×

Methods and systems for active data security enforcement during protected mode use of a system

  • US 9,053,335 B2
  • Filed: 03/14/2013
  • Issued: 06/09/2015
  • Est. Priority Date: 04/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for enforcing data security, comprising:

  • receiving user identification information from a screen of a device that is connectable to a database of secure information, the database being stored on a non-transitory computer readable medium;

    receiving captured image data of a user associated with the user identification information;

    authenticating the user initially based on the received identification information and the received captured image data;

    providing access to the database, during a session, of secure information upon authenticating the user, and re-authenticating the user while the access is provided during the session, the re-authenticating occurring one or more times during the session and being based on analysis of captured image data received after the initial authentication and during the session; and

    recording data of user interactive input, viewed images displayed on the screen, and captured image data corresponding to the user interactive input and viewed images while the access is provided;

    monitoring the user interactive input and viewed images displayed to identify activities of the user for accessing the database while the access is provided; and

    disabling the access to the database of secure information when the monitoring identifies a predefined security enforcement violation associated with an activity by the user during access to the database, wherein rules are assigned to the user to enable detection of the predefined security enforcement violation for the activities of the user, wherein the re-authenticating occurring one or more times during the session includes periodically performing the re-authentication or continuously performing the re-authentication during the session and the method being executed by a processor.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×