Claims
- 1. A mobile device having a user interface, a memory and a transceiver coupled to a processor, the device comprising:
a security interface coupled to the processor for facilitating control of user access to data stored in the memory; the data stored in the memory having stored security levels determining secure data and non-secure data, the control being based on the stored security levels; and the security interface providing user access to the non-secure data, and restricting access to the secure data based on the stored security levels.
- 2. The device of claim 1 wherein the non-secure data includes user-selected non-secure data.
- 3. The device of claim 1 wherein the non-secure data is automatically updated.
- 4. The device of claim 1 wherein the processor and the security interface co-operate to provide a first state, a second state, and a third state;
the first state being activated after a period of inactivity on the device and in which access to the secure data is restricted and access to the non-secure data is permitted; the second state being activated when a user attempts to access the secure data and in which security information is requested from a user; and the third state being activated when the security information input by the user is positively verified and in which full access to the secure data is granted to the user.
- 5. The device of claim 1 wherein the data comprises resource information for a plurality of resources.
- 6. The device of claim 5 wherein the resource information for each resource further comprises a resource identifier and resource data.
- 7. The device of claim 6 wherein the resource identifier is a uniform resource locator (URL).
- 8. The device of claim 1 wherein the security interface provides an indication of a change in the secure data without a need for authentication.
- 9. The device of claim 1 wherein the user interface includes a display.
- 10. An electronic device having a processor, a user interface coupled to the processor, a memory coupled to the processor for storing non-secure data and secure data, and a communications module coupled to the processor for updating at least some of the non-secure data and the secure data, the device comprising:
a security interface coupled to the processor for facilitating control of user access to the non-secure data and the secure data; the non-secure data and the secure data comprising a security level and the control being based on stored security levels; and the security interface providing user access to automatically updated user-selected non-secure data, and restricting access to secure data based on an authentication process.
- 11. A security interface for an electronic device having a user interface, a memory and a communications module coupled to a processor, the security interface comprising:
a first data access module for providing non-secure data to a user; an input module for receiving input from a user; an authentication module for authenticating received input to control user access to the secure data; and a second data access module for providing the secure data to a user following successful authentication.
- 12. The security interface of claim 11 wherein the non-secure data includes user-selected non-secure data.
- 13. The security interface of claim 11 wherein the non-secure data is automatically updated via the communications module.
- 14. The security interface of claim 11 further comprising a security module for distinguishing between secure data and non-secure data stored in the memory.
- 15. The security module of claim 14 wherein the secure data and the non-secure data are distinguished based on a stored security level.
- 16. The security interface of claim 11 wherein the first data access module comprises an indication module for providing an indication that the secure data has changed.
- 17. The security interface of claim 11 wherein the user interface includes a display and the security interface is displayed on the display.
- 18. The security interface of claim 11 wherein the input module is coupled to a keyboard for receiving input therefrom.
- 19. A method of controlling user access to data on a mobile device, the mobile device having a user interface and a memory coupled to the user interface for storing secure data and non-secure data, the method comprising the steps of:
providing non-secure data via the user interface; authenticating user access to the secure data in response to an authentication request; and permitting user access to the secure data in response to successful authentication.
- 20. The method of claim 19 wherein the non-secure data provided via the user interface comprises user-selected non-secure data.
- 21. The method of claim 19 wherein the step of authenticating comprises:
prompting the user to enter security information in response to a user attempt to access the secure information; and comparing the user's security information with predetermined security information.
- 22. The method of claim 21 wherein the security information comprises a password.
- 23. The method of claim 21 wherein the step of prompting comprises displaying a dialog box on the display.
- 24. The method of claim 19 wherein the step of authenticating comprises a timeout period within which a user is permitted to attempt authentication.
- 25. The method of claim 19 wherein the user interface includes a display and wherein the non-secure data is displayed in a security interface thereon.
- 26. The method of claim 19 further comprising the step of providing an indication on the display in response to a change in secure data.
- 27. The method of claim 19 wherein in the user interface includes a display and the indication is displayed in a status area thereon.
- 28. The method of claim 19 further comprising the step of automatically updating the non-secure data.
- 29. The method of claim 28 wherein the step of automatically updating is performed at regular intervals.
- 30. The method of claim 20 wherein the user-selected non-secure data comprises a plurality of user-selected information types.
- 31. The method of claim 30 wherein the plurality of user-selected information types originate from a plurality of user-selected sources.
- 32. The method of claim 19 wherein additional non-secure data is displayed in response to a user request for the additional non-secure data.
- 33. The method of claim 32 wherein the additional non-secure data relates to the non-secure data previously displayed.
- 34. The method of claim 19 wherein the method is initiated after a predetermined period of inactivity on the device.
- 35. The method of claim 19 wherein the method is initiated after a user-defined timeout period during which there is no input on the device.
- 36. The method of claim 19 further comprising the step of displaying a last-accessed screen following the step of permitting user access to the secure data.
- 37. The method of claim 19 further comprising the step of opening a new message following the step of permitting user access to the secure data when the indication indicates the presence of the new message.
- 38. The method of claim 19 wherein the user-selected non-secure data comprises static information that is not updated.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application claims the benefit of priority from U.S. Provisional Patent Application Serial No. 60/342,135, filed on Dec. 26, 2001. This provisional application is hereby incorporated by reference in its entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60342135 |
Dec 2001 |
US |