[go: up one dir, main page]

Landwehr, 1997 - Google Patents

Protecting unattended computers without software

Landwehr, 1997

View PDF
Document ID
11580036387455407771
Author
Landwehr C
Publication year
Publication venue
Proceedings 13th Annual Computer Security Applications Conference

External Links

Snippet

In many environments, users log in to workstations and then leave them unattended. Rather than trying to stop users from doing what comes naturally, this paper suggests a simple, hardware-based system that can protect computers in such an environment from …
Continue reading at apps.dtic.mil (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
EP0888677B1 (en) An authentication method and system based on periodic challenge/response protocol
EP1994671B1 (en) A method and apparatus for a token
US6778066B2 (en) Personal identification badge that resets on the removal of the badge from the wearer
US6628198B2 (en) Security system for preventing a personal computer from being stolen or used by unauthorized people
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
EP2774098B1 (en) Authentication method
US20050061875A1 (en) Method and apparatus for a secure RFID system
US20120002808A1 (en) Interleaving and deinterleaving method for preventing periodic position interference
WO2004008683A3 (en) Automated network security system and method
WO2014005004A1 (en) Proximity aware security system for portable electronics with multi-factor user authentication and secure device identity verification
CN101390126A (en) Transaction authentication by a token, contingent on personal presence
Landwehr Protecting unattended computers without software
US5892901A (en) Secure identification system
EP2774401B1 (en) Device for mobile communication
CN105913513A (en) Control method and system for door lock system
WO2001020463A1 (en) Security arrangement
US20030014642A1 (en) Security arrangement
CN100583734C (en) Method for realizing volatile secret key and separated checking module by collecting human characteristic
US20050122210A1 (en) Dual technology door entry person authentication
JP2003526826A (en) Access system and method for a multi-user computer environment
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
RU2260840C2 (en) Protection means
TWI575147B (en) Intelligent door lock system and method thereof
EP2587429A1 (en) Authentication method
Shigematsu et al. Ubiquitous user authentication system with wireless battery‐powered fingerprint identification module