Login renewal based on device surroundings
DCFirst Claim
Patent Images
1. A system comprising:
- a computer peripheral, detecting information about a first surrounding of the computer;
a computer, running a routine which allows a user to identify themselves to the computer, and controls access to the computer based on said identify and said first surrounding; and
wherein said computer determines a first surrounding at a time of user identification, and maintains the computer unlocked while the computer is within said first surrounding, and causes the computer to lock when the computer is detected to have moved from said first surrounding by a predetermined and relative amount.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system of allowing user login to a computer. The user is allowed to login by entering some kind of personal identification information e.g. biometric, password or hand. Once login, the computer detects its surroundings. The surrounding detecting can be by GPS, e.g. to detect location, or can use a camera to detect of view of a user. When the user does not properly login, account of the incorrect login is maintained. Each increment of the incorrect login'"'"'s causes the security to increase.
76 Citations
14 Claims
-
1. A system comprising:
-
a computer peripheral, detecting information about a first surrounding of the computer; a computer, running a routine which allows a user to identify themselves to the computer, and controls access to the computer based on said identify and said first surrounding; and wherein said computer determines a first surrounding at a time of user identification, and maintains the computer unlocked while the computer is within said first surrounding, and causes the computer to lock when the computer is detected to have moved from said first surrounding by a predetermined and relative amount. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
-
a computer peripheral, detecting information about a current surrounding of the computer; a computer, running a routine which allows a user to identify themselves to the computer, and controls access to the computer based on said identify and said current surrounding; wherein said computer determines a first surrounding at a time of user identification, and maintains the computer unlocked while the computer is in said first surrounding, and causes the computer to lock when the computer is detected to vary from said first surrounding by a predetermined amount; and further comprising a failure processing routine, which processes failures in login by increasing security for each of a plurality of times when a login fails, and increasing a security of the computer when a user powers down the computer in response to being prompted to identify themselves.
-
-
7. A method, comprising:
-
carrying out a first security operation which allows a user to obtain access to resources of the computer; determining surroundings information, including first surroundings information associated with said first security operation, and second surroundings information at times subsequent to said first surroundings information; and allowing continued access to resources of the computer only so long as said second surroundings information does not differ from said first surroundings information by more than a specified relative amount of distance, and if said second surroundings information differs from said first surroundings information by more than said specified relative amount of distance, then requiring a new security operation to obtain said access to said resources. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
carrying out a first security operation which allows a user to obtain access to resources of the computer; determining surroundings information, including first surroundings information associated with said first security operation, and second surroundings information at times subsequent to said first surroundings information; allowing continued access to resources of the computer only so long as said second surroundings information does not differ from said first surroundings information by more than a specified threshold, and if said second surroundings information differs from said first surroundings information by more than said specified threshold, then requiring a new security operation to obtain said access to said resources; and wherein said determining comprises triangulating to determine a position.
-
Specification