Secret supplemental username
First Claim
Patent Images
1. A method for facilitating system access on a server to a threatened user account located on a network through a supplemental username, the method comprising the steps of:
- detecting, by a threat counter associated with the system, a threat to a user account, the threat comprising at least five failed attempts to access the user account within five minutes, a failed attempt comprising receiving an incorrect username and password combination;
restricting system access to the user account by through the system disabling a primary username associated with the user account;
generating, by the server, a notification that the user account has been restricted;
generating, by the server, a supplemental username associated with the account; and
securely delivering the supplemental username.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods for a secret supplemental username are provided. In one example, a method includes the steps of detecting a threat to an account with a primary username and password and disabling the primary username associated with the account in response to the threat. The method includes the additional steps of generating a supplemental username associated with the account and securely communicating the supplemental username.
8 Citations
14 Claims
-
1. A method for facilitating system access on a server to a threatened user account located on a network through a supplemental username, the method comprising the steps of:
-
detecting, by a threat counter associated with the system, a threat to a user account, the threat comprising at least five failed attempts to access the user account within five minutes, a failed attempt comprising receiving an incorrect username and password combination; restricting system access to the user account by through the system disabling a primary username associated with the user account; generating, by the server, a notification that the user account has been restricted; generating, by the server, a supplemental username associated with the account; and securely delivering the supplemental username.
-
-
2. A method for facilitating system access on a server to a threatened account located on a network, comprising:
-
detecting, by a threat counter associated with the system, a threat to an account associated with a primary username and a password; disabling, by the server, the primary username associated with the user account in response to the threat; generating, by the server, a supplemental username associated with the user account; and securely communicating the supplemental username. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for facilitating system access on a server to a threatened account located on a network, comprising:
-
creating, by the server, a supplemental username associated with the threatened account based at least in part on user input; detecting, by a threat counter associated with the system, a threat to an account associated with a primary username and a password; disabling, by the server, the primary username associated with the user account in response to the threat; enabling, by the server, the created supplemental username associated with the user account; and generating, by the server, a notification that the account has been restricted.
-
Specification