DETECTING UNAUTHORIZED ACTIVITY RELATED TO A COMPUTER PERIPHERAL DEVICE BY MONITORING VOLTAGE OF THE PERIPHERAL DEVICE

    公开(公告)号:US20220139175A1

    公开(公告)日:2022-05-05

    申请号:US17088163

    申请日:2020-11-03

    IPC分类号: G07F19/00 G06F21/75

    摘要: A system includes a motherboard configured to hold electronic devices and allow communication between one or more of the electronic devices, a power supply module configured to supply power to the one or more electronic devices, a peripheral device communicatively coupled to the motherboard using a peripheral port of the motherboard to perform at least one action related to an Automated Teller Machine (ATM), and a monitoring device communicatively coupled to the motherboard. The monitoring device is configured to monitor a voltage associated with the peripheral device and detect when the monitored voltage does not match an expected voltage associated with the peripheral device. In response to the detecting, the monitoring device determines that an unauthorized activity associated with the peripheral device has occurred.

    Detecting unauthorized activity related to a computer peripheral device by monitoring voltage of the peripheral device

    公开(公告)号:US11610457B2

    公开(公告)日:2023-03-21

    申请号:US17088163

    申请日:2020-11-03

    IPC分类号: G07F19/00 G06F21/75

    摘要: A system includes a motherboard configured to hold electronic devices and allow communication between one or more of the electronic devices, a power supply module configured to supply power to the one or more electronic devices, a peripheral device communicatively coupled to the motherboard using a peripheral port of the motherboard to perform at least one action related to an Automated Teller Machine (ATM), and a monitoring device communicatively coupled to the motherboard. The monitoring device is configured to monitor a voltage associated with the peripheral device and detect when the monitored voltage does not match an expected voltage associated with the peripheral device. In response to the detecting, the monitoring device determines that an unauthorized activity associated with the peripheral device has occurred.

    Ensuring Information Security by Utilizing Encryption of Data

    公开(公告)号:US20190050590A1

    公开(公告)日:2019-02-14

    申请号:US15675974

    申请日:2017-08-14

    摘要: Systems for ensuring data security when processing events through various channels are provided. The system may receive a request to process an event. An event processing device identifier may be extracted from the event processing device and encrypted using a first encryption process. The system may receive user identifying information, such as a personal identification number (PIN). The user identifying information may be encrypted with the encrypted event processing device identifier in a second encryption process. The encrypted data may be transmitted for authentication of the user and/or authorization to process the event. A second decryption process may be used to decrypt the encrypted user identifying information and encrypted event processing device identifier. A first encryption process may be used to decrypt the encrypted event processing device. The decrypted information may be used to authenticate the user and/or process the event.

    User Authentication and Authorization
    4.
    发明申请
    User Authentication and Authorization 审中-公开
    用户认证和授权

    公开(公告)号:US20150235214A1

    公开(公告)日:2015-08-20

    申请号:US14184136

    申请日:2014-02-19

    IPC分类号: G06Q20/40 G06Q20/38

    CPC分类号: G06Q20/4012 G06Q20/38215

    摘要: Systems, methods and apparatuses for authenticating a user and/or authorizing use of a reusable payment device associated with the user. In some examples, user identifying information, such as a checking account number, driver's license number, username, or the like, may be received. Based on this received information, a reusable payment device number associated with a reusable payment device of the user may be determined. This information may then be encrypted. Further, additional authenticating information may be received. For instance, a user personal identification number (PIN) may be received. The PIN may also be encrypted. The encrypted PIN and encrypted reusable payment device number may be analyzed to determine whether they are associated with the same reusable payment device. If so, a user may be authenticated.

    摘要翻译: 用于认证用户和/或授权使用与用户相关联的可重复使用的支付设备的系统,方法和设备。 在一些示例中,可以接收诸如检查帐号,驾驶执照号码,用户名等的用户识别信息。 基于该接收到的信息,可以确定与用户的可重复使用的支付设备相关联的可重复使用的支付设备号码。 然后可以对该信息进行加密。 此外,可以接收附加的认证信息。 例如,可以接收用户个人识别号码(PIN)。 PIN也可以被加密。 可以分析加密的PIN和加密的可重复使用的支付设备号码,以确定它们是否与相同的可重用支付设备相关联。 如果是这样,用户可以被认证。