WO2017197796A1 - Method for protecting pos machine from being refitted and being implant with trojan program for information stealing - Google Patents
Method for protecting pos machine from being refitted and being implant with trojan program for information stealing Download PDFInfo
- Publication number
- WO2017197796A1 WO2017197796A1 PCT/CN2016/094787 CN2016094787W WO2017197796A1 WO 2017197796 A1 WO2017197796 A1 WO 2017197796A1 CN 2016094787 W CN2016094787 W CN 2016094787W WO 2017197796 A1 WO2017197796 A1 WO 2017197796A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- power consumption
- pos machine
- pos
- main power
- power supply
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R21/00—Arrangements for measuring electric power or power factor
- G01R21/06—Arrangements for measuring electric power or power factor by measuring current and voltage
Definitions
- the invention relates to the field of electronic payment, in particular to a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information.
- POS POS
- the security of traditional POS devices is directly related to the security of the credit card holders.
- the crimes of pirating or implanting Trojan viruses in the event of criminals stealing card numbers and passwords occur.
- the security performance of POS is challenged.
- most of the security methods of POS use the loop signal change of the detection security circuit to judge whether the abnormality is abnormal, and the criminals can bypass the detection mechanism in various ways.
- the object of the present invention is to provide a method for preventing the POS machine from being modified and implanting a Trojan to steal information by solving the above-mentioned document.
- the method uses real-time monitoring of power consumption and rated power consumption to identify whether there is abnormal monitoring.
- the existence of stolen information can effectively prevent the abnormal working state of the POS machine.
- the technical solution of the present invention is: a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information, including the following steps,
- step S3 according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3;
- step S4 Comparing the power consumption of the main power source monitored in real time in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm; if not, re-executing step S3.
- step S1 real-time monitoring of main power consumption is divided into power consumption monitoring mode and efficiency monitoring mode according to different main power supply modes of the POS machine, wherein the POS main power supply adopts an adapter.
- the power consumption monitoring mode is adopted to perform real-time monitoring of the power consumption of the POS main power supply; if the main power supply of the POS machine adopts the battery power supply mode, the efficiency monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine.
- the power consumption monitoring method calculates the current value at both ends of the test resistor r by detecting the voltage Vab across the test resistor r connected to the POS adapter and the post-stage load of the POS machine.
- the power consumption of the POS main power supply can be obtained.
- the efficiency monitoring mode is: first, the pre-stage detection resistor r1 is connected between the POS battery and the POS power conversion module, and the POS power conversion module is connected to the post-stage load of the POS machine.
- the latter detection resistor r2 detects the voltage V1 across the front-end detection resistor r1 and the voltage V2 across the second-stage detection resistor r2, respectively, and obtains the power consumption of the previous stage. And subsequent power consumption You can get the conversion efficiency of the front and the back
- the power consumption value of the main power source in each action of the POS machine is written into the lower layer software, that is, the power consumption value of the main power source in the single action of the POS machine is written into the lower layer software, and the power consumption value is When writing to the underlying software, the power consumption is written in a time-division manner.
- the method for writing the power consumption in a time-division manner is to divide the time period of the single action of the POS machine, and write the main power consumption value under the single action of the POS machine in the corresponding time period.
- the POS operation response that is, when the POS performs an operation, sends an operation instruction to the POS operating system, and if the POS operating system recognizes the operation instruction as an abnormal instruction, the POS If the POS machine operating system recognizes that the operation instruction is a normal instruction, it continues to judge that the operation instruction includes an action number, and then reads the total power consumption value corresponding to the operation by the underlying software, and returns to the POS operation. system.
- a hidden pad and a main power blind hole inner layer routing mode for the main power source it is also necessary to use a hidden pad and a main power blind hole inner layer routing mode for the main power source to prevent the implanted module from directly supplying power from the front end of the main power source.
- the alarm in step S4 includes: the buzzer continues to beep, the liquid crystal display attacks, and the background locks the POS machine to make it impossible to trade.
- the present invention Compared with the prior art, the present invention has the following beneficial effects: the present invention uses a real-time monitoring method of comparing the power consumption of the power source with the rated power consumption to identify whether there is abnormal monitoring and stealing information, and can effectively prevent the abnormal working state of the POS machine. In order to effectively prevent POS from being modified or implanted in Trojans to steal relevant information.
- FIG. 1 is a schematic diagram of a connection structure of a main power interface used in the present invention.
- 1 is a power interface
- 2 is a solder joint
- 3 is a PCB board.
- FIG. 2 is a schematic diagram of a power consumption monitoring mode circuit used in the present invention.
- FIG. 3 is a schematic diagram of the circuit of the efficiency monitoring mode adopted by the present invention.
- FIG. 4 is a flow chart of the pre-registration of the power consumption value writing software of the present invention.
- FIG. 5 is a simplified flow chart of the software when the POS is operated according to the present invention.
- FIG. 6 is a flow chart of real-time comparison and reduction of power consumption preset current and detection current according to the present invention.
- a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information includes the following steps:
- step S3 according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3;
- step S4 comparing the main power consumption of the real-time monitoring in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm (including: buzzer continuous tweet, liquid crystal display) The attack and the background lock the POS machine so that it cannot be traded.); if not, re-execute step S3.
- the power consumption of the main power source is monitored in real time, and the power consumption monitoring mode and the efficiency monitoring mode are respectively classified according to different power supply modes of the POS machine, wherein the power consumption monitoring is adopted when the main power of the POS machine adopts the adapter power supply mode.
- the method performs real-time monitoring of the power consumption of the POS main power supply; if the main power supply of the POS machine adopts the battery power supply mode, the efficiency monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine.
- the power consumption monitoring method is to calculate the current value at both ends of the test resistor r by detecting the voltage Vab across the test resistor r connected to the POS adapter and the post-stage load of the POS machine.
- the power consumption of the POS main power supply can be obtained.
- the efficiency monitoring method is: first, the pre-stage detecting resistor r1 is connected between the POS battery and the POS power conversion module, and the post-stage detecting resistor r2 is connected between the POS machine power conversion module and the post-stage load of the POS machine, respectively detecting The pre-stage detection resistor r1 voltage V1, the second-stage detection resistor r2 voltage V2, the pre-stage power consumption And subsequent power consumption You can get the conversion efficiency of the front and the back
- the main power consumption value of each action of the POS machine is written into the underlying software, that is, the main power consumption value of the POS machine under single action is written into the underlying software, and when the power consumption value is written into the underlying software, the work is taken.
- the method of writing the power consumption in a time-division manner is to divide the time period of the single action of the POS machine for the time period, and write the main power consumption value under the single action of the POS machine in the corresponding time period.
- the POS operation response that is, when the POS performs an operation, it needs to send an operation instruction to the POS operating system. If the POS machine operating system recognizes that the operation instruction is an abnormal instruction, the POS does not operate, and if the POS machine operates The system recognizes that the operation instruction is a normal instruction, and then continues to determine that the operation instruction includes an action number, and then reads the total power consumption value corresponding to the operation by the underlying software, and returns to the POS operating system.
- the method for preventing the POS machine from being modified and implanting a Trojan horse to steal information includes the following contents:
- the main power consumption is measured by real-time monitoring.
- the monitoring methods are divided into power consumption monitoring and efficiency monitoring.
- Real-time monitoring compares the detected value with the declared value to determine whether the POS has abnormal monitoring power consumption (efficiency);
- the alarm mode can be adopted: buzzer buzzer, liquid crystal display, background lock, etc.
- the main power supply interface is currently connected to the circuit board by means of through-hole pads and surface-mount visible pads.
- the required power can be obtained directly from the visible solder joints.
- the Vietnamese interface pad method prevents the main power supply from being directly detected at the pad.
- Hidden interface pads can be used in a variety of ways, such as BGA package, original cover pad, pad blind hole, etc., as shown in Figure 1, where the solder joint is under the main power interface, directly covered by the interface, the interface The power supply is difficult to detect and take out. When the pad is hidden, the main power supply is routed from the inner layer to prevent the secant mode from acquiring the main power signal.
- Power consumption is the product of power supply voltage and current. This patent aims to judge whether the device is working abnormally by monitoring the actual power consumption and theoretical power consumption. Therefore, it is necessary to detect the voltage and current values in real time.
- the POS main power system is divided into two main types: adapter power supply and battery power supply. When the adapter is powered, the mains voltage is constant, and when the power consumption is detected, only the current can be detected. When the battery is powered, the main power supply voltage changes with the battery power. Only detecting the power consumption of the main power supply terminal cannot correctly determine whether it meets the theoretical requirements. Therefore, this patent proposes a way to compare the power consumption efficiency, in short. In order to detect the voltage and current of the front and rear stages, a comparison of power conversion efficiency is performed.
- the power consumption monitoring of the power supply needs to be real-time monitoring.
- the specific method of power consumption monitoring depends on the condition of the device itself, and can be implemented in various ways.
- the detection resistance method, the Hall sensor, the optocoupler isolation amplifier, the capacitive isolation amplifier, etc. the simpler monitoring method is to determine the magnitude of the monitored current by detecting the voltage across the precision resistor.
- This patent introduces the detection method of the adapter power supply and voltage power supply mode in the most basic way.
- FIG. 2 is a simplified diagram of a circuit (in Figure 2, 1 is the adapter power supply, 2 is the voltage detection), r represents the test resistance in the access circuit, Rload is the load of the entire power system, and A of the detection resistor r B can detect the voltage Vab across r at two points, and the current value can be calculated.
- the detection of the Vab voltage needs to be real-time detection. After the voltage is collected, the software in the description of the third point is calculated, and compared with the preset value I of the driving theory in the description of the third point, it can be determined whether the POS device has an abnormality. Modification and intrusion.
- the power supply voltage of a battery-powered device changes with the change of power.
- the power consumption of the detection mode in the adapter power supply cannot be accurately compared with the theoretical value.
- a new way is proposed for real-time power consumption.
- conversion efficiency detection simplified block diagram Figure 3 battery-powered power system thumbnail diagram ( Figure 3, 1, 2 for voltage detection, r1 for pre-stage detection resistor, r2 for post-stage detection resistor, Rload for post-stage load , Battery represents the main power supply for the battery).
- the voltage In the actual power supply design system, if the main power supply is to be supplied to each module of the device, the voltage must be converted into a voltage that can be used by the module chip through the power conversion system. At this time, there is a problem of conversion efficiency.
- the conversion efficiency is the same as the power consumption at the beginning of the hardware circuit design. When the voltage changes, the conversion efficiency changes accordingly. Therefore, the power consumption of the pre-stage and the post-stage is detected by software operation. Whether the efficiency is abnormal or not, and then determine whether the POS is working abnormally.
- the voltage V1 of the two points A and B and the resistance value of the detecting resistor r1 are obtained, and the power consumption P1 of the previous stage can be obtained, and the data of the voltage V2 of the two points C and D and the resistance of the detecting resistor r2 are detected.
- the convertible power consumption P2, the ratio of P1 to P2 can give the efficiency at the corresponding time.
- Power consumption is an important indicator of a device.
- the power consumption value of each action is fixed.
- the actual power consumption detection method has been proposed. After the actual power consumption detection is completed, the data needs to be compared with the theoretical value to determine whether the device is abnormal.
- the theoretical power consumption registration is the main power supply under each action. Power consumption (efficiency) is written into the underlying software.
- the POS wants to perform an action, it issues an operation command to the OS, calls the corresponding power consumption value, returns the data, and performs a comparison operation.
- This power (efficiency) registration consists of two parts: (1) writing the power consumption value to the underlying software; and (2) the response of the POS operation.
- Power consumption value write The power consumption value of Figure 4 is written into the software pre-registration flow chart.
- the method first writes the power consumption value of a single operation.
- the power consumption is a superposition of two operations, for example, Bluetooth communication while printing, if the power consumption of printing is P1, the power consumption of Bluetooth communication For P2, the power consumption of the main power supply is added: P1+P2, adopting the registration mode of single-operation module power consumption, when the POS performs corresponding operations, the underlying software can accurately return the total power consumption value, and description 2
- the measured values in the comparison are performed.
- the power consumption value is written into the underlying software
- the power consumption is divided into time slots. For example, the power consumption of printing is written.
- the duration of the entire printing is 10S
- time-phased writing can refine the entire power consumption stage and improve the accuracy of the monitoring system.
- the power consumption value is written into the underlying software, which can effectively avoid the data change caused by the invasion of the Trojan virus. If power consumption data is written to the application layer, the Trojan virus program can have the opportunity to tamper with the data and process to disable the monitoring system.
- the integration is applied to the OS in the entire software system, and the pre-registration of the theoretical power consumption value can be realized.
- the command recognition portion first discriminates the operation command, whether it is an abnormal command, and the device does not respond when it is determined that the command is abnormal. Secondly, it is judged which operations are included in the operation instruction, and the corresponding signals of each operation are sent to the underlying software to read the total power consumption, and the returned power consumption data is the maximum power consumption of the time division.
- the operating system After the operating system receives the returned data, it compares the actual collected data with the theoretical data in the underlying software (the specific process is described in detail in the description of point 4), and the alarm mechanism is executed when the abnormality is compared.
- the real-time current value of the main power source can be obtained.
- the theoretical operating current value can be obtained. Comparing the real-time current value with the theoretical value, it can be known whether there is abnormal power consumption, and whether the device is modified. Or implant a Trojan.
- the real-time comparison determination process is shown in Figure 6.
- the real-time comparison and reduction flow chart of the power consumption preset current and the detection current is shown.
- the alarm mode can be adopted: buzzer alarm, liquid crystal display alarm, background lock cannot be operated, etc.
- Embodiment 1 hidden pad and blind hole inner layer trace
- the main power supply adopts the hidden pad and the inner power blind hole inner layer routing mode to prevent the implanted module from being directly powered by the main power supply front end.
- the monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm.
- Alarm mode The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.
- Embodiment 2 main power supply current and voltage monitoring
- the monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.
- Embodiment 3 main power supply current and NTC monitoring (for battery equipment)
- the NTC battery temperature monitoring
- the POS device When the POS device sends an operation signal, it reports to the OS (system) (extracts the registered current and NTC value);
- the monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.
Landscapes
- Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Tests Of Electric Status Of Batteries (AREA)
- Power Sources (AREA)
Abstract
Description
本发明涉及电子支付领域,具体为一种防止POS机被改装、植入木马程序盗取信息的方法。The invention relates to the field of electronic payment, in particular to a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information.
传统POS设备的安全直接关系到刷卡者的财产安全,犯罪分子为盗取卡号和密码对POS进行改装或植入木马病毒的事件时有发生,POS的安全性能面临挑战。目前POS的安全方式大多采用检测安全电路的环路信号变化来判断是否异常,犯罪分子可通过多种方式绕过此检测机制。The security of traditional POS devices is directly related to the security of the credit card holders. The crimes of pirating or implanting Trojan viruses in the event of criminals stealing card numbers and passwords occur. The security performance of POS is challenged. At present, most of the security methods of POS use the loop signal change of the detection security circuit to judge whether the abnormality is abnormal, and the criminals can bypass the detection mechanism in various ways.
发明内容Summary of the invention
本发明的目的在于提供解决上述文件的一种防止POS机被改装、植入木马程序盗取信息的方法,该方法采用实时监测电源功耗与额定功耗对比的方式,来识别是否有异常监听盗取信息的存在,可有效预防POS机异常工作状态。The object of the present invention is to provide a method for preventing the POS machine from being modified and implanting a Trojan to steal information by solving the above-mentioned document. The method uses real-time monitoring of power consumption and rated power consumption to identify whether there is abnormal monitoring. The existence of stolen information can effectively prevent the abnormal working state of the POS machine.
为实现上述目的,本发明的技术方案是:一种防止POS机被改装、植入木马程序盗取信息的方法,包括如下步骤,In order to achieve the above object, the technical solution of the present invention is: a method for preventing a POS machine from being modified and implanting a Trojan horse to steal information, including the following steps,
S1:实时监测主电源功耗;S1: Real-time monitoring of main power consumption;
S2:理论功耗登记注册及响应,包括将POS机各个动作下的主电源功耗值写入底层软件中以及POS机操作时的响应;S2: The theoretical power consumption registration and response, including the main power consumption value of each action of the POS machine is written into the underlying software and the response of the POS operation;
S3:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则执行步骤S4,若否,则重新执行步骤S3;S3: according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3;
S4:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则判定POS机发生异常,进行报警;若否,则重新执行步骤S3。S4: Comparing the power consumption of the main power source monitored in real time in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm; if not, re-executing step S3.
在本发明一实施例中,所述步骤S1中,实时监测主电源功耗,根据POS机主电源供电方式不同,分为功耗监测方式和效率监测方式,其中,POS机主电源若采用适配器供电方式,则采用功耗监测方式进行POS机主电源功耗实时监测;若POS机主电源若采用电池供电方式,则采用效率监测方式进行POS机主电源功耗实时监测。In an embodiment of the present invention, in step S1, real-time monitoring of main power consumption is divided into power consumption monitoring mode and efficiency monitoring mode according to different main power supply modes of the POS machine, wherein the POS main power supply adopts an adapter. In the power supply mode, the power consumption monitoring mode is adopted to perform real-time monitoring of the power consumption of the POS main power supply; if the main power supply of the POS machine adopts the battery power supply mode, the efficiency monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine.
在本发明一实施例中,所述功耗监测方式即,通过检测接入POS机适配器 与POS机后级负载的测试电阻r两端的电压Vab,计算出测试电阻r两端的电流值即可得出POS机主电源功耗。In an embodiment of the present invention, the power consumption monitoring method calculates the current value at both ends of the test resistor r by detecting the voltage Vab across the test resistor r connected to the POS adapter and the post-stage load of the POS machine. The power consumption of the POS main power supply can be obtained.
在本发明一实施例中,所述效率监测方式即,首先,在POS机电池与POS机电源转换模块之间接入前级检测电阻r1,POS机电源转换模块与POS机后级负载之间接入后级检测电阻r2,分别检测前级检测电阻r1两端电压V1、后级检测电阻r2两端电压V2,得出前级功耗及后级功耗即可得前级与后级的转换效率 In an embodiment of the present invention, the efficiency monitoring mode is: first, the pre-stage detection resistor r1 is connected between the POS battery and the POS power conversion module, and the POS power conversion module is connected to the post-stage load of the POS machine. The latter detection resistor r2 detects the voltage V1 across the front-end detection resistor r1 and the voltage V2 across the second-stage detection resistor r2, respectively, and obtains the power consumption of the previous stage. And subsequent power consumption You can get the conversion efficiency of the front and the back
在本发明一实施例中,所述将POS机各个动作下的主电源功耗值写入底层软件,即将POS机单动作下的主电源功耗值写入底层软件中,且在功耗值写入底层软件时,采取功耗分时段写入的方式。In an embodiment of the invention, the power consumption value of the main power source in each action of the POS machine is written into the lower layer software, that is, the power consumption value of the main power source in the single action of the POS machine is written into the lower layer software, and the power consumption value is When writing to the underlying software, the power consumption is written in a time-division manner.
在本发明一实施例中,所述功耗分时段写入的方式,即将POS机单动作持续的时间进行时间段分割,进行对应时间段POS机单动作下的主电源功耗值写入。In an embodiment of the invention, the method for writing the power consumption in a time-division manner is to divide the time period of the single action of the POS machine, and write the main power consumption value under the single action of the POS machine in the corresponding time period.
在本发明一实施例中,所述POS机操作时的响应,即POS执行一项操作时,需向POS机操作系统发送操作指令,若POS机操作系统识别该操作指令为异常指令,则POS不进行动作,若POS机操作系统识别该操作指令为正常指令,则继续判断该操作指令包括动作数,进而通过底层软件读取该操作对应的主电源总功耗值,并返回至POS机操作系统。In an embodiment of the present invention, the POS operation response, that is, when the POS performs an operation, sends an operation instruction to the POS operating system, and if the POS operating system recognizes the operation instruction as an abnormal instruction, the POS If the POS machine operating system recognizes that the operation instruction is a normal instruction, it continues to judge that the operation instruction includes an action number, and then reads the total power consumption value corresponding to the operation by the underlying software, and returns to the POS operation. system.
在本发明一实施例中,还需对主电源采用隐藏式焊盘及主电源盲孔内层走线方式,以防止植入模块直接由主电源前端供电。In an embodiment of the invention, it is also necessary to use a hidden pad and a main power blind hole inner layer routing mode for the main power source to prevent the implanted module from directly supplying power from the front end of the main power source.
在本发明一实施例中,步骤S4中的报警包括:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS机进行锁定使其无法交易。In an embodiment of the invention, the alarm in step S4 includes: the buzzer continues to beep, the liquid crystal display attacks, and the background locks the POS machine to make it impossible to trade.
相较于现有技术,本发明具有以下有益效果:本发明采用实时监测电源功耗与额定功耗对比的方式,来识别是否有异常监听盗取信息的存在,可有效预防POS机异常工作状态,进而有效防止POS被改装或植入木马程序盗取相关信息。Compared with the prior art, the present invention has the following beneficial effects: the present invention uses a real-time monitoring method of comparing the power consumption of the power source with the rated power consumption to identify whether there is abnormal monitoring and stealing information, and can effectively prevent the abnormal working state of the POS machine. In order to effectively prevent POS from being modified or implanted in Trojans to steal relevant information.
图1为本发明采用的主电源接口连接结构示意图,图中,1为电源接口,2为焊点,3为PCB板。 FIG. 1 is a schematic diagram of a connection structure of a main power interface used in the present invention. In the figure, 1 is a power interface, 2 is a solder joint, and 3 is a PCB board.
图2为本发明采用的功耗监测方式电路原理图。2 is a schematic diagram of a power consumption monitoring mode circuit used in the present invention.
图3为本发明采用的效率监测方式电路原理图。FIG. 3 is a schematic diagram of the circuit of the efficiency monitoring mode adopted by the present invention.
图4为本发明功耗值写入软件预登记的流程图。4 is a flow chart of the pre-registration of the power consumption value writing software of the present invention.
图5为本发明POS进行操作时软件的简易流程图。FIG. 5 is a simplified flow chart of the software when the POS is operated according to the present invention.
图6为本发明功耗预设电流与检测电流的实时对比简缩流程图。FIG. 6 is a flow chart of real-time comparison and reduction of power consumption preset current and detection current according to the present invention.
下面结合附图,对本发明的技术方案进行具体说明。The technical solution of the present invention will be specifically described below with reference to the accompanying drawings.
本发明的一种防止POS机被改装、植入木马程序盗取信息的方法,包括如下步骤,A method for preventing a POS machine from being modified and implanting a Trojan horse to steal information includes the following steps:
S1:实时监测主电源功耗;S1: Real-time monitoring of main power consumption;
S2:理论功耗登记注册及响应,包括将POS机各个动作下的主电源功耗值写入底层软件中以及POS机操作时的响应;S2: The theoretical power consumption registration and response, including the main power consumption value of each action of the POS machine is written into the underlying software and the response of the POS operation;
S3:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则执行步骤S4,若否,则重新执行步骤S3;S3: according to step S1 real-time monitoring of the main power consumption compared with the theoretical power consumption of step S2, to determine whether the POS machine is abnormal, and if so, proceed to step S4, and if not, then re-execute step S3;
S4:根据步骤S1实时监测的主电源功耗与步骤S2理论功耗进行对比,判断POS机是否存在异常,若是,则判定POS机发生异常,进行报警(包括:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS机进行锁定使其无法交易。);若否,则重新执行步骤S3。S4: comparing the main power consumption of the real-time monitoring in step S1 with the theoretical power consumption of step S2, determining whether the POS machine has an abnormality, and if so, determining that the POS machine is abnormal, and performing an alarm (including: buzzer continuous tweet, liquid crystal display) The attack and the background lock the POS machine so that it cannot be traded.); if not, re-execute step S3.
所述步骤S1中,实时监测主电源功耗,根据POS机主电源供电方式不同,分为功耗监测方式和效率监测方式,其中,POS机主电源若采用适配器供电方式,则采用功耗监测方式进行POS机主电源功耗实时监测;若POS机主电源若采用电池供电方式,则采用效率监测方式进行POS机主电源功耗实时监测。In the step S1, the power consumption of the main power source is monitored in real time, and the power consumption monitoring mode and the efficiency monitoring mode are respectively classified according to different power supply modes of the POS machine, wherein the power consumption monitoring is adopted when the main power of the POS machine adopts the adapter power supply mode. The method performs real-time monitoring of the power consumption of the POS main power supply; if the main power supply of the POS machine adopts the battery power supply mode, the efficiency monitoring mode is adopted to perform real-time monitoring of the main power consumption of the POS machine.
所述功耗监测方式即,通过检测接入POS机适配器与POS机后级负载的测试电阻r两端的电压Vab,计算出测试电阻r两端的电流值即可得出POS机主电源功耗。The power consumption monitoring method is to calculate the current value at both ends of the test resistor r by detecting the voltage Vab across the test resistor r connected to the POS adapter and the post-stage load of the POS machine. The power consumption of the POS main power supply can be obtained.
所述效率监测方式即,首先,在POS机电池与POS机电源转换模块之间接入前级检测电阻r1,POS机电源转换模块与POS机后级负载之间接入后级检测电阻r2,分别检测前级检测电阻r1两端电压V1、后级检测电阻r2两端电压V2, 得出前级功耗及后级功耗即可得前级与后级的转换效率 The efficiency monitoring method is: first, the pre-stage detecting resistor r1 is connected between the POS battery and the POS power conversion module, and the post-stage detecting resistor r2 is connected between the POS machine power conversion module and the post-stage load of the POS machine, respectively detecting The pre-stage detection resistor r1 voltage V1, the second-stage detection resistor r2 voltage V2, the pre-stage power consumption And subsequent power consumption You can get the conversion efficiency of the front and the back
所述将POS机各个动作下的主电源功耗值写入底层软件,即将POS机单动作下的主电源功耗值写入底层软件中,且在功耗值写入底层软件时,采取功耗分时段写入的方式。所述功耗分时段写入的方式,即将POS机单动作持续的时间进行时间段分割,进行对应时间段POS机单动作下的主电源功耗值写入。The main power consumption value of each action of the POS machine is written into the underlying software, that is, the main power consumption value of the POS machine under single action is written into the underlying software, and when the power consumption value is written into the underlying software, the work is taken. The way the time period is written. The method of writing the power consumption in a time-division manner is to divide the time period of the single action of the POS machine for the time period, and write the main power consumption value under the single action of the POS machine in the corresponding time period.
所述POS机操作时的响应,即POS执行一项操作时,需向POS机操作系统发送操作指令,若POS机操作系统识别该操作指令为异常指令,则POS不进行动作,若POS机操作系统识别该操作指令为正常指令,则继续判断该操作指令包括动作数,进而通过底层软件读取该操作对应的主电源总功耗值,并返回至POS机操作系统。The POS operation response, that is, when the POS performs an operation, it needs to send an operation instruction to the POS operating system. If the POS machine operating system recognizes that the operation instruction is an abnormal instruction, the POS does not operate, and if the POS machine operates The system recognizes that the operation instruction is a normal instruction, and then continues to determine that the operation instruction includes an action number, and then reads the total power consumption value corresponding to the operation by the underlying software, and returns to the POS operating system.
还需对主电源采用隐藏式焊盘及主电源盲孔内层走线方式,以防止植入模块直接由主电源前端供电。It is also necessary to use a hidden pad and a main power blind via inner wiring to prevent the implanted module from being directly powered by the main power supply front end.
以下为本发明的具体实现过程。The following is a specific implementation process of the present invention.
本发明的防止POS机被改装、植入木马程序盗取信息的方法,包括如下内容:The method for preventing the POS machine from being modified and implanting a Trojan horse to steal information includes the following contents:
1、采取隐藏式焊盘及盲孔走线方式,规避POS机的改装植入点;1. Adopt hidden pad and blind hole routing mode to avoid the modified implantation point of POS machine;
2、主电源功耗采用实时监测的方式,监测的方式分为功耗监测、效率监测。2. The main power consumption is measured by real-time monitoring. The monitoring methods are divided into power consumption monitoring and efficiency monitoring.
3、对各个模块动作的功耗(效率)进行软件登记注册,POS要进行实际动作时必须向系统申报。3. Software registration for the power consumption (efficiency) of each module action, the POS must report to the system when performing actual actions.
4、实时监测的同时将检测值与申报值进行对比,判断是否POS存在异常监听功耗(效率);4. Real-time monitoring compares the detected value with the declared value to determine whether the POS has abnormal monitoring power consumption (efficiency);
5、连续出现两次4中的实时对比异常,POS报警;5, two consecutive real-time comparison abnormalities in 4, POS alarm;
6、报警方式可采取:蜂鸣器鸣叫、液晶显示、后台锁定等方式。6. The alarm mode can be adopted: buzzer buzzer, liquid crystal display, background lock, etc.
具体如下:details as follows:
1、隐藏式接口焊盘及盲孔走线:1, hidden interface pads and blind hole routing:
主电源的接口目前采取的方式均以通孔焊盘、表贴式可见焊盘的方式连接至电路板中,要改装POS植入新模块即可直接从可见焊点获取所需电源,使用隐 藏式接口焊盘方式可避免主电源在焊盘处被直接探测引出。隐藏接口焊盘可采用多种方式,例如BGA封装、原件覆盖焊盘、焊盘为盲孔等方式,如图1所示,其中,焊点在主电源接口下,被接口直接覆盖,接口处电源便难以探测接出。焊盘隐藏的同时主电源从内层走线,可防止采取割线方式获取主电源信号。The main power supply interface is currently connected to the circuit board by means of through-hole pads and surface-mount visible pads. To modify the POS to implant a new module, the required power can be obtained directly from the visible solder joints. The Tibetan interface pad method prevents the main power supply from being directly detected at the pad. Hidden interface pads can be used in a variety of ways, such as BGA package, original cover pad, pad blind hole, etc., as shown in Figure 1, where the solder joint is under the main power interface, directly covered by the interface, the interface The power supply is difficult to detect and take out. When the pad is hidden, the main power supply is routed from the inner layer to prevent the secant mode from acquiring the main power signal.
2、实时监测主电源功耗:2. Real-time monitoring of main power consumption:
功耗是电源电压与电流的乘积,本专利旨在通过监测实际的电源功耗与理论功耗对比判断设备是否工作异常,因此需实时检测电压与电流的值。POS主电源系统分为两大类型:适配器供电和电池供电。适配器供电时主电源电压恒定,检测其功耗时可采取仅检测电流的方式。电池供电时,主电源电压随着电池电量的变化而变化,仅检测主电源端的功耗无法正确判断出其是否符合理论要求,因此本专利提出一种对比功耗效率的方式,简而言之为检测其前后级的电压与电流,进行功耗转换效率的比较。Power consumption is the product of power supply voltage and current. This patent aims to judge whether the device is working abnormally by monitoring the actual power consumption and theoretical power consumption. Therefore, it is necessary to detect the voltage and current values in real time. The POS main power system is divided into two main types: adapter power supply and battery power supply. When the adapter is powered, the mains voltage is constant, and when the power consumption is detected, only the current can be detected. When the battery is powered, the main power supply voltage changes with the battery power. Only detecting the power consumption of the main power supply terminal cannot correctly determine whether it meets the theoretical requirements. Therefore, this patent proposes a way to compare the power consumption efficiency, in short. In order to detect the voltage and current of the front and rear stages, a comparison of power conversion efficiency is performed.
电源的功耗监测需为实时监测,功耗监测的具体方式可视设备本身情况而定,有多种方式可实现。例如:检测电阻方式、霍尔传感器、光耦隔离放大器、电容式隔离放大器等,较为简单的监测方式便是通过检测精密电阻两端的电压来判定其被监测电流的大小。本专利以最基础方式举例介绍适配器供电、电压供电方式的检测方式。The power consumption monitoring of the power supply needs to be real-time monitoring. The specific method of power consumption monitoring depends on the condition of the device itself, and can be implemented in various ways. For example, the detection resistance method, the Hall sensor, the optocoupler isolation amplifier, the capacitive isolation amplifier, etc., the simpler monitoring method is to determine the magnitude of the monitored current by detecting the voltage across the precision resistor. This patent introduces the detection method of the adapter power supply and voltage power supply mode in the most basic way.
(1)适配器供电:(1) Adapter power supply:
检测前级电流:Detect preamplifier current:
在适配器供电的设备之中,适配器的供电电压恒定不变。图2即为一个电路的简缩图(图2中,1为适配器电源,2为电压检测),r代表接入电路中的测试电阻,Rload为整个电源系统的负载,检测电阻r两端的A、B两点即可检测出r两端的电压Vab,即可计算出其电流值。Among the adapter-powered devices, the adapter's supply voltage is constant. Figure 2 is a simplified diagram of a circuit (in Figure 2, 1 is the adapter power supply, 2 is the voltage detection), r represents the test resistance in the access circuit, Rload is the load of the entire power system, and A of the detection resistor r B can detect the voltage Vab across r at two points, and the current value can be calculated.
对Vab电压的检测需为实时检测,采集到其电压之后在第3点描述中的软件进行运算,与第3点描述中的驱动理论预设值I进行对比,即可判定POS设备是否有异常改装及入侵现象。The detection of the Vab voltage needs to be real-time detection. After the voltage is collected, the software in the description of the third point is calculated, and compared with the preset value I of the driving theory in the description of the third point, it can be determined whether the POS device has an abnormality. Modification and intrusion.
(2)电池供电:(2) Battery powered:
电池供电的设备其供电电压随着电量的变化而变化,采用适配器供电中的检测方式功耗无法准确与理论值对比,此处提出一种新的方式进行实时的功耗采 集对比:转换效率,检测简化框图如图3电池供电的电源系统的简缩图(图3中1、2为电压检测、r1为前级检测电阻、r2为后级检测电阻、Rload为后级负载、Battery代表主电源为电池供电)所示。在实际电源设计系统中,主电源若要供给设备各个模块使用必须经过电源转换系统将电压转化为可供模块芯片使用的电压,此时便存在转换效率的问题。转化效率在硬件电路设计之初如功耗一样,都是既定的,当电压发生变化时,转化效率随之变化,因此检测前级与后级的功耗再进行软件的运算便可得出转换效率是否异常的判断,进而判断POS是否工作异常。The power supply voltage of a battery-powered device changes with the change of power. The power consumption of the detection mode in the adapter power supply cannot be accurately compared with the theoretical value. Here, a new way is proposed for real-time power consumption. Set comparison: conversion efficiency, detection simplified block diagram Figure 3 battery-powered power system thumbnail diagram (Figure 3, 1, 2 for voltage detection, r1 for pre-stage detection resistor, r2 for post-stage detection resistor, Rload for post-stage load , Battery represents the main power supply for the battery). In the actual power supply design system, if the main power supply is to be supplied to each module of the device, the voltage must be converted into a voltage that can be used by the module chip through the power conversion system. At this time, there is a problem of conversion efficiency. The conversion efficiency is the same as the power consumption at the beginning of the hardware circuit design. When the voltage changes, the conversion efficiency changes accordingly. Therefore, the power consumption of the pre-stage and the post-stage is detected by software operation. Whether the efficiency is abnormal or not, and then determine whether the POS is working abnormally.
图3中得到A、B两点的电压V1及检测电阻r1阻值的数据便可得出前级的功耗P1,检测得出C、D两点的电压V2及检测电阻r2阻值的数据便可转换后的功耗P2,P1与P2的比值即可得出对应时刻的效率。In Fig. 3, the voltage V1 of the two points A and B and the resistance value of the detecting resistor r1 are obtained, and the power consumption P1 of the previous stage can be obtained, and the data of the voltage V2 of the two points C and D and the resistance of the detecting resistor r2 are detected. The convertible power consumption P2, the ratio of P1 to P2 can give the efficiency at the corresponding time.
3、理论功耗登记注册及响应3. Theoretical power registration and response
功耗是一个设备的重要指标,在POS设计时,各动作的功耗值便是固定的。在第2点中已提出实际功耗检测的方式,实际功耗检测完成后得到数据需和理论值进行对比,才能判断设备是否出现异常,理论功耗登记注册即是将各个动作下的主电源功耗(效率)写入底层软件中,在POS要进行动作时向OS发出操作指令,调出对应的功耗值,返回数据,进行对比操作。Power consumption is an important indicator of a device. In POS design, the power consumption value of each action is fixed. In the second point, the actual power consumption detection method has been proposed. After the actual power consumption detection is completed, the data needs to be compared with the theoretical value to determine whether the device is abnormal. The theoretical power consumption registration is the main power supply under each action. Power consumption (efficiency) is written into the underlying software. When the POS wants to perform an action, it issues an operation command to the OS, calls the corresponding power consumption value, returns the data, and performs a comparison operation.
此功耗(效率)登记包括两个部分:(1)将功耗值写入底层软件中;(2)POS进行操作的响应。This power (efficiency) registration consists of two parts: (1) writing the power consumption value to the underlying software; and (2) the response of the POS operation.
功耗值写入:如图4的功耗值写入软件预登记的流程图,本方法首先采用单操作的功耗值写入。POS设备进行操作时,往往伴随的是两种或者多种方式,其功耗便是两种操作的叠加,例如:打印的同时进行蓝牙通讯,若打印的功耗为P1,蓝牙通讯的功耗为P2,则主电源的功耗即为两者相加:P1+P2,采取单操作模块功耗的登记方式,在POS进行相应操作时,底层软件可精准返回总功耗值,与描述2中的实测值进行对比运算。Power consumption value write: The power consumption value of Figure 4 is written into the software pre-registration flow chart. The method first writes the power consumption value of a single operation. When a POS device is operated, it is often accompanied by two or more modes. The power consumption is a superposition of two operations, for example, Bluetooth communication while printing, if the power consumption of printing is P1, the power consumption of Bluetooth communication For P2, the power consumption of the main power supply is added: P1+P2, adopting the registration mode of single-operation module power consumption, when the POS performs corresponding operations, the underlying software can accurately return the total power consumption value, and
其次,在进行功耗值写入底层软件时,采取功耗分时段写入方式。例如打印的功耗写入,当整个打印的持续时间为10S时,将10s分割成若干等同的时间段,则10S内的总功耗为P总=Pt1+Pt2+Pt3+Pt4+Pt5+………..Secondly, when the power consumption value is written into the underlying software, the power consumption is divided into time slots. For example, the power consumption of printing is written. When the duration of the entire printing is 10S, the 10s is divided into several equal time segments, and the total power consumption in 10S is P total = Pt1 + Pt2 + Pt3 + Pt4 + Pt5 + ... .....
采取分时段写入的方式可将整个功耗阶段细化,提高监测系统的准确性。 The use of time-phased writing can refine the entire power consumption stage and improve the accuracy of the monitoring system.
同时,本方法中将功耗值写入底层软件中,可有效避免木马病毒的入侵造成数据的改变。若将功耗数据写入应用层中,木马病毒程序便可有机会篡改数据及流程使监测系统失效。At the same time, in the method, the power consumption value is written into the underlying software, which can effectively avoid the data change caused by the invasion of the Trojan virus. If power consumption data is written to the application layer, the Trojan virus program can have the opportunity to tamper with the data and process to disable the monitoring system.
功耗值写入底层软件后,集成在整个软件系统中应用于OS上,便可实现理论功耗值的预登记。After the power consumption value is written into the underlying software, the integration is applied to the OS in the entire software system, and the pre-registration of the theoretical power consumption value can be realized.
POS操作的响应:如图5的POS进行操作时软件的简易流程图。POS要进行某项操作时,向OS操作系统发送操作指令,操作系统接收到指令后进行指令识别。Response of POS operation: A simple flow chart of the software when the POS is operated as shown in FIG. When the POS wants to perform an operation, it sends an operation instruction to the OS operating system, and the operating system receives the instruction and performs the instruction recognition.
指令识别部分首先对操作指令进行判别,是否为异常指令,判定为异常指令时设备不响应。其次,判断操作指令中同时包括哪几个操作,将每个操作的相应信号送至底层软件中读取总功耗,返回的功耗数据为分时段的功耗最大值。The command recognition portion first discriminates the operation command, whether it is an abnormal command, and the device does not respond when it is determined that the command is abnormal. Secondly, it is judged which operations are included in the operation instruction, and the corresponding signals of each operation are sent to the underlying software to read the total power consumption, and the returned power consumption data is the maximum power consumption of the time division.
操作系统接收到返回数据后,在底层软件进行实际采集数据与理论数据的对比(对比具体过程在第4点描述中具体描述),对比异常时执行报警机制。After the operating system receives the returned data, it compares the actual collected data with the theoretical data in the underlying software (the specific process is described in detail in the description of point 4), and the alarm mechanism is executed when the abnormality is compared.
4、实时功耗对比判定4, real-time power consumption comparison judgment
在第2点描述中可得到主电源的实时电流值,第3点描述中可得到理论操作电流值,将实时电流值与理论值对比便可得知是否存在异常功耗,判别设备是否被改装或植入木马程序。实时比对判定简缩流程如图6的为功耗预设电流与检测电流的实时对比简缩流程图所示,当数据首次对比判定异常时,再次对新电流数据进行对比判定,连续两次实时对比数据异常,判定为设备发生异常工作行为,执行报警及锁定机制。In the description of
5、报警方式5, the alarm method
第4点描述中出现功耗对比异常时,判定设备被改装或植入木马程序,启动报警机制。报警方式可采取:蜂鸣器报警、液晶显示报警、后台锁定无法操作等方式。When the power consumption comparison is abnormal in the description of point 4, it is determined that the device is modified or implanted in the Trojan program, and the alarm mechanism is activated. The alarm mode can be adopted: buzzer alarm, liquid crystal display alarm, background lock cannot be operated, etc.
以下为本发明的具体应用实例。The following are specific application examples of the present invention.
实施例一,隐藏式焊盘及盲孔内层走线
1、主电源采用隐藏式焊盘及主电源盲孔内层走线方式,防止植入模块直接由主电源前端供电。1. The main power supply adopts the hidden pad and the inner power blind hole inner layer routing mode to prevent the implanted module from being directly powered by the main power supply front end.
2、POS设备出厂时对各动作电流进行底层程序的登记注册,各操作电流在 底层中备案;2. When the POS device leaves the factory, the underlying program is registered for each action current, and the operating current is Recorded in the bottom layer;
3、在POS设备发出操作信号时,向OS(系统)进行申报(提取登记注册电流);3. When the POS device sends an operation signal, report to the OS (system) (extract registration and registration current);
4、申报成功后,在POS进行各操作的时候实时监测刷新电流值是否超出底层登记值;4. After the successful application, the real-time monitoring of the refresh current value exceeds the underlying registration value when the POS performs each operation;
5、监测值超出底层登记值,再次刷新采集验证,若依然大于登记值,POS蜂鸣器报警。报警方式:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS进行锁定使其无法交易。5. The monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.
实施例二,主电源电流及电压监控
1、POS设备出厂时对各动作电流、电压进行底层程序的登记注册,各操作电流、电压在底层中备案;1. When the POS device leaves the factory, the underlying program is registered for each operating current and voltage, and the operating current and voltage are recorded in the bottom layer;
2、在POS设备发出操作信号时,向OS(系统)进行申报(提取登记注册电流、电压值);2. When the POS device issues an operation signal, report to the OS (system) (extract the registered current and voltage value);
3、申报成功后,在POS进行各操作的时候实时监测刷新电流、电压值是否超出底层登记值;3. After the successful application, the real-time monitoring of the refresh current and voltage value exceeds the underlying registration value when the POS performs each operation;
4、监测值超出底层登记值,再次刷新采集验证,若依然大于登记值,POS蜂鸣器报警。报警方式:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS进行锁定使其无法交易。4. The monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.
实施例三,主电源电流及NTC监控(适用于电池设备)
1、当电流增大时NTC(电池温度监测)值会随之变化,POS设备出厂时对各动作电流、NTC值进行底层程序的登记注册,各操作电流、电压在底层中备案;1. When the current increases, the NTC (battery temperature monitoring) value will change accordingly. When the POS device leaves the factory, the underlying program is registered for each operating current and NTC value, and the operating current and voltage are recorded in the bottom layer;
2、在POS设备发出操作信号时,向OS(系统)进行申报(提取登记注册电流、NTC值);2. When the POS device sends an operation signal, it reports to the OS (system) (extracts the registered current and NTC value);
3、申报成功后,在POS进行各操作的时候实时监测刷新电流、NTC值是否超出底层登记值;3. After the successful application, the real-time monitoring of the refresh current and the NTC value exceeds the underlying registration value when the POS performs each operation;
4、监测值超出底层登记值,再次刷新采集验证,若依然大于登记值,POS蜂鸣器报警。报警方式:蜂鸣器持续鸣叫、液晶显示攻击、后台对POS进行锁定使其无法交易。4. The monitored value exceeds the underlying registration value, and the acquisition verification is refreshed again. If it is still greater than the registered value, the POS buzzer will alarm. Alarm mode: The buzzer keeps beeping, the liquid crystal display attacks, and the background locks the POS so that it cannot be traded.
以上是本发明的较佳实施例,凡依本发明技术方案所作的改变,所产生的功 能作用未超出本发明技术方案的范围时,均属于本发明的保护范围。 The above is a preferred embodiment of the present invention, and the work performed according to the changes made by the technical solution of the present invention When the effect can be made without departing from the scope of the technical solution of the present invention, it is within the scope of protection of the present invention.
Claims (9)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610319369.8 | 2016-05-16 | ||
| CN201610319369.8A CN105974190A (en) | 2016-05-16 | 2016-05-16 | Method for protecting POS machine from being refitted and being provided with Trojan program for preventing information stealing |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017197796A1 true WO2017197796A1 (en) | 2017-11-23 |
Family
ID=56992475
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/094787 Ceased WO2017197796A1 (en) | 2016-05-16 | 2016-08-12 | Method for protecting pos machine from being refitted and being implant with trojan program for information stealing |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN105974190A (en) |
| WO (1) | WO2017197796A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114509979B (en) * | 2022-02-22 | 2024-12-31 | 中国科学院微电子研究所 | Integrated circuit safety detection system |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2701091A1 (en) * | 2012-03-23 | 2014-02-26 | Tecvan Informática LTDA. | Control and monitoring module of safe devices |
| CN103729947A (en) * | 2014-01-13 | 2014-04-16 | 青岛海信智能商用系统有限公司 | POS system having self-checking function and self-checking method thereof |
| CN203645302U (en) * | 2013-12-27 | 2014-06-11 | 青岛海信智能商用系统有限公司 | Input voltage monitoring circuit and POS terminal |
| CN203746174U (en) * | 2013-12-31 | 2014-07-30 | 福建睿矽微电子科技有限公司 | Battery efficient application payment terminal |
| CN104375027A (en) * | 2014-11-05 | 2015-02-25 | 福建联迪商用设备有限公司 | Method and device for testing low-power consumption electronic device and low-power consumption POS terminal |
| CN105303373A (en) * | 2015-09-22 | 2016-02-03 | 深圳市新国都支付技术有限公司 | Frequency detection prevention circuit and method |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4700301B2 (en) * | 2004-07-15 | 2011-06-15 | オークマ株式会社 | Software object verification method for real-time systems |
| CN103198256B (en) * | 2012-01-10 | 2016-05-25 | 凹凸电子(武汉)有限公司 | For detection of detection system and the method for Application Status |
| CN103246845B (en) * | 2012-02-03 | 2017-07-21 | 中兴通讯股份有限公司 | A kind of Intelligent type wireless terminal safety protection method and device |
| CN105117646B (en) * | 2015-07-31 | 2018-06-29 | 中国人民解放军国防科学技术大学 | Hardware Trojan horse detection method based on two-dimensional calibration |
| CN105046171B (en) * | 2015-07-31 | 2018-11-30 | 中国人民解放军国防科学技术大学 | A kind of hardware Trojan horse detection method based on addition of waveforms |
-
2016
- 2016-05-16 CN CN201610319369.8A patent/CN105974190A/en active Pending
- 2016-08-12 WO PCT/CN2016/094787 patent/WO2017197796A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2701091A1 (en) * | 2012-03-23 | 2014-02-26 | Tecvan Informática LTDA. | Control and monitoring module of safe devices |
| CN203645302U (en) * | 2013-12-27 | 2014-06-11 | 青岛海信智能商用系统有限公司 | Input voltage monitoring circuit and POS terminal |
| CN203746174U (en) * | 2013-12-31 | 2014-07-30 | 福建睿矽微电子科技有限公司 | Battery efficient application payment terminal |
| CN103729947A (en) * | 2014-01-13 | 2014-04-16 | 青岛海信智能商用系统有限公司 | POS system having self-checking function and self-checking method thereof |
| CN104375027A (en) * | 2014-11-05 | 2015-02-25 | 福建联迪商用设备有限公司 | Method and device for testing low-power consumption electronic device and low-power consumption POS terminal |
| CN105303373A (en) * | 2015-09-22 | 2016-02-03 | 深圳市新国都支付技术有限公司 | Frequency detection prevention circuit and method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105974190A (en) | 2016-09-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20110010572A1 (en) | Notebook computer and power-saving method thereof | |
| CN111670366A (en) | Voltage attack detection circuit and chip | |
| CN110293997B (en) | Tramcar anti-interference signal control system and axle counting equipment | |
| CA2489637C (en) | Electronic data processing device | |
| US9158646B2 (en) | Abnormal information output system for a computer system | |
| CN105279497A (en) | Eyeball identification method, eyeball identification device and intelligent mobile terminal | |
| CN117806900B (en) | Server management method, device, electronic equipment and storage medium | |
| WO2017197796A1 (en) | Method for protecting pos machine from being refitted and being implant with trojan program for information stealing | |
| CN102681928B (en) | Abnormal information output system of computer system | |
| JP2618958B2 (en) | Parity check controller | |
| CN101655735B (en) | Load detection system and method | |
| CN105320015A (en) | Over-temperature early warning and over-temperature protection method and device based on microcontroller | |
| CN104252732A (en) | A self-service terminal forgetting card detection method | |
| CN207601693U (en) | A kind of turnover type notebook | |
| CN205263795U (en) | Embedded recorder of treater machine of delaying | |
| CN106443476A (en) | Safety pre-warning apparatus and electronic equipment | |
| CN111028882A (en) | Storage medium detection device | |
| CN204945321U (en) | Finance device card reader card inlet detects steals card device | |
| CN106600846A (en) | Self-service terminal safety control method and apparatus and self-service terminal | |
| US20040112965A1 (en) | Method for preventing illegitimate use of chip cards | |
| JPH06213592A (en) | Abnormal flow rate sensing device | |
| TWM621258U (en) | Smart card | |
| TW202314596A (en) | Smart card and method thereof | |
| US8136156B2 (en) | Module with a controller for a chip card | |
| CN111857316A (en) | A method and device for realizing automatic threshold configuration function of IPMI power sensor |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16902176 Country of ref document: EP Kind code of ref document: A1 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16902176 Country of ref document: EP Kind code of ref document: A1 |