×

Security arrangement and method for controlling access to a protected system

  • US 5,805,674 A
  • Filed: 03/08/1996
  • Issued: 09/08/1998
  • Est. Priority Date: 01/26/1995
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for controlling access to a protected system by a user utilizing a calling unit to provide call information, comprising:

  • determining if the user is an authorized user associated with the calling unit to reduce substantially the ability of a non-authorized user to gain access to the protected system,storing subscriber information relating to said authorized user to facilitate verifying that the user is said authorized user, said subscriber information including authentication information and security level information associated with said authorized user;

    detecting an indicator of potential fraudulent activity;

    adjusting said security level information in response to the detection of said potential fraudulent activity indicator for indicating that a higher probability of fraudulent activity exists;

    determining a given set of verification information to be input by the system user corresponding to a given level of said security level information, said given set of verification information corresponding to a certain subset of said authentication information, wherein said given set of verification information is adjusted according to the given level of said security level information for a given attempted use of the system;

    requesting the system user to input said given set of verification information, wherein said certain subset of authentication information is communicated to the user for enabling the user to repeat said certain subset of authentication information;

    comparing a user generated set of verification information received from the user with said certain subset of authentication information to verify that the user attempting to use the system is said authorized user, wherein access to the system by the user attempting to use the system is enabled when said user generated set of verification information corresponds substantially with said certain subset of authentication information;

    determining the connection status of the calling unit at the time the user attempts to gain access;

    adjusting said security level information to reflect the maximum probability that fraudulent activity is present when the connection status of said calling unit indicates that it is being used concurrently by another user to access the protected system;

    requesting said another user to input another given set of verification information; and

    disconnecting said another user when said another user generated set of verification information does not correspond to said certain subset of authentication information.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×