Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for improving payment terminal application security

A payment terminal and security technology, which is applied in the field of improving the application security of payment terminals, can solve problems such as complex third-party applications, difficult security risks, and inability to effectively prevent security issues, so as to ensure payment security, improve security, and realize The effect of rights management

Inactive Publication Date: 2017-02-01
FUJIAN LANDI COMML EQUIP CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above methods have the following disadvantages: 1. Most third-party applications are relatively complex, and it is difficult to determine their security risks by reviewing the source code; 2. Some third-party application developers are unwilling to open source codes to terminal owners due to commercial secret considerations; 3. 、 Even if a security risk agreement is signed, it is only a measure after a security problem occurs, and it cannot effectively prevent the security problem from occurring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving payment terminal application security
  • Method and system for improving payment terminal application security
  • Method and system for improving payment terminal application security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] Please refer to figure 2 , this embodiment provides a method for improving the security of payment terminal applications, which is suitable for terminal devices with payment functions, especially payment terminals that introduce third-party application programs, and can well guarantee the payment security of terminals.

[0088] The method may include the steps of:

[0089] S1: The third-party application publisher declares the payment-related functions that may be used during the use of the published application, sets the corresponding permissions for the payment-related functions, and generates a permission table corresponding to the application; in the permission table List whether IC cards, magnetic cards, radio frequency cards, and printing can be used correspondingly; whether PIN input is allowed; whether download keys and other payment-related functions are allowed to be used; for example, for invoicing software, disable all payment-related functions, including s...

Embodiment 2

[0106] Please refer to Figure 4 , this embodiment provides a system for improving the security of payment terminal applications, including:

[0107] Generating module 1, used to preset the permissions of the application program, and generate a permission table corresponding to the application program;

[0108] Signature module 2, used by the publisher to digitally sign the application and its permission table;

[0109] Assignment module 3, used for the terminal to obtain the application program and its authorization list after the terminal verifies that the digital signature is passed, and assign an identifier to the application program;

[0110] An association module 4, configured to establish an association relationship between an application program, an identity, and a permission table;

[0111] The first obtaining module 5 is used for obtaining the identification of the application program when the application program calls a function related to the payment operation; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for improving the payment terminal application security and a device thereof. The method comprises the following steps of presetting the authority of an application program; generating an authority table corresponding to the application program; performing digital signature on the application program and the authority table by a publisher; after the digital signature passes through terminal verification, obtaining the application program and the authority table; allocating a mark for the application program; building the association relationship of the application program, the mark and the authority table; when the application program calls a function involving the payment operation, obtaining the mark of the application program by a terminal; obtaining the authority table corresponding to the mark by the terminal according to the association relationship; determining whether the application program has the authority for calling the function or not by the terminal according to the authority table. The method and the device provided by the embodiment of the invention are based on the cooperated matching among a signature tool, an authority management service and equipment driver background service; an authority management mechanism aiming at the third party application program is built; the authority management on the third-party application is realized; the terminal payment security is improved.

Description

technical field [0001] The invention relates to the field of safe payment, in particular to a method and system for improving the security of payment terminal applications. Background technique [0002] At present, the terminals used in the payment field basically support multiple applications. With the introduction of smart terminals, end customers will not only develop their own applications, but also entrust third parties to develop application software, such as: invoicing system, navigation / map service, etc. [0003] The application scenarios of end customers are basically payment-related applications, and financial security needs to be considered. Therefore, when installing and using application software developed by a third party on the terminal, due to issues such as low security awareness of the third-party application developer, there may be security vulnerabilities, and there may also be malicious use of payment-related devices. This requires the management and co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52G06Q20/38
CPCG06F21/52G06F2221/033G06Q20/382
Inventor 吴旋
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products