DATA PROTECTION BASED ON USER INPUT DURING DEVICE BOOT-UP, USER LOGIN, AND DEVICE SHUT-DOWN STATES
First Claim
Patent Images
1. A system, comprising:
- at least one processor; and
one or more memory devices connected to the at least one processor, the one or more memory devices storing software components for execution by the at least one processor, the software components including a user login component that comprises;
monitoring logic configured to determine whether a particular password has been entered and to determine whether at least one user input behavior is present; and
mode selection logic configured to activate a first mode of operation of the computing device in response to a determination that the particular password has been entered and the at least one user input behavior is present, and to activate a second mode of operation of the computing device in response to determining that the particular password has been entered and the at least one user input behavior is not present;
the first mode of operation of the computing device being a mode in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user, and the second mode of operation of the computing device being a mode in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user.
2 Assignments
0 Petitions
Accused Products
Abstract
A computing device is described herein that automatically enters a data protection mode in response to the detected presence or absence of certain user input and/or user input behaviors during a device boot-up state, a user login state, or a device shut-down state. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
-
Citations
20 Claims
-
1. A system, comprising:
-
at least one processor; and one or more memory devices connected to the at least one processor, the one or more memory devices storing software components for execution by the at least one processor, the software components including a user login component that comprises; monitoring logic configured to determine whether a particular password has been entered and to determine whether at least one user input behavior is present; and mode selection logic configured to activate a first mode of operation of the computing device in response to a determination that the particular password has been entered and the at least one user input behavior is present, and to activate a second mode of operation of the computing device in response to determining that the particular password has been entered and the at least one user input behavior is not present; the first mode of operation of the computing device being a mode in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user, and the second mode of operation of the computing device being a mode in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for protecting sensitive data stored on a computing device, comprising performing during a boot-up process of the computing device:
-
determining whether particular user input has been received via at least one user interface of the computing device; in response to a determination that the particular user input has been received, activating a first mode of operation of the computing device in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user; and in response to a determination that the particular user input has not been received, activating a second mode of operation of the computing device in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer program product comprising a computer-readable memory having computer program logic recorded thereon that when executed by at least one processor causes the at least one processor to perform a method for protecting sensitive data stored on a computing device, the method comprising performing the following during a shut-down process of the computing device:
-
determining whether particular user input has been received via at least one user interface of the computing device; in response to a determination that the particular user input has been received, not activating a data protection mode of operation of the computing device in which sensitive data stored on the computing device is rendered one or more of invisible to a user and inaccessible to the user; and in response to a determination that the particular user input has not been received, activating the second mode of operation of the computing device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification