主权项 |
1. A processor-based method for computer security, comprising:
receiving a request for secure data entry; wherein the request is associated with a first data recipient; receiving a selection of a second data recipient, wherein receiving the selection of the second data recipient includes displaying a first candidate associated with the first data recipient and a second candidate associated with a third data recipient, and receiving a selection corresponding to one of the first candidate and the second candidate, wherein the second data recipient is the first data recipient when the selection corresponds to the first candidate and wherein the second data recipient is the third data recipient when the selection corresponds to the second candidate; determining whether the second data recipient is the first data recipient; and denying the request for secure data entry, if it is determined that the second data recipient is not the first data recipient. |