Computer system protection
First Claim
1. A method for protecting access to information on a computer system having a first level of authentication, comprising:
- detecting when said computer system moves outside a designated area; and
communicating a token with said computer system upon its moving outside the designated area;
wherein said token triggers a second level authentication when said computer system is subsequently started outside the designated area, and wherein failure of said second level of authentication results in locking of functionalities within said computer system.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products for computer system protection are provided. Embodiments protect against unauthorized access to information on stolen and/or illegally transported computer systems. Embodiments include locking of functionalities within a computer system when the computer system moves outside a designated area. Embodiments include limiting access to functionalities within the computer system based on the location of the computer system. Embodiments of the present invention include allowing variable levels of access protection depending on the location of the computer system.
-
Citations
31 Claims
-
1. A method for protecting access to information on a computer system having a first level of authentication, comprising:
-
detecting when said computer system moves outside a designated area; and communicating a token with said computer system upon its moving outside the designated area; wherein said token triggers a second level authentication when said computer system is subsequently started outside the designated area, and wherein failure of said second level of authentication results in locking of functionalities within said computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system for protecting access to information on a computer system having a first level of authentication, comprising:
-
a centralized surveillance system configured to detect when said computer system moves outside a designated area; a database configured to store authentication information associated with a legitimate user of said computer system; and a radio frequency (RF) communication system configured to communicate a token with said computer system upon its moving outside the designated area; wherein said token includes authentication information from said database and is configured to trigger a second level of authentication when said computer system is subsequently started outside the designated area. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31)
-
Specification