Support for multiple login method
First Claim
1. A method of securing security data stored on a computer system comprising the steps of:
- providing a data key to the computer system;
transforming the security data with the data key in a reversible fashion to produce encoded secure data such that the data key is required in order to perform a reverse transform and extract the security data from the encoded secure data; and
, storing the encoded secure data in a fashion such that a user authorization process is used to retrieve the encoded secure data such that the data key and the user authorization process in combination, provide access to the security data and such that the stored data within the computer system is encoded.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of securing security data stored on a computer system is disclosed. The method comprises providing a data key to the computer system. The data key is used for transforming the security data in a reversible fashion to produce an encoded secure data such that the data key is required in order to perform a reverse transform and extract the security data from the encoded secure data. The encoded secure data are stored secure data in a fashion such that a user authorization process is used to retrieve the encoded secure data. Furthermore, the encoded secure data are stored such that the data key and the user authorization process in combination provide access to the security data and such that the stored data within the computer system is encoded.
-
Citations
21 Claims
-
1. A method of securing security data stored on a computer system comprising the steps of:
-
providing a data key to the computer system;
transforming the security data with the data key in a reversible fashion to produce encoded secure data such that the data key is required in order to perform a reverse transform and extract the security data from the encoded secure data; and
,storing the encoded secure data in a fashion such that a user authorization process is used to retrieve the encoded secure data such that the data key and the user authorization process in combination, provide access to the security data and such that the stored data within the computer system is encoded. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of securing security data stored on a computer system comprising the steps of:
-
providing a biometric information source and comparing the biometric information source against stored templates associated with the biometric information source; and
for, in dependence upon a comparison result pairing biometric information source with a first individual identity;
providing a data key associated with a second individual identity;
the data key being other than stored on the computer system;
retrieving encoded security data associated with the biometric information, and using the key data for decoding the encoded security data. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method of securing data comprising the steps of:
-
providing a first information sample to a computer system;
encoding key data in dependence upon the first information sample to produce first security data, the key data for use in decoding stored encoded data;
providing at least one biometric information sample; and
securing the first security data in dependence upon at least one of the at least one biometric information sample. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of securing data comprising the steps of:
-
providing a first information sample to a computer system;
providing at least one biometric information sample;
encoding the at least one biometric information sample using the first information sample;
encoding key data in dependence upon encoded biometric sample to produce first security data, the key data for use in decoding stored encoded data; and
securing the first security data in dependence upon at least one of the at least one biometric information sample. - View Dependent Claims (20, 21)
-
Specification