METHOD, SYSTEM, AND APPARATUS FOR SECURELY OPERATING COMPUTER
First Claim
1. A method for securely operating a computer, comprising:
- obtaining presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and
triggering security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method, system and apparatus for securely operating a computer. The method comprises: obtaining presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and triggering security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer. By means of the method, current status of an authenticated user who has logged in can be easily learned, and in turn, corresponding security operation is performed; in addition, when a user is performing sensitive operation, it can be confirmed in real time whether the user is an authenticated user who previously logged in, so that security of operating the computer is improved.
15 Citations
20 Claims
-
1. A method for securely operating a computer, comprising:
-
obtaining presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and triggering security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for providing secure operation to a computer, comprising:
-
an identity tag disposed on an authenticated user, comprising a RFID tag; a tag recognition module disposed on the computer, comprising a RFID reader, the tag recognition module generating and/or updating presence status of the authenticated user based on communication status between the RFID reader and the identity tag within the identity tag, the presence status indicating whether the authenticated user is present in the vicinity of computer; and a security management module communicatively coupled to the tag recognition module, configured to trigger security operations in response to that the generated presence status of the authenticated user indicates the authenticated user is absent in the vicinity of the computer. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus for securely operating a computer, comprising:
-
a status obtaining module configured to obtain presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and a triggering module configured to trigger security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer.
-
Specification