Computer access control
DCFirst Claim
1. A method of controlling a computer (12) system (10) comprising the steps of:
- disposing a computer (12) in an operating space;
supplying operating power to the computer (12);
placing the computer (12) in a lockout mode to prevent operation of the computer (12) software by a user;
compiling a database (26) of authorized user codes;
placing a first authorized user code in the operating space;
scanning the operating space for the presence of an authorized user code and sensing the presence of the first authorized user code in the operating space;
comparing the first authorized user code to the database (26) for verification;
unlocking the computer (12) for use by the first authorized user in response to sensing the authorized user code in the operating space;
operating the computer software by the authorized user;
continuing the scanning of the operating space only for the presence of the first authorized user code in the operating space without scanning for other authorized user codes in the database;
relocking the computer (12) in the lockout mode at the termination of the first authorized user code in the operating space and locking the software in a re-lockout operational status at the time of relocking to prevent operation of the computer (12) software by a user; and
re-unlocking the computer (12) in response to sensing the first authorized user code upon re-introduction of the first authorized user code into the operating space and the re-lockout operational status of the software whereby the authorized user may continue operation of the computer (12) in the mode at which the first authorized user code was removed from the operating space.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A method of controlling a computer (12) system (10) comprising the steps of: disposing a computer (12) in an operating space and placing the computer (12) in a lockout mode to prevent operation of the computer (12) software by a user. A database (26) of authorized user codes is compiled in the computer. A transponder (20) places a first authorized user code in the operating space and a transceiver (18) scans the operating space for the presence of a transponder transmitting an authorized user code and senses the presence of the first authorized user code in the operating space. A comparator (29) compares the first authorized user code to the database (26) for verification to unlock the computer (12) for use by the first authorized user in response to sensing the authorized user code in the operating space. The authorized user then is free to operate the computer software while the sensing for the presence of a transponder (20) transmitting an authorized user code in the operating space is continued. The computer (12) is relocked in the lockout mode at the termination of the first authorized user code by removing the transponder from the operating space and locking the software in a re-lockout operational status at the time of relocking to prevent operation of the computer (12) software by a user.
113 Citations
11 Claims
-
1. A method of controlling a computer (12) system (10) comprising the steps of:
-
disposing a computer (12) in an operating space; supplying operating power to the computer (12); placing the computer (12) in a lockout mode to prevent operation of the computer (12) software by a user; compiling a database (26) of authorized user codes; placing a first authorized user code in the operating space; scanning the operating space for the presence of an authorized user code and sensing the presence of the first authorized user code in the operating space; comparing the first authorized user code to the database (26) for verification; unlocking the computer (12) for use by the first authorized user in response to sensing the authorized user code in the operating space; operating the computer software by the authorized user; continuing the scanning of the operating space only for the presence of the first authorized user code in the operating space without scanning for other authorized user codes in the database; relocking the computer (12) in the lockout mode at the termination of the first authorized user code in the operating space and locking the software in a re-lockout operational status at the time of relocking to prevent operation of the computer (12) software by a user; and re-unlocking the computer (12) in response to sensing the first authorized user code upon re-introduction of the first authorized user code into the operating space and the re-lockout operational status of the software whereby the authorized user may continue operation of the computer (12) in the mode at which the first authorized user code was removed from the operating space. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification