SECURITY SYSTEM AND METHOD FOR CONTROLLING ACCESS TO COMPUTING RESOURCES
First Claim
1. A system for securing computing resources, the system comprising:
- a personal digital key adapted for wireless communication within a predefined range to establish a link and send and receive data;
a reader for automatically detecting the present of the personal digital key and establishing a link with the personal digital key, the reader having an input and an output and adapted for wireless communication with the personal digital key when the reader and the personal digital key are within the predefined range of each other, the reader automatically signally when it is linked to the personal digital key;
a computing device having computing resources, the computing device coupled to the input and the output of the reader for sending and receiving data;
the computing device including a security system for controlling access to the computing resources of the computing device, the security system controlled by a signal from the reader indicating whether the reader is linked to the personal digital key.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system comprises a personal digital key (PDK), a reader and a computing device. The PDK is a portable, personal transceiver that includes a controller and one or more passwords or codes. The computing device includes a detection engine, vault storage and a set up module. The detection engine detect events relating to the access of any files and third-party systems by the computing device and receives information from the reader as to whether the PDK is present/linked. The detection engine controls whether a user is able to access any of the functionality provided by the computing device based upon whether the PDK is in communication with the reader or not. The present invention also includes a number of methods such as a method for initializing the security system, a method for setting up a computing device, and a method for controlling access to computing resources.
93 Citations
24 Claims
-
1. A system for securing computing resources, the system comprising:
-
a personal digital key adapted for wireless communication within a predefined range to establish a link and send and receive data; a reader for automatically detecting the present of the personal digital key and establishing a link with the personal digital key, the reader having an input and an output and adapted for wireless communication with the personal digital key when the reader and the personal digital key are within the predefined range of each other, the reader automatically signally when it is linked to the personal digital key; a computing device having computing resources, the computing device coupled to the input and the output of the reader for sending and receiving data;
the computing device including a security system for controlling access to the computing resources of the computing device, the security system controlled by a signal from the reader indicating whether the reader is linked to the personal digital key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A security system for controlling access to computing resources on a computing device, the security system comprising:
-
detection engine for detecting when one of the computing resources is accessed and controlling whether access will be permitted, the detection engine coupled to the computing device and the computing resources; and vault storage for storing security set up data that specifies at least one security action for one of the computing resources, the vault storage coupled to and accessible by the detection engine. - View Dependent Claims (12)
-
-
13. A method for controlling access to a computing device having computing resources, the method comprising:
-
monitoring for an event; detecting the event; determining whether a personal digital key is within a predefined range of the computing device; allowing access to one of the computing resources if the personal digital key is within a predefined range of the computing device; and preventing access to the one of the computing resources if the personal digital key is not within a predefined range of the computing device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification