A method and apparatus to use
biometric data to secure an object connected to a computer. The object maintains connections to one or more computers, and similarly to a biometric
database that includes
biometric data for
computer users. Object requests from computers can be coupled with
biometric data from a plurality of
computer users. The biometric data can be entered on a periodic basis as scheduled by a security manager.
Peripheral requests including biometric data can be subjected to a two-step analysis. First, the biometric data can be matched against the biometric
database to ensure a match. If a match is not found, the request can be denied. If a match is found, the second analysis step includes determining whether the verified user has privilege for the requested object access. Multiple objects connected to multiple computers is anticipated, and the two-step analysis can be combined into a
single step by providing a biometric
database that includes only authorized
user information. A single biometric database can be used for all peripherals, or multiple biometric databases can exist for multiple peripherals. The objects can be
peripheral devices of any kind, they also can be smartcards, tokens or electronic cartridges. The
peripheral devices can be inserted or removed from computer networks, computers, workstations, PDA's, other
peripheral devices such as printers or storage drives, handheld devices or other computerized instruments.