Firmware security authentication method, device and payment terminal
A technology of security authentication and firmware, which is applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of low POS security and easy switching of firmware, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] This embodiment provides a firmware security authentication method, which is suitable for POS, and the POS mainly includes a firmware file, a central processing unit (Central Processing Unit, CPU) and the like. The central processing unit may include a Fuse (fuse) area and a Flash (flash memory) area, but is not limited to including the Fuse area and the Flash area. Among them, the fuse area is a one-time program writing area, and subsequent modification is not allowed.
[0038] see figure 1 , an implementation flow of the firmware security authentication method is detailed as follows:
[0039] Step S101, acquiring the security level of the firmware file to be downloaded, and judging whether the security level of the firmware file to be downloaded satisfies a preset security level.
[0040] Each system file in the firmware file defines a corresponding security level variable, and the security level variable represents the security level of the firmware file. When the ...
Embodiment 2
[0074] Corresponding to the firmware security authentication method described in the first embodiment above, image 3 shows a structural block diagram of the firmware security authentication device in Embodiment 2 of the present invention. For ease of description, only the parts related to this embodiment are shown.
[0075] The device includes: a security level judging module 110 , a firmware downloading module 120 , a BOOT file starting module 130 and an OS file starting module 140 .
[0076] Wherein, the security level judging module 110 is used for obtaining the security level of the firmware file to be downloaded, and judging whether the security level of the firmware file to be downloaded satisfies a preset security level.
[0077] The firmware downloading module 120 is configured to download the firmware file when the security level of the firmware file to be downloaded meets the preset security level, wherein the firmware file includes a BOOT file or an OS file.
[0...
Embodiment 3
[0085] Figure 4 It is a schematic diagram of the payment terminal 100 provided by Embodiment 3 of the present invention. like Figure 4 As shown, the payment terminal 100 described in this embodiment includes: a processor 150, a memory 160, and a computer program 161 stored in the memory 160 and operable on the processor 150, such as a program of a firmware security authentication method . When the processor 150 executes the computer program 161, it implements the steps in the above-mentioned embodiments of each firmware security authentication method, for example figure 1 Steps S101 to S104 are shown. Alternatively, when the processor 150 executes the computer program 161, it realizes the functions of the modules / units in the above-mentioned device embodiments, for example image 3 The functions of modules 110 to 140 are shown.
[0086] Exemplarily, the computer program 161 can be divided into one or more modules / units, and the one or more modules / units are stored in th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


