×

COMPUTING SECURITY MECHANISM

  • US 20130111586A1
  • Filed: 10/27/2011
  • Published: 05/02/2013
  • Est. Priority Date: 10/27/2011
  • Status: Abandoned Application
First Claim
Patent Images

1. A computer-implemented method comprising:

  • determining, using a processor, an identity currently logged-in to a computing system that provides access to a number of user applications;

    while the identity remains logged-in to the computing system, monitoring, using a processor, interaction with multiple of the user applications accessible via the computing system;

    comparing, using a processor, the monitored interaction with the multiple user applications to a system resource usage model corresponding to the identity determined to be logged-in to the computing system currently;

    based on a result of comparing the monitored interaction with the multiple user applications to the system resource usage model corresponding to the identity determined to be logged-in to the computing system, determining, using a processor, that the monitored interaction with the multiple user applications is suspicious; and

    as a consequence of determining that the monitored interaction with the multiple user applications is suspicious, invoking, using a processor, a security mechanism in connection with the computing system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×