US 12,141,316 B2
Obfuscation of sensitive information through non-visual feedback
Mohamed Zouhaier Ramadhane, Azcapotzalco (MX); Jose Luis Rodriguez Gomez, Mexico City (MX); Cesar Augusto Rodriguez Bravo, Alajuela (CR); Susanna Ting, Markham (CA); and Ana Paola Hentze Veerkamp, Miguel Hidalgo (MX)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Oct. 11, 2021, as Appl. No. 17/450,542.
Prior Publication US 2023/0116384 A1, Apr. 13, 2023
Int. Cl. G06F 21/00 (2013.01); G06F 21/31 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/6245 (2013.01) [G06F 21/31 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
responsive to receiving a signal from a user to start a session requiring input of sensitive data, determining, by one or more computer processors, one or more dummy character positions, wherein the one or more dummy character positions represent characters that are not part of the sensitive data;
adding, by the one or more computer processors, input characters received from the user to an input value string;
responsive to determining that a current character position in the input value string is a dummy character position, signaling, by the one or more computer processors, to the user that a next input character will be ignored, wherein the user is signaled using non-visual feedback;
responsive to receiving the next input character from the user, ignoring, by the one or more computer processors, the next input character, wherein ignoring the next input character includes skipping adding the next input character received from the user to the input value string; and
responsive to receiving an indication that a last character has been input by the user, authenticating, by the one or more computer processors, the user based on the input value string.