Data security system
First Claim
1. A computer network comprising:
- a host processor; and
a plurality of computing devices, at least one of the computing devices being remote from the host processor, the at least one of the computing devices being handheld and portable, the at least one of the computing devices enabling capture by at least one biometric sensor of a user biometric image of a finger, thumb, or palm, the at least one of the computing devices providing authentication of a user prior to responding to user access to network data, the authentication being biometric authentication, placement of the biometric sensor enabling capture of the user biometric image that becomes available at continual intervals during routine computer usage, the capture of the user biometric image being incidental to routine computer usage, the capture of the user biometric image being seamless and incidental to the data request from the at least one of the computing devices to the host processor enabling user identity authentication with user request to access network data.
3 Assignments
0 Petitions
Accused Products
Abstract
A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior to responding to the user request for data access. The remote computers are handheld when in operational mode. A sensor in the handheld computer captures a biometric image while the remote computer is being used. The biometric sensor is positioned in such a way that the sensor enables the capture of the biometric image continually during computer usage with each request for access to secure data. The biometric authentication occurs in a seamless manner and is incidental to the data request enabling user identity authentication with each request to access secure data.
153 Citations
17 Claims
-
1. A computer network comprising:
-
a host processor; and
a plurality of computing devices, at least one of the computing devices being remote from the host processor, the at least one of the computing devices being handheld and portable, the at least one of the computing devices enabling capture by at least one biometric sensor of a user biometric image of a finger, thumb, or palm, the at least one of the computing devices providing authentication of a user prior to responding to user access to network data, the authentication being biometric authentication, placement of the biometric sensor enabling capture of the user biometric image that becomes available at continual intervals during routine computer usage, the capture of the user biometric image being incidental to routine computer usage, the capture of the user biometric image being seamless and incidental to the data request from the at least one of the computing devices to the host processor enabling user identity authentication with user request to access network data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer network comprising:
-
a host processor; and
a plurality of computing devices, at least one of the computing devices being remote from the host processor, the at least one of the computing devices being handheld and portable, at least one of the computing devices enabling capture through at least one biometric sensor of a user biometric image, the at least one of the computing devices providing biometric authentication of a user prior to responding to user access to network data, the authentication being biometric authentication;
whereby capture of the user biometric image is available at continual intervals during routine computer usage; and
whereby the capture of the user biometric image is incidental to routine computer usage, the biometric authentication being seamless, the capture of the biometric image being in an incidental manner as the data request is submitted from the at least one computing device to the host processor enabling user identity authentication with the request to access the network data. - View Dependent Claims (8, 9, 10, 11, 12)
-
- 13. A computing device for access to a secure data, the computing device being handheld and portable, the computing device including at least one sensor for capture of a user biometric image, the computing device providing authentication of user identity prior to responding to user access to secure data, placement of the biometric sensor enabling capture of an image of a portion of a hand of a user during routine computer usage, the capture of the user biometric image being incidental to routine computer usage, the capture of the user biometric image being seamless to the data request enabling identity authentication with each user request for data access.
Specification