1. Technical Field
This application generally relates to an active new password entry dialog with compact visual indication of adherence to password policy. It may be used with mobile wireless communication devices having a limited visual display area.
2. Related Art
Computer-based electronic devices of many sorts now require passwords for authorized operation. For ensuring an appropriate level of security, such passwords should be changed frequently.
The need to enter new passwords is especially present for mobile wireless communication devices which may be lost, stolen, misplaced or the like. If such new password entry routines require communication with a base station or the like, then communication bandwidth is also required for new password entry processes. Conservation of such bandwidth for more useful communication payload is, of course, desirable. Furthermore, small handheld mobile wireless communication devices often have limited numbers of keys and limited display area.
If a user needs to set a new password, often he/she has to conform to some password policies that the user's employer has determined.
A typical current problem is that the user enters a password, clicks OK, and only then is the password checked against the required policies. If it passes, all is well. If it fails, then a dialog may pop up explaining what policy or part of a policy the password failed to satisfy. Then the user must start all over again.
This is not an ideal solution. It would be better if the user could be alerted while setting the password, to let him/her know how they are doing. This would make the user experience much better.
There are at least two earlier products that address some aspects of this problem:
The Entrust approach puts a lot of information all on one screen. A small handheld mobile wireless device typically does not have sufficient display area available for this approach. The PGP approach does use a more compact higher level progress-like bar—but only one that refers to the estimated security strength of the password being entered. It has nothing to do with password policy.
These and other objects and advantages will be better understood and appreciated in conjunction with the following detailed description of exemplary embodiments taken together with the accompanying drawings, in which:
In one exemplary embodiment we now add a progress bar to the screen where a new password is being entered. To overcome the problem of limited display area, we provide a progress bar with rolling hints that summarize useful feedback information into a compact visual display. This embodiment uses applicable password policies to display progress and allows the user to find out more information about the policies and the new password's compliance with such policies.
Suppose a password has a series of 5 password policies that must be met. As a user enters a password, our present exemplary embodiment is constantly checking (e.g., dynamically after each character has been entered) whether the user has yet fulfilled any policy requirements. If the user does newly satisfy a policy, the progress bar filling is increased. If the user has met 3 of the 5 requirements, then 60% of the bar will be filled. Only when the bar reaches 100% is the user allowed to click “OK” to close the dialog box and set the password.
But suppose a user has entered a password and the bar is stuck at 60%. How does the user figure out what policies have not yet been met? First one can display a hint underneath the progress bar describing one of the policies that has not yet been met. Preferably one of the remaining policies is chosen at random (rather than just in some predetermined order) to better insure that passwords on different devices are as different as possible. So, for example, if the user has not yet put a numerical character into the password, the display under the progress bar might read “MUST INCLUDE A NUMBER.” In addition, in our present exemplary embodiment, the user can select the progress bar which will cause another dialog box to pop up listing all password policies along with an indication as to whether each has yet been fulfilled.
As a further optional possibility, instead of having a fixed progress bar (i.e., always present) in the dialog box, the progress bar could pop up (like tips or suggestion pop ups) below the password edit box while the user is typing. This makes the display a little more dynamic. The user gets more feedback on the quality of his/her password and on the current password policies.
Our new arrangement may be embodied in hardware, software or a combination of hardware and software. It also provides a method for providing active new password entry dialog with compact visual indication of adherence to password policy. The exemplary embodiment is realized, at least in part, by executable computer program code which may be embodied in physical program memory media.
An email sender 10 may, for example, be connected to an ISP (Internet Service Provider) on which a user of the system has an account, located within a company, possibly connected to a local area network (LAN), and connected to the Internet 12, or connected to the Internet 12 through a large ASP (application service provider) such as America Online™ (AOL). Those skilled in the art will appreciate that the systems shown in
The message server 14 may be implemented, for example, on a network computer within the firewall of a corporation, a computer within an ISP or ASP system or the like, and acts as the main interface for email exchange over the Internet 12. Although other messaging systems might not require a message server system 14, a mobile device 100 configured for receiving and possibly sending email will normally be associated with an account on a message server. Perhaps the two most common message servers are Microsoft Exchange™ and Lotus Domino™. These products are often used in conjunction with Internet mail routers that route and deliver mail. These intermediate components are not shown in
The wireless gateway 16 and infrastructure 18 provide a link between the Internet 12 and wireless network 20. The wireless infrastructure 18 determines the most likely network for locating a given user and tracks the users as they roam between countries or networks. A message is then delivered to the mobile device 100 via wireless transmission, typically at a radio frequency (RF), from a base station in the wireless network 20 to the mobile device 100. The particular network 20 may be virtually any wireless network over which messages may be exchanged with a mobile communication device.
As shown in
Regardless of the specific mechanism controlling forwarding of messages to mobile device 100, the message 22, or possibly a translated or reformatted version thereof, is sent to wireless gateway 16. The wireless infrastructure 18 includes a series of connections to wireless network 20. These connections could be Integrated Services Digital Network (ISDN). Frame Relay or T1 connections using the TCP/IP protocol used throughout the Internet. As used herein, the term “wireless network” is intended to include three different types of networks, those being (1) data-centric wireless networks, (2) voice-centric wireless networks and (3) dual-mode networks that can support both voice and data communications over the same physical base stations. Combined dual-mode networks include, but are not limited to, (1) Code Divisional Multiple Access (CDMA) networks, (2) the Group Special Mobile or the Global System for Mobile Communications (GSM) and the General Packet Radio Service (GPRS) networks, and (3) future third-generation (3G) networks like Enhanced Data-rates for Global Evolution (EDGE) and Universal Mobile Telecommunications Systems (UMTS). Some older examples of data-centric network include the Mobitex™ Radio Network and the DataTAC™ Radio Network. Examples of older voice-centric data networks include Personal Communication Systems (PCS) networks like GSM, and TDMA systems.
As depicted in
The mobile communication device 100 will also typically include a main control CPU 106 which operates under control of a stored program in program memory 108 (and which has access to data memory 110). CPU 106 also communicates with a conventional keyboard 112, display 114 (e.g., an LCD) and audio transducer or speaker 116. A portion of data memory 110a is available for storing password policies and entry hints, dialog screen formats and the like. Suitable computer program executable code is stored in portions of program memory 108a to constitute the active new password entry dialog with compact visual indication of adherence to password policy logic and described below.
The exemplary enter new password logic is entered at 300 in
At 304, 306, 308 and 310 in
If the progress bar 400 has not been selected, then a test is made at 318 to ensure that the new keyboard entry is consistent with all password policies. If not, then a suitable error message is displayed at 320 and control is returned to box 304.
If the new keyboard entry has been found consistent with all password policies, then, as depicted at 322, if any additional password policy has now been satisfied, then the progress bar 400 will be suitably updated (along with any textual or numerical percentage completion data) and, in the presently preferred exemplary embodiment, a new randomly selected password policy hint 402 will also be updated on the display screen for future keyboard entries. A test is made at 324 to see if 100% of all applicable password policies have yet been met. If not, then control is returned to 304. If so, then the Ok button is enabled at 326 before control is again returned to box 304.
As those in the art will appreciate, variations and modifications may be made in the above-described exemplary embodiments while yet retaining many of the novel features and advantages of those embodiments. Accordingly, all such variations and modifications are intended to be included within the scope of the appended claims.