Data protection system based on user input patterns on device
First Claim
Patent Images
1. A system in a computing device to protect data stored by the computing device, comprising:
- a user input pattern monitor configured to determine whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user, the detected user interaction pattern comprising a keyboard user interaction pattern that includes a predetermined typographical error; and
a data protection enactor configured to discreetly enact a data protection response associated with data when the detected user interaction pattern is determined by the user input pattern monitor to indicate an interaction by an unauthorized user.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products are provided for protecting data stored on a device based on user input patterns. The device may have one or more types of user interfaces. The user interacts with a user interface of the device according to a pattern. The interaction pattern is monitored, and compared to one or more stored acceptable user interface patterns associated with sensitive data. If the interaction pattern of the user does not match an acceptable user interface pattern, a data protection response assigned to the data is enacted.
-
Citations
20 Claims
-
1. A system in a computing device to protect data stored by the computing device, comprising:
-
a user input pattern monitor configured to determine whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user, the detected user interaction pattern comprising a keyboard user interaction pattern that includes a predetermined typographical error; and a data protection enactor configured to discreetly enact a data protection response associated with data when the detected user interaction pattern is determined by the user input pattern monitor to indicate an interaction by an unauthorized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method in a computing device to protect data stored by the computing device, comprising:
-
determining whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user, the detect user interaction pattern comprising a pointing device interaction that includes at least one of a movement of a pointer within a determined screen area, an amount of file exploration having a predetermined relationship with a first predetermined threshold, or an amount of folder exploration having a predetermined relationship with a second predetermined threshold; and discreetly enacting a data protection response associated with data when the detected user interaction pattern is determined to indicate an interaction by an unauthorized user. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method in a computing device to protect data stored by the computing device, comprising:
-
enabling data to be selected, and a data sensitivity level, a data protection response, and a contextual trigger to be associated with the data; receiving detected user interaction patterns with a user interface of the computing device, the detected user interaction patterns comprising a touch screen interaction that includes at least one of an average touch area or an average touch pressure range; processing the detected user interaction patterns to generate an acceptable user interaction pattern for the user interface; determining whether a detected user interaction pattern with the user interface indicates an interaction by an unauthorized user by comparison with the acceptable user interaction pattern; and discreetly enacting the data protection response when the detected user interaction pattern is determined to indicate an interaction by an unauthorized user. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification