METHODS AND SYSTEMS FOR DATA ENTRY
First Claim
1. A method comprising:
- storing a plurality of data within a first device comprising at least a first microprocessor and a memory, the plurality of data representing user credentials relating to access upon at least one second device;
transmitting a signal from the first device to a third device comprising at least a second microprocessor via a communications interface according to a first predetermined standard, the signal comprising a predetermined subset of data within the plurality of data; and
in dependence upon the predetermined subset of data within the signal received at the third device generating signals with the second microprocessor to mimic user actions with at least one of a keyboard and a cursor controller to provide user credential entry into data entry fields upon the at least one second device.
1 Assignment
0 Petitions
Accused Products
Abstract
User identities, password, etc. represent the barrier between a user'"'"'s confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password.
-
Citations
20 Claims
-
1. A method comprising:
-
storing a plurality of data within a first device comprising at least a first microprocessor and a memory, the plurality of data representing user credentials relating to access upon at least one second device; transmitting a signal from the first device to a third device comprising at least a second microprocessor via a communications interface according to a first predetermined standard, the signal comprising a predetermined subset of data within the plurality of data; and in dependence upon the predetermined subset of data within the signal received at the third device generating signals with the second microprocessor to mimic user actions with at least one of a keyboard and a cursor controller to provide user credential entry into data entry fields upon the at least one second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
determining upon a first device entry location and entry type for at least one field of a plurality of fields within at least one of a form, an entry screen, and a login screen, the entry location and entry type being decoded from a visual code imaged and captured by the first device from the display of a second device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A method comprising:
-
storing a plurality of data within a first device comprising at least a first microprocessor and a memory, the plurality of data representing first user credentials; transmitting a signal from the first device to a third device comprising at least a second microprocessor via a communications interface according to a first predetermined standard, the signal comprising a predetermined subset of data within the plurality of data; and in dependence upon the predetermined subset of data within the signal received at the third device generating signals with the second microprocessor to provide a second user credential to the at least one second device. - View Dependent Claims (18, 19, 20)
-
Specification