Browse Prior Art Database

A new method to call applications on mobile device

IP.com Disclosure Number: IPCOM000244400D
Publication Date: 2015-Dec-09
Document File: 5 page(s) / 119K

Publishing Venue

The IP.com Prior Art Database

Abstract

With the rapid growing of wireless application technologies, more and more people are using mobile to install personal sensitive data apps on mobility devices, like credit card payment, banking and internet purchasing transactions, etc. Besides the convenience it brings, This better user interface user experience also involves security risk. For example, if the mobile is lost or be stolen, there maybe risk of banking transmission and stolen risk. Hide the personal sensitive info related apps icon, and only the host know its relative location on user interface and the corresponding behavior to recall it, mobile user can locate their application icons any position on vacant user interface district, and recall the icon relative apps by special tapping behavior as tempo, pace or rhythm.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 5

A new method to call applications on mobile device

With the rapid growing of wireless application technologies, more and more people are using mobile to installpersonal sensitive data apps on mobility devices, like credit card payment, bankingand internet purchasing transactions, etc. Besides the convenience it brings, This better user interface user experience also involves security risk. For example, if the mobile is lost or be stolen, there maybe risk of banking transmission and stolen risk.

Hide the personal sensitive info related apps icon,and only the host know its relative location on user interface and the corresponding behavior to recall it (like tapping special serials), mobile user can locate their application icons any position on vacant user interface district, and recall the icon relative applications by special tapping behavior as tempo , pace or rhythm.

With this new method, it would be easy to hide the sensitive applications to protest the sensitive information. We could apply the method by the following processes:

1


Page 02 of 5


1. Define the hidden area


We should define a hidden area first, we could pull sensitive application icons to this area to be hidden .


2. Active the hidden area


The hidden area could be hidden by system operation or tempo , pace or rhythm password.


3. Move the sensitive icon to hidden area with tempo, pace or rhythm password


Drag the icons to this sensitive icons to the hidden area with tempo, pace or rhythm password, and user could recall the sensitive applications.

2


Pa...