System safety operation management method, handheld financial terminal and computer readable storage medium

A technology for operation management and system security, which is applied in the field of system security operation management, handheld financial terminals and computer-readable storage media, and can solve problems such as no security mechanism, security loopholes, and imperfect security mechanisms.

Pending Publication Date: 2022-04-15
深圳开鸿数字产业发展有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although there are many handheld financial terminals on the market, there is still no relatively complete security mechanism.
Especially traditional handheld financial terminals, such as traditional point of sales information management system terminals (Point of sales terminal, POS equipment), are limited by low system configuration or hardware configuration, for example, the space size of the internal memory is less than 128M, and the storage medium The size of the space is less than 128M, resulting in not only imperfect security mechanisms, but also various security loopholes, so secure transactions are threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System safety operation management method, handheld financial terminal and computer readable storage medium
  • System safety operation management method, handheld financial terminal and computer readable storage medium
  • System safety operation management method, handheld financial terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0019] The flow charts shown in the drawings are just illustrations, and do not necessarily include all contents and operations / steps, nor must they be performed in the order described. For example, some operations / steps can be decomposed, combined or partly combined, so the actual order of execution may be changed according to the actual situation.

[0020] Embodiments of the present application provide a system security operation management method, a handheld fin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of financial terminal security, and provides a system security operation management method, a handheld financial terminal and a computer readable storage medium, and the method comprises the steps: obtaining an operation instruction of a system; if the operation instruction of the system is an application program installation instruction, obtaining an application identifier of an application program, and determining a data storage area of the application program according to the application identifier of the application program; if the operation instruction of the system is a process data acquisition instruction, acquiring an identity label of a process, and determining a data acquisition area of the process according to the identity label of the process; if the running instruction of the system is the memory access instruction, the identity label of the application program is obtained, and the memory access area of the application program is determined according to the identity label of the application program, so that running management of the system is enhanced, and the safety of the system is improved.

Description

technical field [0001] The present application relates to the technical field of financial terminal security, in particular to a system security operation management method, a handheld financial terminal and a computer-readable storage medium. Background technique [0002] Financial transactions are the basic and important business of handheld financial terminals, and a safe and complete security mechanism occupies an extremely important position. However, although there are many handheld financial terminals currently on the market, there is still no relatively complete security mechanism. Especially traditional handheld financial terminals, such as traditional point of sales information management system terminals (Point of sales terminal, POS equipment), are limited by low system configuration or hardware configuration, for example, the space size of the internal memory is less than 128M, and the storage medium The size of the space is less than 128M, resulting in not onl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
Inventor 宾建华张兆生
Owner 深圳开鸿数字产业发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products