×

Systems and methods for using a domain-specific security sandbox to facilitate secure transactions

  • US 8,364,959 B2
  • Filed: 05/26/2010
  • Issued: 01/29/2013
  • Est. Priority Date: 05/26/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer system for facilitating a secure transaction, the computer system comprising:

  • one or more processing units;

    a memory, coupled to at least one of the one or more processing units, the memory storing instructions that are executed by at least one of the one or more processing units, the instructions comprising;

    (A) executing a client application, wherein the client application is executed directly from a local data store or is executed from a remote client application server;

    (B) generating, through the client application, at a time when the client application is executing, a request associated with a secure in-application transaction, wherein the request comprises (i) a credential for the client application, (ii) a transaction identifier that uniquely identifies the request, and (iii) optionally, an identification of a user of the client application;

    (C) submitting the request for the secure in-application transaction over the Internet or a computer network to a first domain that has an unrestrictive first cross-domain policy;

    (D) receiving, responsive to the submitting (C), a validated transaction module from the first domain wherein the source URL of the transaction module is identified as the first domain;

    (E) causing the client application to execute the validated transaction module such that the validated transaction module is loaded into a separate domain security sandbox within said memory, whereinthe separate domain security sandbox is segregated from memory space in said memory in which the client application is run,the separate domain security sandbox is associated with, and limited to, programs that identify their source URL as being the first domain,the validated transaction module is executed by the causing (E) such that the identity of the source URL of the validated transaction module is not altered or destroyed, andthe validated transaction module does not grant the client application the power to introspect the validated transaction module;

    (F) issuing, from the validated transaction module while it is executing in the separate domain security sandbox, a transaction call to a second domain, wherein the second domain has a second cross-domain policy that limits interaction between the second domain and programs external to the second domain to those external programs whose source URL is the first domain;

    (G) conducting a validated transaction between the second domain and the validated transaction module; and

    (H) determining, through the client application, by querying the first domain, whether the transaction was completed, thereby facilitating a secure transaction.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×