Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for securing sensitive user data. One of the methods includes receiving a request for user input; providing the request to a remote location; receiving, at a user device, code executable by display hardware to render a user interface configured to receive the user input; capturing information identifying the particular display device locations to which the user provided input on the rendered user interface; and providing the information to the remote location that maps the captured information to user interface information to determine the user input.
Type:
Grant
Filed:
March 20, 2019
Date of Patent:
October 27, 2020
Assignee:
MagicCube, Inc.
Inventors:
Jason Wu, Peter Crosthwaite, Michael Koval, Hesham Shawki, Nancy Zayed, Shin'ichiro Matsuo, Xi Zhou
Abstract: Systems and methods for secure transaction authorization are provided. An emulator is instantiated on a host device and configured to emulate an integrated circuit having a different instruction set than an integrated circuit of the host device, and a guest operating system executing on the emulated integrated circuit is configured to communicate with a host operating system of the host device through an emulated network interface of the emulator. Under control of one or more guest operating system processes executing on the emulated integrated circuit, a request is received over a first secure communication channel from an application executing on the host operating system to authorize a transaction. An authorization result is received from a remote system over a second secure communication channel, and a response is sent to the application over the first secure communication channel indicating the authorization result.
Abstract: Systems and methods for secure transaction authorization are provided. An emulator is instantiated on a host device and configured to emulate an integrated circuit having a different instruction set than an integrated circuit of the host device, and a guest operating system executing on the emulated integrated circuit is configured to communicate with a host operating system of the host device through an emulated network interface of the emulator. Under control of one or more guest operating system processes executing on the emulated integrated circuit, a request is received over a first secure communication channel from an application executing on the host operating system to authorize a transaction. Further, based on the received request, user input is obtained from an input device of the host device and transformed into verification data.