Method and apparatus for detection of tampering attacks
First Claim
Patent Images
1. A computer-implemented method for detecting an attempted attack on a security system, comprising:
- on a computer, retrieving responsive to a first query a first device parameter from a hardware system requesting access to the security system, the first device parameter being allowed to change during useful life of the hardware system within a defined tolerance without exceeding authentication criteria;
comparing the retrieved first device parameter to a first stored parameter retrieved responsive to an earlier incidence of the first query;
on the computer, retrieving, responsive to a second query made after a random time delay a second device parameter from the hardware system, the second device parameter comprising data that rapidly changes such that the data is different for every query when the hardware system is queried at random time intervals during operation of the hardware system;
comparing the retrieved second device parameter with a second stored parameter retrieved responsive to an incidence of the second query made prior to the time delay; and
triggering an authentication failure in response to (i) detecting a difference between the retrieved first device parameter and the first stored parameter that exceeds the defined tolerance or (ii) detecting no change between the retrieved second device parameter and the second stored parameter.
10 Assignments
0 Petitions
Accused Products
Abstract
A method for detecting an attempted attack on a security system. In one preferred embodiment of the present invention, the method includes the step of retrieving a parameter from a hardware system, wherein the parameter changes during an operation of the hardware system. Then, comparing the retrieved parameter with a previously stored parameter; and, detecting a lack of change between the retrieved parameter and the previously stored parameter. An apparatus and an article of manufacture for detecting an attempted attack on a security system is also disclosed.
94 Citations
17 Claims
-
1. A computer-implemented method for detecting an attempted attack on a security system, comprising:
-
on a computer, retrieving responsive to a first query a first device parameter from a hardware system requesting access to the security system, the first device parameter being allowed to change during useful life of the hardware system within a defined tolerance without exceeding authentication criteria; comparing the retrieved first device parameter to a first stored parameter retrieved responsive to an earlier incidence of the first query; on the computer, retrieving, responsive to a second query made after a random time delay a second device parameter from the hardware system, the second device parameter comprising data that rapidly changes such that the data is different for every query when the hardware system is queried at random time intervals during operation of the hardware system; comparing the retrieved second device parameter with a second stored parameter retrieved responsive to an incidence of the second query made prior to the time delay; and triggering an authentication failure in response to (i) detecting a difference between the retrieved first device parameter and the first stored parameter that exceeds the defined tolerance or (ii) detecting no change between the retrieved second device parameter and the second stored parameter. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus for detecting a tampering attempt in a security system, comprising:
-
a processor; a memory coupled to the processor, the memory configured to cause the processor to execute a method comprising; retrieving, responsive to a first query a first device parameter from a hardware system requesting access to the security system, the first device parameter being allowed to change during useful life of the hardware system within a defined tolerance without exceeding authentication criteria; comparing the retrieved first device parameter to a first stored parameter retrieved responsive to an earlier incidence of the first query; retrieving, responsive to a second query made after a random time delay a second device parameter from the hardware system, the second device parameter comprising data that rapidly changes such that the data is different for every query when the hardware system is queried at random time intervals during operation of the hardware system; comparing the retrieved second device parameter with a second stored parameter retrieved responsive to an incidence of the second query made prior to the time delay; and triggering an authentication failure in response to (i) detecting a difference between the retrieved first device parameter and the first stored parameter that exceeds the defined tolerance or (ii) detecting no change between the retrieved second device parameter and the second stored parameter. - View Dependent Claims (8, 9, 10)
-
-
11. An article of manufacture comprising a non-transitory computer-readable medium having instructions stored thereon for causing a processor to perform a method for detecting an attempted attack on a security system, the method comprising:
-
retrieving responsive to a first query a first device parameter from a hardware system requesting access to the security system, the first device parameter being allowed to change during useful life of the hardware system within a defined tolerance without exceeding authentication criteria; comparing the retrieved first device parameter to a first stored parameter retrieved responsive to an earlier incidence of the first query; retrieving, responsive to a second query made after a random time delay, a second device parameter from the hardware system, the second device parameter comprising data that rapidly changes such that the data is different for every query when the hardware system is queried at random time intervals during an operation of the hardware system; comparing the retrieved second device parameter with a second stored parameter retrieved responsive to an incidence of the second query made prior to the time delay; and triggering an authentication failure in response to (i) detecting a difference between the retrieved first device parameter and the first stored parameter that exceeds the defined tolerance or (ii) detecting no change between the retrieved second device parameter and the second stored parameter. - View Dependent Claims (12, 13, 14)
-
-
15. A computer-implemented method for detecting an attempted attack on a security system, comprising:
-
querying, by the security system, and responsive to a hardware system requesting access to the security system, the hardware system for a device parameter comprising data that rapidly changes such that the data is different for every query when the hardware system is queried at random time intervals during operation of the hardware system; retrieving the device parameter responsive to the query; storing the device parameter for the retrieval by the security system; querying, by the security system and after a random time delay, the hardware system a second time for the device parameter; retrieving an updated device parameter responsive to the second query; comparing the stored device parameter to the updated device parameter; and triggering an authentication failure if the comparison detects no change. - View Dependent Claims (16, 17)
-
Specification