METHOD AND DEVICE FOR SECURING AN INFORMATION INTERACTION PROCESS
First Claim
1. A method of securing an information interaction process, comprising:
- at an electronic device with one or more processors, memory, and a display;
detecting a user interaction with a user interface for a first application;
in response to detecting the user interaction with the user interface for the first application, determining whether one or more security parameters are satisfied, wherein a first security parameter is satisfied when a network access point being used by the electronic device satisfies predefined criteria;
in accordance with a determination that the one or more security parameters are satisfied;
displaying a security keyboard on the display corresponding to a second application different from the first application; and
receiving user information input via the security keyboard by a user of the electronic device; and
transmitting the user information to a target terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
An electronic device with one or more processors, memory, and a display detects a user interaction with a user interface of a first application and, in response to detecting the user interaction with the user interface of the first application, determines whether one or more security parameters are satisfied, where a first security parameter is satisfied when a network access point being used by the electronic device satisfies predefined criteria. In accordance with a determination that the one or more security parameters are satisfied, the device: displays a security keyboard on the display corresponding to a second application different from the first application; and receives user information input via the security keyboard by a user of the electronic device. The device transmits the user information to a target terminal.
187 Citations
20 Claims
-
1. A method of securing an information interaction process, comprising:
-
at an electronic device with one or more processors, memory, and a display; detecting a user interaction with a user interface for a first application; in response to detecting the user interaction with the user interface for the first application, determining whether one or more security parameters are satisfied, wherein a first security parameter is satisfied when a network access point being used by the electronic device satisfies predefined criteria; in accordance with a determination that the one or more security parameters are satisfied; displaying a security keyboard on the display corresponding to a second application different from the first application; and receiving user information input via the security keyboard by a user of the electronic device; and transmitting the user information to a target terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An electronic device, comprising:
-
one or more processors; and memory; a display; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions that when executed by the one or more processors cause the device to; detect a user interaction with a user interface for a first application; in response to detecting the user interaction with the user interface for the first application, determine whether one or more security parameters are satisfied, wherein a first security parameter is satisfied when a network access point being used by the electronic device satisfies predefined criteria; in accordance with a determination that the one or more security parameters are satisfied; display a security keyboard on the display corresponding to a second application different from the first application; and received user information input via the security keyboard by a user of the electronic device; and transmit the user information to a target terminal. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with one or more processors, memory, and a display, cause the device to:
-
detect a user interaction with a user interface for a first application; in response to detecting the user interaction with the user interface for the first application, determine whether one or more security parameters are satisfied, wherein a first security parameter is satisfied when a network access point being used by the electronic device satisfies predefined criteria; in accordance with a determination that the one or more security parameters are satisfied; display a security keyboard on the display corresponding to a second application different from the first application; and received user information input via the security keyboard by a user of the electronic device; and transmit the user information to a target terminal. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification