Protecting information on a computer system using multiple authentication methods
DCFirst Claim
1. A method comprising:
- receiving, for a user, first user authentication information for a first authentication method;
receiving, for the user, second user authentication information for a second authentication method, the second authentication method being different from the first authentication method;
upon authenticating the first user authentication information and the second user authentication information, moving, by a computing device, a subset of data stored on a back-end storage device to a front-end storage device, the front-end storage device being directly connected to a user device for the user via a network and the back-end storage device not being directly connected to the network; and
allowing the user device access to the subset of data on the front-end storage device for a period of time specified to the front-end storage device by the computing device, wherein after the period of time expires, the subset of data is removed from the front-end storage device.
0 Assignments
Litigations
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes receiving, for a user, first user authentication information for a first authentication method and receiving, for the user, second user authentication information for a second authentication method. The second authentication method is different from the first authentication method. Upon authenticating the first user authentication information and the second user authentication information, the method moves a subset of data stored on a back-end storage device to a front-end storage device. The front-end storage device is directly connected to the user via a network and the back-end storage device not being directly connected to the network. The method then allows access to the subset of data for a period of time, wherein after the period of time expires, the subset of data is removed from the front-end storage device.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, for a user, first user authentication information for a first authentication method; receiving, for the user, second user authentication information for a second authentication method, the second authentication method being different from the first authentication method; upon authenticating the first user authentication information and the second user authentication information, moving, by a computing device, a subset of data stored on a back-end storage device to a front-end storage device, the front-end storage device being directly connected to a user device for the user via a network and the back-end storage device not being directly connected to the network; and allowing the user device access to the subset of data on the front-end storage device for a period of time specified to the front-end storage device by the computing device, wherein after the period of time expires, the subset of data is removed from the front-end storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium containing instructions for controlling a computer system to be configured for:
-
receiving, for a user, first user authentication information for a first authentication method; receiving, for the user, second user authentication information for a second authentication method, the second authentication method being different from the first authentication method; upon authenticating the first user authentication information and the second user authentication information, moving a subset of data stored on a back-end storage device to a front-end storage device, the front-end storage device being directly connected to a user device for the user via a network and the back-end storage device not being directly connected to the network; and allowing the user device access to the subset of data on the front-end storage device for a period of time specified to the front-end storage device by the computing system, wherein after the period of time expires, the subset of data is removed from the front-end storage device. - View Dependent Claims (12, 13, 14)
-
-
15. A method comprising:
-
receiving, for a user, first user authentication information for a first authentication method; upon authenticating the first user authentication information, moving a subset of data stored on a back-end storage device to a front-end storage device after receiving, for the user, a second user authentication information, wherein the front-end storage device is accessible to a user device for the user via a network and the back-end storage device is not directly connected to the network; receiving, for the user, second user authentication information for a second authentication method, the second authentication method being different from the first authentication method; upon authenticating the second user authentication information, enabling, by a computing device, user access to the subset of data that has been moved to the front-end storage device via the network; and allowing the user device access to the subset of data on the front-end storage device for a period of time specified to the front-end storage device by the computing device, wherein after the period of time expires, the subset of data is removed from the front-end storage device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification