Patent application number | Description | Published |
20110099376 | SYSTEMS AND METHODS FOR AUTHENTICATING AN ELECTRONIC TRANSACTION - Systems and methods for authenticating a request between a client computer and a transaction server are provided. An application request, comprising an identity of a user originating the request, is received at an application server from the client. The application server constructs a signing key based on (i) the identity of the user making the request, (ii) a time based salt value, (iii) a secret shared between the application and transaction servers and, optionally, (iv) an identifier of the distributor or developer of the application. The signing key is embedded in an unbranded version of the application thereby branding the application. The branded application can sign a request with the signing key and submit the signed request to the transaction server with the identity of the user and the identifier of the distributor or developer of the application. | 04-28-2011 |
20110296529 | SYSTEMS AND METHODS FOR USING A DOMAIN-SPECIFIC SECURITY SANDBOX TO FACILITATE SECURE TRANSACTIONS - Computer systems, methods, and computer readable media for facilitating a secure transaction are provided in which a client application is executed on a client computer. The client application initiates a request to a first domain comprising (i) a credential for the client application, (ii) a transaction identifier that uniquely identifies the request, and (iii) optionally, an identification of a user of the client application. Responsive to this request, the client receives a validated transaction module from the first domain. The client application loads the validated transaction module into a separate domain security sandbox that is segregated from memory space in which the client application is run. The validated transaction module conducts a validated transaction between the second domain and the validated transaction module. Separately, through the client application, a determination is made as to whether the transaction is complete by querying the first domain. | 12-01-2011 |
20130019098 | SYSTEMS AND METHODS FOR AUTHENTICATING AN ELECTRONIC TRANSACTION - Systems and methods for authenticating a request between a client computer and a transaction server are provided. An application request, comprising an identity of a user originating the request, is received at an application server from the client. The application server constructs a signing key based on (i) the identity of the user making the request, (ii) a time based salt value, (iii) a secret shared between the application and transaction servers and, optionally, (iv) an identifier of the distributor or developer of the application. The signing key is embedded in an unbranded version of the application thereby branding the application. The branded application can sign a request with the signing key and submit the signed request to the transaction server with the identity of the user and the identifier of the distributor or developer of the application. | 01-17-2013 |
Patent application number | Description | Published |
20130139220 | Systems and Methods for Using A Domain-Specific Security Sandbox to Facilitate Secure Transactions - Computer systems, methods, and computer readable media for facilitating a secure transaction are provided in which a client application is executed on a client computer. The client application initiates a request to a first domain comprising (i) a credential for the client application, (ii) a transaction identifier that uniquely identifies the request, and (iii) optionally, an identification of a user of the client application. Responsive to this request, the client receives a validated transaction module from the first domain. The client application loads the validated transaction module into a separate domain security sandbox that is segregated from memory space in which the client application is run. The validated transaction module conducts a validated transaction between the second domain and the validated transaction module. Separately, through the client application, a determination is made as to whether the transaction is complete by querying the first domain. | 05-30-2013 |
20140108916 | Methods and Systems to Copy Web Content Selections - Embodiments disclosed herein relate to copying web content selections. An embodiment includes detecting an intent to copy a selected region of a web content area displayed in a web browser, drawing an image representing the selected region into an image canvas, storing the image in the DOM of the displayed web content area as referenced by a browser image element while the web content area is displayed in the web browser, and changing a browser selection range to point to the DOM storing the image representing the selected region, wherein the image is embedded into at least one content area distinct from the web content area. | 04-17-2014 |