Browse Prior Art Database

Honeypot Documents - A System and Method to Open Misleading Document After a Number of Invalid Access Attempts

IP.com Disclosure Number: IPCOM000208894D
Publication Date: 2011-Jul-22
Document File: 2 page(s) / 38K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is method to, in the event of an unauthorized user attempting to access secure files, offer an alternative document so that the unauthorized user believes they have opened the actual document and will cease access attempts.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

Honeypot Documents - A System and Method to Open Misleading Document After a Number of Invalid Access Attempts

When an individual attempts to access a document for an improper or wrong reason, they often continue to enter passwords a number of times until they are locked out of a document or give up. There currently are no solutions that will give false hope to these individuals by opening an alternative version of the document that is appropriate for unauthorized users.

The novel idea is to offer an alternative document, so that when the unauthorized user believes they have opened the actual document they will cease access attempts, thus preserving the integrity of the original, protected document.

Some information related to offering document alternatives or fake documents to users exists.

The proposed invention opens a secondary document after a first document has been wrongly access-attempted a defined number of times. This document (i.e., the honeypot document) appears legitimate to the intruder and gives them the false impression that they have successfully opened the document they sought.

Implementation
1. A user interacting with a protected document wishes to implement the proposed invention

2. Within the application or system level configuration settings, the user specifies preferences for the honeypot document
A. Number of wrongly entered access attempts
1. a number (e.g., 5)
2. a pattern that is completely different than the real pattern


E.g.: real password is "apple", user enters "montana"; as opposed to bob123 vs. bob234

3. a pattern that is completely different from other stored passwords on the system

4. etc.
B. Honeypot document to display
1. A honeypot document is displayed based on the type of file. E.g.: text-based documents should open a honeypot text-based d...