APPARATUS, SYSTEM, AND METHOD FOR DETECTING TAMPERING OF FISCAL PRINTERS
First Claim
1. An apparatus to detect tampering of an enclosed device, the apparatus comprising:
- a memory module comprising a volatile memory, the volatile memory storing predefined multi-bit data therein;
an operation module that allows operation of an electronic device in response to determining that the predefined multi-bit data is stored in the volatile memory;
a detection module that detects an attempt to access an enclosed device, access to the enclosed device restricted by an enclosure;
a tamper switch module that disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device; and
a shutdown module that disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus, system, and method are disclosed for detecting tampering of devices such as fiscal printers. A memory module includes a volatile memory that stores multi-bit data. An operation module allows operation of an electronic device, such as a fiscal printer, in response to determining that the predefined multi-bit data is stored in the volatile memory. A detection module detects an attempt to access the enclosed device where access to the enclosed device is restricted by an enclosure. A tamper switch module disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device. A shutdown module disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory.
46 Citations
20 Claims
-
1. An apparatus to detect tampering of an enclosed device, the apparatus comprising:
-
a memory module comprising a volatile memory, the volatile memory storing predefined multi-bit data therein; an operation module that allows operation of an electronic device in response to determining that the predefined multi-bit data is stored in the volatile memory; a detection module that detects an attempt to access an enclosed device, access to the enclosed device restricted by an enclosure; a tamper switch module that disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device; and a shutdown module that disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system to detect tampering of an enclosed device, the system comprising:
-
an enclosed device, access to the enclosed device restricted by an enclosure; an electronic device in electronic communication with the enclosed device; a memory module comprising a volatile memory, the volatile memory storing predefined multi-bit data therein; an operation module that allows operation of an electronic device in response to determining that the predefined multi-bit data is stored in the volatile memory; a detection module that detects an attempt to access an enclosed device; a tamper switch module that disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device; and a shutdown module that disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer program product comprising a computer readable medium having computer usable program code executable to perform operations to detect tampering of an enclosed device, the operations of the computer program product comprising:
-
storing predefined multi-bit data in a volatile memory; allowing operation of an electronic device in response to determining that the predefined multi-bit data is stored in the volatile memory; detecting an attempt to access an enclosed device, access to the enclosed device restricted by an enclosure; disconnecting power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device; and disabling operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory. - View Dependent Claims (19)
-
-
20. A method to detect tampering of an enclosed device, the method comprising:
-
storing predefined multi-bit data in a volatile memory; allowing operation of an electronic device in response to determining that the predefined multi-bit data is stored in the volatile memory; detecting an attempt to access an enclosed device, access to the enclosed device restricted by an enclosure; disconnecting power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device; and disabling operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory.
-
Specification