Computer system protection
First Claim
Patent Images
1. A method for protecting access to information on a computer system having a first level of authentication, comprising:
- registering, in a database of a computer access protection system, a plurality of answers to a respective plurality of secret questions, wherein said answers are selected by and associated with a legitimate user of said computer system;
registering, in said database, a plurality of user passwords selected by said legitimate user, wherein each of said passwords is associated with a secret question of the plurality of secret questions and its respective answer;
detecting, by said computer access protection system, when said computer system moves outside a designated area; and
communicating, by said computer access protection system, a token to said computer system upon the computer system moving outside the designated area;
wherein said token includes authentication information associated with said legitimate user obtained from said database and triggers a second level authentication when said computer system is subsequently started outside the designated area, and wherein failure of said second level of authentication results in locking of functionalities within said computer system.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products for computer system protection are provided. Embodiments protect against unauthorized access to information on stolen and/or illegally transported computer systems. Embodiments include locking of functionalities within a computer system when the computer system moves outside a designated area. Embodiments include limiting access to functionalities within the computer system based on the location of the computer system. Embodiments of the present invention include allowing variable levels of access protection depending on the location of the computer system.
-
Citations
30 Claims
-
1. A method for protecting access to information on a computer system having a first level of authentication, comprising:
-
registering, in a database of a computer access protection system, a plurality of answers to a respective plurality of secret questions, wherein said answers are selected by and associated with a legitimate user of said computer system; registering, in said database, a plurality of user passwords selected by said legitimate user, wherein each of said passwords is associated with a secret question of the plurality of secret questions and its respective answer; detecting, by said computer access protection system, when said computer system moves outside a designated area; and communicating, by said computer access protection system, a token to said computer system upon the computer system moving outside the designated area; wherein said token includes authentication information associated with said legitimate user obtained from said database and triggers a second level authentication when said computer system is subsequently started outside the designated area, and wherein failure of said second level of authentication results in locking of functionalities within said computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for protecting access to information on a computer system having a first level of authentication, comprising:
-
a centralized surveillance system configured to detect when said computer system moves outside a designated area; a database configured to store authentication information associated with a legitimate user of said computer system, wherein said database includes a plurality of answers to a respective plurality of secret questions, said answers selected by and associated with said legitimate user of said computer system; and a radio frequency (RF) communication system configured to communicate a token to said computer system upon the computer system moving outside the designated area, wherein said token includes authentication information from said database and is configured to trigger a second level of authentication when said computer system is subsequently started outside the designated area. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A method for protecting access to information on a computer system having a first level of authentication, comprising:
-
detecting, by a computer access protection system, when said computer system moves outside a designated area; generating a token by said computer access protection system, wherein said token includes a secret question, an answer to the secret question, and a password, the secret question, answer, and password selected by and associated with a legitimate user of said computer system; communicating the token, by said computer access protection system, to said computer system upon the computer system moving outside the designated area, wherein said token triggers a second level authentication when said computer system is subsequently started outside the designated area, and wherein failure of said second level of authentication results in locking of functionalities within said computer system.
-
Specification