METHOD OF DETECTING UNAUTHORIZED ACCESS TO SOFTWARE AND NOTIFICATION THEREOF Russian patent published in 2019 - IPC H04L29/06 

Abstract RU 2705019 C2

FIELD: physics.

SUBSTANCE: invention relates to computer engineering. Disclosed is a method of responding to unauthorized access to a communication device, comprising: determining, by a security software application on a communication device, access to a communication device by an unauthorized user, wherein the communication device is configured to communicate with the telecommunication network wirelessly over the first communication channel, wherein the first communication channel is a cellular telephone network; generating, by the communication device, security notification data in response to determining that an unauthorized user accessed the communication device; and providing data communication device with security notification or derived data from security notification data to access device via second communication channel.

EFFECT: enabling response to unauthorized access to a communication device, which provides improved protection against attacks associated with unauthorized access to a communication device.

23 cl, 10 dwg

Similar patents RU2705019C2

Title Year Author Number
SYSTEMS AND METHODS FOR INTEROPERABLE NETWORK TOKEN PROCESSING 2014
  • Dill Mettyu
  • Laksminarayanan Prasanna
  • Pauell Glenn
  • Shits Dzhon
  • Karpenter Endryu
RU2669081C2
SYSTEM AND METHOD FOR ROBUST VALIDATION OF TRANSACTIONS 2011
  • Khammad Ajman
RU2580086C2
SECURE REMOTE PAYMENT TRANSACTION PROCESSING 2014
  • Shits Dzhon
  • Vagner Kim
  • Obyue Kristian
  • Lyu Frederik
  • Karpenko Igor
  • Pauell Glenn
  • Pirzadekh Kiushan
RU2674329C2
SYSTEMS AND METHODS FOR COMMUNICATING RISK USING TOKEN ASSURANCE DATA 2014
  • Dill Mettyu
  • Laksminarayanan Prasanna
  • Pauell Glenn
  • Shits Dzhon F.
  • Karpenter Endryu
RU2681366C2
REMOTE PAYMENT TRANSACTIONS PROTECTED PROCESSING, INCLUDING AUTHENTICATION OF CONSUMERS 2014
  • Makhotin Oleg
  • Pirzadekh Kiushan
RU2663476C2
MULTIPLE-DEVICE TRANSACTION VERIFICATION 2016
  • Jin, Jing
  • Nelsen, Mark
  • Sheets, John
  • Wagner, Kim
RU2711464C2
TOKENIZATION REQUEST VIA ACCESS DEVICE 2015
  • Dimmick, James
RU2708945C2
ADVANCE AUTHORIZATION OF DIGITAL REQUESTS 2016
  • Cash, Duane
  • Howard, Kelvan
RU2713703C2
AUTHENTICATION OF OPERATIONS USING NETWORK 2007
  • Khammad Ajman
  • Fehjz Patrik
  • Karlson Mark
RU2480922C2
VERIFICATION OF PORTABLE CONSUMER DEVICES 2014
  • Khammad Ajman
RU2645593C2

RU 2 705 019 C2

Authors

Aabye, Christian

Youdale, Robert

Nosseir, Mohamed

Singh, Brijendra

Hillar, Paul

Dates

2019-11-01Published

2015-12-22Filed