METHOD AND DEVICE FOR DEFENDING AGAINST ATTACKS TO SYSTEMS COMPRISING A PLUG & PLAY FUNCTION
First Claim
Patent Images
1. Method for recognizing attacks on at least one interface of a computer system, specifically an automated self-service machine, comprising:
- monitoring of the interface to detect changes at the interface;
if changes occur, the probability of an unauthorized attack on the interface is determined based on the type of change;
if the probability is beyond a defined threshold, defensive measures are introduced.
10 Assignments
0 Petitions
Accused Products
Abstract
Method for recognizing attacks to at least one interface of a computer system, in particular an automated self-service machine, comprising: monitoring the interface in order to determine changes at the interface; if changes occur, the change is used to determine the probability that an unallowed attack is occurring at the interface; if the probability is beyond a defined threshold, defensive maneuvers are introduced.
-
Citations
19 Claims
-
1. Method for recognizing attacks on at least one interface of a computer system, specifically an automated self-service machine, comprising:
-
monitoring of the interface to detect changes at the interface; if changes occur, the probability of an unauthorized attack on the interface is determined based on the type of change; if the probability is beyond a defined threshold, defensive measures are introduced. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. Computer system, specifically an automated self-service machine having at least one interface, comprising means for monitoring the interface to determine changes at the interface;
- in the event that changes occur, an ALU determines the probability of an unauthorized attack on the interface based on the type of change;
if the probability is beyond a defined threshold, defensive measures are introduced through additional means. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
- in the event that changes occur, an ALU determines the probability of an unauthorized attack on the interface based on the type of change;
Specification