Information security – Access control or authentication
Reexamination Certificate
2005-04-01
2010-02-09
Zand, Kambiz (Department: 2434)
Information security
Access control or authentication
Reexamination Certificate
active
07661126
ABSTRACT:
Access to an authentication image may be protected so that only authenticated processes have access to the image. The image can be displayed to authenticate a User Interface (UI) to a computer user. The image indicates the UI can be trusted. If the image is not displayed, it may be that an application UI is “spoofed” to trick a user into providing sensitive information. Additionally, a large variety of different images can be used as authentication images, so spoofing one image be recognized by most users. A set of original images may be provided, along with image modification processes which can generate a large number of variations. Techniques for authenticating UIs in a virtual machine context are provided. A secure attention sequence is also provided, which allows users to test whether processes running on a computer are authenticated.
REFERENCES:
patent: 5822435 (1998-10-01), Boebert et al.
patent: 6385721 (2002-05-01), Puckette
patent: 7337466 (2008-02-01), Light et al.
patent: 2002/0023032 (2002-02-01), Pearson et al.
patent: 2002/0139351 (2002-10-01), Braun et al.
patent: 2002/0194482 (2002-12-01), Griffin et al.
patent: 2002/0194493 (2002-12-01), Dalton
U.S. Appl. No. 10/691,759, filed Oct. 23, 2003, Avraham et al.
U.S. Appl. No. 10/693,061, filed Oct. 24, 2003, Avraham et al.
U.S. Appl. No. 10/693,407, filed Oct. 24, 2003, Roberts et al.
U.S. Appl. No. 10/697,197, filed Oct. 30, 2003, Cohen.
U.S. Appl. No. 10/954,917, filed Sep. 30, 2004, Willman et al.
Brocker, L. et al., “Improving the retrieval performance of content-based image retrieval systems: the GIVBAC approach”,Proceedings Fifth International Conference on Information Visualisation, Jul. 25-27, 2001, London, UK, 769.
Riegelsberger, J. et al., “Trustbuilders and trustbusters—the role of trust cues in interfaces to E-commerce applications”,Proceedings 1stIFIP Conference on e-Commerce, e-Business, e-Government, Oct. 3-5, 2001, Zurich, Switzerland, 17-30.
Roy, M.C. et al., “The impact of interface usability on trust in Web retailers”,Internet Research-Electronic Networking Applications and Policy, 2001, 11(5), 388-398.
Schunter, M. et al., “Architecture and design of a secure electronic marketplace”,Proceedings of JENC 8, 8thJoint European Networking Conference, May 12-15, 1997, Edinburgh, UK, 712/1-5.
Benofsky Laura Posey
Bryant Madeline Jinx
Holt William Gifford
Johnson Leslie Helena
Nussbaum Nicholas I.
Microsoft Corporation
Woodcock & Washburn LLP
Wyszynski Aubrey H
Zand Kambiz
LandOfFree
Systems and methods for authenticating a user interface to a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for authenticating a user interface to a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for authenticating a user interface to a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4186019