×

Identifying and processing an unauthorized access request

  • US 20090193263A1
  • Filed: 12/31/2008
  • Published: 07/30/2009
  • Est. Priority Date: 01/26/2008
  • Status: Abandoned Application
First Claim
Patent Images

1. A system for identifying and processing an unauthorized access request to a secured module, said system comprising:

  • an authentication module; and

    a password recognition module;

    wherein said authentication module receives a variable length access code and a corresponding user ID;

    said variable length access code comprises a variable length password and a variable length use code;

    wherein, from a first bit of information on said variable length access code, scanning is started through said variable length access code, bit by bit, until a matching password is recognized using a hash function of said variable length password for said corresponding user ID, or until the last bit of said variable length access code is reached;

    if said matching password is recognized, said variable length access code is divided into said variable length password and said variable length use code;

    if said variable length access code is divided into said variable length password and said variable length use code, said variable length use code is compared with a list of all possible use codes;

    in case of said variable length use code matching with a first entry in said list of all possible use codes, said authentication module allows full access to said secured module;

    in case of said variable length use code matching with a second entry in said list of all possible use codes, said secured module slows down;

    in case of said variable length use code matching with a third entry in said list of all possible use codes, said secured module becomes locked;

    in case of said variable length use code matching with a fourth entry in said list of all possible use codes, said authentication module notifies authorities, security personnel, or police;

    in case of said variable length use code matching with a fifth entry in said list of all possible use codes, said authentication module limits the access to said secured module;

    in case of said variable length use code matching with a sixth entry in said list of all possible use codes, said authentication module allows full access to said secured module, and said authentication module notifies authorities, security personnel, or police;

    in case of said variable length use code matching with a seventh entry in said list of all possible use codes, said authentication module allows a limited access to said secured module, and said authentication module notifies authorities, security personnel, or police;

    in case of said variable length use code matching with an eighth entry in said list of all possible use codes, said secured module malfunctions;

    in case of said variable length use code matching with a ninth entry in said list of all possible use codes, a camera monitors;

    in case of said variable length use code matching with a tenth entry in said list of all possible use codes, said authentication module activates a silent alarm;

    in case of said variable length use code matching with an eleventh entry in said list of all possible use codes, said authentication module simulates software corruption; and

    in case of said variable length use code matching with a twelfth entry in said list of all possible use codes, wrong or incomplete information is provided to said user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×