POS machine safety verification method and device

A POS machine, security verification technology, applied in the direction of security communication devices, user identity/authority verification, instruments, etc., can solve the problem of unable to prevent the switching of the whole machine, so as to prevent illegal tampering and downloading, ensure safety, and prevent the switching of the whole machine Effect

Active Publication Date: 2017-12-12
SHENZHEN TRENDIT CO LTD
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The second is that the master key TMK in the POS machine cannot be illegally tampered with as the master key of other payment companies
This solution can prevent illegal applications from being downloaded to the POS machine, but it cannot prevent the whole machine from being switched. That is, the FLASH of the normal POS machine of agent A is copied, and then the FLASH is copied to the POS machine of agent B, and the agent B's POS device becomes agent A's device, and runs agent A's business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • POS machine safety verification method and device
  • POS machine safety verification method and device
  • POS machine safety verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "the", "above" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements, units, modules and / or components, but does not exclude the presence or addition of one or more other features, integers, steps, operations, elements, units, modules, components and / or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Additionally, "connected" or "coupled" as used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a POS machine safety verification method and device. An application program is started, downloaded and updated in a POS machine, the master key is changed, the permission of the operation is verified; the verification is passed, and then the corresponding operation is carried out; the verification is not passed, the operation is blocked. The safety of the master key and the application program in the POS machine is guaranteed, so that the master key and the application program in the POS machine are prevented from being illegally tampered and downloaded; and the POS machine is prevented from being switched by the whole machine.

Description

technical field [0001] The invention relates to the field of payment equipment, in particular to a POS machine security verification method and device. Background technique [0002] The POS terminal is shipped from the manufacturer to multiple third-party payment companies, and then distributed to various agents by different third-party payment companies. The agent deploys the POS terminal to the merchants according to the business. Each POS machine terminal corresponds to the business of the third-party payment company and has a unique correlation. [0003] However, the agents of third-party payment companies in the market have many instabilities, and there is a phenomenon of cutting off the POS terminal, that is, switching the POS terminal running the business of agent A to the business of agent B. It is possible to switch a large number of high-quality merchants from third-party payment company A to third-party payment company B, resulting in the illegal transfer of thir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G07G1/00G07G1/12
CPCG07G1/0009G07G1/12H04L9/3236H04L9/3247
Inventor 胡剑文
Owner SHENZHEN TRENDIT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products