IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0840757
(2013-03-15)
|
등록번호 |
US-8713701
(2014-04-29)
|
발명자
/ 주소 |
|
출원인 / 주소 |
- StrikeForce Technologies, Inc.
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
7 인용 특허 :
27 |
초록
▼
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The access-seeker has a peripheral device operative within an authentication channel to communicate with the securit
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The access-seeker has a peripheral device operative within an authentication channel to communicate with the security system. The access-seeker initially presents identification and password data over an access channel which is intercepted and transmitted to the security computer. The security computer then communicates with the access-seeker. A biometric analyzer—a voice or fingerprint recognition device—operates upon instructions from the authentication program to analyze the monitored parameter of the individual. In the security computer, a comparator matches the biometric sample with stored data, and, upon obtaining a match, provides authentication. The security computer instructs the host computer to grant access and communicates the same to the access-seeker, whereupon access is initiated over the access channel.
대표청구항
▼
1. A security system for accessing a host computer comprising: an access channel comprising: an interception device for receiving a login identification originating from an accessor for access to said host computer; andan authentication channel comprising: a security computer for receiving from said
1. A security system for accessing a host computer comprising: an access channel comprising: an interception device for receiving a login identification originating from an accessor for access to said host computer; andan authentication channel comprising: a security computer for receiving from said interception device said login identification and for communicating access information to said host computer and for communicating with a peripheral device of said accessor;a database having at least one peripheral address record corresponding to said login identification;a prompt mechanism for instructing said accessor to enter predetermined data at and transmit said predetermined data from said peripheral device; anda comparator for authenticating access demands in response to the transmission of said predetermined data by verifying a match between said predetermined data and said entered and transmitted data,wherein said security computer outputs an instruction to the host computer to either grant access thereto using said access channel or to deny access thereto. 2. A security system as described in claim 1, wherein: said peripheral device is a telephone with a tone generating keypad for entering data; and,said prompt mechanism is an auditory message describing data to be entered. 3. A security system as described in claim 2, said security computer further comprises: an announcement database; anda voice module for selecting a prerecorded auditory message from said announcement database and, for prompting the entry of data by said accessor, playing said prerecorded auditory message over said telephone. 4. A security system as described in claim 3, wherein upon outputting an instruction to the host computer to grant access, said security computer communicates in said authentication channel the access information to said accessor by selecting and transmitting an access-granted message from said announcement database and sequentially disconnecting from the connection with said telephone prior to use of said access channel. 5. A security system as described in claim 2, said authentication channel further comprises: a voice module, capable of synthesizing an auditory message, and, for prompting the entry of data by said accessor, playing a synthesized auditory message over said telephone. 6. A security system as described in claim 5, further comprising: an announcement database, wherein upon outputting an instruction to the host computer to grant access, said security computer communicates in said authentication channel the access information to said accessor by selecting and transmitting an access-granted message from said announcement database and sequentially disconnecting from the connection with said telephone prior to use of said access channel. 7. A security system as described in claim 1, wherein said security computer further comprises: An authentication program mechanism for authenticating access to said host computer;a biometric analyzer operating in response to instructions from said authentication program mechanism for analyzing a monitored parameter of said accessor; and,a biometric parameter database addressable by said biometric analyzer for retrieval of a previously registered sample of said accessor, said sample corresponding to the identification of said accessor. 8. A security system as described in claim 7, said biometric analyzer is a voice recognition program for operation within said authentication channel. 9. A security system as described in claim 8, wherein said voice recognition program comprises: a speech database for retrieval of a speech sample of said accessor corresponding to said login identification;said security computer adapted to provide instructions to connect and disconnect said security computer to and from said peripheral device;voice sampling means for instructing said accessor to repeat back and transmit a predetermined auditory statement over said peripheral device;voice recognition means for authenticating at least one access demands in response to transmission of said predetermined auditory statement; and,said security computer, upon authenticating a match between the predetermined auditory statement and the transmitted voice data and upon disconnecting from said authentication channel, providing authentication of the accessor and instructing the host computer to grant access along said access channel. 10. A security system as described in claim 7, said biometric analyzer comprises a fingerprint verification program. 11. A security system for granting and denying access to a host computer, said access in response to a demand from an accessor for access to the host computer, said accessor having a cellular telephone for providing communications to the security system, said security system comprising: a login identification accompanying said demand from said accessor;an interception mechanism for receiving said login identification, said interception mechanism being in an access channel;an authentication channel operating independently from said access channel, said authentication channel comprising: a security computer adapted in an access-channel mode to receive said login identification from said interception mechanism and to communicate access information to said host computer and in an authentication-channel mode to communicate with said cellular telephone;a subscriber database for retrieval of peripheral addresses corresponding to said login identification;wherein said security computer is adapted to connect to said associated cellular telephone of said accessor;a prompt mechanism for instructing said accessor to enter and transmit predetermined data using said cellular telephone;a comparator for authenticating an access demand in response to receipt of said predetermined data from said cellular telephone;said security computer, upon verifying a match between said predetermined data and said transmitted data, providing in the access-channel mode instructions to the host computer to grant access thereto along said access channel;an authentication program mechanism, operating independently from said host computer, for authenticating said accessor demanding access to said host computer;a biometric analyzer operating in response to said instructions from said authentication program means to analyze a monitored parameter of said accessor; and,a biometric parameter database addressable by said biometric analyzer for retrieval of a previously registered sample of said accessor, said sample corresponding to the identification of said accessor. 12. A security system as described in claim 11, wherein said security computer further comprises: an announcement database; anda voice module capable of selecting a prerecorded auditory message from said announcement database and for prompting the entry of data by said accessor, playing said prerecorded auditory message over said telephone. 13. A security system as described in claim 12, wherein, upon attaining an access-granted condition, said security computer communicates in said authentication channel the access information to said accessor by selecting and transmitting an access-granted message from said announcement database and sequentially disconnecting from the connection with said telephone prior to use of said access channel. 14. A security system as described in claim 11, wherein said authentication channel further comprises: a voice module capable of synthesizing an auditory message, and, for prompting the entry of data by said accessor, playing a synthesized auditory message over said telephone. 15. A security system as described in claim 11, wherein said biometric analyzer comprises a voice recognition program for operation within said authentication channel to authenticate said accessor. 16. A security system as described in claim 15, wherein said voice recognition program comprises: a speech database for retrieval of a speech sample of said accessor corresponding to the login identification of said accessor;said security computer adapted to provide instructions to connect and disconnect said security computer to and from said cellular telephone;a voice sampling mechanism for instructing said accessor to repeat back and transmit a predetermined auditory statement over said cellular telephone to said security computer;a voice recognition modules in said security computer for authenticating access demands in response to transmission of said predetermined auditory statement received over said cellular telephone; and,wherein said security computer, upon authenticating a match between the predetermined auditory statement and the transmitted voice data and upon disconnecting from said authentication channel, providing authentication of said accessor and instructing the host computer to grant access along said access channel. 17. A security system as described in claim 11, wherein said biometric analyzer comprises a fingerprint verification program for operation within said authentication channel to authenticate said accessor. 18. A security system for granting and denying access to a host computer, said access in response to a demand over the internet from an accessor for access to the host computer, said accessor having a personal digital assistant (PDA) for providing communications to the security system, said security system comprising: a login identification accompanying said demand over the internet from said accessor;an interception mechanism for receiving and verifying said login identification, said interception mechanism in an access channel;an authentication channel operating independently from said access channel and, said authentication channel, in turn, comprising; a security computer adapted in an access-channel mode to receive said login identification from said interception mechanism and to communicate access information to said host computer and in an authentication-channel mode to communicate with said PDA;a subscriber database for retrieval of peripheral addresses corresponding to said login identification;said security computer adapted to connect to said PDA;a prompt mechanism for instructing said accessor to enter and transmit predetermined data from said PDA;a comparator for authenticating access demands in response to transmission of said predetermined data from said PDA;said security computer, upon verifying a match between said stored predetermined data and the entered and transmitted data, providing in the access-channel mode instructions to the host computer to grant access thereto along said access channel;an authentication program mechanism, operating independently from said host computer, for authenticating an accessor demanding access to said host computer;a biometric analyzer operating in response to instructions from said authentication program mechanism to analyze a monitored parameter of said accessor; and,a biometric parameter database addressable by said biometric analyzer for retrieval of a previously registered sample of said accessor, said sample corresponding to the identification of said accessor. 19. A security system as described in claim 18, wherein said biometric analyzer comprises a fingerprint verification program for operation within said authentication channel to authenticate the accessor. 20. A security system as described in claim 19, wherein, upon attaining an access-granted condition, said security computer communicates in said authentication channel the access information to said accessor by selecting and transmitting an access-granted message from said announcement database and sequentially disconnecting from the connection with said telephone prior to use of said access channel.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.