Graphical password methodology for a microprocessor device accepting non-alphanumeric user input
DCFirst Claim
1. In a computing device having a set of input keys including non-alphanumeric keys, a method for controlling access to the computing device, the method comprising:
- recording a user-provided sequence of non-alphanumeric key strokes from said non-alphanumeric keys;
storing the recorded sequence of non-alphanumeric key strokes as a graphical password, so that said graphical password itself comprises a sequence of non-alphanumeric key strokes from the set of input keys;
upon request from a user for access to the computing device, prompting the user to enter the graphical password; and
providing access to the computing device only if the user enters a sequence of key strokes which matches that of the sequence of non-alphanumeric key strokes stored as the graphical password.
5 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A portable computing device or “information appliance” having terse user input (e.g., limit set of keys) is provided with a user interface for navigating user data. Application programs, which are provided for user operation of the device, are implemented as separate modules controlled by a module selector. The module selector serves as a user interface or shell representing the top-level or “home” display presented to a user. The module selector presents the user with selection icons for navigating to different applications or modules of functionality. The user interface implements a “single-click” style of button operation, so that users can associate each button with a particular task for a given program context. In addition to the single-click style, “click consistency” is imposed for each button. Generally, the same buttons are used over and over again to perform their respective tasks, even though the user has navigated to different modules of an application, so that the user is presented with a consistent interface or metaphor which can be easily mastered. The user interface supports in a small form factor device the browser-style navigation that users have become accustomed to on desktop computers (e.g., using Web browsers). More particularly, the interface supports up, down, forward, and backward navigation for allowing a user to “drill down” to “drill across” his or her data. This allows the user to find a data item (link) of interest and then drill down into it. Once at the appropriate level, the user can then easily select the particular item of interest. Further, once the user has selected or entered an item, the system provides the ability for the user to return to “home” with a single button click. In this manner, the present invention provides an interface allowing browser-style navigation in a device having a terse set of input keys.
-
Citations
42 Claims
-
1. In a computing device having a set of input keys including non-alphanumeric keys, a method for controlling access to the computing device, the method comprising:
-
recording a user-provided sequence of non-alphanumeric key strokes from said non-alphanumeric keys;
storing the recorded sequence of non-alphanumeric key strokes as a graphical password, so that said graphical password itself comprises a sequence of non-alphanumeric key strokes from the set of input keys;
upon request from a user for access to the computing device, prompting the user to enter the graphical password; and
providing access to the computing device only if the user enters a sequence of key strokes which matches that of the sequence of non-alphanumeric key strokes stored as the graphical password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
recording a user-provided sequence of keystrokes entered from a keypad comprising a terse set of input keys.
-
-
7. The method of claim 1, wherein said recording step includes:
recording a user-provided sequence of keystrokes entered from a keypad comprising a set of at least four input keys.
-
8. The method of claim 1, wherein said recording step includes:
recording a user-provided sequence of keystrokes entered from a keypad comprising a set of no more than five input keys.
-
9. The method of claim 1, wherein said recording step includes:
recording a user-provided sequence of keystrokes entered from a keypad comprising navigation keys.
-
10. The method of claim 1, wherein said prompting step includes:
displaying a password entry screen for facilitating password entry by a user.
-
11. The method of claim 10, further comprising:
displaying the password entry screen when the computing device is first powered up.
-
12. The method of claim 10, wherein whether the password entry screen is display when the device is first powered up is configurable by a user.
-
13. The method of claim 1, wherein access to information on the device is blocked when the user enters a sequence of key strokes that does not match that of the sequence of non-alphanumeric key strokes stored as the graphical password.
-
14. The method of claim 1, wherein said stored graphical password comprises information indicating a particular sequence of non-alphanumeric key strokes.
-
15. In a computing device capable of receiving user input, a method for securing information stored on the computing device, the method comprising:
-
receiving a particular sequence of user input, of non-alphanumeric key strokes from non-alphanumeric keys;
storing said particular sequence of user input as a graphical password for controlling access to said information on the computing device, so that said graphical password itself comprises a sequence of key strokes from said non-alphanumeric keys;
upon an attempt to access said information on the computing device, requiring subsequent input of a sequence of user input;
attempting to verify the sequence of user input subsequently inputted based on the particular sequence of user input previously stored as said graphical password; and
providing access to said information on the computing device if the sequence of user input subsequently inputted is verified. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
receiving a user-provided sequence of keystrokes entered from a keypad comprising a terse set of input keys.
-
-
23. The method of claim 15, wherein said receiving step includes:
receiving a user-provided sequence of keystrokes entered from a keypad comprising a set of at least four input keys.
-
24. The method of claim 15, wherein said receiving step includes:
receiving a user-provided sequence of keystrokes entered from a keypad comprising a set of no more than five input keys.
-
25. The method of claim 15, wherein said receiving step includes:
receiving a user-provided sequence of keystrokes entered from a keypad comprising navigation keys.
-
26. The method of claim 15, wherein said requiring step includes:
displaying a password entry screen requiring password entry by a user.
-
27. The method of claim 26, further comprising:
displaying the password entry screen when the computing device is first powered up.
-
28. The method of claim 26, wherein whether the password entry screen is display when the device is first powered up is configurable by a user.
-
29. The method of claim 15, wherein access to information on the device is blocked when the user enters a sequence of input that does not match that of the stored sequence of input.
-
30. The method of claim 15, wherein said stored sequence of input comprises a graphical password having information indicating a particular sequence having at least some key strokes of the non-alphanumeric keys.
-
31. An electronic device providing secured access to information stored on the device comprising:
-
a keypad allowing a user to enter a sequence of non-alphanumeric key stokes;
a memory for storing a particular sequence of user key strokes for controlling access to said information on the device, said particular sequence of user key strokes comprising a graphical password including at least some non-alphanumeric key strokes that is stored in said memory; and
program logic requiring subsequent input of an identical sequence of user key strokes that matches said graphical password in order to gain access to said information on the device. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification