Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure financial terminal firmware programming method and financial terminal

A financial terminal and security firmware technology, applied in the direction of program loading/starting, program control devices, etc., can solve the problems of security firmware code errors or misjudgments, security problems, and re-establishment of security environment, so as to avoid potential security risks and improve security. sexual effect

Active Publication Date: 2015-12-16
FEITIAN TECHNOLOGIES
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The code for establishing a secure environment is included in the official firmware. On the one hand, attackers have the opportunity to re-execute the process of establishing a secure environment. build, raising security concerns

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure financial terminal firmware programming method and financial terminal
  • Secure financial terminal firmware programming method and financial terminal
  • Secure financial terminal firmware programming method and financial terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] This embodiment provides a safe financial terminal firmware programming method, such as figure 1 shown, including:

[0056] Step S1. The financial terminal receives the instruction issued by the host computer. When receiving the instruction to establish a safe environment issued by the host computer, execute step S2. When receiving the secure boot download update instruction issued by the host computer, execute step S3. When receiving Step S4 is executed when the application firmware download and update instruction issued by the host computer is received, and step S5 is executed when the secure firmware download update instruction issued by the host computer is received;

[0057] Specifically, in this embodiment, the host computer encapsulates the instruction to be sent into a standard CCID communication instruction and sends it to the financial terminal.

[0058] Step S2, the financial terminal starts the safety detection function, returns a response to the upper comp...

Embodiment 2

[0225] This embodiment provides a financial terminal, such as Figure 7 As shown, it specifically includes: a communication module 11, a safe environment establishment module 12, a storage module 13, a safe boot download and update module 14, an application firmware download and update module 15 and a secure firmware download and update module 16, and the specific functions of the above modules are as follows:

[0226] The communication module 11 is used to receive the instructions for establishing a safe environment, the download and update instructions for safe boot, the download and update instructions for application firmware, and the download and update instructions for secure firmware issued by the host computer; 14. When the application firmware download and update module 15 and the secure firmware download and update module 16 are finished running, a response is returned to the upper computer;

[0227] The safe environment establishment module 12 is used for starting t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a secure financial terminal firmware programming method and a financial terminal and belongs to the field of financial security. The method comprises: the financial terminal, according to instructions issued by an upper computer, completes establishment of a security environment, downloading and update of a secure boot, downloading and update of application firmware and downloading and update of secure firmware. The financial terminal comprises a communication module, a security environment establishment module, a secure boot downloading and updating module, an application firmware downloading and updating module and a secure firmware downloading and updating module. The secure financial terminal firmware programming method and the financial terminal have the beneficial effects that potential safety hazards of an existing financial terminal firmware programming method can be avoided and safety of a financial terminal product can be improved.

Description

technical field [0001] The invention relates to the field of financial security, in particular to a secure financial terminal firmware programming method and a financial terminal. Background technique [0002] The financial terminal needs to establish a security environment before using it. After the security environment is established, the financial terminal enters a safe operation mode. In this mode, sensitive data such as keys and passwords can be imported. [0003] In the process of implementing the present invention, technicians find that the existing financial terminal firmware programming method has at least the following potential safety hazards: [0004] 1. The code for establishing a secure environment is included in the official firmware. On the one hand, the attacker has the opportunity to re-execute the process of establishing the secure environment. On the other hand, it may also be due to the error or misjudgment of the secure firmware's own code, which may le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/445
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products