Managing verification of input data
First Claim
Patent Images
1. A computer-implemented method for use in managing verification of input data, the method comprising:
- receiving a first set of input information at a first logical object;
receiving a second set of input information at a second logical object, wherein the first and second sets of input information are indicated as having a same origin; and
based on the first and second sets of input information, determining whether the first set of input information is valid;
characterized in that a trusted device comprises the second logical object, and keystrokes and mouse movements are logged independently on the trusted device.
9 Assignments
0 Petitions
Accused Products
Abstract
A method is used in managing verification of input data. A first set of input information is received at a first logical object, and a second set of input information is received at a second logical object. The first and second sets of input information are indicated as having a same origin. Based on the first and second sets of input information, it is determined whether the first set of input information is valid.
6 Citations
18 Claims
-
1. A computer-implemented method for use in managing verification of input data, the method comprising:
-
receiving a first set of input information at a first logical object; receiving a second set of input information at a second logical object, wherein the first and second sets of input information are indicated as having a same origin; and based on the first and second sets of input information, determining whether the first set of input information is valid; characterized in that a trusted device comprises the second logical object, and keystrokes and mouse movements are logged independently on the trusted device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for use in managing verification of input data, the system comprising a processor and memory, the system configured to:
-
receive a first set of input information at a first logical object; receive a second set of input information at a second logical object, wherein the first and second sets of input information are indicated as having a same origin; and determine based on the first and second sets of input information, whether the first set of input information is valid.; characterized in that a trusted device comprises the second logical object, and keystrokes and mouse movements are logged independently on the trusted device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification