Methods and devices for detecting unauthorized access to credentials of a credential store
First Claim
Patent Images
1. A method of detecting unauthorized access, the method comprising:
- monitoring access to credentials of credential store on a computing device within a time period associated with a first setting, wherein the time period is defined by a time interval or by a duration of an event;
determining that a number of credentials accessed within the time period exceeds a threshold associated with a second setting; and
outputting, in a user interface, an indication of potential unauthorized access to the credential store responsive to determining that the number of credentials access within the time period exceeds the threshold,wherein one or more of the credentials are stored in encrypted form.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and devices for detecting unauthorized access to credentials of a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises monitoring a plurality of credentials of the credential store accessed within a period associated with a first setting, and responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, outputting, in a user interface, an indication of potential unauthorized access to the credential store. In at least one embodiment, each of the credentials accessed within the period is associated with a different user account.
-
Citations
27 Claims
-
1. A method of detecting unauthorized access, the method comprising:
-
monitoring access to credentials of credential store on a computing device within a time period associated with a first setting, wherein the time period is defined by a time interval or by a duration of an event; determining that a number of credentials accessed within the time period exceeds a threshold associated with a second setting; and outputting, in a user interface, an indication of potential unauthorized access to the credential store responsive to determining that the number of credentials access within the time period exceeds the threshold, wherein one or more of the credentials are stored in encrypted form. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computing device programmed to detect unauthorized access to credentials of a credential store, the computing device comprising a processor configured to:
-
monitor access to credentials of the credential store within a time period associated with a first setting, wherein the period is defined by a time interval or by a duration of an event; determine that a number of credentials accessed within the time period exceeds a threshold associated with a second setting; and output, in a user interface, an indication of potential unauthorized access to the credential store responsive to determining that the number of credentials accessed within the time period exceeds the threshold, wherein one or more of the credentials are stored in encrypted form. - View Dependent Claims (25)
-
-
24. A non-transitory computer-readable storage medium comprising executable instructions for programming a computing device to detect unauthorized access to credentials of a credential store, the instructions configuring a processor of the computing device to:
-
monitor access to credentials of the credential store within a time period associated with a first setting, wherein the period is defined by a time interval or by a duration of an event; determine that a number of credentials accessed within the time period exceeds a threshold associated with a second setting; and output, in a user interface, an indication of potential unauthorized access to the credential store responsive to determining that the number of credentials accessed within the time period exceeds the threshold, wherein one or more of the credentials are stored in encrypted form. - View Dependent Claims (26, 27)
-
Specification