Proximity detection of valid computer user

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S152000, C713S152000

Reexamination Certificate

active

06189105

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to computer security, and more particularly to the use of a proximity detector to continuously authorize a computer for use only by authorized persons.
2. Background of Related Art
There are many purposes for securing a computer against unauthorized use. For instance, the computer may provide access to accounting records or other sensitive information, particularly when the computer is located in an area accessible by many persons, e.g., as in a large office.
A well known and by far the most prevalent technique for preventing unauthorized access to a computer is by entering a unique password as depicted in FIG.
8
. In
FIG. 8
, an authorized user boots up or otherwise starts a computer
130
, perhaps at the beginning of their day. Usually, the computer contains a number of software programs, including an operating system and one or more application programs. Moreover, it is not unusual for the user to be prompted to enter two, three or even more different passwords by the various software programs (e.g., by the operating system, to access a network, and to load a particular application program) before the computer is up and running. A visual prompt for entry of each password is typically printed on the display
112
of the computer
130
, which the user subsequently types on the keyboard
110
to gain authorized access for proceeding. While providing some level of security, this process typically requires a significant amount of user input and time before the computer is up and running.
During the business day, the user of the secure computer
130
may have the need to leave the room containing the computer, e.g., to go to the restroom, lunch, etc. However, as long as the computer
130
remains powered up, it will provide access to any user.
To prevent unauthorized access to the computer
130
when the authorized user(s) is (are) out of the room, the most traditional methods require the computer
130
to be turned off. However, this method is rather inconvenient because it causes significant delays in restarting the computer and re-entering the authorizing passwords when the authorized user returns. Moreover, the user may inadvertently forget to turn the computer
130
off when out of the room, leaving the computer susceptible to unauthorized use. Or, worse yet, the user may deliberately leave the computer on for quick absences from the room to eliminate the necessary down time while awaiting rebooting of the computer upon return, perhaps to increase their personal productivity.
An authorizing keyed lock
132
has been added to the external casing of many newer personal computers
130
as shown in FIG.
8
. In the unlocked position, there is no change to the ordinary operation of a computer
130
. However, when the authorizing keyed lock
132
is turned to the lock position, keyboard entry is prevented.
The authorizing keyed lock
132
is used most often for computers operating as servers or other multi-user tasks, and for computers which are otherwise intentionally not always attended during their operation. However, even when locked out from keyboard entry with the authorizing keyed lock
132
in the lock position, the conventional computer
130
continues to operate as previously authorized and often continues to display information on display
112
. The keyed lock usually prevents new keyboard entry—it does not disable previous keyboard entries. Moreover, even an authorizing keyed lock
132
cannot prevent a computer
130
from unauthorized use when the absent user forgets to lock the computer
130
before leaving the room.
There is thus a need for a computer having an authorizing feature which is flexible enough to prevent access when the user steps out of the room even for just a minute, which is automatic without requiring instruction from the authorized user to initiate some security procedure (e.g., powering down) before an absence from the room.
SUMMARY OF THE INVENTION
In accordance with the principles of the present invention, a proximity detection system for a computer comprises means for enabling a computer when a valid user is present, and means for disabling the computer when the valid user is not present.
In another aspect, a proximity detection system comprises a proximity detector in communication with the computer. A timer associated with the computer is operable to expire upon non-receipt of an authorizing code from an authorized user of the computer. A disabling module in the computer disables at least one feature of the computer based on an expiration of the timer.
In another aspect, a proximity detection system in accordance with the present invention comprises a proximity reader in communication with the computer, a detection module which continuously determines a presence of an authorized user within a proximity of the proximity reader, and a disabling module in the computer to disable at least one feature of the computer based on a determination by the detection module that the authorized user is not within the proximity of the proximity reader.
A method of continuously detecting an authorized user within a proximity of a computer in accordance with the present invention comprises repeating steps. In one step, receipt of a coded message from an authorized user is determined to indicate that the authorized user is within a proximity of the computer. As the authorized user moves in and out of the proximity of the computer, at least one function of the computer is enabled and disabled, respectively, based on a receipt of a coded message from the authorized user.


REFERENCES:
patent: 4685056 (1987-08-01), Barnsdale, Jr. et al.
patent: 4857913 (1989-08-01), Lewiner et al.
patent: 5355414 (1994-10-01), Hale et al.
patent: 5357563 (1994-10-01), Hamilton
patent: 5396070 (1995-03-01), Lee
patent: 5408668 (1995-04-01), Tornai
patent: 5434562 (1995-07-01), Reardon
patent: 5467082 (1995-11-01), Sanderson
patent: 5533125 (1996-07-01), Bensimon et al.
patent: 5548764 (1996-08-01), Duley
patent: 5557259 (1996-09-01), Musa
patent: 5642805 (1997-07-01), Tefft
patent: 5646539 (1997-07-01), Codina et al.
patent: 5757271 (1998-05-01), Andrew
patent: 5892901 (1999-08-01), Landwehr
patent: 5902998 (1999-05-01), Olson
patent: 5952835 (1999-09-01), Covely
patent: 5970227 (1999-10-01), Dayan
patent: 6002427 (1999-12-01), Kipust

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Proximity detection of valid computer user does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Proximity detection of valid computer user, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Proximity detection of valid computer user will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2608586

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.