Computer security with local and remote authentication
First Claim
Patent Images
1. A secure computer device, comprising:
- a client database locally-authenticating a user of the device;
means for granting previously authorized access to the device if the user is locally authenticated;
means for generating a remote authentication request;
a server database remotely-authenticating the user in response to the authentication request after a successful local authentication;
means for granting access to new activities and control parameters on the computer device if remote authentication is successful;
means for allowing continued work on authorized activity;
means for denying access to new activities until the authorized activity is completed;
means for storing identification data from a subsequent user while a previous user'"'"'s activity is being completed and updating the client database according to results of the local and remote authentications; and
means for limiting a number of times that a particular client database and/or record in any, or all, of the client databases will be updated during any period of time and/or total number of updates.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure computer system including a client having a client database for locally-authenticating a user; and a server, in communication with the client, having a server database for remotely-authenticating the user in response to a request from the client. The system also provides updating of the client database according to results of the local and remote authentication.
61 Citations
20 Claims
-
1. A secure computer device, comprising:
-
a client database locally-authenticating a user of the device; means for granting previously authorized access to the device if the user is locally authenticated; means for generating a remote authentication request; a server database remotely-authenticating the user in response to the authentication request after a successful local authentication; means for granting access to new activities and control parameters on the computer device if remote authentication is successful; means for allowing continued work on authorized activity; means for denying access to new activities until the authorized activity is completed; means for storing identification data from a subsequent user while a previous user'"'"'s activity is being completed and updating the client database according to results of the local and remote authentications; and means for limiting a number of times that a particular client database and/or record in any, or all, of the client databases will be updated during any period of time and/or total number of updates. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer security method, comprising the steps of:
- locally-authenticating a user of a client device with a database of the client;
granting previously authorized access to the device if the user is locally authenticated; generating an authentication request to a server; remotely-authenticating the user with a database of the server in response to the authentication request after a successful local authentication; granting access to new activities and control parameters on the computer device if remote authentication is successful unless the authorized activity is not completed, wherein the new activity is denied; storing identification data from a subsequent user while a previous user'"'"'s activity is being completed; and updating the client database according to results of the local and remote authentications and limiting a number of times that a particular client database and/or, record in any, or all, of the client databases will be updated during any period of time and/or total number of updates. - View Dependent Claims (8, 9, 10, 11, 12)
- locally-authenticating a user of a client device with a database of the client;
-
13. A computer readable storage medium, comprising:
-
logic of a database client locally-authenticating a user of a client device; logic granting previously authorized access to the device if the user is locally authenticated; logic generating an authentication request to a server; logic of a server database remotely authenticating the user in response to the authentication request after successful local authentication; logic granting access to new activities and control parameters on the computer device if remote authentication is successful unless the authorized activity is not completed, wherein the new activity is denied; storing identification data from a subsequent user while a previous user'"'"'s activity is being completed; logic updating the client database according to results of the local and remote authentications; and logic limiting a number of times that a particular client database and/or record in any, or all, of the client databases will be updated during any period of time and/or total number of updates. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A secure computer system, comprising:
-
a client having a client database, locally-authenticating a user; an authentication device that grants previously authorized access if the user is locally authenticated; a server, in communication with the client, having a server database, remotely-authenticating the user in response to a request from the client after a successful local authentication; wherein the authentication device grants access to new activities and control parameters on the computer device if remote authentication is successful unless the authorized activity is not completed, wherein the new activity is denied; storing identification data from a subsequent user while a previous user'"'"'s activity is being completed; means for updating the client database according to results of the local and remote authentications; and means for limiting a number of times that a particular client database and/or record in any, or all, of the client databases will be updated during any period of time and/or total number of updates. - View Dependent Claims (20)
-
Specification