Cash register and method for verifying security of cash register

A security verification and cash register technology, applied in security communication devices, user identity/authority verification, instruments, etc., can solve the problems of illegal tampering and switching of POS machine 1 business, and achieve the effect of improving security and increasing security.

Active Publication Date: 2019-04-23
USI SCI & TECH (SHENZHEN) CO LTD
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, if a hacker gets the first private key 6, signs his self-made "POS image", generates the first image 7, transmits it to the POS machine 1, and then reads the first image 7 by the update program 3, it will be possible Update the image of the POS system 2. At this time, its self-made "POS image" will be normally executed by the POS chip 3, thus causing the business of the POS machine 1 to be illegally tampered with and switched

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cash register and method for verifying security of cash register
  • Cash register and method for verifying security of cash register
  • Cash register and method for verifying security of cash register

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0027] Please refer to image 3 , Which presents a block diagram of the security verification of a cash register (POS) according to an embodiment of the present invention. In this embodiment, the POS machine 11 includes: a communication component 110, a verification unit 119, a processing unit 120, and a storage component 130. The processing unit 120, the communication component 110, the verification unit 119, and the storage component 130 are all electrically connected to each other. In one embodiment, the processing unit 120 in the POS machine 11 is electrically connected to the communication component 110, the verification unit 119, and the storage component 130, respectively.

[0028] The processing unit 120 also contains a POS chip 14, which can adopt the PC-Base architecture, and its operating system adopts Windows interface, supports a variety of peripheral devices, touch screen, POS keyboard and standard keyboard operation, can be connected to IC chip card card reading M...

no. 3 example

[0051] See also image 3 with Figure 5 . Figure 5 A flowchart of POS security verification according to an embodiment of the present invention is presented.

[0052] In step S501, the POS system 12 verifies the signature of the second private key 26 corresponding to the update package 27. A certain virtual terminal (or a second administrator) 29 delivers the update package 27 to a virtual terminal (such as a person) that executes the installation of the update package, and installs the update program for updating the image later on the POS system 12 13, and the update program 13 has not been installed in the POS system 12 in advance. At this time, the POS system 12 will verify the update program package 27 and whether it is signed with the second private key 26 matching the stored second public key 28.

[0053] If the verification is successful, the update program 13 is installed in step S502, and the second image 37 can be transmitted to the POS machine 11 through any virtual ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for verifying the security of a cash register. The method comprises the following steps: when a cash register machine starts up, the cash register machine receives an update program package and verifies whether the update program package uses a second private key to sign or not, and if so, an updating program is installed on the cash register machine, wherein the update program package is generated by using the second private key to sign the updating program and packaging a second public key and the updating program; after the updating program is installed, a third private key matched with a third public key to sign a second image so as to decide whether to update the cash register machine or not, wherein the second image is generated by packaging a third public key and a first image; and a first public key is used for verifying whether a signature of a first private key corresponding to the first image is correct or not, and if so, the first image is set to be capable of being executed by the cash register machine, wherein the first image is generated by using the first private key to sign an original image through.

Description

Technical field [0001] The present invention provides a cash register (POS) and a method for security verification thereof, and particularly relates to a cash register and a method for security verification that improve the security of the POS image update mechanism. Background technique [0002] In order to prevent the business of the cash register (POS) machine from being illegally tampered with and switched, it is often necessary to perform security verification for the POS machine to prevent the cash register machine from being illegally executed. See also figure 1 with figure 2 . figure 1 A block diagram showing the image update of a conventional cash register (POS), figure 2 Presents a flowchart of conventional POS image update. The general procedure for updating the image of the POS machine 1 may be as shown in the following steps: In step S201, the person who develops the POS chip program generates the original image 5. [0003] In step S202, the original image 5 is sign...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07G1/12H04L9/32
CPCH04L9/3247G07G1/12H04L2209/56
Inventor 林嘉万
Owner USI SCI & TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products