Method and device for guaranteeing security of POS machine firmware

A POS machine and firmware technology, which is applied in computer security devices, instruments, platform integrity maintenance, etc., can solve the problems of POS machine firmware being tampered with, unable to guarantee the security requirements of POS machines, etc., and achieve the effect of reducing costs

Active Publication Date: 2017-11-07
PAX COMP TECH SHENZHEN
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a method, device and terminal equipment for ensuring the security of the POS machine firmware, so as to solve the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for guaranteeing security of POS machine firmware
  • Method and device for guaranteeing security of POS machine firmware
  • Method and device for guaranteeing security of POS machine firmware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 A flow chart of a method for ensuring the security of POS machine firmware provided by an embodiment of the present invention is shown, and the details are as follows:

[0026] Step S101, according to the CPU type, preset a loading mode corresponding to the CPU type.

[0027] Specifically, generally in a terminal device such as an Android device, it mainly includes firmware such as ROM Boot, First Boot, Boot, Kernel, and System. Wherein, ROM Boot is a firmware solidified inside the CPU chip and cannot be changed. After the CPU starts, Run the program in ROM Boot, load First Boot and run; First Boot is the first-level boot firmware, which is used to initialize CPU, memory and other devices, and load the next-level firmware such as Boot; Boot is generally a little kernel or uboot, responsible for Load Kernel; Kernel is the system kernel; System is the Android system. When the CPU starts, it starts from the ROM Boot in the CPU, and the ROM Boot will select the b...

Embodiment 2

[0044] Figure 2a A flow chart of a method for ensuring the security of POS machine firmware provided by the first embodiment of the present invention is shown, and the details are as follows:

[0045] Step S201, according to the CPU type, preset a loading mode corresponding to the CPU type.

[0046] Among them, the ROM Boot of different types of CPUs selects the boot medium to load the First Boot in different ways. For example, there is a type of CPU with a fuse configuration. This type of CPU selects the boot medium according to the fuse configuration inside the CPU. The fuse inside the CPU is a one-time configuration and cannot be changed after burning. There is a type of CPU that selects the boot medium according to the configuration of the boot pins. When the system is powered on, the boot medium is selected according to the status of certain external GPIOs. There is also a type of CPU that will try to load various boot media in turn. This type of CPU will try to load F...

Embodiment 3

[0058] image 3 A flow chart of a method for ensuring the security of POS machine firmware provided by the first embodiment of the present invention is shown, and the details are as follows:

[0059] Step S301, according to the CPU type, preset a loading mode corresponding to the CPU type.

[0060] Step S302, according to the loading method, select the embedded multimedia card eMMC boot medium to load the first-level boot firmware.

[0061] Step S303, setting the eMMC boot medium area of ​​the embedded multimedia card storing the first-level boot firmware as a permanent write-protected state.

[0062] In this embodiment, for the specific steps from step S301 to step S303, refer to step S201 to step S203 in the second embodiment, which will not be repeated here.

[0063] Step S304, after the first-level boot firmware runs, perform signature verification on the next-level firmware after the first-level boot firmware, and calculate the hash value of the next-level firmware.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of terminals, and provides a method and device for guaranteeing the security of POS machine firmware. The method includes the steps that according to the type of a CPU, a loading mode corresponding to the type of the CPU is preset, and according to the loading mode, first stage starting firmware is loaded by selecting an embedded multi-medium card e MMC starting medium. With the method, loading from other starting media capable of being connected with the exterior can be avoided; it is prevented that through the starting media, the firmware in a POS machine is replaced or tampered, and therefore it is guaranteed that the POS machine meets the requirement for security.

Description

technical field [0001] The invention belongs to the technical field of terminals, and in particular relates to a method, a device and a terminal device for ensuring the security of POS machine firmware. Background technique [0002] With the development of electronic payment technology, financial POS machine, as a sales terminal with non-cash settlement function, is widely used in supermarkets, chain stores, hypermarkets, restaurants and other places. The POS machine based on the Android system and smart phone hardware platform has good scalability and good user experience. Because it involves bank card transactions, there are high requirements for the security performance of the POS machine. It is necessary to ensure that the POS machine Important data such as keys are not stolen. [0003] In order to ensure the safety of the POS program (point of sale) in the POS machine and avoid criminals from locking the POS program, existing POS machine manufacturers use a secure CPU ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G07G1/00
CPCG06F21/575G07G1/0009G06Q20/206G06Q20/20G06F21/602
Inventor 叶展潜
Owner PAX COMP TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products