DATA PROTECTION SYSTEM BASED ON USER INPUT PATTERNS ON DEVICE
First Claim
Patent Images
1. A system in a computing device to protect data stored by the computing device, comprising:
- a user input pattern monitor configured to determine whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user; and
a data protection enactor configured to discretely enact a data protection response associated with data when the detected user interaction pattern is determined by the user input pattern monitor to indicate an interaction by an unauthorized user.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products are provided for protecting data stored on a device based on user input patterns. The device may have one or more types of user interfaces. The user interacts with a user interface of the device according to a pattern. The interaction pattern is monitored, and compared to one or more stored acceptable user interface patterns associated with sensitive data. If the interaction pattern of the user does not match an acceptable user interface pattern, a data protection response assigned to the data is enacted.
11 Citations
20 Claims
-
1. A system in a computing device to protect data stored by the computing device, comprising:
-
a user input pattern monitor configured to determine whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user; and a data protection enactor configured to discretely enact a data protection response associated with data when the detected user interaction pattern is determined by the user input pattern monitor to indicate an interaction by an unauthorized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method in a computing device to protect data stored by the computing device, comprising:
-
determining whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user; and discretely enacting a data protection response associated with data when the detected user interaction pattern is determined to indicate an interaction by an unauthorized user. - View Dependent Claims (12, 13, 14, 15, 16, 18, 19, 20)
-
-
17. A method in a computing device to protect data stored by the computing device, comprising:
-
enabling data to be selected, and a data sensitivity level, a data protection response, and a contextual trigger to be associated with the data; receiving detected user interaction patterns with a user interface of the computing device; processing the detected user interaction patterns to generate an acceptable user interaction pattern for the user interface; determining whether a detected user interaction pattern with the user interface indicates an interaction by an unauthorized user by comparison with the acceptable user interaction pattern; and discretely enacting the data protection response when the detected user interaction pattern is determined to indicate an interaction by an unauthorized user.
-
Specification