Electronic transaction terminal for preventing theft of...

Registers – Systems controlled by data bearing records – Banking systems

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C902S009000

Reexamination Certificate

active

06279825

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to an electronic transaction terminal and more particularly, to an electronic transaction terminal which can effectively prevent theft personal identification numbers or the like.
BACKGROUND OF THE INVENTION
There has been a lot of talk about electronic money transactions using an IC card or the like, and there are actually some regions into which this system has been introduced. There has also been known an electronic transaction terminal called VST (Value Service Terminal) as a terminal used for electronic money transactions. This VST has functions such as depositing and withdrawing electronic money, checking a balance on a bank account, and checking transaction histories. The VST is connected to a host computer (HOST) provided in a bank or elsewhere through a communication line.
FIG. 15
is an explanatory view showing a sequence of communication between the VST and the HOST. A cipher for security is used for communications between a VST
500
and a HOST H. When the VST
500
transmits a communication-start signal to the HOST H, the HOST H encrypts an encrypting key “KEY
2
” using an encrypting key (KEY
1
), and transmits the encrypted key to the VST
500
. The VST
500
decrypts the encrypted encrypting key “KEY
2
” with a decrypting key (KEY
1
′) held by the VST
500
to acquire “KEY
2
”.
Then, the VST
500
encrypts information for electronic transaction information “A” such as a personal identification number inputted by a user with the acquired encrypting key (KEY
2
), and transmits the encrypted information to the HOST H. The HOST H decrypts the encrypted electronic-transactional information “A” with a decrypting key (KEY
2
′) to acquire the electronic-transactional information “A”.
FIG. 16
is an explanatory view showing general configuration of the VST
500
and the HOST H. The decrypting key (KEY
1
′) in the sequence is previously stored on a memory
501
of the VST
500
. The memory
501
of the VST
500
temporarily stores thereon an encrypting key (KEY
2
) sent from the HOST H. The VST
500
has an input section
502
through which electronic-transactional information is inputted. While the HOST H has the encrypting key (KEY
1
), encrypting key (KEY
2
), and the decrypting key (KEY
2
′) stored on a memory HM thereof. In addition, a program for the sequence is stored on each of the memories
501
and HM of the VST
500
and HOST H respectively, and CPUs
503
and HC are actuated according to the program. The VST
500
and the HOST H are connected to each other through interface circuits
504
and HI.
There has been known an information processing unit disclosed in Japanese Patent Laid-Open Publication No. HEI 4-128948 as a device for maintaining security of the information stored on a memory. This information processing unit is designed to cut off, when a cover for a main unit thereof is taken off, power to supply to a buttery-backup memory so that data on the memory is broken. Opening and closing of the cover is detected by a microswitch.
In the conventional type of VST
500
, however, although the security of electronic-transactional information is ensured by encryption, the electronic-transactional information inputted from the input section
502
for the VST
500
exists as raw data on a circuit until the data is encrypted by the encrypting key (KEY
2
). For this reason, if the circuit with raw data existing thereon is tampered with to get unauthorized access thereto, electronic-transactional information may be stolen. In addition, if the decrypting key (KEY
1
′) stored on the memory
501
of the VST
500
is illegally read, the contents of the encrypting key (KEY
2
) sent from the HOST H may leak, which may cause electronic-transactional information to be stolen.
In the information processing unit, the microswitch is set as a trigger, so that data on the memory is broken as soon as the case for the main unit is opened. And for this reason, if the case is not opened but the unit is tampered with by making a hole on the case thereof with a drill or so to get unauthorized access to the circuit, the security is not sufficiently ensured any more. Also, data would be deleted by opening the case for the main unit, so that it is required to set data again even when maintenance is executed to any section nothing to do with the security, which makes the work more troublesome.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide, for solving the problems described above, an electronic transaction terminal from which electronic-transactional information is hardly stolen and in which easy maintenance can be given to any section nothing to do with security.
With the present invention, electronic components not requiring security can easily be maintained by accommodating an electronic component requiring the security in a security case. Namely, even if the case for the main unit is opened, the functions of the terminal will not be terminated on condition that no change is given to the security case, so that there is no need to carry out a work such as setting data again. In addition, wiring is run throughout the internal side of the security case, so that the wiring is cut off if, for example, the security case is opened. For this reason, even if someone tries to steel information inside the case, such action is taken that the functions of the terminal are terminated by cutting off the wiring, for example, that programs and data stored on the memory are deleted so that the terminal does not run any more, and for this reason, information on electronic transactions inside a security case can be protected from theft.
With the present invention, electronic components not requiring security can also easily be maintained by accommodating an electronic component requiring the security in a security case. In addition, if redundant wiring is provided inside the security case, and if, for example, someone makes a hole on the security case, a tool or so may contact any point of the wiring during the mischievous operation, which makes the wiring cut off. Any information on electronic transactions inside a security case can be protected from theft on condition that functions of the terminal are terminated in response to cutting off of this wiring.
With the present invention, when a user inputs an identification number through a control section, for example, this identification number is stored once on a memory of the terminal. The identification number stored on the memory may easily be stolen. For this reason, the information for electronic transactions stored on the memory is programmed to be deleted if the wiring placed throughout the internal surface of the security case is cut off with some cause from outside. With this programming, a third person hardly steels an identification number, which allows the safety to be enhanced. In addition, electronic components not requiring security can easily be maintained by accommodating an electronic component requiring the security in a security case.
With the present invention, information for electronic transactions stored on the memory is programmed to be deleted if redundant wiring inside the security case is cut off by manipulating some change thereto from outside. For this reason, a third person hardly steels an identification number, which allows the safety to be enhanced. In addition, electronic components not requiring security can easily be maintained by accommodating an electronic component requiring the security in a security case.
With the present invention, if contents of the memory is programmed to be deleted by detecting disintegration or breakage of the security case, the safety is further enhanced. For example, the security case has a divided structure and microswitches are located in divided sections respectively, so that disintegration of the security case can be detected. Data on the memory may be deleted in response to detection of this disintegration.
With the present invention, information for an electronic transa

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Electronic transaction terminal for preventing theft of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Electronic transaction terminal for preventing theft of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Electronic transaction terminal for preventing theft of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2461313

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.