Controlling user access to electronic resources without password
First Claim
1. A method of remotely controlling user access to a restricted computer resource, comprising:
- pre-determining, by a device comprising a processor, an association of the restricted computer resource and computer-resource-proximal environmental information;
receiving, by the device, from a user requesting access to the restricted computer resource, indicia of user-proximal environmental information;
comparing, by the device, the indicia of user-proximal environmental information to associated computer-resource-proximal environmental information;
granting, by the device, selectively user access to the restricted computer resource responsive to the comparing of the indicia of the user-proximal environmental information in which the user-proximal environmental information corresponds to the computer-resource-proximal environmental information;
pre-determining, by the device, an association of a biometric measure with an authorized user;
receiving, by the device, from the user requesting access to the restricted computer resource a user-supplied biometric measure;
comparing, by the device, the user-supplied biometric measure with the associated biometric measure, wherein granting comprises granting selectively user access to the restricted computer resource responsive to the comparing of the indicia of the user-proximal environmental information in which;
(i) the user-proximal environmental information corresponds to the computer-resource-proximal environmental information; and
(ii) the user-supplied biometric measure corresponds to the biometric measure;
contacting, by the device, the user responsive to the comparing of the user-supplied biometric measure in which one of the user-proximal environmental information does not correspond to the computer-resource-proximal environmental information, the user-supplied biometric measure or a combination thereof corresponds to the associated biometric measure;
obtaining, by the device, supplemental user-supplied information;
interpreting, by the device, the supplemental user-supplied information;
granting selectively, by the device, user access to the restricted computer resource responsive to the interpreting of the supplemental user-supplied information; and
securing, by the device, a transfer of the supplemental user-supplied information, wherein securing comprises application of a software agent to establish such secure communications, wherein the software agent is associated with a plurality of networked software agents to collectively detect and deter attempted reverse engineering and to securely examine a state of the device.
2 Assignments
0 Petitions
Accused Products
Abstract
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.
67 Citations
14 Claims
-
1. A method of remotely controlling user access to a restricted computer resource, comprising:
-
pre-determining, by a device comprising a processor, an association of the restricted computer resource and computer-resource-proximal environmental information; receiving, by the device, from a user requesting access to the restricted computer resource, indicia of user-proximal environmental information; comparing, by the device, the indicia of user-proximal environmental information to associated computer-resource-proximal environmental information; granting, by the device, selectively user access to the restricted computer resource responsive to the comparing of the indicia of the user-proximal environmental information in which the user-proximal environmental information corresponds to the computer-resource-proximal environmental information; pre-determining, by the device, an association of a biometric measure with an authorized user; receiving, by the device, from the user requesting access to the restricted computer resource a user-supplied biometric measure; comparing, by the device, the user-supplied biometric measure with the associated biometric measure, wherein granting comprises granting selectively user access to the restricted computer resource responsive to the comparing of the indicia of the user-proximal environmental information in which; (i) the user-proximal environmental information corresponds to the computer-resource-proximal environmental information; and (ii) the user-supplied biometric measure corresponds to the biometric measure; contacting, by the device, the user responsive to the comparing of the user-supplied biometric measure in which one of the user-proximal environmental information does not correspond to the computer-resource-proximal environmental information, the user-supplied biometric measure or a combination thereof corresponds to the associated biometric measure; obtaining, by the device, supplemental user-supplied information; interpreting, by the device, the supplemental user-supplied information; granting selectively, by the device, user access to the restricted computer resource responsive to the interpreting of the supplemental user-supplied information; and securing, by the device, a transfer of the supplemental user-supplied information, wherein securing comprises application of a software agent to establish such secure communications, wherein the software agent is associated with a plurality of networked software agents to collectively detect and deter attempted reverse engineering and to securely examine a state of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification