Secure data entry
First Claim
1. A method, said method comprising:
- displaying, on a touch screen of a computing device, a first arrangement of numeric characters 0-9 for an entry of a confidential sequence of numeric characters by a user during display of the first arrangement of the numeric characters 0-9 in ten respective two-dimensional regions of the touch screen, wherein each region comprises (i) a unique numeric character of the numeric characters 0-9 and (ii) a graphical design that does not include the unique numeric character, wherein the graphical design in each region is a different graphical design in each region, wherein each region has a closed exterior boundary and is totally filled with the graphical design consisting of a background pattern or no pattern, wherein the background pattern in one or more regions of the ten regions is independently selected from the group consisting of a pattern of dots characterized by a spatially uniform distribution of dots throughout the region, and a pattern of continuous solid lines spaced uniformly apart from each other and characterized by an orientation pattern of the solid lines, and a pattern of broken lines spaced uniformly apart from each other with gaps of constant gap size between successive segments of each broken line and characterized by an orientation pattern of the broken lines, wherein a portion of the graphical design in each region surrounds the entire numeric character in each region and encompasses an area disposed between the numeric character and the exterior boundary of each region, wherein a graphical characteristic is instantiated differently for each numeric character displayed in the first arrangement, and wherein the graphical characteristic instantiated differently for each numeric character is the graphical design in each region being said different graphical design in each region; and
receiving user touches on the displayed first arrangement of the confidential sequence of numeric characters to authenticate or authorize the user,wherein the different graphical design in the ten regions comprise;
(i) in a first region of the ten regions, a first graphical design having a series of parallel lines oriented vertically, (ii) in a second region of the ten regions, a second graphical design having a series of parallel lines oriented horizontally, and (iii) in a third region of the ten regions, a third series of parallel lines oriented diagonally.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and associated computing device, A first arrangement of numeric characters 0-9 is displayed, on a touch screen of the computing device, for an entry of a confidential sequence of numeric characters by a user during display of the first arrangement of the numeric characters 0-9 in ten respective regions of the touch screen. Each region includes (i) a unique numeric character and (ii) a graphical design that does not include the unique numeric character. The graphical design in each region is a different graphical design in each region. Each region has a closed exterior boundary and is totally filled with the graphical design consisting of a background pattern or no pattern. A graphical characteristic is instantiated differently for each numeric character displayed in the first arrangement. User touches are received on the displayed first arrangement of the confidential sequence of numeric characters to authenticate or authorize the user.
-
Citations
18 Claims
-
1. A method, said method comprising:
-
displaying, on a touch screen of a computing device, a first arrangement of numeric characters 0-9 for an entry of a confidential sequence of numeric characters by a user during display of the first arrangement of the numeric characters 0-9 in ten respective two-dimensional regions of the touch screen, wherein each region comprises (i) a unique numeric character of the numeric characters 0-9 and (ii) a graphical design that does not include the unique numeric character, wherein the graphical design in each region is a different graphical design in each region, wherein each region has a closed exterior boundary and is totally filled with the graphical design consisting of a background pattern or no pattern, wherein the background pattern in one or more regions of the ten regions is independently selected from the group consisting of a pattern of dots characterized by a spatially uniform distribution of dots throughout the region, and a pattern of continuous solid lines spaced uniformly apart from each other and characterized by an orientation pattern of the solid lines, and a pattern of broken lines spaced uniformly apart from each other with gaps of constant gap size between successive segments of each broken line and characterized by an orientation pattern of the broken lines, wherein a portion of the graphical design in each region surrounds the entire numeric character in each region and encompasses an area disposed between the numeric character and the exterior boundary of each region, wherein a graphical characteristic is instantiated differently for each numeric character displayed in the first arrangement, and wherein the graphical characteristic instantiated differently for each numeric character is the graphical design in each region being said different graphical design in each region; and receiving user touches on the displayed first arrangement of the confidential sequence of numeric characters to authenticate or authorize the user, wherein the different graphical design in the ten regions comprise;
(i) in a first region of the ten regions, a first graphical design having a series of parallel lines oriented vertically, (ii) in a second region of the ten regions, a second graphical design having a series of parallel lines oriented horizontally, and (iii) in a third region of the ten regions, a third series of parallel lines oriented diagonally. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product, comprising a computer readable storage device having computer readable program instructions stored therein, said program instructions being executable by a computer processor of a computing device to implement a method, said method comprising:
-
displaying, on a touch screen of the computing device, a first arrangement of numeric characters 0-9 for an entry of a confidential sequence of numeric characters by a user during display of the first arrangement of the numeric characters 0-9 in ten respective two-dimensional regions of the touch screen, wherein each region comprises (i) a unique numeric character of the numeric characters 0-9 and (ii) a graphical design that does not include the unique numeric character wherein the graphical design in each region is a different graphical design in each region, wherein each region has a closed exterior boundary and is totally filled with the graphical design consisting of a background pattern or no pattern, wherein the background pattern in one or more regions of the ten regions is independently selected from the group consisting of a pattern of dots characterized by a spatially uniform distribution of dots throughout the region, and a pattern of continuous solid lines spaced uniformly apart from each other and characterized by an orientation pattern of the solid fines, and a pattern of broken lines spaced uniformly apart from each other with gaps of constant gap size between successive segments of each broken line and characterized by an orientation pattern of the broken lines, wherein a portion of the graphical design in each region surrounds the entire numeric character in each region and encompasses an area disposed between the numeric character and the exterior boundary of each region, wherein a graphical characteristic is instantiated differently for each numeric character displayed in the first arrangement, and wherein the graphical characteristic instantiated differently for each numeric character is the graphical design in each region being said different graphical design in each region; and receiving user touches on the displayed first arrangement of the confidential sequence of numeric characters to authenticate or authorize the user, wherein the different graphical design in the ten regions comprise;
(i) in a first region of the ten regions, a first graphical design having a series of parallel lines oriented vertically, (ii) in a second region of the ten regions, a second graphical design having a series of parallel lines oriented horizontally, and (iii) in a third region of the ten regions, a third series of parallel lines oriented diagonally. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computing device, comprising a processor, a memory, and a computer readable storage device, said storage device containing program instructions executable by the processor via the memory to implement a method, said method comprising:
-
displaying, on a touch screen of the computing device, a first arrangement of numeric characters 0-9 for an entry of a confidential sequence of numeric characters by a user during display of the first arrangement of the numeric characters 0-9 in ten respective two-dimensional regions of the touch screen, wherein each region comprises (i) a unique numeric character of the numeric characters 0-9 and (ii) a graphical design that does not include the unique numeric character, wherein the graphical design in each region is a different graphical design in each region, wherein each region has a closed exterior boundary and is totally filled with the graphical design consisting of a background pattern or no pattern, wherein the background pattern in one or more regions of the ten regions is independently selected from the group consisting of a pattern of dots characterized by a spatially uniform distribution of dots throughout the region, and a pattern of continuous solid lines spaced uniformly apart from each other and characterized by an orientation pattern of the solid lines, and a pattern of broken lines spaced uniformly apart from each other with gaps of constant gap size between successive segments of each broken line and characterized by an orientation pattern of the broken lines, wherein a portion of the graphical design in each region surrounds the entire numeric character in each region and encompasses an area disposed between the numeric character and the exterior boundary of each region, wherein a graphical characteristic is instantiated differently for each numeric character displayed in the first arrangement, and wherein the graphical characteristic instantiated differently for each numeric character is the graphical design in each region being said different graphical design in each region; and receiving user touches on the displayed first arrangement of the confidential sequence of numeric characters to authenticate or authorize the user, wherein the different graphical design in the ten regions comprise;
a shape of a first region of the ten regions being a pentagon. a shape of a second region of the ten regions being a hexagon, and a shape of a third region of the ten regions being an octagon. - View Dependent Claims (15, 16, 17, 18)
-
Specification