Controlling user access to electronic resources without password
Abstract
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.
- Inventors:
- Issue Date:
- Research Org.:
- Angel Secure Networks, Inc., Old Town, ME (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1184556
- Patent Number(s):
- 9,058,482
- Application Number:
- 13/410,287
- Assignee:
- Angel Secure Networks, Inc. (Old Town, ME)
- DOE Contract Number:
- FG02-08ER5047
- Resource Type:
- Patent
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; 99 GENERAL AND MISCELLANEOUS
Citation Formats
Smith, Fred Hewitt. Controlling user access to electronic resources without password. United States: N. p., 2015.
Web.
Smith, Fred Hewitt. Controlling user access to electronic resources without password. United States.
Smith, Fred Hewitt. Tue .
"Controlling user access to electronic resources without password". United States. https://www.osti.gov/servlets/purl/1184556.
@article{osti_1184556,
title = {Controlling user access to electronic resources without password},
author = {Smith, Fred Hewitt},
abstractNote = {Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2015},
month = {6}
}
Works referenced in this record:
WebMake: Integrating distributed software development in a structure-enhanced Web
journal, April 1995
- Baentsch, Michael; Molter, Georg; Sturm, Peter
- Computer Networks and ISDN Systems, Vol. 27, Issue 6, p. 789-800
Distributed audit with secure remote procedure calls
conference, January 1991
- Tsai, C. -R.; Gligor, V. D.
- Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology
Real-time video-on-demand system based on distributed servers and an agent-oriented application
conference, February 1996
- Takahata, Minoru; Uemori, Akira; Nakano, Hirotaka
- Electronic Imaging: Science & Technology, SPIE Proceedings
Interposition agents: transparently interposing user code at the system interface
journal, December 1993
- Jones, Michael B.
- ACM SIGOPS Operating Systems Review, Vol. 27, Issue 5
An electronic information marketplace
journal, February 1985
- Turoff, Murray; Chinai, Sanjit
- Computer Networks and ISDN Systems, Vol. 9, Issue 2, p. 79-90