Method, system and apparatus for secure data editing
First Claim
1. A method for secure data editing, comprising:
- receiving a data entry including a plurality of characters in a first data field, the data entry being specified by a user interface;
displaying the entire data entry for a first period of time;
determining whether a period of inactivity on the user interface exceeds a threshold;
determining whether the user interface has received a change focus request;
determining whether the user interface has received a manual lock request;
triggering a security event in response to at least one of the period of inactivity on the user interface exceeds the threshold, the user interface has received a change focus request, and the user interface has received a manual lock request;
obscuring the data entry for a second period of time following the first period of time, the data entry being obscured upon the triggering of the security event; and
displaying a validation character within the data entry during the second period of time.
11 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and apparatus for secure data editing is disclosed. A data field receives focus to accept a data entry from a user. The user inputs a data entry into the data field via a user interface. A determination is made of whether a manual lock event, a change focus event, or a time out event has triggered based on the user'"'"'s action or inaction with the user interface. Upon the triggering of a manual lock event, a change focus event, or a time out event, the data entry in the data field is obscured. The user interface may display a data entry with a validation character which provides a reference point within the data entry while the data entry is displayed and while the data entry is obscured. The system may allow a user to have a specified function set based on his user access level.
-
Citations
45 Claims
-
1. A method for secure data editing, comprising:
-
receiving a data entry including a plurality of characters in a first data field, the data entry being specified by a user interface; displaying the entire data entry for a first period of time; determining whether a period of inactivity on the user interface exceeds a threshold; determining whether the user interface has received a change focus request; determining whether the user interface has received a manual lock request; triggering a security event in response to at least one of the period of inactivity on the user interface exceeds the threshold, the user interface has received a change focus request, and the user interface has received a manual lock request; obscuring the data entry for a second period of time following the first period of time, the data entry being obscured upon the triggering of the security event; and displaying a validation character within the data entry during the second period of time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for secure data editing, comprising:
-
receiving a user identifier, the user identifier being specified by a user interface; determining a user access level associated with the user identifier, wherein at least two user access levels exist and each user access level provides a different set of user functions; receiving a data entry in a first data field, the data entry being specified by the user interface; displaying the data entry including a plurality of characters for a first period of time; determining whether a period of inactivity on the user interface exceeds a threshold; determining whether the user interface has received a change focus request; determining whether the user interface has received a manual lock request; triggering a security event in response to at least one of the period of inactivity on the user interface exceeds the threshold, the user interface has received a change focus request, and the user interface has received a manual lock request; and obscuring the data entry for a second period of time following the first period of time, the data entry being obscured upon the triggering of the security event. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. An apparatus for secure data editing, comprising:
-
a processor; a user interface operatively coupled with the processor; and a storage device, the storage device storing a software program structured to cause the processor to; receive a data entry in a first data field, the data entry being specified by the user interface; display the data entry including a plurality of characters for a first period of time; determine whether a period of inactivity on the user interface exceeds a threshold; determine whether the user interface has received a change focus request; determine whether the user interface has received a manual lock request; trigger a security event in response to at least one of the period of inactivity on the user interface exceeds the threshold, the user interface has received a change focus request, and the user interface has received a manual lock request; obscure the data entry for a second period of time following the first period of time, the data entry being obscured upon the triggering of the security event; and display a validation character within the data entry during the second period of time.
-
-
41. An apparatus for secure data editing, comprising:
-
a processor; a user interface operatively coupled with the processor; and a storage device, the storage device storing a software program structured to cause the processor to; receive a user identifier, the user identifier being specified by a user interface; determine a user access level associated with the user identifier, wherein at least two user access levels exist and each user access level provides a different set of user functions; receive a data entry in a first data field, the data entry being specified by the user interface; display the data entry including a plurality of characters for a first period of time; determine whether a period of inactivity on the user interface exceeds a threshold; determine whether the user interface has received a change focus request; determine whether the user interface has received a manual lock request; trigger a security event in response to at least one of the period of inactivity on the user interface exceeds the threshold, the user interface has received a change focus request, and the user interface has received a manual lock request; and obscure the data entry for a second period of time following the first period of time, the data entry being obscured upon the triggering of the security event. - View Dependent Claims (42)
-
-
43. A non-transitory machine readable medium storing instructions structured to cause an apparatus to:
-
receive a data entry in a first data field, the data entry being specified by the user interface; display the data entry including a plurality of characters for a first period of time; determine whether a period of inactivity on the user interface exceeds a threshold; determine whether the user interface has received a change focus request; determine whether the user interface has received a manual lock request; trigger a security event in response to at least one of the period of inactivity on the user interface exceeds the threshold, the user interface has received a change focus request, and the user interface has received a manual lock request; obscure the data entry for a second period of time following the first period of time, the data entry being obscured upon the triggering of the security event; and display a validation character within the data entry during the second period of time.
-
-
44. A non-transitory machine readable medium storing instructions structured to cause an apparatus to:
-
receive a user identifier, the user identifier being specified by a user interface; determine a user access level associated with the user identifier, wherein at least two user access levels exist and each user access level provides a different set of user functions; receive a data entry in a first data field, the data entry being specified by the user interface; display the data entry including a plurality of characters for a first period of time; determine whether a period of inactivity on the user interface exceeds a threshold; determine whether the user interface has received a change focus request; determine whether the user interface has received a manual lock request; trigger a security event in response to at least one of the period of inactivity on the user interface exceeds the threshold, the user interface has received a change focus request, and the user interface has received a manual lock request; and obscure the data entry for a second period of time following the first period of time, the data entry being obscured upon the triggering of the security event. - View Dependent Claims (45)
-
Specification