Logon authentication and security system and method
First Claim
1. A machine-readable program storage device for storing encoded instructions for a method of authenticating the identity of a computer user for a computer having an operating system which includes a registry of processes and requires a secure acknowledgment of the user on the computer, said method comprising the steps of:
- establishing a security process as the primary process of the registry previous to starting or restarting the computer operating system;
enabling an authentication procedure on the computer by the security process;
storing a secure user acknowledgment by the security process which is acceptable to the operating system; and
executing the computer operating system.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention involves a desktop administration system and method which allows a network administrator to remotely create, protect, and manage desktops and control file systems across a network. The invention provides security software, a PDF and Daemon, which is installed as the primary Registry process. Upon starting of the workstation, the security software mask off any other interrupt or process and complete an authentication procedure while creating an electronic trail for operating system to continue operation as if the security software did not preempt the operating system. The PDF receives desktop information from the network server and builds a desktop which the user manipulates to invoke local and/or network programs and access local and/or network utilities, providing appropriate keys or other authentication information to access restricted network resources. The Daemon serves as an interface for the PDF by channeling any communication to or from the user or the network, preventing unauthorized transactions at either the workstation or network level. The PDF provides a graphic user interface using objects that encapsulate programs with data, such as user preferences, default directories, and access privileges. The Daemon performs many tasks, including starting the PDF, enumerating the windows of the graphic user interface, and recording operations.
-
Citations
30 Claims
-
1. A machine-readable program storage device for storing encoded instructions for a method of authenticating the identity of a computer user for a computer having an operating system which includes a registry of processes and requires a secure acknowledgment of the user on the computer, said method comprising the steps of:
-
establishing a security process as the primary process of the registry previous to starting or restarting the computer operating system;
enabling an authentication procedure on the computer by the security process;
storing a secure user acknowledgment by the security process which is acceptable to the operating system; and
executing the computer operating system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system comprising:
-
a computer including a processor and memory capable of storing instructions and data;
an operating system residing on said computer, said operating system including a registry of processes, said operating system also including means for preventing computer operations unless a user acknowledgment is present on said computer;
means for authenticating the identity of a computer user of said computer; and
a security process residing on said computer, said security process including means for establishing said security process as the primary process of said registry previous to starting or restarting said operating system, said security process including means for enabling said authenticating means, said security process including means for storing a user acknowledgment which is acceptable to the operating system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of authenticating the identity of a computer user for a computer having an operating system which includes a registry of processes and requires a secure acknowledgment of the user on the computer, said method comprising the steps of:
-
establishing a security process as the primary process of the registry previous to starting or restarting the computer operating system;
enabling an authentication procedure on the computer by the security process;
storing a secure user acknowledgment by the security process which is acceptable to the operating system; and
executing the computer operating system. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification