Unlock instant, AI-driven research and patent intelligence for your innovation.

Enter Peripheral Security

A technology for peripheral equipment and input commands, applied in the input/output process of data processing, protection of internal/peripheral computer components, transmission systems, etc.

Active Publication Date: 2020-08-07
NCR CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this approach is too restrictive, as authorized users of the ATM may have a legitimate need to access blocked keystrokes or keystroke sequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enter Peripheral Security
  • Enter Peripheral Security
  • Enter Peripheral Security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] First refer to figure 1 , shows a schematic diagram of a banking system for keypad security on an automated teller machine (ATM) according to an exemplary embodiment. It should be noted, however, that the components are shown schematically in a greatly simplified form and only those components that are relevant for understanding the illustrated embodiment are shown.

[0035] Also, for illustration purposes only, depicting ( figure 1 ), and the arrangement in which the components are presented. It should be noted, however, that more or fewer components may be arranged in other ways without departing from the teachings of input peripheral security presented herein and below.

[0036] The banking system 100 includes a bank branch 110 , an ATM host / switch 130 and a core banking system 140 . The bank branch 110 includes: ATM 111 and branch server 120 .

[0037] ATM 111 includes one or more central processing units (CPUs) 112, memory 113 and hard disk drives (HD) 115 (whi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An input peripheral agent (114A or 402) for intercepting input commands on the host (111 or 400) and prior to determining whether to allow the command to be processed by the operating system (115B) of the host (111 or 400), or whether Implement policy conditions and whitelist conditions before ignoring commands on hosts (111 or 400). In one embodiment, the policy conditions and whitelist conditions can be changed dynamically by a remote network manager without changing, stopping and / or restarting the incoming peripheral agent (114A or 402) and / or host (111 or 400) .

Description

technical field [0001] The present invention relates to input peripheral device security. Background technique [0002] Automated Teller Machines (ATMs) are generally considered relatively safe devices because people use them to transact money. However, like any other device with memory and processing power, ATMs are vulnerable to malware, viruses and eavesdropping software. [0003] Modern ATMs often include peripheral device ports or wireless technologies (such as WiFi, Wait). This may allow a peripheral device or device to be paired with the ATM. Generally speaking, wireless technology can guarantee security through encryption keys. Peripheral ports may be hidden from plain sight, but service engineers know where they are and how to access them, and some skilled hackers may know how to access them. [0004] A keypad is a specific peripheral that can facilitate connection to an ATM for legitimate and / or malicious reasons. From the keypad, service engineers can use k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07F19/00
CPCG07F19/201G07F19/209G07F19/211G06F21/44G06F2221/031G06F2221/2101G06F13/4282G06F21/83G06F3/061G06F3/0659G06F3/067G06F2221/2153H04L63/0853H04L63/101
Inventor 安东尼·爱德华·罗珀格雷厄姆·福莱特
Owner NCR CORP