Method and System for Multi-Authentication Logon Control
First Claim
1. A method for authenticating a user in a computer system including at least one terminal, the method comprising the steps of:
- verifying the user physically at the at least one terminal (340, 342);
granting access to the at least one terminal if the user is verified (344);
detecting the user within a predetermined distance of the at least one terminal (360); and
logging off the user when the user is outside the predetermined distance (366).
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for multi-authentication log-on control are provided. The method and system include two authentication mechanisms. The first one is a device that provides a physical key, and the other one is a proximity device, which identifies a user when in the proximity of a reader. These devices allow the user to log in to a computer system (100) effortlessly just by touching a reader with the physical key, and the user will be automatically logged off when they step away from the computer. A method includes the steps of verifying the user physically at the at least one terminal (340, 342); granting access to the at least one terminal if the user is verified (344); detecting the user within a predetermined distance of the at least one terminal (360); and logging off the user when the user is outside the predetermined distance (366).
125 Citations
20 Claims
-
1. A method for authenticating a user in a computer system including at least one terminal, the method comprising the steps of:
-
verifying the user physically at the at least one terminal (340, 342); granting access to the at least one terminal if the user is verified (344); detecting the user within a predetermined distance of the at least one terminal (360); and logging off the user when the user is outside the predetermined distance (366). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for authenticating a user in a computer system including at least one terminal, the system comprising:
-
a proximity identification reader (102) for detecting a user within a predetermined distance of the at least one terminal (100); a physical identification reader (104) for verifying the user physically at the at least one terminal (100); and a processor 202 for granting access to the at least one terminal if the detected user is verified. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for authenticating a user, the method steps comprising:
-
verifying the user physically at the at least one terminal; granting access to the at least one terminal if the user is verified; detecting the user within a predetermined distance of the at least one terminal; and logging off the user when the user is outside the predetermined distance.
-
Specification