최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0345523 (1994-11-28) |
발명자 / 주소 |
|
인용정보 | 피인용 횟수 : 415 인용 특허 : 0 |
A tokenless security system and method for preventing unauthorized access to one or more secured computer systems is shown. The security system and method are principally based on a correlative comparison of a unique biometric sample, such as a finger print or voice recording, gathered directly from
A tokenless security system and method for preventing unauthorized access to one or more secured computer systems is shown. The security system and method are principally based on a correlative comparison of a unique biometric sample, such as a finger print or voice recording, gathered directly from the person of an unknown user with an authenticated unique biometric sample of the same type obtained from each authorized user. The security system and method may be integrated with and dedicated to a single computer system, or may be configured as a non-dedicated, stand-alone entity capable of and intended to perform security functions simultaneously for more than one computer system. Further, the stand alone configuration can be networked to act as a full or partial intermediary between a secured computer system and its authorized users, or may be interactive solely with and act as a consultant to the computer systems. The security system and method further contemplate the use of personal codes to confirm identifications determined from biometric comparisons, and the use of one or more variants in the personal identification code for alerting authorities in the event of coerced access.
A tokenless security system partially to fully operationally integrated with and dedicated to a computer system for preventing unauthorized access of said designated computer system by determining an unknown user\s identity from an examination of unique biometric characteristics that are specific to
A tokenless security system partially to fully operationally integrated with and dedicated to a computer system for preventing unauthorized access of said designated computer system by determining an unknown user\s identity from an examination of unique biometric characteristics that are specific to the user, said security system comprising: a) means for gathering and recording a biometric sample taken directly and physically from an unknown user, said means otherwise operationally isolated and distinct from said computer system; b) means interconnecting said gathering means and said computer system for transmitting the gathered biometric sample to said secured computer system; c) means integral with said computer system for receiving, storing, retrieving and identifying the gathered biometric sample; d) means integral with said computer system for receiving, storing, retrieving and identifying an authenticated biometric sample obtained from each authorized user of said computer system, access to and manipulation of the authenticated biometric samples limited to systems functions necessary for operation of said security system and to specific users charged with updating and maintaining the authenticated biometric samples; e) means integral with said computer system for comparing the biometric sample of the unknown user with an authenticated biometric sample obtained from other authorized user, and for generating a correlation factor of a first type from each comparison; f) means for evaluating each correlation factor generated by said comparing means in order to determine whether the unknown user is one of said authorized users; and g) means for use by an authorized user, unapparent to a coercive third party, for notifying designated authorities that the authorized user\s access attempt is being coerced, wherein the authorized user is assigned a variable personal code comprising at least two variants, a standard variant which the authorized user enters when the access attempt is voluntary, and one or more alternative variants, any one of which is entered by the authorized user when an access attempt is being coerced.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.