CN202120203U - Input terminal provided with keyboard and encryption module - Google Patents

Input terminal provided with keyboard and encryption module Download PDF

Info

Publication number
CN202120203U
CN202120203U CN201120066329XU CN201120066329U CN202120203U CN 202120203 U CN202120203 U CN 202120203U CN 201120066329X U CN201120066329X U CN 201120066329XU CN 201120066329 U CN201120066329 U CN 201120066329U CN 202120203 U CN202120203 U CN 202120203U
Authority
CN
China
Prior art keywords
entry terminal
card
user
key
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201120066329XU
Other languages
Chinese (zh)
Inventor
张龙其
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201120066329XU priority Critical patent/CN202120203U/en
Application granted granted Critical
Publication of CN202120203U publication Critical patent/CN202120203U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The utility model provides an input terminal provided with a keyboard and an encryption module. The input terminal is connected with a computer host used for the network payment transaction. The utility model is characterized in that the input terminal is provided with the keyboard at least used for inputting bank main account passwords or IC card account passwords. The input terminal is provided with the encryption module at least used for the encryption of the bank main account passwords and the IC card account passwords. The input terminal is provided with a card reader module at least used for reading the magnetic stripe card account information, contact IC card information or non-contact IC card information. Through the cooperation with the related system platform, and the transmission of encrypted user account information and the user passwords, the input terminal provided with the keyboard and the encryption module can be used to prevent the user account and the passwords from being stolen illegally, when the user conducts the online financial transaction on the computer host.

Description

The entry terminal of band keyboard and encrypting module
Technical field
The utility model relates to the entry terminal of band keyboard and encrypting module, and entry terminal is connected in host computer, is applied to the financial payment field.
Background technology
http://www.bestchao.com/archives/133.html?。
March 16; River people's anti-virus center monitors arrives; Steal " Net silver robber " virus of the user of Internet bank substantial contribution in the past and change to a new form and stage a comeback, " Net silver burglar " virus of up-to-date intercepting and capturing has far won malicious king " Net silver robber " in the past technically, not only can steal the user's of the Internet bank account number cipher; Even can break through the defence line of the U of bank shield, carry out the network account transfer.
Expert introduction; " Net silver burglar " up-to-date variant virus is spy's program of stealing user network Bank Account Number and password specially; This virus can be in all window titles of being opened by the backstage spy out user of infect computers; In case find the window of specified title; Just can to the user emulation page that is complementary with the Internet bank that opens be provided through coupling, utilize technology such as mouse hook, message intercept that number of the account and encrypted message that the user is input to the false Internet bank page are intercepted and captured then each element of the page.
What let anti-virus expert worry is that " Net silver burglar " singly do not steal the Net silver account number cipher, can also break through the security protection of the U of bank shield, carries out network account transfer operation.The anti-virus expert introduction, the virus of generally stealing the Internet bank, online game account number cipher will secret sends to the hacker on the backstage with it after intercepting and capturing user's account number cipher information, thereby reaches the purpose of stealing Internet bank's number of the account and password.But along with the raising of the security protection of bank mechanism with the sense of security of users, many Internet banks all need connect the gateway of appointment or the digital certificate that reads on the subscriber computer could use, so only obtain account and password also can't transfer fund.The up-to-date variant virus of " Net silver burglar " fully takes into account this point just; The technology of will stealing is upgraded once again; After being truncated to user's account number cipher; Virus connects hacker's specified server website " http://c.9908*.com/b2cs/ " on by infect computers, automatically webpage is jumped to the operated Internet bank's account transfer page of user, and this moment, the hacker attempted 500 to the 1000 yuan of amount of money that do not wait of account transfer to hacker's appointment according to the account number cipher of intercepting and capturing again.Because virus is the bank transfer single-page of in this machine of user computer, opening; And user's digital certificate also often all is kept in the computer; Virus just can break through the protection of digital certificate very easily like this, in case the operation successful implementation, the user's of the serious threat Internet bank fund security.
The anti-virus expert reminds the user, and the user carries out Internet bank when operation, must guarantee that the antivirus software virus base date has been upgraded to latest edition, guarantees that initiatively defence and monitoring in real time are in opening.In addition, the Net silver user should directly import its domain name when the logging in network website of bank, and the link that does not provide through other websites gets into (like search engine etc.), and these links possibly import false website of bank with the user.
Present card reader has only simple card-reading function usually, and the function of data not being carried out the encrypting and decrypting computing is not supported manual input account yet, and it is inner to be applied to simple Card Reader environment and banking system; In the time of need carrying out the encrypting and decrypting computing to data, use the financial POS terminal to come to use as entry terminal, cost is high.Card reader and financial POS all are not suitable for the utility appliance to online transaction as numerous card users.
Two kinds of situation are arranged when using e-Bank payment at present.
First kind, directly in webpage, import bank card account number and user cipher.Malicious hackers possibly obtained user's account and encrypted message through trojan horse, fishing website etc., and is dangerous.
Second kind, the U shield of use issued by banks, the U shield is bound bank card account, input user's payment cipher during payment.Malicious hackers can be passed through trojan horse program, monitors the information that issues from bank payment system, includes user's account in the information; The button input of monitoring users obtains user cipher.Though user account information of revealing and password are not easy to replace the U shield to realize U shield payment function, bank card be can directly duplicate and malice consumption and enchashment carried out, perhaps use first kind of mode to realize the malice payment, neither safe enough.
The utility model reads accounts information and input password on entry terminal, accounts information and user cipher spread out of after encrypting through security module.Even malicious hackers has been stolen interactive information, can not crack accounts information and user password information after the encryption easily, quite safe when the user does payment transaction on common network.
Summary of the invention
The purpose of the utility model is to provide the entry terminal of band keyboard and encrypting module, the safety problem that user account information and encrypted message possibly revealed when concluding the business to solve network payment.
In order to realize the purpose of the utility model, the utility model provides the entry terminal of band keyboard and encrypting module.Entry terminal and host computer, system platform cooperating are applied to the network payment transaction.It is characterized in that: said entry terminal is connected in host computer through USB interface or RS232 interface or Ethernet interface; Said entry terminal is provided with keyboard, is used to input the password of bank's main account password or IC-card account at least; Said entry terminal is provided with encrypting module, is used at least bank card main account or IC-card account and user cipher are encrypted.
Entry terminal could use after need downloading key; When downloading key, entry terminal is connected in encryption equipment through the key download host and downloads key; When security module was the SAM card, the SAM cartoon was crossed card sender and is connected in encryption equipment download key to the SAM card, and security control is by the encryption equipment guarantee; When the user used, entry terminal was connected in the user computer main frame.
A kind of preferred implementation according to the entry terminal of above-mentioned band keyboard and encrypting module; Said entry terminal is provided with card reading module, and said card reading module is used to read magnetic stripe card account and/or Contact Type Ic Card information and/or non-contact IC card information at least; Said IC-card comprises storage card, logic encryption card and smart card.Entry terminal is provided with card reading module, simplifies the input process of user account, guarantees the accuracy of user account.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said keyboard is used to import bank's main account or IC-card account, can not conclude the business when on entry terminal, not disposing card reading module or card reading module fault.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said entry terminal is provided with LED light, and said LED light is used to point out user's entry terminal to prepare to receive input at least and input is accepted.LED light is used to point out that the user inputs that the input of password, password is accomplished, the prompting user card punching, swipe the card and accepted etc.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said encrypting module is provided with fingerprint module, and said fingerprint module is used to gather user's fingerprint image data at least; Processor goes out fingerprint characteristic data from the user fingerprint image extracting data of fingerprint module collection; The fingerprint characteristic data that extracts is encrypted output by encrypting module.Use fingerprint module, further improved security, accuracy, the convenience of system.On the fingerprint characteristic enciphered data sent compare with the fingerprint characteristic data that the user is kept at platform by system platform deciphering back, system platform this user identity of having thought empirical tests is carried out follow-up required business when comparing successfully.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said fingerprint module is provided with the fingerprint processing unit, and said fingerprint processing unit is used for fingerprint characteristic data from the user fingerprint image extracting data of gathering at least.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said entry terminal is provided with tears machine self-destruction unit open, said when tearing machine self-destruction unit open and being used for entry terminal at least and being opened entry terminal destroy the key that is write down.Tear the security of machine self-destruction unit assurance key open; Key can only use, can not read.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said encrypting module be SAM card or ESAM chip or special encryption chip or with the encryption key and the algorithm of relational processor.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said entry terminal and system platform, host computer cooperating are realized trading function.Host computer is connected in system platform through the InterNet network.Host computer is used to set up the communication of entry terminal and system platform, transaction results information and the prompting that reception issues from system platform at least.System platform achieve a butt joint at least the checking of receiving enciphered message and transaction request processing and issue transaction results and arrive host computer.
During business such as the user carries out on host computer and pays the fees, supplements with money, purchase; Understand information such as showing beneficiary code, transaction identification sign indicating number, need payment in the request payment webpage that under beneficiary, pushes away; The user carries out this information copy behind the corresponding hurdle of the payment interface of the related host computer of the utility model the operation of payment flow; Payment finishes and the transaction voucher in the transaction voucher hurdle of payment interface on the related host computer of the utility model number to be inserted the transaction voucher hurdle of beneficiary request payment webpage; Click " paying successfully " button in the beneficiary request payment webpage; Through the whether success of these payment transactions of inquiry such as beneficiary code, transaction identification sign indicating number, transaction voucher number, the corresponding business flow process is carried out by beneficiary in the success back to beneficiary to the system platform of the utility model.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said encrypting module comprises key and algorithm at least; Said key comprises authenticate key, working key and transmission security key at least; Said authenticate key comprises at least downloads external authentication key, download internal authentication key, work external authentication key and work internal authentication key; Said working key comprises encryption key and message authentication code key at least; Said algorithm comprises symmetric key algorithm and/or asymmetric key algorithm at least.The key associated of the key of entry terminal and system platform encryption equipment.
Downloading authenticate key comprises download external authentication key and downloads the internal authentication key; Download authenticate key and be used for mutual authentication at least entry terminal and encryption equipment before the entry terminal download key; Download the authenticate key authentication and just allow to download key through the back entry terminal; Download the legitimacy that the external authentication key is used for entry terminal checking encryption equipment; Entry terminal produces random number during use; Encryption equipment uses this random number and sends into entry terminal after downloading external authentication secret key encryption, and entry terminal uses downloads whether correct and effective of this enciphered data of external authentication key authentication; Download the legitimacy that the internal authentication key is used for encryption equipment checking entry terminal; Encryption equipment produces random number during use; By entry terminal this random number is used to be sent to encryption equipment after downloading internal authentication secret key encryption, encryption equipment uses downloads whether correct and effective of this enciphered data of internal authentication key authentication.
The work authenticate key comprises work external authentication key and work internal authentication key; The work authenticate key is used for the power on mutual authentication of start back entry terminal and system platform of entry terminal; Work authenticate key authentication just allows to accept the input of bank card main account, IC-card account, user cipher, user fingerprints characteristic through the back entry terminal and these input data is carried out to encrypt and/or operations such as increase message authentication code; Work external authentication key is used for the legitimacy of entry terminal verification system platform; Entry terminal produces random number during use; System platform is sent into entry terminal after to this random number use work external authentication secret key encryption, and whether this enciphered data of entry terminal use work external authentication key authentication correct and effective; Work internal authentication key is used for the legitimacy of system platform checking entry terminal; System platform produces random number during use; Be sent to system platform by entry terminal after to this random number use work internal authentication secret key encryption, whether this enciphered data of system platform use work internal authentication key authentication correct and effective.
For preventing attack, entry terminal is done just done the internal authentication operation after external authentication is operated earlier the entry terminal authenticate key; Entry terminal is to the errors number of outside authenticate key counting, and errors number arrives entry terminal when limiting number of times and destroys the key that write down, no longer accepts authentication processing.
Working key comprises encryption key and message authentication code key; Encryption key is used for user's bank card main account, IC-card account, user cipher, user fingerprints characteristic are encrypted, and the message authentication code key is used for the communication data packets that sends to system platform is increased the message authentication code that message authentication code and verification system platform issue communication data packets.
Transmission security key is used for downloading, when upgrading working key, transmits after the working key encryption of this transmission security key of encryption equipment use to required renewal, and entry terminal uses after the key use transmission security key that receives is deciphered, and avoids occurring on the line the key plain data.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, the communication data packets of said entry terminal and system platform comprises message authentication code; The take over party has only and has verified and just carry out corresponding the processing behind this message authentication code.The packet that host computer is initiated transaction request to system platform is sent into entry terminal, sends to system platform after by entry terminal this packet being increased message authentication code.When system platform issued packet, host computer was sent this packet into entry terminal checking message authentication code, and entry terminal and host computer were just carried out corresponding operation after message authentication code was verified successfully.
According to a kind of preferred implementation of the entry terminal of above-mentioned band keyboard and encrypting module, said operation of bank card main account or IC-card account or user cipher or user fingerprints characteristic being encrypted by encrypting module only just allows to carry out behind entry terminal and the mutual certification work authenticate key of system platform; Said operation of bank card main account or IC-card account or user cipher or user fingerprints characteristic being encrypted by encrypting module is only carried out and is only carried out once after entry terminal obtains random number that system platform issues and obtains bank card main account or IC-card account or user cipher or user fingerprints characteristic.Each calculating all has the dynamic random number to participate in, and has guaranteed that the key of system is not easy to be broken.Must use the mode of encryption to user's bank card main account or IC-card account or user cipher.
Obtain system platform random number and user the input data order in no particular order, satisfy getting final product simultaneously.When business implements when needing user input data; Host computer issues accepts bank card main account or IC-card account; Or the order of user cipher or the input of user fingerprints data is to entry terminal; Entry terminal is to system platform request random number, and waits for that input and the waiting system platform of accepting user data issue random number.When the user imported data earlier, entry terminal waiting system platform passed random number down; When system platform passed random number down earlier, entry terminal was waited for the input of user data; When two conditions all satisfied, entry terminal was encrypted bank card main account or IC-card account or user cipher or user fingerprints data, and the data behind the encrypting are sent to host computer.Host computer is in encryption Account Data and the Crypted password data of having obtained user's input or after encrypting finger print data; Account, the user fingerprints characteristic after the encryption or the user cipher data after the encryption etc. that host computer will comprise after beneficiary code, transaction identification code, payment, the encryption are formed the Payment Request packet, and this Payment Request packet is issued to entry terminal increase message authentication code; Entry terminal sends to system platform with this Payment Request packet after this packet is increased message authentication code, the request payment; Re-use account and user cipher or fingerprint characteristic data that related random number and encryption key decrypt the user behind the message authentication code of system platform checking request data package, accomplish follow-up business.
The dynamic random number that each cryptographic calculation all has system platform to issue is participated in, and has guaranteed that the key of system is not easy to be broken, and system platform can decrypt desired data again from the enciphered data that entry terminal send.
The beneficial effect that the utility model adopts above-mentioned technical solution to reach is following.
Use the entry terminal of this band keyboard and encrypting module; Accounts information and user cipher are all imported on entry terminal; Encrypt back output; Enciphered message is stolen immediately in the InterNet Network Transmission and also is not easy to decrypt True Data, and user account and password are illegally stolen when preventing that the user from carrying out online financial transaction on host computer.It is thus clear that the utlity model has the advantage that improves network transaction safety.
Description of drawings
Fig. 1 is the structural representation of the utility model; Entry terminal 1 comprise processor 2, encrypting module 3, keyboard 4, with the connecting line 13 of host computer.
Syndeton synoptic diagram when Fig. 2 downloads key for the utility model; Comprise encryption equipment 15, key download host 16, entry terminal 1; Wherein entry terminal 1 comprise processor 2, encrypting module 3, keyboard 4, with the connecting line 13 of encryption equipment.
Structural representation when the entry terminal that Fig. 3 is provided with card reading module for the utility model uses; The InterNet network 12 that comprises entry terminal 1, system platform 10, host computer 11, beneficiary 18, system platform 10 and host computer 11 communications; Wherein entry terminal 1 comprise processor 2, encrypting module 3, keyboard 4, card reading module 5, fingerprint module 6, LED light 7, with the connecting line 13 of host computer.
When Fig. 4 uses by the utility model the payment interface synoptic diagram of company's host computer; Payment interface 20 comprises <beneficiary code>hurdle 21, < transaction identification sign indicating number>hurdle 22, < payment>hurdle 23, " reading number of the account " button 24, " reading password " button 25, " payment " button 26, < transaction voucher number>hurdle 27.
When Fig. 5 uses by the utility model the beneficiary of company's host computer need the payment interface synoptic diagram; Beneficiary needs payment interface 30 to comprise <beneficiary code>hurdle 31, < transaction identification sign indicating number>hurdle 32, < payment>hurdle 33, < transaction voucher number>hurdle 34, " paying successfully " button 35.
Embodiment
Below in conjunction with accompanying drawing and embodiment the utility model is explained further details.
For simplifying process description, entry terminal is that entry terminal sends to system platform through the process simplification that host computer forwards information to system platform in the enforcement use-case; Photos and sending messages is that system platform sends to entry terminal by the process simplification that host computer is forwarded to entry terminal to host computer again under the system platform.
According to the utility model first embodiment, with reference to Fig. 2, encryption equipment is downloaded key to entry terminal.
Key download host 16 connects entry terminal 1 and encryption equipment 15, and key download host 16 is used for data transmission and initiates download request.
1: key download host 16 initiates to download the external authentication request to entry terminal 1, and the encrypting module 3 of entry terminal 1 produces random number A; Entry terminal 1 initiates to download the external authentication request to encryption equipment 15, comprises the random number A that entry terminal 1 produces in the solicited message.
2: encryption equipment 15 uses download external authentication key that random number A is encrypted; And send entry terminal 1 to do the download external authentication data encrypted A.
3: whether the enciphered data A that entry terminal 1 receives through encrypting module 3 checkings correct and effective, and replys encryption equipment 15; The download external authentication is accomplished.
4: encryption equipment 15 issues to entry terminal 1 and downloads the internal authentication request, comprises the random number B that encryption equipment 15 produces in the solicited message.
5: entry terminal 1 uses download internal authentication key that random number B is encrypted through encrypting module 3, and data encrypted B is replied encryption equipment 15.
6: encryption equipment 15 uses downloads whether correct and effective of data B that internal authentication key authentication entry terminals 1 upload; The download internal authentication is accomplished.
7: encryption equipment 15 sends the request of downloading a group key to entry terminal 1, and the key data of download uses transmission security key to encrypt.
8: entry terminal 1 is handled the key download request that receives through encrypting module 3, and encrypting module 3 uses after using transmission security key to decrypt needed key; Entry terminal 1 is replied key to encryption equipment and is downloaded the result.
9: in above 7,8 steps of circulation, download completion up to required key.
According to the utility model second embodiment, with reference to Fig. 3, the mutual certification work authenticate key of system platform and entry terminal.
1: entry terminal 1 is initiated work external authentication request to system platform 10, comprises the random number A that entry terminal 1 produces in the solicited message.
2: system platform 10 uses work external authentication key that random number A is encrypted; And send entry terminal 1 external authentication of working with data encrypted A.
3: whether the enciphered data A that entry terminal 1 receives through encrypting module 3 checkings correct and effective, and answering system platform 10; The work external authentication is accomplished.
4: system platform 10 issues the request of work internal authentication to entry terminal 1, comprises the random number B that system platform 10 produces in the solicited message.
5: entry terminal 1 uses work internal authentication key that random number B is encrypted through encrypting module 3, and with data encrypted B answering system platform 10.
6: whether the data B that system platform 10 uses work internal authentication key authentication entry terminal 1 to upload is legal; And reply entry terminal 1; The work internal authentication is accomplished.
According to the utility model the 3rd embodiment, with reference to accompanying drawing 3,4,5, the utility model realizes that network payment is professional.
1: select required business or the like operation in the webpage of user's beneficiary 18 on host computer 11, up to showing that beneficiary needs payment interface, like Fig. 5.
2: the user inserts respectively in <beneficiary code>hurdle 21 of payment interface 20, < transaction identification sign indicating number>hurdle 22, < payment>hurdle 23 with beneficiary and needs the corresponding data in <beneficiary code>hurdle 31 in the payment interface 30, < transaction identification sign indicating number>hurdle 32, < payment>hurdle 33.
3: the user clicks " reading the account " button 24, and the order that host computer 11 will read account number is issued to entry terminal 1.
4: entry terminal 1 judges whether to do the authentication of work authenticate key, if the authentication of the authenticate key of not working then by finish the work the earlier authentication of authenticate key of the step of second embodiment.
5: entry terminal 1 is opened LED light, and the prompting user imports the account; Entry terminal 1 is to system platform 10 request account encrypted random number C.
6: system platform 10 is replied encrypted random number C to entry terminal 1.
7: entry terminal 1 reads the account number of the manual input of user or reads the account number on the card through card reading module 5 through keyboard 4.
8: entry terminal uses encryption key and random number C that the account number of user's input is encrypted; Enciphered data is uploaded to host computer 11.
9: the user clicks " reading password " button 25, and the order that host computer 11 will read user cipher is issued to entry terminal 1.
10: entry terminal 1 is opened LED light, and the prompting user inputs password; Entry terminal 1 is to system platform request user cipher encrypted random number D.
11: system platform 10 reply code encrypted random number D are to entry terminal 1.
12: entry terminal 1 reads user cipher or reads the user fingerprints data through fingerprint module 6 through keyboard 4.
13: entry terminal uses encryption key and random number D that the password or the fingerprint characteristic data of user's input are encrypted; Enciphered data is uploaded to host computer 11.
14: the user clicks " payment " button 26, and host computer 11 is Payment Request data A with the enciphered data of beneficiary code, transaction identification sign indicating number, payment, user account number, the information package such as enciphered data of user cipher; And with passing to entry terminal 1 under these Payment Request data A.
15: entry terminal 1 uses the message authentication code key that Payment Request data A is increased message authentication code; The Payment Request packet B of band authentication of message sign indicating number is sent to system platform 10;
16: system platform 10 is used whether correct and effective of the corresponding message authentication code key authentication Payment Request packet B message authentication code of these entry terminals; System platform 10 uses random number C to decrypt user account number with the corresponding encryption key of this entry terminal, and system platform 10 uses random number D to decrypt user cipher or user fingerprints characteristic with the corresponding encryption key of this entry terminal; Whether password that system platform 10 checking this account are corresponding or fingerprint characteristic data correct and effective; System platform is withholdd from this user account, and produces transaction voucher number, generates the transaction record that comprises beneficiary code, transaction identification sign indicating number, payment, transaction voucher number, user's card number etc.; System platform 10 will be paid successful result and be issued to host computer 11, comprise transaction voucher number in the object information.
17: host computer 11 shows this voucher number in < transaction voucher number>hurdle 27 of payment interface 20.
18: the voucher number that the user copies in < transaction voucher number>hurdle 27 of payment interface 20 needs < transaction voucher number>hurdle 34 of payment interface 30 to beneficiary, clicks " paying successfully " button 35.
19: whether beneficiary 18 inquiry this transaction on the system platform 10 pays success, and the execution corresponding subsequent is concluded the business.
Can know that by technological general knowledge the utility model can be realized through other the embodiment that does not break away from its spirit or essential feature.Therefore, above-mentioned disclosed embodiment with regard to each side, all just illustrates, and is not only.All in the utility model scope or the change that is being equal in the scope of the utility model all comprised by the utility model.

Claims (7)

1. be with the entry terminal of keyboard and encrypting module, entry terminal and host computer, system platform cooperating are applied to the network payment transaction, it is characterized in that:
Said entry terminal is provided with USB interface or RS232 interface or Ethernet interface unit, is used to be connected in host computer;
Said entry terminal is provided with keyboard, is used to input the password of bank's main account password or IC-card account at least;
Said entry terminal is provided with encrypting module, is used at least the password of bank card main account or IC-card account and user's input is encrypted.
2. according to the entry terminal of said band keyboard of claim 1 and encrypting module; It is characterized in that: said entry terminal is provided with card reading module, and said card reading module is used to read magnetic stripe card account and/or Contact Type Ic Card information and/or non-contact IC card information at least; Said IC-card comprises storage card, logic encryption card and smart card.
3. according to the entry terminal of said band keyboard of claim 1 and encrypting module, it is characterized in that: said entry terminal is provided with LED light, and said LED light is used to point out user's entry terminal to prepare to receive input at least and input is accepted.
4. according to the entry terminal of said band keyboard of claim 1 and encrypting module, it is characterized in that: said encrypting module is provided with fingerprint module, and said fingerprint module is used to gather user's fingerprint image data at least.
5. according to the said fingerprint module of claim 4, it is characterized in that: said fingerprint module is provided with the fingerprint processing unit, and said fingerprint processing unit is used for fingerprint characteristic data from the user fingerprint image extracting data of gathering at least.
6. according to the entry terminal of said band keyboard of claim 1 and encrypting module, it is characterized in that: said entry terminal is provided with tears machine self-destruction unit open, said when tearing machine self-destruction unit open and being used for entry terminal at least and being opened entry terminal destroy the key that is write down.
7. according to the entry terminal of said band keyboard of claim 1 and encrypting module, it is characterized in that: said encrypting module be SAM card or ESAM chip or special encryption chip or with the encryption key and the algorithm of relational processor.
CN201120066329XU 2011-03-14 2011-03-14 Input terminal provided with keyboard and encryption module Expired - Fee Related CN202120203U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201120066329XU CN202120203U (en) 2011-03-14 2011-03-14 Input terminal provided with keyboard and encryption module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201120066329XU CN202120203U (en) 2011-03-14 2011-03-14 Input terminal provided with keyboard and encryption module

Publications (1)

Publication Number Publication Date
CN202120203U true CN202120203U (en) 2012-01-18

Family

ID=45461252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201120066329XU Expired - Fee Related CN202120203U (en) 2011-03-14 2011-03-14 Input terminal provided with keyboard and encryption module

Country Status (1)

Country Link
CN (1) CN202120203U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN105141631B (en) * 2015-09-21 2019-06-11 宇龙计算机通信科技(深圳)有限公司 The methods, devices and systems that a kind of terminal, server and account safety log in

Similar Documents

Publication Publication Date Title
CN102147662A (en) Input terminal with keyboard and encryption module
RU2645593C2 (en) Verification of portable consumer devices
Fatima E-banking security issues-Is there a solution in biometrics?
TWI587225B (en) Secure payment method, mobile device and secure payment system
CN102880960B (en) Based on the payment by using short messages method and system of fingerprint recognition mobile phone
CN101051907B (en) Safety certifying method and its system for facing signature data
CN104573547B (en) The safety and protection system and its operation realizing method of a kind of information exchange
EP2733655A1 (en) Electronic payment method and device for securely exchanging payment information
CN109039652B (en) Digital certificate generation and application method
US20110202762A1 (en) Method and apparatus for carrying out secure electronic communication
CN103729948A (en) Electronic payment method of mobile terminal with NFC (near field communication) and fingerprint functions
GB2512595A (en) Integrated contactless mpos implementation
US20130121490A1 (en) Method and apparatus for trust based data scanning, capture, and transfer
CN101334884A (en) Method and system for enhancing bank transfer safety
AU2018214800A1 (en) Methods and systems for securely storing sensitive data on smart cards
CN101340294A (en) Cipher keyboard apparatus and implementing method thereof
CN202854880U (en) SMS payment system based on fingerprint identification mobile phone
CN102768744A (en) Remote safe payment method and system
TWI288554B (en) Method of generating and applying one time password in network transactions, and system executing the same method
WO2016118087A1 (en) System and method for secure online payment using integrated circuit card
Hudaib E-payment security analysis in depth
CN102611702A (en) System and method for ensuring safety of network payment
CN101594354B (en) Method and system for improving account transfer safety
CN103051618A (en) Terminal authentication equipment and network authentication method
CN104010306A (en) Mobile device user identity authentication system and method

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120118

Termination date: 20140314