Authenticating logos

Carl Ellison cme at acm.org
Thu Jan 17 00:39:44 EST 2002


At 10:35 AM 1/16/2002 -0800, Ron_Vered at 3com.com wrote:
>
>
>While valid claims (decision about trust is made based on logo,
>etc.), similar things happen outside of "cyberspace".
>A person goes to AT&T store, with a big logo in front, eventually
>gives his credit card information to the person sitting there. That
>person, maybe an employee of a dealer / franchise store owner
>(similar to the Palm case). Does that person trust the employee?
>probably not. Does he trust the store owner? Maybe not. He made his
>decision based on the logo in front, which may turn out to be fake.
>

Yes, he's trusting the logo.  It could be fake, but the assumption is
that if it's there for very long, it's less likely to be fake because
the real logo owner would have had it brought to his attention and he
would have threatened legal action to get it removed.

..seems there ought to be something similar in cyberspace...




+------------------------------------------------------------------+
|Carl M. Ellison         cme at acm.org     http://world.std.com/~cme |
|    PGP: 08FF BA05 599B 49D2  23C6 6FFD 36BA D342                 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list