System and method for controlling user access to an electronic device
First Claim
1. A system for controlling user access to information on an electronic device, the system comprising:
- at least one input device coupled to an electronic device;
a user interface configured to instruct a user to provide security information with the at least one input device;
a memory configured to store a predetermined pattern; and
a processor coupled to the user interface and to the memory, wherein the processor is configured to receive from the at least one input device said security information and a sequence of electrical signals representing a non-prompted authorization pattern, and wherein the processor is configured to compare the non-prompted authorization pattern with the predetermined pattern, and wherein the processor is further configured to output a signal granting the user partial access to the electronic device in the event of an unsatisfactory match between the non-prompted authorization pattern and the predetermined pattern.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
104 Citations
47 Claims
-
1. A system for controlling user access to information on an electronic device, the system comprising:
-
at least one input device coupled to an electronic device;
a user interface configured to instruct a user to provide security information with the at least one input device;
a memory configured to store a predetermined pattern; and
a processor coupled to the user interface and to the memory, wherein the processor is configured to receive from the at least one input device said security information and a sequence of electrical signals representing a non-prompted authorization pattern, and wherein the processor is configured to compare the non-prompted authorization pattern with the predetermined pattern, and wherein the processor is further configured to output a signal granting the user partial access to the electronic device in the event of an unsatisfactory match between the non-prompted authorization pattern and the predetermined pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A user authentication system for maintaining the security of information stored on an electronic device, the user authentication system comprising:
-
a user interface configured to prompt a user to provide authentication information using at least one input device;
a processor configured to receive said authentication information, the processor being further configured to receive from the at least one input device a non-prompted authorization pattern;
a memory configured to store a predetermined pattern; and
a compare circuit coupled to the processor and to the memory, wherein the compare circuit is configured to compare at least the non-prompted authorization pattern with the predetermined pattern, and wherein the compare circuit is configured to grant the user partial access to the electronic device in the event of an unsatisfactory match between the non-prompted authorization pattern and the predetermined pattern. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of controlling user access to an electronic device, the method comprising:
-
receiving security information input by a user;
receiving a non-prompted authorization pattern input by the user;
determining whether the non-prompted authorization pattern matches a stored pattern;
measuring a duration of time between the receiving of the security information and the receiving of the non-prompted authorization pattern; and
limiting the scope of user access to an electronic device in the event of an unsatisfactory match between the non-prompted authorization pattern and the stored pattern. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method of controlling user access to an electronic device, the method comprising:
-
receiving security information from the user;
receiving a non-prompted input from the user;
comparing the security information and the non-prompted input with respective information associated with the user; and
granting the user partial access to an electronic device in the event of an unsatisfactory match between the non-prompted input and the respective information associated with the user. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A system for authenticating a user of an electronic device, the system comprising:
-
means for prompting the input of security information by a user;
means for receiving the security information and for receiving the input of a non-prompted authorization pattern from the user; and
means for comparing the security information and the non-prompted authorization pattern with respective information associated with the user, wherein said means for comparing is configured to grant the user partial access to information stored in an electronic device in the event of an unsatisfactory match between the non-prompted authorization pattern and the respective information associated with the user. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47)
-
Specification