In one embodiment, the invention provides a method comprising storing user authentication information in a hardware structure of a computer system, the hardware structure including a security mechanism to protect the stored authentication information from unauthorized access, and authenticating a user of the computer system by comparing user input authentication information with the stored authentication information.

 
Web www.patentalert.com

> System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device

~ 00379