CN113608629A - Intelligent keyboard system, password input method and self-service equipment - Google Patents

Intelligent keyboard system, password input method and self-service equipment Download PDF

Info

Publication number
CN113608629A
CN113608629A CN202110996003.5A CN202110996003A CN113608629A CN 113608629 A CN113608629 A CN 113608629A CN 202110996003 A CN202110996003 A CN 202110996003A CN 113608629 A CN113608629 A CN 113608629A
Authority
CN
China
Prior art keywords
keyboard
key
character
key position
triggered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110996003.5A
Other languages
Chinese (zh)
Inventor
黄文强
徐晨敏
訾志博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202110996003.5A priority Critical patent/CN113608629A/en
Publication of CN113608629A publication Critical patent/CN113608629A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Abstract

The application provides an intelligent keyboard system, a password input method and self-service equipment, and relates to the technical field of information security. The intelligent keyboard system comprises first equipment and second equipment, wherein the second equipment comprises a keyboard, each key position of the keyboard is marked by an externally displayed identification character, and each key position of the keyboard is triggered to output a character; the first device is used for setting the character actually output after each key position of the keyboard is triggered according to the user request; and the second equipment is used for converting the characters output by each current key position into the characters corresponding to each key position in the setting result of the first equipment according to the setting result of the first equipment. By the aid of the scheme, safety during password input is improved, and password leakage risk is reduced.

Description

Intelligent keyboard system, password input method and self-service equipment
Technical Field
The application relates to the technical field of information security, in particular to an intelligent keyboard system, a password input method and self-service equipment.
Background
In daily life, when a login operation or a financial operation is performed on a device having a keyboard, a password is often required to be input, but when the device is outdoors, in a strange place, or in a scene where other unrelated persons exist, there is a risk of leakage of the input password, which may be caused by a person peeping, monitoring of the device for shooting, and presumption of an input action.
A typical scenario is that when a lawbreaker transacts business on a self-service deposit and withdrawal machine of a bank, the lawbreaker may install a camera at a hidden position of the self-service deposit and withdrawal machine to peep a password, so that a risk of password leakage exists, and hidden dangers are brought to information security and property security of a user.
Disclosure of Invention
In order to solve the problems, the application provides an intelligent keyboard system, a password input method and self-service equipment, so that the safety of password input is improved, and the risk of password leakage is reduced.
In a first aspect, the present application provides an intelligent keyboard system, where the intelligent keyboard system includes a first device and a second device, the second device includes a keyboard, each key of the keyboard is marked by an externally displayed identification character, and each key of the keyboard is triggered to output a character. The first device is used for setting the character actually output after each key position of the keyboard is triggered according to the user request. The second device is used for converting the characters output by each key position into the characters corresponding to each key position in the setting result of the first device according to the setting result of the first device.
When the first device is not set, the character output after each key position on the keyboard is triggered is the identification character displayed externally by the key position, for example, the identification character of the key position "1" is arabic numeral 1, and the character output after the key position "1" is triggered is also arabic numeral 1. After the first device is set, the character output after the key position on the keyboard is triggered may be different from the identification character externally displayed by the key position, for example, the identification character of the key position "1" is arabic numeral 1, and the character output after the key position "1" is triggered after the first device is set is arabic numeral 9. When the password is input on the keyboard on the second device, the identification characters on the key positions are inconsistent with the characters actually output by the key positions, so that even if the input process is snooped, the setting result of the first device is determined by a user, so that the leaked characters are only the positions of the keys, but not the output characters specifically represented by the keys, namely the real password is not leaked, and the safety of password input is improved.
In a possible implementation manner, the first device is further configured to set a key corresponding to the first trigger operation. The first triggering operation is used for indicating the setting result of the first device on the second device when the key bit corresponding to the first triggering operation on the second device is triggered.
When a user inputs a password on the second device, if the user forgets the setting result of the first device, the second device indicates the setting result of the first device by triggering the first operation.
In a possible implementation manner, the second device includes an indicator light, and when the key corresponding to the first trigger operation on the second device is triggered, the second device indicates the setting result of the first device by using the indicator light.
In one possible implementation, the smart keyboard system further includes a third device. The third device is used for storing the corresponding relation between the setting result of the first device and the user information of the user. The second device is specifically configured to obtain a setting result of the corresponding first device from the third device according to the user information.
The third device may be a server, or a backend system. The third device can perform information interaction with the first device and the second device.
In a possible implementation manner, the second device is further configured to, after completing the password input once, take the identification character corresponding to each key as the character actually output by each key.
That is, after the password input is completed, the character output after each key position on the keyboard is triggered is the identification character displayed outside the key position, so as to facilitate subsequent other operations.
In one possible implementation, the keyboard is a numeric or alphanumeric keyboard.
In one possible implementation, the keyboard is a physical keyboard or a soft keyboard.
In a second aspect, the present application further provides a password input method, where each key of the keyboard is marked by an identification character displayed externally, and each key of the keyboard outputs a character after being triggered, the method including:
setting actually output characters after each key position of the keyboard is triggered according to a user request;
and according to the setting result, converting the character output by each key position into the character corresponding to each key position in the setting result.
By using the method provided by the application, when the password is input on the keyboard on the second device, because the identification characters on the key positions are inconsistent with the characters actually output by the key positions, even if the input process is snooped, because the setting result of the first device is determined by the user, the real password cannot be leaked, and the safety in inputting the password is improved.
In one possible implementation, the method further includes:
and setting a key corresponding to the first triggering operation, wherein the first triggering operation is used for indicating the setting result of the first equipment when the key corresponding to the first triggering operation is triggered.
When a user inputs a password on the second device, if the user forgets the setting result of the first device, the second device indicates the setting result of the first device by triggering the first operation.
In a third aspect, the present application further provides a self-service device, where the self-service device is a second device in the intelligent keyboard system provided in any one of the above implementation manners, and a keyboard of the self-service device is an entity keyboard.
By utilizing the self-service equipment provided by the application, when the user inputs the password on the keyboard of the second equipment, because the identification characters on the key positions are inconsistent with the characters actually output by the key positions, even if the input process is snooped, because the setting result of the first equipment is determined by the user, the real password cannot be leaked, and the safety in password input is improved.
In one possible implementation, the self-service device is any one of an automatic deposit machine, an automatic teller machine, or a POS machine.
Drawings
FIG. 1 is a schematic diagram of a numeric keyboard;
fig. 2 is a schematic diagram of an intelligent keyboard system according to an embodiment of the present application;
FIG. 3 is a schematic diagram of another smart keyboard system provided in an embodiment of the present application;
fig. 4 is a schematic diagram of a setting result of a first device according to an embodiment of the present disclosure;
fig. 5 is a flowchart of a password input method according to an embodiment of the present application;
fig. 6 is a schematic view of a self-service device according to an embodiment of the present application.
Detailed Description
In order to make the technical solution more clearly understood by those skilled in the art, an application scenario of the technical solution of the present application is first described below.
In daily life, password security is related to information security and property security of users, and when login operation or financial operation is performed on equipment with a keyboard, passwords are required to be input, but when the equipment is in an outdoor or strange place or in a scene where other irrelevant people exist, the input passwords have the risk of leakage, and the risk can be caused by personnel peeking, equipment shooting monitoring, input action presumption and the like.
A typical scenario is that when a lawbreaker transacts business on a bank's automated teller machine, he or she may mount a camera in a hidden location of the automated teller machine to peep at the password, so that there is a risk of password leakage.
Referring to fig. 1, a diagram of a numeric keypad is shown.
The character output after each key position on the keyboard is triggered is the identification character of the key position displayed externally, for example, the identification character of the key position "0" is arabic numeral 0, and the character output after the key position "0" is triggered is also arabic numeral 0.
Therefore, when a password is input on the illustrated numeric keypad, there may be a risk of password leakage if it is peeped or photographed.
In order to solve the above problem, an embodiment of the present application provides an intelligent keyboard system, where the intelligent keyboard system includes a first device and a second device, the second device includes a keyboard, each key of the keyboard is marked by an identification character displayed externally, and each key of the keyboard is triggered to output a character. The first device is used for setting the character actually output after each key position of the keyboard is triggered according to the user request. The second device is used for converting the characters output by each key position into the characters corresponding to each key position in the setting result of the first device according to the setting result of the first device. When the password is input on the keyboard on the second device, because the identification characters on the key positions are inconsistent with the characters actually output by the key positions, even if the input process is snooped, because the setting result of the first device is determined by a user, the leaked characters are only the positions of the keys instead of the specific output characters of the keys, the real password is not leaked, and the safety of password input is improved.
In order to make the technical solutions more clearly understood by those skilled in the art, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
The terms "first", "second", and the like in the description of the present application are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated
In the present application, unless expressly stated or limited otherwise, the term "coupled" is to be construed broadly, e.g., "coupled" may be a fixed connection, a removable connection, or an integral part; may be directly connected or indirectly connected through an intermediate.
The embodiment of the present application provides an intelligent keyboard system, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 2, the figure is a schematic diagram of an intelligent keyboard system according to an embodiment of the present application.
The smart keyboard system includes a first device 10 and a second device 20.
The second device 20 comprises a keyboard 201, each key of the keyboard 201 is marked by an identification character displayed externally, and each key of the keyboard 201 is triggered to output a character.
The first device 10 is used to set the character actually output after each key position of the keyboard 201 is triggered, according to the user request.
When the first device 10 is not set, the character output after each key position on the keyboard 201 is triggered is the identification character displayed externally by the key position, for example, the identification character of the key position "1" is arabic numeral 1, and the character output after the key position "1" is triggered is also arabic numeral 1.
When the first device 10 is set, the character output after the key position on the keyboard 201 is triggered may be different from the identification character externally displayed by the key position, for example, the identification character of the key position "1" is arabic numeral 1, and the character output after the key position "1" is triggered is arabic numeral 2 by the first device 10. That is, the character actually output by each key is changed by the setting of the first device 10.
In the figure, a keyboard is taken as a numeric keyboard, and output characters are taken as numbers for explanation. In other implementations, the keyboard may be an alphabetic keyboard, with the output characters being letters; in still other embodiments, the keyboard may be other types of keyboards for outputting characters such as punctuation marks, operators, etc.
The second device 20 is used for converting the character currently output by each key bit into a character corresponding to each key bit in the setting result of the first device 10 according to the setting result of the first device 10.
In summary, with the intelligent keyboard system provided in the embodiment of the present application, after the first device performs key setting, when the user inputs a password on the keyboard of the second device, the identification character on the key position is inconsistent with the character actually output by the key position, so even if the input process is snooped, because the setting result of the first device is determined by the user, only the position of the key is revealed, but not the output character specifically represented by the key, that is, the real password is not revealed, and the security during password input is improved.
The following description is made with reference to specific implementations.
Referring to fig. 3, this figure is a schematic diagram of another smart keyboard system provided in the embodiments of the present application.
The illustrated smart keyboard system includes a first device 10, a second device 20, and a third device 30.
The third device 20 is configured to store a corresponding relationship between the setting result of the first device 10 and the user information of the user. The second device 30 is specifically configured to obtain a setting result of the corresponding first device 10 from the third device 30 according to the user information.
The third device 30 may be a server, or a backend system. The third device 30 is capable of information interaction with the first device 10 as well as with the second device 20.
The first device 10 may be a terminal device, the type of the terminal device is not specifically limited in this application, and the terminal device may be a mobile phone, a notebook computer, a wearable electronic device (e.g., a smart watch), a tablet computer, an Augmented Reality (AR) device, a Virtual Reality (VR) device, an in-vehicle device, and the like.
The second device 20 may be a self-service device, such as an automatic teller machine, or a POS machine, and the embodiments of the present application are not limited in particular.
The first device 10 is also used to set the key corresponding to the first trigger operation after setting the character actually output after each key is triggered. The first trigger operation is for indicating the setting result of the first device on the second device 20 when the key bit corresponding to the first trigger operation on the second device is triggered.
When a user inputs a password on the second device, if the user forgets the setting result of the first device, the second device indicates the setting result of the first device by triggering the first operation.
The specific key position of the first triggering operation is not limited in the embodiment of the application, and can be set by the user, for example, the key position of the identification character "1" can be continuously pressed for three times, and the key position can also be set to be a combination of a plurality of key positions.
In some embodiments, the second device 20 includes an indicator light, and when the key bit corresponding to the first trigger operation on the second device 20 is triggered, the second device indicates the setting result of the first device using the indicator light.
The second device 20 is also used for actually outputting the identification character corresponding to each key position as the character of each key position after completing the password input once.
That is, after the password input is completed, the character output after each key position on the keyboard is triggered is the identification character displayed outside the key position, so as to facilitate subsequent other operations.
The keyboard of the second device 20 is a numeric keyboard or an alphabetic keyboard, and the keyboard may be a physical keyboard or a soft keyboard, which is not particularly limited in this embodiment of the present application.
The following description will specifically take the first device 10 as a mobile phone, the second device 20 as a self-service teller machine, and the third device 30 as a server as an example.
The user utilizes the Application program (APP) of the mobile phone to set own dedicated password position information, namely to set the characters actually output after each key position of the keyboard is triggered.
For example, see fig. 4 for a schematic diagram of the setting result of the first device.
In some embodiments, the setting process is completed through a human-computer interaction interface, and different numbers on the surface of the keyboard are dragged to a desired position, and meanwhile, the user can set a mode that the user forgets the position of the password keyboard to check the sequence of the data keyboard, for example, continuously pressing 1 key twice and the like, clicking and submitting, the first device sends the setting result to the third device, the third device records the setting result, meanwhile, corresponding user information is read, and the user information and the setting result are correspondingly stored.
When the user transacts business on the self-service teller machine, namely the second device, the user can select to input the own password by using the normal keyboard or the customized keyboard.
If the customized keyboard is selected to input own password information, the second device records the position information of the password input by the user (at the moment, the password keyboard displays a normal sequence from 0 to 9, but the keyboard corresponds to a different sequence from 0 to 9), then a corresponding setting result is obtained from the third device according to the user information, then the characters output by each current key position are converted into the characters corresponding to each key position in the setting result of the first device, and the analyzed password is input to a background system to complete the password verification work.
If the user forgets the number position of the password keyboard set by the user, the user can check the number position through the password keyboard setting module of the mobile phone APP, the key position corresponding to the first triggering operation can be triggered on the self-service deposit machine, and the position of the password keyboard can be displayed on the password keyboard of the self-service deposit and withdrawal machine after the background system is verified. In one possible implementation, the display may be by LED lights.
After the password input is finished, the character output after each key position on the keyboard is triggered is the identification character externally displayed by the key position, so that subsequent other operations can be conveniently carried out.
Based on the intelligent keyboard system provided by the above embodiment, the embodiment of the present application further provides a password input method, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 5, the flowchart of a password input method provided in the embodiment of the present application is shown.
The method provided by the embodiment of the application comprises the following steps:
s501: and setting the character actually output after each key position of the keyboard is triggered according to the user request.
When the setting is not performed, the character output after each key position on the keyboard is triggered is the identification character displayed externally by the key position, for example, the identification character of the key position "1" is arabic numeral 1, and the character output after the key position "1" is triggered is also arabic numeral 1.
After setting, the character output after the key position on the keyboard is triggered may be different from the identification character externally displayed by the key position, for example, the identification character of the key position "1" is arabic numeral 1, and the character output after the key position "1" is triggered is arabic numeral 2. That is, the character actually output by each key is changed by the setting.
And S502, converting the characters output by each current key position into the characters corresponding to each key position in the setting result according to the setting result.
In some embodiments, after S501 is completed, a key bit corresponding to a first trigger operation for indicating a setting result of the first device when the key bit corresponding to the first trigger operation is triggered may also be set.
When a user inputs a password on the second device, if the user forgets the setting result of the first device, the second device indicates the setting result of the first device by triggering the first operation.
In some embodiments, after S502 is completed, the identification character corresponding to each key may also be used as the character actually output by each key, that is, after the password input is completed, the character output after each key on the keyboard is triggered is the identification character externally displayed by the key, so as to perform subsequent other operations.
The above method steps in the embodiments of the present application are only for convenience of description and do not constitute a limitation on the technical solution of the present application.
In summary, with the method provided by the embodiment of the present application, the character actually output by each key on the keyboard is set, and when the password is input on the keyboard, the identification character on the key is inconsistent with the character actually output by the key, so even if the input process is snooped, because the setting result is determined by the user, the leaked character is only the position of the key, but not the output character specifically represented by the key, that is, the real password is not leaked, and the security during password input is improved.
Based on the intelligent keyboard system provided by the above embodiment, the embodiment of the application further provides a self-service device, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 6, the figure is a schematic view of a self-service device provided in an embodiment of the present application.
The self-service device 600 is a second device in the intelligent keyboard system described in the above embodiment, and the keyboard 201 of the self-service device is a physical keyboard.
For a description of the self-service device 600, reference may be made to the description of the second device in the above embodiments, and details of the embodiments of the present application are not described herein again.
The self-service device provided by the embodiment of the application can be a self-service deposit machine, a self-service cash dispenser, a self-service deposit and withdrawal machine and the like, and the embodiment of the application is not particularly limited to this.
In summary, with the self-service device provided by the application, when a user inputs a password on a keyboard, because the identification characters on the key positions are inconsistent with the characters actually output by the key positions, even if the input process is snooped, because the setting result of the first device is determined by the user, the real password cannot be leaked, and the security of password input is improved.
It should be noted that the intelligent keyboard system, the password input method and the self-service device provided by the present application may be used in the financial field or other fields, for example, may be used in a self-service application scenario in the financial field. Other fields are any fields other than the financial field, for example, the field of smart payments. The above is only an example, and the application fields of the intelligent keyboard system, the password input method and the self-service device provided by the invention are not limited
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The above-described apparatus embodiments are merely illustrative, and the units and modules described as separate components may or may not be physically separate.
In addition, some or all of the units and modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is directed to embodiments of the present application and it is noted that numerous modifications and adaptations may be made by those skilled in the art without departing from the principles of the present application and are intended to be within the scope of the present application.

Claims (11)

1. An intelligent keyboard system is characterized in that the intelligent keyboard system comprises a first device and a second device, the second device comprises a keyboard, each key position of the keyboard is marked by an identification character displayed externally, and each key position of the keyboard is triggered to output a character;
the first device is used for setting the character actually output after each key position of the keyboard is triggered according to the user request;
and the second equipment is used for converting the current character output by each key bit into the character corresponding to each key bit in the setting result of the first equipment according to the setting result of the first equipment.
2. The intelligent keyboard system of claim 1, wherein the first device is further configured to set a key corresponding to the first trigger operation;
the first triggering operation is used for indicating the setting result of the first equipment on the second equipment when the key position corresponding to the first triggering operation on the second equipment is triggered.
3. The intelligent keyboard system of claim 2, wherein the second device comprises an indicator light, and when the key corresponding to the first triggering operation on the second device is triggered, the second device indicates the setting result of the first device by using the indicator light.
4. The smart keyboard system of claim 1, further comprising a third device;
the third device is used for storing the corresponding relation between the setting result of the first device and the user information of the user;
the second device is specifically configured to obtain a setting result of the corresponding first device from the third device according to the user information.
5. The intelligent keyboard system of claim 1, wherein the second device is further configured to, after completing a password input, take the identification character corresponding to each key as the character actually output by each key.
6. The smart keyboard system of claim 1, wherein the keyboard is a numeric keyboard or an alphanumeric keyboard.
7. The smart keyboard system of any one of claims 1 to 6, wherein the keyboard is a physical keyboard or a soft keyboard.
8. A password input method is characterized in that each key position of a keyboard is marked by an identification character displayed externally, and each key position of the keyboard is triggered to output a character, wherein the method comprises the following steps:
setting actually output characters after each key position of the keyboard is triggered according to a user request;
and according to a setting result, converting the current character output by each key into a character corresponding to each key in the setting result.
9. A password input method according to claim 8, wherein said method further comprises:
setting a key corresponding to a first trigger operation, wherein the first trigger operation is used for indicating a setting result of the first device when the key corresponding to the first trigger operation is triggered.
10. A self-service device, wherein the self-service device is the second device in the intelligent keyboard system of any one of claims 1 to 7, and the keyboard of the self-service device is a physical keyboard.
11. The self-service device of claim 10, wherein the self-service device is any one of:
an automatic teller machine, or a POS machine.
CN202110996003.5A 2021-08-27 2021-08-27 Intelligent keyboard system, password input method and self-service equipment Pending CN113608629A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110996003.5A CN113608629A (en) 2021-08-27 2021-08-27 Intelligent keyboard system, password input method and self-service equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110996003.5A CN113608629A (en) 2021-08-27 2021-08-27 Intelligent keyboard system, password input method and self-service equipment

Publications (1)

Publication Number Publication Date
CN113608629A true CN113608629A (en) 2021-11-05

Family

ID=78309550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110996003.5A Pending CN113608629A (en) 2021-08-27 2021-08-27 Intelligent keyboard system, password input method and self-service equipment

Country Status (1)

Country Link
CN (1) CN113608629A (en)

Similar Documents

Publication Publication Date Title
US11715096B2 (en) Augmented reality card activation
US8910861B2 (en) Automatic teller machine (“ATM”) including a user-accessible USB port
US9196111B1 (en) Automated teller machine (“ATM”) dynamic keypad
US9892407B2 (en) Method and system for secure user identification
EP3136275A1 (en) Digital authentication using augmented reality
US20130265136A1 (en) Dynamic keypad and fingerprinting sequence authentication
US20140201831A1 (en) Method and apparatus for authenticating password of user terminal
CN113393612A (en) PIN verification
JP2007264929A (en) User authentication system, user authentication method, operation terminal and server or the like
JP2012108796A (en) Automatic transaction system, automatic transaction method and automatic transaction machine
EP1768047A2 (en) System for identifing a password for a user to electronically access an institution
US20060143138A1 (en) Password input method
EP3786820B1 (en) Authentication system, authentication device, authentication method, and program
US7725388B2 (en) Verification of electronic financial transactions
JP5119993B2 (en) Automated trading system
CN113608629A (en) Intelligent keyboard system, password input method and self-service equipment
US9214051B1 (en) Dynamic touch screen for automated teller machines (“ATMs”)
US20180053193A1 (en) System and method for real time financial institution business intellgence and customer relationship management
WO2022001707A1 (en) Method and system for receiving a secure input, using a secure input means
JP2019114077A (en) Automatic transaction device, peep detection output method, and program
US20230313898A1 (en) Augmented reality card activation
KR101155532B1 (en) Method for processing security number and system using the same
JP5217028B2 (en) Service providing business support server and method, and service providing business support system
JP2007072978A (en) Seal inquiry system
JP2007087315A (en) Automatic transaction system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination