WO2005096118A1 - Limiting access to personal devices - Google Patents

Limiting access to personal devices Download PDF

Info

Publication number
WO2005096118A1
WO2005096118A1 PCT/IB2005/050935 IB2005050935W WO2005096118A1 WO 2005096118 A1 WO2005096118 A1 WO 2005096118A1 IB 2005050935 W IB2005050935 W IB 2005050935W WO 2005096118 A1 WO2005096118 A1 WO 2005096118A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
data
key
protection key
shareable
Prior art date
Application number
PCT/IB2005/050935
Other languages
French (fr)
Inventor
Georg Kurz-Bauer
Jan Kneissler
Thomas Portele
Holger R. Scholl
Original Assignee
Philips Intellectual Property & Standards Gmbh
Koninklijke Philips Electronics N. V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Intellectual Property & Standards Gmbh, Koninklijke Philips Electronics N. V. filed Critical Philips Intellectual Property & Standards Gmbh
Priority to JP2007505679A priority Critical patent/JP2007531140A/en
Publication of WO2005096118A1 publication Critical patent/WO2005096118A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • the present invention relates to a method of limiting access to a device, said method comprises limiting access to said device according to at least respectively a first and a second level of access.
  • the invention further relates to a device adapted to limit access to said device, said device being adapted for limiting access to said device according to respectively a first and a second level of access.
  • the data ranges from a business presentation on a laptop to music and recordings on an mp3 player on to the personal schedule and the personal address book in a PDA. Most of the data is not meant to be publicly available and should be kept in a safe container. While it is of interest for a user to limit access to a personal device, it is also of interest for the user to enable a predefined group of people to access some of the functionalities and data on the personal device.
  • WO 0303169 describes a tamper-resistant encoding/obfuscating of software modules where locally stored biometric features/passwords guarantee a high security level for data- and application access. Here, only the user having the correct biometric features can access the data and applications. It is not possible for others to access the data and applications.
  • a method of limiting access to a device comprises limiting access to said device according to at least respectively a first and a second level of access, wherein said method comprises the steps of: receiving a protection key from the rightful user of said device, said protection key comprising a combination of biometric data relating to said rightful user and shareable knowledge data, limiting access to said device, whereby a first level of access to said device can be obtained when receiving an access key comprising said shareable knowledge data in said protection key, and a second level of access to said device can be obtained when receiving an access key comprising the combination of said biometric data and said shareable knowledge data in said protection key.
  • a device being protected by the biometric data of a rightful user may grant additional access rights to the device for people that at least know the shareable knowledge data.
  • the device could be personal devices such as a PDA, MP3 player, laptop, PC, etc.
  • the rightful user only gives one protection key from which respectively the biometric data and the shareable knowledge data are extracted.
  • limiting access to the device comprises limiting access to data stored on said device, and wherein the data being accessible in said first level of access to said device is encrypted using said protection key based on the combination of said biometric data and said shareable knowledge data.
  • the data can only be decrypted by the rightful user using an access key comprising both said biometric data and said shareable knowledge data.
  • limiting access to the device comprises limiting access to data stored on said device, and wherein the data being accessible in said second level of access is encrypted using only said shareable knowledge data in said protection key.
  • the data can only be decrypted by a user using an access key comprising said shareable knowledge data, thereby being a user to which the shareable know-ledge data has been transferred from the rightful user.
  • the protection key is a word, and wherein the biometric data relates to how the word was biometrically received from the rightful user, and wherein the shareable data is the actual word.
  • said protection key is received via a microphone, a keyboard or a touch screen.
  • the invention further relates to a device adapted to limit access to said device, said device being adapted for limiting access to said device according to respectively a first and a second level of access, wherein said device comprises: means for receiving a protection key from the rightful user of said device, said protection key comprising a combination of biometric data relating to said rightful user and shareable data, means for limiting access to said device whereby a first level of access to said device can be obtained when receiving an access key comprising said shareable data in said protection key, and a second level of access to said device can be obtained when receiving an access key comprising the combination of said biometric data and said shareable data in said protection key.
  • figure 1 illustrates a device where different levels of access to the device can be obtained depending on an access key
  • figure 2 illustrates how access to a device is limited according to two accessing levels
  • figure 3 illustrates how access can be obtained to the device depending on the access key used.
  • FIG 1 different privacy levels or accessing levels 103, 105, 107 to a device 101 are defined, where access to each level can be obtained depending on an access key 109, 111 provided by the user 113.
  • the accessing level 103 gives full access to the device 101, where full access is illustrated as a circle encircling the whole device 101, and where full access is obtained by using the access key 109.
  • the accessing level 105 gives limited access to the device 101, where the limited access is illustrated as a circle encircling a subpart of the device 101, and where the limited access is obtained by using the access key 111.
  • the accessing level 107 gives further limited access to the device 101, where the further limited access is illustrated as a circle encircling a smaller subpart of the device 101, and where the limited access is obtained without using an access key.
  • the accessing keys 109, 111 providing access to the accessing levels are protected by using a combination of biometric data related to the rightful user of the device 101 and shareable knowledge data. Such a combination could e.g. be a spoken word said by the rightful user, where the spoken word said with the similar biometric data or features gives full access 103, and where the correct word said with wrong biometric features gives limited access 105.
  • biometric data related to the spoken word could e.g. be the parameters of the user's eigenvoice representation.
  • An alternative combination of biometric data and shareable knowledge data could be a word entered using a keyboard by the rightful user, where the biometric features are related to a writing process (e.g. being typing speed, key pressure) for writing the word.
  • a writing process with similar biometric features gives full access 103 to the device 101. Further, if the correct word is written, but with wrong biometric features, a limited access 105 to the device is obtained.
  • biometric data and shareable knowledge data could be a word written using a touchpad by the rightful user, where the biometric features are related to the writing process (e.g. being how the word is written such as speed, order of letters and how each letter is drawn) for writing the word.
  • a writing process with similar biometric features gives full access 103 to the device 101.
  • the correct word is written, but with wrong biometric features, a limited access 105 to the device is obtained.
  • a user neither writes the correct word nor writes it using the right biometric features, the user obtains the further limited access 107 to the device 101.
  • FIG 2 it is illustrated how access to a device is limited according to two accessing levels.
  • the device initially receives a protection key (R_PK) from the user being the rightful user.
  • the protection key is a combination of biometric data and shareable data as described above, and which could be received from e.g. a microphone, a touch screen or a keyboard either connected to or incorporated into the device.
  • access is limited to a subpart of actions 203 and data 205 on the device. This subpart is illustrated as the difference between the circle illustrating the limited access 105 and the circle illustrating the further limited access 107 to the device.
  • the data and actions, which are available via the first accessing level LI are protected, whereby the data and actions are only available when using, as an access key, the shareable data from the combination of biometric data and shareable data in the protection key.
  • access is further limited to a subpart of actions 207 and data 209 on the device. This subpart is illustrated as the difference between the circle illustrating the limited access 105 and the circle illustrating the further limited access 107 to the device.
  • the data and actions, which are available via the second accessing level L2 are protected, whereby the data and actions are only available when using, as an access key, the combination of biometric data and shareable data from the protection key.
  • access has now been limited to the device in two levels, LI and L2m, where access to LI requires an access key according to the shareable knowledge data, and where access to L2 requires an access key according to the combination of biometric data and shareable knowledge data.
  • FIG 3 it is illustrated how access can be obtained to the device depending on the access key used.
  • the device receives an accessing key from the user 300.
  • the device checks whether the accessing comprises both the biometric data and the shareable knowledge data, and if this is the case, full access 103 to data and actions on the device is allowed, since the user 300 is the rightful user.
  • both the biometric data and the shareable knowledge data are not comprised in the access key, then in 305 it is checked whether at least the shareable knowledge data is comprised, and if this is the case limited access 105 to data and actions on the device is allowed, since the user is a person trusted by the rightful user, who has received the shareable knowledge data from the rightful user. If neither the biometric data nor the shareable knowledge data is comprised in the access key, then further limited access 107 is allowed, since the user is neither the rightful user nor a person trusted by the rightful user.
  • the identifying features are stored encrypted using the complementary set of features that is not stored but created session-wise on the fly (e.g. the user utters a greeting phrase and characteristic parameters.
  • the identifying features are stored encrypted using the complementary set of features that is not stored but created session-wise on the fly (example: the user utters a greeting phrase, and characteristic parameters of the best matching eigenvoice of an automatic speech recognition process are used to encrypt the recognized word).
  • all data is stored this way encrypted with a key that is very specific for each single user and not stored in any way.
  • the user/owner may grant additional access rights for people that at least know the greeting phrase ("friends/family", the plain text of e.g.
  • the greeting phrase does match, but the encrypted version does not) or everybody else ("world”, neither the phrase is known nor could the encrypted version be matched with a stored reference) and use these three different levels of privacy without having to deliberately define and maintain a list of more or less privileged users.
  • owner who can establish a more detailed rights administration combining user specific signatures and e.g. more or less secret pass- phrases if necessary.
  • the data might be encrypted and stored twice using the user's private key and a master key in parallel to have a backdoor to the data in case this is appropriate (e.g.

Abstract

The present invention relates to a method of limiting access to a device, said method comprises limiting access to said device according to at least respectively a first and a second level of access, wherein said method comprises the steps of: - receiving a protection key from the rightful user of said device, said protection key comprising a combination of biometric data relating to said rightful user and shareable knowledge data, - limiting access to said device, whereby a first level of access to said device can be obtained when receiving an access key comprising said shareable knowledge data in said protection key, and a second level of access to said device can be obtained, when receiving an access key comprising the combination of said biometric data and said shareable knowledge data in said protection key. Thereby a device being protected by the biometric data of a rightful user may grant additional access rights to the device for people that at least know the shareable knowledge data. The device could be personal devices such as a PDA, MP3 player, laptop, PC, etc.

Description

Limiting access to personal devices
The present invention relates to a method of limiting access to a device, said method comprises limiting access to said device according to at least respectively a first and a second level of access. The invention further relates to a device adapted to limit access to said device, said device being adapted for limiting access to said device according to respectively a first and a second level of access. In today's life a lot of personal mobile devices become more and more capable of storing and handling huge amounts of data. The data ranges from a business presentation on a laptop to music and recordings on an mp3 player on to the personal schedule and the personal address book in a PDA. Most of the data is not meant to be publicly available and should be kept in a safe container. While it is of interest for a user to limit access to a personal device, it is also of interest for the user to enable a predefined group of people to access some of the functionalities and data on the personal device.
WO 0303169 describes a tamper-resistant encoding/obfuscating of software modules where locally stored biometric features/passwords guarantee a high security level for data- and application access. Here, only the user having the correct biometric features can access the data and applications. It is not possible for others to access the data and applications.
It is therefore an object to provide a method to efficiently restrict access to a personal device, which at the same time makes it possible for a predefined group of people to access the device. This is obtained by a method of limiting access to a device, said method comprises limiting access to said device according to at least respectively a first and a second level of access, wherein said method comprises the steps of: receiving a protection key from the rightful user of said device, said protection key comprising a combination of biometric data relating to said rightful user and shareable knowledge data, limiting access to said device, whereby a first level of access to said device can be obtained when receiving an access key comprising said shareable knowledge data in said protection key, and a second level of access to said device can be obtained when receiving an access key comprising the combination of said biometric data and said shareable knowledge data in said protection key. Thereby a device being protected by the biometric data of a rightful user may grant additional access rights to the device for people that at least know the shareable knowledge data. The device could be personal devices such as a PDA, MP3 player, laptop, PC, etc. The rightful user only gives one protection key from which respectively the biometric data and the shareable knowledge data are extracted. In a specific embodiment limiting access to the device comprises limiting access to data stored on said device, and wherein the data being accessible in said first level of access to said device is encrypted using said protection key based on the combination of said biometric data and said shareable knowledge data. Thereby the data can only be decrypted by the rightful user using an access key comprising both said biometric data and said shareable knowledge data. In an embodiment limiting access to the device comprises limiting access to data stored on said device, and wherein the data being accessible in said second level of access is encrypted using only said shareable knowledge data in said protection key. Thereby the data can only be decrypted by a user using an access key comprising said shareable knowledge data, thereby being a user to which the shareable know-ledge data has been transferred from the rightful user. In a specific embodiment the protection key is a word, and wherein the biometric data relates to how the word was biometrically received from the rightful user, and wherein the shareable data is the actual word. This is a simple way of defining a protection key, which can be used by devices either comprising a microphone or where it is possible to attach a microphone. In specific embodiments said protection key is received via a microphone, a keyboard or a touch screen. The invention further relates to a device adapted to limit access to said device, said device being adapted for limiting access to said device according to respectively a first and a second level of access, wherein said device comprises: means for receiving a protection key from the rightful user of said device, said protection key comprising a combination of biometric data relating to said rightful user and shareable data, means for limiting access to said device whereby a first level of access to said device can be obtained when receiving an access key comprising said shareable data in said protection key, and a second level of access to said device can be obtained when receiving an access key comprising the combination of said biometric data and said shareable data in said protection key. In the following preferred embodiments of the invention will be described referring to the figures, where
figure 1 illustrates a device where different levels of access to the device can be obtained depending on an access key, figure 2 illustrates how access to a device is limited according to two accessing levels, figure 3 illustrates how access can be obtained to the device depending on the access key used.
In figure 1 different privacy levels or accessing levels 103, 105, 107 to a device 101 are defined, where access to each level can be obtained depending on an access key 109, 111 provided by the user 113. The accessing level 103 gives full access to the device 101, where full access is illustrated as a circle encircling the whole device 101, and where full access is obtained by using the access key 109. The accessing level 105 gives limited access to the device 101, where the limited access is illustrated as a circle encircling a subpart of the device 101, and where the limited access is obtained by using the access key 111. The accessing level 107 gives further limited access to the device 101, where the further limited access is illustrated as a circle encircling a smaller subpart of the device 101, and where the limited access is obtained without using an access key. According to the present invention, the accessing keys 109, 111 providing access to the accessing levels are protected by using a combination of biometric data related to the rightful user of the device 101 and shareable knowledge data. Such a combination could e.g. be a spoken word said by the rightful user, where the spoken word said with the similar biometric data or features gives full access 103, and where the correct word said with wrong biometric features gives limited access 105. Further, if a user neither knows the word nor has the right biometric features, the user obtains the further limited access 107 to the device 101. The biometric data related to the spoken word could e.g. be the parameters of the user's eigenvoice representation. An alternative combination of biometric data and shareable knowledge data could be a word entered using a keyboard by the rightful user, where the biometric features are related to a writing process (e.g. being typing speed, key pressure) for writing the word. A writing process with similar biometric features gives full access 103 to the device 101. Further, if the correct word is written, but with wrong biometric features, a limited access 105 to the device is obtained. Further, if a user neither writes the correct word nor writes it using the right biometric features, the user obtains the further limited access 107 to the device 101. A further alternative combination of biometric data and shareable knowledge data could be a word written using a touchpad by the rightful user, where the biometric features are related to the writing process (e.g. being how the word is written such as speed, order of letters and how each letter is drawn) for writing the word. A writing process with similar biometric features gives full access 103 to the device 101. Further, if the correct word is written, but with wrong biometric features, a limited access 105 to the device is obtained. Further, if a user neither writes the correct word nor writes it using the right biometric features, the user obtains the further limited access 107 to the device 101. In figure 2 it is illustrated how access to a device is limited according to two accessing levels. The device initially receives a protection key (R_PK) from the user being the rightful user. The protection key is a combination of biometric data and shareable data as described above, and which could be received from e.g. a microphone, a touch screen or a keyboard either connected to or incorporated into the device. Next, in 202 access is limited to a subpart of actions 203 and data 205 on the device. This subpart is illustrated as the difference between the circle illustrating the limited access 105 and the circle illustrating the further limited access 107 to the device. The data and actions, which are available via the first accessing level LI are protected, whereby the data and actions are only available when using, as an access key, the shareable data from the combination of biometric data and shareable data in the protection key. Next, in 206 access is further limited to a subpart of actions 207 and data 209 on the device. This subpart is illustrated as the difference between the circle illustrating the limited access 105 and the circle illustrating the further limited access 107 to the device. The data and actions, which are available via the second accessing level L2 are protected, whereby the data and actions are only available when using, as an access key, the combination of biometric data and shareable data from the protection key. According to the above, access has now been limited to the device in two levels, LI and L2m, where access to LI requires an access key according to the shareable knowledge data, and where access to L2 requires an access key according to the combination of biometric data and shareable knowledge data. In figure 3 it is illustrated how access can be obtained to the device depending on the access key used. In 301 the device receives an accessing key from the user 300. Next, the device checks whether the accessing comprises both the biometric data and the shareable knowledge data, and if this is the case, full access 103 to data and actions on the device is allowed, since the user 300 is the rightful user. If both the biometric data and the shareable knowledge data are not comprised in the access key, then in 305 it is checked whether at least the shareable knowledge data is comprised, and if this is the case limited access 105 to data and actions on the device is allowed, since the user is a person trusted by the rightful user, who has received the shareable knowledge data from the rightful user. If neither the biometric data nor the shareable knowledge data is comprised in the access key, then further limited access 107 is allowed, since the user is neither the rightful user nor a person trusted by the rightful user. More specifically, the above could be explained as whenever a device is acquired or legally transferred to a new owner biometric features for the new owner is gathered and a robust combination thereof is converted via a one way hash function (MD5, SHA-1, RJPEMD-160 or similar ones) into a user access key that is used to identify the user/owner, allow or decline access to the device according to the second accessing level, and to encrypt and decrypt stored data (via DES, 3DES, RC5 or newer variants or encryption routines). The two sets of features for identifying users/granting access rights and for encryption/decryption should have no overlap, since the identifying features are stored on the device, whereas the encryption key should not be stored. In another variant of the invention the identifying features are stored encrypted using the complementary set of features that is not stored but created session-wise on the fly (e.g. the user utters a greeting phrase and characteristic parameters. In another variant of the invention the identifying features are stored encrypted using the complementary set of features that is not stored but created session-wise on the fly (example: the user utters a greeting phrase, and characteristic parameters of the best matching eigenvoice of an automatic speech recognition process are used to encrypt the recognized word). When no further action is taken by the user, all data is stored this way encrypted with a key that is very specific for each single user and not stored in any way. The user/owner may grant additional access rights for people that at least know the greeting phrase ("friends/family", the plain text of e.g. the greeting phrase does match, but the encrypted version does not) or everybody else ("world", neither the phrase is known nor could the encrypted version be matched with a stored reference) and use these three different levels of privacy without having to deliberately define and maintain a list of more or less privileged users. On top of this generic user classification in "owner", "friends" and "others" one can establish a more detailed rights administration combining user specific signatures and e.g. more or less secret pass- phrases if necessary. In another variant of the invention the data might be encrypted and stored twice using the user's private key and a master key in parallel to have a backdoor to the data in case this is appropriate (e.g. an employee's company related data should be readable using a company-master-key or a child's toy doll should answer mother's questions). It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word 'comprising' does not exclude the presence of other elements or steps than those listed in a claim. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a device claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.

Claims

CLAIMS:
1. A method of limiting access to a device, said method comprises limiting access to said device according to at least respectively a first and a second level of access, wherein said method comprises the steps of: - receiving a protection key from the rightful user of said device, said protection key comprising a combination of biometric data relating to said rightful user and shareable knowledge data, - limiting access to said device whereby a first level of access to said device can be obtained when receiving an access key comprising said shareable knowledge data in said protection key, and a second level of access to said device can be obtained, when receiving an access key comprising the combination of said biometric data and said shareable knowledge data in said protection key.
2. A method according to claim 1, wherein limiting access to the device comprises limiting access to data stored on said device, and wherein the data being accessible in said first level of access to said device is encrypted using said protection key based on the combination of said biometric data and said shareable knowledge data.
3. A method according to claim 1-2, wherein limiting access to the device comprises limiting access to data stored on said device, and wherein the data being accessible in said second level of access is encrypted using only said shareable knowledge data in said protection key.
4. A method according to claim 1-3, wherein the protection key is a word, and wherein the biometric data relates to how the word was biometrically received from the rightful user, and wherein the shareable data is the actual word.
5. A method according to claim 1-4, wherein said protection key is received via a microphone.
6. A method according to claim 1-5, wherein said protection key is received via a keyboard.
7. A method according to claim 1-5, wherein said protection key is received via a touch screen.
8. A device adapted to limit access to said device, said device being adapted for limiting access to said device according to respectively a first and a second level of access, wherein said device comprises: - means for receiving a protection key from the rightful user of said device, said protection key comprising a combination of biometric data relating to said rightful user and shareable data, - means for limiting access to said device, whereby a first level of access to said device can be obtained when receiving an access key comprising said shareable data in said protection key, and a second level of access to said device can be obtained, when receiving an access key comprising the combination of said biometric data and said shareable data in said protection key.
PCT/IB2005/050935 2004-03-30 2005-03-17 Limiting access to personal devices WO2005096118A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2007505679A JP2007531140A (en) 2004-03-30 2005-03-17 Restricting access to personal devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP04101304 2004-03-30
EP04101304.6 2004-03-30

Publications (1)

Publication Number Publication Date
WO2005096118A1 true WO2005096118A1 (en) 2005-10-13

Family

ID=34961281

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/050935 WO2005096118A1 (en) 2004-03-30 2005-03-17 Limiting access to personal devices

Country Status (3)

Country Link
JP (1) JP2007531140A (en)
KR (1) KR20070012662A (en)
WO (1) WO2005096118A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9223952B2 (en) * 2012-09-28 2015-12-29 Intel Corporation Allowing varied device access based on different levels of unlocking mechanisms

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020184509A1 (en) * 1998-02-13 2002-12-05 Scheidt Edward M. Multiple factor-based user identification and authentication
WO2003003169A2 (en) * 2001-06-28 2003-01-09 Cloakware Corporation Secure method and system for biometric verification
US20030149882A1 (en) * 2002-02-07 2003-08-07 Laurence Hamid Support for multiple login method
US20040039909A1 (en) * 2002-08-22 2004-02-26 David Cheng Flexible authentication with multiple levels and factors

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020184509A1 (en) * 1998-02-13 2002-12-05 Scheidt Edward M. Multiple factor-based user identification and authentication
WO2003003169A2 (en) * 2001-06-28 2003-01-09 Cloakware Corporation Secure method and system for biometric verification
US20030149882A1 (en) * 2002-02-07 2003-08-07 Laurence Hamid Support for multiple login method
US20040039909A1 (en) * 2002-08-22 2004-02-26 David Cheng Flexible authentication with multiple levels and factors

Also Published As

Publication number Publication date
KR20070012662A (en) 2007-01-26
JP2007531140A (en) 2007-11-01

Similar Documents

Publication Publication Date Title
KR101201151B1 (en) User authentication by combining speaker verification and reverse turing test
US7797549B2 (en) Secure method and system for biometric verification
US20050210270A1 (en) Method for authenticating a user profile for providing user access to restricted information based upon biometric confirmation
US20080010453A1 (en) Method and apparatus for one time password access to portable credential entry and memory storage devices
US20150169858A1 (en) Pluggable authentication mechanism for mobile device applications
CA2304433A1 (en) General purpose access recovery scheme
Das et al. Thumprint: Socially-inclusive local group authentication through shared secret knocks
JP2000215172A (en) Personal authentication system
Cohen et al. Compelled decryption and the Fifth Amendment: exploring the technical boundaries
Halpert Mobile device security
US7412603B2 (en) Methods and systems for enabling secure storage of sensitive data
US20090077390A1 (en) Electronic file protection system having one or more removable memory devices
CN101488172A (en) Document handwriting encryption and decryption method and its application terminal
US20090067624A1 (en) System and method of protecting content of an electronic file using a computer
JP2008181440A (en) Computer system and user authentication method
WO2005096118A1 (en) Limiting access to personal devices
Rai et al. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
US20090077377A1 (en) System and method of protecting content of an electronic file for sending and receiving
Basu et al. User-in-a-context: A blueprint for context-aware identification
Srivastava Electronic signatures and security issues: An empirical study
Makkar et al. Combined Static and Dynamic Features Extraction from Handwritten Signature
Kashyap et al. Note taking application with optical character recognition and bio-metric security
Sharp Security in Operating Systems
Matiushin et al. Continuous Authentication Methods for Zero-Trust Cybersecurity Architecture
Adeliyi et al. Encoded Native Names for Stronger Password

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2005709035

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 1020067020397

Country of ref document: KR

Ref document number: 2007505679

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWW Wipo information: withdrawn in national office

Ref document number: 2005709035

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020067020397

Country of ref document: KR