System and method for authenticating users in a computer network
First Claim
1. A method of controlling access to a computer resource in a computer environment, comprising:
- receiving a user identification of a user;
determining whether there exists associated with the user identification an authentication rule requiring biometric information; and
if not, then prompting the user to provide a password whereby to control access based thereon.
10 Assignments
0 Petitions
Accused Products
Abstract
A rule based biometric user authentication method and system in a computer network environment is provided. Multiple authentication rules can exist in the computer network. For example, there may be a default system-wide rule, and a rule associated with a particular user trying to log in. There may be other rules such as one associated with a remote computer from which the user is logging in, one associated with a group to which the user belongs, or one associated with a system resource to which the user requires access such as an application program or a database of confidential information. An order of precedence among the rules is then established which is used to authenticate the user.
85 Citations
36 Claims
-
1. A method of controlling access to a computer resource in a computer environment, comprising:
-
receiving a user identification of a user;
determining whether there exists associated with the user identification an authentication rule requiring biometric information; and
if not, then prompting the user to provide a password whereby to control access based thereon. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of controlling access to a computer resource in a computer environment, comprising:
-
using a first order of precedence as between at least first and second authentication rules for a first set of conditions pertaining to a user desiring access the resource;
using a second order of precedence as between at least the first and second authentication rules for a second set of conditions pertaining to the user desiring access the resource; and
enabling the user to attempt access to the resource according to at least one of the first and second orders of precedence. - View Dependent Claims (9, 10, 11)
-
-
12. A method of controlling access to a computer resource in a computer environment, comprising:
-
using a first order of precedence as between a first plurality of authentication rules for a first set of conditions pertaining to a user desiring access the resource;
using a second order of precedence as between a second plurality of authentication rules for a second set of conditions pertaining to the user desiring access to the resource; and
enabling the user to attempt access to the resource according to at least one of the first and second orders of precedence. - View Dependent Claims (13, 14, 15)
-
-
16. A method of controlling access to a computer resource in a computer environment, comprising:
-
using at a first point in time a first order of precedence as between at least first and second authentication rules for a user attempting to access the resource; and
using at a subsequent point in time a second order of precedence as between at least the first and second rules for the user attempting to access the resource. - View Dependent Claims (17)
-
-
18. A method of controlling access to a computer resource in a computer environment, comprising:
-
using at a first point in time a first order of precedence as between a first plurality of authentication rules; and
using at a subsequent point in time a second order of precedence as between a second plurality of authentication rules. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A method of controlling access to a computer resource in a computer environment, comprising:
-
determining a time of day during which a user attempts to access the resource;
associating the determined time of day with an authentication rule;
allowing the user to attempt to authenticate according to the authentication rule; and
if the authentication attempt is successful, granting access for the user to the resource. - View Dependent Claims (25, 26, 27)
-
-
28. A method of controlling access to a computer resource in a computer environment, comprising:
-
determining a security level associated with at least one of a user and equipment used by the user to attempt to access the resource;
associating the determined security level with an authentication rule;
allowing the user to attempt to authenticate according to the authentication rule; and
if the authentication attempt is successful, granting access for the user to the resource. - View Dependent Claims (29, 30, 31)
-
-
32. A method of controlling access to a computer resource in a computer environment, comprising:
-
determining a false accept/reject level associated with at least one of a user and equipment used by the user to attempt to access the resource;
associating the determined false accept/reject level with an authentication rule;
allowing the user to attempt to authenticate according to the authentication rule; and
if the authentication attempt is successful, granting access for the user to the resource. - View Dependent Claims (33, 34, 35, 36)
-
Specification