Data security system
First Claim
Patent Images
1. A data security system for a computer system, comprising:
- a security module that is separate from the computer system;
image data associated with a fingerprint of a user through the use of said security module, said image data being stored on said security module;
an application interface generated by said security module and communicative with said computer system, where the application interface is displayed on said computer system;
at least one software application that is stored on said computer system, where said security module controls access to said at least one software application by said image data; and
at least one software data file used in said at least one software application, where said at least one software file is stored on said security module;
wherein the application interface includes a graphical user interface, including at least one of a link and a button, the graphical user interface configured to select the at least one software application.
1 Assignment
0 Petitions
Accused Products
Abstract
A data security system controls access to and interfaces with a computer system by requiring user verification through fingerprint sensing. The data security system includes a security module having a fingerprint sensor, image data, and an application interface that is generated by the security module and communicative with the computer system. The image data is associated with a fingerprint of a user through the use of the security module.
8 Citations
29 Claims
-
1. A data security system for a computer system, comprising:
-
a security module that is separate from the computer system; image data associated with a fingerprint of a user through the use of said security module, said image data being stored on said security module; an application interface generated by said security module and communicative with said computer system, where the application interface is displayed on said computer system; at least one software application that is stored on said computer system, where said security module controls access to said at least one software application by said image data; and at least one software data file used in said at least one software application, where said at least one software file is stored on said security module; wherein the application interface includes a graphical user interface, including at least one of a link and a button, the graphical user interface configured to select the at least one software application. - View Dependent Claims (2, 3, 4, 5, 6, 27, 28, 29)
-
-
7. A security module for a computer system, comprising:
-
a fingerprint sensor adapted to scan the fingerprint of a user; a microprocessor communicative with said fingerprint sensor, said microprocessor adapted to store data, encrypt data, and control access to said computer system; a memory location including at least one software data file used in a software application that is executable on said computer system; a connector port coupled to said fingerprint sensor and said microprocessor; and a connecting device that includes a first port for connection to the security module and a second port for connection to a computer system; wherein the security module is a separate component from the computer system, and wherein the security module generates an application interface displayed on said computer system, the application interface including a graphical user interface having at least one of a link and a button, the graphical user interface configured to select at least one software application stored on the computer system. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of controlling access to and securing data located on a computer system, comprising the steps of:
-
providing a data security system having a fingerprint sensor and a microprocessor with memory storage capability, wherein the security module is a separate component from the computer system; storing an encryption key having a registered user fingerprint template in said microprocessor; determining whether a fingerprint scanned by said fingerprint sensor matches said fingerprint template; displaying a graphical user interface including at least one of buttons and links to applications located on said computer system and said data security system when said scanned fingerprint matches said fingerprint template; and sending at least one software data file from said security module to said computer system, where said software data file is used in said applications. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification