Method of communications and communication network intrusion protection methods and intrusion attempt detection system
0 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.
-
Citations
79 Claims
-
1-25. -25. (canceled)
-
26. A method for protecting a communications device, which is connected to a communications system, against an unauthorized intrusion, said method comprising:
-
providing the communications device with at least one variable identifier;
providing the at least one variable identifier for use in accessing the communications device to entities authorized to access said communications device, said variable identifier being provided to a user address book and assigned with a permanent identifier, wherein said permanent identifier is available to a user, but not said variable identifier;
sensing the presence or absence of said variable identifier before granting access to said communications device;
providing access to said communications device when the use of said at least one correct variable identifier is sensed, and denying access to said communications device when the absence of the correct at least one variable identifier is sensed during an attempt to access said communications device; and
providing said communications device with at least one new variable identifier periodically and providing said at least one new variable identifier to entities authorized to access said communications device, said new variable identifier being provided to said user address book and assigned with said permanent identifier, wherein said permanent identifier is available to the user, but not said new variable identifier. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
45. A system for protecting a communications device, which is connected to a communications system, against an unauthorized intrusion, said system comprising:
-
means for providing the communications device with at least one variable identifier;
means for providing the at least one variable identifier for use in accessing the communications device to entities authorized to access said communications device, said variable identifier being provided to a user address book and assigned with a permanent identifier, wherein said permanent identifier is available to a user, but not said variable identifier;
means for sensing the presence or absence of said variable identifier before granting access to said communications device;
means for providing access to said communications device when the use of said at least one correct variable identifier is sensed, and denying access to said communications device when the absence of the correct at least one variable identifier is sensed during an attempt to access said communications device; and
means for providing said communications device with at least one new variable identifier periodically and providing said at least one new variable identifier to entities authorized to access said communications device, said new variable identifier being provided to said user address book and assigned with said permanent identifier, wherein said permanent identifier is available to the user, but not said new variable identifier. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. A computer-readable medium including one or more computer-readable instructions embedded therein for protecting a communications device, which is connected to a communications system, against an unauthorized intrusion, and configured to cause one or more computer processors to perform the steps of:
-
providing the communications device with at least one variable identifier;
providing the at least one variable identifier for use in accessing the communications device to entities authorized to access said communications device, said variable identifier being provided to a user address book and assigned with a permanent identifier, wherein said permanent identifier is available to a user, but not said variable identifier;
sensing the presence or absence of said variable identifier before granting access to said communications device;
providing access to said communications device when the use of said at least one correct variable identifier is sensed, and denying access to said communications device when the absence of the correct at least one variable identifier is sensed during an attempt to access said communications device; and
providing said communications device with at least one new variable identifier periodically and providing said at least one new variable identifier to entities authorized to access said communications device, said new variable identifier being provided to said user address book and assigned with said permanent identifier, wherein said permanent identifier is available to the user, but not said new variable identifier. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79)
-
Specification