A system of allowing user login to a computer. The user is allowed to login by entering some kind of personal identification information e.g. biometric, password or hand. Once login, the computer detects its surroundings. The surrounding detecting can be by GPS, e.g. to detect location, or can use a camera to detect of view of a user. When the user does not properly login, account of the incorrect login is maintained. Each increment of the incorrect login's causes the security to increase.

 
Web www.patentalert.com

< Computing method for elliptic curve cryptography

< Cryptographic method and apparatus for non-linearly merging a data block and a key

> Cryptographic key split binding process and apparatus

> Method for carrying out an electronic transaction using several signatures

~ 00276