Systems and methods for key logger prevention security techniques
First Claim
1. A method of obfuscating input data received from a user in a user interface on a computer by loading an applet within the user interface, the method performed by the applet and comprising:
- receiving user input data in an input field from a user;
generating additional obfuscatory data in the input field combined with the user input data while the user input data is being input in the input field;
presenting only the user input data to a remote server for processing a user transaction,wherein any key logging malware active on the computer would receive the combined user input data and the additional obfuscatory data.
1 Assignment
0 Petitions
Accused Products
Abstract
An applet may be downloaded or provided to a web browser when a user visits a site in order to protect data input by the user from being captured by malicious software, such as key loggers. The applet may present a user input field in the web browser and may generate a random sequence of low-level key stroke or mouse click events within the input field when the user enters information, such as a username and/or password. A listening key logger will receive a large amount of random data, whereas the applet will receive and buffer the actual user data that may be communicated to a remote site access by the user.
-
Citations
15 Claims
-
1. A method of obfuscating input data received from a user in a user interface on a computer by loading an applet within the user interface, the method performed by the applet and comprising:
-
receiving user input data in an input field from a user; generating additional obfuscatory data in the input field combined with the user input data while the user input data is being input in the input field; presenting only the user input data to a remote server for processing a user transaction, wherein any key logging malware active on the computer would receive the combined user input data and the additional obfuscatory data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable medium encoded with computer-readable instructions for obfuscating input data received from a user in a user interface on a computer by loading an applet within the user interface, said computer-readable instructions comprising instructions that:
-
receive user input data in an input field from a user; generate additional obfuscatory data in the input field combined with the user input data while the first input data is being input in the input field; present only the user input data to a remote server for processing a user transaction, wherein key logging software on the computer will receive the combined user input data and the additional obfuscatory data. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system for obfuscating input data received from a user in a user interface on a computer by loading an applet within the user interface, comprising:
-
a user computer accessible by a user, said user computer having a user interface; an applet loaded within said user interface, said user interface including an input field adapted to receive user input data from the user, said applet generating additional obfuscatory data in said input field combined with the user input data while the user input data is being input in the input field; and a remote server, in communication with said applet, said applet presenting only the user input data to said remote server for processing a user transaction, wherein key logging software on said computer will receive the combined user input data and the additional obfuscatory data. - View Dependent Claims (12, 13, 14, 15)
-
Specification