DATA SECURITY SYSTEM
First Claim
1. A pen-based computing device for accessing secure data, the pen-based computing device having a casing, the pen-based computing device including a facial image sensor for capturing a facial image print, the facial image sensor being positioned at a sensor site in the casing of the pen-based computing device;
- whereby placement of the facial image sensor site in the casing of the pen-based computing device enables an incidental capture of the facial image of a user for purposes of identity authentication prior to each request to access the secure data; and
whereby placement of the sensor site in the casing of the pen-based computing device enables a continuous capture of a facial image print while the pen-based computing device is being used.
2 Assignments
0 Petitions
Accused Products
Abstract
A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior to responding to the user request for data access. The remote computers are handheld when in operational mode. A sensor in the handheld computer captures a biometric image while the remote computer is being used. The biometric sensor is positioned in such a way that the sensor enables the capture of the biometric image continually during computer usage with each request for access to secure data. The biometric authentication occurs in a seamless manner and is incidental to the data request enabling user identity authentication with each request to access secure data.
-
Citations
17 Claims
-
1. A pen-based computing device for accessing secure data, the pen-based computing device having a casing, the pen-based computing device including a facial image sensor for capturing a facial image print, the facial image sensor being positioned at a sensor site in the casing of the pen-based computing device;
-
whereby placement of the facial image sensor site in the casing of the pen-based computing device enables an incidental capture of the facial image of a user for purposes of identity authentication prior to each request to access the secure data; and whereby placement of the sensor site in the casing of the pen-based computing device enables a continuous capture of a facial image print while the pen-based computing device is being used. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A handheld computing device for accessing secure data, said handheld computing device having a casing, said handheld computing device selected from the group consisting of a pocket computer, a palm-type computer, a cell-phone, and a pen-based based computer, said handheld computing device including a retinal scan sensor for capturing user retinal scan data, said retinal scan sensor being positioned at a sensor site in said handheld computing device;
-
whereby placement of said retinal scan sensor site in said handheld computing device enables an incidental capture of said retinal scan data of said user for purposes of identity authentication prior to each request to access the secure data; and whereby placement of said sensor site in said handheld computing device enables a continuous capture of user retinal scan data while said handheld computing device is being used. - View Dependent Claims (7, 8)
-
-
9. A handheld computing device for accessing secure data, said handheld computing device selected from the group consisting of a pocket computer, a palm-type computer, a cell-phone, and a pen-based based computer, said handheld computing device including an iris scan sensor for capturing user iris scan data, said iris scan sensor being positioned at a sensor site in said handheld computing device;
-
whereby placement of said iris scan sensor site in said handheld computing device enables an incidental capture of said iris scan data of said user for purposes of identity authentication prior to each request to access the secure data; and whereby placement of said sensor site in said handheld computing device enables a continuous capture of user iris scan data while said handheld computing device is being used. - View Dependent Claims (10, 11)
-
-
12. A handheld computing device for accessing secure data, said handheld computing device selected from the group consisting of a pocket computer, a palm-type computer, a cell-phone, and a pen-based based computer, said handheld computing device including a facial geometry scan sensor for capturing user facial geometry data, said facial geometry scan sensor being positioned at a sensor site in said handheld computing device;
-
whereby placement of said facial geometry scan sensor site in said handheld computing device enables an incidental capture of said facial geometry scan data of said user for purposes of identity authentication prior to each request to access the secure data; and whereby placement of said sensor site in said handheld computing device enables a continuous capture of user facial geometry scan data while said handheld computing device is being used. - View Dependent Claims (13, 14)
-
-
15. A handheld computing device for accessing secure data, said handheld computing device selected from the group consisting of a pocket computer, a palm-type computer, a cell-phone, and a pen-based based computer, said handheld computing device including a facial thermal pattern scan sensor for capturing user facial thermal pattern data, said facial thermal pattern scan sensor being positioned at a sensor site in said handheld computing device;
-
whereby placement of said facial thermal pattern scan sensor site in said handheld computing device enables an incidental capture of said facial thermal pattern data of said user for purposes of identity authentication prior to each request to access the secure data; and whereby placement of said sensor site in said handheld computing device enables a continuous capture of user facial thermal pattern scan data while said handheld computing device is being used. - View Dependent Claims (16, 17)
-
Specification