Method for authenticating modification of a cursor image
DCFirst Claim
1. A method for authenticating modification of a cursor image, comprising:
- requesting specified content information from a first server system;
receiving said specified content information, said specified content information including at least one cursor display instruction, said cursor display instruction including authentication data;
transmitting, responsive to said specified content information, an authentication request to a second server system, said authentication request including said authentication data;
receiving, from said second server system, an authentication message indicating whether said first server system is authorized to modify said cursor image; and
modifying, in response to said receiving of said authentication message from said second server system, in the event that said authentication message indicates that said first server system is authorized to modify said cursor image, said cursor image to a new cursor image, said new cursor image including content corresponding to at least a portion of said specified content information.
6 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system for modifying a cursor image, as displayed on a video monitor of a remote terminal, to a specific image having a desired shape and appearance. The system stores cursor image data corresponding to the specific image, and a cursor display code. The cursor display code contains information in response to which the cursor image is modified to the specific image. A server computer transmits specified information to the remote terminal. The information includes at least one cursor display instruction. The cursor display instruction is operable to modify, in conjunction with the cursor information and the cursor image data, a cursor image displayed by a display of the remote terminal in the shape and appearance of the specific image.
-
Citations
23 Claims
-
1. A method for authenticating modification of a cursor image, comprising:
-
requesting specified content information from a first server system; receiving said specified content information, said specified content information including at least one cursor display instruction, said cursor display instruction including authentication data; transmitting, responsive to said specified content information, an authentication request to a second server system, said authentication request including said authentication data; receiving, from said second server system, an authentication message indicating whether said first server system is authorized to modify said cursor image; and modifying, in response to said receiving of said authentication message from said second server system, in the event that said authentication message indicates that said first server system is authorized to modify said cursor image, said cursor image to a new cursor image, said new cursor image including content corresponding to at least a portion of said specified content information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for authenticating an operation which modifies a cursor image displayed by a client system, comprising:
-
requesting specified content information from a server system; receiving said specified content information, said specified content information including at least one cursor display instruction, said cursor display instruction operable to modify an existing cursor image displayed by said client system, said cursor display instruction including an encrypted authentication code; decrypting said encrypted authentication code; determining whether to execute said cursor display instruction in response to said decrypted authentication code; and modifying, in response to said decrypted authentication code, in the event that said decrypted authentication code indicates that said server system is authorized to modify said existing cursor image, said existing cursor image to a new cursor image, said new cursor image including content corresponding to at least a portion of said specified content information. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for authenticating an operation which modifies a cursor image displayed by a client system, comprising:
-
requesting, by said client system, specified content information from a server system; receiving, by said client system, said specified content information, said specified content information including at least one cursor display instruction, said cursor display instruction operable to modify an existing cursor image displayed by said client system; requesting, by said client system responsive to recognizing said cursor display instruction, an encrypted authentication code; decrypting, by said client system, said encrypted authentication code; determining whether to execute said cursor display instruction in response to said decrypted authentication code; and modifying, in response to said decrypted authentication code, in the event that said decrypted authentication code indicates that said server system is authorized to modify said existing cursor image, said existing cursor image to a new cursor image, said new cursor image including content corresponding to at least a portion of said specified content information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
Specification