首页> 外国专利> METHOD FOR PROTECTING POS MACHINE FROM BEING REFITTED AND BEING IMPLANT WITH TROJAN PROGRAM FOR INFORMATION STEALING

METHOD FOR PROTECTING POS MACHINE FROM BEING REFITTED AND BEING IMPLANT WITH TROJAN PROGRAM FOR INFORMATION STEALING

机译:用于信息存储的Trojan程序防止POS机被返还和植入的方法

摘要

Provided is a method for protecting a POS machine from being refitted and being provided with a Trojan program for information stealing. The method comprises the steps of: firstly, monitoring the power consumption of a main power supply in real time; secondly, carrying out theoretical power consumption registration and response, including enabling the power consumption values of the main power supply under all operations of the POS machine to be written in a bottom software, and carrying out response during the operations of the POS machine; and finally, judging whether the POS machine is abnormal or not according to the comparison of the power consumption, monitored in real time, of the main power supply and the theoretical power consumption, giving an alarm if the POS machine has an abnormality twice in succession, or else, carrying out the new comparison of the power consumption, monitored in real time, of the main power supply and the theoretical power consumption. The method employs a mode of the comparison of the power consumption, monitored in real time, of the main power supply and the theoretical power consumption, so as to recognize whether there is abnormal monitoring and information stealing or not. The method can effectively prevent the POS machine from working in an abnormal state.
机译:提供了一种保护POS机免于重新安装并提供用于信息窃取的特洛伊木马程序的方法。该方法包括以下步骤:首先,实时监视主电源的功耗;其次,进行理论上的功耗登记与响应,包括将POS机的所有操作下的主电源的功耗值写入底层软件,并在POS机的工作过程中进行响应。最后,根据实时监控的主电源的功耗与理论功耗的比较判断POS机是否异常,如果POS机连续两次出现异常,则发出警报,否则,对实时监控的主电源和理论功耗进行新的比较。该方法采用比较主电源实时功耗和理论功耗的模式,以识别是否存在异常监视和信息窃取。该方法可以有效地防止POS机工作在异常状态。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号