Transaction Security Systems and Methods
First Claim
Patent Images
1. A method comprising:
- receiving, from a host device having a host processor, outbound network traffic of a host application, the outbound network traffic directed to a secure resource, the secure resource configured to provide a secure transaction based on the outbound network traffic;
determining, using a second processor different than the host processor, whether the host application is authorized to provide the outbound network traffic to the secure resource;
allowing the outbound network traffic to be forwarded to the secure resource if the host application is authorized; and
disallowing the outbound network traffic to be forwarded to the secure resource if the host application is not authorized.
1 Assignment
0 Petitions
Accused Products
Abstract
Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized.
15 Citations
20 Claims
-
1. A method comprising:
-
receiving, from a host device having a host processor, outbound network traffic of a host application, the outbound network traffic directed to a secure resource, the secure resource configured to provide a secure transaction based on the outbound network traffic; determining, using a second processor different than the host processor, whether the host application is authorized to provide the outbound network traffic to the secure resource; allowing the outbound network traffic to be forwarded to the secure resource if the host application is authorized; and disallowing the outbound network traffic to be forwarded to the secure resource if the host application is not authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secure transaction device comprising:
-
a host device interface module configured to receive, from a host device having a host processor, outbound network traffic of a host application, the outbound network traffic directed to a secure resource, the secure resource configured to provide a secure transaction based on the outbound network traffic; an application determination module configured to determine, using a second processor different than the host processor, whether the host application is authorized to provide the outbound network traffic to the secure resource; a trusted application module configured to allow the outbound network traffic to be forwarded to the secure resource if the host application is authorized; and an untrusted application module configured to disallow the outbound network traffic to be forwarded to the secure resource if the host application is not authorized. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
means for receiving, from a host device having a host processor, outbound network traffic of a host application, the outbound network traffic directed to a secure resource, the secure resource configured to provide a secure transaction based on the outbound network traffic; means for determining, using a second processor different than the host processor, whether the host application is authorized to provide the outbound network traffic to the secure resource; means for allowing the outbound network traffic to be forwarded to the secure resource if the host application is authorized; and means for disallowing the outbound network traffic to be forwarded to the secure resource if the host application is not authorized.
-
Specification