Secure communication methods
First Claim
1. A method of communicating secure data, the method comprising:
- displaying a video image on a display device;
detecting a form within the video image, the form including one or more data entry fields;
identifying a member of the one or more data entry fields having a current focus;
gathering metadata characterizing the identified member of the one or more data entry fields;
sniffing a bus to capture data entered in the identified member of the one or more data entry fields;
encrypting the captured data or digitally signing the captured data to produce encrypted or signed data;
inserting the encrypted or signed data in a data packet;
sending the encrypted or signed data, in the data packet, to a remote device via a communication network;
receiving the encrypted or signed data at the remote device, the encrypted or signed data being received in a data packet;
identifying a source of the data packet;
retrieving a decryption key or certification data based on the identity of the source;
decrypting or authenticating contents of the data packet;
identifying an account based on the identity of the source;
identifying a destination for the contents; and
forwarding the contents to the destination based on a status of the account, wherein the received encrypted or signed data includes video data and further comprising processing the video data using character recognition logic.
1 Assignment
0 Petitions
Accused Products
Abstract
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
-
Citations
19 Claims
-
1. A method of communicating secure data, the method comprising:
-
displaying a video image on a display device; detecting a form within the video image, the form including one or more data entry fields; identifying a member of the one or more data entry fields having a current focus; gathering metadata characterizing the identified member of the one or more data entry fields; sniffing a bus to capture data entered in the identified member of the one or more data entry fields; encrypting the captured data or digitally signing the captured data to produce encrypted or signed data; inserting the encrypted or signed data in a data packet; sending the encrypted or signed data, in the data packet, to a remote device via a communication network; receiving the encrypted or signed data at the remote device, the encrypted or signed data being received in a data packet; identifying a source of the data packet; retrieving a decryption key or certification data based on the identity of the source; decrypting or authenticating contents of the data packet; identifying an account based on the identity of the source; identifying a destination for the contents; and forwarding the contents to the destination based on a status of the account, wherein the received encrypted or signed data includes video data and further comprising processing the video data using character recognition logic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification