False Banking, Credit Card, and Ecommerce System
First Claim
Patent Images
1. A method for deterring cyber attacks and for tracing and tracking cyber attackers comprising:
- a. a source of seemingly legitimate but false online access credentials,b. a means for inputting said credentials into criminal malware systems,c. a means for accepting said credentials and granting apparent online access,d. a means for reporting said access using said credentials to a user.
0 Assignments
0 Petitions
Accused Products
Abstract
A false banking, credit card, and ecommerce system provides a family of inter-related computer software programs and processes that can a) generate and distribute seemingly valid false credentials that are made available to be “stolen” by criminals, b) provide an assortment of seemingly valid websites, business servers, or ecommerce sites that will apparently accept the false credentials, and c) track each use and provide trace information for use by law enforcement to apprehend and prosecute cyber offenders.
-
Citations
11 Claims
-
1. A method for deterring cyber attacks and for tracing and tracking cyber attackers comprising:
-
a. a source of seemingly legitimate but false online access credentials, b. a means for inputting said credentials into criminal malware systems, c. a means for accepting said credentials and granting apparent online access, d. a means for reporting said access using said credentials to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of identifying low-activity remote cyber attackers of a computer system comprising the steps of:
-
a. migrating the subject system to a new URL, b. creating a replica system with dummy data at the prior URL b. notifying all legitimate system users of a new system URL via an out of band method, d. maintaining the replica system at the prior URL, and e. logging any further system access as potentially unauthorized, wherein the method of designing and maintaining such subject system further comprises; f. steps for creating the parallel replica system as part of the original system build, g. steps for maintaining the dummy replica database as part of the standard system maintenance process, h. incorporating an automated cutover process as part of the original delivered system, that performs steps a-e above, using the already existing replica system and database of steps f-g.
-
-
10. A method for concealing true user files on a computer system to potentially prevent data theft by remote attackers comprising the steps of:
-
a. identifying a true user directory to be camouflaged, b. selecting a set of innocuous looking ghost directory and file names, c. copying true user files to the ghost location using the ghost names, d. overwriting the true files with compressible random data, and e. making a database entry equating the ghost location with the original true location.
-
-
11. (canceled)
Specification