G06F21/83

Web application execution with secure elements
11537760 · 2022-12-27 · ·

Various examples are directed to systems and methods for executing a web application with client-side encryption. A web application may execute in a web browser at a client computing device. The web browser may generate a document comprising a secure display element. The web browser may request to render the document at the client computing device. A cryptographic tool of the web browser may decrypt the first encrypted value to generate a first clear value. The web browser may render the document at an output device of the client computing device using the clear value. The web browser may also be programmed to prevent the web application from accessing the first clear value.

Web application execution with secure elements
11537760 · 2022-12-27 · ·

Various examples are directed to systems and methods for executing a web application with client-side encryption. A web application may execute in a web browser at a client computing device. The web browser may generate a document comprising a secure display element. The web browser may request to render the document at the client computing device. A cryptographic tool of the web browser may decrypt the first encrypted value to generate a first clear value. The web browser may render the document at an output device of the client computing device using the clear value. The web browser may also be programmed to prevent the web application from accessing the first clear value.

SECURE STORAGE OF SENSOR SETTING DATA

The present disclosure relates to a fingerprint sensing system and a method performed by the fingerprint sensing system of verifying that setting data of a fingerprint sensor of the fingerprint sensing system has not been modified. In aspect, a method performed by a fingerprint sensing system of verifying that setting data of a fingerprint sensor of the fingerprint sensing system has not been modified is provided. The method comprises blocking access to the fingerprint sensor setting data held in a storage of the fingerprint sensing system, acquiring from the fingerprint sensor a representation of the fingerprint sensor setting data to be utilized upon capturing a fingerprint image, and verifying from the acquired representation if the fingerprint sensor setting data corresponds to fingerprint sensor setting data that previously was written to the storage.

SYSTEMS AND METHODS FOR SECURE PERIPHERALS
20220405405 · 2022-12-22 ·

Systems and methods for an interface device that is configured to locally generated encrypted data and also receive encrypted data from a host computer, locally decrypt the data, and present the decrypted data independently from the host computer.

SYSTEMS AND METHODS FOR SECURE PERIPHERALS
20220405405 · 2022-12-22 ·

Systems and methods for an interface device that is configured to locally generated encrypted data and also receive encrypted data from a host computer, locally decrypt the data, and present the decrypted data independently from the host computer.

Keylogger detection systems and methods

A method may include detecting a keylogger based at least in part on an increase in power drawn by an input device, detecting the keylogger based at least in part on a driver of the input device, detecting the keylogger based at least in part on a duration of time that a signal generated by the input device takes to transmit to a computing device, or any combination thereof. The method may also include, in response to detecting the keylogger, generating an alert to indicate a presence of the keylogger.

Keylogger detection systems and methods

A method may include detecting a keylogger based at least in part on an increase in power drawn by an input device, detecting the keylogger based at least in part on a driver of the input device, detecting the keylogger based at least in part on a duration of time that a signal generated by the input device takes to transmit to a computing device, or any combination thereof. The method may also include, in response to detecting the keylogger, generating an alert to indicate a presence of the keylogger.

MECHANISMS FOR SECURE USER INPUT
20220398336 · 2022-12-15 ·

Methods, apparatuses, and systems for secure data input mechanisms are described herein. An example method comprises monitoring a user interface presented on a display of a mobile device, identifying an input field of the application shown within the display, and adjusting operation of the mobile device in response to entry of data within the input field, the adjusting operation occurring via an input method, the input method changing at least one characteristic of the mobile device indicative of entry of data with use of the mobile device, so as to prevent acquisition of the data by a malicious application installed on the mobile device.

Systems and methods of selection acknowledgement for interfaces promoting obfuscation of user operations

User-input obfuscating techniques involving displaying multiple targets on a display device. A visual indication of the current user target moves to a first target at a first time in response to user input, and a first presentation of a visual or audio feedback signal confirming actuation of a target occurs at a second time, without a user input for actuation of a target received while the current user target has remained at the first target from the first time to the second time. The visual indication moves to a second target at a third time in response to user input. The second target is actuated in response to receiving user input for actuation of the current user target after the third time. Then, with the current user target having remained at the second target since the third time, a second presentation of the visual or audio feedback signal is provided.

Systems and methods of selection acknowledgement for interfaces promoting obfuscation of user operations

User-input obfuscating techniques involving displaying multiple targets on a display device. A visual indication of the current user target moves to a first target at a first time in response to user input, and a first presentation of a visual or audio feedback signal confirming actuation of a target occurs at a second time, without a user input for actuation of a target received while the current user target has remained at the first target from the first time to the second time. The visual indication moves to a second target at a third time in response to user input. The second target is actuated in response to receiving user input for actuation of the current user target after the third time. Then, with the current user target having remained at the second target since the third time, a second presentation of the visual or audio feedback signal is provided.