Abstract: A system and a method for deterring unauthorized access to an account. The method includes the steps of receiving a user login request from one of a plurality of account holder computers, then identifying a username associated with the received user login request, a time associated with the received user login request, and an internet protocol (IP) address associated with the received user login request. The method and system determine a number of prior login requests received from the identified IP address during a duration of time TR prior to the identified time. Each of the received login requests has a unique username that is different than the identified username. The method includes the step of disabling access to the account associated with the identified username when the determined number of received login requests is above a request threshold B.
Abstract: A system and a method for deterring unauthorized access to an account. The method includes the steps of receiving a user login request from one of a plurality of account holder computers, then identifying a username associated with the received user login request, a time associated with the received user login request, and an internet protocol (IP) address associated with the received user login request. The method and system determine a number of prior login requests received from the identified IP address during a duration of time TR prior to the identified time. Each of the received login requests has a unique username that is different than the identified username. The method includes the step of disabling access to the account associated with the identified username when the determined number of received login requests is above a request threshold B.