CN112002080B - Bank terminal, bank terminal equipment and information security processing method - Google Patents

Bank terminal, bank terminal equipment and information security processing method Download PDF

Info

Publication number
CN112002080B
CN112002080B CN201910448941.4A CN201910448941A CN112002080B CN 112002080 B CN112002080 B CN 112002080B CN 201910448941 A CN201910448941 A CN 201910448941A CN 112002080 B CN112002080 B CN 112002080B
Authority
CN
China
Prior art keywords
identification code
hardware identification
bank terminal
personal computer
industrial personal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910448941.4A
Other languages
Chinese (zh)
Other versions
CN112002080A (en
Inventor
龙森
柳树
巫志清
张玉方
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cec Financial Equipment System Shenzhen Co ltd
Original Assignee
Cec Financial Equipment System Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cec Financial Equipment System Shenzhen Co ltd filed Critical Cec Financial Equipment System Shenzhen Co ltd
Priority to CN201910448941.4A priority Critical patent/CN112002080B/en
Publication of CN112002080A publication Critical patent/CN112002080A/en
Application granted granted Critical
Publication of CN112002080B publication Critical patent/CN112002080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/209Monitoring, auditing or diagnose of functioning of ATMs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers

Abstract

The invention relates to a bank terminal, bank terminal equipment and a processing method for information security, wherein the bank terminal comprises an industrial personal computer, the industrial personal computer comprises an industrial personal computer mainboard and a memory, the industrial personal computer mainboard is also connected with an encryption chip, when the bank terminal is started for the first time, the industrial personal computer mainboard acquires a unique hardware identification code of the memory connected with the industrial personal computer mainboard, carries out validity verification on the hardware identification code and a preset hardware identification code, carries out legal marking if the validity verification passes, sends the hardware identification code to the encryption chip for the encryption chip to encrypt, and starts an operating system after encryption; when the computer is started again, the only hardware identification code of the memory connected with the main board of the industrial personal computer is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip to be checked and signed, and the operating system is started after the hardware identification code passes the checking and signing. The invention can prevent the memory from being replaced maliciously and improve the use safety of the bank terminal machine.

Description

Bank terminal, bank terminal equipment and information security processing method
Technical Field
The invention relates to the technical field of terminal equipment, in particular to a bank terminal, bank terminal equipment and an information security processing method.
Background
Currently, many terminals of a bank can provide services to customers, and the terminals generally require the customers to input personal related information, such as basic information of the customers, account password information and the like, and then store the information in a memory of the terminals when providing the services. Due to the lack of security protection measures, the memory may be maliciously replaced by another memory, so that some illegal operations are performed on the bank terminal, a safe and reliable use environment cannot be provided, and the security needs to be improved.
Disclosure of Invention
The invention aims to provide a bank terminal, bank terminal equipment and an information security processing method, aiming at preventing a memory from being replaced maliciously and improving the use security of the bank terminal.
In order to achieve the above object, the present invention provides a bank terminal, which includes an industrial personal computer, wherein the industrial personal computer includes an industrial personal computer motherboard and a memory connected with the industrial personal computer motherboard, the industrial personal computer motherboard is further connected with an encryption chip arranged in a safe, wherein:
the industrial personal computer mainboard is used for acquiring a unique hardware identification code of a memory connected with the industrial personal computer mainboard when the bank terminal is started for the first time, carrying out validity verification on the hardware identification code and a preset hardware identification code, carrying out legal marking if the validity verification passes, sending the hardware identification code to the encryption chip, encrypting the hardware identification code by the encryption chip by adopting a preset encryption algorithm, and starting an operating system of the bank terminal after encryption;
when the bank terminal is started up again, the only hardware identification code of the memory connected with the main board of the industrial personal computer is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip to be checked and signed, and an operating system of the bank terminal is started after the sign is checked and signed.
Preferably, the industrial personal computer motherboard is further configured to obtain a unique hardware identification code of a memory connected to the industrial personal computer motherboard when the bank terminal is powered on again, and perform validity verification on the hardware identification code and a preset hardware identification code if the hardware identification code is not legally marked.
Preferably, the industrial personal computer mainboard is further configured to refuse to start the operating system of the bank terminal when the validity verification fails or the verification tag fails.
Preferably, the memory is a solid state disk.
Preferably, the industrial personal computer mainboard is connected with the memory through an SATA interface, and is connected with the encryption chip through a serial RS 232.
Preferably, the bank terminal is a self-service terminal or an automatic terminal.
In order to achieve the above object, the present invention further provides a bank terminal device, where the bank terminal device includes a safe and the bank terminal, an encryption chip is disposed in the safe, and the industrial personal computer motherboard is connected to the encryption chip, where:
the industrial personal computer mainboard is used for acquiring a unique hardware identification code of a memory connected with the industrial personal computer mainboard when the bank terminal equipment is started for the first time, carrying out validity verification on the hardware identification code and a preset hardware identification code, carrying out legal marking if the validity verification passes, sending the hardware identification code to the encryption chip, encrypting the hardware identification code by the encryption chip by adopting a preset encryption algorithm, and starting an operating system of the bank terminal equipment after encryption;
when the bank terminal equipment is started up again, the only hardware identification code of the memory connected with the main board of the industrial personal computer is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip to be checked and signed, and an operating system of the bank terminal equipment is started after the sign is checked and signed.
The invention also provides an information security processing method applied to the bank terminal, which comprises the following steps:
when the bank terminal is started for the first time, acquiring a unique hardware identification code of a memory connected with a mainboard of the industrial personal computer, carrying out validity verification on the hardware identification code and a preset hardware identification code, if the validity verification passes, carrying out legal marking, sending the hardware identification code to the encryption chip, encrypting the hardware identification code by the encryption chip by adopting a preset encryption algorithm, and starting an operating system of the bank terminal after encryption;
when the bank terminal is started up again, the only hardware identification code of the memory connected with the main board of the industrial personal computer is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip to be checked and signed, and an operating system of the bank terminal is started after the sign is checked and signed.
Preferably, the information security processing method further includes:
and when the bank terminal is started up again, acquiring the unique hardware identification code of the memory connected with the main board of the industrial personal computer, and if the hardware identification code is not legally marked, carrying out legality verification on the hardware identification code and a preset hardware identification code.
Preferably, the information security processing method further includes: and refusing to start the operating system of the bank terminal when the validity verification fails or the signature verification fails.
The invention has the beneficial effects that: when the bank terminal is started for the first time, the unique hardware identification code of the memory of the bank terminal is subjected to legality verification and encryption processing, when the bank terminal is started subsequently, whether the stored hardware identification code is legally marked or not is judged at first, if the stored hardware identification code is legally marked, the stored hardware identification code is directly sent to the encryption chip for signature verification processing, and the operating system of the bank terminal can be started only after the signature verification passes.
Drawings
FIG. 1 is a diagram of a hardware architecture of an embodiment of a bank terminal according to the present invention;
FIG. 2 is a schematic diagram of a software architecture of the motherboard of the industrial personal computer shown in FIG. 1;
fig. 3 is a schematic diagram of a hardware architecture of an embodiment of the banking terminal device of the present invention;
fig. 4 is a flowchart illustrating an embodiment of a processing method for information security according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Fig. 1 is a schematic view of an application environment of a bank terminal according to a preferred embodiment of the present invention. In this embodiment, the banking terminal 1 includes an industrial personal computer 10, it being understood that the banking terminal 1 may include the industrial personal computer 10 and a display, which may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (organic light-emitting diode) touch device, and the like in some embodiments. The display is used to display information processed in the bank terminal 1 and to display a visual user interface for operation. The industrial personal computer 10 comprises an industrial personal computer mainboard 101 and a memory 102 connected with the industrial personal computer mainboard 101, and the industrial personal computer mainboard 101 is further connected with an encryption chip arranged in the safety box.
It is to be noted that fig. 1 only shows the bank terminal 1 with the components industrial computer 10 and display, but it is to be understood that not all the shown components are required to be implemented, and more or less components may be implemented instead.
The bank terminal 1 is a self-service terminal or an automatic terminal. The self-service terminal machine comprises cash self-service equipment and non-cash self-service equipment, wherein the cash self-service equipment comprises an Automatic Teller Machine (ATM), an automatic deposit machine (CDM), a cash recycling machine (CRS), a high-speed cash recycling machine (TCR) and the like; the non-cash self-service equipment comprises a deposit book registering machine, a self-service inquiry machine, a self-service payment machine, a self-service card sender, a multimedia self-service terminal, an IC (integrated circuit) rand depositing machine, a self-service internet bank machine and the like. The automatic terminal machine is a terminal machine which generally has the functions of inquiry, transfer, money storage and money taking.
The industrial personal computer mainboard 101 is used for acquiring a unique hardware identification code of a memory 102 connected with the industrial personal computer mainboard 101 when the bank terminal 1 is started up for the first time, carrying out validity verification on the hardware identification code and a preset hardware identification code, carrying out legal marking if the validity verification passes, sending the hardware identification code to the encryption chip, encrypting the hardware identification code by the encryption chip by adopting a preset encryption algorithm, and starting an operating system of the bank terminal 1 after encryption; when the bank terminal 1 is started up again, the only hardware identification code of the memory 102 connected with the industrial personal computer mainboard 101 is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip to be checked and signed, and an operating system of the bank terminal 1 is started after the check and sign are passed.
Referring to fig. 2, an industrial personal computer motherboard 101 may run an industrial personal computer self-start program, a bottom driver, and an operating system program. When the bank terminal 1 is started for the first time, the self-starting program of the industrial personal computer and the bottom layer driving program operate. Then, a bottom driver is used for obtaining a unique hardware identification code of a memory 102 connected with the industrial personal computer mainboard 101, at least one legal hardware identification code is preset in the industrial personal computer mainboard 101, and one hardware identification code corresponds to one memory. The industrial personal computer self-starting program carries out validity verification on the hardware identification code and a preset hardware identification code, if the validity verification fails, the operating system of the bank terminal 1 is not started, and if the validity verification passes, legal marking is carried out, and the hardware identification code is sent to the encryption chip. The encryption chip encrypts the hardware identification code by adopting a preset encryption algorithm, feeds back an encrypted message to an industrial personal computer self-starting program after encryption, and finally starts an operating system of the bank terminal 1, namely, runs the operating system program, and at the moment, the bank terminal 1 can be normally used.
When the bank terminal 1 is used subsequently and the industrial personal computer is started, the self-starting program and the bottom layer driving program of the industrial personal computer run. Then, the only hardware identification code of the memory connected with the industrial personal computer mainboard 101 is obtained again through the bottom driver, if the hardware identification code is legally marked, the encryption operation is performed, the industrial personal computer self-starting program directly sends the hardware identification code to the encryption chip to check the signature, when the signature is checked, the encryption chip encrypts the hardware identification code by adopting a preset encryption algorithm, the encrypted hardware identification code is compared with the encrypted hardware identification code when the machine is started for the first time to check the signature, the operating system of the bank terminal 1 is started after the signature passes the check, and the operating system of the bank terminal 1 is not started when the signature fails the check.
According to the method, when the terminal is started for the first time, the only hardware identification code of the memory of the bank terminal is subjected to legality verification and encryption processing, when the terminal is started for the subsequent time, whether the stored hardware identification code is legally marked or not is judged at first, if the hardware identification code is legally marked, the stored hardware identification code is directly sent to the encryption chip for signature verification processing, the operating system of the bank terminal can be started after the signature verification passes, if the memory is replaced, the operating system cannot be started, the memory is prevented from being maliciously replaced, and the use safety of the bank terminal is improved.
In another embodiment, the industrial personal computer main board 101 obtains a unique hardware identification code of a memory connected with the industrial personal computer main board 101 when the banking terminal 1 is powered on again, and if the hardware identification code is not legally marked, the hardware identification code and a preset hardware identification code are legally verified.
There may be two cases where the hardware identifier of the memory is not legally labeled: one is that the memory is replaced by an illegal memory, and the other is that the memory is legal but is not legally verified for other reasons when the computer is started for the first time, for example, the legal memory is not connected with the industrial personal computer main board 101 when the computer is started for the first time.
When the hardware identification code is not legally marked, legality verification needs to be carried out on the hardware identification code and a preset hardware identification code, if the legality verification fails, the memory can be determined to be maliciously replaced, and an operating system is not started at the moment; and if the validity verification is passed, legally marking is carried out, and the hardware identification code is sent to the encryption chip for encryption, so that the legality verification is not carried out when the hardware identification code is started for the first time, at the moment, the operating system is not started, and when the hardware identification code is started again subsequently, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip for signature verification, and the operating system of the bank terminal 1 is started after the signature verification is passed.
In this embodiment, when the bank terminal 1 is powered on again, the legality of the hardware identifier that is not legally marked is verified, so that the memory that is maliciously replaced can be eliminated, or the legal hardware identifier that is not legally verified when the bank terminal is powered on for the first time is included, thereby improving the flexibility of application.
Preferably, the memory 102 is a solid state disk.
Further, the industrial personal computer main board 101 is connected with the memory 102 (solid state disk) through a SATA interface, and the industrial personal computer main board 101 is connected with the encryption chip through a serial port RS 232.
As shown in fig. 3, fig. 3 is a schematic diagram of a hardware architecture of an embodiment of the bank terminal device of the present invention, the bank terminal device 01 includes a safe 2 and the bank terminal 1 of the above embodiment, an encryption chip 20 is disposed in the safe 2, and an industrial personal computer motherboard 101 is connected to the encryption chip 20.
When the bank terminal device 01 is started up for the first time, the industrial personal computer mainboard 101 acquires a unique hardware identification code of a memory 102 connected with the industrial personal computer mainboard 101, carries out validity verification on the hardware identification code and a preset hardware identification code, carries out legal marking if the validity verification passes, sends the hardware identification code to the encryption chip 20, and enables the encryption chip 20 to encrypt the hardware identification code by adopting a preset encryption algorithm, and starts an operating system of the bank terminal device 01 after encryption; when the bank terminal 1 is powered on again, the only hardware identification code of the memory 102 connected with the industrial personal computer mainboard 101 is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip for signature verification, and an operating system of the bank terminal device 01 is started after the signature verification is passed.
For a program that can run in the industrial personal computer main board 101, please refer to the embodiment described in fig. 2, which is not described herein again.
The preset encryption algorithm is a symmetric encryption algorithm or an asymmetric encryption algorithm.
Preferably, the memory 102 is a solid state disk.
Further, the industrial personal computer main board 101 is connected with the memory 102 (solid state disk) through a SATA interface, and the industrial personal computer main board 101 is connected with the encryption chip through a serial port RS 232.
The invention also provides an information security processing method, which is applied to the bank terminal, as shown in fig. 4, and comprises the following steps:
step S1, when the bank terminal is started for the first time, acquiring a unique hardware identification code of a memory connected with the mainboard of the industrial personal computer, carrying out validity verification on the hardware identification code and a preset hardware identification code, carrying out legal marking if the validity verification passes, sending the hardware identification code to the encryption chip, encrypting the hardware identification code by the encryption chip by adopting a preset encryption algorithm, and starting an operating system of the bank terminal after encryption;
and step S2, when the bank terminal machine is started up again, acquiring a unique hardware identification code of a memory connected with the mainboard of the industrial personal computer, if the hardware identification code is legally marked, sending the hardware identification code to the encryption chip for signature verification, and starting an operating system of the bank terminal machine after the signature verification passes.
The industrial personal computer mainboard can run an industrial personal computer self-starting program, a bottom layer driving program and an operating system program. And when the bank terminal is started for the first time, the self-starting program of the industrial personal computer and the bottom layer driving program operate. And then, acquiring a unique hardware identification code of a memory connected with the industrial personal computer mainboard through a bottom layer driving program, wherein at least one legal hardware identification code is preset on the industrial personal computer mainboard, and one hardware identification code corresponds to one memory. The industrial personal computer self-starting program carries out validity verification on the hardware identification code and a preset hardware identification code, if the validity verification fails, an operating system of the bank terminal is not started, and if the validity verification passes, legal marking is carried out, and the hardware identification code is sent to the encryption chip. The encryption chip encrypts the hardware identification code by adopting a preset encryption algorithm, feeds back an encrypted message to an industrial personal computer self-starting program after encryption, and finally starts an operating system of the bank terminal, namely, an operating system program, at this moment, the bank terminal 1 can be normally used.
When the bank terminal is used subsequently, the self-starting program and the bottom layer driving program of the industrial personal computer run when the bank terminal is started. Then, a bottom driver program is used for obtaining the only hardware identification code of a memory connected with the mainboard of the industrial personal computer again, if the hardware identification code is legally marked, the hardware identification code is encrypted, the automatic starting program of the industrial personal computer directly sends the hardware identification code to an encryption chip for signature verification, when signature verification is carried out, the encryption chip encrypts the hardware identification code by adopting a preset encryption algorithm, the encrypted hardware identification code is compared with the encrypted hardware identification code when the machine is started for the first time for signature verification, an operating system of the bank terminal is started after signature verification is passed, and the operating system of the bank terminal is not started when signature verification is failed.
According to the method, when the terminal is started for the first time, the only hardware identification code of the memory of the bank terminal is subjected to legality verification and encryption processing, when the terminal is started for the subsequent time, whether the stored hardware identification code is legally marked or not is judged at first, if the hardware identification code is legally marked, the stored hardware identification code is directly sent to the encryption chip for signature verification processing, the operating system of the bank terminal can be started after the signature verification passes, if the memory is replaced, the operating system cannot be started, the memory is prevented from being maliciously replaced, and the use safety of the bank terminal is improved.
Further, after the step S1, the information security processing method further includes:
and when the bank terminal is started up again, acquiring the unique hardware identification code of the memory connected with the main board of the industrial personal computer, and if the hardware identification code is not legally marked, carrying out legality verification on the hardware identification code and a preset hardware identification code.
There may be two cases where the hardware identifier of the memory is not legally labeled: one is that the memory is replaced by an illegal memory, and the other is that the memory is legal but is not subjected to validity verification due to other reasons when the computer is started for the first time, for example, the legal memory is not connected with the mainboard of the industrial personal computer when the computer is started for the first time.
When the hardware identification code is not legally marked, legality verification needs to be carried out on the hardware identification code and a preset hardware identification code, if the legality verification fails, the memory can be determined to be maliciously replaced, and an operating system is not started at the moment; and when the legality verification is passed, legality marking is carried out, and the hardware identification code is sent to the encryption chip for encryption, so that the legality verification is not carried out when the hardware identification code is started for the first time, at the moment, an operating system is not started, and when the hardware identification code is started again subsequently, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip for signature verification, and the operating system of the bank terminal is started after the signature verification is passed.
In the embodiment, when the bank terminal is started again, the legality of the hardware identification code which is not legally marked is verified, so that the memory which is maliciously replaced can be eliminated, or the legal hardware identification code which is not legally verified when the bank terminal is started for the first time is included, and the application flexibility is improved.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. The utility model provides a bank terminal machine, its characterized in that, bank terminal machine includes the industrial computer, the industrial computer include the industrial computer mainboard and with the memory that the industrial computer mainboard is connected, the industrial computer mainboard still with set up the encryption chip connection in the safe deposit box, wherein:
the industrial personal computer mainboard is used for acquiring a unique hardware identification code of a memory connected with the industrial personal computer mainboard when the bank terminal is started for the first time, comparing the hardware identification code with a preset hardware identification code to verify the legality, marking legality if the legality passes through the verification, sending the hardware identification code to the encryption chip, encrypting the hardware identification code by the encryption chip through a preset encryption algorithm, and starting an operating system of the bank terminal after encryption;
when the bank terminal is started up again, the only hardware identification code of the memory connected with the main board of the industrial personal computer is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip to be checked and signed, and an operating system of the bank terminal is started after the sign is checked and signed.
2. The banking terminal according to claim 1, wherein the industrial personal computer motherboard is further configured to obtain a unique hardware identification code of a memory connected to the industrial personal computer motherboard when the banking terminal is powered on again, and perform validity verification on the hardware identification code and a preset hardware identification code if the hardware identification code is not legally labeled.
3. The bank terminal according to claim 2, wherein the industrial personal computer motherboard is further configured to refuse to start the operating system of the bank terminal when the validity verification fails or the signature verification fails.
4. The bank terminal according to any one of claims 1 to 3, wherein the memory is a solid state drive.
5. The bank terminal according to claim 4, wherein the industrial personal computer motherboard is connected with the memory through a SATA interface, and is connected with the encryption chip through a serial port RS 232.
6. A bank terminal according to any one of claims 1 to 3, wherein the bank terminal is a self-service terminal or an automated terminal.
7. A bank terminal device, characterized in that, the bank terminal device includes a safe and a bank terminal machine according to any one of claims 1-6, an encryption chip is arranged in the safe, the industrial computer mainboard is connected with the encryption chip, wherein:
the industrial personal computer mainboard is used for acquiring a unique hardware identification code of a memory connected with the industrial personal computer mainboard when the bank terminal equipment is started for the first time, comparing the hardware identification code with a preset hardware identification code to verify the legality, marking legality if the legality passes through the verification, sending the hardware identification code to the encryption chip, encrypting the hardware identification code by the encryption chip through a preset encryption algorithm, and starting an operating system of the bank terminal equipment after encryption;
when the bank terminal equipment is started up again, the only hardware identification code of the memory connected with the main board of the industrial personal computer is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip to be checked and signed, and an operating system of the bank terminal equipment is started after the sign is checked and signed.
8. An information security processing method applied to the bank terminal according to any one of claims 1 to 6, wherein the information security processing method comprises the following steps:
when the bank terminal is started for the first time, acquiring a unique hardware identification code of a memory connected with a mainboard of the industrial personal computer, comparing the hardware identification code with a preset hardware identification code to verify the legality, if the legality is verified to pass, carrying out legal marking, sending the hardware identification code to the encryption chip, encrypting the hardware identification code by the encryption chip by adopting a preset encryption algorithm, and starting an operating system of the bank terminal after encryption;
when the bank terminal is started up again, the only hardware identification code of the memory connected with the main board of the industrial personal computer is obtained, if the hardware identification code is legally marked, the hardware identification code is sent to the encryption chip to be checked and signed, and an operating system of the bank terminal is started after the sign is checked and signed.
9. The information security processing method according to claim 8, further comprising:
and when the bank terminal is started up again, acquiring the unique hardware identification code of the memory connected with the main board of the industrial personal computer, and if the hardware identification code is not legally marked, carrying out legality verification on the hardware identification code and a preset hardware identification code.
10. The information security processing method according to claim 9, further comprising: and refusing to start the operating system of the bank terminal when the validity verification fails or the signature verification fails.
CN201910448941.4A 2019-05-27 2019-05-27 Bank terminal, bank terminal equipment and information security processing method Active CN112002080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910448941.4A CN112002080B (en) 2019-05-27 2019-05-27 Bank terminal, bank terminal equipment and information security processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910448941.4A CN112002080B (en) 2019-05-27 2019-05-27 Bank terminal, bank terminal equipment and information security processing method

Publications (2)

Publication Number Publication Date
CN112002080A CN112002080A (en) 2020-11-27
CN112002080B true CN112002080B (en) 2022-02-15

Family

ID=73461827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910448941.4A Active CN112002080B (en) 2019-05-27 2019-05-27 Bank terminal, bank terminal equipment and information security processing method

Country Status (1)

Country Link
CN (1) CN112002080B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006228080A (en) * 2005-02-21 2006-08-31 Hitachi Omron Terminal Solutions Corp Biological authentication device, terminal device and automatic transaction device
CN201910094U (en) * 2010-10-29 2011-07-27 中国工商银行股份有限公司 Transaction realizing system and terminal
CN202049561U (en) * 2011-05-18 2011-11-23 东华大学 Financial IC (integrated circuit) card terminal
CN104247369A (en) * 2012-02-22 2014-12-24 高通股份有限公司 Method and equipment for blurring equipment tags
CN104951713A (en) * 2014-03-26 2015-09-30 丛树业 Safe processor for online financial information
CN105577611A (en) * 2014-10-10 2016-05-11 广州联奕信息科技有限公司 Computer safety realization method and computer safety realization device based on hardware and server authentication
CN205992270U (en) * 2016-03-14 2017-03-01 河南诚讯电子商务有限公司 A kind of data management system of transaction self-service terminal machine
CN207068131U (en) * 2017-08-29 2018-03-02 成都诺达佳自动化技术有限公司 The anti-information theft device of self-aided terminal
CN108229210A (en) * 2017-12-26 2018-06-29 深圳市金立通信设备有限公司 A kind of method, terminal and computer readable storage medium for protecting data
CN108416898A (en) * 2018-04-25 2018-08-17 中电金融设备系统(深圳)有限公司 Financial self-service equipment
CN109087466A (en) * 2018-07-27 2018-12-25 江苏瑞银科技有限公司 Huimin financial service terminal, financial service interacted system and working method

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0952564A3 (en) * 1998-04-16 2003-09-17 Citicorp Development Center, Inc. System and method for alternative encryption techniques
JP2001222740A (en) * 2000-02-09 2001-08-17 Sony Corp Electronic money system and electronic money terminal device
ATE357710T1 (en) * 2003-12-12 2007-04-15 Banksys Sa ELECTRONIC DATA PROCESSING DEVICE
WO2005109360A1 (en) * 2004-05-10 2005-11-17 Hani Girgis Secure pin entry using personal computer
KR20060046933A (en) * 2004-11-12 2006-05-18 노틸러스효성 주식회사 Multi-protecting device of personal identification number-pad module
JP2010267152A (en) * 2009-05-15 2010-11-25 Oki Electric Ind Co Ltd Cash processor
CN101957897B (en) * 2009-07-20 2014-07-09 精品科技股份有限公司 Storage device management method, computer system control and management method and information storage device
CN102346940A (en) * 2011-01-06 2012-02-08 杨明生 Forward bank counter system and method for utilizing same to conduct forward bank counter business
US20130086298A1 (en) * 2011-10-04 2013-04-04 International Business Machines Corporation Live Logical Partition Migration with Stateful Offload Connections Using Context Extraction and Insertion
US9286466B2 (en) * 2013-03-15 2016-03-15 Uniloc Luxembourg S.A. Registration and authentication of computing devices using a digital skeleton key
US9230137B2 (en) * 2013-05-30 2016-01-05 Dell Products, L.P. Secure original equipment manufacturer (OEM) identifier for OEM devices
CN104077616B (en) * 2014-07-02 2017-08-25 广州广电运通金融电子股份有限公司 Self-aided terminal retain card processing method and system
CN106600846A (en) * 2016-11-10 2017-04-26 东软集团股份有限公司 Self-service terminal safety control method and apparatus and self-service terminal
CN106529349A (en) * 2016-12-14 2017-03-22 武汉瑞纳捷电子技术有限公司 Security chip and access control method thereof
CN206921102U (en) * 2017-07-04 2018-01-23 赵勇 A kind of intelligent Web credit intelligent terminal based on big data cloud
CN109756447B (en) * 2017-11-01 2022-03-29 华为技术有限公司 Security authentication method and related equipment
CN108462700B (en) * 2018-02-10 2021-03-16 中电金融设备系统(深圳)有限公司 Background server, terminal device, safety early warning method suitable for face recognition and storage medium
CN108765786B (en) * 2018-04-03 2020-11-24 中电金融设备系统(深圳)有限公司 Two-dimensional code withdrawal safety verification method and system and computer storage medium
CN208369623U (en) * 2018-07-04 2019-01-11 成都立鑫新技术科技有限公司 A kind of encryption equipment and encryption transmission system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006228080A (en) * 2005-02-21 2006-08-31 Hitachi Omron Terminal Solutions Corp Biological authentication device, terminal device and automatic transaction device
CN201910094U (en) * 2010-10-29 2011-07-27 中国工商银行股份有限公司 Transaction realizing system and terminal
CN202049561U (en) * 2011-05-18 2011-11-23 东华大学 Financial IC (integrated circuit) card terminal
CN104247369A (en) * 2012-02-22 2014-12-24 高通股份有限公司 Method and equipment for blurring equipment tags
CN104951713A (en) * 2014-03-26 2015-09-30 丛树业 Safe processor for online financial information
CN105577611A (en) * 2014-10-10 2016-05-11 广州联奕信息科技有限公司 Computer safety realization method and computer safety realization device based on hardware and server authentication
CN205992270U (en) * 2016-03-14 2017-03-01 河南诚讯电子商务有限公司 A kind of data management system of transaction self-service terminal machine
CN207068131U (en) * 2017-08-29 2018-03-02 成都诺达佳自动化技术有限公司 The anti-information theft device of self-aided terminal
CN108229210A (en) * 2017-12-26 2018-06-29 深圳市金立通信设备有限公司 A kind of method, terminal and computer readable storage medium for protecting data
CN108416898A (en) * 2018-04-25 2018-08-17 中电金融设备系统(深圳)有限公司 Financial self-service equipment
CN109087466A (en) * 2018-07-27 2018-12-25 江苏瑞银科技有限公司 Huimin financial service terminal, financial service interacted system and working method

Also Published As

Publication number Publication date
CN112002080A (en) 2020-11-27

Similar Documents

Publication Publication Date Title
CN106688004B (en) Transaction authentication method and device, mobile terminal, POS terminal and server
CN108200050B (en) Single sign-on server, method and computer readable storage medium
US20180295121A1 (en) Secure element authentication
US9646174B2 (en) Learning a new peripheral using a security provisioning manifest
US8967477B2 (en) Smart card reader with a secure logging feature
CN110276588B (en) Electronic signature authentication method and device and computer readable storage medium
US20130087612A1 (en) Method and devices for the production and use of an identification document that can be displayed on a mobile device.
CN112106324A (en) Methods, computer program products and devices for creating, registering and verifying digitally stamped assets
US9065806B2 (en) Internet based security information interaction apparatus and method
EP2690589A1 (en) Method and system for security information interaction based on internet
WO2012045128A1 (en) System and method of conducting transactions
US10839383B2 (en) System and method for providing transaction verification
US20140172721A1 (en) Method for Securing a Transaction
US20120095919A1 (en) Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input
EP3151180A1 (en) Identification method and system
US20160035021A1 (en) Method and system for verifying an account
CN111062059B (en) Method and device for service processing
CN112862484A (en) Secure payment method and device based on multi-terminal interaction
WO2021133498A1 (en) Authentication for third party digital wallet provisioning
CN112002080B (en) Bank terminal, bank terminal equipment and information security processing method
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
TWM578432U (en) System for assisting a financial card holder in setting password for the first time
US20100215176A1 (en) Means and method for controlling the distribution of unsolicited electronic communications
CN114430428B (en) Client interface unifying method, service system, storage medium and electronic equipment
CN108768973B (en) Trusted application operation request auditing method and trusted application management server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant