×

Security system and method for controlling access to computing resources

  • US 9,251,332 B2
  • Filed: 12/19/2008
  • Issued: 02/02/2016
  • Est. Priority Date: 12/19/2007
  • Status: Active Grant
First Claim
Patent Images

1. A system for securing computing resources, the system comprising:

  • a personal digital key adapted for wireless communication within a predefined range to establish a link and send and receive data, the personal digital key associated with a user and storing security data used to access a particular computing resource as described by security set up data for the particular computing resource;

    a reader for automatically detecting the presence of the personal digital key and establishing a link with the personal digital key, the reader having an input and an output and adapted for wireless communication with the personal digital key when the reader and the personal digital key are within the predefined range of each other, the reader automatically signaling a computing device whether it is linked to the personal digital key; and

    the computing device having computing resources including the particular computing resource, the computing device coupled to the input and the output of the reader for sending and receiving data;

    the computing device including a security system for controlling access to the computing resources of the computing device based on security set up data, wherein the security set up data is stored in a dedicated encrypted portion of a memory of the computing device and includes information on how to control access to the computing resources using security data, but does not include the security data used to obtain access, wherein the security set up data is based on one or more user defined options allowing the user to implement different security actions for different computing resources, wherein the different security actions include a biometric confirmation for a respective computing resource, the security system controlled by the signal from the reader indicating whether the reader is linked to the personal digital key and terminating access to the computing resource based on an exit-based rule of the security set up data associated with the computing resource when the personal digital key and the reader are no longer within the predefined range.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×