System and method for inhibiting access to a computer
First Claim
1. A method for ensuring that only an authorized user remains logged into a computer system, comprising:
- a. providing a central processing unit;
b. providing a memory connected to said central processing unit;
c. providing a sensor capable of identifying unique characteristics of said authorized user, said sensor being connected to said central processing unit;
d. establishing a set of unique identifying characteristics of said authorized user and storing said unique identifying characteristics in said memory, along with a reference to the authorized user to which they pertain;
e. after said authorized user logs into said computer system, using said central processing unit to compare information from said sensor against said unique identifying characteristics in said memory corresponding to said authorized user; and
f. upon failing to detect a match between said sensor data and said data in said memory for a defined interval, logging off said authorized user.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer security system which prevents an unauthorized user from accessing the computer system when an authorized user has already logged onto the computer system and has temporarily left the workstation. The computer security system generally includes a sensor which is configured to detect the presence of a person in the region around a workstation and a processing unit which logs out of the computer when a person is no longer present in the region. An optional calibration tool may be provided to set the sensitivity of the sensor and prevent accidental logging out when the authorized user is still present in the region around the workstation.
70 Citations
20 Claims
-
1. A method for ensuring that only an authorized user remains logged into a computer system, comprising:
-
a. providing a central processing unit; b. providing a memory connected to said central processing unit; c. providing a sensor capable of identifying unique characteristics of said authorized user, said sensor being connected to said central processing unit; d. establishing a set of unique identifying characteristics of said authorized user and storing said unique identifying characteristics in said memory, along with a reference to the authorized user to which they pertain; e. after said authorized user logs into said computer system, using said central processing unit to compare information from said sensor against said unique identifying characteristics in said memory corresponding to said authorized user; and f. upon failing to detect a match between said sensor data and said data in said memory for a defined interval, logging off said authorized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 13)
-
-
11. A method for ensuring that only an authorized user remains logged into a computer system, comprising:
-
a. providing a central processing unit; b. providing a memory connected to said central processing unit; c. providing a sensor capable of identifying unique characteristics of said authorized user, said sensor being connected to said central processing unit; d. storing a set of sensor data corresponding to said authorized user in said memory; e. after said authorized user logs into said computer system, using said central processing unit to compare information from said sensor against said set of sensor data corresponding to said authorized user stored in said memory; and f. upon failing to detect a match between said sensor data and said data in said memory for a defined interval, taking a predetermined action. - View Dependent Claims (12, 14, 15, 16, 17, 18, 19, 20)
-
Specification