Apparatus, system, and method for detecting tampering of fiscal printers

ABSTRACT

An apparatus, system, and method are disclosed for detecting tampering of devices such as fiscal printers. A memory module includes a volatile memory that stores multi-bit data. An operation module allows operation of an electronic device, such as a fiscal printer, in response to determining that the predefined multi-bit data is stored in the volatile memory. A detection module detects an attempt to access the enclosed device where access to the enclosed device is restricted by an enclosure. A tamper switch module disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device. A shutdown module disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory.

BACKGROUND

1. Field of the Invention

This invention relates to detecting tampering of a device and moreparticularly relates to tamper evident devices for protecting fiscalprinters and other electronic devices.

2. Description of the Related Art

In most countries, sellers of goods and services are required to collecttaxes, such as sales taxes, which are later collected by governmentaltax agencies. Point of Sale (“POS”) systems are typically used to recordtransaction data using transaction recording devices. For example, afiscal printer may be provided with the POS system to record and printsales receipts showing an amount of taxes that have been collected by aparticular merchant. These records and receipts may then be used by thegovernment tax agencies to audit merchants and ensure that the amount oftaxes collected by a merchant equals the amount of taxes that are passedfrom the merchant to the government.

In order to ensure integrity of the tax data recorded by a fiscalprinter, it is important that the data be protected from tampering. Aconventional fiscal printer typically uses an existing single or doublestation printer platform and adds logic devices in an enclosure at thebottom of the fiscal printer in order to comply with governmentalregulations. The enclosed logic devices may include devices such as anelectronic journal and fiscal memory which are used to electronicallystore recorded tax data. Such logic devices are typically enclosed in adrawer or compartment that slides into the printer beneath the existingprinter platform so as to be protected from tampering.

Some countries have specific tamper-proof requirements for fiscalprinters and other transaction recording devices. Thus, conventionalfiscal printers in most countries include several tamper-proof measures.For example, a screw or screws for accessing the inside of the printermay be physically sealed or the fiscal memory and electronic journal maybe imbedded in epoxy to prevent access to those devices. However, suchtamper proofing measures have proven insufficient, because the only wayfor an auditor to know if a device has been tampered with is by visualinspection of the device.

Some conventional systems, have utilized a capacitor-based tamper switchto electronically detect when a tamper occurs, but such switches havealso proved insufficient. This is because a capacitor provides only asingle bit of information, so it can be easily bypassed or can result infrequent false tampers being recorded. Thus, tampering remains a problemin most conventional fiscal printing systems.

BRIEF SUMMARY

From the foregoing discussion, it should be apparent that a need existsfor an apparatus, system, and method that detect tampering of atransaction recording device such as a fiscal printer. Beneficially,such an apparatus, system, and method would detect and electronicallyrecord a tamper, or attempted access of a protected device, such that novisual inspection is needed to detect that a tamper has occurred.

The present invention has been developed in response to the presentstate of the art, and in particular, in response to the problems andneeds in the art that have not yet been fully solved by currentlyavailable tamper evident devices. Accordingly, the present invention hasbeen developed to provide an apparatus, system, and method for detectingtampering of a transaction recording device, or other tamper protecteddevice, that overcome many or all of the above-discussed shortcomings inthe art.

The apparatus to detect tampering of an enclosed device is provided witha plurality of modules configured to functionally execute the necessarysteps to make evident that an attempted access to the enclosed devicehas occurred. These modules in the described embodiments include amemory module, an operation module, a detection module, a tamper switchmodule, and a shutdown module.

The memory module includes a volatile memory that stores multi-bit data.The operation module allows operation of an electronic device, such as afiscal printer, in response to determining that the predefined multi-bitdata is stored in the volatile memory. The detection module detects anattempt to access the enclosed device where access to the encloseddevice is restricted by an enclosure. The tamper switch moduledisconnects power to the volatile memory such that the predefinedmulti-bit data stored in the volatile memory is erased in response tothe detection module detecting an attempted access to the encloseddevice. The shutdown module disables operation of the electronic devicein response to determining that the predefined multi-bit data is notstored in the volatile memory. Thus, in this manner, a fiscal printer orother electronic device may be disabled if a user attempts to tamperwith it.

In a further embodiment of the apparatus, the shutdown module disablesprinting operations of the fiscal printer in response to determiningthat the predefined multi-bit data is not stored in the volatile memory.Thus, a merchant may be prevented from making transactions if anattempted access or tamper is detected, and/or an administrator may besignaled that a attempted tamper has occurred.

In one embodiment, the enclosed device includes a non-volatile memoryand disabling operation of the electronic device includes disabling theutilization of the non-volatile memory. The non-volatile memorytypically facilitates operation of the electronic device. For example,the use of an electronic journal or fiscal memory in conjunction with afiscal printer may be disabled. In various embodiments, the non-volatilememory may be utilized by the electronic device to store and preservetransaction data electronically.

In a further embodiment, the detection module may include a switchplaced in contact with a movable surface of the enclosure such thatmovement of the moveable surface above a predetermined threshold causesa detection of an attempt to access the enclosed device. For example,the switch may be configured to trigger if the moveable surface is movedmore than 5 millimeters. In some embodiments, the moveable surface maybe a drawer or a door.

In various embodiments of the apparatus, the memory module, detectionmodule and tamper switch module are housed within the enclosure so as toprevent tampering of the modules as well as to prevent tampering of theenclosed device. In one embodiment, the volatile memory is static randomaccess memory (“SRAM”). In further embodiment, the volatile memory is a1-wire, serial input/output microchip that is connected to the encloseddevice. In a further embodiment, the shutdown module sends a signal tonotify a user that an attempt to access the enclosed device hasoccurred. This is typically done in response to determining that thepredefined multi-bit data is not stored in the volatile memory.

A system of the present invention is also presented to detect tamperingof an enclosed device. The system may be embodied with substantially thesame embodiments and modules described above with regard to theapparatus. In particular, the system, in one embodiment, includes amemory module, an operation module, a detection module, a tamper switchmodule, and a shutdown module.

The memory module includes a volatile memory that stores multi-bit data.The operation module allows operation of an electronic device, such as afiscal printer, in response to determining that the predefined multi-bitdata is stored in the volatile memory. The detection module detects anattempt to access the enclosed device where access to the encloseddevice is restricted by an enclosure. The tamper switch moduledisconnects power to the volatile memory such that the predefinedmulti-bit data stored in the volatile memory is erased in response tothe detection module detecting an attempted access to the encloseddevice. The shutdown module disables operation of the electronic devicein response to determining that the predefined multi-bit data is notstored in the volatile memory. Thus, in this manner, a fiscal printer orother electronic device may be disabled if a user attempts to tamperwith it.

The system may further include various embodiments of the encloseddevice and the electronic device. For example, in one embodiment theelectronic device is a fiscal printer and the enclosed device includessome non-volatile memory for recording transaction data such as a fiscalmemory or electronic journal. Preferably, the electronic device is inelectronic communication with the enclosed device.

In one embodiment, the system includes a transaction processing device,such as a computer system, that is utilized to perform salestransactions, the transaction device utilizing the enclosed device tostore transaction data. In a further embodiment, the transactionprocessing device may utilize the electronic device to print transactiondata. For example a receipt might be printed and provided to a customer.

A method of the present invention is also presented for detectingtampering of an enclosed device. The method in the disclosed embodimentssubstantially includes the steps necessary to carry out the functionspresented above with respect to the operation of the described apparatusand system. In some embodiments, the method may be implemented as acomputer program product.

In one embodiment, the method includes storing predefined multi-bit datain a volatile memory and allowing operation of an electronic device inresponse to determining that the predefined multi-bit data is stored inthe volatile memory. The method also may include detecting an attempt toaccess an enclosed device where access to the enclosed device isrestricted by an enclosure and disconnecting power to the volatilememory such that the predefined multi-bit data stored in the volatilememory is erased in response to the detection module detecting anattempted access to the enclosed device. In a further embodiment, themethod includes disabling operation of the electronic device in responseto determining that the predefined multi-bit data is not stored in thevolatile memory.

Reference throughout this specification to features, advantages, orsimilar language does not imply that all of the features and advantagesthat may be realized with the present invention should be or are in anysingle embodiment of the invention. Rather, language referring to thefeatures and advantages is understood to mean that a specific feature,advantage, or characteristic described in connection with an embodimentis included in at least one embodiment of the present invention. Thus,discussion of the features and advantages, and similar language,throughout this specification may, but do not necessarily, refer to thesame embodiment.

Furthermore, the described features, advantages, and characteristics ofthe invention may be combined in any suitable manner in one or moreembodiments. One skilled in the relevant art will recognize that theinvention may be practiced without one or more of the specific featuresor advantages of a particular embodiment. In other instances, additionalfeatures and advantages may be recognized in certain embodiments thatmay not be present in all embodiments of the invention.

These features and advantages of the present invention will become morefully apparent from the following description and appended claims, ormay be learned by the practice of the invention as set forthhereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

In order that the advantages of the invention will be readilyunderstood, a more particular description of the invention brieflydescribed above will be rendered by reference to specific embodimentsthat are illustrated in the appended drawings. Understanding that thesedrawings depict only typical embodiments of the invention and are nottherefore to be considered to be limiting of its scope, the inventionwill be described and explained with additional specificity and detailthrough the use of the accompanying drawings, in which:

FIG. 1 is a schematic block diagram illustrating one embodiment of asystem to detect tampering of an electronic device in accordance withthe present invention;

FIG. 2 is a schematic block diagram illustrating a further embodiment ofa system to detect tampering of an electronic device in accordance withthe present invention;

FIG. 3 is a schematic block diagram illustrating one embodiment oftamper detection modules utilized to detect tampering of an electronicdevice in accordance with the present invention;

FIG. 4 is a schematic block diagram illustrating one embodiment of asystem to detect tampering of an electronic device in accordance withthe present invention; and

FIG. 5 is a schematic flow chart diagram illustrating one embodiment ofa method for detecting tampering of an electronic device in accordancewith the present invention.

DETAILED DESCRIPTION

Many of the functional units described in this specification have beenlabeled as modules, in order to more particularly emphasize theirimplementation independence. For example, a module may be implemented asa hardware circuit comprising custom VLSI circuits or gate arrays,off-the-shelf semiconductors such as logic chips, transistors, or otherdiscrete components. A module may also be implemented in programmablehardware devices such as field programmable gate arrays, programmablearray logic, programmable logic devices or the like.

Modules may also be implemented in software for execution by varioustypes of processors. An identified module of executable code may, forinstance, comprise one or more physical or logical blocks of computerinstructions which may, for instance, be organized as an object,procedure, or function. Nevertheless, the executables of an identifiedmodule need not be physically located together, but may comprisedisparate instructions stored in different locations which, when joinedlogically together, comprise the module and achieve the stated purposefor the module.

Indeed, a module of executable code may be a single instruction, or manyinstructions, and may even be distributed over several different codesegments, among different programs, and across several memory devices.Similarly, operational data may be identified and illustrated hereinwithin modules, and may be embodied in any suitable form and organizedwithin any suitable type of data structure. The operational data may becollected as a single data set, or may be distributed over differentlocations including over different storage devices, and may exist, atleast partially, merely as electronic signals on a system or network.Where a module or portions of a module are implemented in software, thesoftware portions are stored on one or more computer readable media.

Reference throughout this specification to “one embodiment,” “anembodiment,” or similar language means that a particular feature,structure, or characteristic described in connection with the embodimentis included in at least one embodiment of the present invention. Thus,appearances of the phrases “in one embodiment,” “in an embodiment,” andsimilar language throughout this specification may, but do notnecessarily, all refer to the same embodiment.

Reference to a computer readable medium may take any form capable ofstoring machine-readable instructions on a digital processing apparatus.A computer readable medium may be embodied by a transmission line, acompact disk, digital-video disk, a magnetic tape, a Bernoulli drive, amagnetic disk, a punch card, flash memory, integrated circuits, or otherdigital processing apparatus memory device.

Furthermore, the described features, structures, or characteristics ofthe invention may be combined in any suitable manner in one or moreembodiments. In the following description, numerous specific details areprovided, such as examples of programming, software modules, userselections, network transactions, database queries, database structures,hardware modules, hardware circuits, hardware chips, etc., to provide athorough understanding of embodiments of the invention. One skilled inthe relevant art will recognize, however, that the invention may bepracticed without one or more of the specific details, or with othermethods, components, materials, and so forth. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring aspects of the invention.

The schematic flow chart diagrams included herein are generally setforth as logical flow chart diagrams. As such, the depicted order andlabeled steps are indicative of one embodiment of the presented method.Other steps and methods may be conceived that are equivalent infunction, logic, or effect to one or more steps, or portions thereof, ofthe illustrated method. Additionally, the format and symbols employedare provided to explain the logical steps of the method and areunderstood not to limit the scope of the method. Although various arrowtypes and line types may be employed in the flow chart diagrams, theyare understood not to limit the scope of the corresponding method.Indeed, some arrows or other connectors may be used to indicate only thelogical flow of the method. For instance, an arrow may indicate awaiting or monitoring period of unspecified duration between enumeratedsteps of the depicted method. Additionally, the order in which aparticular method occurs may or may not strictly adhere to the order ofthe corresponding steps shown.

FIG. 1 is a schematic block diagram illustrating one embodiment of asystem 100 for detecting tampering of an electronic device in accordancewith the present invention. In one embodiment, the system 100 includes atransaction processing device 102 and a fiscal printer 104. Although,this application primarily refers to the use of a transaction processingdevice 102, such as a computer system or computer-based cash register,in conjunction with a fiscal printer 104, it is contemplated that thepresent invention could be used with other like devices in which tamperdetection may be needed as will be recognized by those of skill in theart.

The transaction processing device 102 is typically a device, such as apersonal computer, that can be used to process sales transactions thatare commonly performed in conjunction with the sale of goods andmerchandise. Of course, other devices outside the realm of salestransaction processing are also contemplated such as other types ofpersonal computers, laptops, PDAs, cell phones, and the like which maybe used to record and store sensitive data at risk of being tamperedwith.

The transaction processing device 102 may be configured to include theequipment necessary to receive, process, and record payments from acustomer in exchange for goods. For example, the transaction processingdevice 102 might include cash register type components such as a drawerfor storing and protecting cash and/or a credit card processing machinefor receiving payment via credit card. The transaction processing device102 may include a display such as a computer monitor or LCD screen forpresenting sales amounts and transaction summaries to a user orcustomer. In some embodiments, the transaction processing device 102 maybe implemented as a personal computer (“PC”) based electronic cashregister or a point of sale (“POS”) device as will be recognized bythose of skill in the art.

In various embodiments, the transaction processing device 102 mayinclude a keyboard or keypad for inputting transaction data and/or mayinclude a scanner or bar code reader for entering product data. Thetransaction processing device 102 may also be configured to computesales tax or other types of taxes or fees that may be collected by amerchant on behalf of a government or other agency.

Typically, the transaction processing device 102 is in electroniccommunication with the fiscal printer 104. In one embodiment, the fiscalprinter 104 prints and records transaction and tax data. The fiscalprinter 104 may be configured to provide a printed receipt to a customeras well as electronically record the transaction data in a memory forlater use, such as during an audit by a government tax agency. Althoughthe embodiments described herein primarily refer to the use of a fiscalprinter 104, other types of electronic devices 104 are also contemplatedwhich may be in need of tamper protection. For example, the presentinvention may be used to make evident the tampering of electronicdevices 104 such as computer systems, PDAs, video game systems, memorydevices, and various other electronic devices 104 as will be recognizedby those of skill in the art.

As depicted in FIG. 2, the fiscal printer 104 may include an encloseddevice 106 that is preferably protected by an enclosure such that a useris prevented from accessing the enclosed device 106. In someembodiments, the enclosure may include a moveable surface such as a dooror drawer for allowing selective access to the enclosed device 106. Inone embodiment, the enclosed device 106 may include a fiscal memoryand/or electronic journal for recording and storing specific data foreach sales transaction processed using the fiscal printer 104. In afurther embodiment, the enclosed device 106 is integrated within thefiscal printer 104 such that the enclosed device 106 is enclosed andprotected from access within the fiscal printer 104. For example, theenclosed device 106 may be housed in a drawer or compartment in the baseof the fiscal printer.

In other embodiments, the enclosed device 106 may be provided externalto the fiscal printer 104, and may be configured to communicateelectronically with the fiscal printer 104 via cables, buses, or othertypes of connections. For example, the enclosed device 106 may be housedin a separate external compartment such as a lock box, safe, or othertype of protected enclosure as will be recognized by those of skill inthe art. Preferably, the enclosed device 106 receives transaction datafrom the fiscal printer 104, or other electronic device 104, andutilizes the enclosed device 106 to store transaction data or othersensitive data in need of protection from tampering.

The enclosed device 106 preferably includes tamper detection modules 108that perform the logic necessary to detect and record an attemptedaccess or attempted tamper of the enclosed device 106. For example, amerchant may attempt to access the enclosed device 106 to disable,bypass, or corrupt the data stored therein in order to avoid payingtaxes or other fees to a government agency. Thus, the tamper detectionmodules 108, as described in detail below, make evident that such anattempted access has occurred and may prevent operation of the fiscalprinter 104 and/or enclosed device 106 until the devices have beeninspected by an administrator or other investigator. Of course, thetamper detection modules 108 described herein may be used in conjunctionwith other types of tamper prevention and tamper evident devices as willbe recognized by those of skill in the art.

FIG. 3 is a schematic block diagram depicting one embodiment of thetamper detection modules 108. In one embodiment, the tamper detectionmodules 108 may include a memory module 302, an operation module 304, adetection module 306, a tamper switch module 308, and a shutdown module310.

Preferably, the memory module 302 comprises a volatile memory that canbe used to store a code or pattern of predefined multi-bit data.Volatile memory as used herein is memory that maintains storage of dataso long as the volatile memory is receiving power from a power sourcesuch as a power supply or battery. If power is lost, the data stored inthe volatile memory is typically lost or corrupted. Dynamic randomaccess memory (“DRAM”) and static random access memory (“SRAM”) arecommon examples of volatile memory as will be recognized by those ofskill in the art. In at least one embodiment, the volatile memory may beprovided as a 1-wire, serial input/output microchip that is connected tothe enclosed device 106. The 1-wire, serial input/output functionalitymay be used to program the chip with the multi-bit data and to allowcommunication with the volatile memory to determine if the multi-bitdata is, in fact, stored therein. An example of one such chip is theDS2417 1-Wire Time chip with Interrupt from Maxim Integrated Products,Inc. of Sunnyvale, Calif.

In accordance with the present invention, the memory module 302 may beprogrammed or re-programmed by an administrator to store the multi-bitdata in the volatile memory. For example, the volatile memory may havestored therein a particular pattern or code that can be checked to readto determine that power has not been disconnected to the volatilememory. Because the multi-bit data pattern is more complex than a singlecapacitor or simple bit, it will typically be more difficult for a userto bypass the memory module in an attempt to access the enclosed device.

Preferably, the fiscal printer 104 and/or enclosed device 106 may onlybe operable in response to determining that the multi-bit data code isstored in the volatile memory. For example, the fiscal printer 104 andthe enclosed device 106 may be configured to check whether the volatilememory contains the multi-bit data before the devices can be operated.If the multi-bit data is not stored in the volatile memory then thedevices may be disabled as will be described below and an attemptedaccess will be evident.

In one embodiment, the operation module 304 allows operation of thefiscal printer 104 in response to determining that the predefinedmulti-bit data is stored in the volatile memory. For example, theoperation module 304 may check the volatile memory to determine whetherthe multi-bit data is stored therein. If the correct multi-bit datapattern is found in the volatile memory, then the operation module 304may generate a signal indicating that the fiscal printer 104 orelectronic device 104 may continue operation. For example, if theelectronic device 104 is a fiscal printer 104, the merchant will beallowed to continue printing receipts and processing transactions, anddata will continue to be recorded in the non-volatile memory of theenclosed device 106.

In some embodiments, the volatile memory in the memory module 302 may bechecked for the multi-bit data upon each startup of the enclosed device106 and/or electronic device 104. In other embodiments, the volatilememory may be checked for the multi-bit data after each transaction,periodically based on activity or time increments, in response toparticular actions, or in response to various other inputs as will berecognized by those of skill in the art.

The detection module 306 detects an attempt to access the encloseddevice 106 where access to the enclosed device 106 is restricted by anenclosure. For example, if the enclosure housing the enclosed device 106includes a drawer or door, then the unauthorized opening of the draweror door will cause the detection module 306 to detect that an attemptedaccess, or tamper, of the enclosed device 106 has occurred. In oneembodiment, the detection module 306 may include a switch placed incontact with a moveable surface of the enclosure such that movement ofthe moveable surface above a predetermined threshold causes a detectionof an attempt to access the enclosed device 106. For example, a switchmay be configured such that the switch is triggered if a door or drawerof the enclosure is opened or moved more than some predefined threshold,such as 5 millimeters.

As will be recognized by those of skill in the art, numerous types ofmechanical and electrical switches may be utilized to detect movement ofa door or surface. For example, electrical contacts may be used on theenclosure such that a circuit is completed only when a door of theenclosure is closed. In another embodiment, an electromechanical switchmay be used such that movement of a mechanical arm causes the switch toopen or close. An example of one such switch is a Honeywell Micro Switchfrom Honeywell Sensing and Control of Golden Valley, Minn. In variousembodiments, the switch may be configured to respond to a predefinedthreshold of movement such that an attempted access of the encloseddevice 106 will result in the switch being triggered.

Other types of detection devices are also contemplated in accordancewith the present invention such as vibration or impact sensitiveswitches to detect if there is an attempt to penetrate the enclosurethat houses the enclosed device 106. For example, if a saw or drill isused to attempt to cut into the enclosure, the detection module 306 maybe configured to detect vibrations or penetrations of the enclosure.Those of skill in the art will recognize that there are numerous ways todetect an attempted access to an enclosure in accordance with thepresent invention.

The tamper switch module 308 disconnects power to the volatile memory inthe memory module 302 in response to the detection module 306 detectingan attempted access to the enclosed device 106. By disconnecting powerto the volatile memory, the multi-bit data stored in the volatile memoryis erased. For example, if the detection module 306 is utilizing anelectromechanical switch to detect an attempted access, then if theswitch is triggered, the closing or opening of the switch may directlydisconnect power to the volatile memory. In other embodiments, theswitch or other types of detection devices may be used to provide asignal to additional circuitry or switches that may, in turn, disconnectpower to the volatile memory. In a preferred embodiment, the tamperswitch module 308 may include a single pole double throw (SPDT) typeswitch. Such a switch may be configured such that a voltage lead thatprovides power to the volatile memory is switched directly to ground viathe single pole double throw switch in response to an attempted accessto the enclosed device 106. By switching the voltage lead directly toground, the multi-bit data in the volatile memory may be erased veryquickly and efficiently.

In some embodiments, power may be provided to the volatile memory by abattery or standby power during a shutdown of the main power supply thattypically provides power to the volatile memory. In such embodiments,the tamper switch module 308 is preferably configured to disconnect thevolatile memory power from all batteries and other types of standbypower such that the multi-bit data stored in the volatile memory is lostor erased. As depicted in FIG. 4, a volatile memory 402 may be connectedto a power source VDD via a switch 404. Typically, the switch 404 isclosed, thereby allowing power to flow to the volatile memory 402 inorder to maintain storage of the multi-bit data stored in the volatilememory 402. If a tamper signal 406 is received from the detection module306, the tamper signal 406 may cause the switch to open therebydisconnecting the power source VDD from the volatile memory 402. Theloss of power to the volatile memory 402 will cause the multi-bit datato be lost, thereby indicating that an attempted tamper has occurred.

In one embodiment, the tamper switch module 308 may send a signal to thevolatile memory 402, such as a reset signal, that causes the multi-bitdata in the volatile memory to be erased or lost. In a furtherembodiment, the memory 402 may be a non-volatile memory that isconfigured to store the multi-bit data therein. In such an embodiment,the tamper switch module 308 may send a signal to the non-volatilememory that causes the multi-bit data to be erased from the non-volatilememory.

The shutdown module 310 disables operation of the fiscal printer 104 inresponse to the determining that the predefined multi-bit data is notstored in the volatile memory. Similar to the operation module 304, theshutdown module 310 may communicate with the volatile memory todetermine whether the multi-bit data is stored therein. However, if thecorrect multi-bit data pattern is not found in the volatile memory, thenthe shutdown module 310 may generate a signal that disables operation ofthe fiscal printer 104 or electronic device 104. For example, if theelectronic device 104 is a fiscal printer 104, the merchant will not beallowed to continue printing receipts and processing transactions, anddata may no longer be recorded in the non-volatile memory of theenclosed device 106 which may include a fiscal memory and/or anelectronic journal. In this way, it is made evident that an attemptedaccess of the enclosed device 106 has occurred, and attention from anadministrator may be needed before the fiscal printer 104 may beoperated again.

In one embodiment, the shutdown module 310 may send a signal to notify auser that an attempt to access the enclosed device 106 has occurred. Forexample, a message might be sent remotely to a monitoring agency oradministrator, and/or a message may be presented to the local userindicating that the fiscal printer 104 has been disabled and thatattention from an administrator is needed. Typically, operation of thefiscal printer 104 and/or enclosed device 106 may only resume after themulti-bit data is stored back into the volatile memory of the memorymodule 302. For example, once it has become evident that an attemptedtamper has occurred, an administrator may examine the fiscal printer 104and enclosed device 106 to determine what caused the detection of theattempted tamper. Preferably, the administrator may then reprogram thevolatile memory to store the multi-bit data necessary for operation ofthe fiscal printer 104.

In some embodiments, the volatile memory in the memory module 302 may bechecked for the multi-bit data upon each startup of the enclosed device106 and/or fiscal printer 104. In other embodiments, the volatile memorymay be checked for the multi-bit data after each transaction,periodically based on activity or time increments, in response toparticular actions, or in response to various other inputs as will berecognized by those of skill in the art.

FIG. 5 illustrates one embodiment of a method 500 for detectingtampering of an enclosed device 106. The depicted method substantiallyincludes the modules 108 and logic described above with regard to FIGS.1-4. The method 500 begins by storing 502 predefined multi-bit data in avolatile memory. Typically, the volatile memory is in electroniccommunication with an electronic device 104 such that the electronicdevice 104 may determine 504 whether or not the multi-bit data is, infact, stored in the volatile memory.

If the correct predefined multi-bit data is stored in the volatilememory, then a tamper has not occurred and the operation module 204allows 506 normal operation of the electronic device 104. For example,upon startup of a fiscal printer 104, the operation module 204 maydetermine that the proper multi-bit data is stored in the volatilememory and therefore allow operation of the fiscal printer 104 such thatthe printing and recording of transactional data may occur.

Next, the detection module 306 detects 508 whether an attempt to accessthe enclosed device 106 has occurred. For example, the detection module306 may detect whether an access door to an enclosure housing theenclosed device 106 has been opened. If the detection module 306 detectsthat an attempted access of the enclosed device 106 has occurred, thenthe tamper switch module 308 disconnects 510 power to the volatilememory such that the multi-bit data is erased from the volatile memory.

Next, the method 500 returns to determine 504 whether the predefinedmulti-bit data is stored in the volatile memory. If a tamper wasdetected by the detection module 306, then the multi-bit data will havebeen erased and the multi-bit data will not be found in the volatilememory. If the multi-bit data is no longer stored in the volatilememory, the shutdown module 310 disables 512 operation of the electronicdevice 104 and notifies 514 a user or administrator that an attemptedtamper has occurred. The method 500 ends. In this manner, attempts totamper with the enclosed device 106 are made evident to a user and/oradministrator and prevents continued used of the electronic device untilthe multi-bit data is restored to the volatile memory.

The present invention may be embodied in other specific forms withoutdeparting from its spirit or essential characteristics. The describedembodiments are to be considered in all respects only as illustrativeand not restrictive. The scope of the invention is, therefore, indicatedby the appended claims rather than by the foregoing description. Allchanges which come within the meaning and range of equivalency of theclaims are to be embraced within their scope.

What is claimed is:
 1. An apparatus comprising: a memory modulecomprising a volatile memory, the volatile memory storing a codetherein, the code comprising predefined multi-bit data, the volatilememory comprising a serial input/output microchip and the predefinedmulti-bit data is stored in the volatile memory serially, the codestored in a particular location in the volatile memory; an operationmodule that allows operation of a fiscal printer in response todetermining that the code is stored in the particular location withinthe volatile memory; a detection module that detects an attempt toaccess an enclosed device, access to the enclosed device restricted byan enclosure, the enclosed device in electronic communication with thefiscal printer; a tamper switch module that disconnects power to thevolatile memory in response to the detection module detecting anattempted access to the enclosed device, the code stored in the volatilememory is erased in response to disconnecting power to the volatilememory; and a shutdown module that disables printing operations of thefiscal printer and sends a signal to notify a user that an attempt toaccess has occurred in response to determining that the code is notstored in the particular location in the volatile memory, wherein theshutdown module disables printing operations of the fiscal printer inresponse to determining that the code is not stored in the volatilememory, wherein said modules comprise one or more of hardware circuits,programmable hardware devices and software, the software stored on oneor more non-transitory, computer readable storage devices, wherein whensaid modules comprise software, the apparatus comprises a hardwareprocessor.
 2. The apparatus of claim 1, wherein the fiscal printer is atransaction recording device.
 3. The apparatus of claim 1, wherein theenclosed device comprises a non-volatile memory, and wherein disablingoperation of the fiscal printer comprises disabling the utilization ofthe non-volatile memory, the non-volatile memory facilitating operationof the fiscal printer.
 4. The apparatus of claim 3, wherein thenon-volatile memory comprises one of an electronic journal and a fiscalmemory, the non-volatile memory utilized by the fiscal printer to storetransaction data.
 5. The apparatus of claim 1, wherein the detectionmodule comprises a switch placed in contact with a moveable surface ofthe enclosure, movement of the moveable surface above a predeterminedthreshold causes a detection of an attempt to access the enclosed deviceby actuating the switch.
 6. The apparatus of claim 5, wherein themoveable surface is one of a drawer and a door.
 7. The apparatus ofclaim 1, wherein the memory module, detection module and tamper switchmodule are housed within the enclosure.
 8. The apparatus of claim 1,wherein the volatile memory is static random access memory (“SRAM”). 9.The apparatus of claim 1, wherein the volatile memory is a 1-wire,serial input/output microchip connected to the enclosed device.
 10. Theapparatus of claim 1, wherein the enclosed device is within the fiscalprinter.
 11. A system comprising: an enclosed device, access to theenclosed device restricted by an enclosure; an electronic device inelectronic communication with the enclosed device, the enclosed devicecomprising a fiscal printer; a memory module comprising a volatilememory, the volatile memory storing a code therein, the code comprisingpredefined multi-bit data, the volatile memory comprising a serialinput/output microchip and the predefined multi-bit data is stored inthe volatile memory serially, the code stored in a particular locationin the volatile memory; an operation module that allows operation of anelectronic device in response to determining that the code is stored inthe particular location within the volatile memory; a detection modulethat detects an attempt to access the enclosed device; a tamper switchmodule that disconnects power to the volatile memory in response to thedetection module detecting an attempted access to the enclosed device,the code stored in the volatile memory is erased in response todisconnecting power to the volatile memory; and a shutdown module thatdisables printing operations of the electronic device and sends a signalto notify a user that an attempt to access has occurred in response todetermining that the code is not stored in the particular location inthe volatile memory, wherein said modules comprise one or more ofhardware circuits, programmable hardware devices and software, thesoftware stored on one or more non-transitory, computer readable storagedevices, wherein when said modules comprise software, the apparatuscomprises a hardware processor.
 12. The system of claim 11, furthercomprising a transaction processing device that is utilized to performsales transactions, the transaction processing device utilizing theenclosed device to store transaction data.
 13. The system of claim 12,wherein the transaction processing device is a computer system.
 14. Acomputer program product for detecting tampering of an enclosed device,said computer program product comprising a non-transitory computerreadable storage medium having stored thereon program instructionsexecutable by a processor for: storing a code in a volatile memory, thecode comprising predefined multi-bit data, the volatile memorycomprising a serial input/output microchip and the predefined multi-bitdata is stored in the volatile memory serially, the code stored in aparticular location in the volatile memory; allowing operation of anelectronic device in response to determining that the code is stored inthe particular location in the volatile memory, the electronic devicecomprising a fiscal printer; detecting an attempt to access an encloseddevice, access to the enclosed device restricted by an enclosure, theenclosed device in electronic communication with the electronic device;disconnecting power to the volatile memory in response to the detectionmodule detecting an attempted access to the enclosed device, the codestored in the volatile memory is erased in response to disconnectingpower to the volatile memory; disabling printing operations of theelectronic device in response to determining that the code is not storedin the particular location in the volatile memory; and sending a signalto notify a user that an attempt to access has occurred in response todetermining that the code is not stored in the particular location inthe volatile memory.
 15. The computer program product of claim 14,wherein the electronic device is a transaction recording device.
 16. Amethod comprising: storing a code in a volatile memory, the codecomprising predefined multi-bit data, the volatile memory comprising aserial input/output microchip and the predefined multi-bit data isstored in the volatile memory serially, the code stored in a particularlocation in the volatile memory; allowing operation of an electronicdevice in response to determining that the code is stored in theparticular location in the volatile memory, the electronic devicecomprising a fiscal printer; detecting an attempt to access an encloseddevice, access to the fiscal printer restricted by an enclosure;disconnecting power to the volatile memory in response to the detectionmodule detecting an attempted access to the fiscal printer, the codestored in the volatile memory is erased in response to disconnectingpower to the volatile memory; disabling printing operations of thefiscal printer in response to determining that the code is not stored inthe particular location in the volatile memory; and sending a signal tonotify a user that an attempt to access has occurred in response todetermining that the code is not stored in the particular location inthe volatile memory.
 17. The method of claim 16, further comprisingsending a signal to notify a user that an attempt to access has occurredin response to determining that the code is not stored in the volatilememory.