Security interface for a mobile device

ABSTRACT

A method and device are described which provide a security interface, preferably for a mobile device. The security interface provides user-selectable non-secure data that is displayed without the need for a password. The non-secure data is preferably updated on a regular basis, and can be obtained from different sources, as selected by a user. The secure data can be accessed after successful authentication, such as a positive password verification. Additional non-secure data, related to the displayed non-secure data, can preferably be accessed, with or without a need for a password. An indication can be provided to inform a user that secure data has been updated, without the need to access such secure data. The security interface is preferably enabled after a predetermined timeout period. The interface allows the device to operate in three data access states: a controlled access state; a verification state; and a full access state.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of priority from U.S. ProvisionalPatent Application Serial No. 60/342,135, filed on Dec. 26, 2001. Thisprovisional application is hereby incorporated by reference in itsentirety.

FIELD OF THE INVENTION

This invention relates to the field of user interfaces for mobiledevices. In particular this invention relates to controlling user accessfor a mobile device.

BACKGROUND OF THE INVENTION

Many mobile devices, such as cellular telephones, personal digitalassistants (PDAs), and other handheld computing and communicatingdevices, currently perform numerous and complex functions. Due to theconfidential nature of some information or applications stored ordisplayed on such mobile devices, a security feature is often providedto prevent unauthorized access to confidential information.

In addition to user-initiated security features, most mobile deviceshave a security time out after a specified period of time. When thistime out period expires, a typical handheld or mobile device may eithershut down, or a security screen saver application may start. Most mobiledevice security screen savers show a minimum amount of staticinformation.

There is a need to show selected information pertinent to a mobiledevice user when a device security screen saver is active. There is arelated need to show, on a device security screen saver display, thatnew or updated information has been received. It is therefore desirableto provide an apparatus or method that will assist in satisfying theseneeds.

SUMMARY OF THE INVENTION

It is an object of the present invention to obviate or mitigate at leastone disadvantage of previous security interface, or security splashscreen arrangements, particularly those provided for use with handheldor mobile devices.

According to an aspect of the present invention, there is provided amobile device having a user interface, a memory and a transceivercoupled to a processor. The device includes a security interface coupledto the processor for facilitating control of user access to data storedin the memory. The data stored in the memory has stored security levelsdetermining secure data and non-secure data, the control being based onthe stored security levels. The security interface provides user accessto the non-secure data, and restricts access to the secure data based onthe stored security levels.

The non-secure data preferably includes user-selected non-secure data,which is preferably automatically updated. The processor and thesecurity interface can co-operate to provide a first state, a secondstate, and a third state. The first state is activated after a period ofinactivity on the device and in which access to the secure data isrestricted and access to the non-secure data is permitted. The secondstate is activated when a user attempts to access the secure data and inwhich security information is requested from a user. The third state isactivated when the security information input by the user is positivelyverified and in which full access to the secure data is granted to theuser.

The data stored in the device's memory can comprise resource informationfor a plurality of resources, and can preferably further comprise aresource identifier and resource data. The resource identifier can be auniform resource locator (URL). The security interface canadvantageously provide an indication of a change in the secure datawithout a need for authentication. The user interface preferablyincludes a display.

According to another aspect of the present invention, there is providedan electronic device having a processor, a user interface coupled to theprocessor, a memory coupled to the processor for storing non-secure dataand secure data, and a communications module coupled to the processorfor updating at least some of the non-secure data and the secure data.The device includes a security interface coupled to the processor forfacilitating control of user access to the non-secure data and thesecure data. The non-secure data and the secure data comprise a securitylevel and the control is based on stored security levels. The securityinterface provides user access to automatically updated user-selectednon-secure data, and restricts access to secure data based on anauthentication process.

According to yet another aspect of the present invention, there isprovided a security interface for an electronic device having a userinterface, a memory and a communications module coupled to a processor.The security interface includes a first data access module for providingnon-secure data to a user, an input module for receiving input from auser, an authentication module for authenticating received input tocontrol user access to the secure data, and a second data access modulefor providing the secure data to a user following successfulauthentication.

In the security interface, the non-secure data can include user-selectednon-secure data, which is preferably automatically updated via thecommunications module. The security interface can further include asecurity module for distinguishing between secure data and non-securedata stored in the memory, preferably based on a stored security level.The first data access module can include an indication module forproviding an indication that the secure data has changed. The userinterface can include a display, with the security interface beingdisplayed on the display. The input module can be coupled to a keyboardfor receiving input therefrom.

According to a further aspect of the present invention, there isprovided a method of controlling user access to data on a mobile device,the mobile device having a user interface and a memory coupled to theuser interface for storing secure data and non-secure data. The methodincludes the steps of: providing non-secure data via the user interface;authenticating user access to the secure data in response to anauthentication request; and permitting user access to the secure data inresponse to successful authentication.

The non-secure data can include user-selected non-secure data. The stepof authenticating can include the steps of: prompting the user to entersecurity information in response to a user attempt to access the secureinformation; and comparing the user's security information withpredetermined security information, which can be a password. The step ofprompting can include displaying a dialog box on the display, and thestep of authenticating can include a timeout period within which a useris permitted to attempt authentication.

The user interface preferably includes a display upon which theuser-selected non-secure data is displayed in a security interface. Themethod can further include the step of providing an indication on thedisplay in response to a change in secure data. When the user interfaceincludes a display, the indication can be displayed on a status area ofthe display.

The non-secure data can be automatically updated, which step can beperformed at regular intervals. In the case of user-selected non-securedata, the data can include a plurality of user-selected informationtypes, which can originate from a plurality of user-selected sources.

Additional non-secure data can be displayed in response to a userrequest for the additional non-secure data. The additional non-securedata preferably relates to the non-secure data previously displayed. Themethod is preferably initiated after a predetermined period ofinactivity on the device, which can be a user-defined timeout periodduring which there is no input on the device.

A last-accessed screen can be displayed following the step of permittinguser access to the secure data. A new message can be opened followingthe step of permitting user access to the secure data when theindication indicates the presence of the new message. The non-securedata can include static information that is not updated.

Other aspects and features of the present invention will become apparentto those ordinarily skilled in the art upon review of the followingdescription of specific embodiments of the invention in conjunction withthe accompanying figures.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present invention will now be described, by way ofexample only, with reference to the attached figures, wherein:

FIG. 1A is a diagram of an existing security interface for a mobiledevice;

FIG. 1B is a diagram of the existing security interface with a passworddialog box;

FIG. 1C is a diagram of an existing user interface screen for a mobiledevice showing an icon ribbon;

FIG. 1D is a diagram of an existing user interface screen for a mobiledevice showing a message list application;

FIG. 2 is a diagram illustrating a security interface for a mobiledevice according to an embodiment of the invention;

FIG. 3 is a diagram showing the security interface of FIG. 2 with apassword dialog box;

FIG. 4 is an alternative embodiment of the security interface of thepresent invention;

FIG. 5 is diagram showing the alternative embodiment of the securityinterface with a password dialog box;

FIG. 6 is a flow diagram showing a method for activating and updatingthe security interface according to an embodiment of the presentinvention; and

FIG. 7 is a block diagram illustrating a mobile device according to anembodiment of the present invention, including a security interface.

DETAILED DESCRIPTION

Generally, the present invention provides a method and device thatprovide a security interface, preferably for a mobile device. Thesecurity interface provides user-selectable non-secure data that isdisplayed without the need for a password. The non-secure data ispreferably updated on a regular basis, and can be obtained fromdifferent sources, as selected by a user. The secure data can beaccessed after successful authentication, such as a positive passwordverification. Additional non-secure data, related to the displayednon-secure data, can preferably be accessed, with or without a need fora password. An indication can be provided to inform a user that securedata has been updated, without the need to access such secure data. Thesecurity interface is preferably enabled after a predetermined timeoutperiod. The interface allows the device to operate in three data accessstates: a controlled access state; a verification state; and a fullaccess state.

FIG. 1A shows an existing security interface, or screen saver, for auser interface on a mobile device. The user interface 4, preferablycomprising a display, preferably exists on a typical mobile device(herein referred to as a device) having an auxiliary input device 6 suchas a thumbwheel, and a keyboard 8. Output to the user is provided viathe user interface, or display 4. Although the user interface will bedescribed below as comprising a display, it is to be understood that theuser interface can additionally comprise any suitable means forfacilitating audio or visual communication of information to and fromthe user.

In this diagram, a security interface 2, or security screen saver,comprises a box occupying most of the display. Above the box is a statusarea 13 that shows device-related information such as the time and date14, the signal strength 16, and the battery life 18. The status area 13may also contain such information as reminders, alerts and new messagecount. This known security interface 2 shows very little information. Inthe example of FIG. 1A, the security interface 2 shows a manufacturer'strademark, a prompt for the user and a copyright notice. The securityinterface 2 activates after a period of inactivity on the device.

FIG. 1B shows a password dialog box over the security interface. Thisdialog box 28 appears when a user has initiated some input into thedevice. This input can come from the thumbwheel 6 or the keyboard 8. Theuser is prompted to enter a password in the dialog box 28 at the dialogbox prompt 30 in order to access secure or confidential applications orinformation on the device. In fact, in this case, all information notshown as part of the security screen saver and in the status area istreated as secure or confidential. The password is preferably previouslyset by a user.

FIG. 1C is a drawing of the device once the user has entered the correctpassword in the dialog box that appears over the security interface. Thescreen is refreshed and shows an icon menu 32. Each icon 34 represents asoftware application available to the user. Using the thumbwheel 6, theuser may scroll through the icons and highlight an icon, as indicated at36, for an application, which the user wishes to utilize. In thisexample, a Message List icon is highlighted.

FIG. 1D shows a diagram of an existing user interface screen for amobile device showing a message list 38 generated when the message listapplication is selected and started. New and read messages 40 appear inthe message list 38. The status (new, read) of a message 40 ispreferably indicated using different icons, as shown. The informationshown in FIG. 1D is made available once the user has entered the correctpassword in the dialog box that appears over the security interface.

FIG. 2 shows an example of a security interface 12 includinguser-selected information according to an embodiment of the presentinvention. The security interface 12 preferably occupies most of thedisplay except for the status area. The status area 13 preferablycontains device-related information 14, 16, 18 (as described in relationto FIG. 1A) as well as an indication that secure information that existsbeyond the security interface 12 has changed. An example of anindication that secure information has changed is shown in FIG. 2 as aregister of new and unread messages 15 that have been received by thedevice. The indication is preferably provided by way of an indicationmodule, which is preferably implemented in software.

The security interface 12 preferably includes a plurality of types ofinformation 20, 22, 24 that a user can select for display, preferably byestablishing security configuration settings. The display of thisuser-selected non-secure data can be achieved by a data access module,which can be implemented in software. In this example, the user haschosen to display news headlines 20, financial information 22 such asstock quotes, and weather updates 24 for the user's chosen region. Theuser may choose from a plurality of information sources and types and isnot limited to these examples.

When setting up the security interface 12, the user preferably choosesthe information that the user wishes to see when a device time outoccurs. The user also preferably sets a password to deactivate thesecurity interface 12 when the user wishes to access secure data.

The term secure data is used herein to represent any information orapplication that has been identified as confidential or deserving somedegree of restricted access, either by a user selection or by a defaultsetting. The term non-secure data is used herein to represent anyinformation or application that is not secure data.

The user can choose the source of the non-secure data, or the device mayhave a default source for the chosen data depending on such criteria asthe user's location. This non-secure information is preferably updatedon a continuous basis over a wireless network in which the device isconfigured to operate. Such an update function can be implemented byeither an information push method to the device or an information pullmethod by the device, or a combination of both methods. For example,stock quotes could be automatically pushed to the device by a servercomputer operating on the Internet or other network, or the device canbe configured to periodically submit requests to a news website forcurrent news headlines.

The user can preferably access additional information related to thedisplayed non-secure data on the security interface 12 by scrolling toan item the user wishes to view. For example, the user may wish to viewa story associated with a news headline. If the user scrolls to thedesired headline, using the thumbwheel 6, and chooses to access theassociated news story, the device preferably displays the story orpossibly a portion thereof. A password would not be required because theinformation is non-secure.

In a particular embodiment, the security interface 12 preferably has asecure data access area 26. If the user wishes to access the securedata, security information must first be correctly entered by a user. Inthe example shown in FIG. 3, the security information is a password, andis requested from a user via a password dialog box 28, which preferablyappears when secure data access area 26 is selected. The user ispreferably prompted to enter the user's password in the dialog box 28 atthe dialog box prompt 30 in order to access secure or confidentialinformation and applications on the device. The password is preferablyset by the user when the user sets the options for the securityinterface. The prompting for the password, and all other steps relatingto authentication, is preferably performed by an authentication module,which can be implemented in software. An input module, also preferablyimplemented in software, is provided to receive input from the user,such as a password entry. Access to, and presentation of, the securedata is preferably performed by a data access module, which is alsopreferably implemented in software.

In an alternative embodiment, the secure data access area 26 is absentand access to secure data is achieved by entering a particular inputsequence, such as a predetermined set of keystrokes. As such, althoughthe secure data access area 26 may not appear on the display, access tothe secure data is still available after entering the particular inputsequence. The input sequence can preferably be user-defined for addedsecurity. Such an arrangement hides the fact that secure data can beaccessed on the device, unless the user is aware of the functionality.This can prevent unauthorized users from attempting to access securedata.

As described above, the status area 13 preferably includes an indicationthat secure data has changed, such as new message indicator 15. A deviceuser can thereby determine whether or not secure data protected by thepassword has changed without having to enter the password, therebysaving the user both time and effort to merely check for new or updatedsecure data. Other indicators of changes in secure data on the securityinterface 12 or in the status area 13 may include indicators for voicemails, SMS messages, and calendar updates, as well as other secure datathat may be updated.

In an alternative embodiment, entry of the password is required for theuser to access additional information related to the displayednon-secure data on the security interface 12. The dialog box preferablyappears once the user scrolls to an item the user wishes to view.

When the user has entered a password, the password is verified to ensurethat it is the correct, previously set device password. Once the enteredpassword is positively verified, then access to the secure data isgranted. Otherwise, the user may be prompted to re-enter a password,preferably until either the password is positively verified or the userhas incorrectly entered the password a predetermined number of times. Inthe case of a negative result of password verification after thepredetermined number of tries, the user may be prevented from accessingsecure data for a predetermined period of time, or until a particularaction is taken. This is common in GSM devices, where a SIM card can beused to lock out access to a device after repeated incorrect passwordentry.

FIG. 4 shows another embodiment of the security interface. In thisembodiment, access to all information not shown on the securityinterface or status area on the device is restricted. If the user wereto select an information item 20, 22, 24 on the security interface thatthe user wishes to explore further, then the password dialog box 28would preferably appear as shown in FIG. 5. Therefore, in thisembodiment, additional information related to non-secure data is treatedas secure data. The password dialog box 28 would also appear if the userwished to access secure data, such as any new received messagesindicated by the message indicator 15, and software applications.

FIG. 6 is a flow diagram showing a method for activating and updatingthe security interface. A device preferably has a time out securityfeature. This feature may be enabled and disabled by the user and allowsthe device to enter a first state, or controlled access state. In thisfirst state, access to secure data on the device is controlled after aperiod of time elapses in which there is no activity on the device, e.g.no user input. This timeout period is preferably user-selectable. Instep 50, the timeout period elapses. The security interface is activatedin step 52, preferably in response to a user activating the device, e.g.turning on a power button.

Non-secure user-selected information preferably appears in the securityinterface, which is preferably updated automatically in step 54. In step56, the security interface is refreshed with each update. Updates maybe, for example, at regular intervals, at particular times of day, orwhenever information at a source changes. Other update timings are alsopossible without departing from the scope of the present invention.Security interface information is preferably updated as new or updatedinformation is received.

When the device is in its first state, the security interface would besubstantially as shown in FIG. 3 or FIG. 5. It should be apparent that asecurity interface may include both information that is refreshed andupdated in accordance with an aspect of the invention, as well as somestatic information. In FIG. 3 for example, the heading “NEWS:” may bestatic, whereas the headlines may be updated.

In step 58, the user attempts to access secure information. Althoughthis step is shown in FIG. 6 at this point in the method, this step maytake place at any point after the security interface has been activated.If the user does not attempt to access secure information, the devicedetermines whether the user wishes to access additional informationrelated to displayed non-secure data (step 60). If the device determinesthat the user does want more detail, then, in step 62, the device willpreferably display more detail in a new screen. In step 64, the userwill exit the detail screen when finished and the security interfacewill activate again. If, in step 58, the device determines that the userdid not wish to access more detail, then the device will preferablycontinue to display the security interface with the continual updates.

If the user does attempt to access secure data, then the devicepreferably enters a second state, or security verification state. Inthis second state, a security password dialog box preferably activatesand prompts the user for verification in order to enter the user-setpassword in step 66. The security interface will appear substantially asshown in FIG. 3 or FIG. 5 when the device is in its second state.

In step 68, if the user does not enter a password, then in step 70, atime for entering the password will elapse and in step 72, the dialogbox will be cancelled and the device preferably returns to the firststate. The device then continues with displaying and refreshing thesecurity interface with updated user-selected information.

If the user does enter a password, the device determines whether theuser has entered the correct password in step 74. If the user does notenter the correct password, then in step 76, a dialog box preferablyappears warning the user that the password submitted was invalid. Thedevice then preferably displays the password dialog box again. In analternative embodiment, the device may also limit the number of timesthe user may re-enter the password incorrectly, to thereby provide afurther security feature.

If the user does enter the correct password in step 74, then the devicepreferably enters a third state, or full access state. In this thirdstate, the device deactivates the controlled access state by exiting thesecurity interface and refreshing the device display, preferably to thelast application used by the user before the device time out (step 78).As a default setting, the device may refresh the display to a main iconmenu such as shown in FIG. 1C.

In a further embodiment, the device automatically opens a new messagewhen the user enters the correct password to deactivate the securityinterface after a new message notification, such as 15 (FIG. 2) forexample, is generated by the device.

FIG. 7 is a block diagram illustrating an electronic device according toan embodiment of the present invention, including a security interface.FIG. 7 shows a representation of an electronic device 10, such as amobile device according to an embodiment of the present invention. Thedevice includes a user interface 4; a processor 43; a communicationmodule 42, such as a transceiver; and a memory 45. The user interface 4preferably comprises a display, in which case the display preferablycomprises two sections: the security interface 12 and the status area13. The device also includes a security interface software module 44that is executed by the processor 43. The security interface softwaremodule stores resources 48 in the memory 45, and can be implemented insoftware and itself be stored in the memory 45 or another memory. Thememory preferably stores data including secure data and non-secure data.Some of the data stored in the memory can be divided into individualresources 48.

The security interface software module 44 preferably saves and indexesresources transmitted or received by the device 10 as well as electronicresources local to the device. In an alternative embodiment, thesecurity interface software module 44 may allow the user to selectresources to save or discard.

Each stored resource 48 preferably has a resource identifier or locator48A, a security level 48B, and resource data 48C. The locator 48A, whichmay be a Uniform Resource Locator (URL), is used to provide a sourcefrom which to update the resource data 48C via the transceiver 42. Thesecurity level 48B preferably determines whether the resource data 48Cmay be shown on the security interface 12. A security module ispreferably provided for distinguishing between secure data andnon-secure data stored in the memory based on the stored securitylevels.

The security level 48B may also determine whether accessing furtherinformation or updates to the resource data 48C requires a user to entera password 46 for verification in order to show confidentialinformation. For example, if the user wishes to view information likethe weather, the password is not required because the security level isset to low. However if the user wishes to view Secure Data, the passwordis required because the security level is set to high. The password 46is preferably stored in memory 45. When a user enters a password, thedevice will compare it to the stored password 46.

In FIG. 7, the locators 48A are URLs used to conditionally update theresource data 48C displayed on the security interface 12 asuser-selected information elements 20, 22, and 24. The resource data 48Cmay be updated on the device 10 either by a push method to the device oran information pull method by the device 10 via the transceiver 42 overthe wireless network.

The invention can also be implemented in handheld communication devices,personal digital assistants (PDAs) with communication functions,cellular telephones, wireless modems and one-way or two-way pagers, orany other mobile communications device or electronic device using apassword-accessed screen saver to prevent access to secure data whileallowing access to non-secure data.

Although the communications module in FIG. 7 is illustrated as atransceiver, it may be any means suitable for updating resource data.For example, in the case of an electronic device that is not a wirelessdevice, the communications module can include an interface card, such asan Ethernet card. Also, the user interface can include not only adisplay, but also any other means by which the user can interface withthe resource data. These can include a microphone or speaker, a keyboardor keypad, a thumbwheel, or any other means allowing for either userinput or communication of information to a user.

The above-described embodiments of the present invention are intended tobe examples only. Alterations, modifications and variations may beeffected to the particular embodiments by those of skill in the artwithout departing from the scope of the invention, which is definedsolely by the claims appended hereto.

1. A method of controlling user access to data on a mobiletelecommunication device, the mobile telecommunication device having awireless transceiver for receiving and transmitting data, a userinterface including a display and a memory coupled to the user interfacefor storing secure data and non-secure data received via the wirelesstransceiver, the method comprising the steps of: periodically receivingat the mobile telecommunication device, non-secure data and secure datafrom one or more data sources via a wireless network; distinguishingreceived non-secure data from received secure data; segmenting thedisplay of the user interface into a status area and a securityinterface area; automatically displaying on the mobile telecommunicationdevice, the received non-secure data on the security interface areawithout authenticating user access to the non-secure data; whiledisplaying the non-secure data, automatically displaying an indicationthat secure data has been received from the one or more data sources onthe status area without authenticating user access to the secure data;subsequent to displaying the indication, while displaying the non-securedata, authenticating, at the security interface area, user access to thesecure data in response to an authentication request; selectivelydisplaying on the mobile telecommunication device the secure data on thedisplay of the user interface in response to successful authentication;redisplaying on the mobile telecommunication device the non-secure dataon the display of the user interface following expiration of aninactivity time period such that the secure data is no longer displayedon the display; and selectively displaying on the mobiletelecommunication device additional non-secure data that is related tothe previously displayed non-secure data, the displaying of theadditional non-secure data occurring in response to transmission of auser request for the additional non-secure data to a data source via thewireless transceiver.
 2. The method of claim 1 wherein the non-securedata comprises user-selected non-secure data.
 3. The method of claim 1wherein the step of authenticating comprises: prompting the user toenter security information in response to a user attempt to access thesecure information; and comparing the user's security information withpredetermined security information.
 4. The method of claim 3 wherein thesecurity information comprises a password.
 5. The method of claim 3wherein the step of prompting comprises displaying a dialog box on thedisplay.
 6. The method of claim 1 wherein the step of authenticatingcomprises a timeout period within which a user is permitted to attemptauthentication.
 7. The method of claim 2 wherein the user-selectednon-secure data comprises a plurality of user-selected informationtypes.
 8. The method of claim 7 wherein the plurality of user-selectedinformation types originate from a plurality of user-selected sources.9. The method of claim 1 wherein the additional non-secure datacomprises at least a portion of a news article that relates to a newsheadline of the non-secure data previously displayed.
 10. The method ofclaim 1 wherein the method is initiated after a predetermined period ofinactivity on the device.
 11. The method of claim 1 wherein the methodis initiated after a user-defined timeout period during which there isno input on the mobile telecommunication device.
 12. The method of claim1 further comprising the step of displaying a last-accessed screenfollowing the step of displaying the secure data.
 13. The method ofclaim 1, wherein the status area includes an indication of a currentdate and time, and a graphical indicator of a received signal strengthof the wireless network with which the mobile telecommunication deviceis communicating.
 14. The method of claim 1, further comprising: withoutauthenticating user access to the non-secure data, transmitting arequest for additional non-secure data from the mobile telecommunicationdevice to one of the one or more data sources and receiving andautomatically displaying the additional non-secure data on the displayof the user interface.
 15. A mobile telecommunication device comprising:a user interface comprising a display; a memory coupled to the userinterface, the memory configured to store secure data and non-securedata; a communication module configured to periodically receivingnon-secure data and secure data from one or more data sources via awireless network; a processor configured to cause segmenting of thedisplay of the user interlace into a status area and a securityinterface area the processor further configured to cause automaticdisplaying of the received non-secure data on the security interfacearea without authenticating user access to the non-secure data; and theprocessor further configured to cause displaying of an indication on thestatus area that secure data has been received from the one or more datasources without authenticating user access to the secure data whiledisplaying the non-secure data; a security interface configured toselectively authenticate user access to the secure data in response toan authentication request; wherein the display is configured toselectively display the secure data on the security interface area inresponse to successful authentication; wherein the user interface isconfigured to selectively display additional non-secure data that isrelated to the automatically displayed non-secure data, the displayingof the additional non-secure data occurring in response to thecommunication module transmitting a user request for the additionalnon-secure data to the one or more data sources via the wirelessnetwork; and wherein the display is configured to selectively redisplaythe non-secure data on the display of the user interface followingexpiration of an inactivity time period such that the secure data is nolonger displayed on the display.
 16. The mobile telecommunication deviceof claim 15 wherein the non-secure data provided via the user interfacecomprises user-selected non-secure data.
 17. The mobiletelecommunication device of claim 15 wherein the means forauthenticating comprises: means for prompting the user to enter securityinformation in response to a user attempt to access the secureinformation; and means for comparing the user's security informationwith predetermined security information.
 18. The mobiletelecommunication device of claim 17 wherein the security informationcomprises a password.
 19. The mobile telecommunication device of claim18 wherein the means for prompting comprises a means for displaying adialog box on the display.
 20. The mobile telecommunication device ofclaim 15, wherein the status area includes an indication of a currentdate and time, and a graphical indicator of a received signal strengthof the wireless network with which the mobile telecommunication deviceis communicating.