Data protection based on user input during device boot-up, user login, and device shut-down states
First Claim
Patent Images
1. A computing device comprising:
- a monitor configured to determine, during a shut-down process of the computing device, whether particular user input has been received via at least one user interface of the computing device, wherein the shut-down process of the computing device comprises a process during which an operating system and/or other software processes executing on the computing device are suspended or terminated and one or more hardware components of the computing device are being powered down; and
a processor configured to activate a first mode of operation of the computing device in response to a determination that the particular user input has been received, and to activate a second mode of operation of the computing device in response to determining that the particular user input has not been received, the first mode of operation of the computing device being a mode in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user, and the second mode of operation of the computing device being a mode in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user, and the second mode of operation of the computing device being a mode in which at least one item of sensitive data is rendered invisible to the user or inaccessible to the user by performing one or more of;
soft deleting the item of sensitive data, the soft deleting the item of sensitive data comprising deleting a link or file pointer to the item of sensitive data, the link or file pointer being restorable from a secure store;
orclosing or hiding a window in which the item of data is displayed.
2 Assignments
0 Petitions
Accused Products
Abstract
A computing device is described herein that automatically enters a data protection mode in response to the detected presence or absence of certain user input and/or user input behaviors during a device boot-up state, a user login state, or a device shut-down state. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
123 Citations
20 Claims
-
1. A computing device comprising:
-
a monitor configured to determine, during a shut-down process of the computing device, whether particular user input has been received via at least one user interface of the computing device, wherein the shut-down process of the computing device comprises a process during which an operating system and/or other software processes executing on the computing device are suspended or terminated and one or more hardware components of the computing device are being powered down; and a processor configured to activate a first mode of operation of the computing device in response to a determination that the particular user input has been received, and to activate a second mode of operation of the computing device in response to determining that the particular user input has not been received, the first mode of operation of the computing device being a mode in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user, and the second mode of operation of the computing device being a mode in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user, and the second mode of operation of the computing device being a mode in which at least one item of sensitive data is rendered invisible to the user or inaccessible to the user by performing one or more of; soft deleting the item of sensitive data, the soft deleting the item of sensitive data comprising deleting a link or file pointer to the item of sensitive data, the link or file pointer being restorable from a secure store;
orclosing or hiding a window in which the item of data is displayed. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for protecting sensitive data stored on a computing device, comprising:
-
determining, during a shut-down process of the computing device, whether particular user input has been received via at least one user interface of the computing device, wherein the shut-down process of the computing device comprises a process during which an operating system and/or other software processes executing on the computing device are suspended or terminated and one or more hardware components of the computing device are being powered down; in response to a determination that the particular user input has been received, activating, during the shut-down process of the computing device, a first mode of operation of the computing device in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user; and in response to a determination that the particular user input has not been received, activating, during the shut-down process of the computing device, a second mode of operation of the computing device in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user by performing one or more of; soft deleting an item of sensitive data, the soft deleting the item of sensitive data comprising deleting a link or file pointer to the item of sensitive data, the link or file pointer being restorable from a secure store;
orclosing or hiding a window in which the item of data is displayed. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer program product comprising a computer-readable memory having computer program logic recorded thereon that when executed by at least one processor causes the at least one processor to perform a method for protecting sensitive data stored on a computing device, the method comprising:
-
determining, during a shut-down process of the computing device, whether particular user input has been received via at least one user interface of the computing device, wherein the shut-down process of the computing device comprises a process during which an operating system and/or other software processes executing on the computing device are suspended or terminated and one or more hardware components of the computing device are being powered down; in response to a determination that the particular user input has been received, not activating, during the shut-down process of the computing device, a data protection mode of operation of the computing device in which sensitive data stored on the computing device is rendered one or more of invisible to a user and inaccessible to the user by performing one or more of; soft deleting an item of sensitive data, the soft deleting the item of sensitive data comprising deleting a link or file pointer to the item of sensitive data, the link or file pointer being restorable from a secure store; or closing or hiding a window in which the item of data is displayed; and in response to a determination that the particular user input has not been received, activating, during the shut-down process of the computing device, the data protection mode of the computing device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification