Security interface for a mobile device
First Claim
1. A method of controlling user access to data on a mobile telecommunication device, the mobile telecommunication device having a wireless transceiver for receiving and transmitting data, a user interface including a display and a memory coupled to the user interface for storing secure data and non-secure data received via the wireless transceiver, the method comprising the steps of:
- periodically receiving at the mobile telecommunication device, non-secure data and secure data from one or more data sources via a wireless network;
distinguishing received non-secure data from received secure data;
segmenting the display of the user interface into a status area and a security interface area;
automatically displaying on the mobile telecommunication device, the received non-secure data on the security interface area without authenticating user access to the non-secure data;
while displaying the non-secure data, automatically displaying an indication that secure data has been received from the one or more data sources on the status area without authenticating user access to the secure data;
subsequent to displaying the indication, while displaying the non-secure data, authenticating, at the security interface area, user access to the secure data in response to an authentication request;
selectively displaying on the mobile telecommunication device the secure data on the display of the user interface in response to successful authentication;
redisplaying on the mobile telecommunication device the non-secure data on the display of the user interface following expiration of an inactivity time period such that the secure data is no longer displayed on the display; and
selectively displaying on the mobile telecommunication device additional non-secure data that is related to the previously displayed non-secure data, the displaying of the additional non-secure data occurring in response to transmission of a user request for the additional non-secure data to a data source via the wireless transceiver.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and device are described which provide a security interface, preferably for a mobile device. The security interface provides user-selectable non-secure data that is displayed without the need for a password. The non-secure data is preferably updated on a regular basis, and can be obtained from different sources, as selected by a user. The secure data can be accessed after successful authentication, such as a positive password verification. Additional non-secure data, related to the displayed non-secure data, can preferably be accessed, with or without a need for a password. An indication can be provided to inform a user that secure data has been updated, without the need to access such secure data. The security interface is preferably enabled after a predetermined timeout period. The interface allows the device to operate in three data access states: a controlled access state; a verification state; and a full access state.
-
Citations
20 Claims
-
1. A method of controlling user access to data on a mobile telecommunication device, the mobile telecommunication device having a wireless transceiver for receiving and transmitting data, a user interface including a display and a memory coupled to the user interface for storing secure data and non-secure data received via the wireless transceiver, the method comprising the steps of:
-
periodically receiving at the mobile telecommunication device, non-secure data and secure data from one or more data sources via a wireless network; distinguishing received non-secure data from received secure data; segmenting the display of the user interface into a status area and a security interface area; automatically displaying on the mobile telecommunication device, the received non-secure data on the security interface area without authenticating user access to the non-secure data; while displaying the non-secure data, automatically displaying an indication that secure data has been received from the one or more data sources on the status area without authenticating user access to the secure data; subsequent to displaying the indication, while displaying the non-secure data, authenticating, at the security interface area, user access to the secure data in response to an authentication request; selectively displaying on the mobile telecommunication device the secure data on the display of the user interface in response to successful authentication; redisplaying on the mobile telecommunication device the non-secure data on the display of the user interface following expiration of an inactivity time period such that the secure data is no longer displayed on the display; and selectively displaying on the mobile telecommunication device additional non-secure data that is related to the previously displayed non-secure data, the displaying of the additional non-secure data occurring in response to transmission of a user request for the additional non-secure data to a data source via the wireless transceiver. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A mobile telecommunication device comprising:
-
a user interface comprising a display; a memory coupled to the user interface, the memory configured to store secure data and non-secure data; a communication module configured to periodically receiving non-secure data and secure data from one or more data sources via a wireless network; a processor configured to cause segmenting of the display of the user interlace into a status area and a security interface area the processor further configured to cause automatic displaying of the received non-secure data on the security interface area without authenticating user access to the non-secure data; and the processor further configured to cause displaying of an indication on the status area that secure data has been received from the one or more data sources without authenticating user access to the secure data while displaying the non-secure data; a security interface configured to selectively authenticate user access to the secure data in response to an authentication request; wherein the display is configured to selectively display the secure data on the security interface area in response to successful authentication; wherein the user interface is configured to selectively display additional non-secure data that is related to the automatically displayed non-secure data, the displaying of the additional non-secure data occurring in response to the communication module transmitting a user request for the additional non-secure data to the one or more data sources via the wireless network; and wherein the display is configured to selectively redisplay the non-secure data on the display of the user interface following expiration of an inactivity time period such that the secure data is no longer displayed on the display. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification