×

Protecting information on a computer system using multiple authentication methods

DC
  • US 8,869,249 B2
  • Filed: 04/23/2012
  • Issued: 10/21/2014
  • Est. Priority Date: 01/18/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • receiving, for a user, first user authentication information for a first authentication method;

    receiving, for the user, second user authentication information for a second authentication method, the second authentication method being different from the first authentication method;

    upon authenticating the first user authentication information and the second user authentication information, moving, by a computing device, a subset of data stored on a back-end storage device to a front-end storage device, the front-end storage device being directly connected to a user device for the user via a network and the back-end storage device not being directly connected to the network; and

    allowing the user device access to the subset of data on the front-end storage device for a period of time specified to the front-end storage device by the computing device, wherein after the period of time expires, the subset of data is removed from the front-end storage device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×