×

Point of sale system protection against information theft attacks

  • US 9,912,692 B1
  • Filed: 03/27/2015
  • Issued: 03/06/2018
  • Est. Priority Date: 03/27/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • providing, via a software component resident and executing on a point of sale system, a plurality of proactive operational modes selectable by at least one entity through a control and monitoring interface associated with the software component, wherein the proactive operational modes are operative to counter one or more information theft attacks attempting to obtain information comprising sensitive data, entered through the point of sale system, from a volatile memory of the point of sale system, wherein the one or more information theft attacks are initiated by malware resident on the point of sale system, and wherein the proactive operational modes comprise;

    a first operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by creating at least one process executable in the point of sale system that comprises the false information;

    a second operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by injecting the false information into at least one process executing in the point of sale system;

    a third operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, during a given information theft attack that is detected to be in progress by replacing real information from the volatile memory of the point of sale system that is in transit during the given information theft attack with the false information; and

    a fourth operational mode configured to restrict access to at least one operating system function in the point of sale system usable by a given information theft attack to obtain the information from the volatile memory of the point of sale system;

    receiving, at the software component, a selection of one or more of the plurality of proactive operational modes; and

    implementing, via the software component, the one or more selected proactive operational modes;

    wherein the point of sale system comprises a processor and memory configured to execute the software component.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×