Method and apparatus for biometric authentication
First Claim
1. A method for authenticating a user, comprising:
- receiving biometric information from a user;
retrieving an authentication policy that includes at least one requirement for authentication based on at least one security condition, including time of day;
retrieving stored user biometric information based on the authentication policy;
comparing the stored user biometric information and the received biometric information based on the authentication policy; and
determining if a user is authentic based on the comparing.
1 Assignment
0 Petitions
Accused Products
Abstract
A biometric authentication method and system may be implemented in a client server architecture to provide substantial access control security and ease of administration. Users are enrolled in the system by providing multiple biometric measurements which are stored in a database as part of the user'"'"'s biometric profile. Upon attempted access of a computer, the biometric authentication engine determines which biometrics are required and what the biometric matching criteria are based on the location of the computer, time of day and other security conditions. If the user is determined not to be authentic, a security policy may cause an action to occur such as revoking the user'"'"'s access privileges or causing the login attempt to appear to be successful while the authorities are summoned.
44 Citations
57 Claims
-
1. A method for authenticating a user, comprising:
-
receiving biometric information from a user; retrieving an authentication policy that includes at least one requirement for authentication based on at least one security condition, including time of day; retrieving stored user biometric information based on the authentication policy; comparing the stored user biometric information and the received biometric information based on the authentication policy; and determining if a user is authentic based on the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for causing a computer to authenticate a user, the computer program product comprising a physical, computer usable medium having computer program logic stored therein, the computer program logic comprising:
-
logic causing the computer to retrieve scanned biometric information for a user from a scanning device; logic causing the computer retrieve an authentication policy that includes user biometric information and requirements for authentication based on at least one security condition, including time of day; logic causing the computer to compare the user biometric information and the scanned biometric information based on the authentication policy; and logic causing the computer to determine if a user is authentic based on the comparing. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A system for authenticating a user, comprising:
-
a persistent storage medium for storing an authentication policy, including at least one requirement for authentication based on at least one security condition, including time of day; a computer in communication with a network, the computer including a server authentication program stored therein, the computer executing the server authentication program to a) receive scanned biometric information from a scanning device for a user;
b) retrieve an authentication policy;
c) retrieve stored user biometric information based on the authentication policy;
d) compare the stored user biometric information and the received biometric information based on the authentication policy; and
e) determine if a user is authentic based on the comparing. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A method for authenticating a user, comprising:
-
receiving biometric information from a user; retrieving an authentication policy that includes a security policy; retrieving stored user biometric information based on the authentication policy; comparing the stored user biometric information and the received biometric information based on the authentication policy; and determining if a user is authentic based on the comparing; and wherein the security policy defines at least one security action when the user is determined not to be authentic. - View Dependent Claims (56)
-
-
57. A method for authenticating a user, comprising:
-
receiving biometric information from a user; retrieving an authentication policy that includes at least one requirement for authentication based on at least one security condition; retrieving stored user biometric information based on the authentication policy; comparing the stored user biometric information and the received biometric information based on the authentication, policy; and determining if a user is authentic based on the comparing; and wherein the security conditions include the time of day of previous failed login attempts by a user.
-
Specification