Identifying and processing an unauthorized access request
First Claim
1. A system for identifying and processing an unauthorized access request to a secured module, said system comprising:
- an authentication module; and
a password recognition module;
wherein said authentication module receives a variable length access code and a corresponding user ID;
said variable length access code comprises a variable length password and a variable length use code;
wherein, from a first bit of information on said variable length access code, scanning is started through said variable length access code, bit by bit, until a matching password is recognized using a hash function of said variable length password for said corresponding user ID, or until the last bit of said variable length access code is reached;
if said matching password is recognized, said variable length access code is divided into said variable length password and said variable length use code;
if said variable length access code is divided into said variable length password and said variable length use code, said variable length use code is compared with a list of all possible use codes;
in case of said variable length use code matching with a first entry in said list of all possible use codes, said authentication module allows full access to said secured module;
in case of said variable length use code matching with a second entry in said list of all possible use codes, said secured module slows down;
in case of said variable length use code matching with a third entry in said list of all possible use codes, said secured module becomes locked;
in case of said variable length use code matching with a fourth entry in said list of all possible use codes, said authentication module notifies authorities, security personnel, or police;
in case of said variable length use code matching with a fifth entry in said list of all possible use codes, said authentication module limits the access to said secured module;
in case of said variable length use code matching with a sixth entry in said list of all possible use codes, said authentication module allows full access to said secured module, and said authentication module notifies authorities, security personnel, or police;
in case of said variable length use code matching with a seventh entry in said list of all possible use codes, said authentication module allows a limited access to said secured module, and said authentication module notifies authorities, security personnel, or police;
in case of said variable length use code matching with an eighth entry in said list of all possible use codes, said secured module malfunctions;
in case of said variable length use code matching with a ninth entry in said list of all possible use codes, a camera monitors;
in case of said variable length use code matching with a tenth entry in said list of all possible use codes, said authentication module activates a silent alarm;
in case of said variable length use code matching with an eleventh entry in said list of all possible use codes, said authentication module simulates software corruption; and
in case of said variable length use code matching with a twelfth entry in said list of all possible use codes, wrong or incomplete information is provided to said user.
1 Assignment
0 Petitions
Accused Products
Abstract
The system reuses the classic User ID & Password combination for authentication and adds a third component called a USE code for additional authorization check, as an example. This method allows access to a system when it is requested with correct User ID and Password (i.e., with correct pass code) but with an unauthorized USE code, the system identifies it as an unauthorized access and triggers the proper security measures to minimize the damage and monitor the actions in a way not to alarm the unauthorized user who is using the owner'"'"'s credential to access the system. The USE Code is an extension to the pass code to raise various alarms and have a stepwise access level control based on different inputted values.
-
Citations
1 Claim
-
1. A system for identifying and processing an unauthorized access request to a secured module, said system comprising:
-
an authentication module; and a password recognition module; wherein said authentication module receives a variable length access code and a corresponding user ID; said variable length access code comprises a variable length password and a variable length use code; wherein, from a first bit of information on said variable length access code, scanning is started through said variable length access code, bit by bit, until a matching password is recognized using a hash function of said variable length password for said corresponding user ID, or until the last bit of said variable length access code is reached; if said matching password is recognized, said variable length access code is divided into said variable length password and said variable length use code; if said variable length access code is divided into said variable length password and said variable length use code, said variable length use code is compared with a list of all possible use codes; in case of said variable length use code matching with a first entry in said list of all possible use codes, said authentication module allows full access to said secured module; in case of said variable length use code matching with a second entry in said list of all possible use codes, said secured module slows down; in case of said variable length use code matching with a third entry in said list of all possible use codes, said secured module becomes locked; in case of said variable length use code matching with a fourth entry in said list of all possible use codes, said authentication module notifies authorities, security personnel, or police; in case of said variable length use code matching with a fifth entry in said list of all possible use codes, said authentication module limits the access to said secured module; in case of said variable length use code matching with a sixth entry in said list of all possible use codes, said authentication module allows full access to said secured module, and said authentication module notifies authorities, security personnel, or police; in case of said variable length use code matching with a seventh entry in said list of all possible use codes, said authentication module allows a limited access to said secured module, and said authentication module notifies authorities, security personnel, or police; in case of said variable length use code matching with an eighth entry in said list of all possible use codes, said secured module malfunctions; in case of said variable length use code matching with a ninth entry in said list of all possible use codes, a camera monitors; in case of said variable length use code matching with a tenth entry in said list of all possible use codes, said authentication module activates a silent alarm; in case of said variable length use code matching with an eleventh entry in said list of all possible use codes, said authentication module simulates software corruption; and in case of said variable length use code matching with a twelfth entry in said list of all possible use codes, wrong or incomplete information is provided to said user.
-
Specification