Security arrangement and method for controlling access to a protected system
First Claim
1. A method for controlling access to a protected system by a user utilizing a calling unit to provide call information, comprising:
- determining if the user is an authorized user associated with the calling unit to reduce substantially the ability of a non-authorized user to gain access to the protected system,storing subscriber information relating to said authorized user to facilitate verifying that the user is said authorized user, said subscriber information including authentication information and security level information associated with said authorized user;
detecting an indicator of potential fraudulent activity;
adjusting said security level information in response to the detection of said potential fraudulent activity indicator for indicating that a higher probability of fraudulent activity exists;
determining a given set of verification information to be input by the system user corresponding to a given level of said security level information, said given set of verification information corresponding to a certain subset of said authentication information, wherein said given set of verification information is adjusted according to the given level of said security level information for a given attempted use of the system;
requesting the system user to input said given set of verification information, wherein said certain subset of authentication information is communicated to the user for enabling the user to repeat said certain subset of authentication information;
comparing a user generated set of verification information received from the user with said certain subset of authentication information to verify that the user attempting to use the system is said authorized user, wherein access to the system by the user attempting to use the system is enabled when said user generated set of verification information corresponds substantially with said certain subset of authentication information;
determining the connection status of the calling unit at the time the user attempts to gain access;
adjusting said security level information to reflect the maximum probability that fraudulent activity is present when the connection status of said calling unit indicates that it is being used concurrently by another user to access the protected system;
requesting said another user to input another given set of verification information; and
disconnecting said another user when said another user generated set of verification information does not correspond to said certain subset of authentication information.
0 Assignments
0 Petitions
Accused Products
Abstract
The security arrangement includes a computer processor unit coupled to a subscriber information memory to verify whether the user is an authorized user. The subscriber information memory stores subscriber voice information and variable security level information. A prompt memory coupled to the computer processor unit requests the user to input a set of verification information determined by the security level information. The input set of verification information is compared with stored subscriber voice information by a voice analyzer coupled to the subscriber information memory, wherein access to the system is enabled when the input set of verification information corresponds substantially with the subscriber voice information.
-
Citations
9 Claims
-
1. A method for controlling access to a protected system by a user utilizing a calling unit to provide call information, comprising:
-
determining if the user is an authorized user associated with the calling unit to reduce substantially the ability of a non-authorized user to gain access to the protected system, storing subscriber information relating to said authorized user to facilitate verifying that the user is said authorized user, said subscriber information including authentication information and security level information associated with said authorized user; detecting an indicator of potential fraudulent activity; adjusting said security level information in response to the detection of said potential fraudulent activity indicator for indicating that a higher probability of fraudulent activity exists; determining a given set of verification information to be input by the system user corresponding to a given level of said security level information, said given set of verification information corresponding to a certain subset of said authentication information, wherein said given set of verification information is adjusted according to the given level of said security level information for a given attempted use of the system; requesting the system user to input said given set of verification information, wherein said certain subset of authentication information is communicated to the user for enabling the user to repeat said certain subset of authentication information; comparing a user generated set of verification information received from the user with said certain subset of authentication information to verify that the user attempting to use the system is said authorized user, wherein access to the system by the user attempting to use the system is enabled when said user generated set of verification information corresponds substantially with said certain subset of authentication information; determining the connection status of the calling unit at the time the user attempts to gain access; adjusting said security level information to reflect the maximum probability that fraudulent activity is present when the connection status of said calling unit indicates that it is being used concurrently by another user to access the protected system; requesting said another user to input another given set of verification information; and disconnecting said another user when said another user generated set of verification information does not correspond to said certain subset of authentication information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification