×

Method for authenticating modification of a cursor image

DC
  • US 6,065,057 A
  • Filed: 07/21/1999
  • Issued: 05/16/2000
  • Est. Priority Date: 06/25/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for authenticating modification of a cursor image, comprising:

  • requesting specified content information from a first server system;

    receiving said specified content information, said specified content information including at least one cursor display instruction, said cursor display instruction including authentication data;

    transmitting, responsive to said specified content information, an authentication request to a second server system, said authentication request including said authentication data;

    receiving, from said second server system, an authentication message indicating whether said first server system is authorized to modify said cursor image; and

    modifying, in response to said receiving of said authentication message from said second server system, in the event that said authentication message indicates that said first server system is authorized to modify said cursor image, said cursor image to a new cursor image, said new cursor image including content corresponding to at least a portion of said specified content information.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×