Trust verification in copy and move operations
First Claim
Patent Images
1. A method comprising:
- composing a data object by a source application on a computer, the data object indicating text or a picture, the text or the picture designated by a user via a copy or cut operation on the text or the picture, the copy or cut operation performed via the source application;
evaluating, by the source application, the data object;
associating, by the source application, trust information with the data object, the trust information including a flag indicating whether the text or the picture designated by the user was obtained from the Internet, the trust information further including a value that is associated with a scale of values and which indicates a level of trust associated with the text or the picture;
receiving, by the source application, a request from the user to paste the text or the picture to a target application; and
prompting, by the source application, the user for confirmation before pasting the text or the picture to the target application responsive to receiving the request from the user to paste the text or the picture when the flag indicates that the text or the picture was obtained from the Internet.
2 Assignments
0 Petitions
Accused Products
Abstract
When using a clipboard or drag-and-drop interface of a graphical computer interface, a source application includes trust information along with data that is proffered to a target application. The target application conditions its acceptance of such data based on the trust information.
-
Citations
20 Claims
-
1. A method comprising:
-
composing a data object by a source application on a computer, the data object indicating text or a picture, the text or the picture designated by a user via a copy or cut operation on the text or the picture, the copy or cut operation performed via the source application; evaluating, by the source application, the data object; associating, by the source application, trust information with the data object, the trust information including a flag indicating whether the text or the picture designated by the user was obtained from the Internet, the trust information further including a value that is associated with a scale of values and which indicates a level of trust associated with the text or the picture; receiving, by the source application, a request from the user to paste the text or the picture to a target application; and prompting, by the source application, the user for confirmation before pasting the text or the picture to the target application responsive to receiving the request from the user to paste the text or the picture when the flag indicates that the text or the picture was obtained from the Internet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for use in conjunction with a transfer service of a computer having a graphical user interface, wherein said transfer service facilitates data transfer in response to user actions, the method comprising:
-
receiving a data object from the transfer service, the data object composed at a source application of the computer and indicating (a) text or a picture, designated by a user, via a copy or cut operation on the text or the picture performed at the source application and (b) trust information regarding the text or the picture as evaluated and included by the source application, the trust information including; a flag indicating whether the text or the picture was obtained from the Internet; and a value that is associated with a scale of values and which indicates a level of trust associated with the text or the picture; receiving a request from the user to paste the text or the picture to a target application; and prompting the user for confirmation before pasting the text or the picture responsive to receiving the request from the user to paste the text or the picture when the flag indicates that the text or the picture was obtained from the Internet. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. One or more computer-readable storage media containing instructions that are executable to cause a computer to perform actions comprising:
-
composing a data object at a source application on the computer, the data object indicating text or a picture, the text or the picture designated by a user via a copy or cut operation on the text or the picture performed via the source application; evaluating the data object by the source application; including trust information in the data object by the source application, the trust information including a flag indicating whether the text or the picture was obtained from the Internet, the trust information further including a value that is associated with a scale of values and which indicates a level of trust associated with the text or the picture; receiving, by the source application, a request from the user to paste the text or the picture to a target application; and prompting, by the source application, the user for confirmation before pasting the text or the picture to the target application responsive to receiving the request from the user to paste the text or the picture when the flag indicates that the text or the picture was obtained from the Internet. - View Dependent Claims (18, 19, 20)
-
Specification