Unauthorized account access lockout reduction
First Claim
1. An unauthorized passcode access reduction method comprising:
- remotely receiving over a network, by a computer processor of a computing system from a user via a remote system comprising a first IP address, a username of a user and a passcode for access to a secure account or device belonging to said user, wherein said first IP address differs from a second IP address of said computing system;
determining, by said computer processor based on said passcode being determined as an incorrect passcode and determining that said user is accessing said computing system via said first IP address, unauthorized access attempts associated with said secure account or device;
determining, by said computer processor, a quality factor associated with said incorrect passcode with respect to said secure account or device, wherein said quality factor indicates a specified percentage and associated correct position of correct characters within said passcode;
retrieving, by said computer processor from a secure repository, passcode values for said passcode;
comparing, by said computer processor, said passcode values with contents of said passcode; and
performing, by said computer processor based on results of said unauthorized access attempts, results of comparing said quality factor to a predetermined threshold percentage value indicating a threshold percentage and position of correct characters within said passcode, and results of said comparing said passcode values with contents of said passcode, security functions associated with prevention of a false access lockout or reset process with respect to said secure account or device with respect to said incorrect passcode.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for determining unauthorized account access is provided. The method includes receiving a username of a user and a passcode for access to a secure account or device belonging to a user. The passcode is determined to be incorrect. Unauthorized access attempts with respect to the secure account or the device are determined based on based on the incorrect passcode and in response, a quality factor associated with the incorrect passcode with respect to the secure account or device is determined. The quality factor is compared to a threshold value. Security functions associated with the secure account or device with respect to the incorrect passcode and the results of the comparison are performed based on the quality factor and the unauthorized access attempts.
51 Citations
20 Claims
-
1. An unauthorized passcode access reduction method comprising:
-
remotely receiving over a network, by a computer processor of a computing system from a user via a remote system comprising a first IP address, a username of a user and a passcode for access to a secure account or device belonging to said user, wherein said first IP address differs from a second IP address of said computing system; determining, by said computer processor based on said passcode being determined as an incorrect passcode and determining that said user is accessing said computing system via said first IP address, unauthorized access attempts associated with said secure account or device; determining, by said computer processor, a quality factor associated with said incorrect passcode with respect to said secure account or device, wherein said quality factor indicates a specified percentage and associated correct position of correct characters within said passcode; retrieving, by said computer processor from a secure repository, passcode values for said passcode; comparing, by said computer processor, said passcode values with contents of said passcode; and performing, by said computer processor based on results of said unauthorized access attempts, results of comparing said quality factor to a predetermined threshold percentage value indicating a threshold percentage and position of correct characters within said passcode, and results of said comparing said passcode values with contents of said passcode, security functions associated with prevention of a false access lockout or reset process with respect to said secure account or device with respect to said incorrect passcode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computing system comprising a computer processor coupled to a computer-readable memory unit, said memory unit comprising instructions that when executed by the computer processor implements an unauthorized passcode access reduction method comprising:
-
remotely receiving over a network, by said computer processor from a user via a remote system comprising a first IP address, a username of a user and a passcode for access to a secure account or device belonging to said user, wherein said first IP address differs from a second IP address of said computing system; determining, by said computer processor based on said passcode being determined as an incorrect passcode and determining that said user is accessing said computing system via said first IP address, unauthorized access attempts associated with said secure account or device; determining, by said computer processor, a quality factor associated with said incorrect passcode with respect to said secure account or device, wherein said quality factor indicates a specified percentage and associated correct position of correct characters within said passcode;
retrieving, by said computer processor from a secure repository, passcode values for said passcode;comparing, by said computer processor, said passcode values with contents of said passcode; and performing, by said computer processor based on results of said unauthorized access attempts, results of comparing said quality factor to a predetermined threshold percentage value indicating a threshold percentage and position of correct characters within said passcode, and results of said comparing said passcode values with contents of said passcode, security functions associated with prevention of a false access lockout or reset process with respect to said secure account or device with respect to said incorrect passcode. - View Dependent Claims (15, 16, 17)
-
-
18. A computer program product, comprising a computer readable hardware storage device storing a computer readable program code, said computer readable program code comprising an algorithm that when executed by a computer processor of a computer system implements an unauthorized passcode access reduction method, said method comprising:
-
remotely receiving over a network, by said computer processor from a user via a remote system comprising a first IP address, a username of a user and a passcode for access to a secure account or device belonging to said user, wherein said first IP address differs from a second IP address of said computing system; determining, by said computer processor based on said passcode being determined as an incorrect passcode and determining that said user is accessing said computing system via said first IP address, unauthorized access attempts associated with said secure account or device; determining, by said computer processor, a quality factor associated with said incorrect passcode with respect to said secure account or device, wherein said quality factor indicates a specified percentage and associated correct position of correct characters within said passcode;
retrieving, by said computer processor from a secure repository, passcode values for said passcode;comparing, by said computer processor, said passcode values with contents of said passcode; and performing, by said computer processor based on results of said unauthorized access attempts, results of comparing said quality factor to a predetermined threshold percentage value indicating a threshold percentage and position of correct characters within said passcode, and results of said comparing said passcode values with contents of said passcode, security functions associated with prevention of a false access lockout or reset process with respect to said secure account or device with respect to said incorrect passcode. - View Dependent Claims (19, 20)
-
Specification