The present application claims priority under 35 U.S.C. § 119 to Japanese Patent Application No. 2018-180046 filed Sep. 26, 2018, the entire content of which is incorporated herein by reference.
The present invention relates to a fraud prevention method for an information processing device.
Financial terminals such as ATMs require security. Therefore, in an information processing device such as a card reader, which is installed in a financial terminal, a security function is ensured by a firmware (Patent reference 1).
[Patent Reference 1] Unexamined Japanese Patent Application 2016-186744 Publication
In general, when a device manufacturer provides a device such as a card reader with a security function for data protection installed to a customer such as a financial terminal maker, product delivery is often made in the following two stages. The device manufacturer provides in a first stage a test machine on which a firmware having an internal data reference function for debugging is installed. The customer implements various debugs and tests on the test machine spending between several months and year or more if necessary. Upon completion of the customer's evaluation, the device manufacturer provides the customer a mass-produced device in which a real execution firmware specified for market use is installed. In the debug/test stage, if the customer discovers malfunction of the card reader or discovers a necessary fix on the matching with a host system, the customer requests the device manufacturer to make a repair. The device manufacturer repairs the firmware for the card reader based on the request from the customer and provides the customer a repaired download file. The repaired file is delivered to the customer usually through email or directly through an USB memory; therefore, if security is low at the time of delivery, there will be a risk of fraud obtaining of the file in the process of email communications or of the repaired download file which is saved in the customer's computer. Therefore, if a person with an evil intent installs an illegally-acquired repaired download file into a financial terminal device, security data will be stolen.
Countermeasures have been provided by programming a command in test firmware for a mass-produced machine to prohibit illegal download or by programming an electronic signature key in a test information processing device; however, illegal acts, despite failure, can be executed again and again against such countermeasures, and therefore, sufficient security cannot be ensured.
Considering the above problems, at least an embodiment of the present invention provides a fraud prevention method in an information processing device, in which even when a grogram file is handled under the condition of low security, security data is prevented from being stolen.
To solve the above problems, the present invention is a fraud prevention method used in an information processing device having a program area, in which a program is installed, and a data area, in which security data is stored; wherein the storage positions of the security data in the data area differ in an information processing device which is operated in any situations except actual operations from one which is actually operated; the program is a test program corresponding to the changes of the security data storage positions.
In the present invention, in the information processing device that is operated in any situations except actual operations, the security data storage positions in the data area have been changed and a test program which corresponds to the changes of the security data storage position is used as the program. Therefore, even if the test program is stolen and the stolen test program is installed in an information processing device which is actually operated, since the security data storage positions [of the original program] are different from those of the test program, security data is hard to acquire in an unauthorized manner.
In the present invention, the information processing device which is operated in any situations except actual operations is a test information processing device.
In the present invention, the test program may have an internal data reference function for debug. In this case, the test program may be configured such that the internal data reference function cannot be executed if a machine authentication is not normally finished.
In the present invention, the information processing device may adopt a configuration in which, after the program is installed in the program area, a machine authentication is required to update the program.
In the present invention, the information processing device may adopt a configuration in which, after the program is installed in the program area, a machine authentication is required to start a security function.
In the present invention, the information processing device may adopt a configuration in which the operation thereof is halted when the test program is installed in the program area.
The present invention may adopt a configuration in which said security data contains at least either a key or authentication data for a machine authentication.
In the present invention, the storage positions of security data in the data area are changed and a test program corresponding to the changes of the security data storage position is used as the program in the information processing device which is operated in any situations except actual operations. For this reason, even if the test program is stolen and the illegally-acquired test program is installed in an information processing device which is for actual operations, since the security data storage positions [in the program in the actual operational processing device] are different from those in the test program, the security data is hard to acquire in an unauthorized manner.
Embodiments will now be described, by way of example only, with reference to the accompanying drawings which are meant to be exemplary, not limiting, and wherein like elements are numbered alike in several Figures, in which:
Referring to the drawings, embodiments of the present invention are described. Note that the description below mainly uses a card reader 10 for an information processing device 1.
The firmware unit 15 implements necessary processing according to a command input to the card reader 10 from the host device, encrypts data on the card 50 and outputs it to the host device.
As shown in
The first security data SA, the second security data SB, the third security data SC and the fourth security data SD is respectively stored at each address (a first address E1, a fourth address E4, a sixth address E6 and a second address E2). Therefore, the program area 16 is provided with a reference address table 160 indicating at which address the security data is stored; the content of the reference address table 160 is shown below.
The content of the reference address table 160:
First address E1—First security data SA
Second address E2—Fourth security data SD
Fourth address E4—Second security data SB
Sixth address E6—Third security data SC
As shown in
For example, when a device manufacturer that manufactures the information processing device 1 having the configuration shown in
In this embodiment, then, as shown in
More specifically described, in the same manner as the configuration described referring to
Note that, in the test information processing device 1a , the multiple security data storage positions in the data area 17 are changed from the positions in an actual processing device. For example, the fourth security data SD, the third security data SC, the second security data SB and the first security data SA are respectively arranged at the first address E1, the third address E3, the fourth address E4 and the sixth address E6 in sequence. Therefore, the content of the reference address table 161 in the test program P2 is as follows.
The content of the reference address table 161:
First address E1—Fourth security data SD
Third address E3—Third security data SC
Fourth address E4—Second security data SB
Sixth address E6—First security data SA
Note that a key-registered flag and an authentication data-registered flag are stored at the same addresses in both the data area 17 shown in
Therefore, when the first processing PA is implemented in the test information processing device 1a , the first security data SA which is to be used for the first processing PA is acquired from the sixth address E6 in the data area 17, based on the reference address table 161. This is the same for other processing.
In the configuration shown in
The content of the reference address table 161:
First address E1—Fourth security data SD
Third address E3—Third security data SC
Fourth address E4—Second security data SB
Sixth address E6—First security data SA
However, in the mass information processing device 1, the security data is stored in the data area 17 in the following manner.
The content of the data area 17:
First address E1—First security data SA
Second address E2—Fourth security data SD
Fourth address E4—Second security data SB
Sixth address—Third security data SC
As shown in
As described, the security data positions are changed between the mass-information processing device 1 and the test information processing device 1a in this embodiment; therefore, the correct security data cannot be acquired even if the internal data reference function for debag for the test program P2 is used. Also, various data cannot be normally output from the mass-produced information processing device 1 if the test program is installed therein; therefore, even if a mass-produced information processing device 1 to which the test program is installed is illegally set up as an ATM, information on a card 50 cannot be acquired in an unauthorized manner. Thus, security is assured on the information processing device 1.
The above-described test program P2 may be configured for the internal data reference function not to be run if a machine authentication is not normally finished. According to this configuration, since a machine authentication is not normally finished in the mass-produced information processing device 1 to which the test program P2 is installed, the internal data reference function cannot be run.
The above-described information processing device 1 may be configured such that once the mass-production program P1 is installed in the program area 16a, a machine authentication is required to update the program. According to this configuration, unless a measure to avoid a machine authentication is taken, it is difficult to install the test program P2 in the mass-produced information processing device 1. Therefore, a fraud act won't be easily allowed on the mass-produced information processing device 1 with installation of the test program P2.
The above-described information processing device 1 may be configured such that once the mass-production program P1 is installed in the program area 16, a machine authentication is required to run the security function or to access the data area 17. According to this configuration, in the mass-produced information processing device 1 in which the test program P2 is installed, unless a measure to avoid a machine authentication is taken, the security function cannot be run and the data area 17 cannot be accessed. Therefore, a fraud act won't be easily allowed on the mass-produced information processing device 1 with installation of the test program P2.
The above-mentioned information processing device 1 may be configured such that, if the test program P2 is installed in the program area 16, the operation thereof may be halted. According to this configuration, unless a measure to avoid the operational halt of the information processing device 1, which will be caused by the installation of the test program P2, a fraud act won't be easily allowed on the mass-produced information processing device 1 by installation of the test program P2.
While the description above refers to particular embodiments of the present invention, it will be understood that many modifications may be made without departing from the spirit thereof. The accompanying claims are intended to cover such modifications as would fall within the true scope and spirit of the present invention.
The presently disclosed embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims, rather than the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
| Number | Date | Country | Kind |
|---|---|---|---|
| 2018-180046 | Sep 2018 | JP | national |