A method for enhancing POS terminal information security

A terminal information and security technology, which is applied in the direction of secure communication devices, digital transmission systems, instruments, etc., to achieve the effect of improving information security, reducing the risk of information leakage and personal property loss

Active Publication Date: 2021-05-18
前海联大(深圳)技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, for programs or files that have been released and have vulnerabilities, the existing solutions can only remedy the vulnerabilities through manual or remote upgrades, which requires a comprehensive assessment of labor costs, network environment and load, terminal performance, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for enhancing POS terminal information security
  • A method for enhancing POS terminal information security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and effect of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0025] A method for enhancing information security of a POS terminal provided by the present invention, wherein a system program is installed in the POS terminal, please refer to Figure 1-2 , as shown in the figure, the enhancement method includes the following steps:

[0026] S100, pre-install a blacklist program in the POS terminal, and the blacklist program stores published files with bugs.

[0027] In the embodiment of the present invention, the blacklist program includes published files with bugs; in this embodiment, the blacklist program is used as one of the legal references for the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for enhancing information security of a POS terminal. A system program is installed in the POS terminal, which includes the following steps: a blacklist program is pre-installed in the POS terminal, and the blacklist program contains published But there is a file with BUG; the system program detects in real time whether the file to be downloaded has been blacklisted, and if so, refuses to download; if the file to be downloaded is not blacklisted, then the system to be downloaded The file is signed and authenticated to determine whether the signature is legal, if not, then refuse to download, and if so, allow the download. The present invention pre-embeds a blacklist program that can be updated remotely and in time in the POS terminal, which can avoid downloading published files with bugs, improves the information security of the POS terminal, and minimizes the risk of information leakage and personal property loss .

Description

technical field [0001] The invention relates to the field of information security of financial POS terminals, in particular to a method for enhancing information security of POS terminals. Background technique [0002] POS terminals involve the processing of important information such as personal account numbers, PINs, and amounts, so they have very high requirements for the security of data information. [0003] Existing solutions usually use signature authentication to ensure that the loaded and running programs are legally authorized, and use encryption to prevent the key data of the communication link from being leaked. [0004] However, for programs or files that have been released and have vulnerabilities, the existing solutions can only remedy the vulnerabilities through manual or remote upgrades, which requires a comprehensive assessment of labor costs, network environment and load, and terminal performance. [0005] Therefore, the prior art still needs to be improv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32G07G1/12
CPCG07G1/12H04L9/3247H04L63/08H04L67/06H04L67/34
Inventor 郭鸿志胡继龙
Owner 前海联大(深圳)技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products