Method for entrapping unauthorized computer access

Boots – shoes – and leggings

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

34082534, G06F 1500

Patent

active

047195665

ABSTRACT:
A method of access validation whereby a false system becomes bound to an accessing user if an unacceptable accessing pattern is detected. The false system interacts in a mode similar to the conversational protocols of target systems but remains logically insulated from said target systems. Concurrent messages to security monitors at binding time ensure entrapment.

REFERENCES:
patent: 4087856 (1978-05-01), Attanasio
patent: 4525599 (1985-06-01), Curran et al.
patent: 4531023 (1985-07-01), Levine
patent: 4675815 (1987-06-01), Kuroki et al.
Beardsley, C. W., "Is Your Computer Insecure?", IEEE Spectrum, Jan. 1972, pp. 67-78.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for entrapping unauthorized computer access does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for entrapping unauthorized computer access, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for entrapping unauthorized computer access will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-923739

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.