Point of sale system protection against information theft attacks
First Claim
1. A method comprising:
- providing, via a software component resident and executing on a point of sale system, a plurality of proactive operational modes selectable by at least one entity through a control and monitoring interface associated with the software component, wherein the proactive operational modes are operative to counter one or more information theft attacks attempting to obtain information comprising sensitive data, entered through the point of sale system, from a volatile memory of the point of sale system, wherein the one or more information theft attacks are initiated by malware resident on the point of sale system, and wherein the proactive operational modes comprise;
a first operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by creating at least one process executable in the point of sale system that comprises the false information;
a second operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by injecting the false information into at least one process executing in the point of sale system;
a third operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, during a given information theft attack that is detected to be in progress by replacing real information from the volatile memory of the point of sale system that is in transit during the given information theft attack with the false information; and
a fourth operational mode configured to restrict access to at least one operating system function in the point of sale system usable by a given information theft attack to obtain the information from the volatile memory of the point of sale system;
receiving, at the software component, a selection of one or more of the plurality of proactive operational modes; and
implementing, via the software component, the one or more selected proactive operational modes;
wherein the point of sale system comprises a processor and memory configured to execute the software component.
9 Assignments
0 Petitions
Accused Products
Abstract
A method includes selectively implementing, via a component resident and executing on a point of sale system, one or more of a set of proactive operations to counter an information theft attack against the point of sale system. The set of proactive operations comprises: generating false information that appears to be actual information and creating at least one process executable in the point of sale system that comprises the false information; injecting false information that appears to be actual information into at least one process executing in the point of sale system; replacing actual information with false information that appears to be actual information; and blocking at least one process in the point of sale system to prevent actual information from being taken from the point of sale system.
-
Citations
20 Claims
-
1. A method comprising:
-
providing, via a software component resident and executing on a point of sale system, a plurality of proactive operational modes selectable by at least one entity through a control and monitoring interface associated with the software component, wherein the proactive operational modes are operative to counter one or more information theft attacks attempting to obtain information comprising sensitive data, entered through the point of sale system, from a volatile memory of the point of sale system, wherein the one or more information theft attacks are initiated by malware resident on the point of sale system, and wherein the proactive operational modes comprise; a first operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by creating at least one process executable in the point of sale system that comprises the false information; a second operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by injecting the false information into at least one process executing in the point of sale system; a third operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, during a given information theft attack that is detected to be in progress by replacing real information from the volatile memory of the point of sale system that is in transit during the given information theft attack with the false information; and a fourth operational mode configured to restrict access to at least one operating system function in the point of sale system usable by a given information theft attack to obtain the information from the volatile memory of the point of sale system; receiving, at the software component, a selection of one or more of the plurality of proactive operational modes; and implementing, via the software component, the one or more selected proactive operational modes; wherein the point of sale system comprises a processor and memory configured to execute the software component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An article of manufacture comprising a processor-readable storage medium having encoded therein executable code of one or more software programs, wherein the one or more software programs when executed by a processor and a memory associated with a point of sale system perform steps of:
-
providing, via a software component resident and executing on a point of sale system, a plurality of proactive operational modes selectable by at least one entity through a control and monitoring interface associated with the software component, wherein the proactive operational modes are operative to counter one or more information theft attacks attempting to obtain information comprising sensitive data, entered through the point of sale system, from a volatile memory of the point of sale system, wherein the one or more information theft attacks are initiated by malware resident on the point of sale system, and wherein the proactive operational modes comprise; a first operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by creating at least one process executable in the point of sale system that comprises the false information; a second operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by injecting the false information into at least one process executing in the point of sale system; a third operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, during a given information theft attack that is detected to be in progress by replacing real information from the volatile memory of the point of sale system that is in transit during the given information theft attack with the false information; and a fourth operational mode configured to restrict access to at least one operating system function in the point of sale system usable by a given information theft attack to obtain the information from the volatile memory of the point of sale system; receiving, at the software component, a selection of one or more of the plurality of proactive operational modes; and implementing, via the software component, the one or more selected proactive operational modes. - View Dependent Claims (10, 11)
-
-
12. An apparatus comprising:
-
a processor operatively coupled to a memory to form a point of sale system configured to; provide, via a software component resident and executing on the point of sale system, a plurality of proactive operational modes selectable by at least one entity through a control and monitoring interface associated with the software component, wherein the proactive operational modes are operative to counter one or more information theft attacks attempting to obtain information comprising sensitive data, entered through the point of sale system, from a volatile memory of the point of sale system, wherein the one or more information theft attacks are initiated by malware resident on the point of sale system, and wherein the proactive operational modes comprise; a first operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by creating at least one process executable in the point of sale system that comprises the false information; a second operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by injecting the false information into at least one process executing in the point of sale system; a third operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, during a given information theft attack that is detected to be in progress by replacing real information from the volatile memory of the point of sale system that is in transit during the given information theft attack with the false information; and a fourth operational mode configured to restrict access to at least one operating system function in the point of sale system usable by a given information theft attack to obtain the information from the volatile memory of the point of sale system; receive, at the software component, a selection of one or more of the plurality of proactive operational modes; and implement, via the software component, the one or more selected proactive operational modes. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
one or more point of sale systems each comprising a processor operatively coupled to a memory, wherein the processor of a given one of the point of sale systems is configured to execute a software component resident on the given point of sale system; and a controller remote from the one or more point of sale systems, wherein the controller is associated with at least one entity; wherein the software component is configured to; provide a plurality of proactive operational modes selectable by the at least one entity through a control and monitoring interface associated with the software component and operatively coupled to the controller, wherein each one of the plurality of proactive operational modes is operative to counter one or more information theft attacks attempting to obtain information comprising sensitive data, entered through the given point of sale system, from volatile memory of the given point of sale system, wherein the one or more information theft attacks are initiated by malware resident on the given point of sale system, and wherein the proactive operational modes comprise; a first operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by creating at least one process executable in the given point of sale system that comprises the false information; a second operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, by injecting the false information into at least one process executing in the given point of sale system; a third operational mode configured to utilize false information, wherein the false information comprises false sensitive data generated to appear to be real sensitive data, during a given information theft attack that is detected to be in progress by replacing real information from the volatile memory of the point of sale system that is in transit during the given information theft attack with the false information; and a fourth operational mode configured to restrict access to at least one operating system function in the given point of sale system usable by a given information theft attack to obtain the information from the volatile memory of the given point of sale system; receive a selection of one or more of the plurality of proactive operational modes; and implement the one or more selected proactive operational modes. - View Dependent Claims (20)
-
Specification