Using trusted communication channel to combat user name/password theft
First Claim
1. A method for using a trusted communication channel to combat user name/password theft, comprising the steps of:
- detecting an access attempt from an untrusted system;
making an immediate contact with a user of a trusted system when said access attempt from said untrusted system is first detected;
asking said user to confirm whether or not access via said untrusted system should be allowed;
permitting or denying said access via said untrusted system in response to said confirmation; and
developing experience with regard to work patterns of said user, and an expectation that a particular system is used by said user;
wherein a trusted system is a system where said user has been granted access repeatedly over a course of time.
8 Assignments
0 Petitions
Accused Products
Abstract
A technique for defining a system with enhanced trust is disclosed, in which an immediate contact is made with the user on the enhanced trust system when a compromise is first detected, e.g. when there is a second log in attempt from another location. Using these communications channels, the service can often contact the compromised user and ask for confirmation of the results, i.e. to change password or login, from a reduced trust machine. As a result, even if an attacker steals a password, the true user on the enhanced trust machine is able to preclude a login or preclude a password change. In each case, if the user of the enhanced trust machine does not respond within some short period of time, then a less trusted machine can be allowed to proceed. The invention comprehends two definitions of an enhanced trust machine. In a first embodiment of the invention, an enhanced trust machine is a machine where the user is currently logged in at the time that the second, less trusted machine attempts a login. A second embodiment of the invention comprehends an enhanced trust machine where the user has logged in repeatedly over a course of numerous weeks, as compared with a lesser trusted machine that the user has never logged into before and which is now asking for a change of the password. In this case, the system may or may not find the less trusted machine to be just that based on actions that are experientially inconsistent with what is expected.
-
Citations
6 Claims
-
1. A method for using a trusted communication channel to combat user name/password theft, comprising the steps of:
-
detecting an access attempt from an untrusted system;
making an immediate contact with a user of a trusted system when said access attempt from said untrusted system is first detected;
asking said user to confirm whether or not access via said untrusted system should be allowed;
permitting or denying said access via said untrusted system in response to said confirmation; and
developing experience with regard to work patterns of said user, and an expectation that a particular system is used by said user;
wherein a trusted system is a system where said user has been granted access repeatedly over a course of time. - View Dependent Claims (2)
-
-
3. A method for determining if a system is a trusted system, comprising the steps of:
-
detecting an access attempt at an untrusted system;
using a messaging system to make immediate contact with a user of a trusted system;
asking said user for confirmation with regard to one or more actions to be taken in connection with said untrusted system; and
precluding said one or more actions if said user refuses to provide affirmative conformation;
wherein said user of said trusted system confirms that said actions at said untrusted system may be permitted by any of entering a password and typing a special password.
-
-
4. An apparatus for using enhanced trust to combat user name/password theft, comprising:
-
a mechanism for detecting an access attempt from an untrusted system;
a messaging system for making an immediate contact with a user of a trusted system when said access attempt from said untrusted system is first detected;
a mechanism for asking said user to confirm whether or not access via said untrusted system should be allowed;
a mechanism for permitting or denying said access via said untrusted system in response to said confirmation; and
a mechanism for developing experience with regard to work patterns of said user, and an expectation that a particular system is used by said user;
wherein a trusted system is a system where said user has been granted access repeatedly over a course of time. - View Dependent Claims (5)
-
-
6. An apparatus for determining if a system is a trusted system, comprising:
-
a mechanism for detecting an access attempt at an untrusted system;
a messaging system for making immediate contact with a user of a trusted system;
a mechanism for asking said user for confirmation with regard to one or more actions to be taken in connection with said untrusted system; and
a mechanism for precluding said one or more actions if said user refuses to provide affirmative conformation;
wherein said user of said trusted system confirms that said actions at said untrusted system may be permitted by any of entering a password and typing a special password.
-
Specification