Five security designs for GPRS wireless POS system applications

Solving system security issues is the key to the application of GPRS wireless POS systems. The use of GPRS wireless mobile data transmission must effectively prevent hackers, prevent information security incidents, and simplify network applications. Security is mainly to prevent intentional or unintentional damage from inside and outside the system. Identity authentication, identity authentication, digital signature prevention against tampering and tampering, and encryption and decryption of transaction data are important means to ensure network security.

Firewall
A firewall is the most basic configuration of network security control and an important barrier to a secure network. Firewalls can greatly enhance the security of internal networks, protect trusted networks from threats from untrusted networks, allow both parties to communicate, and reduce risk by filtering unsecured services. The use of router mutual authentication, address translation and other technical means can effectively prevent fake routers from accessing and illegally intercepting data.

2. Network security
The current GPRS transmission coding methods are CS-1 and CS-2, and they all have encryption protection for the transmission data, so the GPRS channel itself is safe. GPRS wireless POS system can use VPN or SDH technology to establish POS system on mobile data public network. Enterprise internal virtual private network enables distributed wireless POS machines to securely access bank POS host and bank internal network resources to ensure POS system wireless access network. Reliability and security.

3. Identity authentication
When the mobile server accesses the mobile POS machine, it first checks and confirms the identity of the wireless POS user. Only the confirmed POS machine assigns the IP address; the transaction data is sent to the bank POS host, and then the merchant of the POS machine is passed. The information such as the number and the POS number are compared with the database to further ensure the legality of the mobile POS access.

4. Terminal security
Each wireless wireless POS terminal is equipped with a GPRS SIM card, and the uniqueness of the SIM card is used to define the range in which the user can access a certain system, thereby effectively avoiding illegal intrusion. The wireless POS master key is encrypted and stored with a dedicated secure CPU to ensure the security of the master key.

5. Data security
The wireless POS transaction data packet and the wireless POS transaction data packet format and encryption method use the ISO8583 mode to transmit transaction data, and also perform data encryption protection and MAC authentication and integrity control at the application layer, for sensitive data such as user accounts, Passwords and the like are encrypted by the international standard encryption algorithm 3DES to ensure the security of the transaction data of the wireless POS system.
Original address: http://security.zol.com.cn/333/3336621.html

Standing Garment Steamer

Standing Garment Steamer,Standing Clothes Steamer,Best Standing Steamer,Standing Steamer For Clothes

NINGBO ZHONGJIA ELECTRICAL APPLIANCE CO., LTD. , https://www.foodzhongjia.com

Posted on