Detecting modifications to financial terminals
First Claim
1. A method of detecting an unauthorized modification of a financial terminal comprising:
- receiving an electromagnetic profile emitted from the financial terminal;
comparing the received electromagnetic profile to a stored electromagnetic profile associated with the financial terminal; and
determining whether the unauthorized modification has been made to the financial terminal based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of detecting unauthorized modifications of financial terminals includes receiving an electromagnetic profile from the terminal, comparing the received profile to a stored profile, and determining whether unauthorized modifications have been made based on the comparison. The determination may be based on a correlation coefficient and the method may include transmitting a stimulus profile in an active mode. A system for detecting unauthorized modifications to financial terminals includes a receiver to receive the emitted profile and a computing device. The computing device compares the received profile to the stored profile to determine whether unauthorized modifications have been made. The system may also include a transmitter to transmit a stimulus profile in an active mode, wherein the received profile is emitted by the financial terminal in response to the stimulus profile. The system may also be incorporated in the financial terminal.
56 Citations
20 Claims
-
1. A method of detecting an unauthorized modification of a financial terminal comprising:
-
receiving an electromagnetic profile emitted from the financial terminal; comparing the received electromagnetic profile to a stored electromagnetic profile associated with the financial terminal; and determining whether the unauthorized modification has been made to the financial terminal based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system adapted to detect an unauthorized modification of a financial terminal comprising:
-
a receiver adapted to receive an electromagnetic profile emitted from the financial terminal; and a computing device operatively coupled to the receiver, the computing device being adapted to compare the received electromagnetic profile to a stored electromagnetic profile associated with the financial terminal, the computing device being adapted to determine whether the unauthorized modification has been made to the financial terminal based on the comparison. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable medium comprising instructions, wherein execution of the instructions by at least one computing device detects an unauthorized modification of a financial terminal by:
-
receiving an electromagnetic profile emitted from the financial terminal; comparing the received electromagnetic profile to a stored electromagnetic profile associated with the financial terminal; and determining whether the unauthorized modification has been made to the financial terminal based on the comparison. - View Dependent Claims (17, 18, 19, 20)
-
Specification