Systems and methods for demonstrating authenticity of a virtual machine using a security image
First Claim
1. In a computer system comprising a plurality of operating systems in a virtual machine arrangement, such that multiple operating systems simultaneously utilize processing resources associated with said computer system, a method for demonstrating that a User Interface (UI) associated with a one of said operating systems is authentic, said method comprising:
- measuring, by a first operating system, digital information associated with a second operating system, and thereby obtaining a value;
comparing said value to a previously measured value for the digital information;
obtaining an image, wherein said image is only accessible if said value matches said previously measured value, wherein obtaining the image indicates that the user interface was authenticated; and
indicating to the user that the user interface was authenticated by displaying said image in a non-client area frame surrounding a display space for said second operating system.
2 Assignments
0 Petitions
Accused Products
Abstract
Access to an authentication image may be protected so that only authenticated processes have access to the image. The image can be displayed to authenticate a User Interface (UI) to a computer user. The image indicates the UI can be trusted. If the image is not displayed, it may be that an application UI is “spoofed” to trick a user into providing sensitive information. Additionally, a large variety of different images can be used as authentication images, so spoofing one image be recognized by most users. A set of original images may be provided, along with image modification processes which can generate a large number of variations. Techniques for authenticating UIs in a virtual machine context are provided. A secure attention sequence is also provided, which allows users to test whether processes running on a computer are authenticated.
-
Citations
20 Claims
-
1. In a computer system comprising a plurality of operating systems in a virtual machine arrangement, such that multiple operating systems simultaneously utilize processing resources associated with said computer system, a method for demonstrating that a User Interface (UI) associated with a one of said operating systems is authentic, said method comprising:
-
measuring, by a first operating system, digital information associated with a second operating system, and thereby obtaining a value; comparing said value to a previously measured value for the digital information; obtaining an image, wherein said image is only accessible if said value matches said previously measured value, wherein obtaining the image indicates that the user interface was authenticated; and indicating to the user that the user interface was authenticated by displaying said image in a non-client area frame surrounding a display space for said second operating system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer readable storage medium bearing instructions that when processed by a processor cause the processor to implement a method for displaying an image in a non-client area frame for a display space associated with an operating system, said instructions comprising:
-
instructions for measuring digital information associated with said operating system, and thereby obtaining a value; instructions for comparing said value to a previously measured value for the digital information; instructions for obtaining an image, wherein said image is only accessible if said value matches said previously measured value, wherein obtaining the image indicates that the user interface was authenticated; and instructions for displaying said image in said non-client area frame surrounding a display space for said operating system, wherein displaying the image indicates to the user that the user interface is authenticated. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer system comprising means for displaying an image in a non-client area frame on a display device associated with an operating system, said means comprising:
-
means for measuring digital information associated with said operating system, and thereby obtaining a value; means for comparing said value to a previously measured value for the digital information; means for obtaining an image, wherein said image is only accessible if said value matches said previously measured value, wherein obtaining the image indicates that the operating system was authenticated; and means for displaying said image in said non-client area frame on said display device to demonstrate that said operating system is trusted. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification