Secure data entry

作者: Aaron T. Emigh , James A. Roskind

DOI:

关键词:

摘要: In some embodiments, techniques for secure data entry comprise presenting a field in spoof-resistant manner, receiving data, and securing data.

参考文章(20)
Christopher Newell Toomey, Detecting and blocking spoofed web login pages ,(2003)
Khalid A. Asad, Mark E. Carson, Mudumbai Ranganathan, Janet A. Cugini, Integrity mechanism for data transfer in a windowing system ,(1994)
Zishuang (Eileen) Ye, Sean Smith, Trusted Paths for Browsers usenix security symposium. pp. 263- 279 ,(2002)
Mark Erwin Carson, Abhai Johri, A trusted path mechanism for virtual terminal environments ,(1988)
Dmitri Alperovitch, Jonathan Alexander Zdziarski, Phyllis Adele Schneck, Paul Judge, Sven Krasser, Systems and methods for identifying potentially malicious messages ,(2007)
Matthew W. Thomlinson, Allan Cooper, Scott Field, Cryptographic protection of core data secrets ,(1998)
Mark Erwin Carson, Abhai Johri, William Franz Burger, Ellen Jean Stokes, A remote trusted path mechanism for telnet ,(1988)
Sermet Iskin, Klaus U. Schutz, Eric C. Perlin, Stefan N. Richards, System and method facilitating secure credential management ,(2004)
Thomas Andrew Casey, Morrie Gasser, Leslie Richard Kendall, Clifford Earl Kahn, Paul Douglas Sawyer, Steven B. Lipner, Mary Ellen Zurko, Judith Shelhorse Hall, Andrew Halstead Mason, Processing trusted commands in trusted and untrusted environments ,(2000)