Methods and systems for securing data by providing continuous user-system binding authentication
First Claim
1. A method for managing data security, comprising,receiving user identification information from a screen of a device that is connectable to a database of secure information, the database being stored on a non-transitory computer readable medium;
- receiving captured image data of a user associated with the user identification information;
authenticating the user based on the received identification information and the received captured image data;
providing access to the database of secure information upon authenticating the user, such that while the access is provided the receiving of captured image data of the user is continued to define a plurality of frames;
continuously recording data of user interactive input and viewed images displayed on the screen while the access is provided; and
continuously binding the plurality of frames of the captured image data of the user to the recorded data to produce audit data for the user during a time of accessing the database of secure information, the binding associating certain ones of the plurality of frames to certain of the recorded data of the user interactive input and the viewed images, the method being executed by a processor;
wherein the audit data is associated with one or more user policy violations, each policy violation being searchable to enable review of the user and actions taken that produced each policy violation and the audit data includes screen captures made of the screen.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, methods, and computer programs are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method proceeds to authenticating of the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method further includes providing access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method binds the captured image data of the user to the recorded data to produce audit data for the user when accessing the database of secure information. The method is executed by a processor.
-
Citations
16 Claims
-
1. A method for managing data security, comprising,
receiving user identification information from a screen of a device that is connectable to a database of secure information, the database being stored on a non-transitory computer readable medium; -
receiving captured image data of a user associated with the user identification information; authenticating the user based on the received identification information and the received captured image data; providing access to the database of secure information upon authenticating the user, such that while the access is provided the receiving of captured image data of the user is continued to define a plurality of frames; continuously recording data of user interactive input and viewed images displayed on the screen while the access is provided; and continuously binding the plurality of frames of the captured image data of the user to the recorded data to produce audit data for the user during a time of accessing the database of secure information, the binding associating certain ones of the plurality of frames to certain of the recorded data of the user interactive input and the viewed images, the method being executed by a processor; wherein the audit data is associated with one or more user policy violations, each policy violation being searchable to enable review of the user and actions taken that produced each policy violation and the audit data includes screen captures made of the screen. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for managing data security, comprising,
receiving user identification information from a screen of a device that is connectable to a database of secure information, the database being stored on a non-transitory computer readable medium; -
receiving captured image data of a user associated with the user identification information; authenticating the user based on the received identification information and the received captured image data; providing access to the database of secure information upon authenticating the user, such that while the access is provided the receiving of captured image data of the user is continued to define a plurality of frames; continuously recording data of user interactive input and viewed images displayed on the screen while the access is provided; and continuously binding the plurality of frames of the captured image data of the user to the recorded data to produce audit data for the user during a time of accessing the database of secure information, the binding associating certain ones of the plurality of frames to certain of the recorded data of the user interactive input and the viewed images; wherein the audit data is associated with one or more user policy violations, each policy violation being searchable to enable review of the user and actions taken that produced each policy violation and the audit data includes screen captures made of the screen.
-
Specification