Methods and apparatuses for information authentication and user interface feedback
First Claim
1. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method for authentication, the method comprising:
- determining an indication of a cursor being positioned over a graphical user interface element of a first application process for a period of time, the first application process to present information, the graphical user interface element having encrypted data obtained with the information;
in response to the indication;
obtaining the encrypted data from the graphical user interface element; and
determining whether or not the information is trusted using the encrypted data.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses for management of entitlement to security operations. In one aspect, a method for authentication, includes: determining an indication of a cursor being positioned over a graphical user interface element of a first application process for a period of time, where the first application process is to present information and the graphical user interface element has encrypted data obtained with the information; and in response to the indication: obtaining the encrypted data from the graphical user interface element; and determining whether or not the information is trusted using the encrypted data. In another aspect, a method for authentication, includes: determining whether or not information loaded into a first application for display to a first user is trusted based on encrypted data obtained with the information; and in response to a determination that the information is trusted, presenting at least one of a user designated visual cue and a user designated audio cue to indicate that the information is trusted.
89 Citations
45 Claims
-
1. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method for authentication, the method comprising:
-
determining an indication of a cursor being positioned over a graphical user interface element of a first application process for a period of time, the first application process to present information, the graphical user interface element having encrypted data obtained with the information;
in response to the indication;
obtaining the encrypted data from the graphical user interface element; and
determining whether or not the information is trusted using the encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method for authentication, the method comprising:
-
determining whether or not information loaded into a first application for display to a first user is trusted based on encrypted data obtained with the information; and
in response to a determination that the information is trusted, presenting a user designated visual cue to indicate that the information is trusted. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method for authentication, the method comprising:
-
determining an indication of a cursor being positioned over a graphical user interface element of a first application process for a period of time, the first application process to present information, the graphical user interface element having encrypted data obtained with the information;
in response to the indication;
obtaining the encrypted data from the graphical user interface element; and
determining whether or not the information is trusted using the encrypted data. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A method for authentication, the method comprising:
-
determining whether or not information loaded into a first application for display to a first user is trusted based on encrypted data obtained with the information; and
in response to a determination that the information is trusted, presenting at least one of a user designated visual cue and a user designated audio cue to indicate that the information is trusted. - View Dependent Claims (34, 35, 36)
-
-
37. A data processing system for authentication, the system comprising:
-
means for determining an indication of a cursor being positioned over a graphical user interface element of a first application process for a period of time, the first application process to present information, the graphical user interface element having encrypted data obtained with the information;
means for, in response to the indication, obtaining the encrypted data from the graphical user interface element; and
means for, in response to the indication, determining whether or not the information is trusted using the encrypted data. - View Dependent Claims (38, 39, 40, 41)
-
-
42. A data processing system for authentication, the system comprising:
-
means for determining whether or not information loaded into a first application for display to a first user is trusted based on encrypted data obtained with the information; and
means for, in response to a determination that the information is trusted, presenting a user designated visual cue to indicate that the information is trusted. - View Dependent Claims (43, 44, 45)
-
Specification