Data security system
DCFirst Claim
1. A pen-based computing device for entry of secure data into a secure network, the pen-based computing device having a casing, the pen-based computing device including a facial image sensor for capturing a facial image print, the facial image sensor being positioned in the pen-based computing device;
- whereby placement of the facial image sensor in the pen-based computing device enables an incidental capture of the facial image of a user for purposes of identity authentication prior to each request to enter the secure data; and
whereby placement of the sensor in the pen-based computing device enables a continuous capture of a facial image print while the pen-based computing device is being used; and
whereby user identity authentication is provided simultaneously with each request to enter each data stream into said secure network, providing assurance that any mobile worker seeking to enter data is authorized prior to each data entry.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior to responding to the user request for data access. The remote computers are handheld when in operational mode. A sensor in the handheld computer captures a biometric image while the remote computer is being used. The biometric sensor is positioned in such a way that the sensor enables the capture of the biometric image continually during computer usage with each request for access to secure data. The biometric authentication occurs in a seamless manner and is incidental to the data request enabling user identity authentication with each request to access secure data.
-
Citations
18 Claims
-
1. A pen-based computing device for entry of secure data into a secure network, the pen-based computing device having a casing, the pen-based computing device including a facial image sensor for capturing a facial image print, the facial image sensor being positioned in the pen-based computing device;
-
whereby placement of the facial image sensor in the pen-based computing device enables an incidental capture of the facial image of a user for purposes of identity authentication prior to each request to enter the secure data; and whereby placement of the sensor in the pen-based computing device enables a continuous capture of a facial image print while the pen-based computing device is being used; and whereby user identity authentication is provided simultaneously with each request to enter each data stream into said secure network, providing assurance that any mobile worker seeking to enter data is authorized prior to each data entry.
-
-
2. A handheld communication device for entering secure data into a secure network, said handheld communication device selected from the group consisting of a pocket computer, a palm-type computer, a cell-phone, and a pen-based based computer, said handheld communication device including a facial image sensor for capturing user facial image print, said facial image sensor being embedded in said handheld communication device;
-
whereby placement of said facial image sensor within said handheld communication device enables an incidental capture of said facial image print of a mobile user for purposes of identity authentication by a remote host computer prior to each request to enter the secure network data; whereby placement of said sensor in said handheld communication device enables a continuous capture of a facial image print while said handheld communication device is being used; and whereby user identity authentication is provided simultaneously with each request to enter each data stream into said secure network, providing assurance that any mobile worker seeking to enter data is authorized prior to each data entry. - View Dependent Claims (3, 4, 5, 6)
-
-
7. A handheld communication device for entering secure data into a secure network, said handheld communication device selected from the group consisting of a pocket computer, a palm-type computer, a cell-phone, and a pen-based based computer, said handheld communication device including a retinal scan sensor for capturing user retinal scan data or an iris scan sensor for capturing user iris scan data, said retinal scan sensor or said iris scan sensor being embedded in said handheld communication device;
-
whereby placement of said retinal scan sensor site or said iris scan sensor site within said handheld communication device enables an incidental capture of said retinal scan data or said iris scan data of a mobile user for purposes of identity authentication by a remote host computer prior to each request to access the secure network data; whereby placement of said sensor in said handheld communication device enables a continuous capture of a retinal scan data or said iris scan data while said handheld communication device is being used; and whereby user identity authentication is provided simultaneously with each request to enter each data stream into said secure network, providing assurance that any mobile worker seeking to enter data is authorized prior to each data entry. - View Dependent Claims (8, 9)
-
-
10. A handheld communication device for entering secure data into a secure network, said handheld communication device selected from the group consisting of a pocket computer, a palm-type computer, a cell-phone, and a pen-based based computer, said handheld communication device including a facial geometry sensor or a facial thermal pattern sensor for capturing user facial geometry print or user facial thermal pattern scan, said facial geometry sensor being embedded in said handheld communication device;
-
whereby placement of said facial geometry sensor or said facial thermal pattern sensor within said handheld communication device enables an incidental capture of said facial geometry print or user facial thermal pattern scan of a mobile user for purposes of identity authentication by a remote host computer prior to each request to access the secure network data; whereby placement of said sensor in said handheld communication device enables a continuous capture of a facial geometry print or user facial thermal pattern scan while said handheld communication device is being used; and whereby said handheld communication device enables a mobile worker to have remote network access to secure data in said remote host computer enabling user identity authentication simultaneously with each request to enter said secure data providing assurance that any mobile worker seeking to enter data is authorized prior to each data entry. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A handheld communications device for entering secure data into a secure network, the handheld computing device selected from the group consisting of a pocket computer, a palm-type computer, a pen-based computer, and a cell-phone, the handheld communications device including:
-
a casing for holding the handheld communications device; a first biometric sensor being disposed within the handheld communications device, the first biometric sensor capturing biometric data relative to a first biometric property, the first biometric sensor within the handheld communications device enabling an incidental capture of the first biometric property of the user for purposes of identity authentication by a remote host computer prior to each request to enter the secure data, the first biometric sensor within the handheld communications device enabling a continuous capture of the first biometric property of the user prior to each request to enter the secure data; and a second biometric sensor being disposed within the handheld communications device, the second biometric sensor capturing biometric data relative to a second biometric property, the second biometric sensor within the handheld communications device enabling an incidental capture of a second biometric property of the user for purposes of identity authentication by a remote host computer prior to each request to enter the secure data, the second biometric sensor within the handheld communications device enabling a continuous capture of the second biometric property of the user prior to each user attempt to enter the secure data.
-
-
16. A handheld communications device for entering secure data into a secure network, the handheld communications device selected from the group consisting of a pen-based computer, a pocket computer, a palm-type computer, and a cell-phone, the handheld communications device including:
-
whereby placement of the fingerprint sensor site in the casing of the handheld communications device enables an incidental capture of the facial image of a user for purposes of identity authentication by a remote host computer prior to each request to enter the secure data; whereby placement of the sensor site in the casing of the handheld communications device enables a continuous capture of a fingerprint or thumbprint while the handheld communications device is being used; and whereby user identity authentication is provided simultaneously with each request to enter each data stream into said secure network, providing assurance that any mobile worker seeking to enter data is authorized prior to each data entry. - View Dependent Claims (17, 18)
-
Specification