`McNair
`
`54 SECURITY SYSTEM PROVIDING LOCKOUT
`FOR INVALID ACCESSATTEMPTS
`
`75) Inventor: Bruce E. McNair, Holmdel, N.J.
`73) Assignee: Lucent Technologies Inc., Murray Hill,
`N.J.
`
`(21) Appl. No.: 409,482
`(22
`Filed:
`Mar. 21, 1995
`Related U.S. Application Data
`
`63 Continuation of Ser. No. 886,539, May 20, 1992, aban
`doned.
`I51) Int. Cl. ............................................. H04Q 1/00
`52 U.S. Cl. ............. 340/825.31; 340/576; 340/825.56;
`340/825.34
`58 Field of Search ......................... 3401825.31, 825.34,
`340/825.56, 576; 380/34; 70/267, 271;
`235/382, 377, 380; 920/1, 5
`References Cited
`U.S. PATENT DOCUMENTS
`9/1975 Davies ........................................ 90215
`3,905,461
`3,953,769 4/1976 Sopko .......
`340/825.31
`4,492,959
`1/1985 Mochida ............................ 34.0/825.56
`
`56)
`
`
`
`IIHIH IIII
`US005559505A
`11
`Patent Number:
`5,559,505
`45 Date of Patent:
`Sep. 24, 1996
`
`4,723,625 2/1988 Komlos ................................... 340/576
`4,992,783 2/1991 Zdunek ...............
`340/825.31
`5,081,675
`l/1992 Kittirutsunetorn .......................... 380/4
`OTHER PUBLICATIONS
`K. Dehnad "A Simple Way of Improving the Login Secu
`rity', Computers and Security, vol. 8, No. 7, 1989, pp.
`607-611.
`Primary Examiner-Brian Zimmerman
`Attorney, Agent, or Firm-Ronald D. Slusky
`(57)
`ABSTRACT
`A security system controlling access to a resource is
`arranged to operate such that when an attempt to access a
`resource using a password or PIN fails, the time interval "t'
`that must elapse before a subsequent attempt at access can
`be successful, is incremented. By making the increments
`increasingly large (illustratively, an exponential function of
`the number "n" of unsuccessful attempts), repeated access
`attempts by hackers or other unauthorized users is discour
`aged, because they simply cannot wait the time needed to
`make a large number of trial and error attempts. On the other
`hand, valid users, while experiencing a delay prior to access,
`are nevertheless able to gain access, rather than being
`completely "lockedout'. This approach is a better compro
`mise between access control and denial.
`17 Claims, 3 Drawing Sheets
`
`UNSUCCESSFUL
`ATTEMPTS
`
`SUCCESSFUL
`ATTEMPTS
`
`d
`
`$
`
`i5
`
`TIME
`PERIOD ""
`
`t
`
`o 9 0 d
`
`1 2 3 4 5 6 7 8
`NUMBER OF ATTEMPTS "n"
`
`UNIFIED PATENTS EXHIBIT 1020
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 1 of 7
`
`
`
`U.S. Patent
`
`Sep. 24, 1996
`
`Sheet 1 of 3
`
`5,559,505
`
`FIG. 1
`
`
`
`110
`
`MICROPROCESSOR
`
`RESOURCE-12
`
`UNIFIED PATENTS EXHIBIT 1020
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 2 of 7
`
`
`
`U.S. Patent
`
`Sep. 24, 1996
`
`Sheet 2 of 3
`
`5,559,505
`
`FIC. 2
`
`2O1
`
`2O3
`
`"USER" ENTERS
`PASSWORD
`
`221
`
`< y, she
`
`YES
`
`207
`
`205
`
`TELL USER
`THAT THIS
`ACCESS ATTEMPT
`IS DISALLOWED
`
`225
`
`WAIT
`TIME
`PERIOD ""
`
`INCREASE "t"
`
`USER IS
`GRANTED ACCESS
`
`208
`
`
`
`
`
`DECREMENT BY "d"
`
`211
`
`PERFORM USER
`REQUESTS
`
`USER LOGS OUT
`
`215
`
`UNIFIED PATENTS EXHIBIT 1020
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 3 of 7
`
`
`
`U.S. Patent
`
`Sep. 24, 1996
`
`Sheet 3 of 3
`
`5,559,505
`
`FIG. 3
`
`UNSUCCESSFUL
`ATTEMPTS
`
`SUCCESSFUL
`ATTEMPTS
`
`d
`
`$
`
`TIME
`PERIOD ""
`
`i5
`
`
`
`4.
`
`5
`
`1 2 3 4 5 6 7 8
`NUMBER OF ATTEMPTS "n"
`
`UNIFIED PATENTS EXHIBIT 1020
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 4 of 7
`
`
`
`5,559,505
`
`- 1
`SECURITY SYSTEMPROVIDING LOCKOUT
`FOR INVALID ACCESSATTEMPTS
`
`This application is a continuation of application Ser. No.
`07/886,539, filed on May 20, 1992 now abandoned.
`
`5
`
`FIELD OF THE INVENTION
`This invention relates generally to security systems for
`preventing unauthorized access to computers, telecommu
`nications networks and the like, and, in particular, to security
`systems which provide a "lockout' capability denying
`access in the event invalid passwords, personal identification
`numbers (PINs), etc. are used in attempts to gain access.
`
`10
`
`15
`
`2
`To counter the threat of an attacker guessing a password
`by trial and error, other security systems use a control
`mechanism sometimes known as "lockout' that relies on
`counting unsuccessful attempts and completely stopping
`access to the person seeking access once there have been
`"too many” unsuccessful access attempts. When the system
`is "locked', subsequent access attempts, both valid and
`invalid, will be blocked. There are, unfortunately, problems
`with this approach, since it essentially trades "Access Con
`trol” for "Denial of Service'. Specifically, by completely
`cutting off access after a preset but relatively small number
`of unsuccessful access attempts, the hacker is frustrated by
`stringent access control, but the legitimate user who unfor
`tunately erred during attempted access attempts is also
`undesirably denied service or access. On the other hand, if
`lockout is not used at all, or is only instituted after a
`relatively large number of access attempts, the legitimate
`user may gain access more easily, but the hacker may also
`more frequently get through to the computer, network or
`other resource being accessed. To date, there has been no
`compromise solution.
`
`SUMMARY OF THE INVENTION
`In accordance with the present invention, a security
`system controlling access to a resource is arranged to
`operate such that when a user's attempt to access a resource
`using a password fails, the time interval "t” that must elapse
`before a subsequent attempt at access by that user can be
`successful, is increased. By making the increments increas
`ingly large (illustratively, an exponential function of the
`number 'n' of unsuccessful attempts), repeated access
`attempts by hackers or other unauthorized users is discour
`aged, because they simply cannot wait the time needed to
`make a large number of trial and error attempts. On the other
`hand, valid users, while experiencing a delay prior to access,
`are nevertheless able to gain access, rather than being
`completely "locked-out'.
`In accordance with a feature of this invention, the value
`of "t” may be decreased in relatively small decrements "d"
`in response to each of "m' subsequent valid access attempts.
`By maintaining the value of "t” at a high level after multiple
`unauthorized access attempts, the authorized user is alerted
`that there may have been an attempt at unauthorized access.
`Also, an attempt by a hacker to time access attempts to
`correspond to valid user actions is frustrated. The approach
`used in the present invention is thus a better compromise
`between access control and denial.
`
`BRIEF DESCRIPTION OF THE DRAWING
`The invention will be better appreciated by consideration
`of the following detailed description, when read in light of
`the accompanying drawing in which:
`FIG. 1 is a block diagram of a security system embodying
`the access control system of the present invention;
`FIG. 2 is a logic flow diagram illustrating the steps
`followed in the system of FIG. 1; and
`FIG. 3 is a graph illustrating one example of the relation
`ship, in accordance with this invention, between the number
`'n' of unsuccessful access attempts made by a user seeking
`access to a resource, the number 'm' of successful access
`attempts made thereafter, and the value of "t' indicating the
`time interval that must elapse before a subsequent attempt at
`access by that user can be successful.
`
`BACKGROUND OF THE INVENTION
`The proliferation of remotely accessed computer and
`telecommunications systems have increased the need for
`improved security systems which check for valid passwords,
`PINS, and access codes/authentication codes (collectively
`referred to herein as "passwords') before granting access.
`While breaches of security can take many forms, one of the
`most common forms of attack by unauthorized users (some
`times called "hackers') is educated guessing and/or trial and
`error to discover the valid password through repeated, albeit
`usually unsuccessful, access attempts. With each attempt,
`the hacker readjusts the password being used; he/she actu
`ally gains valuable information from each denial, since most
`existing security systems permit access "if and only if the
`correct password is entered, and deny access if any other
`password is entered, so that a denial reveals that an
`attempted password is actually invalid. The trial and error
`process is most often automated by the hacker, so that
`convergence to a correct password can sometimes undesir
`ably be very fast.
`In order to defeat the hacker or other unauthorized access
`seeker, legitimate users are instructed not only to keep
`passwords secret, but also to choose them carefully to avoid
`guessing. Sometimes it is difficult to insure that authorized
`users haven't chosen trivial variants of easily guessable
`words or sequences.
`One attempt to improve access security was described by
`K. Dehnad in an article entitled "A Simple Way of Improv
`ing the Login Security”, Computers and Security, Vol. 8, No.
`7, 1989, pages 607-11. According to the author, the advan
`tage gained by a hacker in repeated access attempts can be
`reduced by controlling the probability (p) that an authorized
`user will gain access to the target system even when the
`proper password is entered. This variability has the effect of
`reducing the information obtained by the hacker in being
`denied access: he/she cannot be sure that the denial is due to
`the fact that an invalid password was used, and thus may
`have to repeat the attempt, thereby increasing the number of
`trial and error attempts that may be necessary. This approach
`necessitates that authorized users be occasionally inconve
`nienced by having to enter the correct password more than
`once: if p=0.95, the authorized user will, on average, have to
`make about 105 attempts to gain access 100 times. Dehnad
`also suggests that the value of "p' can be reduced, thereby
`increasing the penalty imposed on a hacker if repeated
`unsuccessful access attempts are detected. While the author
`argues that this may be an acceptable price to pay for
`enhanced security, alternative solutions which have addi
`tional flexibility are desired.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`UNIFIED PATENTS EXHIBIT 1020
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 5 of 7
`
`
`
`5,559,505
`
`O
`
`15
`
`20
`
`3
`DETALED DESCRIPTION
`Referring first to FIG. 1, a user 101 is connected to a
`resource 121 via a security system designated generally as
`10. Resource 121 can be a computer, a telecommunications
`switch, an automatic teller machine (ATM), or any other
`instrumentality to which access is generally restricted to
`authorized users. Security system 110 includes a switch 111
`which must be "closed' in order for user 101 to access
`resource 121. When switch 111 is "open", access is blocked
`or denied. The state or status of switch 111 is controlled by
`a microprocessor 115 in security system 110 that performs
`logical operations under the control of programs stored in an
`associated memory 117. The process carded out by the
`stored programs is illustrated in FIG. 2, discussed below.
`Persons skilled in the art will understand that the represen
`tation of FIG. 1 is illustrative, that switch 111 may be a
`logical or physical switch, i.e., any instrumentality that
`either permits or denies access to resource 121, and that user
`101, security system 110 and resource 121 can be partially
`or totally co-located or separated and interconnected by
`appropriate linkages such as communication lines.
`The process of FIG. 2 begins in step 201, when user 101
`desires to access resource 121, and accordingly communi
`cates with and supplies a password to microprocessor 115 in
`step 203. This password can be an alphanumeric code or
`other indicia that can be recognized by microprocessor 115
`as valid or invalid. Common examples are passwords asso
`ciated with making long distance phone calls, banking
`transactions at ATM's, logons to computer systems, etc.
`In step 205, the password is compared to a list of valid
`passwords, which illustratively may be stored locally in
`memory 117, or which can be stored remotely and accessed
`via a database query or lookup in well known fashion. If the
`password is determined to be valid, user 101 is granted
`access to resource 121 in step 207. Then, in accordance with
`the invention, if the value of a delay variable “t' (discussed
`more fully below) is determined in step 208 to be greater
`than or equal to the value of a predetermined value 'd', the
`value of "t” is decremented by the amount "d” in step 209,
`and user 101 may continue to access resource 121 as desired,
`in step 211. If the value of "t” was less than "d", then “t' is
`set to zero (or some other predetermined minimum) in step
`210. When user 101 has completed use of resource 121 (e.g.,
`the transaction is completed, the telephone call is termi
`nated, or the computer session is over and the user is ready
`to log-out), the use of resource 121 is terminated in step 213
`and the process returns to step 201 to await a subsequent
`access request.
`If it is determined in step 205 that the password presented
`by user 101 is not valid, the process of FIG. 2 proceeds to
`step 221, in which user 101 is advised that the present access
`attempt was unsuccessful, that access is being disallowed,
`but that the user can try again. This concept is important,
`because it allows the authorized user who has made "an
`honest error' to successively attempt access more than once.
`These subsequent attempts will be successful, once the
`correct password is entered, even though, as described
`below, the valid user will suffer the inconvenience of waiting
`a longer time between access attempts. Then, in step 223, a
`time delay of length 't' is introduced into the access process.
`Initially, the value of “t' may be zero or another relatively
`small value, such as 1 second. However, in step 225, the
`value of "t” is increased. The access process is then repeated
`by returning to step 203.
`If a subsequent attempt to access the resource is invalid,
`the time delay introduced in step 223 is larger than on the
`
`4
`previous attempt, because of the increase introduced in step
`225. The choice of the amount of the increase is a design
`parameter, and can be chosen based upon the desired trade
`off between security against hackers on the one hand and
`inconvenience to the legitimate user on the other hand. In
`most implementations, it is considered advantageous that the
`increase in the value of "t be greater for successive access
`attempts. Mathematically, if 'n' is an integer representing
`the number of attempts made (n=1, 2, . . . ), then t=f(n),
`where the function can be multiplicative, e.g., t=kxn, where
`k is an integer greater than one, exponential, e.g., t-n',
`where k is a number greater than one, or any other function
`that increases relatively rapidly as the number “n” of invalid
`access attempts increases. It is to be noted that the increase
`in the value of "t” that occurs in step 225 (as well as the
`decrease that occurs in step 209) can be implemented by a
`simple calculation performed in processor 115, or a table
`look-up that retrieves a value for "t" associated with each
`value of 'n' from a stored table.
`FIG. 3 is a graph illustrating one example of the relation
`ship, in accordance with this invention, between the number
`"n" of unsuccessful access attempts made by a user seeking
`access to a resource, the number 'm' of successful access
`attempts made thereafter, and the value of “t'. Initially, the
`value of "t” is shown as zero, although a small delay, simply
`due to processing, is normally encountered. In this example,
`after each of the first 5 successive access attempts, the value
`of "t” increases from t to ts by virtue of the increase
`introduced in step 225 of FIG. 2, such that the difference
`between successive values of “t' (corresponding to succes
`sive values of "n") increases substantially. Thus, t minus t
`is less than t minus t, and so on in the example of FIG. 3,
`it is assumed that the hacker is discouraged by the long delay
`experienced after 5 unsuccessful attempts at access, and
`discontinues his/her efforts.
`Thereafter, the authorized user successfully gains access
`to the resource through a series of 'm' additional access
`attempts. Initially, the value of “t' is the value (t) last
`computed in step 225 of FIG. 2. The fact that the delay is
`larger than normal serves to alert the user that a hacking
`episode may have occurred, such that certain protective
`responses may be contemplated. For each subsequent suc
`cessful access attempt, the value of “t' is decremented by an
`amount "d" in step 209 of FIG. 2, such that t=t-(m. * d).
`When tCd, the value of t is set to zero in step 210. This
`"graceful' decrementing of the value of "t" following a
`series of attempts at unauthorized access may be somewhat
`inconvenient to an authorized user, since longer than usual
`delays will be experienced. The inconvenience may be
`warranted, however, because it avoids the risk associated
`with automatic zeroing of the value of "t” following a
`successful access attempt: in that event, there is a possibility
`that a hacker can discover a pattern of authorized access (at
`which "t' is reset by the authorized user) and time his/her
`hacking attempts to coincide with those times, thereby
`taking advantage of the fact that the value of “t' is low. Note
`too that the inconvenience of a slow return to a small value
`of “t' may be avoided by some type of intervention in the
`process of FIG. 2, whereby the value of “t” is explicitly
`reset. This could be accomplished, for example, by the user
`calling a system operator or other individual capable of
`over-riding the process.
`Various modifications can be made to this invention
`without departing from the basic principles outlined above.
`For example, the function by which the value of "t” is
`increased for each of “n” access attempts can be different for
`different users. Also, the value can be different, depending
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`UNIFIED PATENTS EXHIBIT 1020
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 6 of 7
`
`
`
`5
`upon the type of access or the nature of the resource being
`accessed. As an example, if resource 121 is the long distance
`telephone network, an initial determination can be made as
`to the value of the call being placed. For more expensive
`calls, the relationship between the parameters "t” and “n”
`can be adjusted So as to defeat hackers more often than with
`respect to less costly calls.
`I claim:
`1. A system for controlling access of a user to a resource
`comprising
`means for determining the validity of a user-entered
`password,
`means for allowing access to the resource if the password
`is valid,
`means for allowing the same user to re-attempt access to
`said resource after a time interval “t', and
`means for repeatedly increasing the value of “t' as a
`function of the number of invalid access attempts by
`the user.
`2. The system defined in claim 1 wherein “n” is an integer
`representing the number of invalid access attempts by the
`user and 't' is a function of 'n'.
`3. A system for controlling access to a resource compris
`ing
`means responsive to an access request for permitting
`access to said resource upon entry of a valid password
`assigned to a user of said system and for denying access
`to said resource upon entry of an invalid password, and
`means for applying successive requests to said first means
`after a variable time interval “t', the value of said time
`interval being increased as a function of the number of
`entries of invalid passwords.
`4. The invention defined in claim 3 wherein the length of
`said variable time interval 't' is a function of the number 'n'
`of entries of invalid passwords.
`5. A system for controlling access to a resource compris
`ing
`means responsive to an access request for permitting
`access to said resource upon entry of a valid password
`assigned to a user of said system and for denying access
`to said resource upon entry of an invalid password, and
`means for applying successive requests to said first means
`after a variable time interval "t', the value of said time
`interval being increased upon each unsuccessful access
`attempt, said applying means being arranged to decre
`ment, up to a predetermined minimum, the value of
`said time interval upon each of 'm' successful access
`attempts.
`6. The invention defined in claim 5 wherein the length of
`said variable time interval 't' is a function of the number 'n'
`of unsuccessful attempts and the number 'm' of successful
`attempts.
`7. The invention defined in claim 4, wherein said function
`is an exponential function.
`8. Apparatus for permitting access by a user to a resource
`upon entry of a valid password, including means for storing
`a list of valid passwords corresponding to each user of said
`reSOurce,
`means for comparing the password presented by a user
`with the corresponding stored password to determine
`its validity,
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`5,559,505
`
`O
`
`15
`
`20
`
`6
`means for permitting access upon a positive comparison,
`means for denying access upon a negative comparison,
`and
`means for permitting a repeated attempt at access after a
`time period "t', wherein the value of "t' is repeatedly
`increased as a function of the number of unsuccessful
`access attempts by said user.
`9. The invention defined in claim 8, wherein the value of
`'t' is decreased as a function of the number of successful
`access attempts by said user.
`10. A method for controlling access of a user to a resource
`comprising the steps of
`determining the validity or invalidity of a user entered
`password
`allowing access if the password is valid,
`allowing the same user to re-attempt access to said
`resource after a time interval "t', and
`repeatedly increasing the value of 't' as a function of the
`number of invalid access attempts by the user.
`11. The method defined in claim 10, wherein “n” is an
`integer representing the number of invalid access attempts
`by the user and 't' is a non-linear function of “n'.
`12. A method for controlling access to a resource com
`prising the steps of
`responsive to an access request, permitting access to said
`resource upon entry of a valid password assigned to a
`person authorized to access said resource and for
`denying access to said resource upon entry of an invalid
`password, and
`applying successive access requests to said first means
`after a variable time interval, the value of said time
`interval being repeatedly increased as a function of the
`number of access requests in which an invalid pass
`word is entered.
`13. The method defined in claim 12 further including the
`step of decreasing the value of said variable time interval as
`a function of the number of access requests in which a valid
`password is entered.
`14. The method defined in claim 13 wherein said function
`of the number of access requests in which a valid password
`is entered is a geometric function.
`15. A method for permitting access by a user to a resource
`upon entry of a valid password, including the steps of storing
`a list of valid passwords corresponding to each user of said
`IeSOurce,
`comparing the password presented by a user with the
`corresponding stored password to determine its valid
`ity,
`permitting access upon a positive comparison,
`denying access upon a negative comparison, and
`permitting a repeated attempt at access after a time period
`"t', wherein the value of “t' is repeatedly increased as
`a function of the number of unsuccessful access
`attempts by the user.
`16. The method defined in claim 15 wherein the value of
`"t is decreased as a function of the number of successful
`access attempts by said user.
`17. The method defined in claim 15 wherein said function
`is non-linear.
`
`UNIFIED PATENTS EXHIBIT 1020
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 7 of 7
`
`