process is started, the process start filter obtains the process fingerprint in the same manner, and compares it with the process fingerprint in the white list, and then allows the wsap. exe process to start.
In summary, the invention intercepts the process starting information in the ATM through the process interceptor, then calculates the process fingerprint through the unique feature code (such as binary file content) of the process, and performs security protection on the process by checking the process fingerprint.
As shown in fig. 2, the present invention further provides an automatic teller machine, which includes a memory 10 and a processor 20, where the memory 10 stores a process protection program based on fingerprint authentication, and when the process protection program based on fingerprint authentication is executed by the processor 20, the process protection method based on fingerprint authentication as described above is implemented.
The present invention also provides a storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of the process protection method based on fingerprint authentication as described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (SyNchlinNk) DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A process protection method based on fingerprint verification is characterized by comprising the following steps:
traversing processes in the automatic teller machine, and calculating legal fingerprints one by using the unique feature codes of the processes to form a process white list;
intercepting a process to be started, and calculating a process fingerprint of the process through the unique feature code;
and judging whether the process fingerprint is the same as a legal fingerprint in the process white list, if so, allowing the process to be started, and otherwise, refusing the process to be started.
2. The fingerprint-based process protection method of claim 1, wherein after the step of traversing the processes in the atm and computing legal fingerprints one by one using the unique feature codes of the processes to form a process white list, the step of intercepting the process to be started and computing the process fingerprint of the process by the unique feature codes further comprises: and uploading and storing the process white list to a server.
3. The fingerprint-based process protection method of claim 2, wherein after the step of uploading and storing the process white list to the server, the step of intercepting the process to be started and calculating the process fingerprint of the process by the unique feature code further comprises: and after the automatic teller machine is started, acquiring a process white list from the storage and loading the process white list to a memory of the automatic teller machine.
4. The fingerprint authentication-based process protection method according to claim 1, wherein the step of traversing the processes in the automatic teller machine and computing legal fingerprints one by one using the unique feature codes of the processes further comprises the steps of:
when an application program in the automatic teller machine is upgraded, acquiring modification information of a legal process in the automatic teller machine, and generating an audit list;
and receiving an audit confirmation instruction of an administrator, and updating the process white list according to the modification information.
5. The fingerprint-based process protection method of claim 4, wherein after the step of traversing the processes in the ATM and computing legal fingerprints one by one using the unique feature codes of the processes to form a process white list, the step of intercepting the process to be started and computing the process fingerprint of the process by the unique feature codes further comprises: and uploading and storing the process white list to a server.
6. The fingerprint authentication-based process protection method according to claim 5, wherein the step of acquiring modification information of legal processes in the ATM and generating the audit list when the application program in the ATM is upgraded specifically comprises:
when an application program in the automatic teller machine is upgraded, the server controls the automatic teller machine to enter an upgrading mode;
the automatic teller machine collects the modification information of the process of the aggregation method and generates an audit list; the modification information includes deletion, replacement and addition of legal processes.
7. The fingerprint authentication-based process protection method according to claim 1, wherein the step of intercepting the process to be started and calculating the process fingerprint of the process by the unique feature code further comprises: starting a process interceptor;
the steps of intercepting the process to be started and calculating the process fingerprint of the process through the unique feature code are specifically as follows: the process interceptor receives a start request for a process and computes a process fingerprint for the process from the unique feature code.
8. The fingerprint authentication-based process protection method according to any one of claims 1 to 7, wherein the step of traversing the processes in the ATM and calculating the legal fingerprints one by one using the unique feature codes of the processes to form the process white list specifically comprises:
when the automatic teller machine is installed, the processes in the system are traversed, and the legal fingerprints are calculated one by using the unique feature codes of the processes to form a process white list.
9. An automatic teller machine comprising a memory and a processor, wherein the memory stores a process protection program based on fingerprint authentication, and the process protection program based on fingerprint authentication is executed by the processor to implement the process protection method based on fingerprint authentication according to any one of claims 1 to 8.
10. A storage medium having stored thereon a computer program, wherein the computer program, when being executed by a processor, is adapted to carry out the steps of the fingerprint authentication based process protection method according to any one of claims 1 to 8.
CN201910944116.3A 2019-09-30 2019-09-30 Process protection method based on fingerprint verification, automatic teller machine and storage medium Pending CN110727946A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910944116.3A CN110727946A (en) 2019-09-30 2019-09-30 Process protection method based on fingerprint verification, automatic teller machine and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910944116.3A CN110727946A (en) 2019-09-30 2019-09-30 Process protection method based on fingerprint verification, automatic teller machine and storage medium

Publications (1)

Publication Number Publication Date
CN110727946A true CN110727946A (en) 2020-01-24

Family

ID=69218689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910944116.3A Pending CN110727946A (en) 2019-09-30 2019-09-30 Process protection method based on fingerprint verification, automatic teller machine and storage medium

Country Status (1)

Country Link
CN (1) CN110727946A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310180A (en) * 2020-02-18 2020-06-19 上海迅软信息科技有限公司 Computer process anti-counterfeiting method for enterprise information security
CN111949951A (en) * 2020-08-07 2020-11-17 山东英信计算机技术有限公司 Account number management and control method, account number management and control system, storage medium and electronic equipment
CN113641423A (en) * 2021-08-31 2021-11-12 青岛海信传媒网络技术有限公司 Display device and system starting method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101650768A (en) * 2009-07-10 2010-02-17 深圳市永达电子股份有限公司 Security guarantee method and system for Windows terminals based on auto white list
CN101706851A (en) * 2009-11-03 2010-05-12 广州广电运通金融电子股份有限公司 Method and system for controlling process of self-help terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101650768A (en) * 2009-07-10 2010-02-17 深圳市永达电子股份有限公司 Security guarantee method and system for Windows terminals based on auto white list
CN101706851A (en) * 2009-11-03 2010-05-12 广州广电运通金融电子股份有限公司 Method and system for controlling process of self-help terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310180A (en) * 2020-02-18 2020-06-19 上海迅软信息科技有限公司 Computer process anti-counterfeiting method for enterprise information security
CN111949951A (en) * 2020-08-07 2020-11-17 山东英信计算机技术有限公司 Account number management and control method, account number management and control system, storage medium and electronic equipment
CN113641423A (en) * 2021-08-31 2021-11-12 青岛海信传媒网络技术有限公司 Display device and system starting method
CN113641423B (en) * 2021-08-31 2023-07-07 青岛海信传媒网络技术有限公司 Display device and system starting method

Similar Documents

Publication Publication Date Title
CN110727946A (en) Process protection method based on fingerprint verification, automatic teller machine and storage medium
US9691067B2 (en) Validation database resident on a network server and containing specified distinctive identifiers of local/mobile computing devices may be used as a digital hardware key in the process of gaining authorized access to a users online website account such as, but not limited to, e-commerce website account, online financial accounts and online email accounts
US20200143377A1 (en) Systems and methods for user identity authentication
WO2017189492A1 (en) Systems and methods for extracting browser-obtained device information for authenticating user devices
US20200320535A1 (en) Method for securing an electronic device and corresponding electronic device
TWI787571B (en) Payment identity verification method and device
US8931080B2 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
CN115761939A (en) Withdrawal box lock and unlock control method, withdrawal box, system and device
CA2851898A1 (en) Biometric-based transaction fraud detection
US10657774B1 (en) System and method of authentication using a re-writable card verification value
KR101876672B1 (en) Digital signature method using block chain and system performing the same
CN106875175B (en) Method and device convenient for payment subject expansion
EP3876176A1 (en) Method for authorizing a person to perform a transaction involving a smart card
CN110490577A (en) A kind of anti-attack method of pasting card, device, SIM pasting card and storage medium
US11640597B2 (en) Method of managing an emergency mode transaction procedure, and an associated device
CN111681010A (en) Transaction verification method and device
JP4453502B2 (en) IC card system
CN110719175B (en) Interface calling verification method, automatic teller machine and storage medium
KR20210048210A (en) Method, system and program for create virtual account for each cryptocurrency for financial transactions
Ogata et al. An ATM security measure to prevent unauthorized deposit with a smart card
US20220335420A1 (en) Memory management in a transaction processing device
US20230394450A1 (en) System and method for storing automated teller machine session data
KR20100131860A (en) System and method for lossaccept process of electronic money
JP2013105438A (en) Card collation system, and card collation method
CN117273872A (en) Equipment leasing data processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200124