Abstract: A method for managing access to application software contained on a computer system or network. The computer system utilizes an authentication component that is configured to receive a unique user account identifier and to generate an authentication passkey by using an identifying data element, typically called a “password”. The identifying data elements are collected from one or more input devices and used as an encryption key for the user account identifier. The generated authentication passkey is used in an authentication transaction associated with the application software instead of the identifying data element thereby reducing data security risks if the identifying data element alone were discovered due to other unknowns including the encryption elements.
Abstract: A data security system controls access to and interfaces with a computer system by requiring user verification through fingerprint sensing. The data security system includes a security module having a fingerprint sensor, image data, and an application interface that is generated by the security module and communicative with the computer system. The image data is associated with a fingerprint of a user through the use of the security module.