BRIEF DESCRIPTION OF THE DRAWINGS
The details of the present invention, both as to its structure and operation, may be gleaned in part by study of the accompanying drawings, in which like reference numerals refer to like parts, and in which:
FIG. 1 is a block diagram illustrating a network with a real or authorized client device and some cloned client devices communicating with a server in one embodiment of a security system for detecting potential cloned client devices;
FIG. 2A is a diagram illustrating data fields in a prior art user logon message;
FIG. 2B is a diagram illustrating data fields in one embodiment of a user message containing a covert identifier used at the server in one embodiment of a system for detecting potential cloned client devices;
FIG. 3 is a block diagram illustrating a client device configured to insert a covert identifier in messages according to one embodiment;
FIG. 4 is a flow diagram illustrating one embodiment of a method of detecting a cloned client device;
FIGS. 5A and 5B are flow diagrams illustrating one embodiment of the clone detecting method;
FIGS. 6A to 6F illustrate messages generated at various stages in the method of FIGS. 5A and 5B;
FIG. 7 is a flow diagram illustrating an embodiment of a method for inserting covert identifiers in messages between a client device and a server;
FIG. 8 is a flow diagram illustrating one embodiment of a service renewal method using covert identifiers; and
FIG. 9 is a flow diagram illustrating a modification of the method of FIG. 8 for use in a one way network environment having no return channel from a client device.