Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic pre-boot storage encryption key

A pre-boot, key technology, applied in key distribution, can solve all ATM problems such as vulnerability, encryption, time-consuming, etc.

Active Publication Date: 2017-08-08
NCR CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encrypting an ATM's entire hard drive is a time-consuming process and is usually only done once when initially installing the ATM's hard drive
In addition, multiple ATMs often share the same location on the hard drive where their decryption / encryption keys are located, so that if a location on one ATM is compromised, all ATMs become vulnerable, and all ATMs will need to re-encrypt their hard drives as the shared location of the key is known

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic pre-boot storage encryption key
  • Dynamic pre-boot storage encryption key
  • Dynamic pre-boot storage encryption key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] First refer to figure 1 , which is a diagram of a banking system 100 that provides dynamic pre-boot hard drive encryption key management for automated teller machines (ATMs) according to an exemplary embodiment. It should be noted that components are shown schematically in a greatly simplified form and only those components are shown which are relevant for understanding the embodiment.

[0035] In addition, various components (labeled on figure 1 Middle) and presents the arrangement of these components. It should be noted that there may be more or fewer components without departing from the dynamic pre-boot hard disk drive (HD) encryption key (EK) management teachings presented here and below.

[0036] The banking system 100 includes a bank branch 110 , an ATM host / switch 130 and a core banking system 140 . The bank branch 110 includes: ATM 111 and branch server 120 .

[0037] ATM 111 includes one or more central processing units (CPUs) 112 , volatile memory 113 , n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

During a pre-boot cycle of a device an algorithm is obtained from a first portion of a hard drive (115 or 402) (step 210). The algorithm is executed to obtain a key (step 220). The key is used to decrypt a second portion of the hard drive (115 or 402) to obtain a second key (step 230). The second key is used to dynamically decrypt a third portion of the hard drive (115 or 402). A new randomly generated version of the algorithm may be produced (step 250). The new version of the algorithm may be stored in the first portion of the hard drive (115 or 402). The new version of the algorithm may be executed to produce a new randomly generated version of the key. The new version of the key may be used to reencrypt the second portion of the hard drive (115 or 402) having the second key.

Description

technical field [0001] The present invention relates to dynamic pre-boot storage encryption keys. Background technique [0002] Since automated teller machines (ATMs) process financial transactions for consumers, they are often considered a relatively safe device. However, like any other device with memory and processor capabilities, ATMs are vulnerable to malware, viruses and eavesdropping. [0003] Moreover, ATMs are especially lucrative to any eavesdropper with the ability to compromise the environment in which the ATM is executed. ATMs not only hold currency, but also handle consumers' financial account information. Furthermore, the ATM has access to a secure financial network with access to many different financial institutions, and potentially to branch servers that communicate through a separate network connection to the ATM's core banking system. ATMs can also be networked with each other within a bank branch. Therefore, a compromised ATM is likely to cause secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08G07F19/00
CPCG07F19/209H04L9/0894G06F21/575G06F21/602G06F21/80G06F2221/2107H04L9/0822H04L9/0891G06Q20/1085G06Q20/18H04L9/0861H04L9/14
Inventor 盖麦拉·贾福尔格雷厄姆·福莱特
Owner NCR CORP