METHODS AND DEVICES FOR DETECTING UNAUTHORIZED ACCESS TO CREDENTIALS OF A CREDENTIAL STORE
First Claim
1. A method of detecting unauthorized access to credentials of a credential store on a computing device, the method comprising:
- monitoring a plurality of credentials of the credential store accessed within a period associated with a first setting; and
responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, outputting, in a user interface, an indication of potential unauthorized access to the credential store.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and devices for detecting unauthorized access to credentials of a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises monitoring a plurality of credentials of the credential store accessed within a period associated with a first setting, and responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, outputting, in a user interface, an indication of potential unauthorized access to the credential store. In at least one embodiment, each of the credentials accessed within the period is associated with a different user account.
79 Citations
27 Claims
-
1. A method of detecting unauthorized access to credentials of a credential store on a computing device, the method comprising:
-
monitoring a plurality of credentials of the credential store accessed within a period associated with a first setting; and responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, outputting, in a user interface, an indication of potential unauthorized access to the credential store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computing device programmed to detect unauthorized access to credentials of a credential store, the computing device comprising a processor configured to:
-
monitor a plurality of credentials of the credential store accessed within a period associated with a first setting; and responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, output, in a user interface, an indication of potential unauthorized access to the credential store.
-
-
27. A computer-readable storage medium comprising executable instructions for programming a computing device to detect unauthorized access to credentials of a credential store, the instructions configuring a processor of the computing device to:
-
monitor a plurality of credentials of the credential store accessed within a period associated with a first setting; and responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, output, in a user interface, an indication of potential unauthorized access to the credential store.
-
Specification