Method and system for detecting and preventing an intrusion...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S008000, C713S183000

Reexamination Certificate

active

07093291

ABSTRACT:
A method and a system by which to achieve authentication intrusion detection so as to effectively detect and prevent unauthorized access to and use of a local computer system, or the like, and take appropriate measures. The local system authentication process is redirected to an authenticator broker system (i.e. a secondary authentication system) that makes use of the local system authentication process paths and the local system authenticator file. The authenticator broker system includes an authenticator broker system file having stored therein secret authenticators of prospective users, a mapping file to assign a replacement identifier for the identifier entered by a particular user at the local system and redirected to the secondary system, and a decoy authenticator file to assign a decoy authenticator for the secret authenticator entered by the user and originally stored in the local system authentication file. It is the decoy authenticator that is captured and unknowingly used by the intruder to give away his or her presence. By way of example, the authenticator broker system may be a mainframe computer that is responsible for authentication and access control with respect to a local computer system.

REFERENCES:
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5961593 (1999-10-01), Gabber et al.
patent: 6000033 (1999-12-01), Kelley et al.
patent: 6263369 (2001-07-01), Sitaraman et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6338138 (2002-01-01), Raduchel et al.
patent: 2001/0029496 (2001-10-01), Otto et al.
patent: 2002/0178370 (2002-11-01), Gurevich et al.
patent: 2003/0070074 (2003-04-01), Geller et al.
patent: 2006/0018466 (2006-01-01), Adelstein et al.
patent: WO 9964967 (1999-12-01), None
Auyong, Keok et al. “Authentication Services for Computer Networks and Electronic Messaging Systems”.
Blank-Edelman, David N. “Perl for System Administration, First Edition”, Jul. 2000, <http://www.unix.org.ua/orelly/perl/sysadmin/>.
Hauser, Ralf C. et al. “Reducing the Proliferation of Passwords in Distributed Systems”, 1992.
IBM. IBM Technical Disclosure Bulletin NN9303451, Mar. 1993.
Lin, Hung-Yu et al. “Authentication Protocols for Personal Communication Systems”, 1995 ACM.
Stallings, William. Cryptography and Network Security, Principles and Practices Second Edition, 1999 Prentice-Hall, Inc., pp. 323-341, 350-353 & 480-483.
Weiss, Kenneth P. “When A Password is not a Password”, 1990 IEEE.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for detecting and preventing an intrusion... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for detecting and preventing an intrusion..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for detecting and preventing an intrusion... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3623470

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.