Flexible system and method of user authentication for password based system
First Claim
1. A method of providing improved security for systems or files accessible by password data entry comprising:
- determining a secure password;
providing a system or file;
providing the secure password to a password database independent of the system and the file storage therein in association with a security level;
providing the secure password to a password sub-system for securing the determined system or file;
determining a user authorization method having an associated security level sufficient for accessing the secure password, the user authorization method determined in dependence upon the security level and some user authorization having different associated security levels than others;
authorizing an individual according to the determined user authorization method; and
when the individual is authorized, retrieving the secure password from the password database and automatically providing the secure password to the system or file password subsystem for accessing the system or file wherein the system or file is accessible by manually entering the secure password to the password sub-system.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of implementing password level security is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices in communication with the workstation. The system then determines predetermined user authorization methods each requiring data only from available user information entry devices. The user then selects one of the determined authorization methods for use in user authorization. Optionally, each authorization method is associated with a security level relating to user access to resources. Once the authorization method is selected, the user provides user authorization information in accordance with a determined user authorization method and registration proceeds. Once registration is complete, a password is passed from a password database to a password entry sub-system to provide access to that system.
106 Citations
38 Claims
-
1. A method of providing improved security for systems or files accessible by password data entry comprising:
-
determining a secure password; providing a system or file; providing the secure password to a password database independent of the system and the file storage therein in association with a security level; providing the secure password to a password sub-system for securing the determined system or file; determining a user authorization method having an associated security level sufficient for accessing the secure password, the user authorization method determined in dependence upon the security level and some user authorization having different associated security levels than others; authorizing an individual according to the determined user authorization method; and when the individual is authorized, retrieving the secure password from the password database and automatically providing the secure password to the system or file password subsystem for accessing the system or file wherein the system or file is accessible by manually entering the secure password to the password sub-system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of providing improved security for files accessible by password data entry comprising:
-
selecting a secured data file; providing a password database; automatically determining a secure password identifier associated with the secured data file; determining a user authorization method having an associated security level sufficient for accessing the secure password identifier, some user authorization methods having different associated security levels than others; authorizing an individual according to the determined user authorization method; and when the individual is authorized, retrieving the secure password from the password database and automatically providing the secure password to a selected secured file password entry subsystem. - View Dependent Claims (10)
-
-
11. A method of changing a first password for securing files accessible by password data entry comprising:
-
determining a plurality of files secured with the first password; authorizing an individual requesting a change of the first password prior to changing the first password by determining a user authorization method having an associated security level sufficient for accessing the secured first password, where some user authorization methods have different associated security levels than others, and authorizing an individual according to the determined user authorization method; when the individual is authorized, providing a second other password for securing the plurality of files; for each file secured with the first password, accessing the file with the first password and securing the file with the second other password; and
,storing the second other password in a password database. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A security system that provides improved security for systems or files stored in a file storage that is accessible by password data entry, comprising:
-
a password sub-system that secures a determined system or file with a secure password; a password database that stores the secure password independent of the security system and the file storage therein in association with a security level; and processing means for determining a user authorization method having an associated security level sufficient for accessing the secure password, the user authorization method determined in dependence upon the security level and some user authorization having different associated security levels than others, for authorizing an individual according to the determined user authorization method; and
when the individual is authorized, retrieving the secure password from the password database and automatically providing the secure password to the file password sub-system for accessing the system or file wherein the system or file is accessible by manually entering the secure password to the password sub-system. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A security system that provides improved security for a secured data file stored in a file storage that is accessible by password data entry, comprising:
-
a password database that stores a secure password; a secured file password entry subsystem; and processing means for automatically determining a secure password identifier associated with the secured data file, for determining a user authorization method having an associated security level sufficient for accessing the secure password identifier, some user authorization methods having different associated security levels than others, for authorizing an individual according to the determined user authorization method, and when the individual is authorized, retrieving the secure password from the password database and automatically providing the secure password to the secured file password entry subsystem. - View Dependent Claims (28)
-
-
29. A security system that changes a first password for securing files accessible by password data entry, comprising:
-
a plurality of files secured with the first password; processing means for authorizing an individual requesting a change of the first password prior to changing the first password by determining a user authorization method having an associated security level sufficient for accessing the secured first password, where some user authorization methods have different associated security levels than others, for authorizing an individual according to the determined user authorization method, when the individual is authorized, for providing a second other password for securing the plurality of files, and for each file secured with the first password, for accessing the file with the first password and securing the file with the second other password; and a password database that stores the second other password. - View Dependent Claims (30, 31, 32, 33, 34, 35)
-
-
36. Computer software for providing improved security for systems or files accessible by password data entry comprising:
-
computer-executable instructions for determining a secure password; computer-executable instructions for providing a system or file; computer-executable instructions for providing the secure password to a password database independent of the system and the file storage therein in association with a security level; computer-executable instructions for providing the secure password to a password sub-system for securing the determined system or file; computer-executable instructions for determining a user authorization method having an associated security level sufficient for accessing the secure password, the user authorization method determined in dependence upon the security level and some user authorization having different associated security levels than others; computer-executable instructions for authorizing an individual according to the determined user authorization method; and computer-executable instructions for, when the individual is authorized, retrieving the secure password from the password database and automatically providing the secure password to the system or file password subsystem for accessing the system or file wherein the system or file is accessible by manually entering the secure password to the password sub-system.
-
-
37. Computer software for providing improved security for files accessible by password data entry comprising:
-
computer-executable instructions for selecting a secured data file; computer-executable instructions for providing a password database; computer-executable instructions for automatically determining a secure password identifier associated with the secured data file; computer-executable instructions for determining a user authorization method having an associated security level sufficient for accessing the secure password identifier, some user authorization methods having different associated security levels than others; computer-executable instructions for authorizing an individual according to the determined user authorization method; and computer-executable instructions for, when the individual is authorized, retrieving the secure password from the password database and automatically providing the secure password to a selected secured file password entry subsystem.
-
-
38. Computer software for changing a first password for securing files accessible by password data entry comprising:
-
computer-executable instructions for determining a plurality of files secured with the first password; computer-executable instructions for authorizing an individual requesting a change of the first password prior to changing the first password by determining a user authorization method having an associated security level sufficient for accessing the secured first password, where some user authorization methods have different associated security levels than others, and authorizing an individual according to the determined user authorization method; computer-executable instructions for, when the individual is authorized, providing a second other password for securing the plurality of files; computer-executable instructions for accessing the file with the first password and securing the file with the second other password for each file secured with the first password; and computer-executable instructions for storing the second other password in a password database.
-
Specification