Trustworthy indication of software integrity
First Claim
1. A computer-implemented method for providing security information for a computer program, comprising:
- identifying an application associated with a request from a user using the application for security information based at least in part on determining that the application is presenting an application user interface on a display during the use by the user;
requesting, based at least in part on the request for the security information, a trust evaluation device to evaluate trustworthiness of the application;
generating, based at least in part on an evaluation of the trustworthiness of the application, the security information; and
displaying a security information user interface separate from the application user interface, the security information user interface including the security information.
1 Assignment
0 Petitions
Accused Products
Abstract
Computing devices are disclosed that include functionality for providing a trustworthy indication of software integrity. The computing devices include a hardware trust evaluation device capable of determining the trustworthiness of computer programs executing on the devices. At least one trust indicator is also connected to the hardware trust evaluation device for providing an external indication of the trustworthiness of a computer program. Additional security information regarding the trustworthiness of the computer program may be displayed on the primary display device of the computing device. The display of the security information is triggered by a user of the computing device submitting a request through a secure mechanism, where the request is unobservable and inaccessible to programs executing on the computing device. Additional secure mechanisms, such as a unique user interface for displaying the security information, can be utilized to ensure the authenticity of the displayed security information.
-
Citations
20 Claims
-
1. A computer-implemented method for providing security information for a computer program, comprising:
-
identifying an application associated with a request from a user using the application for security information based at least in part on determining that the application is presenting an application user interface on a display during the use by the user; requesting, based at least in part on the request for the security information, a trust evaluation device to evaluate trustworthiness of the application; generating, based at least in part on an evaluation of the trustworthiness of the application, the security information; and displaying a security information user interface separate from the application user interface, the security information user interface including the security information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by a computing device, cause the computing device to:
-
identify an application presenting an application user interface on a display for which security information requested by a user using the application is to be determined based at least in part on determining that the application is presenting the application user interface on the display during the use by the user; cause a trust evaluation device to evaluate trustworthiness of the application; generate, based at least in part on an evaluation of the trustworthiness of the application, the security information; and display a security information user interface separate from the application user interface, the security information user interface including the security information. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computing device configured to provide security information for an application executing on the computing device, the computing device comprising:
-
at least one processor configured to execute the application; an output device; and a memory connected to the at least one processor storing instructions, when executed by the at least one processor, configure the at least one processor to; identify an application presenting an application user interface on a display executing on the at least one processor for which security information requested by a user using the application is to be determined based at least in part on determining that the application is presenting the application user interface on the display during the use by the user; cause a trust evaluation to evaluate trustworthiness of the application; generate, based at least in part on the trustworthiness of the application, the security information; and display, on the output device, a security information user interface separate from the application user interface, the security information user interface including the security information. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification