Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for user authentication

a user authentication and system technology, applied in the field of accessing a secure computer system, can solve the problems of reducing the reliability of using a password alone. to authenticate the user for access to the computer system,

Inactive Publication Date: 2005-02-24
MICRON TECH INC
View PDF34 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention provides a method and system for authenticating a user to access a computer system by communicating security information and an implicit input to the computer system, and comparing it with corresponding information associated with the user. The system grants access to the computer system if there is a satisfactory match. This technology overcomes limitations of existing authentication methods and ensures secure access to computer systems.

Problems solved by technology

The use of a password alone, however, has become less reliable to authenticate the user.
The reduced reliability of using a password alone has been due to a computer hacker's ability to locate, copy, or electronically identify or track the required password using specialized software programs.
Accordingly, the use of a password alone to authenticate the user for access to the computer system has not been very reliable.
These techniques, however, are still subject to the same weaknesses as those identified for using a password.
Therefore, the above-described authentication techniques do not overcome a computer hacker's ability to access the computer by forcing the user to enter a password, turn a key, swipe a card, or place the user's finger on a fingerprint acquisition device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for user authentication
  • System and method for user authentication
  • System and method for user authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The following description is not to be taken in a limiting sense, but is made merely for the purpose of describing the general principles of the invention. The scope of the invention should be determined with reference to the claims.

[0016]FIG. 1 is a block diagram showing one embodiment of a computer system 100 in accordance with the invention. As shown in FIG. 1, the computer system 100 comprises a user interface 110 that is operationally connected to a process circuit 120. The user interface 110 may be any input device that is used to enter or communicate information to the computer system 100, such as a keyboard, mouse, trackball, pointer, touch-screen, remote terminal, audio sensor, optical scanner, telephone, or any similar user interface. The user interface may provide input signals to the computer system 100 in an analog form, which typically requires conversion to digital form by the computer system 100, or in a digital form. For example, when using a keyboard, a com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.

Description

RELATED APPLICATIONS [0001] This application is a continuation of U.S. patent application Ser. No. 10 / 877,782, filed Jun. 25, 2004, which is a continuation of U.S. patent application Ser. No. 09 / 511,092, filed Feb. 23, 2000, now U.S. Pat. No. 6,766,456, issued on Jul. 20, 2004, the entireties of which are hereby incorporated herein by reference in their entireties.BACKGROUND OF THE INVENTION [0002] 1. Field of the Invention [0003] The invention relates generally to methods of accessing a secure computer system. More particularly, this invention relates to a method and system for authenticating an identity of a user before accessing a computer system. [0004] 2. Description of the Related Art [0005] In today's information age, a user is generally required to execute or pass some form of a security step, such as entering a private identification code or password, to access a computer system. As the computer stored information or application becomes more sensitive or valuable, greater s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
CPCG06F21/31G06F21/40G06F3/0488G06F21/32G06V40/12G06F3/041G06F21/36G06F21/6218
Inventor MCKEETH, JAMES
Owner MICRON TECH INC