Biometric authentication system
First Claim
1. A full-featured authentication system comprising one or more methods of authentication and means for determining authentication policies based dynamically upon need and/or environment for both physical and logical access.
1 Assignment
0 Petitions
Accused Products
Abstract
A full-featured authentication framework is provided that allows for the dynamic selection of authentication modalities based on need and/or environment. The framework comprises a server responsible for handling requests for data and services from the other components, a logon module, a user administration tool and a system administration tool. The authentication framework may be used in a multi-biometric environment or one that contains a combination of any other authentication techniques. The system is built on a BioAPI framework and uses common data security architecture. A primary feature of the system of the present invention is the facilitation of the installation of authentication modalities, possibly from numerous vendors, thereby allowing for plug-and-play of new biometric functionality and additional core data security modules with no extra programming effort.
-
Citations
12 Claims
- 1. A full-featured authentication system comprising one or more methods of authentication and means for determining authentication policies based dynamically upon need and/or environment for both physical and logical access.
- 4. A full-featured authentication system that allows for expansion of the system with minimal interaction from the end user and the administrators of the system, said system comprising one or more methods of authentication and means for installing new authentication methods based upon a user'"'"'s want and need from remote locations on demand.
-
9. A method for authenticating multiple users in a network environment, said method comprising the steps of:
-
providing a full-featured authentication system comprising at least one method of authentication; and
determining authentication policies based dynamically upon need and/or environment for physical and logical access to said network environment. - View Dependent Claims (10, 11, 12)
-
Specification