Automatic log-in function control
First Claim
Patent Images
1. A method performed under control of an end device, the method comprising:
- detecting input of two or more passcodes to access the end device;
determining whether a user of the end device is or is not an authorized user based at least, in part, on a detected behavioral pattern in connection with the input of the two or more passcodes, wherein the detected behavioral pattern is associated with the input of the two or more passcodes, wherein the two or more passcodes comprise at least one invalid passcode and a currently valid passcode, wherein the determining whether the user of the end device is or is not the authorized user comprises comparing the at least one invalid passcode as input with the currently valid passcode as input, and wherein the determining whether the user of the end device is or is not the authorized user comprises determining that the user of the end device is not the authorized user when at least one of the two or more passcodes is detected to be randomly-generated; and
responsive to the determination that the user of the end device is not the authorized user, the end device instructing at least one application, which is hosted on the end device, to disable an automatic log-in function of the at least one application.
5 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for an automatic log-in function control scheme. In some examples, a method performed under control of an end device may include detecting, from the end device, input of one or more passcodes to access the end device; determining that a user of the end device is not an authorized user based at least in part on a detected behavioral pattern in connection with the input of the one or more passcodes; and disabling an automatic log-in function of at least one application that is hosted on the end device.
-
Citations
14 Claims
-
1. A method performed under control of an end device, the method comprising:
-
detecting input of two or more passcodes to access the end device; determining whether a user of the end device is or is not an authorized user based at least, in part, on a detected behavioral pattern in connection with the input of the two or more passcodes, wherein the detected behavioral pattern is associated with the input of the two or more passcodes, wherein the two or more passcodes comprise at least one invalid passcode and a currently valid passcode, wherein the determining whether the user of the end device is or is not the authorized user comprises comparing the at least one invalid passcode as input with the currently valid passcode as input, and wherein the determining whether the user of the end device is or is not the authorized user comprises determining that the user of the end device is not the authorized user when at least one of the two or more passcodes is detected to be randomly-generated; and responsive to the determination that the user of the end device is not the authorized user, the end device instructing at least one application, which is hosted on the end device, to disable an automatic log-in function of the at least one application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An end device, comprising:
-
a processor; an internal memory; an input unit, stored in the internal memory, that, in response to execution, causes the processor to detect, from the end device, input of two or more passcodes to access the end device; and an operating system, stored in the internal memory, that, in response to execution, causes the processor to perform operations including; determine whether a user of the end device is or is not an authorized user based at least, in part, on a detected behavioral pattern in connection with the input of the two or more passcodes, wherein the detected behavioral pattern is associated with the input of the two or more passcodes, wherein the two or more passcodes comprise at least one invalid passcode and a currently valid passcode, wherein the determination of whether the user of the end device is or is not the authorized user comprises a comparison of the at least one invalid passcode as input with the currently valid passcode as input, and wherein the determination of whether the user of the end device is or is not the authorized user comprises a determination that the user of the end device is not the authorized user when at least one of the two or more passcodes is detected to be randomly-generated; and responsive to the determination that the user of the end device is not the authorized user, instruct at least one application that is hosted on the end device to disable an automatic log-in function of the at least one application. - View Dependent Claims (11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium having stored thereon computer-executable instructions that, in response to execution, cause an operating system that is stored in an end device to perform operations, comprising:
-
detect input of two or more passcodes to access the end device; determine whether a user of the end device is or is not an authorized user based at least, in part, on a detected behavioral pattern in connection with the input of the two or more passcodes, wherein the detected behavioral pattern is associated with the input of the two or more passcodes, wherein the two or more passcodes comprise at least one invalid passcode and a currently valid passcode, wherein the determination of whether the user of the end device is or is not the authorized user comprises a comparison of the at least one invalid passcode as input with the currently valid passcode as input, and wherein the determination of whether the user of the end device is or is not the authorized user comprises a determination that the user of the end device is not the authorized user when at least one of the two or more passcodes is detected to be randomly-generated; and responsive to the determination that the user of the end device is not the authorized user, instruct at least one application, hosted on the end device, to disable an automatic log-in function of the at least one application.
-
Specification