CA2526818A1 - Method for context sensitive concealment of an input field - Google Patents
Method for context sensitive concealment of an input field Download PDFInfo
- Publication number
- CA2526818A1 CA2526818A1 CA 2526818 CA2526818A CA2526818A1 CA 2526818 A1 CA2526818 A1 CA 2526818A1 CA 2526818 CA2526818 CA 2526818 CA 2526818 A CA2526818 A CA 2526818A CA 2526818 A1 CA2526818 A1 CA 2526818A1
- Authority
- CA
- Canada
- Prior art keywords
- character string
- character
- input field
- characters
- composition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
Description
TITLE
METHOD FOR CONTEXT SENSITIVE CONCEALMENT OF AN INPUT FIELD
FIELD OF THE INVENTION
The present invention relates to a method for the context sensitive concealment of an input field. In particular, the present invention relates to a method for concealing and revealing sensitive data, especially on devices using twelve key keypads.
BACKGROUND TO THE INVENTION
As known in the art, entry of alphanumeric characters on devices equipped with a standard twelve (12) key mobile phone keypad typically comprises either pressing multiple keys (chording) or tapping (actuating) a key multiple times (multi-tap) to select, or compose, a given alphanumeric character. As known in the art using the multi-tap method, a short delay (referred to hereinafter as a "composition timeout") is provided during within which if the same key is pressed, the alphanumeric character displayed is replaced by the next character. The composition timeout is typically fairly short, on the order of one second. Failure to enter a tap on the same key during the composition timeout leads to the currently displayed character being seized by the device and fixed on the display.
In many applications involving the entry of sensitive data such as passwords, the input field is masked or otherwise concealed during input such that the actual input remains invisible, effectively proscribing another's ability to read sensitive data from the input field. In a traditional environment comprising a complete keyboard this type of concealment is generally adequate and poses little problem (although, as will be seen below, this also has drawbacks). In a system using the multi-tap method, however, where a certain amount of visual feed back is required to ensure that the correct character is keyed, complete concealment of the character in question proves problematic and typically leads to many false entries, especially when the user is disturbed during entry.
This can prove particularly inefficient when entering passwords as many systems refuse access after a small number of incorrect entries.
One prior art method for concealing characters and even entire input fields during multi-tap entry is as follows. As characters are composed, they are made visible to the user in clear text. For example, in order to compose the character "c" the user taps key 2 thrice, first revealing the character "a"
followed by "b" and arriving at "c" on the third tap. Once the wished for character has been composed and seized by the device, the character displayed is concealed, or masked, by replacing it with a wildcard character such as an asterisk. However, once the character has been concealed in this fashion, there is generally no way that the user can view it again. Additionally, and as will be understood by a person of skill in the art, as further characters are entered and concealed in this fashion there is generally no way that the user can view any (or all) of these characters (as they are masked, again typically with an asterisk).
Additionally, due to the variety of input modes that exist on many mobile handsets (for example lowercase mode, uppercase mode, symbol mode, numeric mode, lowercase mode with capitalizing of the first letter, etc.) users frequently enter unexpected or unwanted characters. For example, in "Abc"
mode where the first letter is always capitalized, the user may easily enter "Password" instead of "password" without noticing it. As passwords are typically case-sensitive this can lead to a proliferation of password entry errors. This drawback is further compounded in that the indicator of the mode currently active while the user is entering masked data is frequently not clearly displayed. For example, the current mode indicator is typically located away from the input field and outside of the user's area of attention (positioned at a corner of the screen, for example).
METHOD FOR CONTEXT SENSITIVE CONCEALMENT OF AN INPUT FIELD
FIELD OF THE INVENTION
The present invention relates to a method for the context sensitive concealment of an input field. In particular, the present invention relates to a method for concealing and revealing sensitive data, especially on devices using twelve key keypads.
BACKGROUND TO THE INVENTION
As known in the art, entry of alphanumeric characters on devices equipped with a standard twelve (12) key mobile phone keypad typically comprises either pressing multiple keys (chording) or tapping (actuating) a key multiple times (multi-tap) to select, or compose, a given alphanumeric character. As known in the art using the multi-tap method, a short delay (referred to hereinafter as a "composition timeout") is provided during within which if the same key is pressed, the alphanumeric character displayed is replaced by the next character. The composition timeout is typically fairly short, on the order of one second. Failure to enter a tap on the same key during the composition timeout leads to the currently displayed character being seized by the device and fixed on the display.
In many applications involving the entry of sensitive data such as passwords, the input field is masked or otherwise concealed during input such that the actual input remains invisible, effectively proscribing another's ability to read sensitive data from the input field. In a traditional environment comprising a complete keyboard this type of concealment is generally adequate and poses little problem (although, as will be seen below, this also has drawbacks). In a system using the multi-tap method, however, where a certain amount of visual feed back is required to ensure that the correct character is keyed, complete concealment of the character in question proves problematic and typically leads to many false entries, especially when the user is disturbed during entry.
This can prove particularly inefficient when entering passwords as many systems refuse access after a small number of incorrect entries.
One prior art method for concealing characters and even entire input fields during multi-tap entry is as follows. As characters are composed, they are made visible to the user in clear text. For example, in order to compose the character "c" the user taps key 2 thrice, first revealing the character "a"
followed by "b" and arriving at "c" on the third tap. Once the wished for character has been composed and seized by the device, the character displayed is concealed, or masked, by replacing it with a wildcard character such as an asterisk. However, once the character has been concealed in this fashion, there is generally no way that the user can view it again. Additionally, and as will be understood by a person of skill in the art, as further characters are entered and concealed in this fashion there is generally no way that the user can view any (or all) of these characters (as they are masked, again typically with an asterisk).
Additionally, due to the variety of input modes that exist on many mobile handsets (for example lowercase mode, uppercase mode, symbol mode, numeric mode, lowercase mode with capitalizing of the first letter, etc.) users frequently enter unexpected or unwanted characters. For example, in "Abc"
mode where the first letter is always capitalized, the user may easily enter "Password" instead of "password" without noticing it. As passwords are typically case-sensitive this can lead to a proliferation of password entry errors. This drawback is further compounded in that the indicator of the mode currently active while the user is entering masked data is frequently not clearly displayed. For example, the current mode indicator is typically located away from the input field and outside of the user's area of attention (positioned at a corner of the screen, for example).
Similar drawbacks also arise in more conventional devices which include full keyboards (such as the ubiquitous QWERTY keyboard) combined with a single-tap entry method. As discussed above, in these cases the character being entered is completely invisible and is typically replaced immediately with an asterisk. Due to the low quality of some keypads as well as their small size, especially on hand held devices, the probability that a wrong key is depressed, two keys depressed at once or the same key depressed twice is high resulting in a large number of errors.
SUMMARY OF THE INVENTION
In order to overcome the above and other drawbacks, there is disclosed a method for displaying characters on a device comprising a display and a keypad. The method comprises the steps of composing a series of characters using the keypad, the series of characters forming a character string, displaying the character string on the display, completing composition of the character string and concealing the character string following completion of composition.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 is a front plan view of a mobile device in accordance with and illustrative embodiment of the present invention;
Figures 2A through 2C provide front plan views of a device implementing one method for the display of sensitive data according to the prior art; and Figures 3A through 3E provide front plan views of a device implementing a method for the display of sensitive data according to an illustrative embodiment of the present invention.
SUMMARY OF THE INVENTION
In order to overcome the above and other drawbacks, there is disclosed a method for displaying characters on a device comprising a display and a keypad. The method comprises the steps of composing a series of characters using the keypad, the series of characters forming a character string, displaying the character string on the display, completing composition of the character string and concealing the character string following completion of composition.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 is a front plan view of a mobile device in accordance with and illustrative embodiment of the present invention;
Figures 2A through 2C provide front plan views of a device implementing one method for the display of sensitive data according to the prior art; and Figures 3A through 3E provide front plan views of a device implementing a method for the display of sensitive data according to an illustrative embodiment of the present invention.
DETAILED DESCRIPTION OF THE ILLUSTRATIVE EMBODIMENTS
Referring now to Figure 1, a mobile device, generally referred to using the reference numeral 10, will now be described. The mobile device 10 is comprised of a keypad 12, illustratively comprised of a twelve (12) key numeric keypad 14 and additional function keypad 16, which can include, for example, a four-way scroll key with centre select 18, soft-keys, application-keys, edit and clear keys, send & end keys, multimedia keys, etc..
Still referring to Figure 1, the mobile device 10 is additionally equipped with a display 20, such as an active matrix colour display, for viewing locally stored data such as contact lists, call logs, configuration settings, etc., as well as web pages, e-mail, etc.. As known in the art, the display 20 and associated operating system software (not shown) provide the interaction and display capabilities which allow a user to interact with the device 10 as well as other devices interconnected with the device 10 via a communications link, such as web servers, e-mail servers, etc.. The display 20 typically supports the formatted presentation of information in a variety of forms including text strings 22, graphics/pictures 24 and icons 26. Additionally, information is typically displayed along with one or more control objects, such as buttons 28, check boxes 30, sliders (not shown) and edit boxes 32, which allow the user to manipulate or otherwise interact with the displayed information. Typically, using the four-way scroll key 18, for example to control a cursor 34, the user can migrate (shift focus) between and interact with the control objects.
Still referring to Figure 1, by activating an edit box (or input field) as in 32, the user can input data, such as alphanumeric characters using, for example, the twelve (12) key numeric keypad 14 and the multi-tap character input method as described hereinabove.
Referring now to Figures 2A through 2C, as discussed above one prior art method for entering sensitive strings (such as passwords) involves, as the characters are composed, making them visible to the user in clear text. Once the wished for character has been composed and seized by the device, the character is concealed by replacing it with an asterisk. For example, in Figure 2A, the character "d" has been added to a character string 36 into the input field 32 using the multi-tap method by pressing numeric key "3" (reference 38 on Figure 1) once. Referring now to Figure 2B, after a shortly delay (as discussed above, typically one second) the character is seized and concealed with an asterisk. This prior art method allows the user to delete characters already seized and concealed, for example by backspacing over the character or the like. Additionally, and referring now to Figure 2C, the prior art method also allows for the insertion of additional characters at any point within the character string 36, however the other characters remain concealed behind an asterisk.
Referring now to Figure 3A, in order to simplify the correct entry of sensitive data into an input field 32, the user begins by entering the sensitive character string 36, for example using the twelve (12) key numeric keypad 14 and the multi-tap character input method as described hereinabove. However, instead of concealing each character immediately following its composition, the characters of the entire sensitive character string 36 remain visible during its composition. The character string 36 is only concealed on completion of its composition, which can be indicated to the device 10 by the user in a number of ways, for example the user does not press any key for a configurable short period of time (for example 3 seconds) or the user moves focus away from the input field 32 in question (for example by moving the cursor 34 to another input field or control object).
Referring now to Figure 3B, following concealment of the character string 36, the user may reveal the concealed character string 36 by performing an additional action within an aflotted period of time (for example 60 seconds).
Examples of additional actions include, for example, the user attempting to add an additional character to the character string 36 already entered or the user returning focus to the input field 32 and positioning the cursor 34 left or right of the concealed characters. Referring now to Figure 3C, at this point the concealed character string 36 is revealed and user is free to move the cursor 34 to the position where it is wished to make the changes.
In order to protect the sensitive character string 34, in the event the user fails to reveal the concealed character string 36 within the allotted period of time, the concealed character string remains so, even if the user attempts to add an additional character to the string or returns focus to the input field 32.
The described method also foresees a number of other features which may prove opportune in a given implementation. For example, if the input field 34 is for entering a password and the password entered into input field 34 is used successfully, the input field becomes non-editable. Additionally, and referring to Figure 3D, if the user returns focus to the input field 32, the entire concealed character string 34 is selected and the cursor is not displayed. Referring to Figure 3E, attempted entry of characters into the input field 32 at this point results in the concealed character string 36 being erased. Additionally, in order to provide the user with an indication of the current status of the input field, an indicator 40 as to the entry mode currently active for the input field 32 may be provided for. Furthermore, as many of the parameters used in support of the method as described herein are configurable, a specific entry mode to the input field 34, for example in order to provide the user with a familiar context over time for entry of sensitive data such as passwords, can be a pre-configured default or can be based on a user's previous configuration.
Although the present invention has been described hereinabove by way of an illustrative embodiment thereof, this embodiment can be modified at will, within the scope of the present invention, without departing from the spirit and nature of the subject of the present invention.
Referring now to Figure 1, a mobile device, generally referred to using the reference numeral 10, will now be described. The mobile device 10 is comprised of a keypad 12, illustratively comprised of a twelve (12) key numeric keypad 14 and additional function keypad 16, which can include, for example, a four-way scroll key with centre select 18, soft-keys, application-keys, edit and clear keys, send & end keys, multimedia keys, etc..
Still referring to Figure 1, the mobile device 10 is additionally equipped with a display 20, such as an active matrix colour display, for viewing locally stored data such as contact lists, call logs, configuration settings, etc., as well as web pages, e-mail, etc.. As known in the art, the display 20 and associated operating system software (not shown) provide the interaction and display capabilities which allow a user to interact with the device 10 as well as other devices interconnected with the device 10 via a communications link, such as web servers, e-mail servers, etc.. The display 20 typically supports the formatted presentation of information in a variety of forms including text strings 22, graphics/pictures 24 and icons 26. Additionally, information is typically displayed along with one or more control objects, such as buttons 28, check boxes 30, sliders (not shown) and edit boxes 32, which allow the user to manipulate or otherwise interact with the displayed information. Typically, using the four-way scroll key 18, for example to control a cursor 34, the user can migrate (shift focus) between and interact with the control objects.
Still referring to Figure 1, by activating an edit box (or input field) as in 32, the user can input data, such as alphanumeric characters using, for example, the twelve (12) key numeric keypad 14 and the multi-tap character input method as described hereinabove.
Referring now to Figures 2A through 2C, as discussed above one prior art method for entering sensitive strings (such as passwords) involves, as the characters are composed, making them visible to the user in clear text. Once the wished for character has been composed and seized by the device, the character is concealed by replacing it with an asterisk. For example, in Figure 2A, the character "d" has been added to a character string 36 into the input field 32 using the multi-tap method by pressing numeric key "3" (reference 38 on Figure 1) once. Referring now to Figure 2B, after a shortly delay (as discussed above, typically one second) the character is seized and concealed with an asterisk. This prior art method allows the user to delete characters already seized and concealed, for example by backspacing over the character or the like. Additionally, and referring now to Figure 2C, the prior art method also allows for the insertion of additional characters at any point within the character string 36, however the other characters remain concealed behind an asterisk.
Referring now to Figure 3A, in order to simplify the correct entry of sensitive data into an input field 32, the user begins by entering the sensitive character string 36, for example using the twelve (12) key numeric keypad 14 and the multi-tap character input method as described hereinabove. However, instead of concealing each character immediately following its composition, the characters of the entire sensitive character string 36 remain visible during its composition. The character string 36 is only concealed on completion of its composition, which can be indicated to the device 10 by the user in a number of ways, for example the user does not press any key for a configurable short period of time (for example 3 seconds) or the user moves focus away from the input field 32 in question (for example by moving the cursor 34 to another input field or control object).
Referring now to Figure 3B, following concealment of the character string 36, the user may reveal the concealed character string 36 by performing an additional action within an aflotted period of time (for example 60 seconds).
Examples of additional actions include, for example, the user attempting to add an additional character to the character string 36 already entered or the user returning focus to the input field 32 and positioning the cursor 34 left or right of the concealed characters. Referring now to Figure 3C, at this point the concealed character string 36 is revealed and user is free to move the cursor 34 to the position where it is wished to make the changes.
In order to protect the sensitive character string 34, in the event the user fails to reveal the concealed character string 36 within the allotted period of time, the concealed character string remains so, even if the user attempts to add an additional character to the string or returns focus to the input field 32.
The described method also foresees a number of other features which may prove opportune in a given implementation. For example, if the input field 34 is for entering a password and the password entered into input field 34 is used successfully, the input field becomes non-editable. Additionally, and referring to Figure 3D, if the user returns focus to the input field 32, the entire concealed character string 34 is selected and the cursor is not displayed. Referring to Figure 3E, attempted entry of characters into the input field 32 at this point results in the concealed character string 36 being erased. Additionally, in order to provide the user with an indication of the current status of the input field, an indicator 40 as to the entry mode currently active for the input field 32 may be provided for. Furthermore, as many of the parameters used in support of the method as described herein are configurable, a specific entry mode to the input field 34, for example in order to provide the user with a familiar context over time for entry of sensitive data such as passwords, can be a pre-configured default or can be based on a user's previous configuration.
Although the present invention has been described hereinabove by way of an illustrative embodiment thereof, this embodiment can be modified at will, within the scope of the present invention, without departing from the spirit and nature of the subject of the present invention.
Claims (14)
1. A method for displaying characters on a device comprising a display and a keypad, the method comprising the steps of:
composing a series of characters using the keypad, said series of characters forming a character string;
displaying said character string on the display;
completing composition of said character string; and concealing said character string completion of composition.
composing a series of characters using the keypad, said series of characters forming a character string;
displaying said character string on the display;
completing composition of said character string; and concealing said character string completion of composition.
2. The method of Claim 1, wherein the keypad comprises twelve numeric keys and each character of said series of characters is composed by actuating a particular one of said numeric keys a predetermined number of times, a delay between successive actuations being less than a predetermined limit.
3. The method of Claim 2, wherein said predetermined limit is one (1) second.
4. The method of Claim 1, wherein each character of said character string is displayed immediately following its composition.
5. The method of Claim 1, wherein the display comprises an input field and said character string is displayed in said input field.
6. The method of Claim 5, wherein said input field is a text edit field.
7. The method of Claim 5, wherein said composition completing step comprises moving a focus away from said input field.
8 8. The method of Claim 7, further comprising the step of, following said concealing step, of revealing said character string when said focus is moved to said input field within an allotted period of time.
9. The method of Claim 8, wherein said allotted period of time is 60 seconds.
10. The method of Claim 1, wherein said composition completing step comprises ceasing character composition during a predetermined period of time.
11. The method of Claim 10, wherein predetermined period of time is 3 seconds.
12. The method of Claim 1, wherein said concealing step comprises masking each character of said character string using a wildcard.
13. The method of Claim 12, wherein said wildcard is an asterisk.
14. The method of Claim 1, wherein said character string is a password and further comprising the step of
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2526818 CA2526818A1 (en) | 2005-11-14 | 2005-11-14 | Method for context sensitive concealment of an input field |
PCT/CA2006/001850 WO2007068082A1 (en) | 2005-11-14 | 2006-11-14 | Context sensitive concealment of an input field |
JP2008539202A JP5150505B2 (en) | 2005-11-14 | 2006-11-14 | Electronic communication apparatus and character input processing method in the apparatus |
US12/093,606 US10354097B2 (en) | 2005-11-14 | 2006-11-14 | Context sensitive concealment of an input field |
EP06846909A EP1955131A4 (en) | 2005-11-14 | 2006-11-14 | Context sensitive concealment of an input field |
CNA200680042276XA CN101305336A (en) | 2005-11-14 | 2006-11-14 | Context sensitive concealment of an input field |
CA2627172A CA2627172C (en) | 2005-11-14 | 2006-11-14 | Context sensitive concealment of an input field |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2526818 CA2526818A1 (en) | 2005-11-14 | 2005-11-14 | Method for context sensitive concealment of an input field |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2526818A1 true CA2526818A1 (en) | 2007-05-14 |
Family
ID=38051413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA 2526818 Abandoned CA2526818A1 (en) | 2005-11-14 | 2005-11-14 | Method for context sensitive concealment of an input field |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101305336A (en) |
CA (1) | CA2526818A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2701038A1 (en) * | 2011-09-06 | 2014-02-26 | Tencent Technology (Shenzhen) Co., Ltd | Password input method and device |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945336B (en) * | 2012-10-24 | 2016-02-03 | 广东欧珀移动通信有限公司 | A kind of cipher-code input method of intelligent communication terminal |
CN103034468B (en) * | 2012-12-18 | 2016-02-24 | 小米科技有限责任公司 | A kind of method and device showing text |
-
2005
- 2005-11-14 CA CA 2526818 patent/CA2526818A1/en not_active Abandoned
-
2006
- 2006-11-14 CN CNA200680042276XA patent/CN101305336A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2701038A1 (en) * | 2011-09-06 | 2014-02-26 | Tencent Technology (Shenzhen) Co., Ltd | Password input method and device |
EP2701038A4 (en) * | 2011-09-06 | 2015-04-29 | Tencent Tech Shenzhen Co Ltd | Password input method and device |
Also Published As
Publication number | Publication date |
---|---|
CN101305336A (en) | 2008-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10354097B2 (en) | Context sensitive concealment of an input field | |
US20200192568A1 (en) | Touch screen electronic device and associated user interface | |
US7984381B2 (en) | User interface | |
EP3349539B1 (en) | Contextual search by a mobile communications device | |
US8042042B2 (en) | Touch screen-based document editing device and method | |
US20120272328A1 (en) | Method, system and apparatus for secure data editing | |
US20130132899A1 (en) | Menu for a mobile communication device | |
US20070238488A1 (en) | Primary actions menu for a mobile communication device | |
EP1980953B1 (en) | Character input device | |
US7423556B2 (en) | Method and device for key input in mobile terminal | |
EP1770482B1 (en) | Apparatus with multiple highlights | |
JP5762850B2 (en) | Mobile terminal device | |
US20130232446A1 (en) | Electronic device and method for unlocking electronic device | |
CA2526818A1 (en) | Method for context sensitive concealment of an input field | |
US20120019471A1 (en) | Entering information into a communications device | |
CN113434226A (en) | Communication method, communication device, electronic equipment and readable storage medium | |
US20140129933A1 (en) | User interface for input functions | |
CN1795661B (en) | Apparatus for and method of inputting alphabets using a reduced keypad | |
CN101394629A (en) | Color differentiating a portion of a text message shown in a listing on a handheld communication device | |
CA2583091A1 (en) | Primary actions menu for a mobile communication device | |
US20220129146A1 (en) | Method for controlling a computer device for entering a personal code | |
CA2656328A1 (en) | System and method for differentiating between incoming and outgoing messages and identifying correspondents in a tty communication | |
JP6153563B2 (en) | Mobile terminal device | |
JP2011107803A (en) | Information processor | |
WO2018214066A1 (en) | Reply message comprising content of an input field |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |