CN101305336A - Context sensitive concealment of an input field - Google Patents

Context sensitive concealment of an input field Download PDF

Info

Publication number
CN101305336A
CN101305336A CNA200680042276XA CN200680042276A CN101305336A CN 101305336 A CN101305336 A CN 101305336A CN A200680042276X A CNA200680042276X A CN A200680042276XA CN 200680042276 A CN200680042276 A CN 200680042276A CN 101305336 A CN101305336 A CN 101305336A
Authority
CN
China
Prior art keywords
cycle
character string
character
incident
inertia
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200680042276XA
Other languages
Chinese (zh)
Inventor
N·格里戈里夫
H·托克尔森
N·杰哈维里
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oz Technology Services Inc
Nokia Oyj
Original Assignee
Oz Communications Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oz Communications Inc filed Critical Oz Communications Inc
Publication of CN101305336A publication Critical patent/CN101305336A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

A method for concealing and revealing sensitive data on an electronic communications device is disclosed. The electronic communications device comprises a plurality of keys, a display upon which a series of characters are adapted to be displayed, the series of characters forming a character string and composed by input operation of a subset of the plurality of Keys, and a processor for implementing at least one module that includes at least one security component. The module i) receives the series of characters during an entry period, the series of characters forming a character string, the entry period comprised of at least one activity period during which the character string is displayed and one inactivity period during which the character string is obscured, ii) detects an inactivity event during the at least one activity period, the activity period ending when the inactivity event has been detected and iii) detects an activity event during the at least one inactivity period, the inactivity period ending when the activity event has been detected. The module may also iv) detect a completion of composition event, the entry period ending when the composition completion event has been detected and v) conceal permanently the character string after the entry period ends.

Description

The context-sensitive of input field is hidden
Technical field
The disclosure relates to the method that the context-sensitive that is used for the input field is hidden, and relates to especially and be used for hiding and representing the particularly method of the sensitive data on mobile device.
Background technology
As known in the art, inputting aphanumeric characters is usually directed to press a plurality of keys (combination keystroke (chording)) or repeatedly knocks (a startups) key (multitap) on the device that is equipped with standard ten two (12) key mobile device keypads, in order to selection or constitute given alphanumeric character.Those skilled in the art are to be understood that, for the multitap method, provide short delay (below be called " constituting overtime (composition timeout) "), in this short timing period, if press same key, then substitute the alphanumeric character that shows by character late.Constitute overtime quite shortly usually, for example be approximately one second.Failing to knock the character that causes current demonstration at the formation time-out period on same key is obtained and is fixed on the display by described device.
In the many application that relate to the sensitive data of input such as password, shielding or in other words hiding input field make actual input keep invisible during importing, and have forbidden that effectively other people read the ability of sensitive data from the input field.Provide therein in the traditional environment of complete keyboard, suchly hide normally enough and throw into question hardly (however, will see that as following this also has shortcoming).Yet, in the system that uses the multitap method, wherein need the visible feedback of specified quantitative to guarantee to key in correct character, the hiding fully input that proves problematic and cause many mistakes usually of the character of current consideration, when not being concentrating on fully on hand of task during user's notice is imported, situation is especially true.When input during password, this can prove special poor efficiency because many systems than the incorrect input back denied access of peanut to prevent by powerful, trial and error method discovery password.
Below provided and be used for during multitap input, hiding character and an even example of the art methods of whole input field.Along with character is configured, make them to know that textual form to the user as seen.For example, in order to constitute character " c ", the user knocks bond number word 2 three times, at first shows character " a ", then is " b " and reach " c " when knocking for the third time.Obtained this character in case constituted character and the device of wishing, hidden or shield shown character by using asterisk wildcard such as for example asterisk to replace this character.Yet in case hidden character by this way, the user can't see this character once more so usually.In addition, and it will be understood to those of skill in the art that the user can't see any one (or all) (because they are usually again with asterisk conductively-closed) of these characters usually along with other character is transfused to and is hidden by this way.
In addition, because multiple input pattern is present in (for example little WriteMode, big WriteMode, pattern of symbol, figure pattern, header size WriteMode etc. on many mobile hand-held devices, it can for example select the user interactions of the selective listing of generation to switch by having by soft key), when device in fact is in the different mode, the user is that do not expect or the unwanted character of input often, because they think that device is in a kind of AD HOC.For example, in the header size WriteMode, wherein first character in the character string is capitalized, and the user may import " Password " rather than " password " easily and can not notice this point.Because password case sensitive normally, this may cause the password input error that enlarges.When not showing the indicator of pattern of current startup significantly when the user imports the conductively-closed data, it is complicated more that this shortcoming may become.For example, present mode indicator (supposing that it fully as seen) may (for example be set at the corner of screen) away from the input field and outside user's attention dimensions.
Similarly shortcoming also appears in the more conventional device, and described device comprises the full keyboard (for example qwerty keyboard) that combines single keystroke input method.As mentioned above, in these cases, the character that is transfused to is sightless fully and is replaced by asterisk immediately usually.Because the particularly inferior quality of some keypad and their small size on hand-held device, depress key error, once press two keys or press the possibility of same key for twice may be quite high (meaning about it to have the example of incorrect sequence input to take place with desired frequency not).In addition, can be defaulted to such as the feature of initial caps (or " header mode ") in addition some full keyboard devices on.
Summary of the invention
According to one example embodiment, the method of character series shown on the screen on the display that is presented in mobile device being carried out beholder restriction is provided, has constituted described character series by the subclass of a plurality of keys of mobile device is carried out input operation.This method comprises following action: receive character series during the input cycle, character series forms character string, the described input cycle comprises at least one cycle of activity and an inertia cycle, during described cycle of activity, show described character string, during the described inertia cycle, cover (obscure) described character string; Detect the inertia incident during described at least one cycle of activity, when detecting described inertia incident, finish described cycle of activity; And during described at least one inertia cycle the detected activity incident, when detecting described life event, described inertia end cycle.
Equally, provide a kind of goods that comprise at least one computer-readable medium, this at least one computer-readable medium stores can be used in the computer code of the action of satisfying said method.
Also provide and comprised a plurality of keys, display and the screen that is presented on the display, the electronic communication device of processor, character series is suitable for being presented on the described display, character series forms character string and constitutes by the input operation to the subclass of described a plurality of keys, processor is used to carry out at least one module that comprises at least one security component, this module is used for i) reception character series during the input cycle, character series forms character string, this input cycle comprises at least one cycle of activity and an inertia cycle, during described cycle of activity, show described character string, during the described inertia cycle, cover described character string; Ii) detect the inertia incident during described at least one cycle of activity, when detecting the inertia incident, finish this cycle of activity; And iii) detected activity incident during described at least one inertia cycle, when detecting life event, this inertia end cycle.
Description of drawings
Now will be with reference to the accompanying drawings by by way of example:
Figure 1A shows the block diagram that example embodiment can be applied to the mobile device on it;
Figure 1B is the front view (FV) of example of the mobile device of Figure 1A;
Fig. 2 A to Fig. 2 C illustrates the exemplary screen shots (screenshot) of display of the device of Figure 1B, and described screenshot capture illustrates the method that is used to show sensitive data according to prior art;
Fig. 3 A to Fig. 3 E illustrates the exemplary screen shots of display of the device of Figure 1B, and described screenshot capture illustrates the method that is used to show sensitive data according to example embodiment; And
Fig. 4 illustrates the method that is used to show sensitive data according to example embodiment with the process flow diagram form.
In different figure, may use similar or same reference numerals is indicated similar compound.
Embodiment
With reference now to Fig. 1,, the mobile device that uses Reference numeral 10 indications usually will be described now.In some instances, mobile device 10 is the two-way devices that have data and may also have voice communication capability.In example embodiment, device 10 has and other devices and the ability that exchanges messages of communication system on the Internet.Depend on the function that device 10 provides, in different embodiment, device can be data communication equipment (DCE) especially, be configured to and be used for the two multi-modal communications device, mobile phone, PDA(Personal Digital Assistant) of data and voice communication.
Device 10 comprises alternatively be used to make it possible to the radio communication subsystem 11 that communicates on the one or more communication network that comprise cellular-type wide-area, wireless network for example and/or WLAN (wireless local area network) (LAN).Device 10 also comprises the microprocessor 12 of the integrated operation of controlling described device.This microprocessor 12 interacts with communication subsystem 11 and also interacts with other device subsystem, described other device subsystem for example flash memory 14, random access storage device (RAM) 16, present the display 18 of a screen or a plurality of screens on it and the input media that in the user input apparatus 20 of keyboard or keypad, auxiliary screen such as touch-screen, mini operating rod, touch pad (touchpad) or thumb wheel, navigates.In certain embodiments, device 10 can comprise and being used for by fixed link, for example passes through USB link or ethernet link (not shown), the communication subsystem of communicating by letter with network equipment.
In an example embodiment, operating system software 22 and be stored in the long-time memory or similar memory element such as flash memory 14 by each software application that microprocessor 12 uses.It will be appreciated by those skilled in the art that operating system 22, other software applications 24 or its part can be written into the volatile memory such as RAM 16 provisionally.
Except its operation system function, microprocessor 12 can allow the software application on the actuating unit.For example, one group of predetermined software application program (comprising data and voice communication application) of control basic device operations generally will be installed on the device 10.
Figure 1B illustrates one of possible example of mobile device 10.Although the device that illustrates is the upset types of devices, the shell of mobile device 10 does not influence the present invention.In some instances, mobile device 10 will have single shell, perhaps for example have the shell that comprises two slippers.
The example mobile device 10 that is shown among Figure 1B comprises one group of device key 20, it schematically comprises ten two (12) keys, numeric keypad 25 and additional function keypad 26, and described additional function keypad 26 for example comprises around four-way navigation key 28, soft key, utility key, editor and clear key, the, ﹠amp of center selection 30; End key, multimedia key or the like.
Still with particular reference to Figure 1B, the mobile device 10 that illustrates additionally is equipped with display 18, such as for example active matrix color monitor, on this display, can present screen being used to show the data of local storage, be provided with etc. and webpage, Email etc. such as contact list, call log, configuration.As known in the art, display 18 provides mutual and display capabilities with the related software that comprises operating system 22, and described ability allows the user with device 10 and via carrying out alternately such as the communication link of the webserver, e-mail server etc. and other devices of device 10 interconnection.Display 18 supports usually to comprise that the format of screen of the various forms of information of text string 31, figure/photo 32 and icon 34 represents.In addition, usually with being shown such as for example one or more controlling object of button 36, choice box 38, sliding shoe (not shown) and edit box 40, described controlling object allows the user to operate shown information or in other words carries out alternately with this information information.Usually, control cursor 42 by for example using four-way navigation key 28, the user can move (moving focal point (shift focus)) between controlling object, and carries out alternately with controlling object, and between the screen of the screen of current application and Another application moving focal point.
Still with reference to Figure 1B, during edit box (or input field) in the user has moved to as 40, the user can use for example ten two (12) bond number word keypads 25 and above-described multitap characters input method to import data such as alphanumeric character.
With reference now to Fig. 2 A, to 2C and with reference to content described above, a kind of exemplary art methods that is used to input responsive character string (for example password) comprises: along with character is configured, make them to know that textual form to the user as seen.In case the character of wishing is configured and is obtained by device, so by using the asterisk alternatives to hide character.For example, in Fig. 2 A, by using the multitap method that character " d " has been added in the character string 44 of input field 40 by a numerical key " 3 " (Reference numeral 46 among Figure 1B).
With reference now to Fig. 2 B,, after short delay (as previously mentioned, this can for example be 1 second), obtains character and use asterisk to hide this character.The character that this exemplary art methods allows user's deletion to obtain and hidden.Can for example use backspace key to come backspace, for example, carry out this point by backspace on character.As another example, can cursor be fallen back on the character that will delete, depress space bar subsequently by the left button that uses navigation key 28, carry out this point.In addition, and with reference now to Fig. 2 C, this exemplary art methods also allows by a left side of using navigation key 28 or the position that right button changes cursor, and any point in character string 44 inserts additional character, yet other characters keep being hidden by asterisk.
The exemplary art methods that is used to import responsive character string has been described.Fig. 3 A-3E illustrates the method (will describe the more general description of method that is used to show sensitive data according to example embodiment after a while) that is used to show sensitive data according at least one example embodiment.With reference now to Fig. 3 A,, the user is for example to use ten two (12) bond number word keypads 25 and above-described multitap characters input method and import responsive character string 44 and to begin.
Yet as seen the character of whole responsive character string 44 keeps during it constitutes, rather than covers each character after the formation of each character immediately.Character string 44 is only after the finishing of its formation or be hidden after the inertia incident, the user can be in a plurality of modes to device 10 these inertia incidents of indication, and for example the user does not depress any key in (for example 3 seconds) during the configurable short time or the user moves away focus (for example by activating navigation key 28 cursor 42 being moved to another input field or controlling object) from the input field 40 of current consideration.
With reference now to Fig. 3 B,, after covering or shield character string 44, the user can represent the character string of covering 44 by carrying out additional move, and this additional move causes life event in the time durations that is distributed (for example 60 seconds).The example of additional move comprises that for example the user attempts adding to additional character in the character string of having imported 44 or the user goes back to focus input field 40 and makes cursor 42 be positioned at the left side or the right of hiding character by the right side or the left button that for example activates navigation key 28.With reference now to Fig. 3 C,, here, showed that the character string 44 hidden and user can freely move to cursor 42 and will expect the position that changes.
In some instances, when the user fails to represent the character string 44 of covering or shielding in the time durations that is distributed, this character string of covering or shielding becomes forever hiding and keeps going back to input field 40 even the user attempts adding additional character to character string or with focus like this.This can provide supplementary protection for preventing that responsive character 42 is compromised.
Described method has also been predicted a plurality of other features, and described feature can prove in given realization and suit.For example, if the password that input field 40 is used for inputing password and is input to input field 40 is successfully used, perhaps the user selects to preserve the password of input, and so for example the input field becomes and can not edit (promptly locked) and for good and all hidden.In addition and with reference to figure 3D, if the user returns focus to input field 40, the selected and display highlighting not of so whole hiding character string 42.Yet it should be noted that, in specific implementation, may have many examples, when wherein for example on cursor is being presented on current screen on the display, going round, maybe when visit sub-screen when (child screen), in case focus 40 is removed that input field 40 becomes and can not edit with can not cause focus to turn back to input field 40 time from the input field.
With reference now to Fig. 3 E,, to attempt input character here to the input field 40, or press delete key, the character string 44 that causes hiding is wiped free of.In addition, for the indication of the current state of input field is provided to the user, can provide about input pattern for input field 40 current effective indicators 47.(in the example shown in this, as indicated by the letter " abc " of lower case, input pattern is a small letter multitap pattern).In addition, owing to be used to support that many parameters of method described herein are configurable, for example in order to provide familiar environment being used to input the sensitive data such as password to the user in time, the specific input pattern of input field 40 can be by the prewired default value or can be based on user's previous configuration of being changed to.
Should be appreciated that in this mention (or shown in the drawings) and should not be counted as being intended to limit the scope of the invention some specific detail of illustrated examples.For example, although the responsive character string that Fig. 2 A shows to Fig. 3 E to 2C and Fig. 3 A in the application (e-mail applications) of a particular type is hidden or shielding the application that is not limited to any particular type or classification according to the software and the method for example embodiment.Some examples of hiding contingent application of wherein responsive character string and system comprise the application and the system of each type of handling/relating to finance data, contact/telephone number details, media file, document, sending and receiving message etc.
With reference now to Fig. 4,, wherein shows representative is used to show the process 100 of sensitive data according to example embodiment process flow diagram.Can be at least by security component 102 (Figure 1A) implementation procedure 100 partly, this security component 102 for example is a part of using the program 104 that is realized by microprocessor 12 under the instruction of one of 24 computer code at Secure Application 106, operating system 22 or other in example embodiment.To those skilled in the art, various alternatives are tangible.For example, all or part of of the function of security component 102 can alternatively be embodied as the independent utility of being called by program 104.
In the process 100 that illustrates, whether the user that process 100 is made device 10 judgement of input character (judging 114).As previously mentioned, in at least one example, considered wherein can input character many different possible mode, device users by once or the number of times of more predetermined numbers (if the expectation letter is relevant with the certain number keyboard second or preface letter for the third time, then more than once) carry out input operation and constitute character installing a certain number keyboard on 10.In at least one other example, wherein install 10 and comprise full keyboard (some blueberries for example
Figure A20068004227600121
Model), device users constitutes character by the input operation of installing key corresponding with that character on 10 the keyboard.It will be appreciated by those skilled in the art that and depend on that process 100 is implemented in specific device 10 wherein, have other by way of example of character input.
If imported character, be presented in the responsive character string part of responsive character string (and as) (in some instances, responsive character string is a password string) at the characters of 116 inputs.Shown in the example that formerly illustrates and describe, for example responsive character string can be presented in the input field that is shown on the device 10.In this stage of process 100, responsive character string (comprising the character of having imported) with text clearly as seen.
At judgement 118 places that follow 116 (and "No" branches of judging 114), process 100 is made and whether is detected inactive judgement.Consider to be used for to indicate inactive a plurality of incidents any one or a plurality of.Give an example, when not pressing the key of device 10 in during the short time (schematically at least three (3) seconds), can indicate inertia.Give an example again, when focus when another part of screen is shifted in responsive character string input field, can indicate inertia.
If detect inertia, hide responsive character string 120 so.Subsequently,,, press key in for example during the short time or focus is retracted responsive character string input field,, represent about 60 (60) seconds inherences and to show responsive character string in the character string 124 so as seeing following if detect activity once more 122.If do not detect activity (judging 122 "No" branch), in decision box 126, can detect finishing of formation incident so.Do not finish if detect the formation incident, so responsive character string keeps hiding.Yet, if finishing incident, formation takes place, responsive character string is forever hidden in 128 so.
In this, press the most last key or the process inertia that become certainly and begin, when the termination that special time postpones, can provide to constitute the incident of finishing.Alternatively, can be for example by select suitable button or the like via representative of consumer, finish the sure indication that character string constitutes and provide process to finish incident.In addition, constitute the incident of finishing for example can occur in by switch to Another application or process with focus when current screen is shifted to another screen.
As previously mentioned, asterisk wildcard (such as for example asterisk) is used for hiding responsive character string usually; Yet it will be understood by those skilled in the art that and have other modes of hiding responsive character string.For example, whole responsive character string input field can be hidden (disappearing from display).
The description of example embodiment of the present invention of the present disclosure is not restricted to implementation any certain computer programming language or system architecture.Embodiments of the invention are not limited to any specific operation system, mobile device architecture or computer programming language.Can carry out specific adjusted and modification to described embodiment.Therefore, think that the foregoing description is illustrative and not restrictive.

Claims (42)

1. method that character series shown on the screen on the display that is presented in mobile device is carried out beholder restriction constitutes described character series by the subclass of a plurality of keys of mobile device is carried out input operation, and this method comprises following action:
During the input cycle, receive character series, character series forms character string, the described input cycle comprises at least one cycle of activity and an inertia cycle, shows described character string during described cycle of activity, covers described character string during the described inertia cycle;
Detect the inertia incident during described at least one cycle of activity, when detecting described inertia incident, finish described cycle of activity; And
Detected activity incident during described at least one inertia cycle, when detecting described life event, described inertia end cycle.
2. the method for claim 1 also comprises action: detect finishing of formation incident, and when detecting described formation and finish incident, described input end cycle; And behind described input end cycle, forever hide described character string.
3. the method for claim 1, wherein said character string is a password.
4. the method for claim 1, wherein said a plurality of key comprises 12 numerical keys and by specific of described numerical key is carried out once or the input operation of more predetermined number of times constitutes each character of character series, the delay between the input operation is less than predetermined restriction continuously.
5. method as claimed in claim 4, wherein said predetermined limit are made as at least one second.
6. the method for claim 1, each character of wherein said character string constitutes the back by instant playback at it.
7. the method for claim 1, wherein display shows that input field and described character string display are in described input field.
8. method as claimed in claim 7, wherein said input field are the text editing districts.
9. method as claimed in claim 7, wherein when the user of device moved apart described input field with focus during described cycle of activity, described inertia incident took place.
10. the method for claim 1, wherein as the user of device during of failing during described cycle of activity in the subclass of the described a plurality of keys of time cycle manipulate that distributed, described inertia incident takes place.
11. method as claimed in claim 10, the wherein said time cycle of distributing is at least 3 seconds.
12. method as claimed in claim 2, wherein when the user of device moved apart screen with focus, described formation was finished incident and is taken place.
13. method as claimed in claim 9, when the user of device retracted described input field with focus during the described input cycle, described life event took place.
14. the method for claim 1, wherein when in the subclass of the described a plurality of keys of described inertia cycle manipulate one of the user of device, described life event takes place.
15. method as claimed in claim 2, wherein when the described inertia cycle surpassed the time cycle of being distributed, described formation was finished incident and is taken place.
16. method as claimed in claim 15, the wherein said time cycle of distributing is at least 60 seconds.
17. method as claimed in claim 2, wherein when the user selected to finish formation, described formation was finished incident and is taken place.
18. method as claimed in claim 2 also comprises action: when after described formation is finished incident, in the time cycle of being distributed, during one of subclass of the described a plurality of keys of operation, rewriteeing described character string.
19. method as claimed in claim 2, wherein said hide actions comprise each character that uses asterisk wildcard to shield described character string.
20. the method for claim 1 is wherein covered described character string by each character that uses asterisk wildcard to shield described character string.
21. as claim 19 or 20 described methods, wherein said asterisk wildcard is an asterisk.
22. goods that comprise at least one computer-readable medium, described at least one computer-readable medium stores can be used in the computer code of the action of any one the described method that satisfies claim 1 to 20.
23. an electronic communication device comprises:
A plurality of keys;
Display;
Be presented in the screen on the described display, character display series on described screen, described character series form character string and constitute by the input operation to the subclass of described a plurality of keys; With
Processor, be used to carry out at least one module that comprises at least one security component, described module is used for: i) receive character series during the input cycle, described character series forms character string, the described input cycle comprises at least one cycle of activity and an inertia cycle, during described cycle of activity, show described character string, during the described inertia cycle, cover described character string; Ii) detect the inertia incident during described at least one cycle of activity, when detecting described inertia incident, finish described cycle of activity; And iii) detected activity incident during described at least one inertia cycle, when detecting described life event, described inertia end cycle.
24. device as claimed in claim 23, wherein said module also is used for: iv) detect finishing of formation incident, and when detecting described formation and finish incident, described input end cycle; And v) forever behind described input end cycle hide described character string.
25. device as claimed in claim 23, wherein said character string is a password.
26. device as claimed in claim 23, wherein said a plurality of key comprises ten two-digit keys and by specific of described numerical key is carried out once or the input operation of more predetermined number of times constitutes each character of described character series, the delay between the input operation is less than predetermined restriction continuously.
27. device as claimed in claim 26, wherein said predetermined limit are made as at least one second.
28. device as claimed in claim 23, each character of wherein said character string constitutes the back by instant playback at it.
29. device as claimed in claim 23, wherein said display are suitable for showing that input field and described character string display are in described input field.
30. device as claimed in claim 29, wherein said input field are the text editing districts.
31. device as claimed in claim 29, wherein when the user of device moved apart described input field with focus during described cycle of activity, described inertia incident took place.
32. device as claimed in claim 24, wherein when the described inertia cycle surpassed the time cycle of being distributed, described formation was finished incident and is taken place.
33. device as claimed in claim 32, the wherein said time cycle of distributing is at least 60 seconds.
34. device as claimed in claim 24, wherein when the user selected to finish formation, described formation was finished incident and is taken place.
35. device as claimed in claim 24, wherein when the user of device moved apart screen with focus, described formation was finished incident and is taken place.
36. device as claimed in claim 31, wherein when the user of device retracted described input field with focus during the described inertia cycle, described life event took place.
37. device as claimed in claim 23, wherein when the user of device constituted with the predetermined period of time stop character during described cycle of activity, described inertia incident took place.
38. device as claimed in claim 37, wherein said predetermined period of time is at least three seconds.
39. device as claimed in claim 23, wherein when in the subclass of the described a plurality of keys of described inertia cycle manipulate one of the user of device, described life event takes place.
40. device as claimed in claim 24, wherein when of the subclass of operating described a plurality of keys after described formation is finished incident, described character string is rewritten.
41. device as claimed in claim 23, wherein said module is covered described character string by each character that uses asterisk wildcard to shield described character string.
42. device as claimed in claim 24, wherein said module is hidden described character string by each character that uses asterisk wildcard to shield described character string.
CNA200680042276XA 2005-11-14 2006-11-14 Context sensitive concealment of an input field Pending CN101305336A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CA2,526,818 2005-11-14
US60/735,810 2005-11-14
CA 2526818 CA2526818A1 (en) 2005-11-14 2005-11-14 Method for context sensitive concealment of an input field

Publications (1)

Publication Number Publication Date
CN101305336A true CN101305336A (en) 2008-11-12

Family

ID=38051413

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200680042276XA Pending CN101305336A (en) 2005-11-14 2006-11-14 Context sensitive concealment of an input field

Country Status (2)

Country Link
CN (1) CN101305336A (en)
CA (1) CA2526818A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102945336A (en) * 2012-10-24 2013-02-27 广东欧珀移动通信有限公司 Password input method on intelligent communication terminal
WO2013034028A1 (en) * 2011-09-06 2013-03-14 腾讯科技(深圳)有限公司 Password input method and device
CN103034468A (en) * 2012-12-18 2013-04-10 北京小米科技有限责任公司 Method and device for displaying text

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013034028A1 (en) * 2011-09-06 2013-03-14 腾讯科技(深圳)有限公司 Password input method and device
CN102981627A (en) * 2011-09-06 2013-03-20 腾讯科技(深圳)有限公司 Password inputting method and password inputting device
CN102981627B (en) * 2011-09-06 2015-04-08 腾讯科技(深圳)有限公司 Password inputting method and password inputting device
CN102945336A (en) * 2012-10-24 2013-02-27 广东欧珀移动通信有限公司 Password input method on intelligent communication terminal
CN102945336B (en) * 2012-10-24 2016-02-03 广东欧珀移动通信有限公司 A kind of cipher-code input method of intelligent communication terminal
CN103034468A (en) * 2012-12-18 2013-04-10 北京小米科技有限责任公司 Method and device for displaying text
CN103034468B (en) * 2012-12-18 2016-02-24 小米科技有限责任公司 A kind of method and device showing text

Also Published As

Publication number Publication date
CA2526818A1 (en) 2007-05-14

Similar Documents

Publication Publication Date Title
US10354097B2 (en) Context sensitive concealment of an input field
US9172789B2 (en) Contextual search by a mobile communications device
US8365282B2 (en) Security system based on input shortcuts for a computer device
CA2813172C (en) Multiple-access-level lock screen
CN102033710B (en) Method for managing file folder and related equipment
JP4814303B2 (en) User interface switching method, electronic apparatus and recording medium using this method
US7984381B2 (en) User interface
CN104834353A (en) Mobile terminal, user interface method in the mobile terminal, and cover of the mobile terminal
US11221756B2 (en) Data entry systems
CN102754071A (en) Apparatus and method having multiple application display modes including mode with display resolution of another apparatus
CN101124808A (en) Method for providing alerts in a mobile device and mobile device therefor
WO2016107462A1 (en) Information input method and device, and smart terminal
CN103019608A (en) Unlocking method of touch screen terminal and touch screen terminal
CN101321337A (en) Mobile communicating device and its operation method
US20130232446A1 (en) Electronic device and method for unlocking electronic device
CN101305336A (en) Context sensitive concealment of an input field
US20220129146A1 (en) Method for controlling a computer device for entering a personal code
CA2637972C (en) Security system based on input shortcuts for a computer device
KR101653102B1 (en) Method for inputting korean/english/number/symbol characters using simplified qwerty software keypad
CN101571784B (en) Electronic device and automatic keyboard-hiding method
JP4884511B2 (en) Character input device and character input method
US20150035756A1 (en) Keypad device for a touch screen and method for providing same
CN110298151A (en) A kind of user logs in unlocking method and device
KR20100005435A (en) Mobile terminal having a function for changing ui and control method thereof
CN103135926A (en) Electronic device and automatic keyboard hiding method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: OZ TECHNOLOGY SERVICES CO., LTD.

Free format text: FORMER OWNER: OZ COMM INC.

Effective date: 20100913

Owner name: NOKIA OY

Free format text: FORMER OWNER: OZ TECHNOLOGY SERVICES CO., LTD.

Effective date: 20100913

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: CANADA TO: ESPOO CITY, FINLAND

TA01 Transfer of patent application right

Effective date of registration: 20100913

Address after: Espoo, Finland

Applicant after: NOKIA Corp.

Address before: Canada

Applicant before: OZ technology services, Inc.

Effective date of registration: 20100913

Address after: Canada

Applicant after: OZ technology services, Inc.

Address before: Quebec

Applicant before: OZ Communications

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20081112