WO1998012615A2 - An improved method and system for encrypting input from a touch screen - Google Patents
An improved method and system for encrypting input from a touch screen Download PDFInfo
- Publication number
- WO1998012615A2 WO1998012615A2 PCT/US1997/006925 US9706925W WO9812615A2 WO 1998012615 A2 WO1998012615 A2 WO 1998012615A2 US 9706925 W US9706925 W US 9706925W WO 9812615 A2 WO9812615 A2 WO 9812615A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- touch screen
- information
- screen device
- user
- processor
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Definitions
- This invention relates to a method and system for inputting information on a touch screen device and encrypting the input for security reasons.
- ATM's automated teller machines
- Touch screens generally comprise of electronic display, a series of emitters and sensors as discussed below and a processor associated with the touch screen device.
- Touch screens generally work by electronically locating where the user has touched the screen through sensors located along two sides of the screen, for example, one series of sensors along the right or left-hand side oi the screen and anodier series of sensors along the bottom or top side of the screen. When the user's finger touches the screen the finger blocks emitters opposite the sensors and the sensors along the side of the screen record where the finger is located.
- touch screens can be considered as "coordinate returning" device because they simply input the coordinates of the location of the user's finger to the bank's processor unit for further processing.
- Touch screens increase flexibility because the user is not required to match up an input from the screen with a button to the side of the screen; rather the user simply touches the appropriate portion of the screen. Further, because the screen is configured electronically, the flexibility of the numbers and shapes of buttons shown on the screen is maximized. For example, keypads from a push button telephone can be shown on the screen, particularly when the user is asked to input the user's Personal Identification Number (PIN).
- PIN Personal Identification Number
- the PIN is an alphanumeric code assigned by the bank to a user.
- the user establishes that he or she is authorized to access the user's account or accounts.
- the bank's computing system checks the PIN entered by the user against the PIN authorized for the account and, if they match, the user is given access to the account. Conversely, if an individual attempts access to an account but is unable to provide the appropriate PIN, the computing system for the bank denies access.
- the PIN has become a widely recognized and important security feature for ATM's. A difficulty may occur if the electronic signal going from the touch screen device to the bank's processing unit is intercepted by a third party.
- the third party may determine the user's PIN and, in turn, later use that PIN to improperly access the user's account. Obviously it is in both the bank's and the user's best interests to deter such access and accordingly, there is a need in the industry to increase the security of user input through a touch screen device.
- the improved device displays a PIN input screen to the user; the user inputs the user's PIN in the conventional manner (for example, by inputting a four-digit number on a conventional keypad — such as the zero to nine keys configured on a touch tone telephone -- and then touching an "enter" button).
- the improved touch screen device does not send the coordinates of die user's input out of the device but rather collects the digits, encrypts them and, at the request of the bank's processing system, sends the encrypted values to the bank's processor.
- the encryption is done by an encryption processor in the touch screen device. More specifically, the processor takes the digits and uses a computer program resident in the processor to convert the digits into a coded signal.
- the bank's processor has a related program to decode the signal and thereby determine the PIN.
- unauthorized third parties do not have access to the programs familiar with the code; accordingly, even if the coded message is intercepted by the third parties, the encoded signal will appear as "jibberish" to the third parties and the third parties will be unable to decode the PIN from me coded signal.
- the examples given here are for a PIN and a bank, the invention can be used wherever user input of a confidential information over a touch screen is performed. This includes touch screens used by other types of financial institutions, automated post office machines and the like.
- Figure 1 depicts an exploded view of the protective covers.
- Figure 2 depicts a schematic of the operation of the touch screen.
- Figure 3 depicts a flowchart of the operation of the present invention.
- Figure 1 depicts an exploded view of the protective covers.
- the protective covers operate to protect the text of a user's entry onto the computer monitor from unauthorized viewing and access.
- the user's entries may include personal identification numbers (PIN), account information, and other personal data.
- PIN personal identification numbers
- the present invention includes five protective covers sandwiched together, one atop the other, to form a single thick protective cover over the perimeter of a computer monitor.
- the covers fasten securely together and includes tamper resistant architecture.
- the covers include a protective seal to show if there has been tampering.
- a first protective cover 10 includes an optical bezel 5.
- An optical bezel is a protective cover and holder combination where a transparent inner portion is supported by an outer perimeter portion.
- the transparent inner portion may be of glass or crystal or any material known to one skilled in the art for permitting light passage therethrough while still offering physical protection of that which is located below the inner portion.
- the material is held in place by the holder which securely maintains the material.
- the cover portion of the bezel secures the holder atop the object surface being protected.
- first protective cover 10 includes a protective cover portion 11 running the perimeter of cover 10.
- the cover portion 11 abuts a raised holder portion 13.
- Holder portion 13 defines an internal, approximately square first opening 15. Opening 15 is approximately the same size as the computer monitor being protected.
- holder portion 13 securely maintains a reinforced piece of opaque material, such as reinforced glass, the size of first opening 15 which covers the internal opening.
- Cover portion 11 also includes circular openings 16 situated approximately at the portion's corners. The circular openings accommodate first screws 14 which securely attach the entirety of first protective cover 10 to fourth protective cover 40 by screwing into housing 12 located on the fourth cover.
- Second protective cover 20 is situated directly below the first protective cover.
- Second cover 20 like all covers, is composed of a hard substance which may include metal, plastic and the like.
- the second cover includes an internal approximately square opening 22 about the same size as the internal opening.
- Second cover 20 includes a first circular opening 24, approximately the same size and co-linear with circular opening 16.
- first openings 24 accommodate first screws 14 to securely fasten the sensor cover to the fourth cover.
- first opening 24 serves to align second internal opening 22 with first internal opening 16.
- Second cover 20 includes a second circular opening 23 with internal threading (not shown). The internal threading accommodate a second set of screws 25. Second screws 25 also securely fasten the second cover to the fourth cover.
- the outer perimeter of second cover 20 extends beyond the outer perimeter of first cover 10 so as to provide additional support to the first cover and offer additional protection to the computer monitor below.
- a printed circuit board 30 is situated directly below second cover 20.
- the third cover includes first circular opening 32 for accommodating first screws 114 to securely fasten the third cover to the fourth cover.
- first openings 32 are co-linear with first openings 16 and first openings 24 further aligning the third cover with the top two covers.
- the third cover includes a second set of circular openings 33 for accommodating second screws 25 and a raised surface 34 located on the fourth cover.
- Raised surface 34 comprised a hollow cylindrical tube rising up from the fourth cover. The inner diameter of the raised surface is sufficiently wide so as to accommodate second screws 25 therein. The outer diameter of raised surface 34 fits securely within second openings 33 thereby further aligning the third and fourth covers.
- the fourth protective cover 40 is situated directly below the third protective cover.
- the protrudance of circuitry 32 from below the third cover is accommodated located directly below the circuitry on the fourth protective cover
- the fourth protective cover includes housings 12 to accommodate the top mounted screws 14. Housing 12 are situated at the approximate inner corners of an interior defined approximate square opening 46. Opening 46 is approximately the same size as the internal openings of the other mree corners. About the perimeter of opening 46 is a raised reinforced lip portion 45. Portion 45 provides additional support to the fourth cover as well as the other three covers and provide additional protection against unauthorized assess to circuit elements 37 from the internal openings. Portion 45 further includes circular openings 47 for accommodating screw 48 therein. Opening' 47 include interior threads for securely fastening screw 48. Cover 40 further includes cylindrical hollow housing 44 located at the approximate midpoint if the length of each side of the cover. Housing 44 accommodates screw 25 therein and is aligned with openings 33 of board 30 and 23 of cover 20. Housing 44 is of a sufficient height so as to support board 30 in a level position with respect to cover 40.
- the fifth protective cover 50 is situated directly below the fourth protective cover and directly above a computer monitor (not shown) which is being protected by the covers combination.
- the fifth cover is a blocking screen which limits the visibility of the computer monitor to only the person standing directly in front, pe ⁇ endicular to the computer monitor.
- the fifth cover differs from the other covers in that the fifth cover is not made of a rigid solid material but rather of light permeating material arranged in a polarized-like fashion to limit light from the computer monitor.
- the fifth cover does not have an internal opening of approximately the shape and size of the computer monitor.
- Cover 50 is aligned directly below the inner openings of the top four covers. The alignment is maintained by circular holes 51 accommodating screws 48 therein.
- circuit elements 37 located on die underside of cover 30 will now be described with general reference to the box diagram of Figure 2.
- Circuit elements 37 are arranged on a circuit board in a design intended to accomplish the following functions.
- the circuit elements as laid out are intended to be illustrative and non-limiting.
- equivalent circuit element known in the art to accomplish like tasks may be substituted without departure from the scope of the invention.
- the circuit board receives electric power from a power connector 60.
- Power connector 60 delivers power to the circuit elements of the circuit board through a line connection as depicted by line 61.
- the circuit board includes an interface 62 which communicates with a main processor 63 via a direct electrical connection as depicted by line 64.
- the interface communicates with and delivers incoming signals to the main processor 63.
- the main process can include any compute processor known to one skilled in the art to perform the tasks set out below.
- me main processor 63 controls the scanning operation performed on the computer monitor touch screen. Data read during me scanning process is fed to an encryption processor 65 via a direct electrical connection as depicted by line 66.
- the data to be encrypted generally refers to the user's personal identification number (PIN) that indicate to the system beings accessed who the user is.
- PIN personal identification number
- One type of application during use of a touch screen directs the user to initially enter his/her PIN number by pressing against the touch screen at locations corresponding to numbers on a computer generated keypad.
- the main processor determines the location of the user's touch, correlates the location with the numbers on the computer generated keypad and determines which numbers the user has entered. These numbers are then encrypted by the encryption processor.
- the encryption processor such as a Dallas DS5002 uses algorithms to encrypt the PIN as would be know to one skilled in the art and encrypts the PIN on an encrypted bytewide interface, DES is one such configuration scheme. Encryption programs and algorithms tend to be proprietary and are not intended to be limiting of the invention.
- a lithium battery 67, in electrical connection 68 with encryption processor 65, is used to maintain the algorithms and encryption programs used by the encryption processor.
- the algorithms and encryption programs are stored in a static random access memory computer storage unit (RAMs) 75, 76 so as to require the lithium battery, or equivalent, to keep the contents of the memory active in case of a general power failure.
- the static RAMs are in direct electrical connection with the encryption processor as depicted by line 95.
- the circuit board includes a boot interface 69 in direct electrical connection with encryption processor 65 as depicted by line 70.
- the boot interface includes a set of programs onto the interface thereon during assembly of the circuit board, for operation of the encryption processor 65.
- encryption keys for the encryption processor are loaded, during assembly, through the boot interface.
- a smartcard interface 71 is also provided, where a smartcard can be able to communicate with encryption processor via direct connection 101.
- a centrally located clock 72 provides the timing for the operation of the main and encryption processors when the two read and encode a PIN.
- the clock provides timing for data when it is multiplexed onto a buffer and stored in a memory unit.
- the clock operates in conjunction with a centrally located sequence logic and emitter time-out 73.
- a standard memory of 64K PROM 92 is used to store programs for use by the main processor.
- the main processor operates with 32K RAM 91 to enable efficient and speedy computer read-write operations. Both are in direct electrical connection with the main processor 63 as indicated by line 96.
- the circuit element includes a pair of emitter arrays 81 and 80, located across from a pair of sensor arrays 79 and 79.
- the two pairs of elements form the sides of a square 94 about the same size as the computer monitor being protected and are positioned along the perimeter of the internal opening of cover 30.
- the emitter arrays include an array of controllable linear point radiation emitters which give off a particular type of radiation in controlled bursts.
- the radiation wavelength may correspond to any visible or invisible wavelength as may be envisioned by one skilled in the art, including infrared, ultraviolet, electrical and sonic.
- the emitter arrays 81 and 80 are positioned horizontally and vertically, respectively, defining an 'x' and 'y' axis in Cartesian coordinates 95.
- the emitter arrays are driven or powered by emitter drivers 84.
- an emitter decoding address latch element 85 operates to provide the address or location of each of the emitters.
- the sensor arrays include an array of point sensors positioned directly opposite the point emitters for detecting radiation therefrom.
- the sensor arrays 78 and 79 are positioned horizontally and vertically, respectively, also defining an 'x' and 'y' axis in Cartesian coordinates.
- the sensor arrays are driven or powered by sensor amplifiers 83 and are sampled and held (powered and read) by sample/hold element 82.
- a sensor decoding address or location latch element 74 operates to provide the address and individual element decoding for the sensors.
- Element 82 samples and holds a detection signal from the sensor array and inputs this signal to the main processor.
- the main processor captures (reads) the signal from element 82, assigns a digital value to the signal and starts the comparison and analysis of the digital value with values of what the signal should be for normal and abnormal operation. For example, when a user presses on the touch screen, the presence of the user's finger causes an interruption in the flow of radiation from an emitter to its respective sensor. As shown in area 94, an uninterrupted radiation wave 95 flows from emitter array 80 to a sensor in sensor array 79. Likewise an uninterrupted radiation wave 98 flows from emitter array 81 to sensor array 78. A user's finger 97 depresses on the screen (not shown) and interrupts the flow of radiation waves
- the main processor 63 and address space decoder 86 can determine where the end user touched the screen. Finally, the brightness of the CRT screen is controlled by brightness control element 90.
- An address space decoding element 86 helps in the comparison and receives inputs along lines 87,
- the emitters are activated and emit a burst of radiation of specific frequency and intensity 100.
- the sensors are driven to sample and hold for a duration sufficient to detect the burst of radiation across the open internal opening defined by the square arrangement of the emitters and sensors.
- a typical time for a radiation scan is 50 microseconds per scan of infrared radiation.
- the central clock 72 provides time pulses to assist in performing this task.
- the emitters and sensors are then deactivated to prevent burn out of the two pairs of elements.
- the sensor pairs generate a signal in response to the intensity of radiation detected and this signal is assigned an address in the circuit boards memory.
- the main processor determines if all the sensors of the array pair detected a radiation signal level equal to a normal level 102.
- a normal level means that nothing is blocking the radiation. Should something or someone temporarily block the radiation from an emitter to reach its respective sensor, the signal level would be reduced. This can happen when someone presses their finger against the computer monitor to enter their PIN number.
- the emitter and sensor arrays are reactivated.
- the Cartesian coordinates associated with the signal drop is then determined 108 and an address is assigned to the coordinate 110.
- first coordinates are compared 112 with coordinates associated with a computer generated keypad imaged on the computer monitor to determine which numbers the person using the machine entered onto the touch screen. Where it is determined that the coordinates do not correspond to any location of the touch screen keypad 114, an error message is displayed 116 and the operations depicted in Figure 3 is restarted 118. Where it is determined that the first coordinates correspond to a position within the computer generated keypad 119, a determination of the number associated with the first coordinates is made 120. This number is encrypted and stored in memory 122. This process may be repeated until a plurality of numbers corresponding to the user's PIN have been entered. The encrypted signal is then sent to a remote processor such as a computing system affiliated with an institution 124. The remote processor decrypts the signal to determine the user PIN and men determines if the user is authorized to access the system. The system is then restarted 126.
- a remote processor such as a computing system affiliated with an institution 124.
- the remote processor decrypts the signal to
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Position Input By Displaying (AREA)
- Input From Keyboards Or The Like (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
- Ticket-Dispensing Machines (AREA)
- Selective Calling Equipment (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP50920998A JP2002515997A (en) | 1996-05-31 | 1997-03-10 | Improved method and system for encrypting input from a touch screen |
AU63491/98A AU728108C (en) | 1996-05-31 | 1997-03-10 | An improved method and system for encrypting input from a touch screen |
EP97954857A EP1573492A4 (en) | 1996-05-31 | 1997-03-10 | An improved method and system for encrypting input from a touch screen |
BRPI9710169-9B1A BR9710169B1 (en) | 1996-05-31 | 1997-03-10 | Improved method and system for encrypting information entered at the access entrance of a touchscreen. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/655,922 | 1996-05-31 | ||
US08/655,922 US5768386A (en) | 1996-05-31 | 1996-05-31 | Method and system for encrypting input from a touch screen |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1998012615A2 true WO1998012615A2 (en) | 1998-03-26 |
WO1998012615A3 WO1998012615A3 (en) | 2007-09-07 |
Family
ID=24630942
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1996/020291 WO1997045781A2 (en) | 1996-05-31 | 1997-02-10 | An improved method and system for encrypting input from a touch screen |
PCT/US1997/006925 WO1998012615A2 (en) | 1996-05-31 | 1997-03-10 | An improved method and system for encrypting input from a touch screen |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1996/020291 WO1997045781A2 (en) | 1996-05-31 | 1997-02-10 | An improved method and system for encrypting input from a touch screen |
Country Status (11)
Country | Link |
---|---|
US (1) | US5768386A (en) |
EP (1) | EP1573492A4 (en) |
JP (2) | JP2002515997A (en) |
KR (1) | KR100377464B1 (en) |
AR (1) | AR006106A1 (en) |
AU (2) | AU2111397A (en) |
BR (1) | BR9710169B1 (en) |
MY (1) | MY124096A (en) |
TW (1) | TW336301B (en) |
WO (2) | WO1997045781A2 (en) |
ZA (1) | ZA971895B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001092349A2 (en) * | 2000-05-31 | 2001-12-06 | @Pos.Com, Inc | A secure, encrypting pin pad |
DE10031174A1 (en) * | 2000-06-27 | 2002-01-17 | Siemens Ag | Procedure for setting a destination address |
WO2002011039A2 (en) * | 2000-07-31 | 2002-02-07 | @Pos.Com, Inc. | An interactive pos transaction system |
US7392396B2 (en) | 2002-03-07 | 2008-06-24 | Symbol Technologies, Inc. | Transaction device with noise signal encryption |
EP3050013A1 (en) * | 2013-09-30 | 2016-08-03 | Square, Inc. | Secure passcode entry user interface |
EP3050014A1 (en) * | 2013-09-30 | 2016-08-03 | Square, Inc. | Scrambling passcode entry interface |
US9773240B1 (en) | 2013-09-13 | 2017-09-26 | Square, Inc. | Fake sensor input for passcode entry security |
US9928501B1 (en) | 2013-10-09 | 2018-03-27 | Square, Inc. | Secure passcode entry docking station |
US10083442B1 (en) | 2012-06-12 | 2018-09-25 | Square, Inc. | Software PIN entry |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5970146A (en) * | 1996-05-14 | 1999-10-19 | Dresser Industries, Inc. | Data encrypted touchscreen |
EP0984402A3 (en) | 1998-08-31 | 2004-06-02 | Citicorp Development Center, Inc. | Stored value card terminal |
US6317835B1 (en) * | 1998-12-23 | 2001-11-13 | Radiant Systems, Inc. | Method and system for entry of encrypted and non-encrypted information on a touch screen |
JP3663075B2 (en) * | 1999-04-05 | 2005-06-22 | シャープ株式会社 | Information processing device |
US6509847B1 (en) | 1999-09-01 | 2003-01-21 | Gateway, Inc. | Pressure password input device and method |
US6549194B1 (en) * | 1999-10-01 | 2003-04-15 | Hewlett-Packard Development Company, L.P. | Method for secure pin entry on touch screen display |
US6630928B1 (en) * | 1999-10-01 | 2003-10-07 | Hewlett-Packard Development Company, L.P. | Method and apparatus for touch screen data entry |
US6651177B1 (en) | 2000-02-10 | 2003-11-18 | Ncr Corporation | Circuit and method of providing power to an external peripheral |
US6715078B1 (en) | 2000-03-28 | 2004-03-30 | Ncr Corporation | Methods and apparatus for secure personal identification number and data encryption |
GB2368950B (en) * | 2000-11-09 | 2004-06-16 | Ncr Int Inc | Encrypting keypad module |
US20020196237A1 (en) * | 2001-06-21 | 2002-12-26 | Fernando Llavanya X. | Touch pad that confirms its security |
AU2002228624A1 (en) * | 2000-11-21 | 2002-06-03 | @Pos.Com, Inc. | A touch pad that confirms its security |
US20030120936A1 (en) * | 2001-08-01 | 2003-06-26 | Eft Datalink | Encryption of financial information |
JP4064647B2 (en) * | 2001-08-24 | 2008-03-19 | 富士通株式会社 | Information processing apparatus and input operation apparatus |
US7109977B2 (en) * | 2003-10-05 | 2006-09-19 | T2D, Inc. | Slipcover touch input apparatus for displays of computing devices |
DE102005014194B4 (en) * | 2005-03-29 | 2006-12-14 | Axel Ahnert | Reader with integrated cryptography unit |
JP4929805B2 (en) * | 2006-04-11 | 2012-05-09 | 沖電気工業株式会社 | Automatic transaction equipment |
CN101206542B (en) * | 2006-12-18 | 2010-05-19 | 汉王科技股份有限公司 | Ciphering signature writing pad with press keys and display screen |
AR064377A1 (en) | 2007-12-17 | 2009-04-01 | Rovere Victor Manuel Suarez | DEVICE FOR SENSING MULTIPLE CONTACT AREAS AGAINST OBJECTS SIMULTANEOUSLY |
US9569912B2 (en) | 2008-06-26 | 2017-02-14 | Shopatm Bv (Sarl) | Article storage and retrieval apparatus and vending machine |
US8456429B2 (en) * | 2009-07-30 | 2013-06-04 | Ncr Corporation | Encrypting touch-sensitive display |
JP2012027855A (en) * | 2010-07-27 | 2012-02-09 | Kyocera Corp | Tactile sense presentation device and control method of tactile sense presentation device |
DE102010060862A1 (en) * | 2010-11-29 | 2012-05-31 | Wincor Nixdorf International Gmbh | Device for reading magnetic stripe and / or chip cards with touch screen for PIN input |
KR101340770B1 (en) | 2011-04-18 | 2013-12-11 | 주식회사 팬택 | Electronic device, method and apparatus for securing of user input data of electric device |
KR101340746B1 (en) * | 2011-04-18 | 2013-12-12 | 주식회사 팬택 | Electronic device, method and apparatus for securing of user input data of electric device, and communication system using thereof |
WO2013183010A1 (en) * | 2012-06-05 | 2013-12-12 | Fundamo (Pty) Ltd | Auxiliary input device for encrypted data entry |
JP6232763B2 (en) | 2013-06-12 | 2017-11-22 | セイコーエプソン株式会社 | Head-mounted display device and method for controlling head-mounted display device |
WO2015099725A1 (en) | 2013-12-26 | 2015-07-02 | Intel Corporation | Secure transactions using a personal device |
US9841844B2 (en) * | 2014-06-20 | 2017-12-12 | Funai Electric Co., Ltd. | Image display device |
US9760739B2 (en) * | 2014-08-08 | 2017-09-12 | Panasonic Intellectual Property Management Co., Ltd. | Information processing device |
US9704355B2 (en) | 2014-10-29 | 2017-07-11 | Clover Network, Inc. | Secure point of sale terminal and associated methods |
TWI569163B (en) * | 2015-06-04 | 2017-02-01 | 宏達國際電子股份有限公司 | Method for encrypting on-screen contents, electronic apparatus using the method and recording medium using the method |
US9679151B2 (en) | 2015-06-04 | 2017-06-13 | Htc Corporation | Method for encrypting on-screen contents, electronic apparatus using the method and recording medium using the method |
CN109478224A (en) | 2016-03-02 | 2019-03-15 | 丹麦科普拉有限公司 | The display equipment of safety |
FR3050048B1 (en) * | 2016-04-08 | 2018-04-27 | Ingenico Group | OPENING DETECTION OF A DATA ENTRY DEVICE |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5157717A (en) * | 1989-11-03 | 1992-10-20 | National Transaction Network, Inc. | Portable automated teller machine |
US5162783A (en) * | 1990-07-23 | 1992-11-10 | Akzo N.V. | Infrared touch screen device for a video monitor |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5184115A (en) * | 1990-06-04 | 1993-02-02 | At&T Bell Laboratories | Touch-screen arrangement |
US5483261A (en) * | 1992-02-14 | 1996-01-09 | Itu Research, Inc. | Graphical input controller and method with rear screen image detection |
EP0563477A1 (en) * | 1992-03-25 | 1993-10-06 | Visage Inc. | Touch screen sensing apparatus |
US5337358A (en) * | 1992-11-20 | 1994-08-09 | Pitney Bowes Inc. | Apparatus for recording a transaction including authenticating an identification card |
AU2122495A (en) * | 1994-03-17 | 1995-10-03 | Gift Certificate Center, Inc., The | Machine-readable indicia certificate dispensing device |
US5457305A (en) * | 1994-03-31 | 1995-10-10 | Akel; William S. | Distributed on-line money access card transaction processing system |
US5570113A (en) * | 1994-06-29 | 1996-10-29 | International Business Machines Corporation | Computer based pen system and method for automatically cancelling unwanted gestures and preventing anomalous signals as inputs to such system |
US5564974A (en) * | 1994-09-06 | 1996-10-15 | Cummins-Allison Corp. | Coin sorting system with touch screen device |
US5544086A (en) * | 1994-09-30 | 1996-08-06 | Electronic Payment Services, Inc. | Information consolidation within a transaction network |
US5832206A (en) * | 1996-03-25 | 1998-11-03 | Schlumberger Technologies, Inc. | Apparatus and method to provide security for a keypad processor of a transaction terminal |
-
1996
- 1996-05-31 US US08/655,922 patent/US5768386A/en not_active Expired - Lifetime
-
1997
- 1997-02-10 AU AU21113/97A patent/AU2111397A/en not_active Abandoned
- 1997-02-10 WO PCT/US1996/020291 patent/WO1997045781A2/en active Application Filing
- 1997-03-03 MY MYPI97000844A patent/MY124096A/en unknown
- 1997-03-05 ZA ZA971895A patent/ZA971895B/en unknown
- 1997-03-05 AR ARP970100870A patent/AR006106A1/en unknown
- 1997-03-10 AU AU63491/98A patent/AU728108C/en not_active Expired
- 1997-03-10 BR BRPI9710169-9B1A patent/BR9710169B1/en active IP Right Grant
- 1997-03-10 KR KR10-1998-0708918A patent/KR100377464B1/en not_active IP Right Cessation
- 1997-03-10 JP JP50920998A patent/JP2002515997A/en not_active Withdrawn
- 1997-03-10 EP EP97954857A patent/EP1573492A4/en not_active Withdrawn
- 1997-03-10 WO PCT/US1997/006925 patent/WO1998012615A2/en active IP Right Grant
- 1997-05-29 TW TW086107334A patent/TW336301B/en active
-
2005
- 2005-12-27 JP JP2005374273A patent/JP4104625B2/en not_active Expired - Lifetime
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5157717A (en) * | 1989-11-03 | 1992-10-20 | National Transaction Network, Inc. | Portable automated teller machine |
US5162783A (en) * | 1990-07-23 | 1992-11-10 | Akzo N.V. | Infrared touch screen device for a video monitor |
Non-Patent Citations (1)
Title |
---|
See also references of EP1573492A2 * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7305565B1 (en) | 2000-05-31 | 2007-12-04 | Symbol Technologies, Inc. | Secure, encrypting pin pad |
WO2001092349A2 (en) * | 2000-05-31 | 2001-12-06 | @Pos.Com, Inc | A secure, encrypting pin pad |
WO2001092349A3 (en) * | 2000-05-31 | 2002-10-17 | Commat | A secure, encrypting pin pad |
JP2012070450A (en) * | 2000-05-31 | 2012-04-05 | Symbol Technologies Inc | Secure, encrypting pin pad |
JP2004511926A (en) * | 2000-05-31 | 2004-04-15 | @ポス ドットコム インコーポレイテッド | Secure, encrypted PIN pad |
DE10031174A1 (en) * | 2000-06-27 | 2002-01-17 | Siemens Ag | Procedure for setting a destination address |
WO2002011039A3 (en) * | 2000-07-31 | 2003-03-27 | Pos Com Inc | An interactive pos transaction system |
WO2002011039A2 (en) * | 2000-07-31 | 2002-02-07 | @Pos.Com, Inc. | An interactive pos transaction system |
US7971066B2 (en) * | 2002-03-07 | 2011-06-28 | Symbol Technologies, Inc. | Transaction device with noise signal encryption |
US7392396B2 (en) | 2002-03-07 | 2008-06-24 | Symbol Technologies, Inc. | Transaction device with noise signal encryption |
US10083442B1 (en) | 2012-06-12 | 2018-09-25 | Square, Inc. | Software PIN entry |
US11823186B2 (en) | 2012-06-12 | 2023-11-21 | Block, Inc. | Secure wireless card reader |
US10515363B2 (en) | 2012-06-12 | 2019-12-24 | Square, Inc. | Software PIN entry |
US10185957B2 (en) | 2012-06-12 | 2019-01-22 | Square, Inc. | Software pin entry |
US9773240B1 (en) | 2013-09-13 | 2017-09-26 | Square, Inc. | Fake sensor input for passcode entry security |
EP3050013A1 (en) * | 2013-09-30 | 2016-08-03 | Square, Inc. | Secure passcode entry user interface |
EP3050013A4 (en) * | 2013-09-30 | 2017-04-05 | Square, Inc. | Secure passcode entry user interface |
EP3050014A4 (en) * | 2013-09-30 | 2017-04-05 | Square, Inc. | Scrambling passcode entry interface |
US10540657B2 (en) | 2013-09-30 | 2020-01-21 | Square, Inc. | Secure passcode entry user interface |
EP3050014A1 (en) * | 2013-09-30 | 2016-08-03 | Square, Inc. | Scrambling passcode entry interface |
US9928501B1 (en) | 2013-10-09 | 2018-03-27 | Square, Inc. | Secure passcode entry docking station |
Also Published As
Publication number | Publication date |
---|---|
MY124096A (en) | 2006-06-30 |
WO1997045781A2 (en) | 1997-12-04 |
JP4104625B2 (en) | 2008-06-18 |
WO1998012615A3 (en) | 2007-09-07 |
EP1573492A2 (en) | 2005-09-14 |
JP2002515997A (en) | 2002-05-28 |
AU2111397A (en) | 1998-01-05 |
US5768386A (en) | 1998-06-16 |
EP1573492A4 (en) | 2007-10-31 |
KR20000010789A (en) | 2000-02-25 |
KR100377464B1 (en) | 2003-06-12 |
AR006106A1 (en) | 1999-08-11 |
BR9710169A (en) | 2002-01-08 |
BR9710169B1 (en) | 2013-06-11 |
AU6349198A (en) | 1998-04-14 |
AU728108C (en) | 2001-09-06 |
ZA971895B (en) | 1998-09-07 |
JP2006185449A (en) | 2006-07-13 |
TW336301B (en) | 1998-07-11 |
AU728108B2 (en) | 2001-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU728108C (en) | An improved method and system for encrypting input from a touch screen | |
US5548660A (en) | Machine security systems | |
US6317835B1 (en) | Method and system for entry of encrypted and non-encrypted information on a touch screen | |
US9911104B2 (en) | Banking system controlled responsive to data bearing records | |
US20080258940A1 (en) | Apparatus and method for preventing password theft | |
AU736113B2 (en) | Personal identification authenticating with fingerprint identification | |
US20180197157A1 (en) | Banking System Controlled Responsive to Data Bearing Records | |
EP0101772A1 (en) | Computer security systems | |
CA2105404A1 (en) | Biometric token for authorizing access to a host system | |
WO1998012670A1 (en) | Biometric identification system for providing secure access | |
JP2006185449A5 (en) | ||
US9251540B1 (en) | Banking system controlled responsive to data bearing records | |
IES77153B2 (en) | Computer keyboard with integral encoded device reader | |
US9224273B1 (en) | Banking system controlled responsive to data bearing records | |
CA2798626A1 (en) | Biometric banking machine apparatus, system, and method | |
FI117216B (en) | Protected keyboard device | |
CN201047933Y (en) | Random cipher digital display keyboard | |
GB2402649A (en) | Personal identification code entry device | |
JP3704450B2 (en) | Information input device | |
JP2972979B2 (en) | Password input device | |
KR0179757B1 (en) | Cryptographic input device | |
KR20060015634A (en) | Secure card terminal | |
JP2002055772A (en) | Inputting device and information processor | |
KR100434519B1 (en) | Password input system | |
KR100507712B1 (en) | Information inputting system with a variable arrangement of keypad, and control method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG GH |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 63491/98 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1997954857 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1019980708918 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: CA |
|
WWP | Wipo information: published in national office |
Ref document number: 1019980708918 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 63491/98 Country of ref document: AU |
|
WWG | Wipo information: grant in national office |
Ref document number: 1019980708918 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 1997954857 Country of ref document: EP |