Method and device for ensuring the security of pos machine firmware

A POS machine and firmware technology, which is applied in computer security devices, data processing applications, instruments, etc., can solve the problems of tampering of POS machine firmware and inability to guarantee the security requirements of POS machines, and achieve the effect of reducing costs.

Active Publication Date: 2020-04-03
PAX COMP TECH SHENZHEN
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a method, device and terminal equipment for ensuring the security of the POS machine firmware, so as to solve the problem that the use of a general-purpose CPU in the POS machine may easily cause the POS machine firmware to be tampered with, so that the security requirements of the POS machine cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for ensuring the security of pos machine firmware
  • Method and device for ensuring the security of pos machine firmware
  • Method and device for ensuring the security of pos machine firmware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 A flow chart of a method for ensuring the security of POS machine firmware provided by an embodiment of the present invention is shown, and the details are as follows:

[0026] Step S101, according to the CPU type, preset a loading mode corresponding to the CPU type.

[0027] Specifically, generally in a terminal device such as an Android device, it mainly includes firmware such as ROM Boot, First Boot, Boot, Kernel, and System. Wherein, ROM Boot is a firmware solidified inside the CPU chip and cannot be changed. After the CPU starts, Run the program in ROM Boot, load First Boot and run; First Boot is the first-level boot firmware, which is used to initialize CPU, memory and other devices, and load the next-level firmware such as Boot; Boot is generally a little kernel or uboot, responsible for Load Kernel; Kernel is the system kernel; System is the Android system. When the CPU starts, it starts from the ROM Boot in the CPU, and the ROM Boot will select the b...

Embodiment 2

[0044] Figure 2a A flow chart of a method for ensuring the security of POS machine firmware provided by the first embodiment of the present invention is shown, and the details are as follows:

[0045] Step S201, according to the CPU type, preset a loading mode corresponding to the CPU type.

[0046] Among them, the ROM Boot of different types of CPUs selects the boot medium to load the First Boot in different ways. For example, there is a type of CPU with a fuse configuration. This type of CPU selects the boot medium according to the fuse configuration inside the CPU. The fuse inside the CPU is a one-time configuration and cannot be changed after burning. There is a type of CPU that selects the boot medium according to the configuration of the boot pins. When the system is powered on, the boot medium is selected according to the status of certain external GPIOs. There is also a type of CPU that will try to load various boot media in turn. This type of CPU will try to load F...

Embodiment 3

[0058] image 3 A flow chart of a method for ensuring the security of POS machine firmware provided by the first embodiment of the present invention is shown, and the details are as follows:

[0059] Step S301, according to the CPU type, preset a loading mode corresponding to the CPU type.

[0060] Step S302, according to the loading method, select the embedded multimedia card eMMC boot medium to load the first-level boot firmware.

[0061] Step S303, setting the eMMC boot medium area of ​​the embedded multimedia card storing the first-level boot firmware as a permanent write-protected state.

[0062] In this embodiment, for the specific steps from step S301 to step S303, refer to step S201 to step S203 in the second embodiment, which will not be repeated here.

[0063] Step S304, after the first-level boot firmware runs, perform signature verification on the next-level firmware after the first-level boot firmware, and calculate the hash value of the next-level firmware.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is applicable to the field of terminal technology, and provides a method and device for ensuring the security of POS machine firmware, including: according to the CPU type, preset a loading mode corresponding to the CPU type, and select an embedded multimedia The card eMMC boot media loads the first-level boot firmware. The above method can avoid loading from other bootable media that can be connected to the outside, and prevent the firmware in the POS machine from being replaced or tampered with through the bootable media to ensure that the POS machine meets the security requirements.

Description

technical field [0001] The invention belongs to the technical field of terminals, and in particular relates to a method, a device and a terminal device for ensuring the security of POS machine firmware. Background technique [0002] With the development of electronic payment technology, financial POS machine, as a sales terminal with non-cash settlement function, is widely used in supermarkets, chain stores, hypermarkets, restaurants and other places. The POS machine based on the Android system and smart phone hardware platform has good scalability and good user experience. Because it involves bank card transactions, there are high requirements for the security performance of the POS machine. It is necessary to ensure that the POS machine Important data such as keys are not stolen. [0003] In order to ensure the safety of the POS program (point of sale) in the POS machine and avoid criminals from locking the POS program, existing POS machine manufacturers use a secure CPU ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G07G1/00
CPCG06F21/575G07G1/0009G06Q20/206G06Q20/20G06F21/602
Inventor 叶展潜
Owner PAX COMP TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products