System and method for content protection on a computing device
First Claim
Patent Images
1. A method of securing a mobile device, the method comprising:
- receiving input for locking the mobile device;
encrypting data entered in plaintext in at least one field of a user interface, wherein the data is encrypted in response to locking the mobile device;
clearing the plaintext data from the screen, wherein the data is cleared in response to locking the mobile device;
storing the encrypted data on the mobile device, wherein the encrypted data is stored in response to locking the mobile device;
receiving input for unlocking the mobile device;
decrypting the encrypted data, wherein the data is decrypted in response to unlocking the mobile device; and
displaying the decrypted data in the at least one field of the user interface, wherein the decrypted data includes content displayed on the user interface at the time of locking the mobile device.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to enter into a protected mode. Data associated with fields displayed on a user interface are stored in a secure form on the mobile device. After the mobile device leaves the protected mode, the stored user interface filed data is accessed and used to populate one or more user interface fields with the accessed user interface field data for display to a user.
17 Citations
20 Claims
-
1. A method of securing a mobile device, the method comprising:
-
receiving input for locking the mobile device; encrypting data entered in plaintext in at least one field of a user interface, wherein the data is encrypted in response to locking the mobile device; clearing the plaintext data from the screen, wherein the data is cleared in response to locking the mobile device; storing the encrypted data on the mobile device, wherein the encrypted data is stored in response to locking the mobile device; receiving input for unlocking the mobile device; decrypting the encrypted data, wherein the data is decrypted in response to unlocking the mobile device; and displaying the decrypted data in the at least one field of the user interface, wherein the decrypted data includes content displayed on the user interface at the time of locking the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. At least one non-transitory computer readable medium comprising instructions executable via a processor of a computing system, wherein executing the instructions by the processor cause the computing system to perform a method comprising:
-
receiving input for locking a mobile device; encrypting data entered in plaintext in at least one field of a user interface, wherein the data is encrypted in response to locking the mobile device; clearing the plaintext data from the screen, wherein the data is cleared in response to locking the mobile device; storing the encrypted data on the mobile device, wherein the encrypted data is stored in response to locking the mobile device; receiving input for unlocking the mobile device; decrypting the encrypted data, wherein the data is decrypted in response to unlocking the mobile device; and displaying the decrypted data in the at least one field of the user interface, wherein the decrypted data includes content displayed on the user interface at the time of locking the mobile device.
-
-
20. A mobile device comprising:
-
at least one processor; and memory storing computer executable instructions, for execution by the at least one processor, capable of; encrypting data entered in plaintext in at least one field of a user interface, wherein the data is encrypted in response to locking the mobile device; clearing the plaintext data from the screen, wherein the data is cleared in response to locking the mobile device; storing the encrypted data on the mobile device, wherein the encrypted data is stored in response to locking the mobile device; receiving input for unlocking the mobile device; decrypting the encrypted data, wherein the data is decrypted in response to unlocking the mobile device; and displaying the decrypted data in the at least one field of the user interface, wherein the decrypted data includes content displayed on the user interface at the time of locking the mobile device.
-
Specification