Method for detecting the improper removal of electronic equipment

A technology of electronic equipment and detection method, which is applied in the direction of computer security device, cooperating device, error detection/correction, etc., can solve problems such as key erasure, and achieve the effect of improving operability and improving security

Inactive Publication Date: 2011-04-13
SANKYO SEIKI MFG CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For example, in the access control management system disclosed in Patent Document 1, if it is detected that the card reader has been disassembled improperly, the key stored in the card reader will be deleted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting the improper removal of electronic equipment
  • Method for detecting the improper removal of electronic equipment
  • Method for detecting the improper removal of electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Hereinafter, the best mode for carrying out the present invention will be described with reference to the drawings.

[0035] [Structure of electronic equipment device]

[0036] figure 1It is a block diagram showing the electrical configuration of the card reader 1 used in the fraudulent removal detection method according to the embodiment of the present invention. In this embodiment, the card reader 1 is mounted on a housing of a user-operated terminal operated by a user, such as a terminal at a gas station or an ATM, and the card reader 1 and a host terminal are accommodated in the housing. device 2. In addition, in this embodiment, the card reader 1 and the host device 2 are electrically connected through RS232C (Of course, other connection forms may also be adopted). In addition, the host device 2 may not be housed in the user operation terminal, but may be installed in another control device. In addition, in this embodiment, although the card reader 1 is used as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a method for detecting the improper removal of electronic equipment which prevents the deletion of confidential data due to human error by a technician, and improves the operability in maintenance and servicing etc. Specifically, an improper removal detection method for electronic equipment (card reader (1)) which receives commands from a high-level device (2) and executes processing in accordance with the commands, wherein the electronic equipment has a RAM (11) for storing electronic information which includes confidential data, a detection means (switching circuit (15), etc.) for detecting the improper removal of the electronic equipment, a power supply control IC (13) for disconnecting the power supply to the RAM (11) on the basis of signals from the detection means, and a RAM (12) which is separate from and independent of the RAM (11) and does not lose the stored data even if the power supply is disconnected by the power supply control IC (13). The detection means is activated after the confidential data stored in the RAM (11) has been copied to the RAM (12).

Description

technical field [0001] The present invention relates to an illegal disassembly detection method for detecting unauthorized disassembly of an electronic device handling confidential data. Background technique [0002] In electronic devices such as card readers, confidential data (for example, key data for encryption processing) are stored in volatile memory backed up by a secondary power supply, and read from the volatile memory each time as necessary. Confidential data is transferred to work memory for various processing. Since confidential data is data required for performing various processes, it is usually stored so as not to be lost. However, when any abnormality such as unauthorized disassembly of the electronic device is detected, the power supply to the volatile memory from the secondary power supply and the main power supply will be cut off, thereby erasing the confidential data therein. [0003] Here, such an electronic device such as a card reader is attached to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/06G06K17/00G06F21/75G06F21/86
CPCG06F11/0745G06K7/0008G06F11/0751G06K7/0069
Inventor 马场勉
Owner SANKYO SEIKI MFG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products