Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2006-08-15
2006-08-15
Louis-Jacques, Jacques H. (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S008000, C713S183000
Reexamination Certificate
active
07093291
ABSTRACT:
A method and a system by which to achieve authentication intrusion detection so as to effectively detect and prevent unauthorized access to and use of a local computer system, or the like, and take appropriate measures. The local system authentication process is redirected to an authenticator broker system (i.e. a secondary authentication system) that makes use of the local system authentication process paths and the local system authenticator file. The authenticator broker system includes an authenticator broker system file having stored therein secret authenticators of prospective users, a mapping file to assign a replacement identifier for the identifier entered by a particular user at the local system and redirected to the secondary system, and a decoy authenticator file to assign a decoy authenticator for the secret authenticator entered by the user and originally stored in the local system authentication file. It is the decoy authenticator that is captured and unknowingly used by the intruder to give away his or her presence. By way of example, the authenticator broker system may be a mainframe computer that is responsible for authentication and access control with respect to a local computer system.
REFERENCES:
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5961593 (1999-10-01), Gabber et al.
patent: 6000033 (1999-12-01), Kelley et al.
patent: 6263369 (2001-07-01), Sitaraman et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6338138 (2002-01-01), Raduchel et al.
patent: 2001/0029496 (2001-10-01), Otto et al.
patent: 2002/0178370 (2002-11-01), Gurevich et al.
patent: 2003/0070074 (2003-04-01), Geller et al.
patent: 2006/0018466 (2006-01-01), Adelstein et al.
patent: WO 9964967 (1999-12-01), None
Auyong, Keok et al. “Authentication Services for Computer Networks and Electronic Messaging Systems”.
Blank-Edelman, David N. “Perl for System Administration, First Edition”, Jul. 2000, <http://www.unix.org.ua/orelly/perl/sysadmin/>.
Hauser, Ralf C. et al. “Reducing the Proliferation of Passwords in Distributed Systems”, 1992.
IBM. IBM Technical Disclosure Bulletin NN9303451, Mar. 1993.
Lin, Hung-Yu et al. “Authentication Protocols for Personal Communication Systems”, 1995 ACM.
Stallings, William. Cryptography and Network Security, Principles and Practices Second Edition, 1999 Prentice-Hall, Inc., pp. 323-341, 350-353 & 480-483.
Weiss, Kenneth P. “When A Password is not a Password”, 1990 IEEE.
Fischer Morland C.
Louis-Jacques Jacques H.
Simitoski Michael J.
LandOfFree
Method and system for detecting and preventing an intrusion... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for detecting and preventing an intrusion..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for detecting and preventing an intrusion... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3623470