This patent application is assigned to
The following quote was obtained by the news editors from the background information supplied by the inventors: "The present invention relates generally to managing sensitive information, and in particular, to a computer implemented method for securing sensitive information with password protection.
"Mobile devices such as mobile phones, tablets, notebooks and laptops are rapidly expanding in use and function. The number of mobile phone subscriptions in developed nations is approaching 100%, with many of those mobile phones being smartphones. Smartphones allow users to perform a variety of tasks including internet browsing, picture taking, email communications, and even point of sale purchases. In addition, notebooks, tablets and other mobile devices are also widely used to perform many of the same tasks as mobile phones, but typically with a larger user interface display and often with different input devices such as a keyboard. As a result of the utilization of these mobile devices, users are able to remotely perform more tasks than ever before."
In addition to the background information obtained for this patent application, VerticalNews journalists also obtained the inventor's summary information for this patent application: "The illustrative embodiments provide a method, system, and computer usable program product for securing pages that contain sensitive information including utilizing a processor to provide a user interface on a display allowing a user to select a page as password protected on a device, responsive to a user utilizing the UI to select the page as password protected, receiving a password from the user, and requiring entry of the password before displaying the page on the display[Insert Final Claim 1].
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
"The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, further objectives and advantages thereof, as well as a preferred mode of use, will best be understood by reference to the following detailed description of illustrative embodiments when read in conjunction with the accompanying drawings, wherein:
"FIG. 1 is a block diagram of a data processing system in which various embodiments may be implemented;
"FIG. 2 is a block diagram of a network of data processing systems in which various embodiments may be implemented;
"FIG. 3 is a block diagram of a software hierarchy for a data processing system in which various embodiments may be implemented;
"FIGS. 4A and 4B are front of screen diagrams illustrating the utilization of the security application on a mobile phone in which various embodiments may be implemented;
"FIGS. 5A and 5B are front of screen diagrams illustrating utilization of the security GUI on a mobile phone in accordance with a first and a second embodiment;
"FIG. 6 is a flow diagram of the security GUI in operation in which various embodiments may be implemented; and
"FIG. 7 is a flow diagram of the security application in operation in which various embodiments may be implemented."
URL and more information on this patent application, see:
Keywords for this news article include: Information Technology, Information and Data Processing,
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- Businesses, Investors Pressing for Green Policy
- 'The Voice' Sounds Different This Season
- NSHMBA to Rebrand With New Name, Logo
- Lower Used-Car Prices Roil the Auto Industry
- Chrysler and Google Launch Virtual Plant Tour
- Perry Wants to Skip Court for Foreign Trip
- Investors Fret Yahoo's Future, Stock Dips
- Liberty Power Helps USHCC Go Green
- Iran Digs in on Underground Nuclear Site
- Hispanic Designer Honored As Rising Star