SECURE IN-LINE PAYMENTS FOR RICH INTERNET APPLICATIONS
First Claim
1. A system comprising:
- a mobile device executing a rich Internet application (RIA) that runs on an RIA runtime;
a payment library that communicates with the RIA runtime and a service provider, wherein;
the payment library communicates with the service provider to authenticate the rich Internet application; and
in response to an authentication by the service provider, the payment library displays a user authorization screen on the mobile device for collecting user authorization for a particular activity.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for making secure financial transactions, such as purchase payments, using rich Internet applications (RIA) running an RIA runtime (also referred to as a platform or framework) on the user'"'"'s smart phone or other mobile device. Embodiments differ from the usual way of re-directing a user from a third-party application and authenticating the user by providing secure in-line payments from a rich Internet application running on an RIA runtime. A system includes: a mobile device executing a rich Internet application running on an RIA runtime; a payment library communicating with the RIA runtime and a service provider, for which the payment library communicates with the service provider to authenticate the rich Internet application; and in response to authentication by the service provider, facilitates secure financial transactions via the rich Internet application.
20 Citations
18 Claims
-
1. A system comprising:
-
a mobile device executing a rich Internet application (RIA) that runs on an RIA runtime; a payment library that communicates with the RIA runtime and a service provider, wherein; the payment library communicates with the service provider to authenticate the rich Internet application; and in response to an authentication by the service provider, the payment library displays a user authorization screen on the mobile device for collecting user authorization for a particular activity. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
receiving a connection request at a server from a rich Internet application running on a client device; responding to the client device with a request for an oblivious hashing of the application; receiving a result of the oblivious hashing at the server; and in response to authenticating the rich Internet application, sending an out of band confirmation to a user of the client device. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising a non-transitory computer readable medium having computer readable and executable code for instructing a processor to perform a method, the method comprising:
-
receiving a connection request at a server from a rich Internet application running on a client device; responding to the client device with a request for an oblivious hashing of the application; receiving a result of the oblivious hashing at the server; and in response to authenticating the rich Internet application, sending an out of band confirmation to a user of the client device. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification