scispace - formally typeset
Patent

Distributed user authentication protocol

Reads0
Chats0
TLDR
In this paper, the authors proposed a distributed authentication system that prevents unauthorized access to any computer system in a distributed environment, where authentication depends on the correctness of the entire set of responses rather than on the response to a single question, which provides a significant increase in the probability of detecting and preventing unauthorized computer access.
Abstract
A distributed authentication system that prevents unauthorized access to any computer system in a distributed environment. Authentication using the present invention involves three distinct phases. In the first phase, user passwords are generated by the computer system and encrypted on a coded card together with a message authentication code to prevent alterations prior to any access attempts. These are complex and impersonal enough not to be easily guessed. This coded card must be used whenever requesting access to the system. Second, in addition to supplying a password, the user is required to correctly respond to a set of randomly selected authentication challenges when requesting access. The correct responses may vary between the right response, a wrong response or no response depending on some predetermined variable, e.g., the day of the week or hour of the day. The dual randomness thus introduced significantly reduces the usefulness of observed logon information. Third, at random times during the session, the user is required again to respond to selected authentication challenges. This detects piggybacking attempts. Since authentication depends on the correctness of the entire set of responses rather than on the response to a single question, the present invention provides a significant increase in the probability of detecting and preventing unauthorized computer access.

read more

Citations
More filters
Patent

System and method for authentication of network users

TL;DR: In this article, the user is presented with a hierarchy of queries based on wallet-type (basic identification) and non-wallet type (more private) information designed to ensure the identity of the user and prevent fraud, false negatives and other undesirable results.
Patent

Mobile account authentication service

TL;DR: In this paper, the authentication service allows a card issuer to verify a card's identity using a variety of authentication methods, such as with the use of tokens, and notifying a merchant whether the cardholder's authenticity has been verified.
Patent

Geographical position/image digital recording and display system

TL;DR: In this article, a geo-addressed map data base and geo-positioning device for relating the position of the system at the time the image is captured to the captured digital image data and the geo-added map.
Patent

Method and apparatus for attaching navigational history information to universal resource locator links on a world wide web page

TL;DR: In this article, a method and apparatus for tracking the navigation path of a user that has been directed to a second site on the WWW from a first sites on the Web is presented.
Patent

A user authentication system and methods thereof

TL;DR: In this paper, a computer system (200) is used to authenticate users of vendors supplying services and/or products to the users, the system having programmed processors providing authentication rules (245a), authenticating users according to the authentication rules responsive to user authentication requests (300), configuring authentication rules in real-time, thereby allowing realtime customization of the system, providing multi-factor user authentication processes (100), using any data sources (230/250) providing information about and or known to users, thereby providing a data agnostic system, and authentication strategies correspond to
References
More filters
Patent

A system for authenticating users and devices in on-line transaction networks

TL;DR: In this article, the authors proposed a method for efficiently protecting transactions and providing authentication of users and devices in on-line systems that transfer funds electronically, dispense cash, or provide a good or permit a service to be utilized.
Patent

Method and apparatus for controlled access to a computer system

TL;DR: In this article, a computer security system protects the computer software from unauthorized access and the computer hardware from unauthorized intrusion by disabling the keyboard and diskette drive at the start of the computer system.
Patent

User authentication system employing encryption functions

TL;DR: In this article, a system which employs a pair of encryption functions f and g in the "log on" protocol of a computer dial-up arrangement is described, and the secrecy of the user's function is maintained by providing the user with an authenticating device having only two ports: a power port and an I/O port.
Patent

Transaction safety system for falsely indicating successful completion of illegal transaction

TL;DR: In this article, a transaction device, having an input portion, and a processing device having a client file, which is located at a processing center, are connected by a telephone line for processing data input on the transaction device.
Patent

Electronic linkage interface control security system and method

TL;DR: An electronic linkage interface control security system for controlling access by a computer terminal (2) to a main computer (6) is described in this article, where the system comprises a Computer Linkage Interface Control (CLIC) module (1) that is coupled to the terminal that generates and stores a random or pseudo-random coupling code for each communications session.