Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, system and computer program product for access control

A technology for access control and access to resources, applied in computer security devices, calculations, instruments, etc., can solve problems such as becoming abolished

Inactive Publication Date: 2008-08-13
INT BUSINESS MASCH CORP
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is acceptable only if the current authentication identifier should provide access to the resource, but when requesters attempt to access the resource with their expired authentication identifier, the current authentication identifier will necessarily be become obsolete
This has the undesired effect of preventing access to the resource by all requestors (including those with up-to-date authentication information)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, system and computer program product for access control
  • A method, system and computer program product for access control
  • A method, system and computer program product for access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Figure 2 is an exemplary block diagram of a computer system suitable for operation of various embodiments of the invention. Central processing unit (CPU) 202 is communicatively coupled to storage 204 and input / output (I / O) interface 206 via data bus 208 . Storage 204 can be any read / write storage device, such as a random access memory (RAM) or a non-volatile storage device. Examples of non-volatile storage devices include disk or tape storage devices. The I / O interface 206 is an interface to a device for inputting or outputting data, or for inputting and outputting data. Examples of I / O devices that can be connected to the I / O interface include keyboards, mice, displays (eg, monitors), and network connections.

[0030]FIG. 3 is an exemplary block diagram of a system for authenticating access to a resource 302 in accordance with a preferred embodiment of the present invention. Many elements of FIG. 3 are the same as those described above with respect to FIG. 1, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of access control for a resource having an associated current authentication identifier for providing access to the resource, a previous authentication identifier, and an incorrect authentication submission limit, the method responding to a request for access to the resource An entity of a resource receives an authentication submission, wherein the authentication submission does not correspond to a current authentication identifier, the method comprising the steps of: preventing access to the resource by the requester; responding to the authentication submission not corresponding to a previous authentication identifier, and satisfying the incorrect authentication submission determining the limit, causing the current authentication identifier to become invalid; and responsive to the determination that the authentication submission corresponds to a previous authentication identifier, maintaining the current authentication identifier used to provide access to the resource.

Description

technical field [0001] The invention relates to the field of access control for resources. In particular it relates to preventing undesired revocation of resource access. Background technique [0002] Access to shared resources can be secured by means of an authentication system using secret identifiers such as passwords. Such shared resources can include computer systems with processors, storage devices, databases, software routines, communication tools, or output devices. The identifier can be shared among requester entities (eg, client computer systems) requesting access to the resource. Such authentication systems are vulnerable to unauthenticated supplicants applying brute force methods to defeat authentication. This brute force method involves requesting access to a resource a large number of times, each time using a different authentication identifier in an attempt to determine the correct identifier. For example, while varying the combinations of allowable charac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/20G06F21/31
CPCG06F21/31G06F2221/2131
Inventor 彼得·J·约翰逊
Owner INT BUSINESS MASCH CORP