[go: up one dir, main page]

WO2017197796A1 - Method for protecting pos machine from being refitted and being implant with trojan program for information stealing - Google Patents

Method for protecting pos machine from being refitted and being implant with trojan program for information stealing Download PDF

Info

Publication number
WO2017197796A1
WO2017197796A1 PCT/CN2016/094787 CN2016094787W WO2017197796A1 WO 2017197796 A1 WO2017197796 A1 WO 2017197796A1 CN 2016094787 W CN2016094787 W CN 2016094787W WO 2017197796 A1 WO2017197796 A1 WO 2017197796A1
Authority
WO
WIPO (PCT)
Prior art keywords
power consumption
pos machine
pos
main power
power supply
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/094787
Other languages
French (fr)
Chinese (zh)
Inventor
蒋美琼
林魁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Landi Commercial Equipment Co Ltd filed Critical Fujian Landi Commercial Equipment Co Ltd
Publication of WO2017197796A1 publication Critical patent/WO2017197796A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R21/00Arrangements for measuring electric power or power factor
    • G01R21/06Arrangements for measuring electric power or power factor by measuring current and voltage

Definitions

  • the invention relates to the field of electronic payment, in particular to a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information.
  • POS POS
  • the security of traditional POS devices is directly related to the security of the credit card holders.
  • the crimes of pirating or implanting Trojan viruses in the event of criminals stealing card numbers and passwords occur.
  • the security performance of POS is challenged.
  • most of the security methods of POS use the loop signal change of the detection security circuit to judge whether the abnormality is abnormal, and the criminals can bypass the detection mechanism in various ways.
  • the object of the present invention is to provide a method for preventing the POS machine from being modified and implanting a Trojan to steal information by solving the above-mentioned document.
  • the method uses real-time monitoring of power consumption and rated power consumption to identify whether there is abnormal monitoring.
  • the existence of stolen information can effectively prevent the abnormal working state of the POS machine.
  • the technical solution of the present invention is: a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information, including the following steps,
  • step S3 according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3;
  • step S4 Comparing the power consumption of the main power source monitored in real time in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm; if not, re-executing step S3.
  • step S1 real-time monitoring of main power consumption is divided into power consumption monitoring mode and efficiency monitoring mode according to different main power supply modes of the POS machine, wherein the POS main power supply adopts an adapter.
  • the power consumption monitoring mode is adopted to perform real-time monitoring of the power consumption of the POS main power supply; if the main power supply of the POS machine adopts the battery power supply mode, the efficiency monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine.
  • the power consumption monitoring method calculates the current value at both ends of the test resistor r by detecting the voltage Vab across the test resistor r connected to the POS adapter and the post-stage load of the POS machine.
  • the power consumption of the POS main power supply can be obtained.
  • the efficiency monitoring mode is: first, the pre-stage detection resistor r1 is connected between the POS battery and the POS power conversion module, and the POS power conversion module is connected to the post-stage load of the POS machine.
  • the latter detection resistor r2 detects the voltage V1 across the front-end detection resistor r1 and the voltage V2 across the second-stage detection resistor r2, respectively, and obtains the power consumption of the previous stage. And subsequent power consumption You can get the conversion efficiency of the front and the back
  • the power consumption value of the main power source in each action of the POS machine is written into the lower layer software, that is, the power consumption value of the main power source in the single action of the POS machine is written into the lower layer software, and the power consumption value is When writing to the underlying software, the power consumption is written in a time-division manner.
  • the method for writing the power consumption in a time-division manner is to divide the time period of the single action of the POS machine, and write the main power consumption value under the single action of the POS machine in the corresponding time period.
  • the POS operation response that is, when the POS performs an operation, sends an operation instruction to the POS operating system, and if the POS operating system recognizes the operation instruction as an abnormal instruction, the POS If the POS machine operating system recognizes that the operation instruction is a normal instruction, it continues to judge that the operation instruction includes an action number, and then reads the total power consumption value corresponding to the operation by the underlying software, and returns to the POS operation. system.
  • a hidden pad and a main power blind hole inner layer routing mode for the main power source it is also necessary to use a hidden pad and a main power blind hole inner layer routing mode for the main power source to prevent the implanted module from directly supplying power from the front end of the main power source.
  • the alarm in step S4 includes: the buzzer continues to beep, the liquid crystal display attacks, and the background locks the POS machine to make it impossible to trade.
  • the present invention Compared with the prior art, the present invention has the following beneficial effects: the present invention uses a real-time monitoring method of comparing the power consumption of the power source with the rated power consumption to identify whether there is abnormal monitoring and stealing information, and can effectively prevent the abnormal working state of the POS machine. In order to effectively prevent POS from being modified or implanted in Trojans to steal relevant information.
  • FIG. 1 is a schematic diagram of a connection structure of a main power interface used in the present invention.
  • 1 is a power interface
  • 2 is a solder joint
  • 3 is a PCB board.
  • FIG. 2 is a schematic diagram of a power consumption monitoring mode circuit used in the present invention.
  • FIG. 3 is a schematic diagram of the circuit of the efficiency monitoring mode adopted by the present invention.
  • FIG. 4 is a flow chart of the pre-registration of the power consumption value writing software of the present invention.
  • FIG. 5 is a simplified flow chart of the software when the POS is operated according to the present invention.
  • FIG. 6 is a flow chart of real-time comparison and reduction of power consumption preset current and detection current according to the present invention.
  • a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information includes the following steps:
  • step S3 according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3;
  • step S4 comparing the main power consumption of the real-time monitoring in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm (including: buzzer continuous tweet, liquid crystal display) The attack and the background lock the POS machine so that it cannot be traded.); if not, re-execute step S3.
  • the power consumption of the main power source is monitored in real time, and the power consumption monitoring mode and the efficiency monitoring mode are respectively classified according to different power supply modes of the POS machine, wherein the power consumption monitoring is adopted when the main power of the POS machine adopts the adapter power supply mode.
  • the method performs real-time monitoring of the power consumption of the POS main power supply; if the main power supply of the POS machine adopts the battery power supply mode, the efficiency monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine.
  • the power consumption monitoring method is to calculate the current value at both ends of the test resistor r by detecting the voltage Vab across the test resistor r connected to the POS adapter and the post-stage load of the POS machine.
  • the power consumption of the POS main power supply can be obtained.
  • the efficiency monitoring method is: first, the pre-stage detecting resistor r1 is connected between the POS battery and the POS power conversion module, and the post-stage detecting resistor r2 is connected between the POS machine power conversion module and the post-stage load of the POS machine, respectively detecting The pre-stage detection resistor r1 voltage V1, the second-stage detection resistor r2 voltage V2, the pre-stage power consumption And subsequent power consumption You can get the conversion efficiency of the front and the back
  • the main power consumption value of each action of the POS machine is written into the underlying software, that is, the main power consumption value of the POS machine under single action is written into the underlying software, and when the power consumption value is written into the underlying software, the work is taken.
  • the method of writing the power consumption in a time-division manner is to divide the time period of the single action of the POS machine for the time period, and write the main power consumption value under the single action of the POS machine in the corresponding time period.
  • the POS operation response that is, when the POS performs an operation, it needs to send an operation instruction to the POS operating system. If the POS machine operating system recognizes that the operation instruction is an abnormal instruction, the POS does not operate, and if the POS machine operates The system recognizes that the operation instruction is a normal instruction, and then continues to determine that the operation instruction includes an action number, and then reads the total power consumption value corresponding to the operation by the underlying software, and returns to the POS operating system.
  • the method for preventing the POS machine from being modified and implanting a Trojan horse to steal information includes the following contents:
  • the main power consumption is measured by real-time monitoring.
  • the monitoring methods are divided into power consumption monitoring and efficiency monitoring.
  • Real-time monitoring compares the detected value with the declared value to determine whether the POS has abnormal monitoring power consumption (efficiency);
  • the alarm mode can be adopted: buzzer buzzer, liquid crystal display, background lock, etc.
  • the main power supply interface is currently connected to the circuit board by means of through-hole pads and surface-mount visible pads.
  • the required power can be obtained directly from the visible solder joints.
  • the Vietnamese interface pad method prevents the main power supply from being directly detected at the pad.
  • Hidden interface pads can be used in a variety of ways, such as BGA package, original cover pad, pad blind hole, etc., as shown in Figure 1, where the solder joint is under the main power interface, directly covered by the interface, the interface The power supply is difficult to detect and take out. When the pad is hidden, the main power supply is routed from the inner layer to prevent the secant mode from acquiring the main power signal.
  • Power consumption is the product of power supply voltage and current. This patent aims to judge whether the device is working abnormally by monitoring the actual power consumption and theoretical power consumption. Therefore, it is necessary to detect the voltage and current values in real time.
  • the POS main power system is divided into two main types: adapter power supply and battery power supply. When the adapter is powered, the mains voltage is constant, and when the power consumption is detected, only the current can be detected. When the battery is powered, the main power supply voltage changes with the battery power. Only detecting the power consumption of the main power supply terminal cannot correctly determine whether it meets the theoretical requirements. Therefore, this patent proposes a way to compare the power consumption efficiency, in short. In order to detect the voltage and current of the front and rear stages, a comparison of power conversion efficiency is performed.
  • the power consumption monitoring of the power supply needs to be real-time monitoring.
  • the specific method of power consumption monitoring depends on the condition of the device itself, and can be implemented in various ways.
  • the detection resistance method, the Hall sensor, the optocoupler isolation amplifier, the capacitive isolation amplifier, etc. the simpler monitoring method is to determine the magnitude of the monitored current by detecting the voltage across the precision resistor.
  • This patent introduces the detection method of the adapter power supply and voltage power supply mode in the most basic way.
  • FIG. 2 is a simplified diagram of a circuit (in Figure 2, 1 is the adapter power supply, 2 is the voltage detection), r represents the test resistance in the access circuit, Rload is the load of the entire power system, and A of the detection resistor r B can detect the voltage Vab across r at two points, and the current value can be calculated.
  • the detection of the Vab voltage needs to be real-time detection. After the voltage is collected, the software in the description of the third point is calculated, and compared with the preset value I of the driving theory in the description of the third point, it can be determined whether the POS device has an abnormality. Modification and intrusion.
  • the power supply voltage of a battery-powered device changes with the change of power.
  • the power consumption of the detection mode in the adapter power supply cannot be accurately compared with the theoretical value.
  • a new way is proposed for real-time power consumption.
  • conversion efficiency detection simplified block diagram Figure 3 battery-powered power system thumbnail diagram ( Figure 3, 1, 2 for voltage detection, r1 for pre-stage detection resistor, r2 for post-stage detection resistor, Rload for post-stage load , Battery represents the main power supply for the battery).
  • the voltage In the actual power supply design system, if the main power supply is to be supplied to each module of the device, the voltage must be converted into a voltage that can be used by the module chip through the power conversion system. At this time, there is a problem of conversion efficiency.
  • the conversion efficiency is the same as the power consumption at the beginning of the hardware circuit design. When the voltage changes, the conversion efficiency changes accordingly. Therefore, the power consumption of the pre-stage and the post-stage is detected by software operation. Whether the efficiency is abnormal or not, and then determine whether the POS is working abnormally.
  • the voltage V1 of the two points A and B and the resistance value of the detecting resistor r1 are obtained, and the power consumption P1 of the previous stage can be obtained, and the data of the voltage V2 of the two points C and D and the resistance of the detecting resistor r2 are detected.
  • the convertible power consumption P2, the ratio of P1 to P2 can give the efficiency at the corresponding time.
  • Power consumption is an important indicator of a device.
  • the power consumption value of each action is fixed.
  • the actual power consumption detection method has been proposed. After the actual power consumption detection is completed, the data needs to be compared with the theoretical value to determine whether the device is abnormal.
  • the theoretical power consumption registration is the main power supply under each action. Power consumption (efficiency) is written into the underlying software.
  • the POS wants to perform an action, it issues an operation command to the OS, calls the corresponding power consumption value, returns the data, and performs a comparison operation.
  • This power (efficiency) registration consists of two parts: (1) writing the power consumption value to the underlying software; and (2) the response of the POS operation.
  • Power consumption value write The power consumption value of Figure 4 is written into the software pre-registration flow chart.
  • the method first writes the power consumption value of a single operation.
  • the power consumption is a superposition of two operations, for example, Bluetooth communication while printing, if the power consumption of printing is P1, the power consumption of Bluetooth communication For P2, the power consumption of the main power supply is added: P1+P2, adopting the registration mode of single-operation module power consumption, when the POS performs corresponding operations, the underlying software can accurately return the total power consumption value, and description 2
  • the measured values in the comparison are performed.
  • the power consumption value is written into the underlying software
  • the power consumption is divided into time slots. For example, the power consumption of printing is written.
  • the duration of the entire printing is 10S
  • time-phased writing can refine the entire power consumption stage and improve the accuracy of the monitoring system.
  • the power consumption value is written into the underlying software, which can effectively avoid the data change caused by the invasion of the Trojan virus. If power consumption data is written to the application layer, the Trojan virus program can have the opportunity to tamper with the data and process to disable the monitoring system.
  • the integration is applied to the OS in the entire software system, and the pre-registration of the theoretical power consumption value can be realized.
  • the command recognition portion first discriminates the operation command, whether it is an abnormal command, and the device does not respond when it is determined that the command is abnormal. Secondly, it is judged which operations are included in the operation instruction, and the corresponding signals of each operation are sent to the underlying software to read the total power consumption, and the returned power consumption data is the maximum power consumption of the time division.
  • the operating system After the operating system receives the returned data, it compares the actual collected data with the theoretical data in the underlying software (the specific process is described in detail in the description of point 4), and the alarm mechanism is executed when the abnormality is compared.
  • the real-time current value of the main power source can be obtained.
  • the theoretical operating current value can be obtained. Comparing the real-time current value with the theoretical value, it can be known whether there is abnormal power consumption, and whether the device is modified. Or implant a Trojan.
  • the real-time comparison determination process is shown in Figure 6.
  • the real-time comparison and reduction flow chart of the power consumption preset current and the detection current is shown.
  • the alarm mode can be adopted: buzzer alarm, liquid crystal display alarm, background lock cannot be operated, etc.
  • Embodiment 1 hidden pad and blind hole inner layer trace
  • the main power supply adopts the hidden pad and the inner power blind hole inner layer routing mode to prevent the implanted module from being directly powered by the main power supply front end.
  • the monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm.
  • Alarm mode The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.
  • Embodiment 2 main power supply current and voltage monitoring
  • the monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.
  • Embodiment 3 main power supply current and NTC monitoring (for battery equipment)
  • the NTC battery temperature monitoring
  • the POS device When the POS device sends an operation signal, it reports to the OS (system) (extracts the registered current and NTC value);
  • the monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Tests Of Electric Status Of Batteries (AREA)
  • Power Sources (AREA)

Abstract

Provided is a method for protecting a POS machine from being refitted and being provided with a Trojan program for information stealing. The method comprises the steps of: firstly, monitoring the power consumption of a main power supply in real time; secondly, carrying out theoretical power consumption registration and response, including enabling the power consumption values of the main power supply under all operations of the POS machine to be written in a bottom software, and carrying out response during the operations of the POS machine; and finally, judging whether the POS machine is abnormal or not according to the comparison of the power consumption, monitored in real time, of the main power supply and the theoretical power consumption, giving an alarm if the POS machine has an abnormality twice in succession, or else, carrying out the new comparison of the power consumption, monitored in real time, of the main power supply and the theoretical power consumption. The method employs a mode of the comparison of the power consumption, monitored in real time, of the main power supply and the theoretical power consumption, so as to recognize whether there is abnormal monitoring and information stealing or not. The method can effectively prevent the POS machine from working in an abnormal state.

Description

一种防止POS机被改装、植入木马程序盗取信息的方法Method for preventing POS machine from being modified and implanting Trojan to steal information 技术领域Technical field

本发明涉及电子支付领域,具体为一种防止POS机被改装、植入木马程序盗取信息的方法。The invention relates to the field of electronic payment, in particular to a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information.

背景技术Background technique

传统POS设备的安全直接关系到刷卡者的财产安全,犯罪分子为盗取卡号和密码对POS进行改装或植入木马病毒的事件时有发生,POS的安全性能面临挑战。目前POS的安全方式大多采用检测安全电路的环路信号变化来判断是否异常,犯罪分子可通过多种方式绕过此检测机制。The security of traditional POS devices is directly related to the security of the credit card holders. The crimes of pirating or implanting Trojan viruses in the event of criminals stealing card numbers and passwords occur. The security performance of POS is challenged. At present, most of the security methods of POS use the loop signal change of the detection security circuit to judge whether the abnormality is abnormal, and the criminals can bypass the detection mechanism in various ways.

发明内容Summary of the invention

本发明的目的在于提供解决上述文件的一种防止POS机被改装、植入木马程序盗取信息的方法,该方法采用实时监测电源功耗与额定功耗对比的方式,来识别是否有异常监听盗取信息的存在,可有效预防POS机异常工作状态。The object of the present invention is to provide a method for preventing the POS machine from being modified and implanting a Trojan to steal information by solving the above-mentioned document. The method uses real-time monitoring of power consumption and rated power consumption to identify whether there is abnormal monitoring. The existence of stolen information can effectively prevent the abnormal working state of the POS machine.

为实现上述目的,本发明的技术方案是:一种防止POS机被改装、植入木马程序盗取信息的方法,包括如下步骤,In order to achieve the above object, the technical solution of the present invention is: a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information, including the following steps,

S1:实时监测主电源功耗;S1: Real-time monitoring of main power consumption;

S2:理论功耗登记注册及响应,包括将POS机各个动作下的主电源功耗值写入底层软件中以及POS机操作时的响应;S2: The theoretical power consumption registration and response, including the main power consumption value of each action of the POS machine is written into the underlying software and the response of the POS operation;

S3:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则执行步骤S4,若否,则重新执行步骤S3;S3: according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3;

S4:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则判定POS机发生异常,进行报警;若否,则重新执行步骤S3。S4: Comparing the power consumption of the main power source monitored in real time in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm; if not, re-executing step S3.

在本发明一实施例中,所述步骤S1中,实时监测主电源功耗,根据POS机主电源供电方式不同,分为功耗监测方式和效率监测方式,其中,POS机主电源若采用适配器供电方式,则采用功耗监测方式进行POS机主电源功耗实时监测;若POS机主电源若采用电池供电方式,则采用效率监测方式进行POS机主电源功耗实时监测。In an embodiment of the present invention, in step S1, real-time monitoring of main power consumption is divided into power consumption monitoring mode and efficiency monitoring mode according to different main power supply modes of the POS machine, wherein the POS main power supply adopts an adapter. In the power supply mode, the power consumption monitoring mode is adopted to perform real-time monitoring of the power consumption of the POS main power supply; if the main power supply of the POS machine adopts the battery power supply mode, the efficiency monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine.

在本发明一实施例中,所述功耗监测方式即,通过检测接入POS机适配器 与POS机后级负载的测试电阻r两端的电压Vab,计算出测试电阻r两端的电流值

Figure PCTCN2016094787-appb-000001
即可得出POS机主电源功耗。In an embodiment of the present invention, the power consumption monitoring method calculates the current value at both ends of the test resistor r by detecting the voltage Vab across the test resistor r connected to the POS adapter and the post-stage load of the POS machine.
Figure PCTCN2016094787-appb-000001
The power consumption of the POS main power supply can be obtained.

在本发明一实施例中,所述效率监测方式即,首先,在POS机电池与POS机电源转换模块之间接入前级检测电阻r1,POS机电源转换模块与POS机后级负载之间接入后级检测电阻r2,分别检测前级检测电阻r1两端电压V1、后级检测电阻r2两端电压V2,得出前级功耗

Figure PCTCN2016094787-appb-000002
及后级功耗
Figure PCTCN2016094787-appb-000003
即可得前级与后级的转换效率
Figure PCTCN2016094787-appb-000004
In an embodiment of the present invention, the efficiency monitoring mode is: first, the pre-stage detection resistor r1 is connected between the POS battery and the POS power conversion module, and the POS power conversion module is connected to the post-stage load of the POS machine. The latter detection resistor r2 detects the voltage V1 across the front-end detection resistor r1 and the voltage V2 across the second-stage detection resistor r2, respectively, and obtains the power consumption of the previous stage.
Figure PCTCN2016094787-appb-000002
And subsequent power consumption
Figure PCTCN2016094787-appb-000003
You can get the conversion efficiency of the front and the back
Figure PCTCN2016094787-appb-000004

在本发明一实施例中,所述将POS机各个动作下的主电源功耗值写入底层软件,即将POS机单动作下的主电源功耗值写入底层软件中,且在功耗值写入底层软件时,采取功耗分时段写入的方式。In an embodiment of the invention, the power consumption value of the main power source in each action of the POS machine is written into the lower layer software, that is, the power consumption value of the main power source in the single action of the POS machine is written into the lower layer software, and the power consumption value is When writing to the underlying software, the power consumption is written in a time-division manner.

在本发明一实施例中,所述功耗分时段写入的方式,即将POS机单动作持续的时间进行时间段分割,进行对应时间段POS机单动作下的主电源功耗值写入。In an embodiment of the invention, the method for writing the power consumption in a time-division manner is to divide the time period of the single action of the POS machine, and write the main power consumption value under the single action of the POS machine in the corresponding time period.

在本发明一实施例中,所述POS机操作时的响应,即POS执行一项操作时,需向POS机操作系统发送操作指令,若POS机操作系统识别该操作指令为异常指令,则POS不进行动作,若POS机操作系统识别该操作指令为正常指令,则继续判断该操作指令包括动作数,进而通过底层软件读取该操作对应的主电源总功耗值,并返回至POS机操作系统。In an embodiment of the present invention, the POS operation response, that is, when the POS performs an operation, sends an operation instruction to the POS operating system, and if the POS operating system recognizes the operation instruction as an abnormal instruction, the POS If the POS machine operating system recognizes that the operation instruction is a normal instruction, it continues to judge that the operation instruction includes an action number, and then reads the total power consumption value corresponding to the operation by the underlying software, and returns to the POS operation. system.

在本发明一实施例中,还需对主电源采用隐藏式焊盘及主电源盲孔内层走线方式,以防止植入模块直接由主电源前端供电。In an embodiment of the invention, it is also necessary to use a hidden pad and a main power blind hole inner layer routing mode for the main power source to prevent the implanted module from directly supplying power from the front end of the main power source.

在本发明一实施例中,步骤S4中的报警包括:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS机进行锁定使其无法交易。In an embodiment of the invention, the alarm in step S4 includes: the buzzer continues to beep, the liquid crystal display attacks, and the background locks the POS machine to make it impossible to trade.

相较于现有技术,本发明具有以下有益效果:本发明采用实时监测电源功耗与额定功耗对比的方式,来识别是否有异常监听盗取信息的存在,可有效预防POS机异常工作状态,进而有效防止POS被改装或植入木马程序盗取相关信息。Compared with the prior art, the present invention has the following beneficial effects: the present invention uses a real-time monitoring method of comparing the power consumption of the power source with the rated power consumption to identify whether there is abnormal monitoring and stealing information, and can effectively prevent the abnormal working state of the POS machine. In order to effectively prevent POS from being modified or implanted in Trojans to steal relevant information.

附图说明DRAWINGS

图1为本发明采用的主电源接口连接结构示意图,图中,1为电源接口,2为焊点,3为PCB板。 FIG. 1 is a schematic diagram of a connection structure of a main power interface used in the present invention. In the figure, 1 is a power interface, 2 is a solder joint, and 3 is a PCB board.

图2为本发明采用的功耗监测方式电路原理图。2 is a schematic diagram of a power consumption monitoring mode circuit used in the present invention.

图3为本发明采用的效率监测方式电路原理图。FIG. 3 is a schematic diagram of the circuit of the efficiency monitoring mode adopted by the present invention.

图4为本发明功耗值写入软件预登记的流程图。4 is a flow chart of the pre-registration of the power consumption value writing software of the present invention.

图5为本发明POS进行操作时软件的简易流程图。FIG. 5 is a simplified flow chart of the software when the POS is operated according to the present invention.

图6为本发明功耗预设电流与检测电流的实时对比简缩流程图。FIG. 6 is a flow chart of real-time comparison and reduction of power consumption preset current and detection current according to the present invention.

具体实施方式detailed description

下面结合附图,对本发明的技术方案进行具体说明。The technical solution of the present invention will be specifically described below with reference to the accompanying drawings.

本发明的一种防止POS机被改装、植入木马程序盗取信息的方法,包括如下步骤,A method for preventing a POS machine from being modified and implanting a Trojan horse to steal information includes the following steps:

S1:实时监测主电源功耗;S1: Real-time monitoring of main power consumption;

S2:理论功耗登记注册及响应,包括将POS机各个动作下的主电源功耗值写入底层软件中以及POS机操作时的响应;S2: The theoretical power consumption registration and response, including the main power consumption value of each action of the POS machine is written into the underlying software and the response of the POS operation;

S3:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则执行步骤S4,若否,则重新执行步骤S3;S3: according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3;

S4:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则判定POS机发生异常,进行报警(包括:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS机进行锁定使其无法交易。);若否,则重新执行步骤S3。S4: comparing the main power consumption of the real-time monitoring in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm (including: buzzer continuous tweet, liquid crystal display) The attack and the background lock the POS machine so that it cannot be traded.); if not, re-execute step S3.

所述步骤S1中,实时监测主电源功耗,根据POS机主电源供电方式不同,分为功耗监测方式和效率监测方式,其中,POS机主电源若采用适配器供电方式,则采用功耗监测方式进行POS机主电源功耗实时监测;若POS机主电源若采用电池供电方式,则采用效率监测方式进行POS机主电源功耗实时监测。In the step S1, the power consumption of the main power source is monitored in real time, and the power consumption monitoring mode and the efficiency monitoring mode are respectively classified according to different power supply modes of the POS machine, wherein the power consumption monitoring is adopted when the main power of the POS machine adopts the adapter power supply mode. The method performs real-time monitoring of the power consumption of the POS main power supply; if the main power supply of the POS machine adopts the battery power supply mode, the efficiency monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine.

所述功耗监测方式即,通过检测接入POS机适配器与POS机后级负载的测试电阻r两端的电压Vab,计算出测试电阻r两端的电流值

Figure PCTCN2016094787-appb-000005
即可得出POS机主电源功耗。The power consumption monitoring method is to calculate the current value at both ends of the test resistor r by detecting the voltage Vab across the test resistor r connected to the POS adapter and the post-stage load of the POS machine.
Figure PCTCN2016094787-appb-000005
The power consumption of the POS main power supply can be obtained.

所述效率监测方式即,首先,在POS机电池与POS机电源转换模块之间接入前级检测电阻r1,POS机电源转换模块与POS机后级负载之间接入后级检测电阻r2,分别检测前级检测电阻r1两端电压V1、后级检测电阻r2两端电压V2, 得出前级功耗

Figure PCTCN2016094787-appb-000006
及后级功耗
Figure PCTCN2016094787-appb-000007
即可得前级与后级的转换效率
Figure PCTCN2016094787-appb-000008
The efficiency monitoring method is: first, the pre-stage detecting resistor r1 is connected between the POS battery and the POS power conversion module, and the post-stage detecting resistor r2 is connected between the POS machine power conversion module and the post-stage load of the POS machine, respectively detecting The pre-stage detection resistor r1 voltage V1, the second-stage detection resistor r2 voltage V2, the pre-stage power consumption
Figure PCTCN2016094787-appb-000006
And subsequent power consumption
Figure PCTCN2016094787-appb-000007
You can get the conversion efficiency of the front and the back
Figure PCTCN2016094787-appb-000008

所述将POS机各个动作下的主电源功耗值写入底层软件,即将POS机单动作下的主电源功耗值写入底层软件中,且在功耗值写入底层软件时,采取功耗分时段写入的方式。所述功耗分时段写入的方式,即将POS机单动作持续的时间进行时间段分割,进行对应时间段POS机单动作下的主电源功耗值写入。The main power consumption value of each action of the POS machine is written into the underlying software, that is, the main power consumption value of the POS machine under single action is written into the underlying software, and when the power consumption value is written into the underlying software, the work is taken. The way the time period is written. The method of writing the power consumption in a time-division manner is to divide the time period of the single action of the POS machine for the time period, and write the main power consumption value under the single action of the POS machine in the corresponding time period.

所述POS机操作时的响应,即POS执行一项操作时,需向POS机操作系统发送操作指令,若POS机操作系统识别该操作指令为异常指令,则POS不进行动作,若POS机操作系统识别该操作指令为正常指令,则继续判断该操作指令包括动作数,进而通过底层软件读取该操作对应的主电源总功耗值,并返回至POS机操作系统。The POS operation response, that is, when the POS performs an operation, it needs to send an operation instruction to the POS operating system. If the POS machine operating system recognizes that the operation instruction is an abnormal instruction, the POS does not operate, and if the POS machine operates The system recognizes that the operation instruction is a normal instruction, and then continues to determine that the operation instruction includes an action number, and then reads the total power consumption value corresponding to the operation by the underlying software, and returns to the POS operating system.

还需对主电源采用隐藏式焊盘及主电源盲孔内层走线方式,以防止植入模块直接由主电源前端供电。It is also necessary to use a hidden pad and a main power blind via inner wiring to prevent the implanted module from being directly powered by the main power supply front end.

以下为本发明的具体实现过程。The following is a specific implementation process of the present invention.

本发明的防止POS机被改装、植入木马程序盗取信息的方法,包括如下内容:The method for preventing the POS machine from being modified and implanting a Trojan horse to steal information includes the following contents:

1、采取隐藏式焊盘及盲孔走线方式,规避POS机的改装植入点;1. Adopt hidden pad and blind hole routing mode to avoid the modified implantation point of POS machine;

2、主电源功耗采用实时监测的方式,监测的方式分为功耗监测、效率监测。2. The main power consumption is measured by real-time monitoring. The monitoring methods are divided into power consumption monitoring and efficiency monitoring.

3、对各个模块动作的功耗(效率)进行软件登记注册,POS要进行实际动作时必须向系统申报。3. Software registration for the power consumption (efficiency) of each module action, the POS must report to the system when performing actual actions.

4、实时监测的同时将检测值与申报值进行对比,判断是否POS存在异常监听功耗(效率);4. Real-time monitoring compares the detected value with the declared value to determine whether the POS has abnormal monitoring power consumption (efficiency);

5、连续出现两次4中的实时对比异常,POS报警;5, two consecutive real-time comparison abnormalities in 4, POS alarm;

6、报警方式可采取:蜂鸣器鸣叫、液晶显示、后台锁定等方式。6. The alarm mode can be adopted: buzzer buzzer, liquid crystal display, background lock, etc.

具体如下:details as follows:

1、隐藏式接口焊盘及盲孔走线:1, hidden interface pads and blind hole routing:

主电源的接口目前采取的方式均以通孔焊盘、表贴式可见焊盘的方式连接至电路板中,要改装POS植入新模块即可直接从可见焊点获取所需电源,使用隐 藏式接口焊盘方式可避免主电源在焊盘处被直接探测引出。隐藏接口焊盘可采用多种方式,例如BGA封装、原件覆盖焊盘、焊盘为盲孔等方式,如图1所示,其中,焊点在主电源接口下,被接口直接覆盖,接口处电源便难以探测接出。焊盘隐藏的同时主电源从内层走线,可防止采取割线方式获取主电源信号。The main power supply interface is currently connected to the circuit board by means of through-hole pads and surface-mount visible pads. To modify the POS to implant a new module, the required power can be obtained directly from the visible solder joints. The Tibetan interface pad method prevents the main power supply from being directly detected at the pad. Hidden interface pads can be used in a variety of ways, such as BGA package, original cover pad, pad blind hole, etc., as shown in Figure 1, where the solder joint is under the main power interface, directly covered by the interface, the interface The power supply is difficult to detect and take out. When the pad is hidden, the main power supply is routed from the inner layer to prevent the secant mode from acquiring the main power signal.

2、实时监测主电源功耗:2. Real-time monitoring of main power consumption:

功耗是电源电压与电流的乘积,本专利旨在通过监测实际的电源功耗与理论功耗对比判断设备是否工作异常,因此需实时检测电压与电流的值。POS主电源系统分为两大类型:适配器供电和电池供电。适配器供电时主电源电压恒定,检测其功耗时可采取仅检测电流的方式。电池供电时,主电源电压随着电池电量的变化而变化,仅检测主电源端的功耗无法正确判断出其是否符合理论要求,因此本专利提出一种对比功耗效率的方式,简而言之为检测其前后级的电压与电流,进行功耗转换效率的比较。Power consumption is the product of power supply voltage and current. This patent aims to judge whether the device is working abnormally by monitoring the actual power consumption and theoretical power consumption. Therefore, it is necessary to detect the voltage and current values in real time. The POS main power system is divided into two main types: adapter power supply and battery power supply. When the adapter is powered, the mains voltage is constant, and when the power consumption is detected, only the current can be detected. When the battery is powered, the main power supply voltage changes with the battery power. Only detecting the power consumption of the main power supply terminal cannot correctly determine whether it meets the theoretical requirements. Therefore, this patent proposes a way to compare the power consumption efficiency, in short. In order to detect the voltage and current of the front and rear stages, a comparison of power conversion efficiency is performed.

电源的功耗监测需为实时监测,功耗监测的具体方式可视设备本身情况而定,有多种方式可实现。例如:检测电阻方式、霍尔传感器、光耦隔离放大器、电容式隔离放大器等,较为简单的监测方式便是通过检测精密电阻两端的电压来判定其被监测电流的大小。本专利以最基础方式举例介绍适配器供电、电压供电方式的检测方式。The power consumption monitoring of the power supply needs to be real-time monitoring. The specific method of power consumption monitoring depends on the condition of the device itself, and can be implemented in various ways. For example, the detection resistance method, the Hall sensor, the optocoupler isolation amplifier, the capacitive isolation amplifier, etc., the simpler monitoring method is to determine the magnitude of the monitored current by detecting the voltage across the precision resistor. This patent introduces the detection method of the adapter power supply and voltage power supply mode in the most basic way.

(1)适配器供电:(1) Adapter power supply:

检测前级电流:Detect preamplifier current:

在适配器供电的设备之中,适配器的供电电压恒定不变。图2即为一个电路的简缩图(图2中,1为适配器电源,2为电压检测),r代表接入电路中的测试电阻,Rload为整个电源系统的负载,检测电阻r两端的A、B两点即可检测出r两端的电压Vab,即可计算出其电流值。Among the adapter-powered devices, the adapter's supply voltage is constant. Figure 2 is a simplified diagram of a circuit (in Figure 2, 1 is the adapter power supply, 2 is the voltage detection), r represents the test resistance in the access circuit, Rload is the load of the entire power system, and A of the detection resistor r B can detect the voltage Vab across r at two points, and the current value can be calculated.

对Vab电压的检测需为实时检测,采集到其电压之后在第3点描述中的软件进行运算,与第3点描述中的驱动理论预设值I进行对比,即可判定POS设备是否有异常改装及入侵现象。The detection of the Vab voltage needs to be real-time detection. After the voltage is collected, the software in the description of the third point is calculated, and compared with the preset value I of the driving theory in the description of the third point, it can be determined whether the POS device has an abnormality. Modification and intrusion.

(2)电池供电:(2) Battery powered:

电池供电的设备其供电电压随着电量的变化而变化,采用适配器供电中的检测方式功耗无法准确与理论值对比,此处提出一种新的方式进行实时的功耗采 集对比:转换效率,检测简化框图如图3电池供电的电源系统的简缩图(图3中1、2为电压检测、r1为前级检测电阻、r2为后级检测电阻、Rload为后级负载、Battery代表主电源为电池供电)所示。在实际电源设计系统中,主电源若要供给设备各个模块使用必须经过电源转换系统将电压转化为可供模块芯片使用的电压,此时便存在转换效率的问题。转化效率在硬件电路设计之初如功耗一样,都是既定的,当电压发生变化时,转化效率随之变化,因此检测前级与后级的功耗再进行软件的运算便可得出转换效率是否异常的判断,进而判断POS是否工作异常。The power supply voltage of a battery-powered device changes with the change of power. The power consumption of the detection mode in the adapter power supply cannot be accurately compared with the theoretical value. Here, a new way is proposed for real-time power consumption. Set comparison: conversion efficiency, detection simplified block diagram Figure 3 battery-powered power system thumbnail diagram (Figure 3, 1, 2 for voltage detection, r1 for pre-stage detection resistor, r2 for post-stage detection resistor, Rload for post-stage load , Battery represents the main power supply for the battery). In the actual power supply design system, if the main power supply is to be supplied to each module of the device, the voltage must be converted into a voltage that can be used by the module chip through the power conversion system. At this time, there is a problem of conversion efficiency. The conversion efficiency is the same as the power consumption at the beginning of the hardware circuit design. When the voltage changes, the conversion efficiency changes accordingly. Therefore, the power consumption of the pre-stage and the post-stage is detected by software operation. Whether the efficiency is abnormal or not, and then determine whether the POS is working abnormally.

图3中得到A、B两点的电压V1及检测电阻r1阻值的数据便可得出前级的功耗P1,检测得出C、D两点的电压V2及检测电阻r2阻值的数据便可转换后的功耗P2,P1与P2的比值即可得出对应时刻的效率。In Fig. 3, the voltage V1 of the two points A and B and the resistance value of the detecting resistor r1 are obtained, and the power consumption P1 of the previous stage can be obtained, and the data of the voltage V2 of the two points C and D and the resistance of the detecting resistor r2 are detected. The convertible power consumption P2, the ratio of P1 to P2 can give the efficiency at the corresponding time.

3、理论功耗登记注册及响应3. Theoretical power registration and response

功耗是一个设备的重要指标,在POS设计时,各动作的功耗值便是固定的。在第2点中已提出实际功耗检测的方式,实际功耗检测完成后得到数据需和理论值进行对比,才能判断设备是否出现异常,理论功耗登记注册即是将各个动作下的主电源功耗(效率)写入底层软件中,在POS要进行动作时向OS发出操作指令,调出对应的功耗值,返回数据,进行对比操作。Power consumption is an important indicator of a device. In POS design, the power consumption value of each action is fixed. In the second point, the actual power consumption detection method has been proposed. After the actual power consumption detection is completed, the data needs to be compared with the theoretical value to determine whether the device is abnormal. The theoretical power consumption registration is the main power supply under each action. Power consumption (efficiency) is written into the underlying software. When the POS wants to perform an action, it issues an operation command to the OS, calls the corresponding power consumption value, returns the data, and performs a comparison operation.

此功耗(效率)登记包括两个部分:(1)将功耗值写入底层软件中;(2)POS进行操作的响应。This power (efficiency) registration consists of two parts: (1) writing the power consumption value to the underlying software; and (2) the response of the POS operation.

功耗值写入:如图4的功耗值写入软件预登记的流程图,本方法首先采用单操作的功耗值写入。POS设备进行操作时,往往伴随的是两种或者多种方式,其功耗便是两种操作的叠加,例如:打印的同时进行蓝牙通讯,若打印的功耗为P1,蓝牙通讯的功耗为P2,则主电源的功耗即为两者相加:P1+P2,采取单操作模块功耗的登记方式,在POS进行相应操作时,底层软件可精准返回总功耗值,与描述2中的实测值进行对比运算。Power consumption value write: The power consumption value of Figure 4 is written into the software pre-registration flow chart. The method first writes the power consumption value of a single operation. When a POS device is operated, it is often accompanied by two or more modes. The power consumption is a superposition of two operations, for example, Bluetooth communication while printing, if the power consumption of printing is P1, the power consumption of Bluetooth communication For P2, the power consumption of the main power supply is added: P1+P2, adopting the registration mode of single-operation module power consumption, when the POS performs corresponding operations, the underlying software can accurately return the total power consumption value, and description 2 The measured values in the comparison are performed.

其次,在进行功耗值写入底层软件时,采取功耗分时段写入方式。例如打印的功耗写入,当整个打印的持续时间为10S时,将10s分割成若干等同的时间段,则10S内的总功耗为P总=Pt1+Pt2+Pt3+Pt4+Pt5+………..Secondly, when the power consumption value is written into the underlying software, the power consumption is divided into time slots. For example, the power consumption of printing is written. When the duration of the entire printing is 10S, the 10s is divided into several equal time segments, and the total power consumption in 10S is P total = Pt1 + Pt2 + Pt3 + Pt4 + Pt5 + ... .....

采取分时段写入的方式可将整个功耗阶段细化,提高监测系统的准确性。 The use of time-phased writing can refine the entire power consumption stage and improve the accuracy of the monitoring system.

同时,本方法中将功耗值写入底层软件中,可有效避免木马病毒的入侵造成数据的改变。若将功耗数据写入应用层中,木马病毒程序便可有机会篡改数据及流程使监测系统失效。At the same time, in the method, the power consumption value is written into the underlying software, which can effectively avoid the data change caused by the invasion of the Trojan virus. If power consumption data is written to the application layer, the Trojan virus program can have the opportunity to tamper with the data and process to disable the monitoring system.

功耗值写入底层软件后,集成在整个软件系统中应用于OS上,便可实现理论功耗值的预登记。After the power consumption value is written into the underlying software, the integration is applied to the OS in the entire software system, and the pre-registration of the theoretical power consumption value can be realized.

POS操作的响应:如图5的POS进行操作时软件的简易流程图。POS要进行某项操作时,向OS操作系统发送操作指令,操作系统接收到指令后进行指令识别。Response of POS operation: A simple flow chart of the software when the POS is operated as shown in FIG. When the POS wants to perform an operation, it sends an operation instruction to the OS operating system, and the operating system receives the instruction and performs the instruction recognition.

指令识别部分首先对操作指令进行判别,是否为异常指令,判定为异常指令时设备不响应。其次,判断操作指令中同时包括哪几个操作,将每个操作的相应信号送至底层软件中读取总功耗,返回的功耗数据为分时段的功耗最大值。The command recognition portion first discriminates the operation command, whether it is an abnormal command, and the device does not respond when it is determined that the command is abnormal. Secondly, it is judged which operations are included in the operation instruction, and the corresponding signals of each operation are sent to the underlying software to read the total power consumption, and the returned power consumption data is the maximum power consumption of the time division.

操作系统接收到返回数据后,在底层软件进行实际采集数据与理论数据的对比(对比具体过程在第4点描述中具体描述),对比异常时执行报警机制。After the operating system receives the returned data, it compares the actual collected data with the theoretical data in the underlying software (the specific process is described in detail in the description of point 4), and the alarm mechanism is executed when the abnormality is compared.

4、实时功耗对比判定4, real-time power consumption comparison judgment

在第2点描述中可得到主电源的实时电流值,第3点描述中可得到理论操作电流值,将实时电流值与理论值对比便可得知是否存在异常功耗,判别设备是否被改装或植入木马程序。实时比对判定简缩流程如图6的为功耗预设电流与检测电流的实时对比简缩流程图所示,当数据首次对比判定异常时,再次对新电流数据进行对比判定,连续两次实时对比数据异常,判定为设备发生异常工作行为,执行报警及锁定机制。In the description of point 2, the real-time current value of the main power source can be obtained. In the description of point 3, the theoretical operating current value can be obtained. Comparing the real-time current value with the theoretical value, it can be known whether there is abnormal power consumption, and whether the device is modified. Or implant a Trojan. The real-time comparison determination process is shown in Figure 6. The real-time comparison and reduction flow chart of the power consumption preset current and the detection current is shown. When the data is compared for the first time, the new current data is compared and judged again. The data is abnormal, and it is determined that the device has abnormal working behavior, and the alarm and locking mechanism are executed.

5、报警方式5, the alarm method

第4点描述中出现功耗对比异常时,判定设备被改装或植入木马程序,启动报警机制。报警方式可采取:蜂鸣器报警、液晶显示报警、后台锁定无法操作等方式。When the power consumption comparison is abnormal in the description of point 4, it is determined that the device is modified or implanted in the Trojan program, and the alarm mechanism is activated. The alarm mode can be adopted: buzzer alarm, liquid crystal display alarm, background lock cannot be operated, etc.

以下为本发明的具体应用实例。The following are specific application examples of the present invention.

实施例一,隐藏式焊盘及盲孔内层走线Embodiment 1, hidden pad and blind hole inner layer trace

1、主电源采用隐藏式焊盘及主电源盲孔内层走线方式,防止植入模块直接由主电源前端供电。1. The main power supply adopts the hidden pad and the inner power blind hole inner layer routing mode to prevent the implanted module from being directly powered by the main power supply front end.

2、POS设备出厂时对各动作电流进行底层程序的登记注册,各操作电流在 底层中备案;2. When the POS device leaves the factory, the underlying program is registered for each action current, and the operating current is Recorded in the bottom layer;

3、在POS设备发出操作信号时,向OS(系统)进行申报(提取登记注册电流);3. When the POS device sends an operation signal, report to the OS (system) (extract registration and registration current);

4、申报成功后,在POS进行各操作的时候实时监测刷新电流值是否超出底层登记值;4. After the successful application, the real-time monitoring of the refresh current value exceeds the underlying registration value when the POS performs each operation;

5、监测值超出底层登记值,再次刷新采集验证,若依然大于登记值,POS蜂鸣器报警。报警方式:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS进行锁定使其无法交易。5. The monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.

实施例二,主电源电流及电压监控Embodiment 2, main power supply current and voltage monitoring

1、POS设备出厂时对各动作电流、电压进行底层程序的登记注册,各操作电流、电压在底层中备案;1. When the POS device leaves the factory, the underlying program is registered for each operating current and voltage, and the operating current and voltage are recorded in the bottom layer;

2、在POS设备发出操作信号时,向OS(系统)进行申报(提取登记注册电流、电压值);2. When the POS device issues an operation signal, report to the OS (system) (extract the registered current and voltage value);

3、申报成功后,在POS进行各操作的时候实时监测刷新电流、电压值是否超出底层登记值;3. After the successful application, the real-time monitoring of the refresh current and voltage value exceeds the underlying registration value when the POS performs each operation;

4、监测值超出底层登记值,再次刷新采集验证,若依然大于登记值,POS蜂鸣器报警。报警方式:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS进行锁定使其无法交易。4. The monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.

实施例三,主电源电流及NTC监控(适用于电池设备)Embodiment 3, main power supply current and NTC monitoring (for battery equipment)

1、当电流增大时NTC(电池温度监测)值会随之变化,POS设备出厂时对各动作电流、NTC值进行底层程序的登记注册,各操作电流、电压在底层中备案;1. When the current increases, the NTC (battery temperature monitoring) value will change accordingly. When the POS device leaves the factory, the underlying program is registered for each operating current and NTC value, and the operating current and voltage are recorded in the bottom layer;

2、在POS设备发出操作信号时,向OS(系统)进行申报(提取登记注册电流、NTC值);2. When the POS device sends an operation signal, it reports to the OS (system) (extracts the registered current and NTC value);

3、申报成功后,在POS进行各操作的时候实时监测刷新电流、NTC值是否超出底层登记值;3. After the successful application, the real-time monitoring of the refresh current and the NTC value exceeds the underlying registration value when the POS performs each operation;

4、监测值超出底层登记值,再次刷新采集验证,若依然大于登记值,POS蜂鸣器报警。报警方式:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS进行锁定使其无法交易。4. The monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.

以上是本发明的较佳实施例,凡依本发明技术方案所作的改变,所产生的功 能作用未超出本发明技术方案的范围时,均属于本发明的保护范围。 The above is a preferred embodiment of the present invention, and the work performed according to the changes made by the technical solution of the present invention When the effect can be made without departing from the scope of the technical solution of the present invention, it is within the scope of protection of the present invention.

Claims (9)

一种防止POS机被改装、植入木马程序盗取信息的方法,其特征在于:包括如下步骤,A method for preventing a POS machine from being modified and implanting a Trojan horse to steal information, characterized in that it comprises the following steps: S1:实时监测主电源功耗;S1: Real-time monitoring of main power consumption; S2:理论功耗登记注册及响应,包括将POS机各个动作下的主电源功耗值写入底层软件中以及POS机操作时的响应;S2: The theoretical power consumption registration and response, including the main power consumption value of each action of the POS machine is written into the underlying software and the response of the POS operation; S3:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则执行步骤S4,若否,则重新执行步骤S3;S3: according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3; S4:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则判定POS机发生异常,进行报警;若否,则重新执行步骤S3。S4: Comparing the power consumption of the main power source monitored in real time in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm; if not, re-executing step S3. 根据权利要求1所述的一种防止POS机被改装、植入木马程序盗取信息的方法,其特征在于:所述步骤S1中,实时监测主电源功耗,根据POS机主电源供电方式不同,分为功耗监测方式和效率监测方式,其中,POS机主电源若采用适配器供电方式,则采用功耗监测方式进行POS机主电源功耗实时监测;若POS机主电源若采用电池供电方式,则采用效率监测方式进行POS机主电源功耗实时监测。The method for preventing POS machine from being modified and implanting a Trojan horse to steal information according to claim 1, wherein in the step S1, the main power consumption is monitored in real time, according to the main power supply mode of the POS machine. It is divided into power consumption monitoring mode and efficiency monitoring mode. If the main power supply of the POS machine adopts the adapter power supply mode, the power consumption monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine; if the main power of the POS machine is battery powered The efficiency monitoring method is used to perform real-time monitoring of the power consumption of the POS main power supply. 根据权利要求2所述的一种防止POS机被改装、植入木马程序盗取信息的方法,其特征在于:所述功耗监测方式即,通过检测接入POS机适配器与POS机后级负载的测试电阻r两端的电压Vab,计算出测试电阻r两端的电流值
Figure PCTCN2016094787-appb-100001
即可得出POS机主电源功耗。
A method for preventing POS machine from being modified and implanting a Trojan horse to steal information according to claim 2, wherein: said power consumption monitoring mode is: detecting access to a POS machine adapter and a POS machine back level load The voltage Vab across the test resistor r is calculated to calculate the current value across the test resistor r
Figure PCTCN2016094787-appb-100001
The power consumption of the POS main power supply can be obtained.
根据权利要求2所述的一种防止POS机被改装、植入木马程序盗取信息的方法,其特征在于:所述效率监测方式即,首先,在POS机电池与POS机电源转换模块之间接入前级检测电阻r1,POS机电源转换模块与POS机后级负载之间接入后级检测电阻r2,分别检测前级检测电阻r1两端电压V1、后级检测电阻r2两端电压V2,得出前级功耗
Figure PCTCN2016094787-appb-100002
及后级功耗
Figure PCTCN2016094787-appb-100003
即可得前级与后级的转换效率
Figure PCTCN2016094787-appb-100004
The method for preventing POS machine from being modified and implanting a Trojan horse to steal information according to claim 2, wherein the efficiency monitoring mode is, firstly, connecting between a POS battery and a POS power conversion module. The pre-stage detection resistor r1, the POS machine power conversion module and the post-stage load of the POS machine are connected to the post-stage detection resistor r2, respectively detecting the voltage V1 across the front-end detection resistor r1 and the voltage V2 across the second-stage detection resistor r2. Pre-stage power consumption
Figure PCTCN2016094787-appb-100002
And subsequent power consumption
Figure PCTCN2016094787-appb-100003
You can get the conversion efficiency of the front and the back
Figure PCTCN2016094787-appb-100004
根据权利要求1所述的一种防止POS机被改装、植入木马程序盗取信息 的方法,其特征在于:所述将POS机各个动作下的主电源功耗值写入底层软件,即将POS机单动作下的主电源功耗值写入底层软件中,且在功耗值写入底层软件时,采取功耗分时段写入的方式。The POS machine is modified according to claim 1 and the trojan program is stolen to steal information. The method is characterized in that: the main power consumption value of each action of the POS machine is written into the underlying software, that is, the main power consumption value of the POS machine under single action is written into the underlying software, and the power consumption value is written. When entering the underlying software, the power consumption is divided into time slots. 根据权利要求5所述的一种防止POS机被改装、植入木马程序盗取信息的方法,其特征在于:所述功耗分时段写入的方式,即将POS机单动作持续的时间进行时间段分割,进行对应时间段POS机单动作下的主电源功耗值写入。The method for preventing POS machine from being modified and implanting a Trojan horse to steal information according to claim 5, wherein: the power consumption is written in a time-division manner, that is, the time during which the POS machine single action lasts. Segment segmentation is performed to write the main power consumption value under the single action of the POS machine in the corresponding time period. 根据权利要求1所述的一种防止POS机被改装、植入木马程序盗取信息的方法,其特征在于:所述POS机操作时的响应,即POS执行一项操作时,需向POS机操作系统发送操作指令,若POS机操作系统识别该操作指令为异常指令,则POS不进行动作,若POS机操作系统识别该操作指令为正常指令,则继续判断该操作指令包括动作数,进而通过底层软件读取该操作对应的主电源总功耗值,并返回至POS机操作系统。The method for preventing POS machine from being modified and implanting a Trojan horse to steal information according to claim 1, wherein the POS machine responds to the operation, that is, when the POS performs an operation, the POS machine needs to be The operating system sends an operation instruction. If the POS machine operating system recognizes that the operation instruction is an abnormal instruction, the POS does not perform an action. If the POS machine operating system recognizes that the operation instruction is a normal instruction, it continues to determine that the operation instruction includes an action number, and then passes The underlying software reads the total power consumption value of the main power supply corresponding to the operation and returns to the POS operating system. 根据权利要求1所述的一种防止POS机被改装、植入木马程序盗取信息的方法,其特征在于:还需对主电源采用隐藏式焊盘及主电源盲孔内层走线方式,以防止植入模块直接由主电源前端供电。The method for preventing POS machine from being modified and implanting a Trojan horse to steal information according to claim 1 is characterized in that: the hidden power pad and the inner power blind hole inner layer routing mode are also required for the main power source. To prevent the implanted module from being powered directly from the main power front end. 根据权利要求1所述的一种防止POS机被改装、植入木马程序盗取信息的方法,其特征在于:步骤S4中的报警包括:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS机进行锁定使其无法交易。 The method for preventing POS machine from being modified and implanting a Trojan horse to steal information according to claim 1, wherein the alarm in step S4 comprises: continuous buzzer buzzer, liquid crystal display attack, background to POS machine Lock it to make it impossible to trade.
PCT/CN2016/094787 2016-05-16 2016-08-12 Method for protecting pos machine from being refitted and being implant with trojan program for information stealing Ceased WO2017197796A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610319369.8 2016-05-16
CN201610319369.8A CN105974190A (en) 2016-05-16 2016-05-16 Method for protecting POS machine from being refitted and being provided with Trojan program for preventing information stealing

Publications (1)

Publication Number Publication Date
WO2017197796A1 true WO2017197796A1 (en) 2017-11-23

Family

ID=56992475

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/094787 Ceased WO2017197796A1 (en) 2016-05-16 2016-08-12 Method for protecting pos machine from being refitted and being implant with trojan program for information stealing

Country Status (2)

Country Link
CN (1) CN105974190A (en)
WO (1) WO2017197796A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114509979B (en) * 2022-02-22 2024-12-31 中国科学院微电子研究所 Integrated circuit safety detection system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2701091A1 (en) * 2012-03-23 2014-02-26 Tecvan Informática LTDA. Control and monitoring module of safe devices
CN103729947A (en) * 2014-01-13 2014-04-16 青岛海信智能商用系统有限公司 POS system having self-checking function and self-checking method thereof
CN203645302U (en) * 2013-12-27 2014-06-11 青岛海信智能商用系统有限公司 Input voltage monitoring circuit and POS terminal
CN203746174U (en) * 2013-12-31 2014-07-30 福建睿矽微电子科技有限公司 Battery efficient application payment terminal
CN104375027A (en) * 2014-11-05 2015-02-25 福建联迪商用设备有限公司 Method and device for testing low-power consumption electronic device and low-power consumption POS terminal
CN105303373A (en) * 2015-09-22 2016-02-03 深圳市新国都支付技术有限公司 Frequency detection prevention circuit and method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4700301B2 (en) * 2004-07-15 2011-06-15 オークマ株式会社 Software object verification method for real-time systems
CN103198256B (en) * 2012-01-10 2016-05-25 凹凸电子(武汉)有限公司 For detection of detection system and the method for Application Status
CN103246845B (en) * 2012-02-03 2017-07-21 中兴通讯股份有限公司 A kind of Intelligent type wireless terminal safety protection method and device
CN105117646B (en) * 2015-07-31 2018-06-29 中国人民解放军国防科学技术大学 Hardware Trojan horse detection method based on two-dimensional calibration
CN105046171B (en) * 2015-07-31 2018-11-30 中国人民解放军国防科学技术大学 A kind of hardware Trojan horse detection method based on addition of waveforms

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2701091A1 (en) * 2012-03-23 2014-02-26 Tecvan Informática LTDA. Control and monitoring module of safe devices
CN203645302U (en) * 2013-12-27 2014-06-11 青岛海信智能商用系统有限公司 Input voltage monitoring circuit and POS terminal
CN203746174U (en) * 2013-12-31 2014-07-30 福建睿矽微电子科技有限公司 Battery efficient application payment terminal
CN103729947A (en) * 2014-01-13 2014-04-16 青岛海信智能商用系统有限公司 POS system having self-checking function and self-checking method thereof
CN104375027A (en) * 2014-11-05 2015-02-25 福建联迪商用设备有限公司 Method and device for testing low-power consumption electronic device and low-power consumption POS terminal
CN105303373A (en) * 2015-09-22 2016-02-03 深圳市新国都支付技术有限公司 Frequency detection prevention circuit and method

Also Published As

Publication number Publication date
CN105974190A (en) 2016-09-28

Similar Documents

Publication Publication Date Title
US20110010572A1 (en) Notebook computer and power-saving method thereof
CN111670366A (en) Voltage attack detection circuit and chip
CN110293997B (en) Tramcar anti-interference signal control system and axle counting equipment
CA2489637C (en) Electronic data processing device
US9158646B2 (en) Abnormal information output system for a computer system
CN105279497A (en) Eyeball identification method, eyeball identification device and intelligent mobile terminal
CN117806900B (en) Server management method, device, electronic equipment and storage medium
WO2017197796A1 (en) Method for protecting pos machine from being refitted and being implant with trojan program for information stealing
CN102681928B (en) Abnormal information output system of computer system
JP2618958B2 (en) Parity check controller
CN101655735B (en) Load detection system and method
CN105320015A (en) Over-temperature early warning and over-temperature protection method and device based on microcontroller
CN104252732A (en) A self-service terminal forgetting card detection method
CN207601693U (en) A kind of turnover type notebook
CN205263795U (en) Embedded recorder of treater machine of delaying
CN106443476A (en) Safety pre-warning apparatus and electronic equipment
CN111028882A (en) Storage medium detection device
CN204945321U (en) Finance device card reader card inlet detects steals card device
CN106600846A (en) Self-service terminal safety control method and apparatus and self-service terminal
US20040112965A1 (en) Method for preventing illegitimate use of chip cards
JPH06213592A (en) Abnormal flow rate sensing device
TWM621258U (en) Smart card
TW202314596A (en) Smart card and method thereof
US8136156B2 (en) Module with a controller for a chip card
CN111857316A (en) A method and device for realizing automatic threshold configuration function of IPMI power sensor

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16902176

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16902176

Country of ref document: EP

Kind code of ref document: A1