US6686931B1 - Graphical password methodology for a microprocessor device accepting non-alphanumeric user input - Google Patents
Graphical password methodology for a microprocessor device accepting non-alphanumeric user input Download PDFInfo
- Publication number
- US6686931B1 US6686931B1 US09/933,618 US93361801A US6686931B1 US 6686931 B1 US6686931 B1 US 6686931B1 US 93361801 A US93361801 A US 93361801A US 6686931 B1 US6686931 B1 US 6686931B1
- Authority
- US
- United States
- Prior art keywords
- user
- key
- sequence
- input
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
- G06F3/0233—Character input methods
- G06F3/0237—Character input methods using prediction or retrieval techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
- G06F3/0233—Character input methods
- G06F3/0236—Character input methods using selection techniques to select from displayed items
Definitions
- Another problem facing small electronic devices is the difficulty of inputting information. With a small form factor or pocket-size device, it is simply not feasible to include a substantial keyboard for inputting information. Again, the size of the devices reduces the physical surface area available for accommodating input keys or the like.
- a conventional approach to the problem is to simply build a smaller keyboard, one using miniature input keys. The approach is problematic. In particular, most users find that their fingers are simply too big to use small keys with any degree of efficiency. Further, any efforts to increase the size of a keyboard or keypad in such a device reduces the amount of surface area available for the display screen.
- a portable computing device or “information appliance” having terse user input is provided with a user interface for navigating user data.
- the computing device comprises a central processing unit (e.g., microprocessor) connected via a system bus to a display, an input, ports, and memory.
- Display is a screen device for displaying information, such as a liquid crystal display (LCD) screen.
- Input comprises a keypad, either physical or logical (e.g., on screen buttons), but limited to a terse set numbering about three to ten buttons and more preferably about five buttons.
- Memory comprises persistent memory, volatile memory, and non-volatile RAM memory. Persistent memory is typically implemented as a ROM or read-only memory.
- Volatile memory is a “scratch” memory, for storing temporary computation results. It typically is implemented as a RAM (random-access memory), for providing a work space for the operating system and applications.
- RAM random-access memory
- Non-volatile RAM memory represents battery-backed RAM memory, for storing context information from one session to another. When the device is powered down the memory stores user data from that session.
- SPOS single purpose operating system
- API application programming interface
- Applications are software application programs or modules provided for user operation of the device.
- the application programs can be implemented as separate modules, which are controlled by a module selector.
- the module selector serves as a user interface or shell representing the top-level or “home” display presented to a user.
- the module selector presents the user with selection icons for navigating to different applications or modules of functionality.
- other modules include a calendar module, a to do module, and an address book module.
- the device In typical use, the device is used in tandem with a desktop computer or PC.
- the desktop PC is used by the user when “at the office,” and the portable computing device is employed when the user is “on the road” (i.e., out of the office).
- large repositories of data reside on the desktop PC which are periodically transferred or synchronized with data residing on the portable computing device.
- a device input/output (I/O) protocol or standard such as the PC card standard (formerly PCMCIA standard)
- the user can easily transfer data to the device via a direct memory transfer.
- data can be streamed from the desktop PC to the portable computing device via a direct cable (or infrared) connections such as using a serial port-to-serial port connection.
- the present invention provides a user interface implementing a “single-click” style of button operation, so that users can associate each button with a particular task for a given program context.
- the preferred embodiment imposes “click consistency” for each button.
- the same buttons are used over and over again to perform their respective tasks, even though the user has navigated to different modules of an application. In this manner, the user is presented with a consistent interface or metaphor which can be easily mastered.
- the user interface supports in a small form factor device the browser-style navigation that users have become accustomed to on desktop computers (e.g., using Web browsers). More particularly, the interface supports up, down, forward, and backward (reverse) navigation for allowing a user to “drill down” to “drill across” his or her data. This allows the user to find a data item (link) of interest and then drill down into it. Once at the appropriate level, the user can then easily select the particular item of interest. Further, once the user has selected or entered an item, the system provides the ability for the user to return to “home” with a single button click. In this manner, the present invention provides an interface allowing browser-style navigation in a device having a terse set of input keys.
- a method for providing users with access to applications and user information in a computing device having a limited set of input keys may be summarized by the following method steps.
- the device displays a user interface having a top level view for allowing a user to select among applications available for the computing device.
- User interface navigation is provided in response to user operation of the limited set of input keys.
- the device moves a screen cursor in a forward relative direction among screen objects at a given level.
- the device moves the screen cursor in a reverse relative direction among screen objects at a given level.
- the device In response to user selection of a select key from said limited set of input keys, the device selects a particular screen object at which the screen cursor is currently located, whereupon the device displays a lower level view of the user interface which pertains to the particular screen object. In response to user selection of a home key from said limited set of input keys, the device returns to the top level view. In this manner, access to the applications and user information is achieved for the computing device through use of said limited set of input keys.
- a device having a terse set of input keys provides password protection as follows.
- the interface implements a “graphical password” which can be entered directly from the terse set of keys.
- the graphical password comprises a sequence of non-alphabetic keystrokes from the terse set.
- an exemplary graphical password might comprise, for example, FORWARD, FORWARD, BACK, BACK, SELECT, or, alternatively, the user could select HOME, SELECT, FORWARD, HOME, HOME, BACK.
- a password entry screen When the device is configured for password protection, the screen appears each time the device is powered up. To gain access to information on the device, the user must at this point enter the same sequence of key strokes as that which comprises the user's graphical password.
- a password mask field indicates entries of each key stroke, but with the actual keys themselves being masked.
- a method for controlling access to a computing device having a limited set of input keys may, therefore, be summarized as follows.
- the device records a user-provided sequence of key strokes entered from the non-alphanumeric keys.
- the device stores the recorded sequence of key strokes as a “graphical password”—that is, a password comprising non-alphanumeric key strokes.
- the device Upon request from a user for access to the computing device, the device prompts the user to enter the graphical password. If the user enters a sequence of key strokes which matches that of the sequence of key strokes stored as the graphical password, the device grants device access to the user.
- Additional methodology is provided for dynamically adjusting tab categories and subcategories.
- the method is, in the preferred embodiment driven in part by the number of lines supported by the display.
- the interface supports seven displayable lines which the user can navigate.
- the number of displayable lines is employed to set a threshold number of items which must exist before creating further tab categories (i.e., subcategories).
- the number is set equal to the number of displayable lines plus 1 (e.g., the number 8, for a display having 7 displayable lines). Any three-letter category which qualifies for subcategory tabs is determined by eight or greater items which satisfy that key.
- the method adopted always creates a boundary tab—that is, a category tab for the starting index after the subcategory set.
- the next tab category created is “Mo” (instead of the tab category “N”), even though the number of “Mo” entries might be less than the threshold value.
- the methodology ignores combinations which do not exist in the user data. If no “J” items exist, for example, then a “J” tab is not created.
- the system provides the user with a “find” operation based, not on a linear search, but on dynamically-created categories.
- a method for providing access to a data set which stores information in data records having data fields may, therefore, be summarized as follows.
- An initial order for displaying the data set based on values of a particular data field is established. Commonly, this will be an alphabetic sort order, such as a descending sort by Last Name.
- the data set is displayed according to this established order.
- category tabs for navigating among individual data records of the data set. This entails the following.
- the device determines dynamically, based on actual values stored at the particular data field of the data records, categories of information available for the particular data field. Based on this determination, the device displays a tab identifier allowing navigation to a particular category if at least one data item exists for the particular category. In this manner, at least some tab identifiers are eliminated from display—particularly, tab identifiers are eliminated for those categories of information which currently have no data items.
- the result is much faster and efficient navigation through large datasets when using a terse or limited key set.
- FIG. 1 is a block diagram illustrating the general architecture of a portable computing device or “information appliance” in which the present invention may be embodied.
- FIG. 2 is a block diagram illustrating implementation of the application programs as modules under the control of a module selector.
- FIG. 3 is a bitmap screen shot illustrating a display interface comprising a plurality of application or module icons, from which the user can invoke particular application functionality.
- FIGS. 4A-G are bitmap screen shots illustrating use of a high-level navigation model of the present invention applied to a variety of types of user information.
- FIGS. 5A-C are bitmap screen shots illustrating use of the navigation model for setting user preferences.
- FIG. 5D is a flowchart summarizing internal methodology supporting the navigational model.
- FIG. 6A is a bitmap screen shot illustrating use of “graphical” passwords for controlling user access to the device.
- FIG. 6B is a flowchart summarizing internal methodology supporting device access with a graphical password.
- FIGS. 7A-D are bitmap screen shots illustrating use of a dynamically adjusting tab (category) interface for managing a large set of data.
- FIG. 7E is a flowchart summarizing internal methodology supporting dynamically adjusting tab categories.
- FIGS. 8A-F are bitmap screen shots illustrating the action of tabbing through dynamically-created subcategory tabs.
- FIGS. 9A-B are bitmap screen shots illustrating a special sort tab, whereupon the tab categories are automatically updated.
- FIG. 1 is a block diagram illustrating the general architecture of a portable computing device or “information appliance” in which the present invention may be embodied.
- computing device 100 comprises a central processing unit 105 (e.g., microprocessor) connected via a system bus 140 to a display 101 , an input 102 , ports 103 , and memory 110 .
- Display 101 is a screen device for displaying information, such as a liquid crystal display (LCD) screen.
- Input 102 comprises a keypad, either physical or logical (e.g., on screen buttons), but limited to a terse set numbering about three to ten buttons and more preferably about five buttons.
- Memory 110 comprises persistent memory 111 , volatile memory 120 , and non-volatile RAM memory 130 .
- Persistent memory 111 is typically implemented as a ROM or read-only memory. As shown, it stores a single-purpose operating system (SPOS) 112 and application(s) 113 , which are described in further detail below.
- Volatile memory 120 is a “scratch” memory, for storing temporary computation results. It typically is implemented as a RAM (random-access memory), for providing a work space for the operating system and applications.
- Non-volatile RAM memory 130 represents battery-backed RAM memory, for storing context information from one session to another. When the device 100 is powered down the memory 130 stores user data from that session.
- the single purpose operating system functions to provide a consistent mechanism by which applications 113 can communicate with the device 100 .
- applications 113 are shielded from hardware complexity, such as hardware interrupts and ports.
- hardware complexity such as hardware interrupts and ports.
- API application programming interface
- Applications 113 are software application programs or modules provided for user operation of the device. As shown in FIG. 2, for instance, the application programs can be implemented as modules 201 - 206 , which are controlled by a module selector 200 .
- the module selector 200 serves as a user interface or shell representing the top-level or “home” display presented to a user. In the currently-preferred embodiment, the module selector 200 presents the user with selection icons for navigating to different applications or modules of functionality.
- other modules include a calendar module, a to do module, and an address book module.
- the device 100 is used in tandem with a desktop computer or PC.
- the desktop PC is used by the user when “at the office,” and the portable computing device 100 is employed when the user is “on the road” (i.e., out of the office).
- large repositories of data reside on the desktop PC which are periodically transferred or synchronized with data residing on the portable computing device 100 .
- a device input/output (I/O) protocol or standard such as the PC card standard (formerly PCMCIA standard)
- the user can easily transfer data to the device 100 via a direct memory transfer.
- data can be streamed from the desktop PC to the portable computing device via a direct cable (or infrared) connection, such as using a serial port-to-serial port connection. Since the data transferred is that of an application operating on the desktop PC, potentially thousands of data items or records might be downloaded into the portable computing device 100 . This potentially large dataset, coupled with the terse key set available at the portable computing device, poses a challenge to the location of desired information by a user. Therefore, improved user interface methodology is needed.
- the user interface of the present invention implements a “single-click” style of button operation. Given a device with five input buttons, for instance, various key combinations beyond the simple clicking of each individual button could be created. Buttons could, for example, be “double clicked” by users or combined to create double or triple (or even more) key combinations. Although such an approach yields more logical buttons from the available physical buttons, the approach requires users to memorize key combinations which are not intuitive (and are a source of endless grief for users of such devices). Accordingly, in the most-preferred embodiment, a single-click style is adopted, so that users can associate each button with a particular task for a given program context.
- buttons are used over and over again to perform their respective tasks, even though the user has navigated to different modules of an application. In this manner, the user is presented with a consistent interface or metaphor which can be easily mastered. If, on the other hand, behavior of the button changed from one portion or context of the application to another, the user must relearn the functionality of each button.
- the user interface supports in a small form factor device the browser-style navigation that users have become accustomed to on desktop computers (e.g., using Web browsers). More particularly, the interface supports up, down, forward, and backward navigation for allowing a user to “drill down” to “drill across” his or her data. This allows the user to find a data item (link) of interest and then drill down into it. Once at the appropriate level, the user can then easily select the particular item of interest. Further, once the user has selected or entered an item, the system provides the ability for the user to return to “home” with a single button click. As set forth below, the present invention provides an interface allowing browser-style navigation in a device having a terse set of input keys.
- the module selector presents an array of icons, each one corresponding to a particular application within the system. At all times, the system displays a highlight on screen for indicating “focus”—that a particular item is the focus of further user input (at that point in time). At the top level or “home,” focus is indicated by a highlight around one of the application icons.
- display interface 320 comprises a plurality of application or module icons (e.g., icons 321 , 323 ), from which the user can invoke particular application functionality.
- icon 321 currently had “focus,” as indicated by focus outline (rectangle) 325 .
- the device 300 includes five buttons 310 . These buttons function as follows.
- Home key 311 provides a browser-like key allowing a user to always return to “home”—that is, a general or overview display screen.
- “home” is the module selector display or shell shown by display screen 320 . In this manner, no matter how far a user has “drilled down” in the interface, the home key 311 will always return the user to the top-level view or shell, with a single button click.
- Forward key 319 and backward key 317 allow the user to navigate forward or backward (respectively), within a given level of the interface.
- the forward and backward keys move the selective or highlight from one icon to another, either in a forward or reverse direction depending on which of the two buttons 317 , 319 is activated.
- a highlight or selector is presented at all levels of the interface, so that the functionality of buttons 317 , 319 remains consistent and intuitive. As a result, the user always knows how to shift focus from one item to another regardless of what level of the interface the user has navigated to.
- select button 315 invokes (or “selects”) the item currently having focus, when the button is activated by the user.
- select button 315 serves to select the calendar module represented by icon 321 .
- the system “drills down” into the calendar module.
- buttons provide a navigation model where the user can move from point to point for changing direction within a level, selection itself always indicates the current focus or point of activity (which will occur) within a given level. Selecting that item with the select button 315 causes the system to drill down into the functionality represented by the selected item. Regardless of how many levels the user has drilled down into using this technique, the home button 311 will always return the interface back to the top-level view (e.g., such as the “home” view represented by display 320 ).
- buttons 310 include a fifth key or button, view switch button 313 .
- the view switch button 313 allows the user to instruct the system to switch to a different view within a given level, thus providing the user with a different way of viewing the data.
- presentation of calendar data by a calendar module can be represented or displayed in multiple ways.
- One way to represent such information for example, is to display a linear (event-by-event) list.
- such information could be presented on a week-by-week basis—that is, viewing data over a span of a given week.
- Yet another way to view such information is a monthly view which highlights dates for a given month which have events (or other user data).
- the view switch 313 therefore, cycles through different views at a particular level, with the actual views available being dictated by the particular application (module). In order to simplify the interface for the user, the number of views available at a given level should typically not exceed about four views.
- the high-level navigation model can be applied to other types of user information. This is illustrated in FIGS. 4A-B.
- the calendar module has focus, as indicated at 401 .
- the interface invokes the calendar module, as indicated at 410 in FIG. 4 B.
- the view switch key By activating the view switch key, the user can switch the display to get another view of the data. For instance, upon the user first invoking the key, the display switches to a weekly view, as indicated at 420 in FIG. 4 C. Further activation of the key switches the display to a monthly view, as shown at 430 in FIG. 4 D. In any one of these views, the user can select an item and drill down into it. For the present example, this is illustrated by FIGS.
- FIG. 4E the user selects an item, shown at 440 , using forward/backward keys. Now that a particular item has focus, the user can drill down into that item, by activating the select key. The result is shown at 450 in FIG. 4 F.
- the system displays the particular record corresponding to the selected item.
- the user can continue navigating using the selection and drill down approach.
- the user has selected item 460 from the displayed list of items.
- the user can invoke the select key for displaying further information about the selected item—detailed information for a particular time interval for this example (not shown).
- the foregoing example illustrates that the navigation module of the present invention can easily be applied to completely different datasets. At the same time, the user is still able to efficiently navigate among items in each dataset even though the device itself only includes a terse set of input keys.
- the interface methodology also has application to a variety of other devices.
- PDA personal digital assistant
- the interface methodology also has application to a variety of other devices.
- enhanced processing power becomes available to more and more devices, including household appliances, there is a growing need for an interface for efficiently controlling such devices.
- those devices will continue to have a small set of input keys, instead of larger keypads or handwriting recognition.
- the physical size of the device makes it undesirable to incorporate a large keypad or a style list for handwriting recognition.
- FIGS. 5A-C illustrate use of the navigation model for setting user preferences.
- the user begins by invoking the preference module from the module selector screen.
- the preference setting screen such as illustrated in FIG. 5A
- the user employs the forward and backward keys for navigating to a particular item, such as “date display.”
- the user invokes the select key to navigate to the item's value, such as the date display value 510 as shown in FIG. 5 B.
- the user can change the value by using the backward and forward keys.
- the user can select that to be the preference value by invoking the select key.
- the selected value is now entered as the preferred setting.
- a method for providing users with access to applications and user information in a computing device having a limited set of input keys may be summarized as shown in FIG. 5 D.
- the device displays a user interface having a top level view for allowing a user to select among applications available for the computing device (step 531 ).
- User interface navigation is provided in response to user operation of the limited set of input keys (step 532 ).
- the device moves a screen cursor in a forward relative direction among screen objects at a given level (step 533 ).
- the device moves the screen cursor in a reverse relative direction among screen objects at a given level (step 534 ).
- the device selects or invokes a particular screen object at which the screen cursor is currently located (step 535 ), whereupon the device displays a lower level view of the user interface which pertains to the particular screen object.
- the device returns to the top level view (step 536 ). The method or process loops or continues for other user input. In this manner, access to the applications and user information is achieved for the computing device through use of said limited set of input keys.
- a device having a terse set of input keys implements password protection as follows.
- the interface implements a “graphical password” which can be entered directly from the terse set of keys.
- the graphical password comprises a sequence of non-alphabetic key strokes from the terse set.
- an exemplary graphical password might comprise, for example, FORWARD, FORWARD, BACK, BACK, SELECT, or, alternatively, the user could select HOME, SELECT, FORWARD, HOME, HOME, BACK.
- a password entry screen 600 upon the user entering a graphical password, the device displays a password entry screen 600 , as shown in FIG. 6 A.
- the screen appears each time the device is powered up.
- the user To gain access to information on the device, the user must at this point enter the same sequence of key strokes as that which comprises the user's graphical password.
- a password mask field 610 indicates entries of each key stroke, but with the actual keys themselves being masked.
- a method for controlling access to a computing device having a limited set of input keys may, therefore, be summarized as shown in FIG. 6 B.
- the device records a user-provided sequence of key strokes entered from the non-alphanumeric keys (step 63 1 ).
- the device stores the recorded sequence of key strokes as a “graphical password” (step 632 )—that is a password comprising non-alphanumeric key strokes.
- the device Upon request from a user for access to the computing device (step 633 ), the device prompts the user to enter the graphical password (step 634 ).
- the device grants device access to the user (step 636 ). Otherwise, the method repeats the prompt (step 634 ) or fails.
- a user desires to employ a portable computing device for storing and managing large lists of information, such as an electronic address book.
- information is sorted by a particular key (i.e., indexed by one or more fields).
- information can be indexed on the key of last name plus first name.
- information is potentially a very large list.
- a quick way to navigate to a desired entry in a large list is to perform a search. If one wanted to find an entry in an electronic address book beginning with the letter “S,” for instance, the user could quickly search to names beginning with “S” if he or she could easily enter such a letter. For a portable computing device having a terse set of input keys, such as the device 100 , the user does not have this option. Given a device with a terse set of input keys or buttons, therefore, a problem arises as to how one efficiently navigates such information efficiently.
- the difficulty with the approach is that the user must still navigate a potentially large list. If something more than simple input is required, such as the input of alphabetic characters, the fast repeat approach becomes unacceptable. For instance, inputting characters from an entire alphabetic character set, including both upper case and lower case characters, the approach is simply not a practical way to input the information into a device. The fast repeat approach is not practical for navigating large datasets, such as an electronic address book containing hundreds of entries.
- list information is organized into discrete categories.
- information is grouped in a Rolodex.
- tabs are provided for individual letters of the alphabet. Adopting that approach electronically, however, is not an optimal approach, as the user would have to navigate or “tab through” a lot of information before reaching the desired target information.
- information is grouped intelligently at runtime (i.e., dynamically) such that a user can rapidly reach a destination or target item without having to tab through a lot of categories which are not of interest.
- the tabs themselves adjust dynamically at runtime to the user's actual data. Specifically, the tabs adjust on-the-fly to correspond to entries in the user's data. In this manner, the system eliminates the need for navigating or tabbing to categories which do not correspond to the actual user data present in the system.
- both a high level approach and a low level approach are adopted.
- the system employs the alphabet (and digits) broken down into sets of three characters, such as “#AB” “CDE,” and the like. If no “E” entries are present in the user's date, for instance, the second tab can adjust to “CDF.”
- the approach provides an interface allowing the user to quickly navigate among categories. Unlike a Rolodex, however, the categories are simplified based on the user's actual data.
- FIGS. 7A-D illustrate an interface which embodies the approach.
- FIG. 7A illustrates address book interface 700 displaying list information 701 .
- the interface 700 includes category tabs 710 , such as “#AB” tab 711 . Since the tab 711 currently has focus, it is highlighted (e.g., displayed in reverse video).
- the user activates forward (i.e., right or down) and backward (i.e., left or up) keys 715 , 713 .
- FIG. 7 B the user activity of clicking the forward button or key 715 twice.
- the interface 700 shifts focus to tab 721 , as shown.
- the displayed list 701 (now 701 a ) is updated, for displaying entries corresponding to the now-selected category (i.e., tab 721 ).
- the user can now invoke the select button, shown at 725 in FIG. 7B, for drilling down into the then currently-selected category.
- Interface 700 (now 700 b ) displays the tab 721 (now 721 a ) as the first category. Further, focus has shifted to a particular item on the list 701 (now 701 b ). Hence, once the user has quickly navigated to the desired category of information, the user can select into that category and proceed to quickly select a particular item from that category.
- the input events can be summarized as follows: across ⁇ select ⁇ down ⁇ select.
- the system displays the information record pertaining to that item.
- Final selection of item 722 for instance, invokes the display of information record 730 , as illustrated in FIG. 7 D. At any point during this process, the user can easily return to the top-level view by selecting the “home” key.
- a method for providing access to a data set which stores information in data records having data fields may be summarized as shown in FIG. 7 E.
- An initial order for displaying the data set based on values of a particular data field is established (step 741 ). Commonly, this will be an alphabetic sort order, such as a descending sort by Last Name.
- the data set is displayed according to this established order (step 742 ).
- the device displays category tabs for navigating among individual data records of the data set. This entails the following.
- the device determines dynamically, based on actual values stored at the particular data field of the data records, categories of information available for the particular data field (step 743 ).
- the device Based on this determination (tested at step 744 ), the device displays a tab identifier allowing navigation to a particular category if at least one data item exists for the particular category (step 745 ). In this manner, at least some tab identifiers are eliminated from display—particularly, tab identifiers are eliminated for those categories of information which currently have no data items. The result is much faster and efficient navigation through large datasets when using a terse or limited key set.
- FIG. 8A illustrates this scenario.
- the user has tabbed to a category including “M” entries.
- the list 701 is updated and, for this example, includes a large number of “M” entries.
- the interface 700 (now 700 d ) updates, as indicated in FIG. 8 B.
- the category tab has in effect, “split” into subcategory tabs.
- “M” entries are now represented by three tabs 811 : “M,” “Mc,” and “Mo” tabs.
- the system has synthesized dynamically an “Mc” tab, so those entries have their own subcategory tab. In this fashion, the user can quickly navigate to a particular subcategory of interest, thereby avoiding the need to linearly scan through a subcategory having a large number of entries which are not of interest (e.g., “Mc” entries).
- FIGS. 8C-E illustrate the action of the user tabbing through the subcategory tabs 811 .
- the display list 701 (now 701 d) updates to display items corresponding to the newly-selected subcategory tab.
- the user selecting subcategory tab 811 b as shown in FIG. 8D or selecting subcategory tab 811 c in FIG. 8E also leads to updating the display list 701 , as shown at 701 e and 701 f , respectively.
- the user can select into or drill down to a particular item, such as indicated in FIG. 8 F.
- the user can select the target item of interest using the select key or button.
- the system displays the corresponding information record (not shown) for that selected item.
- the methodology adopted for dynamically adjusting tab categories and subcategories is, in the preferred embodiment, driven in part by the number of lines supported by the display.
- the interface supports seven displayable lines which the user can navigate.
- the number of displayable lines is employed to set a threshold number of items which must exist before creating further tab categories (i.e., subcategories).
- the number is set equal to the number of displayable lines plus 1 (e.g., the number 8, for a display having 7 displayable lines).
- Any three-letter category which qualifies for subcategory tabs is determined by eight or greater items which satisfy that key.
- the method adopted always creates a boundary tab—that is, a category tab for the starting index after the subcategory set.
- the next tab category created is “Mo” (instead of the tab category “N”), even though the number of “Mo” entries might be less than the threshold value.
- the methodology ignores combinations which do not exist in the user data. If no “J” items exist, for example, then a “J” tab is not created.
- the system provides the user with a “find” operation based, not on a linear search, but on dynamically-created categories. The result is much faster and efficient navigation through large datasets when using a terse key set.
- the interface includes a special sort tab 901 .
- the device displays selection screen 903 .
- the user can select another index for presenting the data, such as index by “title” or by “company.”
- FIG. 9B at display screen 910 , the user data is now sorted by company name. Accordingly, the tab categories are updated.
- the method's operation is generic to a variety of different datasets.
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims (42)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/933,618 US6686931B1 (en) | 1997-06-13 | 2001-08-20 | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US4962197P | 1997-06-13 | 1997-06-13 | |
US90546397A | 1997-08-04 | 1997-08-04 | |
US09/453,609 US6278453B1 (en) | 1997-06-13 | 1999-12-03 | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
US09/933,618 US6686931B1 (en) | 1997-06-13 | 2001-08-20 | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/453,609 Continuation US6278453B1 (en) | 1997-06-13 | 1999-12-03 | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
Publications (1)
Publication Number | Publication Date |
---|---|
US6686931B1 true US6686931B1 (en) | 2004-02-03 |
Family
ID=30449236
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/933,618 Expired - Lifetime US6686931B1 (en) | 1997-06-13 | 2001-08-20 | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
Country Status (1)
Country | Link |
---|---|
US (1) | US6686931B1 (en) |
Cited By (80)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030161450A1 (en) * | 2002-02-22 | 2003-08-28 | Clapper Edward O. | Providing information to facilitate telephone conversations |
US20040220723A1 (en) * | 2002-12-16 | 2004-11-04 | Gould Bear Eric Justin | Systems and methods for interfacing with computer devices |
US20040217988A1 (en) * | 2002-12-16 | 2004-11-04 | Bear Eric Justin Gould | Systems and methods for interfacing with computer devices |
US20040257341A1 (en) * | 2002-12-16 | 2004-12-23 | Bear Eric Justin Gould | Systems and methods for interfacing with computer devices |
US20050010807A1 (en) * | 2003-04-10 | 2005-01-13 | Ken Kitamura | Information processing apparatus used by a plurality of different operators, and method and program for use in the information processing apparatus |
US20050010810A1 (en) * | 1998-07-28 | 2005-01-13 | Broyles Paul J. | Ownership tag on power up screen |
US20050198315A1 (en) * | 2004-02-13 | 2005-09-08 | Wesley Christopher W. | Techniques for modifying the behavior of documents delivered over a computer network |
US20060010395A1 (en) * | 2004-07-09 | 2006-01-12 | Antti Aaltonen | Cute user interface |
US20060020904A1 (en) * | 2004-07-09 | 2006-01-26 | Antti Aaltonen | Stripe user interface |
USD523872S1 (en) | 2005-03-02 | 2006-06-27 | Boston Acoustics, Inc. | Computer icon for a clock alarm on a portion of a display panel |
US7069515B1 (en) * | 2002-05-21 | 2006-06-27 | Claria Corporation | Method and apparatus for displaying messages in computer systems |
US20060174339A1 (en) * | 2005-01-29 | 2006-08-03 | Hai Tao | An arrangement and method of graphical password authentication |
US20060235965A1 (en) * | 2005-03-07 | 2006-10-19 | Claria Corporation | Method for quantifying the propensity to respond to an advertisement |
US20060294226A1 (en) * | 2005-06-28 | 2006-12-28 | Goulden David L | Techniques for displaying impressions in documents delivered over a computer network |
US20070143830A1 (en) * | 2005-12-20 | 2007-06-21 | International Business Machines Corporation | Method, apparatus and system for preventing unauthorized access to password-protected system |
US20070173290A1 (en) * | 2006-01-23 | 2007-07-26 | Paavo Perttula | Mobile communication terminal and method therefore |
WO2007095504A1 (en) * | 2006-02-10 | 2007-08-23 | Access Systems Americas, Inc. | Improved user-interface and architecture portable processing device |
US7266693B1 (en) * | 2007-02-13 | 2007-09-04 | U.S. Bancorp Licensing, Inc. | Validated mutual authentication |
US20070277224A1 (en) * | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
US20070300307A1 (en) * | 2006-06-23 | 2007-12-27 | Microsoft Corporation | Security Using Physical Objects |
US20080155125A1 (en) * | 2006-12-21 | 2008-06-26 | International Business Machines Corporation | Method, computer program product, and apparatus for automatically adapting hardware and software preferences based on a network connection |
US20080195976A1 (en) * | 2007-02-14 | 2008-08-14 | Cho Kyung-Suk | Method of setting password and method of authenticating password in portable device having small number of operation buttons |
US20080201649A1 (en) * | 2007-02-15 | 2008-08-21 | Nokia Corporation | Visualization of information associated with applications in user interfaces |
US20080244700A1 (en) * | 2006-05-24 | 2008-10-02 | Osborn Steven L | Methods and systems for graphical image authentication |
US7469386B2 (en) | 2002-12-16 | 2008-12-23 | Microsoft Corporation | Systems and methods for interfacing with computer devices |
US20090146969A1 (en) * | 2002-02-07 | 2009-06-11 | Palmsource, Inc. | Method and system for navigating a display screen for locating a desired item of information |
US20090240578A1 (en) * | 2008-03-18 | 2009-09-24 | Christopher James Lee | Methods and systems for graphical security authentication and advertising |
USD601165S1 (en) * | 2008-10-27 | 2009-09-29 | Microsoft Corporation | Icon for a display screen |
US20100043062A1 (en) * | 2007-09-17 | 2010-02-18 | Samuel Wayne Alexander | Methods and Systems for Management of Image-Based Password Accounts |
US20100180336A1 (en) * | 2009-01-13 | 2010-07-15 | Nolan Jones | System and Method for Authenticating a User Using a Graphical Password |
US20100250937A1 (en) * | 2007-03-05 | 2010-09-30 | Vidoop, Llc | Method And System For Securely Caching Authentication Elements |
US20100275033A1 (en) * | 2001-05-16 | 2010-10-28 | Synaptics Incorporated | Touch screen with user interface enhancement |
US20100277505A1 (en) * | 2009-04-30 | 2010-11-04 | Ludden Christopher A | Reduction in latency between user input and visual feedback |
US20100322485A1 (en) * | 2009-06-18 | 2010-12-23 | Research In Motion Limited | Graphical authentication |
US20110029436A1 (en) * | 2007-02-05 | 2011-02-03 | Vidoop, Llc | Methods And Systems For Delivering Sponsored Out-Of-Band Passwords |
US20110047605A1 (en) * | 2007-02-06 | 2011-02-24 | Vidoop, Llc | System And Method For Authenticating A User To A Computer System |
US20110148436A1 (en) * | 2009-12-18 | 2011-06-23 | Synaptics Incorporated | System and method for determining a number of objects in a capacitive sensing region using signal grouping |
US20110148438A1 (en) * | 2009-12-18 | 2011-06-23 | Synaptics Incorporated | System and method for determining a number of objects in a capacitive sensing region using a shape factor |
US8073866B2 (en) | 2005-03-17 | 2011-12-06 | Claria Innovations, Llc | Method for providing content to an internet user based on the user's demonstrated content preferences |
US8078602B2 (en) | 2004-12-17 | 2011-12-13 | Claria Innovations, Llc | Search engine for a computer network |
US20110307831A1 (en) * | 2010-06-10 | 2011-12-15 | Microsoft Corporation | User-Controlled Application Access to Resources |
US8139059B2 (en) | 2006-03-31 | 2012-03-20 | Microsoft Corporation | Object illumination in a virtual environment |
US8170912B2 (en) | 2003-11-25 | 2012-05-01 | Carhamm Ltd., Llc | Database structure and front end |
US8255413B2 (en) | 2004-08-19 | 2012-08-28 | Carhamm Ltd., Llc | Method and apparatus for responding to request for information-personalization |
US8316003B2 (en) | 2002-11-05 | 2012-11-20 | Carhamm Ltd., Llc | Updating content of presentation vehicle in a computer network |
US8620952B2 (en) | 2007-01-03 | 2013-12-31 | Carhamm Ltd., Llc | System for database reporting |
US8621578B1 (en) | 2008-12-10 | 2013-12-31 | Confident Technologies, Inc. | Methods and systems for protecting website forms from automated access |
US8631487B2 (en) | 2010-12-16 | 2014-01-14 | Research In Motion Limited | Simple algebraic and multi-layer passwords |
US8635676B2 (en) | 2010-12-16 | 2014-01-21 | Blackberry Limited | Visual or touchscreen password entry |
US8645941B2 (en) | 2005-03-07 | 2014-02-04 | Carhamm Ltd., Llc | Method for attributing and allocating revenue related to embedded software |
US8650624B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Obscuring visual login |
US8650635B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Pressure sensitive multi-layer passwords |
US8661530B2 (en) | 2010-12-16 | 2014-02-25 | Blackberry Limited | Multi-layer orientation-changing password |
US8689238B2 (en) | 2000-05-18 | 2014-04-01 | Carhamm Ltd., Llc | Techniques for displaying impressions in documents delivered over a computer network |
US20140098023A1 (en) * | 2012-10-05 | 2014-04-10 | Shumin Zhai | Incremental multi-touch gesture recognition |
US8745694B2 (en) | 2010-12-16 | 2014-06-03 | Research In Motion Limited | Adjusting the position of an endpoint reference for increasing security during device log-on |
US8769641B2 (en) | 2010-12-16 | 2014-07-01 | Blackberry Limited | Multi-layer multi-point or pathway-based passwords |
US8769668B2 (en) | 2011-05-09 | 2014-07-01 | Blackberry Limited | Touchscreen password entry |
US8812861B2 (en) | 2006-05-24 | 2014-08-19 | Confident Technologies, Inc. | Graphical image authentication and security system |
US8863271B2 (en) | 2010-12-16 | 2014-10-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
US8881251B1 (en) * | 2012-05-30 | 2014-11-04 | RememberIN, Inc. | Electronic authentication using pictures and images |
US8930834B2 (en) | 2006-03-20 | 2015-01-06 | Microsoft Corporation | Variable orientation user interface |
US8931083B2 (en) | 2010-12-16 | 2015-01-06 | Blackberry Limited | Multi-layer multi-point or randomized passwords |
US20150128055A1 (en) * | 2012-05-28 | 2015-05-07 | Doro AB | Improved status notification for a mobile communications terminal |
US20150143493A1 (en) * | 2013-11-21 | 2015-05-21 | Qnap Systems, Inc. | Electronic device and login method thereof |
US9081500B2 (en) | 2013-05-03 | 2015-07-14 | Google Inc. | Alternative hypothesis error correction for gesture typing |
US9134906B2 (en) | 2012-10-16 | 2015-09-15 | Google Inc. | Incremental multi-word recognition |
US9135426B2 (en) | 2010-12-16 | 2015-09-15 | Blackberry Limited | Password entry using moving images |
US9189603B2 (en) | 2006-05-24 | 2015-11-17 | Confident Technologies, Inc. | Kill switch security method and system |
US9223948B2 (en) | 2011-11-01 | 2015-12-29 | Blackberry Limited | Combined passcode and activity launch modifier |
US9258123B2 (en) | 2010-12-16 | 2016-02-09 | Blackberry Limited | Multi-layered color-sensitive passwords |
US9495446B2 (en) | 2004-12-20 | 2016-11-15 | Gula Consulting Limited Liability Company | Method and device for publishing cross-network user behavioral data |
US9552080B2 (en) | 2012-10-05 | 2017-01-24 | Google Inc. | Incremental feature-based gesture-keyboard decoding |
US9589125B2 (en) | 2014-12-31 | 2017-03-07 | Hai Tao | 3D pass-go |
US9678943B2 (en) | 2012-10-16 | 2017-06-13 | Google Inc. | Partial gesture text entry |
US9710453B2 (en) | 2012-10-16 | 2017-07-18 | Google Inc. | Multi-gesture text input prediction |
US9830311B2 (en) | 2013-01-15 | 2017-11-28 | Google Llc | Touch keyboard using language and spatial models |
US10019435B2 (en) | 2012-10-22 | 2018-07-10 | Google Llc | Space prediction for text input |
CN108710810A (en) * | 2018-05-22 | 2018-10-26 | 中国银联股份有限公司 | A kind of acquisition methods of password, traction equipment and terminal |
US11222105B2 (en) | 2018-12-12 | 2022-01-11 | International Business Machines Corporation | Graphic color-based authentication |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4806745A (en) | 1986-04-18 | 1989-02-21 | Sharp Kabushiki Kaisha | IC card with fewer input keys |
US5097506A (en) | 1990-05-18 | 1992-03-17 | Compaq Computer Corporation | Keyboard password lock |
US5173940A (en) | 1991-06-21 | 1992-12-22 | Compaq Computer Corporation | Keyboard activated screen blanking |
US5251125A (en) | 1990-04-30 | 1993-10-05 | Eaton Corporation | User interface for a process control device |
US5276314A (en) | 1992-04-03 | 1994-01-04 | International Business Machines Corporation | Identity verification system resistant to compromise by observation of its use |
US5550968A (en) | 1994-04-12 | 1996-08-27 | International Business Machines Corporation | Method and system for providing access security to controls in a graphical user interface |
US5559961A (en) | 1994-04-04 | 1996-09-24 | Lucent Technologies Inc. | Graphical password |
US5774540A (en) | 1995-11-15 | 1998-06-30 | Lucent Technologies Inc. | Hierarchical menu screen interface for displaying and accessing telephone terminal features |
US5821933A (en) | 1995-09-14 | 1998-10-13 | International Business Machines Corporation | Visual access to restricted functions represented on a graphical user interface |
US6209104B1 (en) * | 1996-12-10 | 2001-03-27 | Reza Jalili | Secure data entry and visual authentication system and method |
US6278453B1 (en) * | 1997-06-13 | 2001-08-21 | Starfish Software, Inc. | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
US20030070091A1 (en) * | 2001-10-05 | 2003-04-10 | Loveland Shawn Domenic | Granular authorization for network user sessions |
US20030177349A1 (en) * | 2002-03-15 | 2003-09-18 | Kevin Hersh | Systems and methods for authenticating a user for a computing device |
-
2001
- 2001-08-20 US US09/933,618 patent/US6686931B1/en not_active Expired - Lifetime
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4806745A (en) | 1986-04-18 | 1989-02-21 | Sharp Kabushiki Kaisha | IC card with fewer input keys |
US5251125A (en) | 1990-04-30 | 1993-10-05 | Eaton Corporation | User interface for a process control device |
US5097506A (en) | 1990-05-18 | 1992-03-17 | Compaq Computer Corporation | Keyboard password lock |
US5173940A (en) | 1991-06-21 | 1992-12-22 | Compaq Computer Corporation | Keyboard activated screen blanking |
US5276314A (en) | 1992-04-03 | 1994-01-04 | International Business Machines Corporation | Identity verification system resistant to compromise by observation of its use |
US5559961A (en) | 1994-04-04 | 1996-09-24 | Lucent Technologies Inc. | Graphical password |
US5550968A (en) | 1994-04-12 | 1996-08-27 | International Business Machines Corporation | Method and system for providing access security to controls in a graphical user interface |
US5821933A (en) | 1995-09-14 | 1998-10-13 | International Business Machines Corporation | Visual access to restricted functions represented on a graphical user interface |
US5774540A (en) | 1995-11-15 | 1998-06-30 | Lucent Technologies Inc. | Hierarchical menu screen interface for displaying and accessing telephone terminal features |
US6209104B1 (en) * | 1996-12-10 | 2001-03-27 | Reza Jalili | Secure data entry and visual authentication system and method |
US6278453B1 (en) * | 1997-06-13 | 2001-08-21 | Starfish Software, Inc. | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
US20030070091A1 (en) * | 2001-10-05 | 2003-04-10 | Loveland Shawn Domenic | Granular authorization for network user sessions |
US20030177349A1 (en) * | 2002-03-15 | 2003-09-18 | Kevin Hersh | Systems and methods for authenticating a user for a computing device |
Non-Patent Citations (1)
Title |
---|
McCarthy, Shawn P., "Networking Break-ins Reveal the Chinks in Systems Security", Government Computer News, vol. 13, No. 17, Aug. 8, 1994, p. 63(2). * |
Cited By (116)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050010810A1 (en) * | 1998-07-28 | 2005-01-13 | Broyles Paul J. | Ownership tag on power up screen |
US8689238B2 (en) | 2000-05-18 | 2014-04-01 | Carhamm Ltd., Llc | Techniques for displaying impressions in documents delivered over a computer network |
US8402372B2 (en) * | 2001-05-16 | 2013-03-19 | Synaptics Incorporated | Touch screen with user interface enhancement |
US8560947B2 (en) | 2001-05-16 | 2013-10-15 | Synaptics Incorporated | Touch screen with user interface enhancement |
US20100275033A1 (en) * | 2001-05-16 | 2010-10-28 | Synaptics Incorporated | Touch screen with user interface enhancement |
US20110122157A1 (en) * | 2002-02-07 | 2011-05-26 | Access Systems Americas, Inc. | Method and system for navigating a display screen for locating a desired item of information |
US20090146969A1 (en) * | 2002-02-07 | 2009-06-11 | Palmsource, Inc. | Method and system for navigating a display screen for locating a desired item of information |
US7884809B2 (en) | 2002-02-07 | 2011-02-08 | Access Systems Americas, Inc. | Method and system for navigating a display screen for locating a desired item of information |
US20030161450A1 (en) * | 2002-02-22 | 2003-08-28 | Clapper Edward O. | Providing information to facilitate telephone conversations |
US7069515B1 (en) * | 2002-05-21 | 2006-06-27 | Claria Corporation | Method and apparatus for displaying messages in computer systems |
US8316003B2 (en) | 2002-11-05 | 2012-11-20 | Carhamm Ltd., Llc | Updating content of presentation vehicle in a computer network |
US20040257341A1 (en) * | 2002-12-16 | 2004-12-23 | Bear Eric Justin Gould | Systems and methods for interfacing with computer devices |
US20040217988A1 (en) * | 2002-12-16 | 2004-11-04 | Bear Eric Justin Gould | Systems and methods for interfacing with computer devices |
US7469386B2 (en) | 2002-12-16 | 2008-12-23 | Microsoft Corporation | Systems and methods for interfacing with computer devices |
US20040220723A1 (en) * | 2002-12-16 | 2004-11-04 | Gould Bear Eric Justin | Systems and methods for interfacing with computer devices |
US20050010807A1 (en) * | 2003-04-10 | 2005-01-13 | Ken Kitamura | Information processing apparatus used by a plurality of different operators, and method and program for use in the information processing apparatus |
US8170912B2 (en) | 2003-11-25 | 2012-05-01 | Carhamm Ltd., Llc | Database structure and front end |
US20050198315A1 (en) * | 2004-02-13 | 2005-09-08 | Wesley Christopher W. | Techniques for modifying the behavior of documents delivered over a computer network |
US20060020904A1 (en) * | 2004-07-09 | 2006-01-26 | Antti Aaltonen | Stripe user interface |
US20060010395A1 (en) * | 2004-07-09 | 2006-01-12 | Antti Aaltonen | Cute user interface |
US8255413B2 (en) | 2004-08-19 | 2012-08-28 | Carhamm Ltd., Llc | Method and apparatus for responding to request for information-personalization |
US8078602B2 (en) | 2004-12-17 | 2011-12-13 | Claria Innovations, Llc | Search engine for a computer network |
US9495446B2 (en) | 2004-12-20 | 2016-11-15 | Gula Consulting Limited Liability Company | Method and device for publishing cross-network user behavioral data |
US20060174339A1 (en) * | 2005-01-29 | 2006-08-03 | Hai Tao | An arrangement and method of graphical password authentication |
USD523872S1 (en) | 2005-03-02 | 2006-06-27 | Boston Acoustics, Inc. | Computer icon for a clock alarm on a portion of a display panel |
US8645941B2 (en) | 2005-03-07 | 2014-02-04 | Carhamm Ltd., Llc | Method for attributing and allocating revenue related to embedded software |
US20060235965A1 (en) * | 2005-03-07 | 2006-10-19 | Claria Corporation | Method for quantifying the propensity to respond to an advertisement |
US8073866B2 (en) | 2005-03-17 | 2011-12-06 | Claria Innovations, Llc | Method for providing content to an internet user based on the user's demonstrated content preferences |
US8086697B2 (en) | 2005-06-28 | 2011-12-27 | Claria Innovations, Llc | Techniques for displaying impressions in documents delivered over a computer network |
US20060294226A1 (en) * | 2005-06-28 | 2006-12-28 | Goulden David L | Techniques for displaying impressions in documents delivered over a computer network |
US20070143830A1 (en) * | 2005-12-20 | 2007-06-21 | International Business Machines Corporation | Method, apparatus and system for preventing unauthorized access to password-protected system |
US20070173290A1 (en) * | 2006-01-23 | 2007-07-26 | Paavo Perttula | Mobile communication terminal and method therefore |
US20080125180A1 (en) * | 2006-02-10 | 2008-05-29 | George Hoffman | User-Interface and Architecture for Portable Processing Device |
US8082008B2 (en) * | 2006-02-10 | 2011-12-20 | Access Co., Ltd. | User-interface and architecture for portable processing device |
WO2007095504A1 (en) * | 2006-02-10 | 2007-08-23 | Access Systems Americas, Inc. | Improved user-interface and architecture portable processing device |
US8930834B2 (en) | 2006-03-20 | 2015-01-06 | Microsoft Corporation | Variable orientation user interface |
US8139059B2 (en) | 2006-03-31 | 2012-03-20 | Microsoft Corporation | Object illumination in a virtual environment |
US8812861B2 (en) | 2006-05-24 | 2014-08-19 | Confident Technologies, Inc. | Graphical image authentication and security system |
US20070277224A1 (en) * | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
US8117458B2 (en) | 2006-05-24 | 2012-02-14 | Vidoop Llc | Methods and systems for graphical image authentication |
US20080244700A1 (en) * | 2006-05-24 | 2008-10-02 | Osborn Steven L | Methods and systems for graphical image authentication |
US8850519B2 (en) | 2006-05-24 | 2014-09-30 | Confident Technologies, Inc. | Methods and systems for graphical image authentication |
US9189603B2 (en) | 2006-05-24 | 2015-11-17 | Confident Technologies, Inc. | Kill switch security method and system |
US20070300307A1 (en) * | 2006-06-23 | 2007-12-27 | Microsoft Corporation | Security Using Physical Objects |
US8001613B2 (en) * | 2006-06-23 | 2011-08-16 | Microsoft Corporation | Security using physical objects |
US7710894B2 (en) | 2006-12-21 | 2010-05-04 | International Business Machines Corporation | Method, computer program product, and apparatus for automatically adapting hardware and software preferences based on a network connection |
US20080155125A1 (en) * | 2006-12-21 | 2008-06-26 | International Business Machines Corporation | Method, computer program product, and apparatus for automatically adapting hardware and software preferences based on a network connection |
US8620952B2 (en) | 2007-01-03 | 2013-12-31 | Carhamm Ltd., Llc | System for database reporting |
US20110029436A1 (en) * | 2007-02-05 | 2011-02-03 | Vidoop, Llc | Methods And Systems For Delivering Sponsored Out-Of-Band Passwords |
US20110047605A1 (en) * | 2007-02-06 | 2011-02-24 | Vidoop, Llc | System And Method For Authenticating A User To A Computer System |
US7266693B1 (en) * | 2007-02-13 | 2007-09-04 | U.S. Bancorp Licensing, Inc. | Validated mutual authentication |
US20080195976A1 (en) * | 2007-02-14 | 2008-08-14 | Cho Kyung-Suk | Method of setting password and method of authenticating password in portable device having small number of operation buttons |
KR101452704B1 (en) * | 2007-02-14 | 2014-10-23 | 삼성전자주식회사 | A password setting method and a password authentication method in a portable device having a plurality of buttons |
US20080201649A1 (en) * | 2007-02-15 | 2008-08-21 | Nokia Corporation | Visualization of information associated with applications in user interfaces |
US8713458B2 (en) | 2007-02-15 | 2014-04-29 | Nokia Corporation | Visualization of information associated with applications in user interfaces |
US20100250937A1 (en) * | 2007-03-05 | 2010-09-30 | Vidoop, Llc | Method And System For Securely Caching Authentication Elements |
US20100043062A1 (en) * | 2007-09-17 | 2010-02-18 | Samuel Wayne Alexander | Methods and Systems for Management of Image-Based Password Accounts |
US20090240578A1 (en) * | 2008-03-18 | 2009-09-24 | Christopher James Lee | Methods and systems for graphical security authentication and advertising |
USD601165S1 (en) * | 2008-10-27 | 2009-09-29 | Microsoft Corporation | Icon for a display screen |
US8621578B1 (en) | 2008-12-10 | 2013-12-31 | Confident Technologies, Inc. | Methods and systems for protecting website forms from automated access |
US8347103B2 (en) | 2009-01-13 | 2013-01-01 | Nic, Inc. | System and method for authenticating a user using a graphical password |
US20100180336A1 (en) * | 2009-01-13 | 2010-07-15 | Nolan Jones | System and Method for Authenticating a User Using a Graphical Password |
US10254878B2 (en) | 2009-04-30 | 2019-04-09 | Synaptics Incorporated | Operating a touch screen control system according to a plurality of rule sets |
US9052764B2 (en) | 2009-04-30 | 2015-06-09 | Synaptics Incorporated | Operating a touch screen control system according to a plurality of rule sets |
US9703411B2 (en) | 2009-04-30 | 2017-07-11 | Synaptics Incorporated | Reduction in latency between user input and visual feedback |
US8564555B2 (en) | 2009-04-30 | 2013-10-22 | Synaptics Incorporated | Operating a touch screen control system according to a plurality of rule sets |
US9304619B2 (en) | 2009-04-30 | 2016-04-05 | Synaptics Incorporated | Operating a touch screen control system according to a plurality of rule sets |
US20100277505A1 (en) * | 2009-04-30 | 2010-11-04 | Ludden Christopher A | Reduction in latency between user input and visual feedback |
US20100277429A1 (en) * | 2009-04-30 | 2010-11-04 | Day Shawn P | Operating a touch screen control system according to a plurality of rule sets |
US10176315B2 (en) | 2009-06-18 | 2019-01-08 | Blackberry Limited | Graphical authentication |
US10325086B2 (en) | 2009-06-18 | 2019-06-18 | Blackberry Limited | Computing device with graphical authentication interface |
US20100322485A1 (en) * | 2009-06-18 | 2010-12-23 | Research In Motion Limited | Graphical authentication |
US9064104B2 (en) | 2009-06-18 | 2015-06-23 | Blackberry Limited | Graphical authentication |
US20110148438A1 (en) * | 2009-12-18 | 2011-06-23 | Synaptics Incorporated | System and method for determining a number of objects in a capacitive sensing region using a shape factor |
US20110148436A1 (en) * | 2009-12-18 | 2011-06-23 | Synaptics Incorporated | System and method for determining a number of objects in a capacitive sensing region using signal grouping |
US20110307831A1 (en) * | 2010-06-10 | 2011-12-15 | Microsoft Corporation | User-Controlled Application Access to Resources |
US9258123B2 (en) | 2010-12-16 | 2016-02-09 | Blackberry Limited | Multi-layered color-sensitive passwords |
US8650635B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Pressure sensitive multi-layer passwords |
US8931083B2 (en) | 2010-12-16 | 2015-01-06 | Blackberry Limited | Multi-layer multi-point or randomized passwords |
US10621328B2 (en) | 2010-12-16 | 2020-04-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
US8635676B2 (en) | 2010-12-16 | 2014-01-21 | Blackberry Limited | Visual or touchscreen password entry |
US8650624B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Obscuring visual login |
US8863271B2 (en) | 2010-12-16 | 2014-10-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
US8661530B2 (en) | 2010-12-16 | 2014-02-25 | Blackberry Limited | Multi-layer orientation-changing password |
US8745694B2 (en) | 2010-12-16 | 2014-06-03 | Research In Motion Limited | Adjusting the position of an endpoint reference for increasing security during device log-on |
US8631487B2 (en) | 2010-12-16 | 2014-01-14 | Research In Motion Limited | Simple algebraic and multi-layer passwords |
US9135426B2 (en) | 2010-12-16 | 2015-09-15 | Blackberry Limited | Password entry using moving images |
US8769641B2 (en) | 2010-12-16 | 2014-07-01 | Blackberry Limited | Multi-layer multi-point or pathway-based passwords |
US8769668B2 (en) | 2011-05-09 | 2014-07-01 | Blackberry Limited | Touchscreen password entry |
US9223948B2 (en) | 2011-11-01 | 2015-12-29 | Blackberry Limited | Combined passcode and activity launch modifier |
US20150128055A1 (en) * | 2012-05-28 | 2015-05-07 | Doro AB | Improved status notification for a mobile communications terminal |
US8881251B1 (en) * | 2012-05-30 | 2014-11-04 | RememberIN, Inc. | Electronic authentication using pictures and images |
US9021380B2 (en) * | 2012-10-05 | 2015-04-28 | Google Inc. | Incremental multi-touch gesture recognition |
US9552080B2 (en) | 2012-10-05 | 2017-01-24 | Google Inc. | Incremental feature-based gesture-keyboard decoding |
US20140098023A1 (en) * | 2012-10-05 | 2014-04-10 | Shumin Zhai | Incremental multi-touch gesture recognition |
US10977440B2 (en) | 2012-10-16 | 2021-04-13 | Google Llc | Multi-gesture text input prediction |
US11379663B2 (en) | 2012-10-16 | 2022-07-05 | Google Llc | Multi-gesture text input prediction |
US9798718B2 (en) | 2012-10-16 | 2017-10-24 | Google Inc. | Incremental multi-word recognition |
US9710453B2 (en) | 2012-10-16 | 2017-07-18 | Google Inc. | Multi-gesture text input prediction |
US9134906B2 (en) | 2012-10-16 | 2015-09-15 | Google Inc. | Incremental multi-word recognition |
US9678943B2 (en) | 2012-10-16 | 2017-06-13 | Google Inc. | Partial gesture text entry |
US9542385B2 (en) | 2012-10-16 | 2017-01-10 | Google Inc. | Incremental multi-word recognition |
US10489508B2 (en) | 2012-10-16 | 2019-11-26 | Google Llc | Incremental multi-word recognition |
US10140284B2 (en) | 2012-10-16 | 2018-11-27 | Google Llc | Partial gesture text entry |
US10019435B2 (en) | 2012-10-22 | 2018-07-10 | Google Llc | Space prediction for text input |
US10528663B2 (en) | 2013-01-15 | 2020-01-07 | Google Llc | Touch keyboard using language and spatial models |
US9830311B2 (en) | 2013-01-15 | 2017-11-28 | Google Llc | Touch keyboard using language and spatial models |
US11334717B2 (en) | 2013-01-15 | 2022-05-17 | Google Llc | Touch keyboard using a trained model |
US11727212B2 (en) | 2013-01-15 | 2023-08-15 | Google Llc | Touch keyboard using a trained model |
US10241673B2 (en) | 2013-05-03 | 2019-03-26 | Google Llc | Alternative hypothesis error correction for gesture typing |
US9841895B2 (en) | 2013-05-03 | 2017-12-12 | Google Llc | Alternative hypothesis error correction for gesture typing |
US9081500B2 (en) | 2013-05-03 | 2015-07-14 | Google Inc. | Alternative hypothesis error correction for gesture typing |
US20150143493A1 (en) * | 2013-11-21 | 2015-05-21 | Qnap Systems, Inc. | Electronic device and login method thereof |
US9589125B2 (en) | 2014-12-31 | 2017-03-07 | Hai Tao | 3D pass-go |
CN108710810A (en) * | 2018-05-22 | 2018-10-26 | 中国银联股份有限公司 | A kind of acquisition methods of password, traction equipment and terminal |
US11222105B2 (en) | 2018-12-12 | 2022-01-11 | International Business Machines Corporation | Graphic color-based authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6686931B1 (en) | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input | |
US6278453B1 (en) | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input | |
US6232970B1 (en) | User interface methodology supporting light data entry for microprocessor device having limited user input | |
US6310634B1 (en) | User interface methodology supporting light data entry for microprocessor device having limited user input | |
US7133859B1 (en) | Category specific sort and display instructions for an electronic device | |
US5515497A (en) | Method and apparatus for selecting and displaying items in a notebook graphical user interface | |
US6208340B1 (en) | Graphical user interface including a drop-down widget that permits a plurality of choices to be selected in response to a single selection of the drop-down widget | |
EP1581857B1 (en) | Alphanumeric keyboard input system using a game controller | |
US7242413B2 (en) | Methods, systems and computer program products for controlling tree diagram graphical user interfaces and/or for partially collapsing tree diagrams | |
US6859908B1 (en) | Automated text entry for processor-based system | |
US7113941B2 (en) | Database access mechanisms for a computer user interface | |
US20020126153A1 (en) | Apparatus and method for navigating electronic files using an array display | |
US7589710B2 (en) | J-key input for computer systems | |
US20030197736A1 (en) | User interface for character entry using a minimum number of selection keys | |
US20040142720A1 (en) | Graphical user interface features of a browser in a hand-held wireless communication device | |
US20140156680A1 (en) | User interface methods and systems for selecting and presenting content based on user relationships | |
US20050114770A1 (en) | Electronic device and user interface and input method therefor | |
US20040075693A1 (en) | Compact method of navigating hierarchical menus on an electronic device having a small display screen | |
WO2012037200A2 (en) | Methods of and systems for reducing keyboard data entry errors | |
EP1543404A2 (en) | Universal display keyboard, system, and methods | |
US20050235225A1 (en) | Selectable commands for displaying user interface panels | |
GB2420429A (en) | Method of navigating a hierarchical structure | |
US20010005199A1 (en) | Internet computer keyboard | |
US20110055758A1 (en) | Smart navigator for productivity software | |
US6377243B1 (en) | Data input device and the method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MOTOROLA, INC., ILLINOIS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:STARFISH SOFTWARE, INC.;REEL/FRAME:014692/0621 Effective date: 20030326 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MOTOROLA MOBILITY, INC., ILLINOIS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA, INC.;REEL/FRAME:025481/0196 Effective date: 20100731 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: MOTOROLA MOBILITY LLC, ILLINOIS Free format text: CHANGE OF NAME;ASSIGNOR:MOTOROLA MOBILITY, INC.;REEL/FRAME:029016/0704 Effective date: 20120622 |
|
AS | Assignment |
Owner name: GOOGLE TECHNOLOGY HOLDINGS LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA MOBILITY LLC;REEL/FRAME:034074/0021 Effective date: 20141029 |
|
AS | Assignment |
Owner name: GOOGLE TECHNOLOGY HOLDINGS LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA MOBILITY LLC;REEL/FRAME:035378/0001 Effective date: 20141028 |
|
FPAY | Fee payment |
Year of fee payment: 12 |