Background technology
As known in the art, inputting aphanumeric characters is usually directed to press a plurality of keys (combination keystroke (chording)) or repeatedly knocks (a startups) key (multitap) on the device that is equipped with standard ten two (12) key mobile device keypads, in order to selection or constitute given alphanumeric character.Those skilled in the art are to be understood that, for the multitap method, provide short delay (below be called " constituting overtime (composition timeout) "), in this short timing period, if press same key, then substitute the alphanumeric character that shows by character late.Constitute overtime quite shortly usually, for example be approximately one second.Failing to knock the character that causes current demonstration at the formation time-out period on same key is obtained and is fixed on the display by described device.
In the many application that relate to the sensitive data of input such as password, shielding or in other words hiding input field make actual input keep invisible during importing, and have forbidden that effectively other people read the ability of sensitive data from the input field.Provide therein in the traditional environment of complete keyboard, suchly hide normally enough and throw into question hardly (however, will see that as following this also has shortcoming).Yet, in the system that uses the multitap method, wherein need the visible feedback of specified quantitative to guarantee to key in correct character, the hiding fully input that proves problematic and cause many mistakes usually of the character of current consideration, when not being concentrating on fully on hand of task during user's notice is imported, situation is especially true.When input during password, this can prove special poor efficiency because many systems than the incorrect input back denied access of peanut to prevent by powerful, trial and error method discovery password.
Below provided and be used for during multitap input, hiding character and an even example of the art methods of whole input field.Along with character is configured, make them to know that textual form to the user as seen.For example, in order to constitute character " c ", the user knocks bond number word 2 three times, at first shows character " a ", then is " b " and reach " c " when knocking for the third time.Obtained this character in case constituted character and the device of wishing, hidden or shield shown character by using asterisk wildcard such as for example asterisk to replace this character.Yet in case hidden character by this way, the user can't see this character once more so usually.In addition, and it will be understood to those of skill in the art that the user can't see any one (or all) (because they are usually again with asterisk conductively-closed) of these characters usually along with other character is transfused to and is hidden by this way.
In addition, because multiple input pattern is present in (for example little WriteMode, big WriteMode, pattern of symbol, figure pattern, header size WriteMode etc. on many mobile hand-held devices, it can for example select the user interactions of the selective listing of generation to switch by having by soft key), when device in fact is in the different mode, the user is that do not expect or the unwanted character of input often, because they think that device is in a kind of AD HOC.For example, in the header size WriteMode, wherein first character in the character string is capitalized, and the user may import " Password " rather than " password " easily and can not notice this point.Because password case sensitive normally, this may cause the password input error that enlarges.When not showing the indicator of pattern of current startup significantly when the user imports the conductively-closed data, it is complicated more that this shortcoming may become.For example, present mode indicator (supposing that it fully as seen) may (for example be set at the corner of screen) away from the input field and outside user's attention dimensions.
Similarly shortcoming also appears in the more conventional device, and described device comprises the full keyboard (for example qwerty keyboard) that combines single keystroke input method.As mentioned above, in these cases, the character that is transfused to is sightless fully and is replaced by asterisk immediately usually.Because the particularly inferior quality of some keypad and their small size on hand-held device, depress key error, once press two keys or press the possibility of same key for twice may be quite high (meaning about it to have the example of incorrect sequence input to take place with desired frequency not).In addition, can be defaulted to such as the feature of initial caps (or " header mode ") in addition some full keyboard devices on.
Embodiment
With reference now to Fig. 1,, the mobile device that uses Reference numeral 10 indications usually will be described now.In some instances, mobile device 10 is the two-way devices that have data and may also have voice communication capability.In example embodiment, device 10 has and other devices and the ability that exchanges messages of communication system on the Internet.Depend on the function that device 10 provides, in different embodiment, device can be data communication equipment (DCE) especially, be configured to and be used for the two multi-modal communications device, mobile phone, PDA(Personal Digital Assistant) of data and voice communication.
Device 10 comprises alternatively be used to make it possible to the radio communication subsystem 11 that communicates on the one or more communication network that comprise cellular-type wide-area, wireless network for example and/or WLAN (wireless local area network) (LAN).Device 10 also comprises the microprocessor 12 of the integrated operation of controlling described device.This microprocessor 12 interacts with communication subsystem 11 and also interacts with other device subsystem, described other device subsystem for example flash memory 14, random access storage device (RAM) 16, present the display 18 of a screen or a plurality of screens on it and the input media that in the user input apparatus 20 of keyboard or keypad, auxiliary screen such as touch-screen, mini operating rod, touch pad (touchpad) or thumb wheel, navigates.In certain embodiments, device 10 can comprise and being used for by fixed link, for example passes through USB link or ethernet link (not shown), the communication subsystem of communicating by letter with network equipment.
In an example embodiment, operating system software 22 and be stored in the long-time memory or similar memory element such as flash memory 14 by each software application that microprocessor 12 uses.It will be appreciated by those skilled in the art that operating system 22, other software applications 24 or its part can be written into the volatile memory such as RAM 16 provisionally.
Except its operation system function, microprocessor 12 can allow the software application on the actuating unit.For example, one group of predetermined software application program (comprising data and voice communication application) of control basic device operations generally will be installed on the device 10.
Figure 1B illustrates one of possible example of mobile device 10.Although the device that illustrates is the upset types of devices, the shell of mobile device 10 does not influence the present invention.In some instances, mobile device 10 will have single shell, perhaps for example have the shell that comprises two slippers.
The example mobile device 10 that is shown among Figure 1B comprises one group of device key 20, it schematically comprises ten two (12) keys, numeric keypad 25 and additional function keypad 26, and described additional function keypad 26 for example comprises around four-way navigation key 28, soft key, utility key, editor and clear key, the, ﹠amp of center selection 30; End key, multimedia key or the like.
Still with particular reference to Figure 1B, the mobile device 10 that illustrates additionally is equipped with display 18, such as for example active matrix color monitor, on this display, can present screen being used to show the data of local storage, be provided with etc. and webpage, Email etc. such as contact list, call log, configuration.As known in the art, display 18 provides mutual and display capabilities with the related software that comprises operating system 22, and described ability allows the user with device 10 and via carrying out alternately such as the communication link of the webserver, e-mail server etc. and other devices of device 10 interconnection.Display 18 supports usually to comprise that the format of screen of the various forms of information of text string 31, figure/photo 32 and icon 34 represents.In addition, usually with being shown such as for example one or more controlling object of button 36, choice box 38, sliding shoe (not shown) and edit box 40, described controlling object allows the user to operate shown information or in other words carries out alternately with this information information.Usually, control cursor 42 by for example using four-way navigation key 28, the user can move (moving focal point (shift focus)) between controlling object, and carries out alternately with controlling object, and between the screen of the screen of current application and Another application moving focal point.
Still with reference to Figure 1B, during edit box (or input field) in the user has moved to as 40, the user can use for example ten two (12) bond number word keypads 25 and above-described multitap characters input method to import data such as alphanumeric character.
With reference now to Fig. 2 A, to 2C and with reference to content described above, a kind of exemplary art methods that is used to input responsive character string (for example password) comprises: along with character is configured, make them to know that textual form to the user as seen.In case the character of wishing is configured and is obtained by device, so by using the asterisk alternatives to hide character.For example, in Fig. 2 A, by using the multitap method that character " d " has been added in the character string 44 of input field 40 by a numerical key " 3 " (Reference numeral 46 among Figure 1B).
With reference now to Fig. 2 B,, after short delay (as previously mentioned, this can for example be 1 second), obtains character and use asterisk to hide this character.The character that this exemplary art methods allows user's deletion to obtain and hidden.Can for example use backspace key to come backspace, for example, carry out this point by backspace on character.As another example, can cursor be fallen back on the character that will delete, depress space bar subsequently by the left button that uses navigation key 28, carry out this point.In addition, and with reference now to Fig. 2 C, this exemplary art methods also allows by a left side of using navigation key 28 or the position that right button changes cursor, and any point in character string 44 inserts additional character, yet other characters keep being hidden by asterisk.
The exemplary art methods that is used to import responsive character string has been described.Fig. 3 A-3E illustrates the method (will describe the more general description of method that is used to show sensitive data according to example embodiment after a while) that is used to show sensitive data according at least one example embodiment.With reference now to Fig. 3 A,, the user is for example to use ten two (12) bond number word keypads 25 and above-described multitap characters input method and import responsive character string 44 and to begin.
Yet as seen the character of whole responsive character string 44 keeps during it constitutes, rather than covers each character after the formation of each character immediately.Character string 44 is only after the finishing of its formation or be hidden after the inertia incident, the user can be in a plurality of modes to device 10 these inertia incidents of indication, and for example the user does not depress any key in (for example 3 seconds) during the configurable short time or the user moves away focus (for example by activating navigation key 28 cursor 42 being moved to another input field or controlling object) from the input field 40 of current consideration.
With reference now to Fig. 3 B,, after covering or shield character string 44, the user can represent the character string of covering 44 by carrying out additional move, and this additional move causes life event in the time durations that is distributed (for example 60 seconds).The example of additional move comprises that for example the user attempts adding to additional character in the character string of having imported 44 or the user goes back to focus input field 40 and makes cursor 42 be positioned at the left side or the right of hiding character by the right side or the left button that for example activates navigation key 28.With reference now to Fig. 3 C,, here, showed that the character string 44 hidden and user can freely move to cursor 42 and will expect the position that changes.
In some instances, when the user fails to represent the character string 44 of covering or shielding in the time durations that is distributed, this character string of covering or shielding becomes forever hiding and keeps going back to input field 40 even the user attempts adding additional character to character string or with focus like this.This can provide supplementary protection for preventing that responsive character 42 is compromised.
Described method has also been predicted a plurality of other features, and described feature can prove in given realization and suit.For example, if the password that input field 40 is used for inputing password and is input to input field 40 is successfully used, perhaps the user selects to preserve the password of input, and so for example the input field becomes and can not edit (promptly locked) and for good and all hidden.In addition and with reference to figure 3D, if the user returns focus to input field 40, the selected and display highlighting not of so whole hiding character string 42.Yet it should be noted that, in specific implementation, may have many examples, when wherein for example on cursor is being presented on current screen on the display, going round, maybe when visit sub-screen when (child screen), in case focus 40 is removed that input field 40 becomes and can not edit with can not cause focus to turn back to input field 40 time from the input field.
With reference now to Fig. 3 E,, to attempt input character here to the input field 40, or press delete key, the character string 44 that causes hiding is wiped free of.In addition, for the indication of the current state of input field is provided to the user, can provide about input pattern for input field 40 current effective indicators 47.(in the example shown in this, as indicated by the letter " abc " of lower case, input pattern is a small letter multitap pattern).In addition, owing to be used to support that many parameters of method described herein are configurable, for example in order to provide familiar environment being used to input the sensitive data such as password to the user in time, the specific input pattern of input field 40 can be by the prewired default value or can be based on user's previous configuration of being changed to.
Should be appreciated that in this mention (or shown in the drawings) and should not be counted as being intended to limit the scope of the invention some specific detail of illustrated examples.For example, although the responsive character string that Fig. 2 A shows to Fig. 3 E to 2C and Fig. 3 A in the application (e-mail applications) of a particular type is hidden or shielding the application that is not limited to any particular type or classification according to the software and the method for example embodiment.Some examples of hiding contingent application of wherein responsive character string and system comprise the application and the system of each type of handling/relating to finance data, contact/telephone number details, media file, document, sending and receiving message etc.
With reference now to Fig. 4,, wherein shows representative is used to show the process 100 of sensitive data according to example embodiment process flow diagram.Can be at least by security component 102 (Figure 1A) implementation procedure 100 partly, this security component 102 for example is a part of using the program 104 that is realized by microprocessor 12 under the instruction of one of 24 computer code at Secure Application 106, operating system 22 or other in example embodiment.To those skilled in the art, various alternatives are tangible.For example, all or part of of the function of security component 102 can alternatively be embodied as the independent utility of being called by program 104.
In the
process 100 that illustrates, whether the user that
process 100 is made
device 10 judgement of input character (judging 114).As previously mentioned, in at least one example, considered wherein can input character many different possible mode, device users by once or the number of times of more predetermined numbers (if the expectation letter is relevant with the certain number keyboard second or preface letter for the third time, then more than once) carry out input operation and constitute character installing a certain number keyboard on 10.In at least one other example, wherein install 10 and comprise full keyboard (some blueberries for example
Model), device users constitutes character by the input operation of installing key corresponding with that character on 10 the keyboard.It will be appreciated by those skilled in the art that and depend on that
process 100 is implemented in
specific device 10 wherein, have other by way of example of character input.
If imported character, be presented in the responsive character string part of responsive character string (and as) (in some instances, responsive character string is a password string) at the characters of 116 inputs.Shown in the example that formerly illustrates and describe, for example responsive character string can be presented in the input field that is shown on the device 10.In this stage of process 100, responsive character string (comprising the character of having imported) with text clearly as seen.
At judgement 118 places that follow 116 (and "No" branches of judging 114), process 100 is made and whether is detected inactive judgement.Consider to be used for to indicate inactive a plurality of incidents any one or a plurality of.Give an example, when not pressing the key of device 10 in during the short time (schematically at least three (3) seconds), can indicate inertia.Give an example again, when focus when another part of screen is shifted in responsive character string input field, can indicate inertia.
If detect inertia, hide responsive character string 120 so.Subsequently,,, press key in for example during the short time or focus is retracted responsive character string input field,, represent about 60 (60) seconds inherences and to show responsive character string in the character string 124 so as seeing following if detect activity once more 122.If do not detect activity (judging 122 "No" branch), in decision box 126, can detect finishing of formation incident so.Do not finish if detect the formation incident, so responsive character string keeps hiding.Yet, if finishing incident, formation takes place, responsive character string is forever hidden in 128 so.
In this, press the most last key or the process inertia that become certainly and begin, when the termination that special time postpones, can provide to constitute the incident of finishing.Alternatively, can be for example by select suitable button or the like via representative of consumer, finish the sure indication that character string constitutes and provide process to finish incident.In addition, constitute the incident of finishing for example can occur in by switch to Another application or process with focus when current screen is shifted to another screen.
As previously mentioned, asterisk wildcard (such as for example asterisk) is used for hiding responsive character string usually; Yet it will be understood by those skilled in the art that and have other modes of hiding responsive character string.For example, whole responsive character string input field can be hidden (disappearing from display).
The description of example embodiment of the present invention of the present disclosure is not restricted to implementation any certain computer programming language or system architecture.Embodiments of the invention are not limited to any specific operation system, mobile device architecture or computer programming language.Can carry out specific adjusted and modification to described embodiment.Therefore, think that the foregoing description is illustrative and not restrictive.