Support for multiple login method
First Claim
1. A method of securing stored data on a computer system, the method comprising:
- receiving one of several different password data at the computer system;
transforming key data with one of the several different password data in a reversible fashion to produce encoded key data such that the one of the several different password data is required in order to perform a reverse transform and extract the key data from the encoded key data; and
storing the encoded key data such that the one of the several different password data and one of a plurality of user authorization processes, in combination, provide access to the key data,wherein the key data is encoded with each of the several different password data to provide different encoded key data for each user authorization process such that a combination of one of the user authorization processes and a respective password data of the several different password data allows for retrieval and decoding of the key data, andwherein the key data is for performing at least one of encrypting and decrypting the stored data on the computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of securing security data stored on a computer system is disclosed. The method comprises providing a data key to the computer system. The data key is used for transforming the security data in a reversible fashion to produce an encoded secure data such that the data key is required in order to perform a reverse transform and extract the security data from the encoded secure data. The encoded secure data are stored secure data in a fashion such that a user authorization process is used to retrieve the encoded secure data. Furthermore, the encoded secure data are stored such that the data key and the user authorization process in combination provide access to the security data and such that the stored data within the computer system is encoded.
-
Citations
37 Claims
-
1. A method of securing stored data on a computer system, the method comprising:
-
receiving one of several different password data at the computer system; transforming key data with one of the several different password data in a reversible fashion to produce encoded key data such that the one of the several different password data is required in order to perform a reverse transform and extract the key data from the encoded key data; and storing the encoded key data such that the one of the several different password data and one of a plurality of user authorization processes, in combination, provide access to the key data, wherein the key data is encoded with each of the several different password data to provide different encoded key data for each user authorization process such that a combination of one of the user authorization processes and a respective password data of the several different password data allows for retrieval and decoding of the key data, and wherein the key data is for performing at least one of encrypting and decrypting the stored data on the computer system. - View Dependent Claims (2, 3)
-
-
4. A method of securing stored data on a computer system, the method comprising:
-
comparing a biometric information source against stored templates associated with the biometric information source and, based upon a comparison result, pairing a biometric information source with a first individual identity; receiving one of several different password data associated with the first individual identity, the one of the several different password data being other than that stored on the computer system; and retrieving encoded key data associated with the biometric information, and using the one of the several different password data for decoding the encoded key data, wherein the key data is encoded with the several different password data to provide different encoded key data for each user authorization process such that a combination of user authorization by the biometric information source in one of the user authorization processes and a different one of the several different password data allows for retrieval and decoding of the same security data, and wherein the key data is for performing at least one of encrypting and decrypting the stored data on the computer system. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
10. A method of securing data, the method comprising:
-
receiving a first information sample at a computer system; encoding one of several different password data in dependence upon the first information sample to produce key data, the key data for use in decoding stored encoded data; receiving at least one biometric information sample; and securing the key data in dependence upon the at least one biometric information sample, wherein the key data is encoded with the several different password data to provide different encoded key data for each user authorization process such that a combination of user authorization using the biometric information sample in one of the user authorization processes and a different one of the several different password data allows for retrieval and decoding of the key data, and wherein the key data is for performing at least one of encrypting and decrypting the stored data on the computer system. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method of securing data, comprising:
-
receiving a first information sample at a computer system; receiving at least one biometric information sample; encoding the at least one biometric information sample using the first information sample; encoding one of several different password data based, at least in part, on the encoded biometric sample to produce key data; and securing the key data based, at least in part, on the at least one biometric information sample, wherein the key data is encoded with the several different password data to provide different encoded key data for each user authorization process such that a combination of user authorization using the biometric information sample in one of the user authorization processes and a different one of the several different password data allows for retrieval and decoding of the key data, and wherein the key data is for performing at least one of encrypting and decrypting the stored data on the computer system. - View Dependent Claims (16, 17)
-
-
18. A computer system for securing stored data, the computer system comprising:
-
an input device configured to provide at least one of several different password data to the computer system; a processing device configured to encode key data with the several different password data in a reversible fashion to produce different encoded key data for each user authorization process such that respective ones of the several different password data are required in order to perform a reverse transform and extract the key data from the encoded key data, wherein the processing device uses the key data for performing at least one of encrypting and decrypting the stored data on the computer system; a memory device configured to store the encoded key data; and a user authorization process configured to retrieve the encoded key data from the memory device such that at least one of the several different password data and the user authorization process, in combination, provide access to the key data, wherein a combination of user authorization using said user authorization process and a different one of the several different password data allows for retrieval and decoding of the key data. - View Dependent Claims (19, 20, 21)
-
-
22. A computer system for securing stored data, the computer system comprising:
-
means for comparing a biometric information source against stored templates associated with the biometric information source and, in dependence upon a comparison result, pairing a biometric information source with a first individual identity; an input device configured to provide to the computer system a different password data for each user authorization process associated with the first individual identity, the password data being other than stored on the computer system; means for retrieving encoded key data associated with the biometric information and for using the password data for decoding the encoded key data, wherein a combination of user authorization by the biometric information source in one of the user authorization processes and a different one of the different password data allows for retrieval and decoding of the same key data; and means for performing at least one of encrypting and decrypting the stored data on the computer system using the decoded key data. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. A computer system for securing stored data, the computer system comprising:
-
an input device configured to provide a first information sample to the computer system; means for encoding a key data with different password data for each user authentication process in dependence upon the first information sample to produce first security data, the key data for use in decoding the stored data; a biometric input device configured to provide at least one biometric information sample; means for securing the first security data in dependence upon at least one of the at least one biometric information sample in one of the user authorization processes, wherein a combination of user authorization using the biometric information sample and any of said different password keys allows for retrieval and decoding of the key data; and means for performing at least one of encrypting and decrypting the stored data on the computer system using the decoded key data. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A computer system for securing stored data, comprising:
-
an input device configured to provide a first information sample to the computer system; a biometric input device configured to provide at least one biometric information sample to the computer system; means for encoding the at least one biometric information sample using the first information sample and for encoding one of several different password data in dependence upon the encoded biometric sample to produce key data, the key data for use in decoding stored encoded data, wherein the key data is encoded with the different password data for each user authorization process to provide different encoded key data such that a combination of user authorization using the biometric information sample in one of the user authorization processes and any of the different password data allows for retrieval and decoding of the key data; means for securing the key data in dependence upon at least one of the at least one biometric information sample; and means for performing at least one of encrypting and decrypting the stored data on the computer system using the decoded key data. - View Dependent Claims (34)
-
-
35. A computer readable storage medium for securing stored data on a computer system, the computer readable storage medium having computer executable instructions stored thereon that, when executed, perform a method comprising:
-
transforming key data with one of several different password data from the computer system in a reversible fashion to produce encoded key data such that the one of the several different password data is required in order to perform a reverse transform and extract the key data from the encoded key data; and storing the encoded key data such that the one of the several different password data and one of a plurality of user authorization processes, in combination, provide access to the key data, wherein the key data is encoded with each of the several different password data to provide different encoded key data for each user authorization process such that a combination of one of the user authorization processes and a respective password data of the several different password data allows for retrieval and decoding of the key data, and wherein the key data is for performing at least one of encrypting and decrypting the stored data on the computer system. - View Dependent Claims (36, 37)
-
Specification