Individual user selectable multi-level authorization method for accessing a computer system
First Claim
1. A computer-implemented method for (1) providing a plurality of security schemes, each particular security scheme requiring a number of identification information in order to authorize access to a computer system for a particular user from among a plurality of users, and (2) allowing each particular user to select a security scheme to be associated with that particular user independent of the security scheme selected by a remainder of the plurality of users of the computer system, thereby providing each particular user the ability to select their own security scheme to be used to authorize their respective access to the computer system, the method comprising:
- arranging at least one storage area of the computer system to include a plurality of user accounts each with a respective user storage area;
prompting the particular user of the computer system for a selection of a particular security scheme from among the plurality of security schemes, wherein first of the plurality of security schemes requires a specific number of identification information to authorize the particular user, and a second of the plurality of security schemes requires additional identification information beyond that of the first scheme to authorize the particular user;
storing the selection as a preference in the particular user'"'"'s storage area; and
thereafter authorizing the particular user to access the computer system when the selected security scheme of the particular user is satisfied.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for providing a plurality of security schemes and allowing a particular user of a computer system from among a plurality of users of the computer system to select a security scheme to be associated with the user independent of the security scheme selected by a remainder of the plurality of users of the computer system, thereby providing user customizable security to the computer system. At least one of the security schemes is comparatively more secure than another. Selections of security schemes are included with account information of the particular user and are used in connection with authorizing the particular user to use the computer system. First and second users can each select different security schemes based on their personal preferred balance between convenience and security and have their respective access to the computer system managed in relation to the selections included with their respective accounts.
-
Citations
20 Claims
-
1. A computer-implemented method for (1) providing a plurality of security schemes, each particular security scheme requiring a number of identification information in order to authorize access to a computer system for a particular user from among a plurality of users, and (2) allowing each particular user to select a security scheme to be associated with that particular user independent of the security scheme selected by a remainder of the plurality of users of the computer system, thereby providing each particular user the ability to select their own security scheme to be used to authorize their respective access to the computer system, the method comprising:
-
arranging at least one storage area of the computer system to include a plurality of user accounts each with a respective user storage area; prompting the particular user of the computer system for a selection of a particular security scheme from among the plurality of security schemes, wherein first of the plurality of security schemes requires a specific number of identification information to authorize the particular user, and a second of the plurality of security schemes requires additional identification information beyond that of the first scheme to authorize the particular user; storing the selection as a preference in the particular user'"'"'s storage area; and thereafter authorizing the particular user to access the computer system when the selected security scheme of the particular user is satisfied. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for (1) providing a plurality of security schemes, each particular security scheme requiring provision of a number of identification information in order to authorize access to a computer system for a particular user from among a plurality of users, and (2) allowing each particular user to select a security scheme to be associated with that particular user, and which selection is independent of the security scheme selected by a remainder of the plurality of users of the computer system, thereby providing each particular user the ability to select their own security scheme to be used to authorize their respective access to the computer system, the method comprising:
-
providing the computer system, the computer system having a plurality of user accounts each with a respective user storage area; for a first user; prompting the first user of the computer system for a selection of a first security scheme from among the plurality of security schemes; storing the selection by the first user as a preference in the first user'"'"'s storage area; for a second user; prompting the second user of the computer system for a selection of a second security scheme from among the plurality of security schemes; storing the selection by the second user as a preference in the second user'"'"'s storage area; wherein the first security scheme requires a specific number of identification information in order to be satisfied and the second security scheme requires a different number of identification information than that of the first security scheme in order to be satisfied, thereafter authorizing the first or second user to access the computer system when the selected security scheme of the respective user is satisfied. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for (1) providing a plurality of security schemes, each particular security scheme requiring a number of identification information in order to authorize access to a computer system for a particular user from among a plurality of users, and (2) allowing each particular user to select a security scheme to be associated with that particular user independent of the security scheme selected by a remainder of the plurality of users of the computer system, thereby providing each user with the ability to select their own security scheme to be used to authorize their respective access to the computer system, the method comprising:
-
arranging at least one storage area of the computer system to include a plurality of user accounts each with a respective user storage area and identification information; prompting the particular user of the computer system for a selection of a particular security scheme from among the plurality of security schemes, wherein a first of the plurality of security schemes requires a specific number of identification information to authorize the particular user, and a second of the plurality of security schemes requires additional identification information beyond that of the first scheme to authorize the particular user; storing the selection as a preference in the particular user'"'"'s storage area; and thereafter authorizing the particular user to access the computer system when the selected security scheme of the particular user is satisfied, wherein the selected security scheme is satisfied by comparing any provided identification information with the identification information included in the user account of the particular user, and denying access to the computer system until the particular user is identified as authorized. - View Dependent Claims (19, 20)
-
Specification