Unlock instant, AI-driven research and patent intelligence for your innovation.

Firmware security authentication method, device and payment terminal

A technology of security authentication and firmware, which is applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of low POS security and easy switching of firmware, and achieve the effect of improving security

Active Publication Date: 2019-03-22
PAX COMP TECH SHENZHEN
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides a firmware security authentication method, device and payment terminal to solve the problem in the prior art that the firmware in the POS is easily switched, making the POS security low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firmware security authentication method, device and payment terminal
  • Firmware security authentication method, device and payment terminal
  • Firmware security authentication method, device and payment terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment provides a firmware security authentication method, which is suitable for POS, and the POS mainly includes a firmware file, a central processing unit (Central Processing Unit, CPU) and the like. The central processing unit may include a Fuse (fuse) area and a Flash (flash memory) area, but is not limited to including the Fuse area and the Flash area. Among them, the fuse area is a one-time program writing area, and subsequent modification is not allowed.

[0038] see figure 1 , an implementation flow of the firmware security authentication method is detailed as follows:

[0039] Step S101, acquiring the security level of the firmware file to be downloaded, and judging whether the security level of the firmware file to be downloaded satisfies a preset security level.

[0040] Each system file in the firmware file defines a corresponding security level variable, and the security level variable represents the security level of the firmware file. When the ...

Embodiment 2

[0074] Corresponding to the firmware security authentication method described in the first embodiment above, image 3 shows a structural block diagram of the firmware security authentication device in Embodiment 2 of the present invention. For ease of description, only the parts related to this embodiment are shown.

[0075] The device includes: a security level judging module 110 , a firmware downloading module 120 , a BOOT file starting module 130 and an OS file starting module 140 .

[0076] Wherein, the security level judging module 110 is used for obtaining the security level of the firmware file to be downloaded, and judging whether the security level of the firmware file to be downloaded satisfies a preset security level.

[0077] The firmware downloading module 120 is configured to download the firmware file when the security level of the firmware file to be downloaded meets the preset security level, wherein the firmware file includes a BOOT file or an OS file.

[0...

Embodiment 3

[0085] Figure 4 It is a schematic diagram of the payment terminal 100 provided by Embodiment 3 of the present invention. like Figure 4 As shown, the payment terminal 100 described in this embodiment includes: a processor 150, a memory 160, and a computer program 161 stored in the memory 160 and operable on the processor 150, such as a program of a firmware security authentication method . When the processor 150 executes the computer program 161, it implements the steps in the above-mentioned embodiments of each firmware security authentication method, for example figure 1 Steps S101 to S104 are shown. Alternatively, when the processor 150 executes the computer program 161, it realizes the functions of the modules / units in the above-mentioned device embodiments, for example image 3 The functions of modules 110 to 140 are shown.

[0086] Exemplarily, the computer program 161 can be divided into one or more modules / units, and the one or more modules / units are stored in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of terminal processing, and provides a firmware security authentication method, a device and a payment terminal. The method comprises the following steps: acquiring a security level of a firmware file to be downloaded, and judging whether the security level of the firmware file to be downloaded satisfies a preset security level; When the securitylevel of the firmware file to be downloaded meets the preset security level, downloading the firmware file, wherein the firmware file comprises a BOOT file or an OS file; Starting the BOOT file to obtain the security level of the BOOT file; Judging whether the security level of the OS file meets the security level of the BOOT file, and starting the OS file according to the BOOT file if the security level of the BOOT file meets the security level. The invention can ensure that the firmware file can be switched from the low version to the high version and cannot be retracted from the high version to the low version, thereby avoiding the firmware file from being tampered with and improving the safety of the system.

Description

technical field [0001] The invention belongs to the technical field of terminal processing, and in particular relates to a firmware security authentication method, device and payment terminal. Background technique [0002] As everyone develops the habit of swiping cards, POS (Point Of Sale, payment terminal) has been used more and more widely. At the same time, more and more people have started to study POS and use the loopholes of POS to obtain illegal benefits. In order to improve the security of the entire POS, China UnionPay proposed an authorization scheme. Due to the addition of authorized functions, it brings high costs for after-sales maintenance, debugging and repair when upgrading software, and some customers will choose non-authorized software. Since non-authorized software and authorized software coexist for a long time, illegal personnel are provided with a switch The possibility of firmware reduces the security of POS. Contents of the invention [0003] In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/57
CPCG06F21/51G06F21/572
Inventor 刘绍海李坚强
Owner PAX COMP TECH SHENZHEN