Core safety architecture implementation method of intelligent financial transaction terminal

A technology for financial transactions and implementation methods, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as complex design and difficult implementation, and achieve the effects of improving reliability, reducing complexity, and simple separation

Inactive Publication Date: 2013-04-17
上海慧银信息科技有限公司
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This can also ensure the overall security of the system and effectively reduce costs, but due to the operation of the external memory (usually Flash) involving the security p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Core safety architecture implementation method of intelligent financial transaction terminal
  • Core safety architecture implementation method of intelligent financial transaction terminal
  • Core safety architecture implementation method of intelligent financial transaction terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail in conjunction with the accompanying drawings and examples. It must be understood that the specific examples described here are only used to explain the present invention, not to limit the present invention.

[0036] see figure 1 , figure 2 and image 3 , wherein the security architecture embodied in the present invention includes a security processor 11 , a general processor 12 , an external memory 13 and an external general memory 14 . The safety processor 11 includes a safety detection function circuit 111, the safety monitoring function circuit can monitor the environmental parameters of the system, can detect changes in system power supply, temperature, etc., and has a monitoring switch for external intrusion, changes in environmental parameters or external intrusion The triggering of the monitoring swit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A first system startup code, a second startup code, a verification key and a transaction key are saved in a safety processor, wherein the verification key is used for verifying the integrity of the second startup code which is an inherent part of a common processor, and the transaction key is used for verifying the integrity of transaction information. The verification key verifying the system integrity of the second startup code of the common processor after a read-in and an execution of the first startup code in a RAM (Random Access Memory) inside the common processor and a read-in and an execution of the second startup code in the RAM inside the common processor; a startup program is stopped if the verification cannot pass; a system code and an application program code are loaded if the verification passes and the integrity of the system code and an application program are verified through the verification code; and the startup program is stopped if the verification result is negative and the startup program is started if the verification result is positive.

Description

Technical field: [0001] The invention belongs to the field of security protection of electronic equipment, and more specifically relates to a method for realizing the security architecture of the core system of an intelligent financial transaction terminal. Background technique: [0002] Nowadays, more and more financial transaction terminals such as POS machines, tablet computers or mobile phones have realized the intelligent operation system. Various application programs can be easily developed and installed on these smart operating systems (such as Android, iOS), and even the operating system can be updated. How to ensure that the installation of these applications and the update of the operating system are certified, safe and reliable, and will not be maliciously tampered with, so as to ensure that relevant transaction information such as card numbers and passwords will not be leaked has become a must issues of importance. Therefore, it is increasingly urgent and impor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51G06F21/57
Inventor 黄柯姚茂彪金海青朱凯申
Owner 上海慧银信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products