US20080172735A1 - Alternative Key Pad Layout for Enhanced Security - Google Patents
Alternative Key Pad Layout for Enhanced Security Download PDFInfo
- Publication number
- US20080172735A1 US20080172735A1 US12/049,315 US4931508A US2008172735A1 US 20080172735 A1 US20080172735 A1 US 20080172735A1 US 4931508 A US4931508 A US 4931508A US 2008172735 A1 US2008172735 A1 US 2008172735A1
- Authority
- US
- United States
- Prior art keywords
- virtual
- user
- alphanumeric keys
- arrangement
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1033—Details of the PIN pad
- G07F7/1041—PIN input keyboard gets new key allocation at each use
Definitions
- the present invention relates in general to a system and method for providing an alternative key pad layout to increase security.
- Touch screen technology is utilized in a vast array of modern computer applications. These applications include automated teller machines (ATMs), check-in applications at airports, such as those used to print boarding passes, as well as many others. In these applications, the user often has the ability to select from a list of languages so that the information that appears is displayed in a language familiar to the user. In many touch screen applications, a physical keyboard or keypad is replaced with a virtual keyboard or keypad that is displayed on the display. If the user wants to press the one (“1”) key, for example, the user touches a virtual key that appears on the display rather than pressing a physical “1” key on a keyboard or keypad.
- ATMs automated teller machines
- check-in applications at airports such as those used to print boarding passes
- the user often has the ability to select from a list of languages so that the information that appears is displayed in a language familiar to the user.
- a physical keyboard or keypad is replaced with a virtual keyboard or keypad that is displayed on the display. If the user wants to press the
- FIG. 1 shows an Automated Teller Machine (ATM) application commonly used by millions of people everyday.
- ATM Automated Teller Machine
- the user starts by inserting his or her ATM card ( 100 ) into ATM terminal 110 .
- the ATM machine accesses computer network 120 , such as a secure banking network, to interface with bank server 130 which has access to the customer's account information 140 , including the user's personal identification number (PIN), often referred to as a “PIN code,” or “password.”
- PIN personal identification number
- Virtual keypad 150 is displayed on terminal 110 's display screen. As shown, the virtual keypad is arranged in a substantially similar fashion to physical keypads that were more commonly used before the advent and large-scale use of virtual keypads.
- the numbers in virtual keypad 150 are displayed in a numerical order. In the example shown, the numbers 1 through 3 appear in consecutive order on the first line of the display, numbers 4 through 6 on the second line, numbers 7 through 9 on the third line, and special characters and zero (“0”) on the fourth line.
- virtual keys for “OK” and “Cancel” are provided. If the user selected an alternative language, some of the keys displayed might be displayed in a non-English language.
- a challenge with using traditional virtual keypads relates to the fact that today's modern society often encumbers users with a multitude of PIN codes and passwords. Remembering these various PIN codes and passwords can be problematic. What is needed, therefore, is a system and method that provides an alternative keypad layout in which the virtual keys displayed on the virtual keypad are in a non-sequential layout. Furthermore, what is needed is a system and method that allows the user to select a keypad arrangement that is more easily remembered by the user.
- the aforementioned challenges are resolved using a system and method that provides an alternate keypad arrangement displayed on a virtual keypad for entry of the user's authentication data, such as the user's PIN code or password.
- the virtual keys are laid out in a non-sequential arrangement.
- the labels displayed on the virtual keys appear sequential, however the values registered when the user presses the virtual key does not match the label and, hence, the values are laid out in a non-sequential manner.
- the user can configure the alternate keypad arrangement to use either an arrangement of virtual keys where the value of the keys match the label displayed for the keys or an arrangement of virtual keys with labels that are displayed sequentially but with values that do not match the labels and that form a pattern. For example, the user can choose a vertical pattern down the center of a keypad by choosing the characters “2-5-8-0” and assign these
- FIG. 1 is a prior art diagram of keypad entry of a password using a standard keypad layout
- FIG. 2 is a diagram showing entry of a password using a user-selected alternate keypad
- FIG. 3 is a diagram showing entry of a password using a user-selected pattern where the numbers of the pattern do not align with the numbers displayed on the keypad;
- FIG. 4 is a flowchart showing steps taken by a user to configure a customized layout
- FIG. 5 is a flowchart showing steps taken by the user to configure a keyboard layout similar to the keypad depicted in FIG. 2 ;
- FIG. 6 is a flowchart showing steps taken by the user to configure a keyboard pattern layout similar to the keypad pattern depicted in FIG. 3 ;
- FIG. 7 is a flowchart showing a client logon process utilizing a customized layout as shown in FIGS. 2 and 3 ;
- FIG. 8 is a block diagram of a computing device capable of implementing the present invention.
- FIG. 1 is a prior art diagram of keypad entry of a password using a standard keypad layout, and is described in the Description of the Related Art section, above.
- FIG. 2 is a diagram showing entry of a password using a user-selected alternate keypad.
- the user makes a request of the system.
- the user might start the request by inserting ATM card 100 into ATM bank terminal 110 .
- the ATM card includes user identification information embodied on the card.
- the user might enter a user identifier either using a keyboard or virtual keypad or providing the user identifier on a smart card or other nonvolatile storage device.
- the user identifier is transmitted from terminal 110 through computer network 120 to server 130 in order to retrieve customer account information 240 , which includes keyboard layout 200 that is preferred by the user.
- the keyboard layout that includes the alternate keypad arrangement is retrieved by server 130 and transmitted back through computer network 120 to terminal 110 that is being used by the user.
- the keyboard layout is embodied on the user's ATM card so that the alternate keypad arrangement can be retrieved more quickly and does not add network traffic in order to retrieve the alternate keypad arrangement.
- the alternate keypad arrangement is displayed on the display of terminal 110 .
- the user's PIN code is “1927” and the alternate keypad arrangement 250 is displayed so that these numbers fall in a vertical pattern down the middle of the display.
- the alphanumeric keys on the virtual keypad are laid out in a non-sequential manner (i.e., the first row reads “6-1-4” rather than “1-2-3”), the user can readily enter his or her PIN code by remembering the pattern (i.e., vertical order from top to bottom) in which the PIN code is displayed.
- the user can have different passwords or PIN codes (collectively referred to as “authentication data”) in different applications but remember the different PIN codes/authentication data because of the keypad arrangement.
- PIN code might be “8462” and the user can select an alternate keypad arrangement so that these numbers are displayed vertically from top to bottom with other numbers and alphanumeric keys arranged in a non-sequential manner.
- more elaborate patterns can be employed, such as “Z” shapes, etc.
- FIG. 3 is a diagram showing entry of a password using a user-selected pattern where the values of the alphanumeric keys on the virtual keypad, when selected, do not align with the numbers displayed on keypad 350 .
- the retrieval of the user identification information is the same as that shown in FIG. 2 .
- the alphanumeric key values are laid out in a non-sequential manner.
- the value of the keys on the first row are undefined (“x”)-“1”-undefined (“x”), rather than traditional values of 1, 2, and 3.
- the user presses the keys on the virtual keypad labeled 2-5-8-0, with the alphanumeric key labeled “2” mapped to the value of “1,” the alphanumeric key labeled “5” mapped to the value of “9,” the alphanumeric key labeled “8” mapped to the value of “2,” and the alphanumeric key labeled “0” mapped to the value of “7.”
- the system actually receives the value “1-9-2-7” as the user's authentication data.
- a common value could also be mapped to multiple keys, for example mapping both the “8” and the “0” to the value of “3.”
- the pattern used can be as elaborate as the user likes to increase security. Also, the user can have different authentication data for different applications that use the same pattern.
- the value “8” would be mapped to the alphanumeric key labeled “2”
- the value “4” would be mapped to both the alphanumeric keys labeled “5” and “8”
- the value “2” would be mapped to the alphanumeric key labeled “0.”
- the remaining keys not needed for the user to enter his or her authentication data can be assigned other values alphanumeric values or can be assigned no values (null). Using “null” values can lessen network traffic because terminal 110 can sense that null values have been entered and, therefore, the authentication data is incorrect. Terminal 110 can then reject the user's request without having to send the entered user authentication data through the network to the server for authentication.
- FIG. 4 is a flowchart showing steps taken by a user to configure a customized layout.
- Layout configuration processing commences at 400 whereupon, the user is authenticated at step 410 before being allowed to configure the user's layout.
- a determination is made as to whether the user is authenticated based upon the authentication data provided by the user (decision 420 ). If the user is not authenticated (e.g., the user provided an incorrect PIN code or password), decision 420 branches to “no” branch 425 and processing ends at 430 .
- dialog window 450 is displayed that allows the user to change his or her authentication data. Dialog window 450 has a checkbox for indicating whether the user wants to change his or her authentication data and a textbox for entering the new authentication data. If the user changed the authentication data, the new authentication data is stored at step 460 in customer account data store 240 .
- a nonvolatile storage device such as ATM card 100 or a smart card that can be carried
- FIG. 5 is a flowchart showing steps taken by the user to configure a keypad layout similar to the keypad depicted in FIG. 2 . Processing commences at 500 whereupon dialog 520 is displayed to the user. At step 510 , the user selects the radio button indicating that the user wants to use an alternate keypad layout arrangement.
- dialog panel 540 is displayed (step 530 ).
- Dialog panel 540 includes a graphical depiction of a virtual keypad with virtual alphanumeric keys.
- the user is instructed to move the keys displayed in dialog panel 540 into an alternate keypad arrangement preferred by the user.
- the user moves the virtual alphanumeric keys displayed in dialog panel 540 to alternate locations to create the user's alternate keypad arrangement.
- the user moves the virtual keys by selecting the displayed keys, for example by clicking on a desired key with a mouse or pointing device or by tabbing to the desired key using a keyboard attached to the user's computer system.
- the results of the user moving the virtual keys into the alternate keypad arrangement is shown in resulting dialog 560 .
- the user has moved the keys so that the keys needed to enter the user's PIN code of “1927” are arranged in a pattern.
- the pattern chosen by the user is a vertical arrangement where the keys are arranged from top to bottom in the middle of the virtual keypad.
- the user can use the same technique for other authentication data used with other applications so that, even though the authentication data used with the other applications uses different alphanumeric values, the arrangement of the authentication data can be made common or can be arranged in a manner easily remembered by the user.
- the user can decide to have a bank ATM PIN code arranged as shown in dialog 560 and arrange for a PIN code used with a credit card or debit card to be arranged differently, such as horizontally, diagonally, etc.
- the user selects the “OK” button on dialog 560 to indicate that the user wants to save the displayed alternate keypad. If the user did not want to save the arrangement, the user simply selects the “Cancel” button instead.
- the alternate keypad arrangement is saved at step 580 .
- the alternate keypad arrangement is saved to the user's account information data store 240 .
- the alternate keypad arrangement is saved to a portable device that can be carried by the user, such as written to a smart card or to an ATM card, so that the user's alternate keypad arrangement is encoded on the portable device (or portable media).
- the system does not need to access the user's account information in order to display the alternate keypad arrangement, thus reducing network traffic and reducing any security exposure that may result from access of the user's account before the user has been authenticated. Processing thereafter ends at 595 .
- FIG. 6 is a flowchart showing steps taken by the user to configure a keyboard pattern layout similar to the keypad pattern depicted in FIG. 3 . Processing commences at 600 whereupon dialog 520 is displayed to the user. At step 610 , the user selects the radio button indicating that the user wants to use an alternate pattern layout arrangement.
- dialog panel 640 is displayed (step 630 ).
- Dialog panel 640 includes a graphical depiction of a virtual keypad with virtual alphanumeric keys along with numerous available preset patterns. The user is instructed to select a pattern that he or she wishes to use or select from the virtual keys displayed in dialog panel 640 to create a new pattern. The pattern selected or created by the user will be the alternate keypad arrangement used by the user.
- dialog 660 When a pattern has been selected or created, the user selects the “OK” button in dialog 640 whereupon, at step 670 , dialog 660 is displayed. If a preset pattern was selected by the user, dialog 660 highlights the pattern—in this case the pattern is a vertical arrangement along the right side of the virtual keypad. In addition, the values that correspond to the alphanumeric keys displayed in the alternate keypad arrangement are overlaid on the keys. In the example shown, the user's authentication data (PIN code) value of “1927” has been mapped to the keys.
- PIN code PIN code
- the value “1” has been mapped to the “3” key
- the value “9” has been mapped to the “6” key
- the value “2” has been mapped to the “9” key
- the value “7” has been mapped to the pound sign key “#.”
- “alphanumeric” includes special character, such as the asterisk, pound sign, dollar sign, etc.
- the user can use the same technique for other authentication data used with other applications so that, even though the authentication data used with the other applications uses different alphanumeric values, the arrangement of the authentication data can be made common or can be arranged in a manner easily remembered by the user.
- the user can decide to have a bank ATM PIN code arranged as shown in dialog 660 and arrange for a PIN code used with a credit card or debit card to be arranged differently, such as horizontally, diagonally, etc.
- the keys “3-6-9-#” can be assigned to different authentication data.
- the keys not assigned to the user's authentication data values are either not defined or are assigned to other values.
- the user selects the “OK” button on dialog 660 to indicate that the user wants to save the displayed alternate keypad arrangement. If the user did not want to save the arrangement, the user simply selects the “Cancel” button instead.
- the alternate keypad arrangement is saved at step 690 .
- the alternate keypad arrangement is saved to the user's account information data store 240 .
- the alternate keypad arrangement is saved to a portable device that can be carried by the user, such as written to a smart card or to an ATM card, so that the user's alternate keypad arrangement is encoded on the portable device (or portable media).
- the system does not need to access the user's account information in order to display the alternate keypad arrangement, thus reducing network traffic and reducing any security exposure that may result from access of the user's account before the user has been authenticated. Processing thereafter ends at 695 .
- FIG. 7 is a flowchart showing a client logon process utilizing a customized layout as shown in FIGS. 2 and 3 .
- Two embodiments of retrieving the user's alternate keypad arrangement are depicted in FIG. 7 .
- the user's alternate keypad arrangement is retrieved from the user's account information maintained by the server.
- the alternate keypad arrangement is retrieved from a portable media or device, such as a smart card or ATM card 100 , carried by the user.
- Client logon process commences at 700 whereupon, at step 705 , the user provides user identification information, such as a user identifier entered in a display panel, or encoded on a device or media, such as ATM card 100 or a smart card.
- user identification information such as a user identifier entered in a display panel
- a device or media such as ATM card 100 or a smart card.
- the alternate keypad arrangement is retrieved from a server.
- an initial login request that includes the user's identification information is sent at 710 to the server.
- Server process 701 receives the request at step 715 and retrieves the user's alternate keypad arrangement at step 720 from customer account data store 240 .
- the retrieved alternate keypad arrangement is returned to the client over the computer network.
- the user's alternate keypad arrangement is encoded on a media or device, such as ATM card 100 or a smart card.
- the client process retrieves the alternate keypad arrangement without needing to communicate with the server.
- the user's alternate keypad arrangement is received, either from a portable media or device, such as ATM card 100 , or through the computer network from the server.
- the alternate keypad arrangement is displayed to the user on the virtual keypad.
- the alternate keypad arrangement includes labels on the virtual keypad that are sequential displayed, however the values mapped to the keys displayed on the virtual keypad do not match the labels and the values are not arranged in a sequential fashion (see keypad 350 in FIG. 3 for an example).
- the alternate keypad arrangement has values of the keys matching the labels displayed for the keys on the virtual keypad but the virtual keys themselves are not arranged in a sequential fashion (see keypad 250 in FIG. 2 for an example).
- step 740 the user is prompted to enter the user's authentication data using the alternate keypad arrangement displayed on the virtual keypad and the user's authentication data is received at step 745 .
- the authentication data entered by the user is sent to the server for verification at step 750 .
- the server receives the authentication data from the user over the computer network.
- the user's actual authentication data is retrieved from customer account data store 240 .
- a determination is made as to whether the received authentication data matches the authentication data stored in data store 240 (decision 762 ). If the data matches, decision 762 branches to “yes” branch 764 whereupon, at step 766 , access is granted to the user. On the other hand, if the authentication data does not match, decision 762 branches to “no” branch 768 whereupon, at step 770 the user is denied access and the failed logon attempt is logged. Server logon processing ends at 795 .
- the terminal or device being used by the user receives responsive data to the user's logon request.
- a determination is made as to whether the logon request was granted (decision 780 ). If the logon request was granted, decision 780 branches to “yes” branch 782 whereupon the user is presented with an entry screen (step 785 ) so that the user can interact with the application. On the other hand, if the logon request was not granted, decision 780 branches to “no” branch 788 whereupon an error message is displayed at step 790 and the user is not allowed access to the system. User processing thereafter ends at 799 .
- FIG. 8 illustrates information handling system 801 which is a simplified example of a computer system capable of performing the computing operations described herein.
- Computer system 801 includes processor 800 which is coupled to host bus 802 .
- a level two (L2) cache memory 804 is also coupled to host bus 802 .
- Host-to-PCI bridge 806 is coupled to main memory 808 , includes cache memory and main memory control functions, and provides bus control to handle transfers among PCI bus 810 , processor 800 , L2 cache 804 , main memory 808 , and host bus 802 .
- Main memory 808 is coupled to Host-to-PCI bridge 806 as well as host bus 802 .
- PCI bus 810 Devices used solely by host processor(s) 800 , such as LAN card 830 , are coupled to PCI bus 810 .
- Service Processor Interface and ISA Access Pass-through 812 provides an interface between PCI bus 810 and PCI bus 814 .
- PCI bus 814 is insulated from PCI bus 810 .
- Devices, such as flash memory 818 are coupled to PCI bus 814 .
- flash memory 818 includes BIOS code that incorporates the necessary processor executable code for a variety of low-level system functions and system boot functions.
- PCI bus 814 provides an interface for a variety of devices that are shared by host processor(s) 800 and Service Processor 816 including, for example, flash memory 818 .
- PCI-to-ISA bridge 835 provides bus control to handle transfers between PCI bus 814 and ISA bus 840 , universal serial bus (USB) functionality 845 , power management functionality 855 , and can include other functional elements not shown, such as a real-time clock (RTC), DMA control, interrupt support, and system management bus support.
- RTC real-time clock
- Nonvolatile RAM 820 is attached to ISA Bus 840 .
- Service Processor 816 includes JTAG and I2C busses 822 for communication with processor(s) 800 during initialization steps.
- JTAG/I2C busses 822 are also coupled to L2 cache 804 , Host-to-PCI bridge 806 , and main memory 808 providing a communications path between the processor, the Service Processor, the L2 cache, the Host-to-PCI bridge, and the main memory.
- Service Processor 816 also has access to system power resources for powering down information handling device 801 .
- Peripheral devices and input/output (I/O) devices can be attached to various interfaces (e.g., parallel interface 862 , serial interface 864 , keyboard interface 868 , and mouse interface 870 coupled to ISA bus 840 .
- I/O devices can be accommodated by a super I/O controller (not shown) attached to ISA bus 840 .
- LAN card 830 is coupled to PCI bus 810 .
- modem 875 is connected to serial port 864 and PCI-to-ISA Bridge 835 .
- FIG. 8 shows one information handling system that employs processor(s) 800
- the information handling system may take many forms.
- information handling system 801 may take the form of a desktop, server, portable, laptop, notebook, or other form factor computer or data processing system.
- Information handling system 801 may also take other form factors such as a personal digital assistant (PDA), a gaming device, ATM machine, a portable telephone device, a communication device or other devices that include a processor and memory.
- PDA personal digital assistant
- One of the preferred implementations of the invention is a client application, namely, a set of instructions (program code) in a code module that may, for example, be resident in the random access memory of the computer.
- the set of instructions may be stored in another computer memory, for example, in a hard disk drive, or in a removable memory such as an optical disk (for eventual use in a CD ROM) or floppy disk (for eventual use in a floppy disk drive), or downloaded via the Internet or other computer network.
- the present invention may be implemented as a computer program product for use in a computer.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Input From Keyboards Or The Like (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
A system and method for providing an alternate keypad arrangement in a virtual keypad is presented. In the alternate keypad arrangement, the virtual keys are laid out in a non-sequential arrangement. In one embodiment, the labels displayed on the virtual keys appear sequential, however the values registered when the user presses the virtual key does not match the label and, hence, the values are laid out in a non-sequential manner. Using alternate keypad arrangements arranged in patterns enables the user to use a common pattern, or patterns easily remembered by the user, for a wide variety of authentication data used to access a wide variety of systems. Rather than remembering the specific PIN codes and passwords, the user simply remembers a pattern and selects virtual keys that match the pattern.
Description
- This application is a continuation application of co-pending U.S. Non-Provisional patent application Ser. No. 11/252,513, entitled “System and Method of Alternative Key Pad Layout for Enhanced Security,” filed on Oct. 18, 2005.
- 1. Technical Field
- The present invention relates in general to a system and method for providing an alternative key pad layout to increase security.
- 2. Description of the Related Art
- Touch screen technology is utilized in a vast array of modern computer applications. These applications include automated teller machines (ATMs), check-in applications at airports, such as those used to print boarding passes, as well as many others. In these applications, the user often has the ability to select from a list of languages so that the information that appears is displayed in a language familiar to the user. In many touch screen applications, a physical keyboard or keypad is replaced with a virtual keyboard or keypad that is displayed on the display. If the user wants to press the one (“1”) key, for example, the user touches a virtual key that appears on the display rather than pressing a physical “1” key on a keyboard or keypad.
- A depiction of a typical application utilizing a virtual keypad is shown in
FIG. 1 .FIG. 1 shows an Automated Teller Machine (ATM) application commonly used by millions of people everyday. The user starts by inserting his or her ATM card (100) intoATM terminal 110. In response, the ATM machine accessescomputer network 120, such as a secure banking network, to interface withbank server 130 which has access to the customer'saccount information 140, including the user's personal identification number (PIN), often referred to as a “PIN code,” or “password.” -
Virtual keypad 150 is displayed onterminal 110's display screen. As shown, the virtual keypad is arranged in a substantially similar fashion to physical keypads that were more commonly used before the advent and large-scale use of virtual keypads. The numbers invirtual keypad 150 are displayed in a numerical order. In the example shown, thenumbers 1 through 3 appear in consecutive order on the first line of the display,numbers 4 through 6 on the second line,numbers 7 through 9 on the third line, and special characters and zero (“0”) on the fourth line. In addition, virtual keys for “OK” and “Cancel” are provided. If the user selected an alternative language, some of the keys displayed might be displayed in a non-English language. Other virtual keypad arrangements exist, such as displaying 1 through 5 on a first line and 6 through 0 on a second line, or displaying all ten digits consecutively (1, 2, 3, 4, 5, 6, 7, 8, 9, 0) on a single line. However, one constant in the prior art is that the keys are displayed in a numerical order. In the example shown, the user enters his or her PIN code (“1-9-2-7”) as depicted by the arrows from one virtual key to the next. - The prior art's arrangement of virtual key in numeric order does allow users to easily find keys, much like finding keys on a traditional telephone. In addition, from past use with physical keypads, users are familiar with the position of keys as depicted in
virtual keypad 150. The use of traditional key layouts on virtual keypads does however, present challenges. - A challenge with using traditional virtual keypads relates to the fact that today's modern society often encumbers users with a multitude of PIN codes and passwords. Remembering these various PIN codes and passwords can be problematic. What is needed, therefore, is a system and method that provides an alternative keypad layout in which the virtual keys displayed on the virtual keypad are in a non-sequential layout. Furthermore, what is needed is a system and method that allows the user to select a keypad arrangement that is more easily remembered by the user.
- It has been discovered that the aforementioned challenges are resolved using a system and method that provides an alternate keypad arrangement displayed on a virtual keypad for entry of the user's authentication data, such as the user's PIN code or password. In the alternate keypad arrangement, the virtual keys are laid out in a non-sequential arrangement. In one embodiment, the labels displayed on the virtual keys appear sequential, however the values registered when the user presses the virtual key does not match the label and, hence, the values are laid out in a non-sequential manner.
- The user can configure the alternate keypad arrangement to use either an arrangement of virtual keys where the value of the keys match the label displayed for the keys or an arrangement of virtual keys with labels that are displayed sequentially but with values that do not match the labels and that form a pattern. For example, the user can choose a vertical pattern down the center of a keypad by choosing the characters “2-5-8-0” and assign these
- The foregoing is a summary and thus contains, by necessity, simplifications, generalizations, and omissions of detail; consequently, those skilled in the art will appreciate that the summary is illustrative only and is not intended to be in any way limiting. Other aspects, inventive features, and advantages of the present invention, as defined solely by the claims, will become apparent in the non-limiting detailed description set forth below.
- The present invention may be better understood, and its numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
-
FIG. 1 is a prior art diagram of keypad entry of a password using a standard keypad layout; -
FIG. 2 is a diagram showing entry of a password using a user-selected alternate keypad; -
FIG. 3 is a diagram showing entry of a password using a user-selected pattern where the numbers of the pattern do not align with the numbers displayed on the keypad; -
FIG. 4 is a flowchart showing steps taken by a user to configure a customized layout; -
FIG. 5 is a flowchart showing steps taken by the user to configure a keyboard layout similar to the keypad depicted inFIG. 2 ; -
FIG. 6 is a flowchart showing steps taken by the user to configure a keyboard pattern layout similar to the keypad pattern depicted inFIG. 3 ; -
FIG. 7 is a flowchart showing a client logon process utilizing a customized layout as shown inFIGS. 2 and 3 ; and -
FIG. 8 is a block diagram of a computing device capable of implementing the present invention. - The following is intended to provide a detailed description of an example of the invention and should not be taken to be limiting of the invention itself. Rather, any number of variations may fall within the scope of the invention, which is defined in the claims following the description.
-
FIG. 1 is a prior art diagram of keypad entry of a password using a standard keypad layout, and is described in the Description of the Related Art section, above. -
FIG. 2 is a diagram showing entry of a password using a user-selected alternate keypad. The user makes a request of the system. In a banking embodiment, the user might start the request by insertingATM card 100 intoATM bank terminal 110. The ATM card includes user identification information embodied on the card. In a non-banking embodiment, the user might enter a user identifier either using a keyboard or virtual keypad or providing the user identifier on a smart card or other nonvolatile storage device. - In one embodiment, the user identifier is transmitted from
terminal 110 throughcomputer network 120 toserver 130 in order to retrievecustomer account information 240, which includeskeyboard layout 200 that is preferred by the user. The keyboard layout that includes the alternate keypad arrangement is retrieved byserver 130 and transmitted back throughcomputer network 120 toterminal 110 that is being used by the user. In another embodiment, the keyboard layout is embodied on the user's ATM card so that the alternate keypad arrangement can be retrieved more quickly and does not add network traffic in order to retrieve the alternate keypad arrangement. - After the virtual keypad layout has been retrieved at terminal 110 (either from a network-connected server or from a user-controlled media device such as an ATM card or a smart card), the alternate keypad arrangement is displayed on the display of
terminal 110. In the example shown inFIG. 2 , the user's PIN code is “1927” and thealternate keypad arrangement 250 is displayed so that these numbers fall in a vertical pattern down the middle of the display. While the alphanumeric keys on the virtual keypad are laid out in a non-sequential manner (i.e., the first row reads “6-1-4” rather than “1-2-3”), the user can readily enter his or her PIN code by remembering the pattern (i.e., vertical order from top to bottom) in which the PIN code is displayed. By using an alternate keypad arrangement, the user can have different passwords or PIN codes (collectively referred to as “authentication data”) in different applications but remember the different PIN codes/authentication data because of the keypad arrangement. For example, in another application, the user's PIN code might be “8462” and the user can select an alternate keypad arrangement so that these numbers are displayed vertically from top to bottom with other numbers and alphanumeric keys arranged in a non-sequential manner. To further enhance security, more elaborate patterns can be employed, such as “Z” shapes, etc. -
FIG. 3 is a diagram showing entry of a password using a user-selected pattern where the values of the alphanumeric keys on the virtual keypad, when selected, do not align with the numbers displayed onkeypad 350. The retrieval of the user identification information is the same as that shown inFIG. 2 . However, inFIG. 3 , rather than the keypad labels being displayed in a non-sequential fashion, inFIG. 2 , the alphanumeric key values are laid out in a non-sequential manner. In particular, the value of the keys on the first row are undefined (“x”)-“1”-undefined (“x”), rather than traditional values of 1, 2, and 3. In the example shown, in order to enter the PIN code of “1-9-2-7”, the user presses the keys on the virtual keypad labeled 2-5-8-0, with the alphanumeric key labeled “2” mapped to the value of “1,” the alphanumeric key labeled “5” mapped to the value of “9,” the alphanumeric key labeled “8” mapped to the value of “2,” and the alphanumeric key labeled “0” mapped to the value of “7.” Now when the user presses “2-5-8-0” the system actually receives the value “1-9-2-7” as the user's authentication data. - A common value could also be mapped to multiple keys, for example mapping both the “8” and the “0” to the value of “3.” Like the virtual keypad shown in
FIG. 2 , the pattern used can be as elaborate as the user likes to increase security. Also, the user can have different authentication data for different applications that use the same pattern. For example, in a second application where the user's pin code is “8442,” the value “8” would be mapped to the alphanumeric key labeled “2,” the value “4” would be mapped to both the alphanumeric keys labeled “5” and “8,” and the value “2” would be mapped to the alphanumeric key labeled “0.” Now when the user presses “2-5-8-0” the system actually receives the value “8-4-4-2” as the user's authentication data. - The remaining keys not needed for the user to enter his or her authentication data can be assigned other values alphanumeric values or can be assigned no values (null). Using “null” values can lessen network traffic because
terminal 110 can sense that null values have been entered and, therefore, the authentication data is incorrect. Terminal 110 can then reject the user's request without having to send the entered user authentication data through the network to the server for authentication. -
FIG. 4 is a flowchart showing steps taken by a user to configure a customized layout. Layout configuration processing commences at 400 whereupon, the user is authenticated at step 410 before being allowed to configure the user's layout. A determination is made as to whether the user is authenticated based upon the authentication data provided by the user (decision 420). If the user is not authenticated (e.g., the user provided an incorrect PIN code or password),decision 420 branches to “no”branch 425 and processing ends at 430. - On the other hand, if the user is authenticated,
decision 420 branches to “yes”branch 435 whereupon,dialog window 450 is displayed that allows the user to change his or her authentication data.Dialog window 450 has a checkbox for indicating whether the user wants to change his or her authentication data and a textbox for entering the new authentication data. If the user changed the authentication data, the new authentication data is stored atstep 460 in customeraccount data store 240. - A determination is made (decision 470) as to whether the user is changing the layout of the keypad (as shown in
FIG. 2 ) or is changing the pattern (the values of the keys, as shown inFIG. 3 ). If the user is changing the keypad pattern,decision 470 branches to “pattern”branch 475 whereupon the user configures the pattern layout on the virtual keypad (predefined process 480, seeFIG. 6 and corresponding text for processing details). If instead the user is changing the keypad layout,decision 470 branches to “keypad”branch 485 whereupon the user configures the keypad layout (predefined process 490, seeFIG. 5 and corresponding text for processing details). The results of the pattern changes or the keypad changes are stored. The resulting alternate keypad arrangement is stored either to the user's accountinformation data store 240 or to a nonvolatile storage device, such asATM card 100 or a smart card that can be carried and used by the user. -
FIG. 5 is a flowchart showing steps taken by the user to configure a keypad layout similar to the keypad depicted inFIG. 2 . Processing commences at 500 whereupondialog 520 is displayed to the user. At step 510, the user selects the radio button indicating that the user wants to use an alternate keypad layout arrangement. - In response to the user's selection,
dialog panel 540 is displayed (step 530).Dialog panel 540 includes a graphical depiction of a virtual keypad with virtual alphanumeric keys. The user is instructed to move the keys displayed indialog panel 540 into an alternate keypad arrangement preferred by the user. At step 550, the user moves the virtual alphanumeric keys displayed indialog panel 540 to alternate locations to create the user's alternate keypad arrangement. The user moves the virtual keys by selecting the displayed keys, for example by clicking on a desired key with a mouse or pointing device or by tabbing to the desired key using a keyboard attached to the user's computer system. The results of the user moving the virtual keys into the alternate keypad arrangement is shown in resultingdialog 560. - Notice that the user has moved the keys so that the keys needed to enter the user's PIN code of “1927” are arranged in a pattern. In this case the pattern chosen by the user is a vertical arrangement where the keys are arranged from top to bottom in the middle of the virtual keypad. In this manner the user can use the same technique for other authentication data used with other applications so that, even though the authentication data used with the other applications uses different alphanumeric values, the arrangement of the authentication data can be made common or can be arranged in a manner easily remembered by the user. For example, the user can decide to have a bank ATM PIN code arranged as shown in
dialog 560 and arrange for a PIN code used with a credit card or debit card to be arranged differently, such as horizontally, diagonally, etc. - At step 570, the user selects the “OK” button on
dialog 560 to indicate that the user wants to save the displayed alternate keypad. If the user did not want to save the arrangement, the user simply selects the “Cancel” button instead. In response to the user requesting to save the alternate keypad arrangement (by clicking “OK”), the alternate keypad arrangement is saved at step 580. In one embodiment, the alternate keypad arrangement is saved to the user's accountinformation data store 240. In an alternate embodiment, the alternate keypad arrangement is saved to a portable device that can be carried by the user, such as written to a smart card or to an ATM card, so that the user's alternate keypad arrangement is encoded on the portable device (or portable media). In the alternate embodiment, the system does not need to access the user's account information in order to display the alternate keypad arrangement, thus reducing network traffic and reducing any security exposure that may result from access of the user's account before the user has been authenticated. Processing thereafter ends at 595. -
FIG. 6 is a flowchart showing steps taken by the user to configure a keyboard pattern layout similar to the keypad pattern depicted inFIG. 3 . Processing commences at 600 whereupondialog 520 is displayed to the user. At step 610, the user selects the radio button indicating that the user wants to use an alternate pattern layout arrangement. - In response to the user's selection, dialog panel 640 is displayed (step 630). Dialog panel 640 includes a graphical depiction of a virtual keypad with virtual alphanumeric keys along with numerous available preset patterns. The user is instructed to select a pattern that he or she wishes to use or select from the virtual keys displayed in dialog panel 640 to create a new pattern. The pattern selected or created by the user will be the alternate keypad arrangement used by the user. At step 650, the selects one of the available patterns or makes a custom pattern by selecting keys from the virtual keypad displayed in dialog 640.
- When a pattern has been selected or created, the user selects the “OK” button in dialog 640 whereupon, at
step 670,dialog 660 is displayed. If a preset pattern was selected by the user,dialog 660 highlights the pattern—in this case the pattern is a vertical arrangement along the right side of the virtual keypad. In addition, the values that correspond to the alphanumeric keys displayed in the alternate keypad arrangement are overlaid on the keys. In the example shown, the user's authentication data (PIN code) value of “1927” has been mapped to the keys. In particular, the value “1” has been mapped to the “3” key, the value “9” has been mapped to the “6” key, the value “2” has been mapped to the “9” key, and the value “7” has been mapped to the pound sign key “#.” As used herein, “alphanumeric” includes special character, such as the asterisk, pound sign, dollar sign, etc. - In this manner the user can use the same technique for other authentication data used with other applications so that, even though the authentication data used with the other applications uses different alphanumeric values, the arrangement of the authentication data can be made common or can be arranged in a manner easily remembered by the user. For example, the user can decide to have a bank ATM PIN code arranged as shown in
dialog 660 and arrange for a PIN code used with a credit card or debit card to be arranged differently, such as horizontally, diagonally, etc. Also, in a different application, the keys “3-6-9-#” can be assigned to different authentication data. For example, if the user's debit card PIN code is “9-4-4-9” the value “9” would be mapped to both the “3” and the pound sign (“#”) keys and the value “4” would be mapped to both the “6” and the “9” keys. Indialog 660, the keys not assigned to the user's authentication data values are either not defined or are assigned to other values. - At step 680, the user selects the “OK” button on
dialog 660 to indicate that the user wants to save the displayed alternate keypad arrangement. If the user did not want to save the arrangement, the user simply selects the “Cancel” button instead. In response to the user requesting to save the alternate keypad arrangement (by clicking “OK”), the alternate keypad arrangement is saved at step 690. In one embodiment, the alternate keypad arrangement is saved to the user's accountinformation data store 240. In an alternate embodiment, the alternate keypad arrangement is saved to a portable device that can be carried by the user, such as written to a smart card or to an ATM card, so that the user's alternate keypad arrangement is encoded on the portable device (or portable media). In the alternate embodiment, the system does not need to access the user's account information in order to display the alternate keypad arrangement, thus reducing network traffic and reducing any security exposure that may result from access of the user's account before the user has been authenticated. Processing thereafter ends at 695. -
FIG. 7 is a flowchart showing a client logon process utilizing a customized layout as shown inFIGS. 2 and 3 . Two embodiments of retrieving the user's alternate keypad arrangement are depicted inFIG. 7 . In one embodiment, the user's alternate keypad arrangement is retrieved from the user's account information maintained by the server. In the alternate embodiment, the alternate keypad arrangement is retrieved from a portable media or device, such as a smart card orATM card 100, carried by the user. - Client logon process commences at 700 whereupon, at step 705, the user provides user identification information, such as a user identifier entered in a display panel, or encoded on a device or media, such as
ATM card 100 or a smart card. - In one embodiment, the alternate keypad arrangement is retrieved from a server. In this embodiment, an initial login request that includes the user's identification information is sent at 710 to the server.
Server process 701 receives the request atstep 715 and retrieves the user's alternate keypad arrangement at step 720 from customeraccount data store 240. Atstep 725, the retrieved alternate keypad arrangement is returned to the client over the computer network. - In an alternate embodiment, the user's alternate keypad arrangement is encoded on a media or device, such as
ATM card 100 or a smart card. In this embodiment, the client process retrieves the alternate keypad arrangement without needing to communicate with the server. - At
step 730, the user's alternate keypad arrangement is received, either from a portable media or device, such asATM card 100, or through the computer network from the server. Atstep 735, the alternate keypad arrangement is displayed to the user on the virtual keypad. In one embodiment, the alternate keypad arrangement includes labels on the virtual keypad that are sequential displayed, however the values mapped to the keys displayed on the virtual keypad do not match the labels and the values are not arranged in a sequential fashion (seekeypad 350 inFIG. 3 for an example). In another embodiment, the alternate keypad arrangement has values of the keys matching the labels displayed for the keys on the virtual keypad but the virtual keys themselves are not arranged in a sequential fashion (seekeypad 250 inFIG. 2 for an example). - At
step 740, the user is prompted to enter the user's authentication data using the alternate keypad arrangement displayed on the virtual keypad and the user's authentication data is received at step 745. The authentication data entered by the user is sent to the server for verification atstep 750. - At
step 755, the server receives the authentication data from the user over the computer network. Atstep 760, the user's actual authentication data is retrieved from customeraccount data store 240. A determination is made as to whether the received authentication data matches the authentication data stored in data store 240 (decision 762). If the data matches,decision 762 branches to “yes”branch 764 whereupon, atstep 766, access is granted to the user. On the other hand, if the authentication data does not match,decision 762 branches to “no”branch 768 whereupon, atstep 770 the user is denied access and the failed logon attempt is logged. Server logon processing ends at 795. - Returning to user logon processing, at
step 775, the terminal or device being used by the user receives responsive data to the user's logon request. A determination is made as to whether the logon request was granted (decision 780). If the logon request was granted,decision 780 branches to “yes”branch 782 whereupon the user is presented with an entry screen (step 785) so that the user can interact with the application. On the other hand, if the logon request was not granted,decision 780 branches to “no”branch 788 whereupon an error message is displayed atstep 790 and the user is not allowed access to the system. User processing thereafter ends at 799. -
FIG. 8 illustrates information handling system 801 which is a simplified example of a computer system capable of performing the computing operations described herein. Computer system 801 includesprocessor 800 which is coupled to host bus 802. A level two (L2)cache memory 804 is also coupled to host bus 802. Host-to-PCI bridge 806 is coupled tomain memory 808, includes cache memory and main memory control functions, and provides bus control to handle transfers among PCI bus 810,processor 800,L2 cache 804,main memory 808, and host bus 802.Main memory 808 is coupled to Host-to-PCI bridge 806 as well as host bus 802. Devices used solely by host processor(s) 800, such asLAN card 830, are coupled to PCI bus 810. Service Processor Interface and ISA Access Pass-through 812 provides an interface between PCI bus 810 and PCI bus 814. In this manner, PCI bus 814 is insulated from PCI bus 810. Devices, such asflash memory 818, are coupled to PCI bus 814. In one implementation,flash memory 818 includes BIOS code that incorporates the necessary processor executable code for a variety of low-level system functions and system boot functions. - PCI bus 814 provides an interface for a variety of devices that are shared by host processor(s) 800 and
Service Processor 816 including, for example,flash memory 818. PCI-to-ISA bridge 835 provides bus control to handle transfers between PCI bus 814 and ISA bus 840, universal serial bus (USB) functionality 845,power management functionality 855, and can include other functional elements not shown, such as a real-time clock (RTC), DMA control, interrupt support, and system management bus support.Nonvolatile RAM 820 is attached to ISA Bus 840.Service Processor 816 includes JTAG and I2C busses 822 for communication with processor(s) 800 during initialization steps. JTAG/I2C busses 822 are also coupled toL2 cache 804, Host-to-PCI bridge 806, andmain memory 808 providing a communications path between the processor, the Service Processor, the L2 cache, the Host-to-PCI bridge, and the main memory.Service Processor 816 also has access to system power resources for powering down information handling device 801. - Peripheral devices and input/output (I/O) devices can be attached to various interfaces (e.g.,
parallel interface 862,serial interface 864,keyboard interface 868, andmouse interface 870 coupled to ISA bus 840. Alternatively, many I/O devices can be accommodated by a super I/O controller (not shown) attached to ISA bus 840. - In order to attach computer system 801 to another computer system to copy files over a network,
LAN card 830 is coupled to PCI bus 810. Similarly, to connect computer system 801 to an ISP to connect to the Internet using a telephone line connection,modem 875 is connected toserial port 864 and PCI-to-ISA Bridge 835. - While the computer system described in
FIG. 8 is capable of executing the processes described herein, this computer system is simply one example of a computer system. Those skilled in the art will appreciate that many other computer system designs are capable of performing the processes described herein. WhileFIG. 8 shows one information handling system that employs processor(s) 800, the information handling system may take many forms. For example, information handling system 801 may take the form of a desktop, server, portable, laptop, notebook, or other form factor computer or data processing system. Information handling system 801 may also take other form factors such as a personal digital assistant (PDA), a gaming device, ATM machine, a portable telephone device, a communication device or other devices that include a processor and memory. - One of the preferred implementations of the invention is a client application, namely, a set of instructions (program code) in a code module that may, for example, be resident in the random access memory of the computer. Until required by the computer, the set of instructions may be stored in another computer memory, for example, in a hard disk drive, or in a removable memory such as an optical disk (for eventual use in a CD ROM) or floppy disk (for eventual use in a floppy disk drive), or downloaded via the Internet or other computer network. Thus, the present invention may be implemented as a computer program product for use in a computer. In addition, although the various methods described are conveniently implemented in a general purpose computer selectively activated or reconfigured by software, one of ordinary skill in the art would also recognize that such methods may be carried out in hardware, in firmware, or in more specialized apparatus constructed to perform the required method steps.
- While particular embodiments of the present invention have been shown and described, it will be obvious to those skilled in the art that, based upon the teachings herein, that changes and modifications may be made without departing from this invention and its broader aspects. Therefore, the appended claims are to encompass within their scope all such changes and modifications as are within the true spirit and scope of this invention. Furthermore, it is to be understood that the invention is solely defined by the appended claims. It will be understood by those with skill in the art that if a specific number of an introduced claim element is intended, such intent will be explicitly recited in the claim, and in the absence of such recitation no such limitation is present. For non-limiting example, as an aid to understanding, the following appended claims contain usage of the introductory phrases “at least one” and “one or more” to introduce claim elements. However, the use of such phrases should not be construed to imply that the introduction of a claim element by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim element to inventions containing only one such element, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an”; the same holds true for the use in the claims of definite articles.
Claims (20)
1. A computer-implemented method comprising:
receiving a request from a user;
retrieving an alternate keypad arrangement corresponding to the user;
displaying the alternate keypad arrangement on a virtual keypad, wherein a plurality of virtual alphanumeric key values are laid out in a non-sequential arrangement;
receiving authentication data resulting from the user selecting a plurality of the virtual alphanumeric keys corresponding to the virtual alphanumeric key values; and
authenticating the request based upon the received authentication data.
2. The method of claim 1 wherein the alternate keypad arrangement includes a virtual keyboard layout, the method further comprising:
displaying a label with each virtual key, wherein the label of each key corresponds to a value registered when the corresponding virtual key is selected by the user.
3. The method of claim 2 further comprising:
configuring the virtual keyboard layout prior to receiving the request from the user, the configuring including:
graphically depicting a first arrangement of the virtual alphanumeric keys;
receiving, from the user, a selection of one or more of the virtual alphanumeric keys and a new position of the selected virtual alphanumeric keys with respect to the other virtual alphanumeric keys;
graphically depicting a second arrangement of the virtual alphanumeric keys resulting from the receiving of selections from the user; and
storing the second arrangement of the virtual alphanumeric keys as the alternate keypad arrangement.
4. The method of claim 1 wherein the alternate keypad arrangement includes a pattern layout, the method further comprising:
displaying a label with each virtual key so that it appears as if the virtual alphanumeric keys are laid out in a sequential arrangement, wherein a plurality of the labels do not correspond to a value registered when the corresponding virtual key is selected by the user.
5. The method of claim 4 further comprising:
configuring the virtual keyboard layout prior to receiving the request from the user, the configuring including:
receiving the value of one or more of the virtual alphanumeric keys from the user so that at least one of the virtual alphanumeric keys has a label that does not correspond to the value corresponding to the virtual alphanumeric key; and
storing the values of the virtual alphanumeric keys as the alternate keypad arrangement.
6. The method of claim 5 wherein the configuring further comprises:
selecting a visual pattern from a plurality of visual patterns; and
assigning the values to the virtual alphanumeric keys based upon the selected pattern.
7. The method of claim 5 further comprising:
receiving a plurality of values corresponding to the user's authentication data and assigning each of the values to a virtual alphanumeric key selected from the plurality of virtual alphanumeric keys; and
assigning an invalid value to the virtual alphanumeric keys that were not selected from the plurality of virtual alphanumeric keys prior to the storing of the values.
8. The method of claim 1 further comprising:
retrieving account information corresponding to user, the account information including a stored authentication data;
comparing the received authentication data with the stored authentication data;
authorizing the request in response to the received authentication data matching the stored authentication data; and
denying the request in response to the received authentication data not matching the stored authentication data.
9. A computer program product comprising:
a computer operable medium having computer readable code, the computer readable code being effective to:
receive a request from a user;
retrieve an alternate keypad arrangement corresponding to the user;
display the alternate keypad arrangement on a virtual keypad, wherein a plurality of virtual alphanumeric keys are laid out in a non-sequential arrangement;
receive authentication data resulting from the user selecting a plurality of the virtual alphanumeric keys; and
authenticate the request based upon the received authentication data.
10. The computer program product of claim 9 wherein the alternate keypad arrangement includes a virtual keyboard layout, the computer program product further comprising computer readable code effective to:
display a label with each virtual key, wherein the label of each key corresponds to a value registered when the corresponding virtual key is selected by the user.
11. The computer program product of claim 10 further comprising computer readable code effective to:
configure the virtual keyboard layout prior to receiving the request from the user, the configuration including computer readable code effective to:
graphically depict a first arrangement of the virtual alphanumeric keys;
receive, from the user, a selection of one or more of the virtual alphanumeric keys and a new position of the selected virtual alphanumeric keys with respect to the other virtual alphanumeric keys;
graphically depict a second arrangement of the virtual alphanumeric keys resulting from the receiving of selections from the user; and
store the second arrangement of the virtual alphanumeric keys as the alternate keypad arrangement.
12. The computer program product of claim 9 wherein the alternate keypad arrangement includes a pattern layout, the computer program product further comprising computer readable code effective to:
display a label with each virtual key so that it appears as if the virtual alphanumeric keys are laid out in a sequential arrangement, wherein a plurality of the labels do not correspond to a value registered when the corresponding virtual key is selected by the user.
13. The computer program product of claim 12 further comprising computer readable code effective to:
configure the virtual keyboard layout prior to receiving the request from the user, the configuration including computer readable code effective to:
receive the value of one or more of the virtual alphanumeric keys from the user so that at least one of the virtual alphanumeric keys has a label that does not correspond to the value corresponding to the virtual alphanumeric key; and
store the values of the virtual alphanumeric keys as the alternate keypad arrangement.
14. The computer program product of claim 13 wherein the configuration further comprises computer readable code effective to:
select a visual pattern from a plurality of visual patterns; and
assign the values to the virtual alphanumeric keys based upon the selected pattern.
15. An information handling system comprising:
one or more processors;
a memory accessible by the processors;
a display screen to display a virtual key pad;
one or more nonvolatile storage devices accessible by the processors; and
a virtual key pad data entry tool, the virtual key pad data entry tool being effective to:
receive a request from a user;
retrieve an alternate keypad arrangement corresponding to the user;
display the alternate keypad arrangement on the virtual keypad, wherein a plurality of virtual alphanumeric keys are laid out in a non-sequential arrangement;
receive authentication data resulting from the user selecting a plurality of the virtual alphanumeric keys; and
authenticate the request based upon the received authentication data.
16. The information handling system of claim 15 wherein the alternate keypad arrangement includes a virtual keyboard layout, the virtual key pad data entry tool being further effective to:
display a label with each virtual key, wherein the label of each key corresponds to a value registered when the corresponding virtual key is selected by the user.
17. The information handling system of claim 16 wherein the virtual key pad data entry tool is further effective to:
configure the virtual keyboard layout prior to receiving the request from the user, the configuration including computer readable code effective to:
graphically depict a first arrangement of the virtual alphanumeric keys;
receive, from the user, a selection of one or more of the virtual alphanumeric keys and a new position of the selected virtual alphanumeric keys with respect to the other virtual alphanumeric keys;
graphically depict a second arrangement of the virtual alphanumeric keys resulting from the receiving of selections from the user; and
store the second arrangement of the virtual alphanumeric keys as the alternate keypad arrangement.
18. The information handling system of claim 15 wherein the alternate keypad arrangement includes a pattern layout, the virtual key pad data entry tool being further effective to:
display a label with each virtual key so that it appears as if the virtual alphanumeric keys are laid out in a sequential arrangement, wherein a plurality of the labels do not correspond to a value registered when the corresponding virtual key is selected by the user.
19. The information handling system of claim 18 wherein the virtual key pad data entry tool is further effective to:
configure the virtual keyboard layout prior to receiving the request from the user, the configuration including computer readable code effective to:
receive the value of one or more of the virtual alphanumeric keys from the user so that at least one of the virtual alphanumeric keys has a label that does not correspond to the value corresponding to the virtual alphanumeric key; and
store the values of the virtual alphanumeric keys as the alternate keypad arrangement.
20. The information handling system of claim 19 wherein the configuration is further effective to:
select a visual pattern from a plurality of visual patterns; and
assign the values to the virtual alphanumeric keys based upon the selected pattern.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/049,315 US20080172735A1 (en) | 2005-10-18 | 2008-03-15 | Alternative Key Pad Layout for Enhanced Security |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/252,513 US7484173B2 (en) | 2005-10-18 | 2005-10-18 | Alternative key pad layout for enhanced security |
US12/049,315 US20080172735A1 (en) | 2005-10-18 | 2008-03-15 | Alternative Key Pad Layout for Enhanced Security |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/252,513 Continuation US7484173B2 (en) | 2005-10-18 | 2005-10-18 | Alternative key pad layout for enhanced security |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080172735A1 true US20080172735A1 (en) | 2008-07-17 |
Family
ID=37949593
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/252,513 Expired - Fee Related US7484173B2 (en) | 2005-10-18 | 2005-10-18 | Alternative key pad layout for enhanced security |
US12/049,315 Abandoned US20080172735A1 (en) | 2005-10-18 | 2008-03-15 | Alternative Key Pad Layout for Enhanced Security |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/252,513 Expired - Fee Related US7484173B2 (en) | 2005-10-18 | 2005-10-18 | Alternative key pad layout for enhanced security |
Country Status (1)
Country | Link |
---|---|
US (2) | US7484173B2 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010011715A2 (en) * | 2008-07-22 | 2010-01-28 | Dynamic Representation Systems, Llc, Part Iv | Keyboard display posing an identification challenge for an automated agent |
US20100242104A1 (en) * | 2009-03-23 | 2010-09-23 | Wankmueller John R | Methods and systems for secure authentication |
US20110054666A1 (en) * | 2009-06-13 | 2011-03-03 | Sadaaki Uesaka | Money handling apparatus and money handling method |
US20110191591A1 (en) * | 2008-07-08 | 2011-08-04 | Li Cheng | Transmitting Information Using Virtual Input Layout |
US8453207B1 (en) * | 2012-07-11 | 2013-05-28 | Daon Holdings Limited | Methods and systems for improving the security of secret authentication data during authentication transactions |
US20130239200A1 (en) * | 2012-03-07 | 2013-09-12 | Chi Mei Communication Systems, Inc. | Electronic device and method for operating locked touch screens |
US20140047374A1 (en) * | 2011-01-26 | 2014-02-13 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for acquiring virtual keyboard |
US20140123274A1 (en) * | 2012-10-31 | 2014-05-01 | International Business Machines Corporation | Password Setting and Verification |
US20140373115A1 (en) * | 2013-06-14 | 2014-12-18 | Research In Motion Limited | Method and system for allowing any language to be used as password |
US8959359B2 (en) | 2012-07-11 | 2015-02-17 | Daon Holdings Limited | Methods and systems for improving the security of secret authentication data during authentication transactions |
WO2015099644A1 (en) * | 2013-12-23 | 2015-07-02 | Intel Corporation | Methods and apparatus to facilitate secure screen input |
CN104794412A (en) * | 2015-05-11 | 2015-07-22 | 深圳天珑无线科技有限公司 | Information input method and device and mobile terminal |
US9262615B2 (en) | 2012-07-11 | 2016-02-16 | Daon Holdings Limited | Methods and systems for improving the security of secret authentication data during authentication transactions |
US9401914B1 (en) * | 2015-06-05 | 2016-07-26 | International Business Machines Corporation | Utilization of multiple keypads for password inputs |
US20160224771A1 (en) * | 2012-07-20 | 2016-08-04 | Licentia Group Limited | Authentication method and system |
WO2017010792A1 (en) * | 2015-07-14 | 2017-01-19 | Samsung Electronics Co., Ltd. | Card registration method for payment service and mobile electronic device implementing the same |
US9769154B2 (en) | 2012-04-25 | 2017-09-19 | Rowem Inc. | Passcode operating system, passcode apparatus, and super-passcode generating method |
US20170353470A1 (en) * | 2016-06-06 | 2017-12-07 | Ca, Inc. | Password setup management |
US10592653B2 (en) | 2015-05-27 | 2020-03-17 | Licentia Group Limited | Encoding methods and systems |
US11216182B2 (en) * | 2020-03-03 | 2022-01-04 | Intel Corporation | Dynamic configuration of a virtual keyboard |
Families Citing this family (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8059100B2 (en) * | 2005-11-17 | 2011-11-15 | Lg Electronics Inc. | Method for allocating/arranging keys on touch-screen, and mobile terminal for use of the same |
JP4341627B2 (en) * | 2006-01-25 | 2009-10-07 | セイコーエプソン株式会社 | Character input on devices without a keyboard |
US8301897B2 (en) * | 2006-08-23 | 2012-10-30 | Cisco Technology, Inc. | Challenge-based authentication protocol |
US20080148186A1 (en) * | 2006-12-18 | 2008-06-19 | Krishnamurthy Sandeep Raman | Secure data entry device and method |
US8925073B2 (en) * | 2007-05-18 | 2014-12-30 | International Business Machines Corporation | Method and system for preventing password theft through unauthorized keylogging |
WO2008148609A1 (en) * | 2007-06-08 | 2008-12-11 | International Business Machines Corporation | Language independent login method and system |
US8712049B2 (en) * | 2007-09-11 | 2014-04-29 | International Business Machines Corporation | System for implementing dynamic pseudorandom keyboard remapping |
US8712050B2 (en) * | 2007-09-11 | 2014-04-29 | International Business Machines Corporation | Method for implementing dynamic pseudorandom keyboard remapping |
EP3882797A1 (en) | 2007-09-24 | 2021-09-22 | Apple Inc. | Embedded authentication systems in an electronic device |
US8600120B2 (en) | 2008-01-03 | 2013-12-03 | Apple Inc. | Personal computing device control using face detection and recognition |
DE102008062260A1 (en) * | 2008-12-15 | 2010-06-17 | Bennet Melcher | Automated teller machine for use in bank for money transaction, has display screen displaying information or input requests, and control unit controlling screen and permitting screen to display key field on part of surface of screen |
US8300023B2 (en) * | 2009-04-10 | 2012-10-30 | Qualcomm Incorporated | Virtual keypad generator with learning capabilities |
US20120047564A1 (en) * | 2009-05-15 | 2012-02-23 | Setcom (Pty) Ltd. | Security system and method |
WO2011013991A2 (en) * | 2009-07-30 | 2011-02-03 | 주식회사 핀스텍 | Password-processing method and system for performing the method |
US8392846B2 (en) | 2010-01-28 | 2013-03-05 | Gilbarco, S.R.L. | Virtual pin pad for fuel payment systems |
KR101044320B1 (en) * | 2010-10-14 | 2011-06-29 | 주식회사 네오패드 | Method for providing background image contents of virtual key input means and its system |
KR101191035B1 (en) * | 2011-03-14 | 2012-10-12 | 유종빈 | Method for inputting password in personal devices. |
US8769624B2 (en) | 2011-09-29 | 2014-07-01 | Apple Inc. | Access control utilizing indirect authentication |
US9002322B2 (en) | 2011-09-29 | 2015-04-07 | Apple Inc. | Authentication with secondary approver |
EP2842069B1 (en) | 2012-04-25 | 2019-12-25 | Southeast Solutions, Inc. | Fraud resistant passcode entry system |
BR112014028774B1 (en) | 2012-05-18 | 2022-05-10 | Apple Inc | Method, electronic device, computer readable storage medium and information processing apparatus |
WO2013179079A1 (en) * | 2012-05-30 | 2013-12-05 | Freescale Semiconductor, Inc. | A pin entry device, a user identification terminal and a method of obtaining a pin code |
US10185957B2 (en) | 2012-06-12 | 2019-01-22 | Square, Inc. | Software pin entry |
US8762876B2 (en) * | 2012-06-21 | 2014-06-24 | Google Inc. | Secure data entry via a virtual keyboard |
US20140028566A1 (en) * | 2012-07-30 | 2014-01-30 | Infosys Limited | Systems and methods for generating a dynamic and localized atm keypad |
JP6068911B2 (en) * | 2012-10-04 | 2017-01-25 | 株式会社野村総合研究所 | Authentication apparatus, authentication method, and authentication program |
US10013138B2 (en) * | 2012-10-22 | 2018-07-03 | Atheer, Inc. | Method and apparatus for secure data entry using a virtual interface |
CN102968602B (en) * | 2012-10-31 | 2016-04-20 | 北京奇虎科技有限公司 | A kind of method to set up of keyboard and device |
US10373149B1 (en) | 2012-11-12 | 2019-08-06 | Square, Inc. | Secure data entry using a card reader with minimal display and input capabilities having a display |
KR101416542B1 (en) * | 2012-12-24 | 2014-07-09 | 주식회사 로웸 | Method for Apparatus for managing passcode |
CN103399704A (en) * | 2013-07-12 | 2013-11-20 | 华为终端有限公司 | Terminal equipment and locking and unlocking method thereof |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9773240B1 (en) | 2013-09-13 | 2017-09-26 | Square, Inc. | Fake sensor input for passcode entry security |
US9558491B2 (en) | 2013-09-30 | 2017-01-31 | Square, Inc. | Scrambling passcode entry interface |
US9613356B2 (en) * | 2013-09-30 | 2017-04-04 | Square, Inc. | Secure passcode entry user interface |
US9928501B1 (en) | 2013-10-09 | 2018-03-27 | Square, Inc. | Secure passcode entry docking station |
US9613353B1 (en) | 2013-12-26 | 2017-04-04 | Square, Inc. | Passcode entry through motion sensing |
US9483763B2 (en) | 2014-05-29 | 2016-11-01 | Apple Inc. | User interface for payments |
CN105373749B (en) | 2014-08-29 | 2018-05-08 | 国际商业机器公司 | Method and apparatus for inputting password |
GB2531710A (en) | 2014-10-24 | 2016-05-04 | Ibm | Keyboard neutral authentication |
US9430635B2 (en) | 2014-10-29 | 2016-08-30 | Square, Inc. | Secure display element |
WO2016069782A1 (en) * | 2014-10-29 | 2016-05-06 | Square, Inc. | Secure display element |
US9483653B2 (en) | 2014-10-29 | 2016-11-01 | Square, Inc. | Secure display element |
US10673622B2 (en) | 2014-11-14 | 2020-06-02 | Square, Inc. | Cryptographic shader in display hardware |
US20170091431A1 (en) * | 2015-09-26 | 2017-03-30 | Qualcomm Incorporated | Secure identification information entry on a small touchscreen display |
US10810298B2 (en) | 2015-10-19 | 2020-10-20 | Ebay Inc. | Password spying protection system |
US10007771B2 (en) | 2016-01-15 | 2018-06-26 | Qualcomm Incorporated | User interface for a mobile device |
US10481786B2 (en) | 2016-01-15 | 2019-11-19 | Qualcomm Incorporated | User interface for enabling access to data of a mobile device |
DK179186B1 (en) | 2016-05-19 | 2018-01-15 | Apple Inc | REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION |
CN106169037A (en) * | 2016-06-30 | 2016-11-30 | 宇龙计算机通信科技(深圳)有限公司 | Method, device and the terminal unlocked |
DK179471B1 (en) | 2016-09-23 | 2018-11-26 | Apple Inc. | Image data for enhanced user interactions |
EP3319069B1 (en) * | 2016-11-02 | 2019-05-01 | Skeyecode | Method for authenticating a user by means of a non-secure terminal |
JP6870485B2 (en) * | 2017-06-07 | 2021-05-12 | 京セラドキュメントソリューションズ株式会社 | Electronics |
KR102185854B1 (en) | 2017-09-09 | 2020-12-02 | 애플 인크. | Implementation of biometric authentication |
JP6736686B1 (en) | 2017-09-09 | 2020-08-05 | アップル インコーポレイテッドApple Inc. | Implementation of biometrics |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
EP4264460A1 (en) | 2021-01-25 | 2023-10-25 | Apple Inc. | Implementation of biometric authentication |
Citations (98)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4498147A (en) * | 1982-11-18 | 1985-02-05 | International Business Machines Corporation | Methodology for transforming a first editable document form prepared with a batch text processing system to a second editable document form usable by an interactive or batch text processing system |
US4564752A (en) * | 1982-12-23 | 1986-01-14 | Ncr Canada Ltd | Concurrent, image-based, reject-re-entry system and method |
US4641274A (en) * | 1982-12-03 | 1987-02-03 | International Business Machines Corporation | Method for communicating changes made to text form a text processor to a remote host |
US5379419A (en) * | 1990-12-07 | 1995-01-03 | Digital Equipment Corporation | Methods and apparatus for accesssing non-relational data files using relational queries |
US5410646A (en) * | 1991-01-31 | 1995-04-25 | Park City Group, Inc. | System and method for creating, processing, and storing forms electronically |
US5497489A (en) * | 1987-05-05 | 1996-03-05 | Menne; David M. | Data storage and retrieval systems having labelling for data |
US5625783A (en) * | 1994-12-13 | 1997-04-29 | Microsoft Corporation | Automated system and method for dynamic menu construction in a graphical user interface |
US5745712A (en) * | 1990-10-31 | 1998-04-28 | Borland International, Inc. | Graphical programming system and methods for assisting a user with creating screen objects on a screen device |
US6052531A (en) * | 1998-03-25 | 2000-04-18 | Symantec Corporation | Multi-tiered incremental software updating |
US6182095B1 (en) * | 1998-04-30 | 2001-01-30 | General Electric Capital Corporation | Document generator |
US6188401B1 (en) * | 1998-03-25 | 2001-02-13 | Microsoft Corporation | Script-based user interface implementation defining components using a text markup language |
US6191797B1 (en) * | 1996-05-22 | 2001-02-20 | Canon Kabushiki Kaisha | Expression tree optimization for processing obscured graphical objects |
US6199204B1 (en) * | 1998-01-28 | 2001-03-06 | International Business Machines Corporation | Distribution of software updates via a computer network |
US6209128B1 (en) * | 1998-06-05 | 2001-03-27 | International Business Machines Corporation | Apparatus and method for providing access to multiple object versions |
US6219698B1 (en) * | 1997-12-19 | 2001-04-17 | Compaq Computer Corporation | Configuring client software using remote notification |
US20020010700A1 (en) * | 2000-06-29 | 2002-01-24 | Wotring Steven C. | System and method for sharing data between relational and hierarchical databases |
US20020010743A1 (en) * | 2000-02-11 | 2002-01-24 | Ryan Mark H. | Method and system for distributing and collecting spreadsheet information |
US20020010746A1 (en) * | 2000-02-14 | 2002-01-24 | Jilk David J. | System, method, apparatus and computer program product for operating a web site by electronic mail |
US6343149B1 (en) * | 1998-05-13 | 2002-01-29 | Oki Electric Industry Co, Ltd. | Document character reading system |
US20020013788A1 (en) * | 1998-11-10 | 2002-01-31 | Pennell Mark E. | System and method for automatically learning information used for electronic form-filling |
US6345278B1 (en) * | 1998-06-04 | 2002-02-05 | Collegenet, Inc. | Universal forms engine |
US20020023113A1 (en) * | 2000-08-18 | 2002-02-21 | Jeff Hsing | Remote document updating system using XML and DOM |
US6351574B1 (en) * | 1998-12-11 | 2002-02-26 | International Business Machines Corporation | Interactive verification of OCRed characters |
US20020032706A1 (en) * | 1999-12-23 | 2002-03-14 | Jesse Perla | Method and system for building internet-based applications |
US20020032590A1 (en) * | 2000-03-28 | 2002-03-14 | International Business Machines Corporation | E-market architecture for supporting multiple roles and reconfigurable business porcesses |
US20020032692A1 (en) * | 2000-09-08 | 2002-03-14 | Atsuhito Suzuki | Workflow management method and workflow management system of controlling workflow process |
US20020035579A1 (en) * | 2000-09-12 | 2002-03-21 | Wang Wayne W. | Transform rule generator for web-based markup languages |
US6367013B1 (en) * | 1995-01-17 | 2002-04-02 | Eoriginal Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US6366907B1 (en) * | 1999-12-15 | 2002-04-02 | Napster, Inc. | Real-time search engine |
US20030004951A1 (en) * | 2000-02-04 | 2003-01-02 | Sandip Chokshi | Automated client-server data validation |
US6505300B2 (en) * | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US20030020746A1 (en) * | 2001-01-31 | 2003-01-30 | Computer Associates Think, Inc. | System and method for dynamically generating a web page |
US20030023641A1 (en) * | 2001-07-27 | 2003-01-30 | Gorman William Phillip | Web page authoring tool |
US20030026507A1 (en) * | 2001-07-31 | 2003-02-06 | International Business Machines Corporation | Sorting images for improved data entry productivity |
US20030048301A1 (en) * | 2001-03-23 | 2003-03-13 | Menninger Anthony Frank | System, method and computer program product for editing supplier site information in a supply chain management framework |
US20030055811A1 (en) * | 2001-09-20 | 2003-03-20 | Ricoh Company, Ltd. | Document controlled workflow systems and methods |
US20030055828A1 (en) * | 2001-03-29 | 2003-03-20 | Koch Kevin S. | Methods for synchronizing on-line and off-line transcript projects |
US20030061567A1 (en) * | 2001-09-05 | 2003-03-27 | International Business Machines Corporation | Apparatus and method for protecting entries in a form using access rights information |
US6549194B1 (en) * | 1999-10-01 | 2003-04-15 | Hewlett-Packard Development Company, L.P. | Method for secure pin entry on touch screen display |
US20040003389A1 (en) * | 2002-06-05 | 2004-01-01 | Microsoft Corporation | Mechanism for downloading software components from a remote source for use by a local software application |
US20040003353A1 (en) * | 2002-05-14 | 2004-01-01 | Joey Rivera | Workflow integration system for automatic real time data management |
US20040003031A1 (en) * | 2002-06-26 | 2004-01-01 | International Business Machines Corporation | Running dynamic web pages off-line with a wizard |
US6675202B1 (en) * | 2000-05-30 | 2004-01-06 | Cary D. Perttunen | Methods, articles and apparatus for providing a browsing session |
US20040010752A1 (en) * | 2002-07-09 | 2004-01-15 | Lucent Technologies Inc. | System and method for filtering XML documents with XPath expressions |
US20040024842A1 (en) * | 2002-07-31 | 2004-02-05 | Sap Aktiengesellschaft | Validation framework for validating markup page input on a client computer |
US20040030991A1 (en) * | 2002-04-22 | 2004-02-12 | Paul Hepworth | Systems and methods for facilitating automatic completion of an electronic form |
US20040039993A1 (en) * | 1999-10-12 | 2004-02-26 | Panagiotis Kougiouris | Automatic formatting and validating of text for a markup language graphical user interface |
US20040039990A1 (en) * | 2002-03-30 | 2004-02-26 | Xorbix Technologies, Inc. | Automated form and data analysis tool |
US6701486B1 (en) * | 1999-07-29 | 2004-03-02 | Grischa Corporation | Method, apparatus, and computer program product for automatic page suppression in forms |
US20040044961A1 (en) * | 2002-08-28 | 2004-03-04 | Leonid Pesenson | Method and system for transformation of an extensible markup language document |
US20040044965A1 (en) * | 2002-04-30 | 2004-03-04 | Haruhiko Toyama | Structured document edit apparatus, structured document edit method, and program product |
US6704906B1 (en) * | 1999-03-27 | 2004-03-09 | Movaris, Inc. | Self-directed routable electronic form system and method |
US20040054966A1 (en) * | 2002-09-16 | 2004-03-18 | International Business Machines Corporation | Real-time method, system and program product for collecting web form data |
US20040059754A1 (en) * | 2002-07-13 | 2004-03-25 | Lauren Barghout | Perceptual information processing system |
US6720985B1 (en) * | 1999-09-17 | 2004-04-13 | Silverbrook Research Pty Ltd | Method and system for object selection |
US20040073868A1 (en) * | 2002-08-27 | 2004-04-15 | Clark Easter | Method and system for compliance forms and compliance forms user interface |
US6725426B1 (en) * | 2000-03-17 | 2004-04-20 | Broadvision, Inc. | Mechanism for translating between word processing documents and XML documents |
US20040078756A1 (en) * | 2002-10-15 | 2004-04-22 | Napper Jonathon Leigh | Method of improving recognition accuracy in form-based data entry systems |
US6728755B1 (en) * | 2000-09-26 | 2004-04-27 | Hewlett-Packard Development Company, L.P. | Dynamic user profiling for usability |
US20040083426A1 (en) * | 2002-10-25 | 2004-04-29 | Smita Sahu | System and method for generating pre-populated forms |
US20050004893A1 (en) * | 2003-07-02 | 2005-01-06 | Sangroniz James M. | Workflow management devices and systems, and workflow assignment and management methods |
US20050005248A1 (en) * | 2000-06-21 | 2005-01-06 | Microsoft Corporation | Task-sensitive methods and systems for displaying command sets |
US20050015732A1 (en) * | 2000-09-14 | 2005-01-20 | Microsoft Corporation | Mapping tool graphical user interface |
US20050015279A1 (en) * | 2003-05-21 | 2005-01-20 | Rucker Donald W. | Service order system and user interface for use in healthcare and other fields |
US6847387B2 (en) * | 1997-01-21 | 2005-01-25 | International Business Machines Corporation | Menu management mechanism that displays menu items based on multiple heuristic factors |
US20050022115A1 (en) * | 2001-05-31 | 2005-01-27 | Roberts Baumgartner | Visual and interactive wrapper generation, automated information extraction from web pages, and translation into xml |
US20050033728A1 (en) * | 2000-06-21 | 2005-02-10 | Microsoft Corporation | Methods, systems, architectures and data structures for delivering software via a network |
US20050038711A1 (en) * | 2003-08-13 | 2005-02-17 | Merwin Marlelo | Method for advertising for sale classroom materials and services |
US20050055627A1 (en) * | 1997-03-07 | 2005-03-10 | Signaturemail.Com, Llc | System and method for personalizing electronic mail messages |
US20050060324A1 (en) * | 2002-11-13 | 2005-03-17 | Jerry Johnson | System and method for creation and maintenance of a rich content or content-centric electronic catalog |
US20050065936A1 (en) * | 2003-09-22 | 2005-03-24 | Thomas Goering | System and method for reusing form elements in a form building application |
US20050066287A1 (en) * | 2003-09-11 | 2005-03-24 | Tattrie Scott I. | User-friendly data binding, such as drag-and-drop data binding in a workflow application |
US20050065933A1 (en) * | 2003-09-22 | 2005-03-24 | Thomas Goering | System and method for customizing form elements in a form building application |
US20050071752A1 (en) * | 2003-09-24 | 2005-03-31 | Marlatt Jane E. | Forms management system |
US20050076049A1 (en) * | 2003-10-02 | 2005-04-07 | Marwan Qubti | Business workflow database and user system |
US20050091285A1 (en) * | 2003-10-23 | 2005-04-28 | Krishnan Prasanna V. | Promotion and demotion techniques to facilitate file property management between object systems |
US20050091305A1 (en) * | 1998-10-23 | 2005-04-28 | General Magic | Network system extensible by users |
US6993714B2 (en) * | 2002-10-03 | 2006-01-31 | Microsoft Corporation | Grouping and nesting hierarchical namespaces |
US20060026534A1 (en) * | 2000-06-21 | 2006-02-02 | Microsoft Corporation | Providing information to computer users |
US6996776B1 (en) * | 2000-05-16 | 2006-02-07 | International Business Machines Corporation | Method and system for SGML-to-HTML migration to XML-based system |
US7010580B1 (en) * | 1999-10-08 | 2006-03-07 | Agile Software Corp. | Method and apparatus for exchanging data in a platform independent manner |
US20060059434A1 (en) * | 2004-09-16 | 2006-03-16 | International Business Machines Corporation | System and method to capture and manage input values for automatic form fill |
US20060069985A1 (en) * | 1999-07-26 | 2006-03-30 | Microsoft Corporation | Parsing extensible markup language (XML) data streams |
US20060069605A1 (en) * | 2004-09-29 | 2006-03-30 | Microsoft Corporation | Workflow association in a collaborative application |
US7024417B1 (en) * | 2002-11-14 | 2006-04-04 | Hyperion Solutions Corporation | Data mining framework using a signature associated with an algorithm |
US7032170B2 (en) * | 2002-06-03 | 2006-04-18 | General Electric Company | Creating data structures from a form file and creating a web page in conjunction with corresponding data structures |
US7036072B1 (en) * | 2001-12-18 | 2006-04-25 | Jgr Acquisition, Inc. | Method and apparatus for declarative updating of self-describing, structured documents |
US7168035B1 (en) * | 2003-06-11 | 2007-01-23 | Microsoft Corporation | Building a view on markup language data through a set of components |
US20070036433A1 (en) * | 2005-08-15 | 2007-02-15 | Microsoft Corporation | Recognizing data conforming to a rule |
US20070050719A1 (en) * | 1999-05-07 | 2007-03-01 | Philip Lui | System and method for dynamic assistance in software applications using behavior and host application models |
US7190376B1 (en) * | 1999-03-16 | 2007-03-13 | Canon Kabushiki Kaisha | Method of compiling compositing expressions for optimised rendering |
US7191394B1 (en) * | 2000-06-21 | 2007-03-13 | Microsoft Corporation | Authoring arbitrary XML documents using DHTML and XSLT |
US20070061706A1 (en) * | 2005-09-14 | 2007-03-15 | Microsoft Corporation | Mapping property hierarchies to schemas |
US20070061467A1 (en) * | 2005-09-15 | 2007-03-15 | Microsoft Corporation | Sessions and session states |
US20070094589A1 (en) * | 2003-03-24 | 2007-04-26 | Microsoft Corporation | Incrementally Designing Electronic Forms and Hierarchical Schemas |
US7316003B1 (en) * | 2002-12-18 | 2008-01-01 | Oracle International Corp. | System and method for developing a dynamic web page |
US7318237B2 (en) * | 1998-10-28 | 2008-01-08 | Bea Systems, Inc. | System and method for maintaining security in a distributed computer network |
US7334178B1 (en) * | 2005-09-09 | 2008-02-19 | Xsigo Systems | Randomized self-checking test system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7992007B2 (en) * | 2002-02-05 | 2011-08-02 | Cardinalcommerce Corporation | Dynamic pin pad for credit/debit/ other electronic transactions |
BR0300474A (en) * | 2003-02-25 | 2004-11-03 | Banco Itau S A | Method of generating a virtual keyboard for entering a user's security password or positive identification |
CA2490873C (en) * | 2003-12-29 | 2009-02-17 | Bruno Lambert | Enhanced pin and password protection system and method |
US7296233B2 (en) * | 2004-05-10 | 2007-11-13 | Microsoft Corporation | Spy-resistant keyboard |
-
2005
- 2005-10-18 US US11/252,513 patent/US7484173B2/en not_active Expired - Fee Related
-
2008
- 2008-03-15 US US12/049,315 patent/US20080172735A1/en not_active Abandoned
Patent Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4498147A (en) * | 1982-11-18 | 1985-02-05 | International Business Machines Corporation | Methodology for transforming a first editable document form prepared with a batch text processing system to a second editable document form usable by an interactive or batch text processing system |
US4641274A (en) * | 1982-12-03 | 1987-02-03 | International Business Machines Corporation | Method for communicating changes made to text form a text processor to a remote host |
US4564752A (en) * | 1982-12-23 | 1986-01-14 | Ncr Canada Ltd | Concurrent, image-based, reject-re-entry system and method |
US5497489A (en) * | 1987-05-05 | 1996-03-05 | Menne; David M. | Data storage and retrieval systems having labelling for data |
US5745712A (en) * | 1990-10-31 | 1998-04-28 | Borland International, Inc. | Graphical programming system and methods for assisting a user with creating screen objects on a screen device |
US5379419A (en) * | 1990-12-07 | 1995-01-03 | Digital Equipment Corporation | Methods and apparatus for accesssing non-relational data files using relational queries |
US5410646A (en) * | 1991-01-31 | 1995-04-25 | Park City Group, Inc. | System and method for creating, processing, and storing forms electronically |
US5625783A (en) * | 1994-12-13 | 1997-04-29 | Microsoft Corporation | Automated system and method for dynamic menu construction in a graphical user interface |
US6367013B1 (en) * | 1995-01-17 | 2002-04-02 | Eoriginal Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US6191797B1 (en) * | 1996-05-22 | 2001-02-20 | Canon Kabushiki Kaisha | Expression tree optimization for processing obscured graphical objects |
US6847387B2 (en) * | 1997-01-21 | 2005-01-25 | International Business Machines Corporation | Menu management mechanism that displays menu items based on multiple heuristic factors |
US20050055627A1 (en) * | 1997-03-07 | 2005-03-10 | Signaturemail.Com, Llc | System and method for personalizing electronic mail messages |
US6219698B1 (en) * | 1997-12-19 | 2001-04-17 | Compaq Computer Corporation | Configuring client software using remote notification |
US6199204B1 (en) * | 1998-01-28 | 2001-03-06 | International Business Machines Corporation | Distribution of software updates via a computer network |
US6188401B1 (en) * | 1998-03-25 | 2001-02-13 | Microsoft Corporation | Script-based user interface implementation defining components using a text markup language |
US6052531A (en) * | 1998-03-25 | 2000-04-18 | Symantec Corporation | Multi-tiered incremental software updating |
US6182095B1 (en) * | 1998-04-30 | 2001-01-30 | General Electric Capital Corporation | Document generator |
US6343149B1 (en) * | 1998-05-13 | 2002-01-29 | Oki Electric Industry Co, Ltd. | Document character reading system |
US6345278B1 (en) * | 1998-06-04 | 2002-02-05 | Collegenet, Inc. | Universal forms engine |
US6209128B1 (en) * | 1998-06-05 | 2001-03-27 | International Business Machines Corporation | Apparatus and method for providing access to multiple object versions |
US6505300B2 (en) * | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US20050091305A1 (en) * | 1998-10-23 | 2005-04-28 | General Magic | Network system extensible by users |
US7318237B2 (en) * | 1998-10-28 | 2008-01-08 | Bea Systems, Inc. | System and method for maintaining security in a distributed computer network |
US20020013788A1 (en) * | 1998-11-10 | 2002-01-31 | Pennell Mark E. | System and method for automatically learning information used for electronic form-filling |
US6351574B1 (en) * | 1998-12-11 | 2002-02-26 | International Business Machines Corporation | Interactive verification of OCRed characters |
US7190376B1 (en) * | 1999-03-16 | 2007-03-13 | Canon Kabushiki Kaisha | Method of compiling compositing expressions for optimised rendering |
US6704906B1 (en) * | 1999-03-27 | 2004-03-09 | Movaris, Inc. | Self-directed routable electronic form system and method |
US20070050719A1 (en) * | 1999-05-07 | 2007-03-01 | Philip Lui | System and method for dynamic assistance in software applications using behavior and host application models |
US20060069985A1 (en) * | 1999-07-26 | 2006-03-30 | Microsoft Corporation | Parsing extensible markup language (XML) data streams |
US6701486B1 (en) * | 1999-07-29 | 2004-03-02 | Grischa Corporation | Method, apparatus, and computer program product for automatic page suppression in forms |
US6720985B1 (en) * | 1999-09-17 | 2004-04-13 | Silverbrook Research Pty Ltd | Method and system for object selection |
US6549194B1 (en) * | 1999-10-01 | 2003-04-15 | Hewlett-Packard Development Company, L.P. | Method for secure pin entry on touch screen display |
US7010580B1 (en) * | 1999-10-08 | 2006-03-07 | Agile Software Corp. | Method and apparatus for exchanging data in a platform independent manner |
US20040039993A1 (en) * | 1999-10-12 | 2004-02-26 | Panagiotis Kougiouris | Automatic formatting and validating of text for a markup language graphical user interface |
US6366907B1 (en) * | 1999-12-15 | 2002-04-02 | Napster, Inc. | Real-time search engine |
US20020032706A1 (en) * | 1999-12-23 | 2002-03-14 | Jesse Perla | Method and system for building internet-based applications |
US20030004951A1 (en) * | 2000-02-04 | 2003-01-02 | Sandip Chokshi | Automated client-server data validation |
US20020010743A1 (en) * | 2000-02-11 | 2002-01-24 | Ryan Mark H. | Method and system for distributing and collecting spreadsheet information |
US20020010746A1 (en) * | 2000-02-14 | 2002-01-24 | Jilk David J. | System, method, apparatus and computer program product for operating a web site by electronic mail |
US6725426B1 (en) * | 2000-03-17 | 2004-04-20 | Broadvision, Inc. | Mechanism for translating between word processing documents and XML documents |
US20020032590A1 (en) * | 2000-03-28 | 2002-03-14 | International Business Machines Corporation | E-market architecture for supporting multiple roles and reconfigurable business porcesses |
US6996776B1 (en) * | 2000-05-16 | 2006-02-07 | International Business Machines Corporation | Method and system for SGML-to-HTML migration to XML-based system |
US6675202B1 (en) * | 2000-05-30 | 2004-01-06 | Cary D. Perttunen | Methods, articles and apparatus for providing a browsing session |
US20070074106A1 (en) * | 2000-06-21 | 2007-03-29 | Microsoft Corporation | Authoring Arbitrary XML Documents Using DHTML and XSLT |
US7191394B1 (en) * | 2000-06-21 | 2007-03-13 | Microsoft Corporation | Authoring arbitrary XML documents using DHTML and XSLT |
US20050033728A1 (en) * | 2000-06-21 | 2005-02-10 | Microsoft Corporation | Methods, systems, architectures and data structures for delivering software via a network |
US20060026534A1 (en) * | 2000-06-21 | 2006-02-02 | Microsoft Corporation | Providing information to computer users |
US20050005248A1 (en) * | 2000-06-21 | 2005-01-06 | Microsoft Corporation | Task-sensitive methods and systems for displaying command sets |
US20020010700A1 (en) * | 2000-06-29 | 2002-01-24 | Wotring Steven C. | System and method for sharing data between relational and hierarchical databases |
US20020023113A1 (en) * | 2000-08-18 | 2002-02-21 | Jeff Hsing | Remote document updating system using XML and DOM |
US20020032692A1 (en) * | 2000-09-08 | 2002-03-14 | Atsuhito Suzuki | Workflow management method and workflow management system of controlling workflow process |
US20020035579A1 (en) * | 2000-09-12 | 2002-03-21 | Wang Wayne W. | Transform rule generator for web-based markup languages |
US20050015732A1 (en) * | 2000-09-14 | 2005-01-20 | Microsoft Corporation | Mapping tool graphical user interface |
US6728755B1 (en) * | 2000-09-26 | 2004-04-27 | Hewlett-Packard Development Company, L.P. | Dynamic user profiling for usability |
US20030020746A1 (en) * | 2001-01-31 | 2003-01-30 | Computer Associates Think, Inc. | System and method for dynamically generating a web page |
US20030048301A1 (en) * | 2001-03-23 | 2003-03-13 | Menninger Anthony Frank | System, method and computer program product for editing supplier site information in a supply chain management framework |
US20030055828A1 (en) * | 2001-03-29 | 2003-03-20 | Koch Kevin S. | Methods for synchronizing on-line and off-line transcript projects |
US20050022115A1 (en) * | 2001-05-31 | 2005-01-27 | Roberts Baumgartner | Visual and interactive wrapper generation, automated information extraction from web pages, and translation into xml |
US20030023641A1 (en) * | 2001-07-27 | 2003-01-30 | Gorman William Phillip | Web page authoring tool |
US20030026507A1 (en) * | 2001-07-31 | 2003-02-06 | International Business Machines Corporation | Sorting images for improved data entry productivity |
US20030061567A1 (en) * | 2001-09-05 | 2003-03-27 | International Business Machines Corporation | Apparatus and method for protecting entries in a form using access rights information |
US20030055811A1 (en) * | 2001-09-20 | 2003-03-20 | Ricoh Company, Ltd. | Document controlled workflow systems and methods |
US7036072B1 (en) * | 2001-12-18 | 2006-04-25 | Jgr Acquisition, Inc. | Method and apparatus for declarative updating of self-describing, structured documents |
US20040039990A1 (en) * | 2002-03-30 | 2004-02-26 | Xorbix Technologies, Inc. | Automated form and data analysis tool |
US20040030991A1 (en) * | 2002-04-22 | 2004-02-12 | Paul Hepworth | Systems and methods for facilitating automatic completion of an electronic form |
US20040044965A1 (en) * | 2002-04-30 | 2004-03-04 | Haruhiko Toyama | Structured document edit apparatus, structured document edit method, and program product |
US20040003353A1 (en) * | 2002-05-14 | 2004-01-01 | Joey Rivera | Workflow integration system for automatic real time data management |
US7032170B2 (en) * | 2002-06-03 | 2006-04-18 | General Electric Company | Creating data structures from a form file and creating a web page in conjunction with corresponding data structures |
US20040003389A1 (en) * | 2002-06-05 | 2004-01-01 | Microsoft Corporation | Mechanism for downloading software components from a remote source for use by a local software application |
US20040003031A1 (en) * | 2002-06-26 | 2004-01-01 | International Business Machines Corporation | Running dynamic web pages off-line with a wizard |
US20040010752A1 (en) * | 2002-07-09 | 2004-01-15 | Lucent Technologies Inc. | System and method for filtering XML documents with XPath expressions |
US20040059754A1 (en) * | 2002-07-13 | 2004-03-25 | Lauren Barghout | Perceptual information processing system |
US20040024842A1 (en) * | 2002-07-31 | 2004-02-05 | Sap Aktiengesellschaft | Validation framework for validating markup page input on a client computer |
US20040073868A1 (en) * | 2002-08-27 | 2004-04-15 | Clark Easter | Method and system for compliance forms and compliance forms user interface |
US20040044961A1 (en) * | 2002-08-28 | 2004-03-04 | Leonid Pesenson | Method and system for transformation of an extensible markup language document |
US20040054966A1 (en) * | 2002-09-16 | 2004-03-18 | International Business Machines Corporation | Real-time method, system and program product for collecting web form data |
US6993714B2 (en) * | 2002-10-03 | 2006-01-31 | Microsoft Corporation | Grouping and nesting hierarchical namespaces |
US20040078756A1 (en) * | 2002-10-15 | 2004-04-22 | Napper Jonathon Leigh | Method of improving recognition accuracy in form-based data entry systems |
US20040083426A1 (en) * | 2002-10-25 | 2004-04-29 | Smita Sahu | System and method for generating pre-populated forms |
US20050060324A1 (en) * | 2002-11-13 | 2005-03-17 | Jerry Johnson | System and method for creation and maintenance of a rich content or content-centric electronic catalog |
US7024417B1 (en) * | 2002-11-14 | 2006-04-04 | Hyperion Solutions Corporation | Data mining framework using a signature associated with an algorithm |
US7316003B1 (en) * | 2002-12-18 | 2008-01-01 | Oracle International Corp. | System and method for developing a dynamic web page |
US20070094589A1 (en) * | 2003-03-24 | 2007-04-26 | Microsoft Corporation | Incrementally Designing Electronic Forms and Hierarchical Schemas |
US20050015279A1 (en) * | 2003-05-21 | 2005-01-20 | Rucker Donald W. | Service order system and user interface for use in healthcare and other fields |
US7168035B1 (en) * | 2003-06-11 | 2007-01-23 | Microsoft Corporation | Building a view on markup language data through a set of components |
US20050004893A1 (en) * | 2003-07-02 | 2005-01-06 | Sangroniz James M. | Workflow management devices and systems, and workflow assignment and management methods |
US20050038711A1 (en) * | 2003-08-13 | 2005-02-17 | Merwin Marlelo | Method for advertising for sale classroom materials and services |
US20050066287A1 (en) * | 2003-09-11 | 2005-03-24 | Tattrie Scott I. | User-friendly data binding, such as drag-and-drop data binding in a workflow application |
US20050065933A1 (en) * | 2003-09-22 | 2005-03-24 | Thomas Goering | System and method for customizing form elements in a form building application |
US20050065936A1 (en) * | 2003-09-22 | 2005-03-24 | Thomas Goering | System and method for reusing form elements in a form building application |
US20050071752A1 (en) * | 2003-09-24 | 2005-03-31 | Marlatt Jane E. | Forms management system |
US20050076049A1 (en) * | 2003-10-02 | 2005-04-07 | Marwan Qubti | Business workflow database and user system |
US20050091285A1 (en) * | 2003-10-23 | 2005-04-28 | Krishnan Prasanna V. | Promotion and demotion techniques to facilitate file property management between object systems |
US20060059434A1 (en) * | 2004-09-16 | 2006-03-16 | International Business Machines Corporation | System and method to capture and manage input values for automatic form fill |
US20060069605A1 (en) * | 2004-09-29 | 2006-03-30 | Microsoft Corporation | Workflow association in a collaborative application |
US20070036433A1 (en) * | 2005-08-15 | 2007-02-15 | Microsoft Corporation | Recognizing data conforming to a rule |
US7334178B1 (en) * | 2005-09-09 | 2008-02-19 | Xsigo Systems | Randomized self-checking test system |
US20070061706A1 (en) * | 2005-09-14 | 2007-03-15 | Microsoft Corporation | Mapping property hierarchies to schemas |
US20070061467A1 (en) * | 2005-09-15 | 2007-03-15 | Microsoft Corporation | Sessions and session states |
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8484480B2 (en) | 2008-07-08 | 2013-07-09 | Alibaby Group Holding Limited | Transmitting information using virtual input layout |
US20110191591A1 (en) * | 2008-07-08 | 2011-08-04 | Li Cheng | Transmitting Information Using Virtual Input Layout |
WO2010011715A3 (en) * | 2008-07-22 | 2010-04-08 | Dynamic Representation Systems, Llc, Part Iv | Keyboard display posing an identification challenge for an automated agent |
WO2010011715A2 (en) * | 2008-07-22 | 2010-01-28 | Dynamic Representation Systems, Llc, Part Iv | Keyboard display posing an identification challenge for an automated agent |
US20100242104A1 (en) * | 2009-03-23 | 2010-09-23 | Wankmueller John R | Methods and systems for secure authentication |
US20110054666A1 (en) * | 2009-06-13 | 2011-03-03 | Sadaaki Uesaka | Money handling apparatus and money handling method |
US8544728B2 (en) * | 2009-07-13 | 2013-10-01 | Glory Ltd. | Money handling apparatus and money handling method |
US20140047374A1 (en) * | 2011-01-26 | 2014-02-13 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for acquiring virtual keyboard |
US9081486B2 (en) * | 2011-01-26 | 2015-07-14 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for acquiring virtual keyboard |
US20130239200A1 (en) * | 2012-03-07 | 2013-09-12 | Chi Mei Communication Systems, Inc. | Electronic device and method for operating locked touch screens |
US9769154B2 (en) | 2012-04-25 | 2017-09-19 | Rowem Inc. | Passcode operating system, passcode apparatus, and super-passcode generating method |
US8453207B1 (en) * | 2012-07-11 | 2013-05-28 | Daon Holdings Limited | Methods and systems for improving the security of secret authentication data during authentication transactions |
US9262615B2 (en) | 2012-07-11 | 2016-02-16 | Daon Holdings Limited | Methods and systems for improving the security of secret authentication data during authentication transactions |
US9213811B2 (en) | 2012-07-11 | 2015-12-15 | Daon Holdings Limited | Methods and systems for improving the security of secret authentication data during authentication transactions |
US8959359B2 (en) | 2012-07-11 | 2015-02-17 | Daon Holdings Limited | Methods and systems for improving the security of secret authentication data during authentication transactions |
US11194892B2 (en) | 2012-07-20 | 2021-12-07 | Licentia Group Limited | Authentication method and system |
US10565359B2 (en) | 2012-07-20 | 2020-02-18 | Licentia Group Limited | Authentication method and system |
US10366215B2 (en) * | 2012-07-20 | 2019-07-30 | Licentia Group Limited | Authentication method and system |
US11048783B2 (en) | 2012-07-20 | 2021-06-29 | Licentia Group Limited | Authentication method and system |
US11048784B2 (en) | 2012-07-20 | 2021-06-29 | Licentia Group Limited | Authentication method and system |
US20160224771A1 (en) * | 2012-07-20 | 2016-08-04 | Licentia Group Limited | Authentication method and system |
CN103793659A (en) * | 2012-10-31 | 2014-05-14 | 国际商业机器公司 | Method and system for setting password and method and system for verifying password |
US20140123274A1 (en) * | 2012-10-31 | 2014-05-01 | International Business Machines Corporation | Password Setting and Verification |
US20140380463A1 (en) * | 2012-10-31 | 2014-12-25 | International Business Machines Corporation | Password setting and verification |
US20140373115A1 (en) * | 2013-06-14 | 2014-12-18 | Research In Motion Limited | Method and system for allowing any language to be used as password |
US10068085B2 (en) * | 2013-06-14 | 2018-09-04 | Blackberry Limited | Method and system for allowing any language to be used as password |
WO2015099644A1 (en) * | 2013-12-23 | 2015-07-02 | Intel Corporation | Methods and apparatus to facilitate secure screen input |
US9514304B2 (en) | 2013-12-23 | 2016-12-06 | Intel Corporation | Methods and apparatus to facilitate secure screen input |
US9817964B2 (en) | 2013-12-23 | 2017-11-14 | Intel Corporation | Methods and apparatus to facilitate secure screen input |
CN104794412A (en) * | 2015-05-11 | 2015-07-22 | 深圳天珑无线科技有限公司 | Information input method and device and mobile terminal |
US11048790B2 (en) | 2015-05-27 | 2021-06-29 | Licentia Group Limited | Authentication methods and systems |
US11036845B2 (en) | 2015-05-27 | 2021-06-15 | Licentia Group Limited | Authentication methods and systems |
US10740449B2 (en) | 2015-05-27 | 2020-08-11 | Licentia Group Limited | Authentication methods and systems |
US10592653B2 (en) | 2015-05-27 | 2020-03-17 | Licentia Group Limited | Encoding methods and systems |
US9565193B2 (en) | 2015-06-05 | 2017-02-07 | International Business Machines Corporation | Utilization of multiple keypads for password inputs |
US9401914B1 (en) * | 2015-06-05 | 2016-07-26 | International Business Machines Corporation | Utilization of multiple keypads for password inputs |
US9411438B1 (en) * | 2015-06-05 | 2016-08-09 | International Business Machines Corporation | Utilization of multiple keypads for password inputs |
US9521152B1 (en) * | 2015-06-05 | 2016-12-13 | International Business Machines Corporation | Utilization of multiple keypads for password inputs |
CN106357600A (en) * | 2015-07-14 | 2017-01-25 | 三星电子株式会社 | Card registration method for payment service and mobile electronic device implementing the same |
WO2017010792A1 (en) * | 2015-07-14 | 2017-01-19 | Samsung Electronics Co., Ltd. | Card registration method for payment service and mobile electronic device implementing the same |
US10075448B2 (en) * | 2016-06-06 | 2018-09-11 | Ca, Inc. | Password setup management |
US20170353470A1 (en) * | 2016-06-06 | 2017-12-07 | Ca, Inc. | Password setup management |
US11216182B2 (en) * | 2020-03-03 | 2022-01-04 | Intel Corporation | Dynamic configuration of a virtual keyboard |
US11789607B2 (en) | 2020-03-03 | 2023-10-17 | Intel Corporation | Dynamic configuration of a virtual keyboard |
Also Published As
Publication number | Publication date |
---|---|
US20070089164A1 (en) | 2007-04-19 |
US7484173B2 (en) | 2009-01-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7484173B2 (en) | Alternative key pad layout for enhanced security | |
US9460278B2 (en) | Automatic PIN creation using password | |
AU2012328082B2 (en) | Abstracted and randomized one-time passwords for transactional authentication | |
EP2856380B1 (en) | Method and system for secure user identification | |
US9716706B2 (en) | Systems and methods for providing a covert password manager | |
US20080066167A1 (en) | Password based access including error allowance | |
WO2003088014A2 (en) | User authentication for computer systems | |
US8117652B1 (en) | Password input using mouse clicking | |
US8881267B2 (en) | Systems and methods for supporting pre-boot log in | |
CN112955885A (en) | Multi-factor based password authentication | |
US20110119746A1 (en) | Identity Verification Method and Network Device for Implementing the Same | |
CN1409835A (en) | Computerised device for accrediting data application to software and service | |
JP4758175B2 (en) | User authentication method and user authentication program | |
KR20120107610A (en) | The apparatus for verifying user in portable appliance and the method thereof | |
JP5587401B2 (en) | Keyboard input data security system and method | |
JP6493973B2 (en) | Character string input method and program | |
KR102673785B1 (en) | Method and system for authenticating user | |
WO2022001707A1 (en) | Method and system for receiving a secure input, using a secure input means | |
JP2006227944A (en) | Communication assist system | |
JP2001312707A (en) | Storage method for user profile, storage medium, information terminal equipment, and method for accessing information on storage medium | |
JPS60214075A (en) | Personal identification system | |
KR20020086816A (en) | Security System Using Time-Interval Of Password Key Stroke And Operating Method Thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |