Flexible method of user authentication
First Claim
1. A computer-readable storage device storing instructions for authorizing a user, wherein the instructions, when executed by a computing system, cause the computing system to perform operations comprising:
- receiving user authorization information from at least two available user information entry devices in communication with the computing system, wherein each of the at least two available user information entry devices in communication with the computing system is associated with a corresponding security value;
determining a user authorization method, the user authorization method requiring data from the at least two available user information entry devices, and the user authorization method having a corresponding authorization level, the authorization level resulting from a combination of the security values corresponding to the at least two available user information entry devices; and
registering the user at the authorization level according to the determined authorization method.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices in communication with the workstation. The system then determines predetermined user authorization methods each requiring data only from available user information entry devices. The user then selects one of the determined authorization methods for use in user authorization. Optionally, each authorization method is associated with a security level relating to user access to resources. Once the authorization method is selected, the user provides user authorization information in accordance with a determined user authorization method and registration proceeds.
-
Citations
20 Claims
-
1. A computer-readable storage device storing instructions for authorizing a user, wherein the instructions, when executed by a computing system, cause the computing system to perform operations comprising:
-
receiving user authorization information from at least two available user information entry devices in communication with the computing system, wherein each of the at least two available user information entry devices in communication with the computing system is associated with a corresponding security value; determining a user authorization method, the user authorization method requiring data from the at least two available user information entry devices, and the user authorization method having a corresponding authorization level, the authorization level resulting from a combination of the security values corresponding to the at least two available user information entry devices; and registering the user at the authorization level according to the determined authorization method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for authorizing a user, the system comprising:
-
at least one memory and processor; an entry device detector configured to determine two or more available user information entry devices from a plurality of different user information entry devices in communication with the system, wherein each of the determined two or more available user information entry devices is associated with a corresponding security level; a security interface configured to receive and verify authorization information from the determined two or more available user information entry devices; a combining component configured to determine an authorization level, the authorization level resulting from a combination of the security levels corresponding to the determined two or more available user information entry devices; and an access component configured to register the user at the authorization level, allowing the user access to resources at or below the authorization level. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for authorizing a user, the system comprising:
-
at least one memory and processor; means for determining two or more available user information entry devices from a plurality of different user information entry devices in communication with the system, wherein each of the determined two or more available user information entry devices is associated with a corresponding security level; means for receiving and verifying authorization information from the determined two or more available user information entry devices; and means for determining an authorization level, the authorization level resulting from combining the security levels corresponding to the determined two or more available user information entry devices. - View Dependent Claims (19, 20)
-
Specification