Displaying a trusted user interface using background images
First Claim
1. A method comprising:
- selecting an image to mark a trusted computing environment; and
sealing the image to the trusted computing environment.
1 Assignment
0 Petitions
Accused Products
Abstract
In one implementation, a method for ensuring the trustworthiness of graphical user interfaces is described wherein a computing system user selects and/or modifies an image to be used as at least a portion of the background of one or more visual elements of a graphical user interface of a trusted computing environment. The user selected background image facilitates recognition by the user of the trustworthiness of the environment'"'"'s graphical user interface when it is displayed to the user. The computing system seals the selected image or a modified version of the selected image within the trusted computing environment to prevent access to that image by computing environments other than the trusted computing environment. Additional embodiments are described and claimed.
40 Citations
30 Claims
-
1. A method comprising:
-
selecting an image to mark a trusted computing environment; and
sealing the image to the trusted computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A machine-accessible medium including instructions that, when executed, cause a machine to:
-
isolate a selected image within a trusted computing environment, the trusted computing environment including a graphical user interface having at least one visual element; and
apply the selected image as at least a portion of the background of the visual element. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
14. The machine readable medium of claim 14, further including instructions that, when executed, cause a machine to:
modify the at least one visual element to make the foreground of the at least one visual element easier to read over the selected image.
-
24. An apparatus comprising:
a machine-accessible medium including instructions that, when executed, cause a processor to perform operations comprising;
sealing an image to a trusted computing environment, the trusted computing environment including a user interface having at least one visual element; and
using the image as at least a portion of the background of the at least one visual element. - View Dependent Claims (25, 26, 27, 28)
-
29. A system comprising:
-
a processor to execute instructions; and
a memory coupled to the processor, the memory to store the instructions to be executed by the processor;
wherein, in response to the instructions, the processor performs operations comprising;
sealing an image selected to mark a trusted computing environment to the trusted computing environment, the trusted computing environment including a user interface having at least one visual element; and
using the image as at least a portion of the background of the at least one visual element. - View Dependent Claims (30)
-
Specification