Microsoft Corporation
Systems and methods for obfuscating user selections
Last updated:
Abstract:
Techniques for obfuscating user selections during user-input of sensitive information, involving receiving a user input entered via a user input device and, in response, causing a first visual indication to move over a period of time through a first subset of displayed targets to enter user selections of targets. In a concurrent process, control signals are generated to display a second visual indication in addition to the first visual indication. The second visual indication moves through a second subset of the displayed targets during the period of time in a manner that is different from the first visual indication moving through the first subset of the displayed targets. The current user target is thus obfuscated as two or more different visual indicators move through the displayed targets.
Utility
10 May 2019
12 Apr 2022