SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR COMPUTER SECURITY
First Claim
Patent Images
1. A method for controlling user access to a process being executed on a machine while the machine is outputting data regarding the process, the method comprising:
- receiving user authentication data regarding a user transmitted into the machine through physical interaction with one or more first input devices connected to the machine;
making an authentication determination within the machine regarding whether the user authentication data matches available user authentication records for any person or group of persons, wherein making the authentication determination comprises comparing the user authentication data with one or more user authentication records within the machine, available to the machine, or both;
if the authentication determination indicates that the user authentication data matches user authentication records for a person or group of persons, making an access determination within the machine, wherein the access determination comprises use of records regarding access rights regarding the person or group of persons within the machine, available to the machine, or both;
based on the outcome of the authentication determination, and, if made, the access determination, transforming or not transforming one or more second input devices connected to the machine such that such second input devices have access to the process.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide systems and methods that enhance the security various processes are provided, as well as machines, computer-readable media and processes that employ or allow employment of such systems.
-
Citations
30 Claims
-
1. A method for controlling user access to a process being executed on a machine while the machine is outputting data regarding the process, the method comprising:
-
receiving user authentication data regarding a user transmitted into the machine through physical interaction with one or more first input devices connected to the machine; making an authentication determination within the machine regarding whether the user authentication data matches available user authentication records for any person or group of persons, wherein making the authentication determination comprises comparing the user authentication data with one or more user authentication records within the machine, available to the machine, or both; if the authentication determination indicates that the user authentication data matches user authentication records for a person or group of persons, making an access determination within the machine, wherein the access determination comprises use of records regarding access rights regarding the person or group of persons within the machine, available to the machine, or both; based on the outcome of the authentication determination, and, if made, the access determination, transforming or not transforming one or more second input devices connected to the machine such that such second input devices have access to the process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 29, 30)
-
-
15. A method for controlling access to process controls for a process being executed on one or more process machines wherein the control machine is connecting to the one or more process machines in a manner that will allow the control machine to control the one or more process machines and wherein the control machine is outputting data regarding the process, the method comprising:
-
receiving user authentication data regarding a user transmitted into a control machine through physical interaction with one or more first input devices connected to the control machine; making an authentication determination within the control machine regarding whether the user authentication data matches available user authentication records for any person or group of persons, wherein making the authentication determination comprises comparing the user authentication data with one or more user authentication records within the control machine, available to the control machine, or both; if the authentication determination indicates that the user authentication data matches user authentication records for a person or group of persons, making an access determination within the control machine, wherein the access determination comprises use of records regarding access rights regarding the person or group of persons within the control machine, available to the control machine, or both; based on the outcome of the authentication determination, and, if made, the access determination, transforming or not transforming one or more second input devices connected to the control machine such that such second input devices have access to the process. - View Dependent Claims (16, 17)
-
-
18. A machine or group of machines comprising:
-
means to operate a process on the machine or group of machines; means to receive user authentication data regarding a user transmitted into the machine or group of machines through physical interaction with one or more first input devices connected to the machine or group of machines; means to make an authentication determination within the machine or group of machines whether the user authentication data matches available user authentication records for any person or group of persons, wherein making the authentication determination comprises comparing the user authentication data with one or more user authentication records within the machine or group of machines, available to the machine or group of machines, or both; means to make an access determination within the machine or group of machines, if the authentication determination indicates that the user authentication data matches user authentication records for a person or group of persons, wherein the access determination comprises use of records regarding access rights regarding the person or group of persons within the machine or group of machines, available to the machine or group of machines, or both; means to enable or not enable the one or more second input devices connected to the machine or group of machines to access the process, based on the outcome of the authentication determination. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for controlling user access to a process being executed on a machine while the machine is outputting data regarding the process, the method comprising:
-
receiving data directed to the process transmitted into the machine through physical interaction with one or more first input devices connected to the machine; receiving user authentication data regarding a user transmitted into the machine through physical interaction with one or more second input devices connected to the machine; making an authentication determination within the machine regarding whether the user authentication data matches available user authentication records for any person or group of persons, wherein making the authentication determination comprises comparing the user authentication data with one or more user authentication records within the machine, available to the machine, or both; if the authentication determination indicates that the user authentication data matches user authentication records for a person or group of persons, making an access determination within the machine, wherein the access determination comprises use of records regarding access rights regarding the person or group of persons within the machine, available to the machine, or both; based on the outcome of the authentication determination, and, if made, the access determination, transmitting or not transmitting the data directed to the process to the process. - View Dependent Claims (27, 28)
-
Specification