CA2526818A1 - Method for context sensitive concealment of an input field - Google Patents

Method for context sensitive concealment of an input field Download PDF

Info

Publication number
CA2526818A1
CA2526818A1 CA 2526818 CA2526818A CA2526818A1 CA 2526818 A1 CA2526818 A1 CA 2526818A1 CA 2526818 CA2526818 CA 2526818 CA 2526818 A CA2526818 A CA 2526818A CA 2526818 A1 CA2526818 A1 CA 2526818A1
Authority
CA
Canada
Prior art keywords
character string
character
input field
characters
composition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2526818
Other languages
French (fr)
Inventor
Nikolai Grigoriev
Haraldur Thorkelsson
Natalie Jhaveri
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oz Communications Inc
Original Assignee
Oz Communications Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oz Communications Inc filed Critical Oz Communications Inc
Priority to CA 2526818 priority Critical patent/CA2526818A1/en
Priority to CA2627172A priority patent/CA2627172C/en
Priority to EP06846909A priority patent/EP1955131A4/en
Priority to CNA200680042276XA priority patent/CN101305336A/en
Priority to US12/093,606 priority patent/US10354097B2/en
Priority to PCT/CA2006/001850 priority patent/WO2007068082A1/en
Priority to JP2008539202A priority patent/JP5150505B2/en
Publication of CA2526818A1 publication Critical patent/CA2526818A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)

Description

TITLE
METHOD FOR CONTEXT SENSITIVE CONCEALMENT OF AN INPUT FIELD
FIELD OF THE INVENTION

The present invention relates to a method for the context sensitive concealment of an input field. In particular, the present invention relates to a method for concealing and revealing sensitive data, especially on devices using twelve key keypads.

BACKGROUND TO THE INVENTION

As known in the art, entry of alphanumeric characters on devices equipped with a standard twelve (12) key mobile phone keypad typically comprises either pressing multiple keys (chording) or tapping (actuating) a key multiple times (multi-tap) to select, or compose, a given alphanumeric character. As known in the art using the multi-tap method, a short delay (referred to hereinafter as a "composition timeout") is provided during within which if the same key is pressed, the alphanumeric character displayed is replaced by the next character. The composition timeout is typically fairly short, on the order of one second. Failure to enter a tap on the same key during the composition timeout leads to the currently displayed character being seized by the device and fixed on the display.
In many applications involving the entry of sensitive data such as passwords, the input field is masked or otherwise concealed during input such that the actual input remains invisible, effectively proscribing another's ability to read sensitive data from the input field. In a traditional environment comprising a complete keyboard this type of concealment is generally adequate and poses little problem (although, as will be seen below, this also has drawbacks). In a system using the multi-tap method, however, where a certain amount of visual feed back is required to ensure that the correct character is keyed, complete concealment of the character in question proves problematic and typically leads to many false entries, especially when the user is disturbed during entry.
This can prove particularly inefficient when entering passwords as many systems refuse access after a small number of incorrect entries.

One prior art method for concealing characters and even entire input fields during multi-tap entry is as follows. As characters are composed, they are made visible to the user in clear text. For example, in order to compose the character "c" the user taps key 2 thrice, first revealing the character "a"
followed by "b" and arriving at "c" on the third tap. Once the wished for character has been composed and seized by the device, the character displayed is concealed, or masked, by replacing it with a wildcard character such as an asterisk. However, once the character has been concealed in this fashion, there is generally no way that the user can view it again. Additionally, and as will be understood by a person of skill in the art, as further characters are entered and concealed in this fashion there is generally no way that the user can view any (or all) of these characters (as they are masked, again typically with an asterisk).
Additionally, due to the variety of input modes that exist on many mobile handsets (for example lowercase mode, uppercase mode, symbol mode, numeric mode, lowercase mode with capitalizing of the first letter, etc.) users frequently enter unexpected or unwanted characters. For example, in "Abc"
mode where the first letter is always capitalized, the user may easily enter "Password" instead of "password" without noticing it. As passwords are typically case-sensitive this can lead to a proliferation of password entry errors. This drawback is further compounded in that the indicator of the mode currently active while the user is entering masked data is frequently not clearly displayed. For example, the current mode indicator is typically located away from the input field and outside of the user's area of attention (positioned at a corner of the screen, for example).
Similar drawbacks also arise in more conventional devices which include full keyboards (such as the ubiquitous QWERTY keyboard) combined with a single-tap entry method. As discussed above, in these cases the character being entered is completely invisible and is typically replaced immediately with an asterisk. Due to the low quality of some keypads as well as their small size, especially on hand held devices, the probability that a wrong key is depressed, two keys depressed at once or the same key depressed twice is high resulting in a large number of errors.
SUMMARY OF THE INVENTION

In order to overcome the above and other drawbacks, there is disclosed a method for displaying characters on a device comprising a display and a keypad. The method comprises the steps of composing a series of characters using the keypad, the series of characters forming a character string, displaying the character string on the display, completing composition of the character string and concealing the character string following completion of composition.

BRIEF DESCRIPTION OF THE FIGURES

Figure 1 is a front plan view of a mobile device in accordance with and illustrative embodiment of the present invention;

Figures 2A through 2C provide front plan views of a device implementing one method for the display of sensitive data according to the prior art; and Figures 3A through 3E provide front plan views of a device implementing a method for the display of sensitive data according to an illustrative embodiment of the present invention.
DETAILED DESCRIPTION OF THE ILLUSTRATIVE EMBODIMENTS
Referring now to Figure 1, a mobile device, generally referred to using the reference numeral 10, will now be described. The mobile device 10 is comprised of a keypad 12, illustratively comprised of a twelve (12) key numeric keypad 14 and additional function keypad 16, which can include, for example, a four-way scroll key with centre select 18, soft-keys, application-keys, edit and clear keys, send & end keys, multimedia keys, etc..

Still referring to Figure 1, the mobile device 10 is additionally equipped with a display 20, such as an active matrix colour display, for viewing locally stored data such as contact lists, call logs, configuration settings, etc., as well as web pages, e-mail, etc.. As known in the art, the display 20 and associated operating system software (not shown) provide the interaction and display capabilities which allow a user to interact with the device 10 as well as other devices interconnected with the device 10 via a communications link, such as web servers, e-mail servers, etc.. The display 20 typically supports the formatted presentation of information in a variety of forms including text strings 22, graphics/pictures 24 and icons 26. Additionally, information is typically displayed along with one or more control objects, such as buttons 28, check boxes 30, sliders (not shown) and edit boxes 32, which allow the user to manipulate or otherwise interact with the displayed information. Typically, using the four-way scroll key 18, for example to control a cursor 34, the user can migrate (shift focus) between and interact with the control objects.
Still referring to Figure 1, by activating an edit box (or input field) as in 32, the user can input data, such as alphanumeric characters using, for example, the twelve (12) key numeric keypad 14 and the multi-tap character input method as described hereinabove.
Referring now to Figures 2A through 2C, as discussed above one prior art method for entering sensitive strings (such as passwords) involves, as the characters are composed, making them visible to the user in clear text. Once the wished for character has been composed and seized by the device, the character is concealed by replacing it with an asterisk. For example, in Figure 2A, the character "d" has been added to a character string 36 into the input field 32 using the multi-tap method by pressing numeric key "3" (reference 38 on Figure 1) once. Referring now to Figure 2B, after a shortly delay (as discussed above, typically one second) the character is seized and concealed with an asterisk. This prior art method allows the user to delete characters already seized and concealed, for example by backspacing over the character or the like. Additionally, and referring now to Figure 2C, the prior art method also allows for the insertion of additional characters at any point within the character string 36, however the other characters remain concealed behind an asterisk.
Referring now to Figure 3A, in order to simplify the correct entry of sensitive data into an input field 32, the user begins by entering the sensitive character string 36, for example using the twelve (12) key numeric keypad 14 and the multi-tap character input method as described hereinabove. However, instead of concealing each character immediately following its composition, the characters of the entire sensitive character string 36 remain visible during its composition. The character string 36 is only concealed on completion of its composition, which can be indicated to the device 10 by the user in a number of ways, for example the user does not press any key for a configurable short period of time (for example 3 seconds) or the user moves focus away from the input field 32 in question (for example by moving the cursor 34 to another input field or control object).

Referring now to Figure 3B, following concealment of the character string 36, the user may reveal the concealed character string 36 by performing an additional action within an aflotted period of time (for example 60 seconds).
Examples of additional actions include, for example, the user attempting to add an additional character to the character string 36 already entered or the user returning focus to the input field 32 and positioning the cursor 34 left or right of the concealed characters. Referring now to Figure 3C, at this point the concealed character string 36 is revealed and user is free to move the cursor 34 to the position where it is wished to make the changes.

In order to protect the sensitive character string 34, in the event the user fails to reveal the concealed character string 36 within the allotted period of time, the concealed character string remains so, even if the user attempts to add an additional character to the string or returns focus to the input field 32.

The described method also foresees a number of other features which may prove opportune in a given implementation. For example, if the input field 34 is for entering a password and the password entered into input field 34 is used successfully, the input field becomes non-editable. Additionally, and referring to Figure 3D, if the user returns focus to the input field 32, the entire concealed character string 34 is selected and the cursor is not displayed. Referring to Figure 3E, attempted entry of characters into the input field 32 at this point results in the concealed character string 36 being erased. Additionally, in order to provide the user with an indication of the current status of the input field, an indicator 40 as to the entry mode currently active for the input field 32 may be provided for. Furthermore, as many of the parameters used in support of the method as described herein are configurable, a specific entry mode to the input field 34, for example in order to provide the user with a familiar context over time for entry of sensitive data such as passwords, can be a pre-configured default or can be based on a user's previous configuration.
Although the present invention has been described hereinabove by way of an illustrative embodiment thereof, this embodiment can be modified at will, within the scope of the present invention, without departing from the spirit and nature of the subject of the present invention.

Claims (14)

1. A method for displaying characters on a device comprising a display and a keypad, the method comprising the steps of:
composing a series of characters using the keypad, said series of characters forming a character string;
displaying said character string on the display;
completing composition of said character string; and concealing said character string completion of composition.
2. The method of Claim 1, wherein the keypad comprises twelve numeric keys and each character of said series of characters is composed by actuating a particular one of said numeric keys a predetermined number of times, a delay between successive actuations being less than a predetermined limit.
3. The method of Claim 2, wherein said predetermined limit is one (1) second.
4. The method of Claim 1, wherein each character of said character string is displayed immediately following its composition.
5. The method of Claim 1, wherein the display comprises an input field and said character string is displayed in said input field.
6. The method of Claim 5, wherein said input field is a text edit field.
7. The method of Claim 5, wherein said composition completing step comprises moving a focus away from said input field.
8 8. The method of Claim 7, further comprising the step of, following said concealing step, of revealing said character string when said focus is moved to said input field within an allotted period of time.
9. The method of Claim 8, wherein said allotted period of time is 60 seconds.
10. The method of Claim 1, wherein said composition completing step comprises ceasing character composition during a predetermined period of time.
11. The method of Claim 10, wherein predetermined period of time is 3 seconds.
12. The method of Claim 1, wherein said concealing step comprises masking each character of said character string using a wildcard.
13. The method of Claim 12, wherein said wildcard is an asterisk.
14. The method of Claim 1, wherein said character string is a password and further comprising the step of
CA 2526818 2005-11-14 2005-11-14 Method for context sensitive concealment of an input field Abandoned CA2526818A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
CA 2526818 CA2526818A1 (en) 2005-11-14 2005-11-14 Method for context sensitive concealment of an input field
CA2627172A CA2627172C (en) 2005-11-14 2006-11-14 Context sensitive concealment of an input field
EP06846909A EP1955131A4 (en) 2005-11-14 2006-11-14 Context sensitive concealment of an input field
CNA200680042276XA CN101305336A (en) 2005-11-14 2006-11-14 Context sensitive concealment of an input field
US12/093,606 US10354097B2 (en) 2005-11-14 2006-11-14 Context sensitive concealment of an input field
PCT/CA2006/001850 WO2007068082A1 (en) 2005-11-14 2006-11-14 Context sensitive concealment of an input field
JP2008539202A JP5150505B2 (en) 2005-11-14 2006-11-14 Electronic communication apparatus and character input processing method in the apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2526818 CA2526818A1 (en) 2005-11-14 2005-11-14 Method for context sensitive concealment of an input field

Publications (1)

Publication Number Publication Date
CA2526818A1 true CA2526818A1 (en) 2007-05-14

Family

ID=38051413

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2526818 Abandoned CA2526818A1 (en) 2005-11-14 2005-11-14 Method for context sensitive concealment of an input field

Country Status (2)

Country Link
CN (1) CN101305336A (en)
CA (1) CA2526818A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2701038A1 (en) * 2011-09-06 2014-02-26 Tencent Technology (Shenzhen) Co., Ltd Password input method and device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102945336B (en) * 2012-10-24 2016-02-03 广东欧珀移动通信有限公司 A kind of cipher-code input method of intelligent communication terminal
CN103034468B (en) * 2012-12-18 2016-02-24 小米科技有限责任公司 A kind of method and device showing text

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2701038A1 (en) * 2011-09-06 2014-02-26 Tencent Technology (Shenzhen) Co., Ltd Password input method and device
EP2701038A4 (en) * 2011-09-06 2015-04-29 Tencent Tech Shenzhen Co Ltd Password input method and device

Also Published As

Publication number Publication date
CN101305336A (en) 2008-11-12

Similar Documents

Publication Publication Date Title
US10354097B2 (en) Context sensitive concealment of an input field
US20200192568A1 (en) Touch screen electronic device and associated user interface
US7984381B2 (en) User interface
US8042042B2 (en) Touch screen-based document editing device and method
US20130132899A1 (en) Menu for a mobile communication device
US20070238488A1 (en) Primary actions menu for a mobile communication device
EP4231774A1 (en) Contextual search by a mobile communications device
US20070234235A1 (en) Activities/applications menu for a mobile communication device
EP1980953B1 (en) Character input device
WO2010030680A1 (en) Method, system, and apparatus for secure data editing
US7423556B2 (en) Method and device for key input in mobile terminal
EP1770482B1 (en) Apparatus with multiple highlights
JP5762850B2 (en) Mobile terminal device
US20130232446A1 (en) Electronic device and method for unlocking electronic device
CA2526818A1 (en) Method for context sensitive concealment of an input field
US20120019471A1 (en) Entering information into a communications device
CN113434226A (en) Communication method, communication device, electronic equipment and readable storage medium
US20140129933A1 (en) User interface for input functions
CN1795661B (en) Apparatus for and method of inputting alphabets using a reduced keypad
CN101394629A (en) Color differentiating a portion of a text message shown in a listing on a handheld communication device
CA2583091A1 (en) Primary actions menu for a mobile communication device
CA2656328C (en) System and method for differentiating between incoming and outgoing messages and identifying correspondents in a tty communication
US20220129146A1 (en) Method for controlling a computer device for entering a personal code
JP6153563B2 (en) Mobile terminal device
JP2011107803A (en) Information processor

Legal Events

Date Code Title Description
FZDE Dead