Systems and methods related to security credentials

ABSTRACT

A method includes receiving, from a user via an electronic device, input representing a password to be utilized for an account; automatically determining, utilizing a processor, a complexity value for the input password; automatically determining, based on the determined complexity value, security settings for the account; receiving, from a user via an electronic device, input representing an attempt to login to the account, the input representing an attempt to login to the account including an attempted password; automatically determining that the attempted password does not match the password to be utilized for the account; and determining a course of action to take in response to the determination that the attempted password does not match the password to be utilized for the account, the course of action being determined based at least in part on the automatically determined security settings for the account.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a U.S. continuation patent application of,and claims priority under 35 U.S.C. § 120 to, U.S. nonprovisional patentapplication Ser. No. 14/968,111, filed Dec. 14, 2015, which '111application is incorporated by reference herein, and which '111application is a U.S. continuation patent application of, and claimspriority under 35 U.S.C. § 120 to, U.S. nonprovisional patentapplication Ser. No. 13/804,072, filed Mar. 14, 2013, which '072application and any patent application publications thereof areincorporated by reference herein, and which '072 application is a U.S.continuation patent application of, and claims priority under 35 U.S.C.§ 120 to, U.S. nonprovisional patent application Ser. No. 13/732,141,filed Dec. 31, 2012, which '141 application and any patent applicationpublications thereof are incorporated by reference herein, and which'141 application is a U.S. nonprovisional patent application of, andclaims priority under 35 U.S.C. § 119(e) to, U.S. provisional patentapplication 61/747,142, filed Dec. 28, 2012, which provisional patentapplication is incorporated by reference herein, and which '072application further is a U.S. nonprovisional patent application of, andclaims priority under 35 U.S.C. § 119(e) to, U.S. provisional patentapplication 61/747,142, filed Dec. 28, 2012.

COPYRIGHT STATEMENT

All of the material in this patent document is subject to copyrightprotection under the copyright laws of the United States and othercountries. The copyright owner has no objection to the facsimilereproduction by anyone of the patent document or the patent disclosure,as it appears in official governmental records but, otherwise, all othercopyright rights whatsoever are reserved.

BACKGROUND OF THE INVENTION

The present invention generally relates to security credentials.

The use of passwords to ensure secure access to computer systems is wellknown. Unfortunately, it is not unusual for a user to misremember ormistype their password. Accordingly, many systems provide a usermultiple attempts to enter their password. Sometimes, a hint is providedafter a first incorrect entry. Other times, a user's only recourse mightbe to reset their password and have a new password emailed to them.

In order to try to prevent brute force attacks, some systems limit thenumber of attempts that a user can make. Other systems utilize amechanism, such as CAPTCHA, which provides blurred strings a user mustretype in order to try to prevent repeated, automated password entry.

A need exists for improvement in systems and methods related to securitycredentials. This, and other needs, are addressed by one or more aspectsof the present invention.

SUMMARY OF THE INVENTION

The present invention includes many aspects and features. Moreover,while many aspects and features relate to, and are described in, thecontext of password security, the present invention is not limited touse only in this context, as will become apparent from the followingsummaries and detailed descriptions of aspects, features, and one ormore embodiments of the present invention.

Accordingly, one aspect of the present invention relates to a methodwhich includes receiving, from a user via an electronic device, inputrepresenting a password to be utilized for an account; automaticallydetermining, utilizing a processor, a complexity value for the inputpassword; automatically determining, based on the determined complexityvalue, security settings for the account; receiving, from a user via anelectronic device, input representing an attempt to login to theaccount, the input representing an attempt to login to the accountincluding an attempted password; automatically determining that theattempted password does not match the password to be utilized for theaccount; and determining a course of action to take in response to thedetermination that the attempted password does not match the password tobe utilized for the account, the course of action being determined basedat least in part on the automatically determined security settings forthe account.

In a feature of this aspect, the electronic device comprises a tablet.

In a feature of this aspect, the electronic device comprises a desktopcomputer.

In a feature of this aspect, the electronic device comprises a laptopcomputer.

In a feature of this aspect, receiving input comprises receiving inputvia a touchscreen.

In a feature of this aspect, receiving input comprises receiving inputvia a keyboard.

In a feature of this aspect, receiving input comprises receiving inputvia a virtual keyboard displayed on a touchscreen.

In a feature of this aspect, the method further includes determining aproximity score comparing the attempted password to the actual password.

In at least some implementations, the proximity score is determinedbased on hashes.

In at least some implementations, the determined course of action totake in response to the determination that the attempted password doesnot match the password to be utilized for the account is at leastpartially informed by the proximity score.

In at least some implementations, the proximity score indicates a highdegree of likelihood that the user who entered the input correspondingto the attempted password is in fact the holder of the account.

In at least some implementations, determining the proximity scorecomprises utilizing alphanumeric matching.

In at least some implementations, determining the proximity scorecomprises utilizing spatial proximity matching.

In at least some implementations, determining the proximity scorecomprises utilizing gestural matching.

In at least some implementations, determining the proximity scorecomprises utilizing natural language processing.

In a feature of this aspect, the method further includes making aprobabilistic assessment of the likelihood that the user who entered theinput corresponding to the attempted password is in fact the holder ofthe account.

Another aspect relates to a method which includes receiving, from a uservia an electronic device, input representing a password to be utilizedfor an account; automatically determining, utilizing a processor, acomplexity value for the input password; automatically determining,based on the determined complexity value, security settings for theaccount; receiving, from a user via an electronic device, inputrepresenting an attempt to login to the account, the input representingan attempt to login to the account including an attempted password;automatically determining that the attempted password does not match thepassword to be utilized for the account; and determining a proximityscore comparing the attempted password to the actual password.

In a feature of this aspect, determining the proximity score comprisesutilizing alphanumeric matching.

In a feature of this aspect, determining the proximity score comprisesutilizing spatial proximity matching.

In a feature of this aspect, determining the proximity score comprisesutilizing gestural matching.

In a feature of this aspect, determining the proximity score comprisesutilizing natural language processing.

Another aspect relates to a method comprising receiving, from a user viaan electronic device, input representing a password to be utilized foran account; automatically determining, utilizing a processor, acomplexity value for the input password; automatically determining,based on the determined complexity value, security settings for theaccount; receiving, from a user via an electronic device, inputrepresenting an attempt to login to the account, the input representingan attempt to login to the account including an attempted password;automatically determining that the attempted password does not match thepassword to be utilized for the account; and determining a probabilityof the likelihood that the user who entered the input corresponding tothe attempted password is in fact the holder of the account.

Another aspect relates to a computer readable medium containing computerexecutable instructions for performing a disclosed method.

In addition to the aforementioned aspects and features of the presentinvention, it should be noted that the present invention furtherencompasses the various possible combinations and subcombinations ofsuch aspects and features. Thus, for example, any aspect may be combinedwith an aforementioned feature in accordance with the present inventionwithout requiring any other aspect or feature.

BRIEF DESCRIPTION OF THE DRAWINGS

One or more preferred embodiments of the present invention now will bedescribed in detail with reference to the accompanying drawings, whereinthe same elements are referred to with the same reference numerals, andwherein:

FIG. 1 illustrates how potential error in entering the string “cat”could result in the string “vsy”.

DETAILED DESCRIPTION

As a preliminary matter, it will readily be understood by one havingordinary skill in the relevant art (“Ordinary Artisan”) that the presentinvention has broad utility and application. As should be understood,any embodiment may incorporate only one or a plurality of theabove-disclosed aspects of the invention and may further incorporateonly one or a plurality of the above-disclosed features. Furthermore,any embodiment discussed and identified as being “preferred” isconsidered to be part of a best mode contemplated for carrying out thepresent invention. Other embodiments also may be discussed foradditional illustrative purposes in providing a full and enablingdisclosure of the present invention. As should be understood, anyembodiment may incorporate only one or a plurality of theabove-disclosed aspects of the invention and may further incorporateonly one or a plurality of the above-disclosed features. Moreover, manyembodiments, such as adaptations, variations, modifications, andequivalent arrangements, will be implicitly disclosed by the embodimentsdescribed herein and fall within the scope of the present invention.

Accordingly, while the present invention is described herein in detailin relation to one or more embodiments, it is to be understood that thisdisclosure is illustrative and exemplary of the present invention, andis made merely for the purposes of providing a full and enablingdisclosure of the present invention. The detailed disclosure herein ofone or more embodiments is not intended, nor is to be construed, tolimit the scope of patent protection afforded the present invention,which scope is to be defined by the claims and the equivalents thereof.It is not intended that the scope of patent protection afforded thepresent invention be defined by reading into any claim a limitationfound herein that does not explicitly appear in the claim itself.

Thus, for example, any sequence(s) and/or temporal order of steps ofvarious processes or methods that are described herein are illustrativeand not restrictive. Accordingly, it should be understood that, althoughsteps of various processes or methods may be shown and described asbeing in a sequence or temporal order, the steps of any such processesor methods are not limited to being carried out in any particularsequence or order, absent an indication otherwise. Indeed, the steps insuch processes or methods generally may be carried out in variousdifferent sequences and orders while still falling within the scope ofthe present invention. Accordingly, it is intended that the scope ofpatent protection afforded the present invention is to be defined by theappended claims rather than the description set forth herein.

Additionally, it is important to note that each term used herein refersto that which the Ordinary Artisan would understand such term to meanbased on the contextual use of such term herein. To the extent that themeaning of a term used herein—as understood by the Ordinary Artisanbased on the contextual use of such term—differs in any way from anyparticular dictionary definition of such term, it is intended that themeaning of the term as understood by the Ordinary Artisan shouldprevail.

Regarding applicability of 35 U.S.C. § 112, ¶6, no claim element isintended to be read in accordance with this statutory provision unlessthe explicit phrase “means for” or “step for” is actually used in suchclaim element, whereupon this statutory provision is intended to applyin the interpretation of such claim element.

Furthermore, it is important to note that, as used herein, “a” and “an”each generally denotes “at least one,” but does not exclude a pluralityunless the contextual use dictates otherwise. Thus, reference to “apicnic basket having an apple” describes “a picnic basket having atleast one apple” as well as “a picnic basket having apples.” Incontrast, reference to “a picnic basket having a single apple” describes“a picnic basket having only one apple.”

When used herein to join a list of items, “or” denotes “at least one ofthe items,” but does not exclude a plurality of items of the list. Thus,reference to “a picnic basket having cheese or crackers” describes “apicnic basket having cheese without crackers”, “a picnic basket havingcrackers without cheese”, and “a picnic basket having both cheese andcrackers.” Finally, when used herein to join a list of items, “and”denotes “all of the items of the list.” Thus, reference to “a picnicbasket having cheese and crackers” describes “a picnic basket havingcheese, wherein the picnic basket further has crackers,” as well asdescribes “a picnic basket having crackers, wherein the picnic basketfurther has cheese.”

Referring now to the drawings, one or more preferred embodiments of thepresent invention are next described. The following description of oneor more preferred embodiments is merely exemplary in nature and is in noway intended to limit the invention, its implementations, or uses.

In one or more preferred implementations, an intelligent system providessystem level tolerance for incorrect user input of login or accesscredentials. Preferably, such a system utilizes methodologies thattogether create a tool that allows users to bear less burden inremembering, storing and accurately entering login credentials. In oneor more preferred implementations, software provides a flexiblemechanism for determining when (or how severely) a user is penalized forentering incorrect security credentials. In some preferredimplementations, logic is utilized in analyzing a password entry attemptfor proximity to the actual password. If the attempt is deemed close, orthe system can determine with a relatively high degree of probabilitythat the user who entered the incorrect attempt is indeed the actualuser of the credentials, then penalties for incorrect passwords can beadjusted accordingly. One or more preferred implementations will now bedescribed including (1) methodologies for recognizing attemptedcredentials and determining if credentials set by a user or given to theuser by an administrator match the credentials attempted more thanchance would indicate (e.g. could this potentially be the actual userbased on what password he or she entered?); (2) methodologies fordetermining the probability of a match being correct (e.g. what is theprobability, and/or level of certainty, that this is a particularauthorized user?); (3) ways to set rules for adjusting penalties on theuser for presenting incorrect password attempts (e.g. based on the levelof certainty that the system has that this is the correct user, thesystem adjusts the security rules and may or may not inform the user ofsuch rules change or give the user a security hint to help ensure thatthe user is not locked out of the system).

In one or more preferred implementations, each of these three sets ofmethodologies is implemented as a subsystem. Notably, such methodologiescan be implemented in a variety of combinations and ways, and thepreferred implementation for a given situation will depend on theimportance of secure login/access to the information within thatapplication. Exemplary potential implementations will now be described,ranging from low security, or low need for privacy, implementations tovery highly secure and sophisticated implementations.

In one or more preferred implementations, a system utilizes very simplealgorithms to compare an attempted password to a stored password. Someexemplary such algorithms utilize alphanumeric matching. This mightinvolve, for example, determining how many letters/numbers match betweena stored password and an entered password attempt. Further, someexemplary such algorithms utilize spatial proximity matching. This mightinvolve, for example, determining that a stored password is “cat” and anattempted password, “cay”, could be a mistaken attempted entry of “cat”because the y neighbors the t in a traditional QWERTY keyboard. Thiscould additionally involve looking for transform errors such asmismatched capitalization or missed shifts (e.g. 7 instead of &).

In one or more preferred implementations, more complex comparisontechniques are utilized including building off spatial proximitymatching to test for gestural matching. For example, if a user's storedpassword is “cat” and they enter “vsy”, the system could recognize thaton a QWERTY keyboard the user's finger positions could have been shiftedone key to the right, as illustrated in FIG. 1. Similarly, a gesturalcomparison could notice if a user's stored password is a physicalpattern such as “zaq12wsx”, but the user enters “xsw23edc”.

In at least some implementations, text representing the password isavailable to the system for such a comparison, while in at least someother implementations a hash or other methodology is utilized for whichproximity or similarity to a particular hash result implies proximity orsimilarity of the underlying attempt and the underlying password.Alternatively or additionally, at the time that a hash is generated andstored for a password, related hashes for possible typographical errorsor other potential similar errors could also be generated and stored.

In one or more preferred implementations, a system utilizes naturallanguage processing (NLP), e.g. using context word definitions to gainan awareness of semantic meanings, to look for similarities betweenstored passwords and password attempts. For example, if a user has astored password of “November18th1980”, but enters “11/18/1980”, thesystem preferably understands that both strings refer to the same date.More elegant NLP applications preferably use context to understand thesemantic differences between such stored passwords as “Ilovemydaughter”and “Ilovemyson”, and utilize such similarities to conclude with somelevel of confidence that the secure user is attempting to input thecorrect password.

In one or more preferred implementations, an application is givenappropriate information to make a probabilistic assessment on thelikelihood that the person who input a password is the actual authorizeduser. For example, in the simple case of alphanumeric matching where thecorrect password is “cat”, an attempt of “car” is much more likely to bethe correct user than an attempt of “bin”.

In one or more preferred implementations, a system counts the number ofmatched characters between a password and an attempt, and the morecharacters that match, the higher the probability assigned that theattempt is a legitimate attempt by the authorized user.

In one or more implementations utilizing more complex algorithms, suchas, for example, implementations utilizing NLP, the system preferablyuses semantic meaning to understand how close the match is. Returning tothe example of a stored password of “November18th1980”, in a preferredimplementation, the system will consider “11/18/1980” a closer matchthan “24-April-2005”. Some preferred implementations utilize even morecomplex semantic matching using readily available sophisticated NLPtechnology.

In one or more preferred implementations, once a system recognizes thata password attempt was likely entered by an authorized user, and has adefined level of confidence in this recognition, the system dynamicallyalters security rules based on the proximal attempt.

As an exemplary case, consider a simple but secure system that locks outa user after a single incorrect entry of login credentials, which thenrequires a password reset, intervention by a system administrator, orthe cancelation of the account. In a preferred implementation, thesystem determines a number of characters in an attempted password thatmatch the stored password, and, for each correct character, the userreceives an additional attempt at providing the correct password. Forexample, if the stored password is “cat”, and a user enters “hit”, theuser would receive one extra attempt, whereas if they had entered “bat”,they would have received two.

Returning once more to the date example outlined above, if a storedpassword is “November18th1980”, and a user enters “14-April-2005”,although the entry is a date similarly to the password, in a highsecurity setting, this may not be considered a close enough match andthere may be no rule change in the security system. Alternatively, ifthe need for security in the system is minimal, the system mightrecognize that they entered a date, and that the target password is adate, and consequently grant the user an extra attempt before beinglocked out.

In one or more preferred implementations, a system utilizes NLP todetermine the probability that a user who makes an attempt is indeed theaccount holder, thus allowing for incredible flexibility inmethodologies by which users are identified, probabilities arecalculated, and security rules are changed. For example, returning tothe “November18th1980” case, using NLP a system could, if a high degreeof confidence related to an attempt is determined in a low securitysetting, provide a user with a meaningful hint. In such example, if auser enters “November17th1980”, the system could prompt the user with amessage such as: “Here's what you entered _(——————), it looks like youwere off by one letter somewhere. Let's try again.”

Additionally, in one or more preferred implementations, a system isconfigured to remember patterns of incorrectly entered passwords andalter rules based on those mistakes. For example, if a user often usestwo systems (A & B), and consistently types system B's password intosystem A's login, system A could “learn” this behavior and change rulesaccordingly (e.g. perhaps it doesn't count an attempt representing therepeatedly attempted password for system A against a five attempt limitallowed before system lockout). Such example illustrates the use ofintelligence or learning for password attempt forgiveness.

In various preferred implementations, methodologies disclosed hereinhelp address issues related to forgotten passwords (especially casessuch as the mix-up of caps and other transforms), as well as commontypographical errors, and format errors.

In one or more preferred implementation, methodologies disclosed hereinare utilized in a healthcare context. Shared workstations are common inthe healthcare industry. Further, it is very common for healthcareapplications to require a password to be entered before use. In somehospitals, there are computer terminals in each patient room, whereinnurses or providers will login and alter a patient record, order tests,order meds, ad infinitum, and log out when they are finished. Suchterminals can also be found in the hallways and nurses stations ofhospitals and ambulatory clinics. In one or more preferredimplementations, methodologies disclosed herein are utilized for suchworkstations and/or computer applications.

Methodologies disclosed herein are preferably utilized in settings wherehealthcare providers utilize several programs (such as, for example, anHER in a patient's room and a bed management program at a nurses'station), as, in such cases, it is not uncommon for passwords to bemismatched for any number of reasons, which could lead to one system'spassword being attempted during login to another system.

Methodologies disclosed herein are obviously applicable outside of ahealthcare context as well, however. Further, in one or more preferredimplementations, methodologies disclosed herein are utilized incombination and/or coordination with other security technologies andmethodologies (e.g. CAPTCHA proofs).

For example, in one or more preferred implementations involving aprogram or application which includes a password strengthindicator/synthesizer (e.g. depicting entered passwords as having one ofthree levels of password strength: red or weak, yellow or average, andgreen or strong), a computed strength of a user's password is also usedto indicate how lenient/stringent the system is in its “forgiveness” ofincorrect attempts. In some preferred implementations, if it isdetermined that a user has gone to some length to have created a veryhigh security password, this information is utilized to determine thatan incorrect attempt, even if very close to the actual password, shouldlead to a strict penalty (e.g. locking access, wiping a storage drive,etc).

As an example, consider an individual who is setting the password forhis webmail application who chooses “yellow” as his password. Wheninitially setting up this password, the system shows the user onscreenthat this is a relatively weak choice of characters, but perhaps theuser is more concerned with remembering this password than in securitysince this is his personal email account. In this case, if the userreturns to the application at a later time to log into the interface andthey happen to mistakenly type “blue” as their password upon login, thesystem (realizing that the user, in choosing a weak password, is notvery concerned with security) might prompt the user's memory with amessage such as the following: “Close, but not quite . . . the correctpassword is a color, but not the one you typed here. Hint: Think of thesun.”

Conversely, if the user originally chose a high security password suchas “November18th1980$”, this can be interpreted by the system as anindication that security is important to the user. Should the userreturn to the application later and type “November16th1980$”, thesystem, realizing that security is important to the user, might presentthe following message: “Incorrect attempt. You've been locked out of thesystem and your disk drive will be wiped clean of all data in 24 hours.Please call your system administrator and verify your identity beforethis time in order to abort the pending data wipe. 23:59, 23:58, 23:57 .. . ”, and take the appropriate related actions.

In one or more preferred implementations, upon a user initially settingup a password, the system stores an indication of the complexity of theuser's password, for later use in determining security settings (e.g.associated with password entry), and/or stores an indication of securitysettings (e.g. associated with password entry) determined based on thecomplexity of the user's password.

Based on the foregoing description, it will be readily understood bythose persons skilled in the art that the present invention issusceptible of broad utility and application. Many embodiments andadaptations of the present invention other than those specificallydescribed herein, as well as many variations, modifications, andequivalent arrangements, will be apparent from or reasonably suggestedby the present invention and the foregoing descriptions thereof, withoutdeparting from the substance or scope of the present invention.Accordingly, while the present invention has been described herein indetail in relation to one or more preferred embodiments, it is to beunderstood that this disclosure is only illustrative and exemplary ofthe present invention and is made merely for the purpose of providing afull and enabling disclosure of the invention. The foregoing disclosureis not intended to be construed to limit the present invention orotherwise exclude any such other embodiments, adaptations, variations,modifications or equivalent arrangements, the present invention beinglimited only by the claims appended hereto and the equivalents thereof.

What is claimed is:
 1. A method comprising: (I) first, (a) receiving,from a user via an electronic device, first input representing a firstattempt to login to an account, the first input representing a firstattempt to login to the account including a first attempted password;(b) automatically determining that the first attempt to login to theaccount failed by determining that a hash of the attempted password doesnot match a previously generated and stored hash for a password string;(c) based on the determination that the first attempt to login to theaccount failed, decreasing a remaining number of password attemptsallowed; (d) determining that the user has at least one additionalpassword attempt remaining; (e) receiving, from the user via theelectronic device, second input representing a second attempt to loginto the account, the second input representing a second attempt to loginto the account including a second attempted password; (f) automaticallydetermining that the second attempt to login to the account succeeded bydetermining that a hash of the attempted password matches the previouslygenerated and stored hash for the password string; (g) automaticallyremembering the incorrect first attempted password by storing a hash forthe incorrect first attempted password; (II) thereafter, (a) receiving,from the user via the electronic device, third input representing athird attempt to login to the account, the third input representing athird attempt to login to the account including a third attemptedpassword; (b) automatically determining that the third attempt to loginto the account failed by determining that a hash of the attemptedpassword does not match the previously generated and stored hash for thepassword string; (c) automatically determining that the hash of thethird attempted password matches the previously generated hash for theincorrect first attempted password; and (d) based on the determinationthat the hash of the third attempted password matches the previouslygenerated and stored hash for the incorrect first attempted password,not decreasing the remaining number of password attempts allowed eventhough the third attempted password was incorrect.
 2. The method ofclaim 1, wherein the electronic device comprises a tablet.
 3. The methodof claim 1, wherein the electronic device comprises a desktop or laptopcomputer.
 4. The method of claim 1, wherein receiving input comprisesreceiving input via a touchscreen.
 5. The method of claim 1, whereinreceiving input comprises receiving input via a keyboard.
 6. The methodof claim 1, wherein receiving input comprises receiving input via avirtual keyboard displayed on a touchscreen.
 7. A method comprising: (I)first, (a) receiving, from a user via an electronic device, first inputrepresenting a first attempt to login to an account, the first inputrepresenting a first attempt to login to the account including a firstattempted password; (b) automatically determining that the first attemptto login to the account failed by determining that a hash of theattempted password does not match the previously generated and storedhash for the password string; (c) based on the determination that thefirst attempt to login to the account failed, decreasing a remainingnumber of password attempts allowed; (d) determining that the user hasat least one additional password attempt remaining; (e) receiving, fromthe user via the electronic device, second input representing a secondattempt to login to the account, the second input representing a secondattempt to login to the account including a second attempted password;(f) automatically determining that the second attempt to login to theaccount succeeded by determining that a hash of the attempted passwordmatches the previously generated and stored hash for the passwordstring; (g) automatically remembering the incorrect first attemptedpassword by storing a hash for the incorrect first attempted password;(II) thereafter, (a) receiving, from the user via the electronic device,third input representing a third attempt to login to the account, thethird input representing a third attempt to login to the accountincluding a third attempted password; (b) automatically determining thatthe third attempt to login to the account failed by determining that ahash of the attempted password does not match the previously generatedand stored hash for the password string; (c) automatically determiningthat the hash of the third attempted password matches the previouslygenerated hash for the incorrect first attempted password; and (d)displaying, to the user via a display associated with the electronicdevice based on the determination that the hash of the third attemptedpassword matches the previously generated and stored hash for theincorrect first attempted password, a password hint.
 8. The method ofclaim 7, wherein the electronic device comprises a tablet.
 9. The methodof claim 7, wherein the electronic device comprises a laptop.
 10. Themethod of claim 7, wherein the electronic device comprises a desktopcomputer.
 11. The method of claim 7, wherein receiving input comprisesreceiving input via a touchscreen.
 12. The method of claim 7, whereinreceiving input comprises receiving input via a keyboard.
 13. The methodof claim 7, wherein receiving input comprises receiving input via avirtual keyboard displayed on a touchscreen.