Virtual keyboard
First Claim
Patent Images
1. Method of providing access to electronic services via a secure access code, characterized by comprising the steps of:
- displaying, via graphical user interface, a predetermined number of keys which are used to input the secure access code;
associating at least two variables with each individual key;
selecting, by the user, a key which corresponds to at least one of the variables.
1 Assignment
0 Petitions
Accused Products
Abstract
A virtual keyboard for typing the safety password, comprising the steps of displaying a multiple key keyboard; generating and assigning a predetermined number of characters to each one of the keys, such that the user selects a key which is associated with one of the predetermined number of characters; and displaying the predetermined number of characters in relative proximity to each one of the keys.
-
Citations
31 Claims
-
1. Method of providing access to electronic services via a secure access code, characterized by comprising the steps of:
-
displaying, via graphical user interface, a predetermined number of keys which are used to input the secure access code;
associating at least two variables with each individual key;
selecting, by the user, a key which corresponds to at least one of the variables. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A virtual keyboard comprising:
-
a predetermined number of keys for inputting an access code; and
a predetermined number of variables associated with each key, wherein the user selects a key based on whether the variables correspond with some portion of the user'"'"'s access code. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A keypad, comprising:
-
a plurality of keys, such that a user selects with the plurality of keys in such a manner as to input information; and
a plurality of characters associated with each key of the plurality of keys, wherein the plurality of characters are representative individual elements of a secret codeword.
-
-
22. A method of providing secure access, comprising the steps of:
-
providing a plurality of keys by which a user can input a secure code; and
associating two or more variables with each of the plurality of keys, such that a user selects a key in accordance with the value of the variables, wherein the value of the variable are determined from a predetermined set of combinations, and that a user is assigned a random set of variable values upon the use of the machine.
-
-
23. A secure access terminal comprising;
-
a graphical user interface, which allows a user to access secured electronic information, wherein the graphic user interface displays five keys, each key having at least two variables associated there with; and
assigning the variables from a group of possible combinations of variables and associating those variable with each of the keys, such that the user gains the right to perform certain transactions by selecting keys which have assigned variables that correspond to a secret code.
-
-
24. A method for providing access to a secured terminal comprising the steps of:
-
inserting a bank issued card into a terminal to execute a transaction; and
displaying a selected keyboard to a user and requesting a personal identification number, such that the selected keyboard includes a predetermined number of keys, each individual key having at least two variables associated therewith. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31)
-
Specification