Method and system for access validation in a computer system
First Claim
1. A method for controlling access to a particular resource among a plurality of resources within a computer system, said computer system including a plurality of software applications, a plurality of files and a display system for displaying a plurality of graphically manipulatable iconic representations, said method comprising the computer implemented steps of:
- specifying a finite ordered series of substantive activities which may be performed by a user within said computer system, said finite ordered series of substantive activities being unrelated to said particular resource and including at least one activity from a list including;
invocation of a selected software application;
manipulation of a selected file within a software application; and
, graphic manipulation of a selected iconic representation;
allowing apparent access to said computer system by a selected user wherein said selected user may access each of said plurality of resources except said particular resource; and
permitting said selected user to access said particular resource only in response to a performance by said selected user of said specified finite ordered series of substantive activities within said computer system wherein said unrelated nature of said specified finite ordered series of substantive activities provides security for said particular resource in an unobtrusive manner.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for validating access to a computer system in an unobtrusive manner. A finite ordered series of substantive activities, such as icon manipulations, application invocations or file manipulations is specified and stored for future reference. Thereafter, each time access to the computer system is attempted, the initial activities of a prospective user are identified and compared to the stored finite ordered series of substantive activities. Access is validated and continued access permitted in response to a match between the prospective user'"'"'s initial activities and the stored finite ordered series of substantive activities. In this manner, access to a computer system may be validated without the necessity of utilizing an explicit access/password screen which may be compromised. In one embodiment of the present invention, a selected application may be automatically invoked or a particular activity automatically executed in response to a validation of access.
27 Citations
7 Claims
-
1. A method for controlling access to a particular resource among a plurality of resources within a computer system, said computer system including a plurality of software applications, a plurality of files and a display system for displaying a plurality of graphically manipulatable iconic representations, said method comprising the computer implemented steps of:
-
specifying a finite ordered series of substantive activities which may be performed by a user within said computer system, said finite ordered series of substantive activities being unrelated to said particular resource and including at least one activity from a list including;
invocation of a selected software application;
manipulation of a selected file within a software application; and
, graphic manipulation of a selected iconic representation;allowing apparent access to said computer system by a selected user wherein said selected user may access each of said plurality of resources except said particular resource; and permitting said selected user to access said particular resource only in response to a performance by said selected user of said specified finite ordered series of substantive activities within said computer system wherein said unrelated nature of said specified finite ordered series of substantive activities provides security for said particular resource in an unobtrusive manner. - View Dependent Claims (2, 3, 4, 6, 7)
-
-
5. A system for controlling access to a particular resource among a plurality of resources within a computer system, said computer system including a plurality of software applications, a plurality of files, and a display system for displaying a plurality of graphically manipulatable iconic representations, said system comprising:
-
memory means associated with said computer system; means for storing within said memory means an indication of a finite ordered series of substantive activities which may be performed by a user within said computer system, said finite ordered series of substantive activities being related to said particular resource and including at least one activity from a list including;
invocation of a selected software application;
manipulation of a selected file within a software application; and
, graphical manipulation of a selected iconic representation;access means for allowing access to said computer system by a selected user wherein said selected user may access each of said plurality of resources except said particular resource; and access control means for permitting said selected user to access said particular resource only in response to a performance by said selected user of said specified finite ordered series of substantive activities within said computer system wherein said elated nature of said specified fininte ordered series of substantive activities provides security for said particular resource in an unobtrusive manner.
-
Specification