Abstract: A computer-implemented method for generating multiple valid OTP (One Time Password) for a single identity using a shared logic, including using an OTP solution based on a shared logic generating and validating multiple valid OTPs in a OTP validation process; dynamically changing the shared logic in a OTP client or in a OTP server if there is a logic overlapping in the shared logic; using the OTP solution for one or more distributed disconnected environments only if the shared logic is overlapping; using valid OTP for non-valid requests with redirecting an attacker to a sandbox instead of a desired target after fake successful authentication and requesting additional data to approve authentication; and using recursively an OTP generation process output in another OTP generation process input creating a derived chained OTP defined by the shared logic being known to both the OTP generation process and the OTP server.
Abstract: A computer-implemented method for generating multiple valid OTP (One Time Password) for a single identity using a shared logic, including using an OTP solution based on the shared logic generating and validating multiple valid OTPs that are capable of transferring additional info in a OTP validation process; changing the shared logic in a OTP client and/or in a OTP server dynamically if there is a logic overlapping in the shared logic in a moving factor value and in one or more rules addressed by a rules-based engine; and/or using the OTP solution for one or more distributed disconnected environments only if the shared logic, the moving factor value, and the one or more rules addressed by the rules-based engine are overlapping.
Abstract: A computer-implemented system and method for detecting and terminating a ransomware attack at its very early stage, reducing damages of data loss if occurred, while minimally disturbing ongoing operations within the organization's most demanding business goals (RTO/RPO).