System and method of protecting data
First Claim
Patent Images
1. A device comprising:
- a. a pin module for locally storing a unique user identifier configured to correspond to an identity of an individual;
b. an answer module for locally storing an answer set wherein the answer set comprises an answer to a corresponding question and is configured to correspond to the identity of the individual; and
c. a controller for locally authenticating the identity of the individual by comparing an input with the answer set.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting confidential data within an electronic device are described. The invention allows the authentication of the identity of the user through the user of a primary and/or secondary authentication system. In one embodiment, the system includes a pin module for locally storing a unique user identifier configured to correspond to an identity of an individual; an answer module for locally storing an answer set wherein the answer set comprises an answer to a corresponding question and is configured to correspond to the identity of the individual; and a controller for locally authenticating the identity of the individual by comparing an input with the answer set.
-
Citations
33 Claims
-
1. A device comprising:
-
a. a pin module for locally storing a unique user identifier configured to correspond to an identity of an individual;
b. an answer module for locally storing an answer set wherein the answer set comprises an answer to a corresponding question and is configured to correspond to the identity of the individual; and
c. a controller for locally authenticating the identity of the individual by comparing an input with the answer set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device comprising:
-
a. a primary authentication module comprising a pin module for locally storing a primary user identifier for authenticating an identity of a user;
b. a secondary authentication module comprising an answer module for locally storing a secondary user identifier for authenticating the identity of the user; and
c. a controller for selectively allowing access to protected data in response to one of the primary authentication module and the secondary authentication module. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
a. requesting a primary user identifier;
b. receiving an incorrect primary user identifier;
c. requesting a secondary user identifier;
d. receiving a secondary user identifier response;
e. comparing the secondary user identifier response with the secondary user identifier stored within a local device; and
f. authenticating an identity of a user in response to comparing the secondary user identifier response with the secondary user identifier. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A method of initializing a local device comprising:
-
a. uniquely identifying a user via a user identification;
b. storing a primary user identifier on the local device corresponding to the user;
c. storing a secondary user identifier on the local device corresponding to the user; and
d. authenticating an identity of the user through the secondary user identifier when the primary user identifier is not available. - View Dependent Claims (28, 29, 30, 31)
-
-
33. A computer-readable medium having computer executable instructions for performing a method comprising:
-
a. requesting a primary user identifier;
b. receiving an incorrect primary user identifier;
c. requesting a secondary user identifier;
d. receiving a secondary user identifier response;
e. comparing the secondary user identifier response with the secondary user identifier stored within a local device; and
f. authenticating an identity of a user in response to comparing the secondary user identifier response with the secondary user identifier.
-
Specification