Computer security system
First Claim
1. A computer security system, comprising:
- a terminal security access device connected to a computer and configured to prohibit access to the computer upon detecting an unauthorized access attempt and to maintain data security and integrity on the computer;
said terminal security access device determining access to the computer by checking operations selected from the group consisting of passwords, fingerprint readers, biometric sensors, and electronic surveillance systems;
said terminal security access device maintaining data security by embedding encrypted security codes with the data, by transferring the data in encrypted form at all times, by providing copies of the data exclusively in encrypted form, and by enabling transfer of the data to another computer only if the other computer is equipped with a similar security system.
1 Assignment
0 Petitions
Accused Products
Abstract
A variety of security levels are provided with the novel computer security system, depending on the use and connectivity of the system. On individual computer systems, the primary functions are to control user access to the computer (password, biometric scanning, etc.) and to maintain data security and integrity (embedded encryption and maintaining data and copies encrypted). Computers that are configured into networks utilize not only the features of an individual computer but can be further enhanced by adding communications security. When the communication is effected through the Internet, another level of security is added that allows normal non-encrypted communications with computers or servers that do not utilize the novel security system. Within the novel system there are both software and hardware features that guard against security breaches, depending on the level of security desired.
-
Citations
8 Claims
-
1. A computer security system, comprising:
-
a terminal security access device connected to a computer and configured to prohibit access to the computer upon detecting an unauthorized access attempt and to maintain data security and integrity on the computer;
said terminal security access device determining access to the computer by checking operations selected from the group consisting of passwords, fingerprint readers, biometric sensors, and electronic surveillance systems;
said terminal security access device maintaining data security by embedding encrypted security codes with the data, by transferring the data in encrypted form at all times, by providing copies of the data exclusively in encrypted form, and by enabling transfer of the data to another computer only if the other computer is equipped with a similar security system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of providing access security to a computer system, which comprises the following method steps:
-
providing a computer access security system enabled to allow or deny access to a computer;
initializing the computer access security system upon an initial system startup, by assigning personal access code numbers for each administrator of the computer access security system, assigning an initial terminal security code, and allocating limited access storage space for receiving audit and access data;
upon receiving a request for administrator access the computer system, prompting for user input of the personal access code number and subsequently verifying the personal access code number;
storing in the access storage space all successful and unsuccessful access attempts and accesses to the computer system; and
subsequent to the initial setup of the computer system, continuing with a sequence of operations starting with computer user login. - View Dependent Claims (7, 8)
-
Specification