×

Method and system for detection of clone authenticator

  • US 8,601,588 B1
  • Filed: 06/30/2011
  • Issued: 12/03/2013
  • Est. Priority Date: 06/30/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of operating a data processing system to respond to potential use of a clone authenticator capable of mimicking behavior of a legitimate authenticator known to an authentication system of the data processing system, comprising:

  • by the authentication system, engaging in a series of authentication operations, each authentication operation involving apparent use of the legitimate authenticator based on an authenticator identifier supplied to the authentication system therefor, each authentication operation including receiving and storing corresponding values of one or more authenticator variables that normally change in a known authenticator-specific way during the series of authentication operations; and

    by the authentication system, for each of the authentication operations as a current authentication operation;

    applying a risk analysis function to the stored values of the authenticator variables to generate a risk indicator signal indicating a level of risk that the clone authenticator is in use, the risk analysis function including detection of an abnormal change of the authenticator variables during the series of authentication operations; and

    outputting the risk indicator signal to an access controller that operates, based on the level of risk indicated by the risk indicator signal, to selectively inhibit an otherwise successful current authentication operation involving apparent use of the legitimate authenticator,wherein each of the series of authentication operations is performed as part of a corresponding one of a series of separate accesses to a service provided by a service system of the data processing system, each authentication operation including a respective application of the risk analysis function and outputting of the risk indicator signal based on values of the authenticator variables received and stored over corresponding preceding authentication operations, and wherein the otherwise successful authentication operation selectively inhibited by the risk indicator signal is a most recent one of the series of authentication operations.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×