Middleware sign-on
First Claim
1. A computer implemented method for middleware sign-on, the computer implemented method comprising:
- displaying a soft keyboard and a scroll area that is separate from the soft keyboard, wherein the scroll area includes coordinates associated with the soft keyboard;
displaying a selector, wherein the selector moves with respect to the soft keyboard in response to cursor movement within the scroll area;
generating and storing valid data key selections in response to a selection of a data key in the soft keyboard using the selector;
generating and storing false data key selections in response to the cursor movement in the scroll area, wherein the valid data key selections and the false data key selections are stored in a same storage area to form protected data; and
processing the protected data in response to a user request.
1 Assignment
0 Petitions
Accused Products
Abstract
An application for middleware sign-on is provided. A secure engine in the middleware generates a soft keyboard and scroll area. The scroll area includes coordinates associated with the soft keyboard. A selector is generated overlaid on the soft keyboard. The selector moves with respect to the soft keyboard in response to cursor movement within the scroll area. As the cursor movement causes the selector, the secure engine generates and stores false data key selections. When a user selects a data key with the selector, the middleware generates and stores the valid data key entry. The middleware stores both the valid data key selections and the false data key selections in the same area. Once the user submits his completed selection, or data, the middleware processes the data.
-
Citations
9 Claims
-
1. A computer implemented method for middleware sign-on, the computer implemented method comprising:
-
displaying a soft keyboard and a scroll area that is separate from the soft keyboard, wherein the scroll area includes coordinates associated with the soft keyboard; displaying a selector, wherein the selector moves with respect to the soft keyboard in response to cursor movement within the scroll area; generating and storing valid data key selections in response to a selection of a data key in the soft keyboard using the selector; generating and storing false data key selections in response to the cursor movement in the scroll area, wherein the valid data key selections and the false data key selections are stored in a same storage area to form protected data; and processing the protected data in response to a user request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification