The present invention relates to systems for secure web-prompt processing on point of sale devices.
The following publication is believed to represent the current state of the art:
U.S. Published Patent Application No.: 2008/0270514.
The present invention seeks to provide systems for secure web-prompt processing on point of sale devices.
There is thus provided in accordance with a preferred embodiment of the present invention a point of sale system including at least one proxy server having an internet connection, a web browser operative to download web pages from the internet via the proxy server, and a real time user input limiting trusted computing base module communicating with the web browser and being operative to limit user input to the web pages in real time.
In accordance with a preferred embodiment of the present invention, the trusted computing base module is operative to identify trusted internet pages, which originate from a trusted source or are signed by a trusted authority, and non-trusted internet pages which do not originate from a trusted source or are not signed by a trusted authority. Preferably, the web pages are non-trusted internet pages.
Additionally, the trusted computing base module includes web page parsing functionality. Preferably, the web page parsing functionality is operative to analyze the Document Object Model of a web page and to identify secure web page elements.
In accordance with a preferred embodiment of the present invention, the trusted computing base module includes web page element input limiting functionality which is operative to limit user input to web page elements which are not secure web page elements, in real time. Preferably, the web page element input limiting functionality includes alpha-numeric string entry limiting functionality. Preferably, the alpha-numeric string entry limiting functionality is operative to enforce the “three hot-zone” rule. Preferably, the web page element input limiting functionality is operative to limit input received from one of a keypad, a touchscreen and a smartcard reader.
There is also provided in accordance with another preferred embodiment of the present invention a point of sale system including at least one proxy server having an internet connection, and a plurality of POS devices communicating with the at least one proxy server, at least some of which provide limited internet access via the at least one proxy server. Preferably, the system also includes a POS control server which controls the plurality of POS devices.
In accordance with a preferred embodiment of the present invention, each of the plurality of POS devices includes a web browser operative to download web pages from the internet via the proxy server, and a real time user input limiting trusted computing base module communicating with the web browser and being operative to limit user input to the web pages in real time.
Preferably, the trusted computing base module is operative to identify trusted internet pages, which originate from a trusted source or are signed by a trusted authority, and non-trusted internet pages which do not originate from a trusted source or are not signed by a trusted authority. Preferably, the web pages are non-trusted internet pages.
Additionally, the trusted computing base module includes web page parsing functionality. Preferably, the web page parsing functionality is operative to analyze the Document Object Model of a web page and to identify secure web page elements.
In accordance with a preferred embodiment of the present invention, the trusted computing base module includes web page element input limiting functionality which is operative to limit user input to web page elements which are not secure web page elements, in real time. Preferably, the web page element input limiting functionality includes alpha-numeric string entry limiting functionality. Preferably, the alpha-numeric string entry limiting functionality is operative to enforce the “three hot-zone” rule. Additionally, the web page element input limiting functionality is operative to limit input received from one of a keypad, a touchscreen and a smartcard reader.
The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:
Today's point of sale payment devices are designed to be extremely secure, in order to prevent malicious access to confidential and\or restricted and\or private financial information of those using the devices for executing legitimate business transactions. Therefore, content allowed to be loaded onto the devices is typically restricted to pages or prompts that are static and that are either signed or verified against a signed table of authorized prompts provided by the vendor of the device, thereby preventing disclosure of PIN codes and other transaction data to unauthorized parties.
The aforementioned restrictions prevent merchants from updating and deploying payment device prompts for purposes such as promoting, branding and advertising their business without compromising device security. Maintaining secure prompts is costly in terms of time and logistical effort, and requires expertise and security infrastructure often not available to an individual merchant. The present invention seeks to provide systems and methods for secure web-prompt processing on PIN entry devices such as point of sale (POS) payment devices.
Reference is now made to
The term “proxy server” for the purposes of this application is defined to be any software based mechanism that provides access to remote content which is accessed by using a URL.
As shown in
As seen in
As further shown in
For the purposes of this application, web pages which originate from a trusted source or web pages which are signed by a trusted authority using a known certificate are considered to be trusted web pages. All other web pages are considered to be non-trusted. In the example of
It is a particular feature of the present invention that POS device 100 analyzes all content prior to the display of the content on POS device 100, and prevents prompts which are part of non-trusted web pages from accepting user input which comprises between 4 and 12 consecutive digits. This limitation is effective in preventing entry of PIN codes, which are typically between 4 and 12 digits long. For the purposes of this application, the limitation which prevents accepting user input comprising more than 3 consecutive digits into a single prompt is referred to as the “three hot-zone” rule.
Returning now to
It is a particular feature of the present invention that POS device 100 allows prompts which are part of trusted web pages to accept any user input sequence.
Reference is now made to
Alternatively, as shown in
As shown in
A trusted computing base (TCB) module 220 communicates with web browser 208 and is operative to analyze non-trusted web pages 218 displayed by browser 208 for content that may compromise device security. The TCB module 220 analyzes non-trusted web pages, preferably by analyzing the Document Object Model (DOM) of a non-trusted web page, creates a limitation list of elements that are considered secure and therefore may process user input, and stores the limitation list in a web limitation store 222. For example, DOM elements that do not process numerical inputs are considered to be secure elements. DOM elements that might potentially process numerical inputs are considered to be potentially non-secure, and are not included in the limitation list.
TCB module 220 may also receive communications of user generated events from peripherals 224 which peripherals may include, inter alia, a keypad, a touchscreen and a smartcard reader. The user generated events may include, for example, keystrokes which enter user input in the form of alpha numeric characters, and swiping of a smart card. TCB module 220 analyzes user input originating in any one of peripherals 224 and, based on information stored in limitation store 222 and on characteristics of the user input, ascertains whether it is secure to pass the user input to its relevant DOM element without violating device security policies, such as the “three hot-zone” rule. User input found to be unsecure is thereby ignored and is not processed by the web page.
Reference is now made to
As shown in
As also shown in
While the non-trusted web page is displayed in the browser, the TCB module analyzes (316) user input originating in any one of the peripherals (318) and based on information stored in limitation store 312 and on characteristics of the user input ascertains whether it is secure to pass the user input to its relevant DOM element without violating device security policies, such as the “three hot-zone” rule (320), described hereinabove. User input found to be unsecure is thereby ignored and is not processed by the web page.
User input that is found to be secure is passed to its relevant DOM element on the web page and is processed (322). After the input is processed, the TCB module analyzes the DOM of the non-trusted web page to ascertain whether the DOM of the non-trusted web page has been modified as a result of the processing of the user input (324). If the DOM of the non-trusted web page has not been modified, the TCB module returns to receive and analyze (316) additional user input entered via peripherals 318. If the DOM of the non-trusted web page has been modified, the TCB module returns to analyze the modified DOM before receiving and analyzing any additional user input (308).
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the present invention includes both combinations and subcombinations of the various features described hereinabove as well as modifications thereof which would occur to persons skilled in the art upon reading the foregoing description and which are not in the prior art.
Number | Name | Date | Kind |
---|---|---|---|
4180856 | Check et al. | Dec 1979 | A |
5371798 | McWhortor | Dec 1994 | A |
6003763 | Gallagher | Dec 1999 | A |
6360952 | Kimlinger | Mar 2002 | B1 |
7958555 | Chen et al. | Jun 2011 | B1 |
8220047 | Soghoian et al. | Jul 2012 | B1 |
20020063152 | Goodwin, III | May 2002 | A1 |
20020180584 | McGregor | Dec 2002 | A1 |
20020194081 | Perkowski | Dec 2002 | A1 |
20030037236 | Simon et al. | Feb 2003 | A1 |
20050038787 | Cheung et al. | Feb 2005 | A1 |
20050210173 | Kehoe | Sep 2005 | A1 |
20080235103 | Baccas et al. | Sep 2008 | A1 |
20080270514 | Soares Pi Farias | Oct 2008 | A1 |
20090158145 | Schering | Jun 2009 | A1 |
20090276358 | Dutta | Nov 2009 | A1 |
Number | Date | Country |
---|---|---|
03065178 | Aug 2003 | WO |
Entry |
---|
An Office Action dated May 30, 2012, which issued during the prosecution of European Patent Application No. 06848662.0. |
Hypercom Corporation: “ePic: Internet-Enable POS”, 2000, pp. 1-13, XP002626585. |
Office Action dated Jul. 12, 2012 which issued during the prosecution of U.S. Appl. No. 11/465,479. |
Number | Date | Country | |
---|---|---|---|
20120117664 A1 | May 2012 | US |